JOINT SCHOOL SEE PREPARATION EXAMINATION-2081
Group- "A" (10 marks)
1.
Answer the following questions in one sentence:
a. What is mobile computing?
Mobile computing is the technology used
for transmitting voice and data through small, portable devices using wireless
enabled networks.
b. Define parameters in modular
programming.
Parameters in modular programming refers
to numbers and strings that we pass to a subroutine which accept constants or
variables passed them from calling module.
c. What is the value of 'y' in C
language when y = 9 % 2?
The value of y in C language is 1.
d. Why is a table called primary object
of MS Access?
A table is called primary object of MS
Access because it is the fundamental building block of database where all the
raw data are stored and organized into rows and columns.
e. Define digital signature.
Digital signature is a digital code
which is attached with email to verify its contents and the sender's identity.
f. Which data type has least storage
size in MS Access?
Data type has least storage size in MS
Access is Yes/No data type with 1 bit storage capacity.
2.
Write appropriate technical terms for the following:
a. Physical layout of LAN. Network Topology
b. The data handling capacity of
communication channel. Bandwidth
3. Write the full forms of the
following:
a. DNS: Domain Name System
b. OTP: One Time Password
Group-"B"
4.
Answer the following questions:
Artificial Intelligence refers to any
human like intelligence exhibited by a computer, robot or other machine which
helps in developing software that can learn and work like human brain. Two
application areas of Al are speech recognition and autopilot technology.
Electronic governance is the process of
providing governmental services that are accessible through Internet to carry
out different governmental activities. One advantage of it is to ensure the
coverage and quality of services provided to the general public through the use
of ICT in easy, economical and effective manner.
Passive digital footprint is a trace
that we leave behind without intending to or in some cases, without knowing it
like websites that we use geolocation to pin point our location.
Database management system is a software
package designed to store and manages databases. The four type of database
management system are as follows:
·
Relational
database management system
·
Object
oriented database management system
·
Distributed
database management system
·
Hierarchical
database management system
Mesh topology is one of
the types of it where every node has a dedicated point to point link to every
other node in a network. This means each link carries traffic only between the
two nodes it connects. If n is the total number of nodes in a network, Number of links to connect these
nodes in mesh N(N-1)/2
Data sorting is the
process of arranging data on the database in some special logical order. We can
sort the records in MS Access either with ascending or descending order for
text data type and smallest to largest or largest to smallest for numeric data
type. The sort command is used to solve data arrangement problem which can be
performed on single or multiple fields.
Firewall is a network
security device that monitors incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security
rules. A firewall can be hardware, software or both. Its importance in cyber
security is to control network traffic based systems, stops virus attacks and
spyware. Firewall promotes privacy which is trustworthy and safeguards our
network on the device. We can also use several types of firewall techniques
like packet filtering, proxy in cyber security to prevent potentially harmful
information.
Query is a set of
instructions that retrieves data from table in a database. Action query is one
of the types of query that makes changes to many records in just one operation.
The types of action query are delete query, update query, append query and make
table query.
Primary key is a
special relational database table column designated to uniquely identify all
records. It is a field or set of fields with values that are unique throughout
a table. Each table can have only one primary key. The two advantages of it are
as follows:
-Primary key prevents
data redundancy and ensure that fields are not null.
- It guarantees data
integrity and accuracy.
DECLARE
SUB SERIES()
CLS
Call
SERIES
END
SUB
SERIES()
X=5
Y=5
FOR
I=1 to 10
PRINT X:
X=X+Y
Y-Y+5
NEXT I
END SUB
|
X |
Y |
I |
OUTPUT |
|
5 |
5 |
1 |
5 10 20
35 55
80 110 145
185 230 |
|
10 |
10 |
2 |
|
|
20 |
15 |
3 |
|
|
35 |
20 |
4 |
|
|
55 |
25 |
5 |
|
|
80 |
30 |
6 |
|
|
110 |
35 |
7 |
|
|
145 |
40 |
8 |
|
|
185 |
45 |
9 |
|
|
230 |
50 |
10 |
|
OUTPUT: 5 10 20 35 55 80
110 145 185
230
6.
