0% found this document useful (0 votes)
118 views

SEE Solution Computer Science 2075

This document contains information about a computer science exam including: 1. Questions about computer fundamentals, the internet, multimedia, passwords, and computer viruses. 2. Conversions between binary and decimal and binary calculations. 3. Matching networking terms to their definitions. 4. Multiple choice questions about computer networks and components. 5. Questions involving writing technical terms and acronyms.

Uploaded by

tedra
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views

SEE Solution Computer Science 2075

This document contains information about a computer science exam including: 1. Questions about computer fundamentals, the internet, multimedia, passwords, and computer viruses. 2. Conversions between binary and decimal and binary calculations. 3. Matching networking terms to their definitions. 4. Multiple choice questions about computer networks and components. 5. Questions involving writing technical terms and acronyms.

Uploaded by

tedra
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

SEE Solution Computer Science: 2075

Group A
Computer Fundamentals (22 Marks)

1. Answer the following questions:


a) Write any two features of Guided media.
Any two features of Guided media.
1. It accepts and transport signals in the form of electric current and light in case of the fiber optic
2. Data travel in the fixed path.

b) Write any four advantages of internet.


The advantages of the internet are:
i) It helps in communication through different social sites
ii) It helps in sharing the data and information.
iii) It is also used for entertainment purpose by playing games, watching movies, listening to songs,
etc.
iv) It helps in online reading and giving the online examination.

c) What is multimedia?
Multimedia is the integration of multiple forms of media like text, audio, video, animation, etc. which
presents information in a more interesting and understandable way

d) How password secure the data?


Password secures the data by not giving access to the unauthorized person. Only the person who
knows the system password can access the system which helps to secure the data.

e) Write any two preventive measures to protect the computer from a computer virus?
Two preventive measures to protect a computer from computer virus are:
i) Scan the unknown email or files from the secondary storage before opening in your computers.
ii) Use antivirus program to the storage device before opening it.

2. a) Perform the conversion as per the direction:


i) (217)10 into Binary ii) (39C)16 into Decimal
b) Perform the binary Calculation:
i) 1011 × 11 ii) 110111 – 11001

3. Match the following:


Group A Group B
a) HUB i) Network connecting device
b) TCP/IP ii) Protocol
c) UTP iii) Communication media
d) NOS iv) Windows NT

4. Choose the best answer of the following:


a) The physical structure of a computer network.
i) protocol ii) Topology iii) MAN iv) cabling
b) Which is not an internet service?
i) E-commerce ii) NIC iii) WWW iv) E-Mail
c) Which is not a computer virus?
i) Kaspersky ii) message carrying virus
iii) Boot sector virus iv) program virus
d) A topology where all the computers are connected to a central connecting device, HUB or switch.
i) BUS ii) STAR iii) TREE iv) RING

5. Write the appropriate technical terms of the following:


a) A powerful computer which controls and co-ordinates all computers connected in a network.
Server
b) The volume of bits that can be transferred per second through the communication media.
Bandwidth
c) Making a duplicate copy of file or data.
Backup
d) Illegal activities committed through the use of computers and the Internet.
Cyber Crime

6. Write the full form:


i) STP – Shielded Twisted Pair
ii) PDF – Portable Document Format
iii) NIC – Network Interface Card
iv) IRC – Internet Relay Chat

Group B
Database (10 Marks)

7 a. Write any two advantages of Database Management System.


Any two advantages of Database Management System are
i) It controls data redundancy.
ii) It allows sharing the existing database.

b. What is Primary key?


Primary key is a field that uniquely identifies the record. It is needed because it neither accepts
duplicate values nor permits null values.

c. Write any two functions of form.


Any two functions of a form are
i) It allows the user in interacting the page by filling the data.
ii) It shows only the information we want to see.

8 State whether the following statements are true or false.


a) The size of the currency data type is 10 Bytes. True
b) Indexing is the process of arranging the records in ascending or descending order. False
c) Validation rule will limit data entry. True
d) Select Query is used to retrieve and display records from the selected table.True

9. Match the following:


Group A Group B
a) Yes/No i) 1 Bit
b) Long Integer ii) 4 Bytes
c) OLE iii) Picture
d) Report iv) MS Access Object

Group C
Programming (18 Marks)
10 a. Define logical operators.
Ans: Logical operators are symbols, which are used to compare the two or more than two conditions
and give the result either in Yes or No form.

b. Write any two advantages of structure programming.


Ans: The two advantages of structured programming are:
a) It is easy to design code and debug the program modules independently.
b) It is possible to use a single module in different places which reduces program codes.

c. Write the function of the following command / statements:


i) FILES:
The FILES statement displays the files of the current sub directory or specified sub directory.
ii) WRITE:
It sends one or more data items to the specified file.

11. Re-Write the given program after correcting the bugs:


DECLARE FUNCTION reverse$(N$)
INPUT “Any String”; N$
X$ = reverse$(N$)
PRINT N$
END
FUNCTION reverse(N$)
L = LEN$(N$)
FOR X = L to 1 STEP – 1
A$ = MID$(N$, X, I)
B$ = B$ + A$
NEXT X
B$ = reverse$(N$)
END FUNCTION

Debugged Program
DECLARE FUNCTION reverse$(N$)
INPUT “Any String”; N$
X$ = reverse$(N$)
PRINT X$
END
FUNCTION reverse$(N$)
L = LEN(N$)
FOR X = L to 1 STEP – 1
A$ = MID$(N$, X, 1)
B$ = B$ + A$
NEXT X
reverse$ = B$
END FUNCTION

12. Write the output of the following program:


DECLARE SUB series ()
CALL series
END
SUB series
X=1
FOR K = 1 TO 4
PRINT X;
X=X+K
NEXT K
END SUB

OUTPUT
1 2 4 7

13. Study the following program and answer the given questions:
DECLARE SUB SUM (N)
N=5
CALL SUM (N)
END
SUB SUM (N)
FOR X = 1 TO N
S =S + X
NEXT X
PRINT S
END SUB

a) In the above program, how many times does the FOR ………..NEXT loop executes?
Ans: The FOR ………..NEXT loop will execute 5 times.
b) Write the name of the procedure used in the above program.
Ans: The name of the procedure used in the above program is SUB SUM.

14 a. Write a program to calculate the average of three numbers using FUNCTION procedure.
DECLARE FUNCTION AVERAGE (X, Y, Z)
CLS
INPUT “ENTER FIRST NUMBER”; X
INPUT “ENTER SECOND NUMBER”; Y
INPUT “ENTER THIRD NUMBER”; Z
AVG = AVERAGE (X, Y, Z)
PRINT “AVERAGE OF TWO NUMBERS”; AVG
END
FUNCTION AVERAGE (X, Y, Z)
AV = (X + Y + Z) / 3
AVG = AV
END FUNCTION

b. Write a program to print the total number of vowel alphabets present in the given word using SUB
procedure.
DECLARE SUB VT (W$)
CLS
INPUT "ENTER ANY STRING"; W$
CALL VT (W$)
END
SUB VT (W$)
VC = 0
FOR I = 1 TO LEN (W$)
B$ = MID$(W$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
PRINT "TOTAL NO. OF VOWELS= "; VC
END SUB

c. A data file “STAFF.dat” has stored records of few employees with EMPID, First name, last name,
post and salary. Write a program to display all the records of the employees whose salary is more than
40,000.
OPEN “STAFF.dat” FOR INPUT AS #1
CLS
WHILE NOT EOF (1)
INPUT #1, A, F$, L$, P$, S
IF S > 40000 THEN PRINT A, F$, L$, P$, S
WEND
CLOSE #1
END

You might also like