Wednesday, April 10, 2019

SEE 2075 (2019) [State 2] Computer Science Solved


SEE 2075 (2019) [State 2]
Computer Science Solved
Group A
Computer Fundamentals (22 Marks)
1. Answer the following questions:
a) Write any two advantage and disadvantage of computer network.
Advantages of  Computer Network
a)    Computer in a network can access the network-connected hardware devices like printers, disk drives, etc.
b)    Data in a network environment can be updated from any computer. Updated data can be accessed by all computers on the network.
Disadvantages of  Computer Network
a)    The sharing of information may leak the privacy of other clients.
If any computer system in a network gets affected by computer virus, there is a big chance of spreading computer viruses on other computers on the network.
b) Define E-mail.
E-mail (Electronic mail) is one of the most popular services provided by the internet which sends and receives mail through the internet. 
c) What is cyber law?
The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.
d) What is computer security? List any two ways of software security.
The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
Any two software security measures are:
i) Backup
ii) Scandisk
d) How password secure the data?
Password secures the data by giving access to the authorized person only.
e) Write any two ways in which computer virus gets transmitted.
Any two ways in which computer virus gets transmitted
i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
2. a) Perform the conversion  as per the direction:
i) (FA)16 into binary
Soln:
Converting hexadecimal to binary
F = 1111
A = 1010

(FA)16 = (11111010)2


ii) (420)10 into octal
Soln:
Converting decimal to octal
8
420
Rem
8
52
4
8
6
4

0
6

(420)10 =(644)8

b) Perform the binary calculation:
i) 111×10
Soln:

1
1
1


×
1
0


0
0
0

1
1
1
x

1
1
1
0


111×10 = 1110
ii) 1101 ÷ 101
Soln:
101)
 1101(
10

-101


     11


    -  0


     11


Q=10
R=11
3. Match the following:
Group A                          Group B
a)    Back up                 i) online shopping
b)    Microphone           ii) duplicate
c)    Web browser         iii) damage of corrupt data
d)    E-Commerce          iv) multimedia
                                        v) display of web pages
Answers
Group A                          Group B
a)    Back up                 i) duplicate
b)    Microphone           ii) multimedia
c)    Web browser         iii) display of web pages
d)    E-Commerce          iv) online shopping
                                         
                                       
4. State whether the following statements are true or false:
a) Router provides power backup if there is power cut in the network system. False
b) Boot sector virus infects the program files. False
c) In BUS network topology, nodes are connected in a single wire. True
d) Sound card in one of the component of multimedia. True
         

5. Write the appropriate technical terms of the following:
a) The device which is used to connect two dissimilar network topology. Gateway
b) Committing crime using computer and internet. Cyber Crime
c) The process of sending file from user’s computer to web server. Upload
d) The integration of text, audio and animation. Multimedia
6. Write the full form:
i) ADSL – Asymmetric Digital Subscriber Line
ii) WAN – Wide Area Network
iii) HTTP  – Hyper Text Transfer Protocol
iv) ICT  – Information and Communication Technology
Group B
Database
7a. Differentiate between fields and records with an example.
Field
Record
i) A column in a table is called field, and it contains a specific piece of information within a record.
i) Record is a collection of multiple related fields in a row which gives complete information about a person or thing.
ii) E.g.: Name, Address, Telephone
ii)E.g.: Ram Chabahil 4468790
b. Define data type. Name any two data types used in MS-Access.
Data type is an attribute for a field that determines what type of data it can contain.
Ans: Any two  data types of MS-Access are:
i) Text
ii) Number
c. What is a query?
Query is an object of Ms-Access which extracts and arranges information from a table in a manner that is specified.

8.  Select the correct answer.
a) Record of the table is also known as …….
          i) Tuple       ii) Field        iii) Number            iv) All
b) ……accelerated the data and makes the search operation fast.
          i) Index       ii) sort          iii) Number            iv) Filter
c) MS-Access is a ……………software.
          i) Word Processing          ii) DBMS    iii) Spreadsheet      iv) Web
d) The default field size of “Auto Number” data type is ………
          i) Byte          ii) Integer     iii) Long Integer   iv) Double
9. Match the following:
Group A                          Group B
a)    Table                     i) Printed Format
b)    Primary Key           ii) Allows viewing, editing and inputting data
c)    Form                      iii) uniquely defined
d)    Report                    iv) stores data
v) Extracts selected record for view
Answers:
Group A                          Group B
a)    Table                     i) stores data
b)    Primary Key           ii) uniquely defined
c)    Form                      iii) Allows viewing, editing and inputting data
d)    Report                    iv) Printed Format


Group C
Programming (18 Marks)
10 a. Define global and local variables.
Ans: Variables which are declared outside the procedure and can be accessed from any procedure or module are called global variables. Variables which are declared inside the procedure and  its value is protected from outside interference and has no effect on the variables outside the procedures are called local variables
b. Write any two characteristics of ‘C’ Language.
Ans: The two characteristics of ‘C’ language are:
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
.  
c. Write the function of the following command / statements:
i) INPUIT#: It reads data from the sequential data file.
ii) EOF ( ): It detects the end of the file marker reading the data from an open sequential file.

