Computer Science | SEE 2071 (2015) Paper Solved

Computer Science | SEE 2071 (2015) Paper Solved

Group A (Fundamental)

Answer the following questions.

  1. Give two differences between peer-to-peer and client-server network architecture.
    Ans: Following are the differences between peer-to-peer and client-server network architecture.

    Peer-to-Peer Client-server
    It has no central server. There are separate dedicated servers and clients in the client/server network.
    Not good for a database application. It is good for a database application.
  2. What is the function of the File Transfer Protocol (FTP)?
    Ans: The function of the File Transfer Protocol (FTP) is given below:
    a) We can update (Delete, rename, move, copy) files at the server.
    b) It is the simplest way to exchange files between computers on the Internet, etc.
  3. What is a cybercrime? Give any two examples.
    Ans: Criminal activity committed on the internet is known as Cybercrime.
    Following are the examples of cybercrime:
    a) Child pornography.
    b) Harassment.
    c) Hacking, etc.
  4. Write any four preventive measures for computer hardware security.
    Ans: The four preventive measures for computer hardware security are:
    a) Using automatic warnings.
    b) Protect from theft and vandalizing.
    c) Regular maintenance of computer hardware.
    d) using a power protection device such as UPS, etc.
  5. Write any two medium for Transmission of a computer virus.
    Ans: Following are two medium for Transmission of a computer virus.
    a) Computer Network/Internet.
    b) Removable storage media like Pen drive, CD, DVD, etc.
READ MORE:  Chromosomes and sex determination | SEE Notes

Numerical Problems.

  1. Convert As instructed:
    i. (108)10 into binary
    Ans:

    2 108
    2 54 0
    2 27 0
    2 13 1
    2 6 1
    2 3 1
    2 1 1
    2 0 1     ↑

    (108)10= (1101100)2

    ii. (765)8 into decimal
    Octal no. = 7 6 5
    Positional weight= 2 1 0
    = 7×82+6×81+5×80
    = 448+48+5
    = 501
    (765)8=(501)10

  2. Perform the binary calculation:
    i. 111×11

        1 1 1
    ×1 1
         1 1 1
    1 1 1 ×
    1 0 1 0 1

    ∴111×11=10101

    ii. Divide 1101 by 11
    11)1101(100
    -11
    —————
    0 0 0 1
    ∴Quotient= 100
    Reminder= 1

Match the following.

  1. E-commerce → Online Shopping
  2. Volt guard → Power protection device
  3. Satellite link → WAN
  4. Soundcard → Multimedia

Choose the correct Answer:

  1. Which of the following is the remote login service?
    i. Video Conference
    ii. FTP
    iii. Telnet
    iv. TCP/IP
    Ans: iii. Telnet
  2. The process of arranging the scattered parts of a file onto a contiguous manner is ……………….
    i. Debugging
    ii.FTP
    iii. Defragmentation
    iv. Scandisk
    Ans: iii. Defragmentation.
  3. Which of the following is an audio input device?
    i. Printer
    ii.Microphone
    iii. Headphone
    iv. Speaker
    Ans: ii. Microphone
  4. A virus is a type of………….
    i. System program
    ii. Destructive program
    iii. Package program
    iv. Web program
    Ans: iii. Destructive program

Give appropriate technical term for the following.

  1. The data carrying capacity of the communication channel.
    Ans: Bandwith.
  2. The moral principle controls cybercrime.
    Ans: Cyberethics.
  3. Buying and selling product and services online.
    Ans: E-commerce.
  4. An Integration of text, audio, graphics, and video.
    Ans: Multimedia.

Write the full form of:

  1. LAN: Local Area Network.
  2. VOIP: Voice Over Internet Protocol.
  3. Gbps: Gigabits per second.
  4. DVD: Digital Versatile Disk.

Read:

Group B (Database)

Answer the following questions:

  1. Write any two advantages of a computerized database.
    Ans: Following are the advantages of a computerized database:
    a) Efficient data access.
    b) Provide concurrent access, etc.
  2. Name any four objects of Ms-Access.
    Ans: Following are the four objects of Ms-Access.
    a) Table
    b)Query
    c) Form
    d) A report, etc.
  3. What is data sorting?
    Ans: Data sorting is the process of arranging the records in ascending or descending order with respect to a given field or fields.

