Thursday, April 25, 2019

Transmission Media and Its Types [Guided and Unguided Media]


Transmission Media

}  Transmission medium is a channel through which data or signals can be transmitted from sender to receiver.
}  Data is transmitted through the electromagnetic signals.
}  Transmission media are also called communication channels.




Guided Media
}  It is a wired transmission media, in which data signals are guided along a physical path i.e. within a wire. 
}  Also known as Bounded or wired media.
}  Examples are Twisted Pair Cable, Coaxial cable and fiber optic cable.




Twisted Pair Cable
}  A pair of wires which are made of copper and are twisted with each other is known as twisted pair cable.
}  A set of four pairs of twisted wires are bundled to form cable.
}  The wires are twisted to reduce cross talk and electrical interference.
}  It was invented by Alexander Graham Bell in 1881.
}  Its types are :
      Unshielded Twisted Pair Cable (UTP)
      Shielded Twisted Pair Cable (STP)





Unshielded Twisted Pair Cable (UTP)
}  The unshielded twisted pair cable is a Guided Transmission Media, which is used for transmitting both data and voice. 
}  It consists of 4 pairs of colour-coded wires twisted around each other.
}  The wires are twisted to prevent electromagnetic interference (cross talk)
}  Cat 5 cable with RJ-45 connector is commonly used with unshielded twisted pair





Shielded Twisted Pair Cable (STP)
}  The shielded twisted pair cable is a Guided Transmission Media , which is quite expensive than unshielded twisted pair cable.  
}  It has a foil shield that covers the wires.
}  The foil shield adds a layer of protection against electro-magnetic interference leaking into and out of the cable.
}  Shielded Twisted Pair Cable are more expensive than Unshielded Twisted Pair Cable, but less susceptible to noise.




Co-axial Cable
}  A cable which is used with single ended single reference where the central conductor carries the data signal is called co-axial cable.
}  The connectors used with co-axial cables are BNC, T-connectors and terminators in bus topology.
}  10 Mbps is the maximum speed of co-axial cable.
}  Coaxial cable is used in cable television.
}  It is preferred for long distance telephone lines as well.



Fiber Optic Cable
}  Fiber optics cable is one of the costlier cables used in data communication which uses light to carry a data signal through the cable.
}  The connectors used in fiber optics are Screw Mounted Adaptors (SMA), Spring-loaded Twist (ST), SC and FC.
}  It is costlier to maintain, produce and install.  
}  Fiber-optic cable do not get affected by electromagnetic interference.
}  Works for both analog as well as digital signals.
}  Point to point one way communication generally uses the cable.



Unguided Media
}  Unbounded media are wireless media that does not require any physical medium to transmit electromagnetic signals. 
}  The electromagnetic signals are broadcasted through air to everyone instead of cables.
}  e.g.: radio waves, micro waves and infrared waves.


Radio Wave
}  It is a form of wireless communications in which signals are sent through radio frequency waves.
}  It provides low bandwidth for data communication.
}  The radio waves are generated easily; they are low-frequency signals and can travel a long distance.
}  The radio waves can penetrate through the buildings.
}  Frequency Range:3KHz – 1GHz.
}  AM and FM radios and cordless phones use Radiowaves for transmission.




Microwave
}  It is a form of wireless communication in which data signals are sent through pulses of electromagnetic energy.
}  The microwave has a frequency higher than the radio waves.
}  The microwaves are transmitted in a straight line and hence require the line-of-sight transmission
}  More the taller are antennas longer is the distance covered by the signal.
}  Frequency Range:1GHz – 300GHz. 
}  Microwave are used for telephone communication mobile phones, television distribution, etc.




Infrared
}  Infrared waves are used for short range communication.
}  Like, the remote control for televisions, VCRs, wireless mouse, keyboard, printer, etc. uses infrared waves.
}  It can not penetrate (enter) through obstacles. 
}  Frequency Range:300GHz – 400THz.



Friday, April 19, 2019

Definition of Computer Network and Advantages and Disadvantages of Computer Network

Computer Network
A computer network is a group of interconnected computers through transmission media in order to communicate, share data, information, hardware and software resources.



Advantages of  Computer Network
  1. Computer in a network can access the network-connected hardware devices like printers, disk drives, etc.
  2. Data in a network environment can be updated from any computer. Updated data can be accessed by all computers on the network.
  3. Computers in a network system share different software packages.
  4. Information can be exchanged rapidly in computer network.