11. Write the output of the following program:
DECLARE FUNCTION SQD(N)
CLS
S = 0
FOR L = 1 TO 3
    READ NUM
    S = S + SQD(NUM)
NEXT L
PRINT "Sum"; S
DATA 2,4,6
END
FUNCTION SQD (N)
SQD = N ^ 2
END FUNCTION


OUTPUT
Sum 56
13. Study the following program and answer the given questions:
DECLARE SUB TRIM(W$)
CLS
INPUT "Enter word"; WO$
CALL TRIM(WO$)
END
SUB TRIM (W$)
FOR I = 1 TO LEN(W$)
    PRINT LEFT$(W$, I)
NEXT I
END SUB

a)    What will be the maximum value of I if input string is “SEE” in the above program?
Ans: The maximum value of I will be 1 to 3 if input string is “SEE” in the above program.
b)    List the real parameter used in the above program.
Ans: The real parameter used in the above program is WO$.
14a. Write a program to calculate and return total surface area of a box  using FUNCTION – END FUNCTION. [Hint: A = 2(lb+lh+bh)
DECLARE FUNCTION TSAREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
PRINT “TOTAL SURFACE AREA OF BOX”; TSAREA(L, B, H)
END

FUNCTION TSAREA (L, B, H)
TSAREA = 2 * (L * B + B * H + H * L)
END FUNCTION

   

b. Write a program using a SUB procedure module to print the multiplication table of any input number up to 10th term.
DECLARE SUB MUL (N)
CLS
INPUT "ENTER ANY NUMBER"; N
CALL MUL (N)
END
SUB MUL (N)
FOR I = 1 TO 10
PRINT N; "X"; I; "="; N * I
NEXT I
END SUB

c. Write a program to create a sequential data file “salary.data” to store programmer’s Name, salary and post according to the need of the user.
OPEN “SALARY.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter salary”; S
INPUT “Enter Post”; P$
WRITE #1, N$, S, P$
INPUT “Do you want to continue(Y/N)”; CH$
LOOP WHILE UCASE$(CH$)=”Y”
CLOSE #1
END


***

Monday, April 1, 2019

SEE 2075 (2019) Computer Science Solved



SEE 2075 (2019)
Computer Science Solved
Group A
Computer Fundamentals (22 Marks)
1. Answer the following questions:
a) Write any two features of Guided media.
Any two features of Guided media.
Twisted-pair and coaxial cable use metallic (copper) conductors that accept and transport signals in the form of electric current.
Optical fibre is a cable that accepts and transports signals in the form of light.
b) Write any four advantages of internet.
The advantages of internet are:
a)    The internet provides the ability of emails. Free mail service to anyone in the country. 
b)    Things such as Yahoo Answers and other sites where kids can have readily available help for homework. 
c)    Message boards where people can discuss ideas on any topic. Ability to get wide range of opinions. People can find others that have a similar interest in whatever they are interested in. 
d)    News, of all kinds is available almost instantaneously. Commentary, on that news, from every conceivable viewpoint is also available. 
c) What is multimedia?
Multimedia is the integration of multiple forms of media, which presents information in more interesting and understandable way.
d) How password secure the data?
Password secures the data by giving access to the authorized person only.
e) Write any two preventive measures to protect  computer from computer virus?
Any two preventive measures to protect  computer from computer virus
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.

2.







 
  
3. Match the following:
Group A                          Group B
a)    HUB                      i) communication media
b)    TCP/IP                             ii) Network connecting device
c)    UTP                       iii) Windows NT
d)    NOS                      iv) Protocol
                                        v) computer security
Answers
Group A                          Group B
a)    HUB                      i) Network connecting device
b)    TCP/IP                             ii) Protocol
c)    UTP                       iii) communication media
d)    NOS                      iv) Windows NT
                                       
4. Choose the best answer of the following:
a) The physical structure of computer network.
          i) protocol              ii) Topology          iii) MAN                iv) cabling
b) Which is not an internet service?
          i) E-commerce                 ii) NIC                   iii) WWW                        iv) E-Mail
c) Which is not a computer virus?
i) kaspersky                              ii) message carrying virus         
iii) Boot sector virus                  iv) program virus
d) Topology where all the computers are connected to a central connecting device, HUB or switch.
          i) BUS                   ii) STAR                iii) TREE               iv) RING

