Joint School SEE Preparation Examination 2080
Group A-10 Marks
1. Answer the following questions in one sentence: [6*1=6]
a. Define network protocol.
A
protocol is a set of rules by which computers on the network communicate.
b. Define digital footprint.
Digital
footprint
is the data traces of online activities of a digital person.
c. Which is the default dub type of number data type of
MS-Access?
Long
integer is the default sub-type of number data type of MS-Access.
d. Define data validation rule.
Data
validation rule is an expression limits the
value to be entered in the MS-Access table.
e. Write the function of Kill and Name ….AS statements in
QBASIC.
Kill
erases any unwanted file and Name. As renames any file in QBASIC.
f. Name the header/library file that handles mathematical
functions in C-language
<math.h>
is the header/library file that handles mathematical functions.
2. Write appropriate technical term for the following: [1*1=2]
a. The
data handling capacity of a communication channel. Bandwidth
b. Law that governs
the legal issues of cyberspace. cyber Law/ Computer law
3. Write the full forms of the following: [2*1=2]
a. VSAT: Very Small
Aperture Terminal
b. SMTP: Simple Mail
Transfer Protocol
Group ‘B’-24 Marks
4. Answer the following questions: [9*2=18]
a. What is a computer network? Write any two advantages of it.
Computer network may be
defined as interconnection between two or more than two distributed intelligent computers
with cable or without cable that may cover limited area or entire world to
share their hardware and software resources. On the basis of area there are
three types of computer network. They are
ii. MAN (Metropolitan
Area Network)
iii. WAN (Wide Area
Network)
i. To share data,
information and programs.
ii To share computer
hardware
A web
browser is a program that runs on the client computer and displays information
of the web pages of web sites on the client computer. Google chrome and
Microsoft Edge are the two examples of web browsers.
Cybercrime
is criminal activity that either targets or uses a computer, a computer network
or a networked device.
Any
four cybercrimes are: Hacking, cyber bullying,
software piracy and identity theft etc.
Computer virus is the
general term used to describe any group of willfully destructive computer
program written by a computer programmer using mostly assembly language. It is
the intellectual creation of a programmer. It is a small, hidden and parasitic
computer program able to self- replicate, self-execute, destructive by nature,
destroy the software and damage the hardware equipment.
Problems unexpectedly
shutting down or restarting
-Missing files.
-Frequent system
crashes.
-Frequent error
messages.
E-commerce (electronic
commerce) is the buying and selling of goods and services, or the transmitting
of funds or data, over an electronic network, primarily the internet.
i. E-commerce provides
the sellers with a global reach.
ii. It provides quick
delivery of goods with very little effort on part of the customer.
i. The risk of fraud in
M-commerce is very high.
ii. Poor connectivity
problems may occurred.
f. Define DBMS. List any two examples.
DBMS stands for Database
Management System. It is a software mechanism that enables a user to store,
modify, update, organize database and retrieve information from the databases.
FoxPro, MySQL etc.
Select Query |
Action Query |
Select query is simply
used to select and display the relevant data from the database. |
An action query is a
query that makes changes to or removes many records in just one operation. |
It does not make
change to database. |
It makes change to
database. |
A query does not save
data; rather, it displays information from tables. |
Action query allows
previewing the query results before performing it, which is a nice feature |
A select query is a
database item that presents information in Datasheet view. |
Multiple records can
be added, updated, or deleted simultaneously using action queries. |
h. List any four data types of MS-Access? Write the suitable
data type to store images.
Four data types of
MS-Access are:
Long text
Short Text
Currency
AutoNumber (any others)
The
suitable data type to store images is OLE object
Report is
a database object of MS-Access that enables a user to prepare the formatted
document which is ready to print in the user desired format. It is simply a
print preview. This is the only one object of MS-Access that does not allow a
user to enter the new records and modify the existing records but it allows to
change the appearances, attributes and alignments. A report can be created on
the basis of table select query.
DECLARE SUB pat(N$)
CLS
P$=”EDUCATION”
CALL pat(P$)
END
SUB pat(N$)
C=LEN(N$)
B=1
FOR K=C TO 1 STEP -2
PRINT TAB(B); MID$(N$,B,K)
B=B+1
NEXT K
END SUB
Dryrun table
P$/N$ |
C |
B |
K |
Output |
EDUCATION |
9 |
1 |
9 |
EDUCATION |
|
|
2 |
7 |
DUCATIO |
|
|
3 |
5 |
UCATI |
|
|
4 |
3 |
CAT |
|
|
5 |
1 |
A |
REM Program to make a word reverse
DECLARE FUNCTION rec$(W$)
CLS
INPUT “Enter a word”;N$
Reverse$=rev$(W$)
PRINT “The reversed word is..”; Reverse$
END FUNCTION
rev$(W$)
FOR M=LEN(W$) TO 1
B$=B$+MID$(W$,1,M)
NEXT M
B$=rev$
END FUNCTION
Program after correcting the bugs
DECLARE FUNCTION rec$(W$)
CLS
INPUT “Enter a word”;N$
Reverse$=rev$(N$)
PRINT “The reversed word is..”; Reverse$
END FUNCTION
rev$(W$)
FOR M=LEN(W$) TO 1 step-1
B$=B$+MID$(W$,M,1)
NEXT M
rev$=B$
END FUNCTION
7. Study the following program and answer the given questions
DECLARE FUNCTION xyz(N)
CLS
INPUT "Enter a number ";M
PRINT xyz(M)
END
FUNCTION xyz(N)
WHILE <>0
C= N MOD 10
R=R*10+C
N=INT(N/10)
WEND
xyz=R
END FUNCTION
(a) Write the function of INT and MOD gives
remainder.
INT removes decimal
value and gives integer. MOD
(b) List the formal and Actual/Real parameters
used in the above program.
Formal parameter :W$ and Actual parameter: N$
Group "C"-16 marks
8. Convert / Calculate as per the instructions: 4*1=4
(i) (10A)16=(?)8 -------(412)8
(ii) (211)10=(?)2 ------------(11010011)2
(iii) Simplify: (1001+110)2-(1000)2---------------(111)2
(iv) (11101)2÷(100)2 -------------------Q:(111)2
R: (1)2
9. (a) Write a program in QBASIC that asks for radius and
height. Create a user defined function to calculate volume of cylinder and SUB
program to calculate volume of sphere. [Hint : cylider=πr2h,
sphere=4/3πr3].
(b) A sequential data file called "staff.txt" has
stored data under the field headings: Name, address , post and date of birth
(MM-DD-YYYY). Write a program to display all the information of those employees
who were born between the years 1970 AD to 2020 AD.
While not eof (1)
Input #1, n$,a$, p$, dob$
X$ = Right$(DOB$, 4)
d = val(X$)
If d>=1970 and d<=2020 then
Print
End if
Wend
close #1
End
10. Write C program to input three different numbers and display
the greatest number. [4]
OR
Write C program that input a number and check whether the input
number is prime or composite. [4]
int main()
{
int n, c, p = 0;
printf("Enter a number\n");
scanf("%d",&n);
for(c = 2; c <= n/2; c++)
{
if( (n % c) == 0 )
{
p = 1;
}
}
if(p == 0)
{
printf("%d is a prime number",n);
}
else
{
printf("%d is a composite number",n);
}
return 0;
}