Re-write the given program after correcting bugs.
REM
to store data in a sequential data file.
DO
OPEN
"Address.txt" FOR INPUT AS #1
CLS
INPUT
"Enter Name"; N$
INPUT
"Enter Address"; A$
INPUT
"Enter Age"; A
INPUT
"Enter Phone number"; P
WRITE
NS, AS, A, P
INPUT
"Do you want some more records"; Ans$
LOOP
WHILE UCASE(Ans$)= "Y"
CLOSE
#2
END
Program after
correcting bugs.
OPEN
"Address.txt" FOR OUTPUT
AS #1
CLS
DO
INPUT
"Enter Name"; N$
INPUT
"Enter Address"; A$
INPUT
"Enter Age"; A
INPUT
"Enter Phone number"; P
WRITE
NS, AS, A, P
INPUT
"Do you want some more records"; Ans$
LOOP
WHILE UCASE$(Ans$)=
"Y"
CLOSE #1
END
7. Study the following program and answer the following questions. (2)
DECLARE
FUNCTION COUNT (A$)
CLS
INPUT
"Enter a word"; A$
END
FUNCTION
COUNT (A$)
FOR
I = 1 TO LEN(A$)
C$=UCASE$(A$)
ES=MID$(C$,
I, 1)
IF
E$ = "A" OR E$ = "E" OR E$ = "I" OR E$ =
"O" OR ES = "U" THEN
C=C+1
END
IF
NEXT
I
COUNT=C
END
FUNCTION
a.
List the library functions used in the above program.
The
library functions used in the above program are UCASE$,LEN,MID$.
b.
Write down the missing statement in the main module to execute the program.
Print
“total numbers of vowel are”; Count(A$)
GROUP-"C"
(16 marks)
8.
Convert/Calculate as per the instructions:
a.
(532)10 =()8
b.
(5EAF)16 =(?)2
с.
(100111)2 /(101)2
d.
(1111)2 * (101)2 -(1011)2
9.
WAP in QBASIC to create user defined function procedure to display area of
sphere and sub procedure to display volume of sphere where user input the required
data in the main module.. ( A = 4pi * r ^ 2 , V = 4/3 * pi * r ^ 3 )(4)
DECLARE FUNCTION AREA(R)
DECLARE SUB VOL(R)
CLS
INPUT "Enter
radius"; R
PRINT "Area of
sphere is"; AREA(R)
CALL VOL(R)
END
FUNCTION AREA(R)
AREA =4*3.14*R*R
END FUNCTION
SUB VOL(R)
V=4/3*3.14*R^3
PRINT "Volume of
sphere is"; V
END SUB
10.
A sequential data file "Student.dat" has stored data under the field
headings: student id, student's name, address and age of some students. Write a
program to copy all the records of those students whose age is greater than 15
to another file named as "Record.dat". (4)
OPEN
"Student.dat" FOR INPUT AS #1
OPEN
"Record.dat" FOR OUTPUT AS #2
DO WHILE NOT EOF (1)
INPUT #1, ID, NS, AS, A
IF A >15 THEN
WRITE #2, ID, NS, AS, A
LOOP
CLOSE #1
CLOSE#2
END
11.
Write a program in C language to input a multi-digit number and calculate the sum
of its individual digits.
#include<stdio.h>
int main()
{
int n, sum = 0, г;
printf("Enter any
number";);
scanf("%d",
&n);
while (n>0)
{
r=n%10;
sum = sum + r;
n=n/10;
}
printf("sum of
multi digits:%d", sum);
return 0;
}
OR
Write
a program in C language to print the given series with their sum:
1,2,3.4...
up to 10 th term.
#include<stdio.h>
int main()
{
int i, sum=0;
for (i=1; i<= 10;
i++)
{
sum += i;
}
printf("sum of
natural numbers is %d", sum);
return 0;
}