5. Write the appropriate technical terms of the following:
a) A powerful computer which controls and co-ordinates all computers connected in a network. Server
b) The volume of bits that can be transferred per second through the communication media. Bandwidth
c) Making duplicate copy of file or data. Backup
d) Illegal activities committed through the use of computers and Internet. Cyber Crime
6. Write the full form:
i) STP – Shielded Twisted Pair
ii) PDF – Portable Document Format
iii) NIC – Network Interface Card
iv) IRC – Internet Relay Chat

Group B
Database
7a. Write any two advantages of Database Management System.
Any two advantages of Database Management System are
i) It controls data redundancy which means duplication of data.
ii) It allows sharing the existing database by different programs.
b. What is Primary key?
Primary key is a field that uniquely identifies the record.  It is needed because it neither accepts duplicate values nor  permit null values.
c. Write any two functions of form.
Any two functions of form are
i) It allows to design the layout of field on screen in any arrangement.
ii) It shows only the information we want to see.

8 State whether the following statements are true or false.
a) The size of currency data type is 10 Bytes. False
b) Validation rule will limit data entry. True
c) Indexing is the process of arranging the records in ascending or descending order. False
d) Select Query is used to retrieve and display records from the selected table. True
9. Match the following:
Group A                          Group B
a)    Yes/No                  i) 4  Bytes
b)    Long Integer          ii) MS Access Object
c)    OLE                       iii) Picture
d)    Report                    iv) 1 Bit
v) 8 Bytes
Answers:
Group A                                    Group B
a)    Yes/No                            i) 1 Bit
b)    Long Integer                    ii) 4  Bytes
c)    OLE                                 iii) Picture
d)    Report                              iv) MS Access Object


Group C
Programming (18 Marks)
10 a.Define logical operators.
Ans: Logical operators are symbols, which are used to combine two or more logical or relational expressions and return a single ‘true’ or ‘false’ value.
b.Write any two advantages of structure programming.
Ans: The two advantages of structured programming are:
a)     It is easy to design code and test the program modules independently
b)     It is possible to use a single module in different in different places which reduces program codes.  
c. Write the function of the following command / statements:
i) FILES: The FILES statement displays the files of the current sub directory or specified sub directory.
ii) WRITE: It sends one or more data items to the specified file.

11. Re-Write the given program after correcting the bugs:
DECLARE FUNCTION reverse$(N$)
INPUT “Any String”; N$
X$ = reverse$(N$)
PRINT N$
END
FUNCTION reverse(N$)
L = LEN$(N$)
FOR X = L to 1 STEP – 1
A$ = MID$(N$, X, I)
B$ = B$ + A$
NEXT X
B$ = reverse$(N$)
END FUNCTION
Debugged Program
DECLARE FUNCTION reverse$(N$)
INPUT “Any String”; N$
X$ = reverse$(N$)
PRINT X$
END
FUNCTION reverse$(N$)
L = LEN(N$)
FOR X = L to 1 STEP – 1
A$ = MID$(N$, X, 1)
B$ = B$ + A$
NEXT X
reverse$ =  B$
END FUNCTION


12. Write the output of the following program:
DECLARE SUB series()
CALL series
END

SUB series
X = 1
FOR K = 1 TO 4
    PRINT X;
    X = X + K
NEXT K
END SUB

OUTPUT
1  2  4  7
13. Study the following program and answer the given questions:
DECLARE SUB SUM(N)
N = 5
CALL SUM (N)
END

SUB SUM(N)
FOR X = 1 TO N
S =S  + X
NEXT X
PRINT S
END SUB
a)    In the above program how many times does the FOR ………..NEXT loop executes?
Ans: The FOR ………..NEXT loop will execute 5 times.
b)    Write the name of the procedure used in the above program.
Ans: The name of the procedure used in the above program is SUM.
14a. Write a program to calculate the average of three numbers using FUNCTION procedure.
DECLARE FUNCTION AVERAGE (A, B, C)
CLS
INPUT “ENTER FIRST NUMBER”; A
INPUT “ENTER SECOND NUMBER”; B
INPUT “ENTER THIRD NUMBER”; C

AVGR = AVERAGE(A, B, C)
PRINT “AVERAGE OF TWO NUMBERS”; AVGR
END

FUNCTION AVERAGE (A, B, C)
AV = (A + B + C) / 3
AVERAGE = AV
END FUNCTION
   

b. Write a program to print the total number of vowel alphabets present in the given word using SUB procedure.
DECLARE SUB COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
CALL COUNT(S$)
END

SUB COUNT (S$)
VC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
PRINT "TOTAL NO. OF VOWELS= "; VC
END SUB

c. A data file “STAFF.dat” has stored records of few employees with EMPID, First name, Last name, post and salary. Write a program to display all the records of the employees whose salary is more than 40,000.
OPEN “SALARY.dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, A, B$, C$, D$, E
IF E > 40000 THEN PRINT A, B$, C$, D$, E
WEND
CLOSE #1
END


***