Disadvantages of  Computer Network
  1. The sharing of information may leak the privacy of other clients.
  2. If any computer system in a network gets affected by computer virus, there is a big chance of spreading computer viruses on other computers on the network.
  3. Computers on the network have to depend on the server computer for the resources.
  4. Data and information may be stolen by computer hackers if the security of network is not reliable.


Mention the reasons of keeping computers on the network.
The reasons of keeping computers on the network are
  1. To share hardware devices like printers, scanners, hard disks etc.
  2. To share data and information.
  3. to share software resources.
  4. To communicate with each other.


List the main goals of computer network.
The main goals of computer network are
  1. Resource sharing
  2. Reliability
  3. Communication medium
  4. Access to remote database
  5. Easy data transfer

Computer Network reduces expenses of an office. Justify this statement with suitable examples.
Computer network reduces expenses of an office. It is because in offices, there may be more than one computer and they may need to produce hard copy outputs, scan documents and send faxes. But it is impractical for each individual computer of an office to have expensive computer hardware like laser printer, scanner, fax machine etc. So, to reduce the expenses, computers are kept on the network.

Computer network makes the world a small place. Justify this statement with strong reasons.
Computer network makes the world a small place. Because of computer network, it is easy for the average person using his/her PC to make reservation for airplanes, trains, hotels, check bank balance in account and transfer money from banks and so on anywhere in the world with instant confirmation. The server computer on the network acts as the storehouse and distributor for the data, information and programs.

Wednesday, April 10, 2019

SEE 2075 (2019) [State 2] Computer Science Solved


SEE 2075 (2019) [State 2]
Computer Science Solved
Group A
Computer Fundamentals (22 Marks)
1. Answer the following questions:
a) Write any two advantage and disadvantage of computer network.
Advantages of  Computer Network
a)    Computer in a network can access the network-connected hardware devices like printers, disk drives, etc.
b)    Data in a network environment can be updated from any computer. Updated data can be accessed by all computers on the network.
Disadvantages of  Computer Network
a)    The sharing of information may leak the privacy of other clients.
If any computer system in a network gets affected by computer virus, there is a big chance of spreading computer viruses on other computers on the network.
b) Define E-mail.
E-mail (Electronic mail) is one of the most popular services provided by the internet which sends and receives mail through the internet. 
c) What is cyber law?
The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.
d) What is computer security? List any two ways of software security.
The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
Any two software security measures are:
i) Backup
ii) Scandisk
d) How password secure the data?
Password secures the data by giving access to the authorized person only.
e) Write any two ways in which computer virus gets transmitted.
Any two ways in which computer virus gets transmitted
i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
2. a) Perform the conversion  as per the direction:
i) (FA)16 into binary
Soln:
Converting hexadecimal to binary
F = 1111
A = 1010

(FA)16 = (11111010)2


ii) (420)10 into octal
Soln:
Converting decimal to octal
8
420
Rem
8
52
4
8
6
4

0
6

(420)10 =(644)8

b) Perform the binary calculation:
i) 111×10
Soln:

1
1
1


×
1
0


0
0
0

1
1
1
x

1
1
1
0


111×10 = 1110
ii) 1101 ÷ 101
Soln:
101)
 1101(
10

-101


     11


    -  0


     11


Q=10
R=11
3. Match the following:
Group A                          Group B
a)    Back up                 i) online shopping
b)    Microphone           ii) duplicate
c)    Web browser         iii) damage of corrupt data
d)    E-Commerce          iv) multimedia
                                        v) display of web pages
Answers
Group A                          Group B
a)    Back up                 i) duplicate
b)    Microphone           ii) multimedia
c)    Web browser         iii) display of web pages
d)    E-Commerce          iv) online shopping
                                         
                                       
4. State whether the following statements are true or false:
a) Router provides power backup if there is power cut in the network system. False
b) Boot sector virus infects the program files. False
c) In BUS network topology, nodes are connected in a single wire. True
d) Sound card in one of the component of multimedia. True
         

