SLC 2071
1.
Answer the
following questions:
a. Give
two-two difference between peer-to-peer and client/server network architecture.
Ans: The
difference between peer-to-peer and client/server network architecture are as
follows:
Peer-to-peer network
|
Client/server network
|
A group of computers that
acts both as client and server in order to share hardware, software and other
resources on the network is known as peer-to-peer network.
|
The network architecture
which consist of at least one server and one or more client are known as
client/server network.
|
Resource sharing, processing
and communication control are centralized upon the server.
|
Resource sharing, processing
and communication control are completely decentralized.
|
b. What
is the function of file transfer protocol (FTP)?
Ans: The
functions of FTP are:
·
Enables to transfer
files between two or more than two computers.
·
Makes communication
possible between computers on the internet.
c. What
is cybercrime? Give any two examples.
Ans: Cybercrime
refers to any illegal act involved in computer, computer system or over all
computer networks like internet.
Any two examples of cybercrime
are:
·
Cyber stalking
·
Phishing
d. Write
any four preventive measures for computer hardware security.
Ans: Any four
preventive measures for computer hardware security are:
·
Regular maintenance
·
Insurance policy
·
Power protection
device
·
Protection from
theft
e. Write
any two medium for transmission of computer virus.
Ans: Any two
medium for transmission of computer virus are:
·
Sharing infected
internal portable disk like floppy disk, pen drive, CDs, etc.
·
Exchanging data and
information over a network.
2. a. Convert as indicated:
i. (108)10 into
binary
Ans:
ii. (765)8 into
decimal
Ans:
b. Perform the following binary
calculations:
i. 111*11
Ans:
ii. Divide
1101 by 11
Ans:
a. E-commerce Power
protection device
b. Volt
guard Online
shopping
c. Satellite
link WAN
d. Sound
card Optical
fiber
Multimedia
Ans:
a. E-commerce Online
shopping
b. Volt
guard Power protection
device
c. Satellite
link WAN
d. Sound
card Multimedia
4. Choose the best answer:
a. Which
of the following is remote login service?
i. Video
conferencing ii.
FTP iii.
Telnet iv. TCP/IP
Ans: Telnet
b. Process
of arranging the scattered parts of file into a contiguous manner is _______.
i.
debugging ii. Backup iii.Defragmentation iv.
Scandisk
Ans: Defragmentation
c. Which
of the following is an audio input device?
i.
Printer ii.
Microphone iii.
Head
phone iv.
Speaker
Ans: Microphone
d. Virus
is a type of ___________.
i. System
program ii.Package program iii.Destructive
program iv. Web program
Ans: destructive program
5. Technical terms:
a. The
data carrying capacity of communication channel.
Ans: Bandwidth
b. The
moral principles that control cybercrime.
Ans: Computer ethics
c. Buying
and selling product and services online.
Ans: E-commerce
d. An
integration of text, audio, graphics and video.
Ans: Multimedia
6. Write down the full forms:
a. LAN
: Local Area Network
b. VOIP
: Voice Over Internet Protocol
c. Gbps
: Giga bits per second
d. DVD
: Digital Versatile Disk
7. Answer the following question:
a. Write
any two advantages of computerized database.
Ans: The two advantages
of computerized database are:
·
It can store large
volume of data for longer period of time.
·
Searching of data
is easier as it stores data in ascending or descending order.
b. Name
any four objects of MS-Access database.
Ans: The four
object of MS-Access are:
·
Table
·
Form
·
Query
·
Report
c. What
is data sorting?
Ans: Data sorting
refers to grouping all the records either in ascending or descending order
based on a key field of a record.
8. State whether the following are
true or false:
a. Graphics
can also be stored in MS-Access database. True
b. Maximum
field size of memo field is 256 characters. False
c. A
form is an object of MS-Access used for entering data. True
d. An
action query makes changes in a table. True
9. Match the following:
a. Indexing
data Final
output
b. Report View
data
c. Yes/No Searching
fast
d. Select
query Picture
Data type
Ans:
a. Indexing
data Searching
fast
b. Report Final output
c. Yes/No Data
type
d. Select
query View data
10. Answer the following:
a. Mention
the types of procedures used in QBasic.
Ans: The types of
procedure used in QBasic are:
·
Sub procedure
·
Function procedure
b. Write
two characteristics of C language.
Ans: The two
characteristics of C language are:
·
It has got rich and
powerful set of operators.
·
It is used to
prepare system software.
c. Write
down the function of:
i. SHARED
Ans: The function
of SHARED is to declare a variable globally.
ii. CALL
Ans: The function
of CALL statement is to call sub procedure for performing specific task.
11. Re-write the following correcting the bugs:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ
CALL CUBE(No)
NEXT X
DATA 3, 5, 2, 6, 4
END
SUB CUBE( )
DISPLAY N^3
END SUB
Ans:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ No
CALL CUBE(No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(N)
PRINT N^3
END SUB
12. Write down the output:
DECLARE FUNCTION AVGE(A,B,C)
X=10
Y=5
Z=15
AV= AVGE(X,Y,Z)
RPINT “Average of three
numbers”; AV
END
FUNCTION AVGE(A, B, C)
S=A+B+C
AVGE = S/3
END FUNCTION
Ans:
The output will be:
Average of three numbers 10
13. Study the following program and answer the following:
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END
SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB
a. List
the library function used in the above program.
Ans: The library
function used in the above program is MID$.
b. List
the conditional statement used in the above program.
Ans: The
conditional statement used in the above program is:
IF C$=”P” THEN
14. a. Write a program using FUNCTION….END FUNCTION to input a
string and count the total number of consonants.
Ans:
DECLARE FUNCTION COUNT(N$)
CLS
INPUT "Enter a
string"; N$
PRINT "The total numebr of
consonant is"; COUNT(N$)
END
FUNCTION COUNT (N$)
C = 0
FOR I = 1 TO LEN(N$)
B$ =
MID$(N$, I, 1)
C$ =
UCASE$(B$)
IF C$
<> "A" AND C$ <> "E" AND C$ <>
"I" AND C$ <> "O" AND C$ <> "U" THEN
C = C + 1
NEXT I
COUNT = C
END FUNCTION
b. Write a program using
SUB……END SUB to find the area of circle.
Ans:
DECLARE SUB AREA(R)
CLS
INPUT “Enter radius”; R
CONST PI=3.14
CALL AREA(R)
END
SUB AREA(A)
A=PI*R^2
PRINT “The area of circle=”; A
END SUB
c. A data file “Salary.Dat”
contains the information of employee regarding their name, post and salary.
Write a program to display all the information of employee whose salary is
greater than 15000 and less than 40000.
Ans:
OPEN “Salary.Dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, P$, S
IF S>15000 AND S<40000
THEN PRINT N$, P$, S
WEND
CLOSE #1
END
No comments:
Post a Comment