Group A [Fundamental – 22]
1.Answer the following questions.(5x2=10)
a.What are the different data transmission modes? Write any two differences between hub and switch.
b.What is computer network? Write any two advantages of it.
c.List any four differences between client server and peer to peer network model.
d.What is the internet? List any two advantages and disadvantages of the email.
e.Define computer virus. List any four destructive activities of computer viruses.
a.What are the different data transmission modes? Write any two differences between hub and switch.
b.What is computer network? Write any two advantages of it.
c.List any four differences between client server and peer to peer network model.
d.What is the internet? List any two advantages and disadvantages of the email.
e.Define computer virus. List any four destructive activities of computer viruses.
2)a. Convert the given number system as indicated.(2x1=2)
i. (654)8 =(?)10 ii. (10101110)2 = (?)16
b. Perform the binary calculations as indicated.(2x1=2)
i. 11111-1101+101 ii. 101111/110
i. (654)8 =(?)10 ii. (10101110)2 = (?)16
b. Perform the binary calculations as indicated.(2x1=2)
i. 11111-1101+101 ii. 101111/110
3.Select the correct answer from the given options.(4x0.5=2)
a.The internet is a good example of …………network.
i. client/server ii. Peer to peer iii. Both i & ii
iv. None of the above
b.Which is the transmission medium?
i. Satellite ii. Infrared iii. Radio wave iii. All of the above
c.…….is software program or hardware device designed to keep computers safe from hackers.
i. Antivirus ii. Firewall iii. malicious iv. multimedia
d.An example of a network navigation device is ….
i. Ring ii. Bus iii. Bridge iv. Road
i. client/server ii. Peer to peer iii. Both i & ii
iv. None of the above
b.Which is the transmission medium?
i. Satellite ii. Infrared iii. Radio wave iii. All of the above
c.…….is software program or hardware device designed to keep computers safe from hackers.
i. Antivirus ii. Firewall iii. malicious iv. multimedia
d.An example of a network navigation device is ….
i. Ring ii. Bus iii. Bridge iv. Road
4.Write the technical terms for the following. (4x0.5=2)
a.A device that connects all the nodes of a single network.
b.A protocol that is used for downloading emails from email server.
c.An unique address through which web pages of web site are accessed.
d.Messages sent/received electronically on computer network.
a.A device that connects all the nodes of a single network.
b.A protocol that is used for downloading emails from email server.
c.An unique address through which web pages of web site are accessed.
d.Messages sent/received electronically on computer network.
5.Give full form of the following abbreviations.(4x0.5=2)
a. IRC b. ISDN c. VOIP d. MODEM
a. IRC b. ISDN c. VOIP d. MODEM
6.Match the followings: (4x0.5=2)
Group A | Group B |
a. Duplex b. E-commerce c. Router d. Virus | i. Online business ii. A network component iii. Two way communication iv. Destructive program v. One way communication |
Group B (MS-Access – 10)
7.Answer the following questions.(3x2=6)
What is RDBMS? Write two features of DBMS.
Define query? Write any two importance of primary key.
What is indexed property of a field? What is the indexed value of a primary key.
What is RDBMS? Write two features of DBMS.
Define query? Write any two importance of primary key.
What is indexed property of a field? What is the indexed value of a primary key.
8.Fill in the blanks(4x0.5=2)
A column in MS-Access table is ……
The Date/Time field data type occupies …. bytes of memory.
------- data type is used to store remarks or comments in MS -Access.
An ….. query makes global changes to a group of records in one or more tables.
9. Match the following:(4x0.5=2)
A column in MS-Access table is ……
The Date/Time field data type occupies …. bytes of memory.
------- data type is used to store remarks or comments in MS -Access.
An ….. query makes global changes to a group of records in one or more tables.
9. Match the following:(4x0.5=2)
a. SQL | i. Upto 1GB |
b. Yes/No | ii. Structure Query Language |
c. OLE field | iii. Standard Query Language |
d. Caption | iv. field property v. used for logical operation |
Group C (Programming – 18)
10. a. Define local and global variables. (1)
b. Write down any two features of C Language. (1)
c. Write the functions of i) Kill statement and ii) EOF function.(1)
b. Write down any two features of C Language. (1)
c. Write the functions of i) Kill statement and ii) EOF function.(1)
11. Write output of the following program. (2)
DECLARE FUNCION NUM(X)
P=11001
PRINT “The result is “; NUM(P)
END
DECLARE FUNCION NUM(X)
P=11001
PRINT “The result is “; NUM(P)
END
FUNCTION NUM(X)
WHILE X<> 0
R=X MOD 10
SUM=R* 2 ^ A+ SUM
X=X10
A=A+1
WEND
NUM=SUM
END FUNCTION
WHILE X<> 0
R=X MOD 10
SUM=R* 2 ^ A+ SUM
X=X10
A=A+1
WEND
NUM=SUM
END FUNCTION
12 . Rewrite the following program correcting bugs. (2)
CLS
REM to delete the record of specified students from student.dat file
OPEN “student.dat” FOR OUTPUT AS #1
OPEN “dupli.dat” FOR OUTPUT AS #2
INPUT “Enter student name whose record is to be deleted “;N$
DO WHILE EOF(1)
INPUT #1, stdname$, add$, age
IF UCASE$(N$)=UCASE$(stdname$) THEN
WRITE #2, stdname$, add$, age
END IF
CLOSE #1,#2
LOOP
KILL “student.dat”
NAME “dupli.dat” AS “student.dat”
END
CLS
REM to delete the record of specified students from student.dat file
OPEN “student.dat” FOR OUTPUT AS #1
OPEN “dupli.dat” FOR OUTPUT AS #2
INPUT “Enter student name whose record is to be deleted “;N$
DO WHILE EOF(1)
INPUT #1, stdname$, add$, age
IF UCASE$(N$)=UCASE$(stdname$) THEN
WRITE #2, stdname$, add$, age
END IF
CLOSE #1,#2
LOOP
KILL “student.dat”
NAME “dupli.dat” AS “student.dat”
END
13.Study the following program and answer the questions.(2x1=2)
DECLARE SUB TEST (A,B,C)
LET X=5
LET Y=10
LET Z=20
CALL TEST(X, (Y), (Z))
PRINT X,Y, Z
END
LET X=5
LET Y=10
LET Z=20
CALL TEST(X, (Y), (Z))
PRINT X,Y, Z
END
SUB TEST (A,B,C)
A= A-5
B= B+5
SUM=A+B+C/5
PRINT SUM
END SUB
a)What will be the output of the above program?
b)List the arguments and parameters used in the above program.
A= A-5
B= B+5
SUM=A+B+C/5
PRINT SUM
END SUB
a)What will be the output of the above program?
b)List the arguments and parameters used in the above program.
14a. Write a program to define a function procedure which returns number of factors of the given number and use this function to check whether input integer is prime or composite. (3)
b. Write a program using SUB .. END SUB to calculate volume of a cylinder.[Hint: V=p* r^2* h]. (3)
c. A sequential data file “result.rec” contains the name, marks secured by students in three subjects. Assume pass marks for each subject is 40. Write a program to display the records of passed students and total number of failed students. (3)
b. Write a program using SUB .. END SUB to calculate volume of a cylinder.[Hint: V=p* r^2* h]. (3)
c. A sequential data file “result.rec” contains the name, marks secured by students in three subjects. Assume pass marks for each subject is 40. Write a program to display the records of passed students and total number of failed students. (3)
No comments:
Post a Comment