Joint School SEE Preparation Examination 2080

  

Group A-10 Marks

1. Answer the following questions in one sentence: [6*1=6]

a. Define network protocol.

A protocol is a set of rules by which computers on the network communicate.

 

b. Define digital footprint.

Digital footprint  is the data traces of online activities of a digital person.

 

c. Which is the default dub type of number data type of MS-Access?

Long integer is the default sub-type of number data type of MS-Access.

 

d. Define data validation rule.

Data validation rule is an expression limits the value to be entered in the MS-Access table.

 

e. Write the function of Kill and Name ….AS statements in QBASIC.

Kill erases any unwanted file and Name. As renames any file in QBASIC. 

 

f. Name the header/library file that handles mathematical functions in C-language

<math.h> is the header/library file that handles mathematical functions.

 

 

2. Write appropriate technical term for the following: [1*1=2]

a. The data handling capacity of a communication channel. Bandwidth

b. Law that governs the legal issues of cyberspace. cyber Law/ Computer law

 

3. Write the full forms of the following: [2*1=2]

a. VSAT: Very Small Aperture Terminal

b. SMTP: Simple Mail Transfer Protocol

Group ‘B’-24 Marks

4. Answer the following questions: [9*2=18]

a. What is a computer network? Write any two advantages of it.

Computer network may be defined as interconnection between two or more than two distributed intelligent computers with cable or without cable that may cover limited area or entire world to share their hardware and software resources. On the basis of area there are three types of computer network. They are

 i. LAN (Local Area Network)

ii. MAN (Metropolitan Area Network)

iii. WAN (Wide Area Network)

 Two advantages are:

i. To share data, information and programs.

ii To share computer hardware

  b. What is web browser? List any two web browsers.

A web browser is a program that runs on the client computer and displays information of the web pages of web sites on the client computer. Google chrome and Microsoft Edge are the two examples of web browsers.

 c. What is cybercrime? List any four cybercrimes.

Cybercrime is criminal activity that either targets or uses a computer, a computer network or a networked device.

Any four cybercrimes are: Hacking, cyber bullying, software piracy and identity theft etc.

 d. What is a computer virus? List any four symptoms of computer viruses.

Computer virus is the general term used to describe any group of willfully destructive computer program written by a computer programmer using mostly assembly language. It is the intellectual creation of a programmer. It is a small, hidden and parasitic computer program able to self- replicate, self-execute, destructive by nature, destroy the software and damage the hardware equipment.

  Four symptoms are:

Problems unexpectedly shutting down or restarting

-Missing files.

-Frequent system crashes.

-Frequent error messages.


 e. What is E-commerce? List any two advantages and disadvantages of it.

E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network, primarily the internet.

 Advantages are:

i. E-commerce provides the sellers with a global reach.

ii. It provides quick delivery of goods with very little effort on part of the customer.

 Disadvantages are:

i. The risk of fraud in M-commerce is very high.

ii. Poor connectivity problems may occurred.

 

f. Define DBMS. List any two examples.

DBMS stands for Database Management System. It is a software mechanism that enables a user to store, modify, update, organize database and retrieve information from the databases. FoxPro, MySQL etc.

 g. Differentiate between Select query and Action query.

Select Query

Action Query

 

Select query is simply used to select and display the relevant data from the database.

An action query is a query that makes changes to or removes many records in just one operation.

It does not make change to database.

It makes change to database.

A query does not save data; rather, it displays information from tables.

Action query allows previewing the query results before performing it, which is a nice feature

A select query is a database item that presents information in Datasheet view.

Multiple records can be added, updated, or deleted simultaneously using action queries.

 

h. List any four data types of MS-Access? Write the suitable data type to store images.