State whether the following statements are true or false.

  1. Graphics can also be stored in Ms-Access.
    Ans: True
  2. The maximum field size of the memo field is 256 characters.
    Ans: False
  3. A form is an object of Ms-Access used for entering data.
    Ans: True
  4. An action query makes changes in the table.
    Ans: True

Match the following:

  • Indexing → Searching fast
  • Report → Final output
  • Yes/No → Datatype
  • Select query → View data

Group C (Programming)

Answer the following questions:

  1. Mention types of the procedure used in Qbasic.
    Ans: There are two types of the procedure used in Qbasic:
    a) Sub-procedures
    b) Function procedures, etc.
  2. Write two characteristics of ‘C’ language.
    Ans: Following are the two characteristics of ‘C’ language:
    a) C is a case-sensitive language.
    b) It has a verity of data types to represents different types of data, etc.
  3. Write the function of the following statements.
    i. SHARED: This statement is used to make the variable global between main module and sub-module.
    ii. CALL: It is used to call sub-procedures.

Re-write the given program after correcting the bugs.

DECLARE SUB cub(n)
CLS
FOR I= 1 TO 5
READ
CALL cube(no)
NEXT x
DATA3,5,2,6,4
END
SUB cube ( )
DISPLAY n^3
END SUB

Ans:
DECLARE SUB cube (n)
CLS
FOR I= 1 TO 5
READ (no)
CALL cube (no)
NEXT i
DATA3,5,2,6,4
END
SUB cube ( )
PRINT n^3
END SUB

Write the output of the following program:

DECLARE FUNCTION avge (a,b,c)
X=10
Y=5
Z=15
Av=avge (x,y,z)
PRINT”Average of three numbers”; av
S=a+b+c
Avge=s/3
END FUNCTION

Ans: Output is:
Average of three numbers 10

Study the following program and answer the given questions:

DECLARE SUB stde(n$u)
FOR LOOP = 1 to 5
READ nm$(loop)
NEXT loop
DATA RAMA, PRATIMA, PRASHANT
DATA NISHA, RUDHRA
CALL stde(NM$u)
PRINT”Name starting from P”
FOR j=1 to 5
C$=MID$(n$,(j),1,1)
IF c$=”P” THEN
PRINT n$(j)
ENDIF
NEXT j
END SUB

  1. List the library function used in the above program.
    Ans: Library function: MID$
  2. List the conditional statement used in the above program.
    Ans: Conditional statement: IF c$=”P” THEN

Write the following programs:

a) WAP using FUNCTION…..ENDFUNCTION to input a string and count the total number of consonants.

Ans:
DECLARE FUNCTION cons(s$)
CLS
INPUT”Enter any string”;w$
PRINT”Total no consonants”;cons(s$)
END

FUNCTION cons(s$)
c$=UCASE$(w$)
FOR i= 1 To LEN(w$)
m$=MID$(w$,i,1)
IF m$<>”A” AND m$<>”E” AND m$<>”I” AND m$<>”O” AND m$<>”U” THEN c+c=1
NEXT i
CONS=c
END FUNCTION

b) WAP using SUB…..END SUB to find area of circle.

Ans:
DECLARE SUB area( )
CLS
CALL area
END

SUB area
INPUT”Enter a radius of circle”;r
a=(22/7*r^2
PRINT”Area of a circle”; a
END SUB

c) A data file “salary.dat” contains the information of employee regarding their name, post, and salary. WAP to display all the information of employee whose salary is greater than 15000 and less than 40000.

Ans:
OPEN “salary.dat” FOR INPUT AS #1
CLS
DO WHILE NOT EOF(1)
INPUT #1,n$, p$, s
IF s>15000 AND s<40000 THEN
PRINT “Name”; n$
PRINT”Post”; p$
PRINT”Salary”;s
ENDIF
LOOP
CLOSE #1
END

Related Articles

Back to top button