5. Write the appropriate technical terms of the following:
a) The device which is used to connect two dissimilar network topology. Gateway
b) Committing crime using computer and internet. Cyber Crime
c) The process of sending file from user’s computer to web server. Upload
d) The integration of text, audio and animation. Multimedia
6. Write the full form:
i) ADSL – Asymmetric Digital Subscriber Line
ii) WAN – Wide Area Network
iii) HTTP  – Hyper Text Transfer Protocol
iv) ICT  – Information and Communication Technology
Group B
Database
7a. Differentiate between fields and records with an example.
Field
Record
i) A column in a table is called field, and it contains a specific piece of information within a record.
i) Record is a collection of multiple related fields in a row which gives complete information about a person or thing.
ii) E.g.: Name, Address, Telephone
ii)E.g.: Ram Chabahil 4468790
b. Define data type. Name any two data types used in MS-Access.
Data type is an attribute for a field that determines what type of data it can contain.
Ans: Any two  data types of MS-Access are:
i) Text
ii) Number
c. What is a query?
Query is an object of Ms-Access which extracts and arranges information from a table in a manner that is specified.

8.  Select the correct answer.
a) Record of the table is also known as …….
          i) Tuple       ii) Field        iii) Number            iv) All
b) ……accelerated the data and makes the search operation fast.
          i) Index       ii) sort          iii) Number            iv) Filter
c) MS-Access is a ……………software.
          i) Word Processing          ii) DBMS    iii) Spreadsheet      iv) Web
d) The default field size of “Auto Number” data type is ………
          i) Byte          ii) Integer     iii) Long Integer   iv) Double
9. Match the following:
Group A                          Group B
a)    Table                     i) Printed Format
b)    Primary Key           ii) Allows viewing, editing and inputting data
c)    Form                      iii) uniquely defined
d)    Report                    iv) stores data
v) Extracts selected record for view
Answers:
Group A                          Group B
a)    Table                     i) stores data
b)    Primary Key           ii) uniquely defined
c)    Form                      iii) Allows viewing, editing and inputting data
d)    Report                    iv) Printed Format


Group C
Programming (18 Marks)
10 a. Define global and local variables.
Ans: Variables which are declared outside the procedure and can be accessed from any procedure or module are called global variables. Variables which are declared inside the procedure and  its value is protected from outside interference and has no effect on the variables outside the procedures are called local variables
b. Write any two characteristics of ‘C’ Language.
Ans: The two characteristics of ‘C’ language are:
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
.  
c. Write the function of the following command / statements:
i) INPUIT#: It reads data from the sequential data file.
ii) EOF ( ): It detects the end of the file marker reading the data from an open sequential file.

11. Write the output of the following program:
DECLARE FUNCTION SQD(N)
CLS
S = 0
FOR L = 1 TO 3
    READ NUM
    S = S + SQD(NUM)
NEXT L
PRINT "Sum"; S
DATA 2,4,6
END
FUNCTION SQD (N)
SQD = N ^ 2
END FUNCTION


OUTPUT
Sum 56
13. Study the following program and answer the given questions:
DECLARE SUB TRIM(W$)
CLS
INPUT "Enter word"; WO$
CALL TRIM(WO$)
END
SUB TRIM (W$)
FOR I = 1 TO LEN(W$)
    PRINT LEFT$(W$, I)
NEXT I
END SUB

a)    What will be the maximum value of I if input string is “SEE” in the above program?
Ans: The maximum value of I will be 1 to 3 if input string is “SEE” in the above program.
b)    List the real parameter used in the above program.
Ans: The real parameter used in the above program is WO$.
14a. Write a program to calculate and return total surface area of a box  using FUNCTION – END FUNCTION. [Hint: A = 2(lb+lh+bh)
DECLARE FUNCTION TSAREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
PRINT “TOTAL SURFACE AREA OF BOX”; TSAREA(L, B, H)
END

FUNCTION TSAREA (L, B, H)
TSAREA = 2 * (L * B + B * H + H * L)
END FUNCTION

   

b. Write a program using a SUB procedure module to print the multiplication table of any input number up to 10th term.
DECLARE SUB MUL (N)
CLS
INPUT "ENTER ANY NUMBER"; N
CALL MUL (N)
END
SUB MUL (N)
FOR I = 1 TO 10
PRINT N; "X"; I; "="; N * I
NEXT I
END SUB

c. Write a program to create a sequential data file “salary.data” to store programmer’s Name, salary and post according to the need of the user.
OPEN “SALARY.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter salary”; S
INPUT “Enter Post”; P$
WRITE #1, N$, S, P$
INPUT “Do you want to continue(Y/N)”; CH$
LOOP WHILE UCASE$(CH$)=”Y”
CLOSE #1
END


***