Four data types of MS-Access are:

Long text

Short Text

Currency

AutoNumber (any others)

The suitable data type to store images is OLE object

 i. Define Report object of MS-ACCESS

Report is a database object of MS-Access that enables a user to prepare the formatted document which is ready to print in the user desired format. It is simply a print preview. This is the only one object of MS-Access that does not allow a user to enter the new records and modify the existing records but it allows to change the appearances, attributes and alignments. A report can be created on the basis of table select query.

  5. Predict the output of the given program showing necessary dry run.[2]

DECLARE SUB pat(N$)

CLS

P$=”EDUCATION”

CALL pat(P$)

END

SUB pat(N$)

C=LEN(N$)

B=1

FOR K=C TO 1 STEP -2

PRINT TAB(B); MID$(N$,B,K)

B=B+1

NEXT K

END SUB

 

Dryrun table

P$/N$

C

B

K

Output

EDUCATION

9

1

9

 EDUCATION

 

 

2

7

    DUCATIO

 

 

3

5

       UCATI

 

 

4

3

          CAT

 

 

5

1

             A

 

 6. Rewrite the given program after correcting the bugs: [2]

REM Program to make a word reverse

DECLARE FUNCTION rec$(W$)

CLS

INPUT “Enter a word”;N$

Reverse$=rev$(W$)

PRINT “The reversed word is..”; Reverse$

END FUNCTION

rev$(W$)

FOR M=LEN(W$) TO 1

B$=B$+MID$(W$,1,M)
NEXT M

B$=rev$

END FUNCTION

 

Program after correcting the bugs

DECLARE FUNCTION rec$(W$)

CLS

INPUT “Enter a word”;N$

Reverse$=rev$(N$)

PRINT “The reversed word is..”; Reverse$

END FUNCTION

rev$(W$)

FOR M=LEN(W$) TO 1 step-1

B$=B$+MID$(W$,M,1)
NEXT M

rev$=B$

END FUNCTION

 

7. Study the following program and answer the given questions

DECLARE FUNCTION xyz(N)

CLS

INPUT "Enter a number ";M

PRINT xyz(M)

END

 

FUNCTION xyz(N)

WHILE <>0

C= N MOD 10

R=R*10+C

N=INT(N/10)

WEND

xyz=R

END FUNCTION

 

(a)    Write the function of INT and MOD gives remainder.

INT removes decimal value and gives integer. MOD

(b)   List the formal and Actual/Real parameters used in the above program.

Formal parameter :W$ and Actual parameter: N$

 

Group "C"-16 marks

8. Convert / Calculate as per the instructions: 4*1=4

(i) (10A)16=(?)8 -------(412)8

(ii) (211)10=(?)2 ------------(11010011)2

(iii) Simplify: (1001+110)2-(1000)2---------------(111)2

(iv) (11101)2÷(100)2 -------------------Q:(111)2 R: (1)2

 

9. (a) Write a program in QBASIC that asks for radius and height. Create a user defined function to calculate volume of cylinder and SUB program to calculate volume of sphere. [Hint : cylider=πr2h, sphere=4/3πr3].

 

(b) A sequential data file called "staff.txt" has stored data under the field headings: Name, address , post and date of birth (MM-DD-YYYY). Write a program to display all the information of those employees who were born between the years 1970 AD to 2020 AD.

 Open "staff.txt" for input as #1

While not eof (1)

Input #1, n$,a$, p$, dob$

X$ = Right$(DOB$, 4)

d = val(X$)

If d>=1970 and d<=2020 then

Print n$,a$, p$, dob$

End if

Wend

close #1

End

10. Write C program to input three different numbers and display the greatest number. [4]

OR

Write C program that input a number and check whether the input number is prime or composite. [4]

 #include <stdio.h> 

int main() 

int n, c, p = 0; 

printf("Enter a number\n"); 

scanf("%d",&n); 

 for(c = 2; c <= n/2; c++)

 if( (n % c) == 0 )

p = 1; 

if(p == 0)

printf("%d is a prime number",n); 

}

else

printf("%d is a composite number",n); 

return 0; 


Popular posts from this blog

Computer