SEE MODEL SET: ISSUED BY CDC
SEE MODEL SET 1
Subject: Computer Science F.M.: 50
Time: 1 hr. 30 min. P.M.: 16
Students
are encouraged to answer in their own words as far as practicable.
Priority is given to the creativity and clarity but not to rote
learning.Subject: Computer Science F.M.: 50
Time: 1 hr. 30 min. P.M.: 16
Group A
Computer Fundamental (22 Marks)
Computer Fundamental (22 Marks)
1. Answers the following questions: (5x2=10)
a.What is computer network? Write its types on the basis of geographical area.
b.Write any four differences between client server and peer to peer network model.
c.Define cyber crime with examples.
d.What is antivirus program? Write any two examples.
e.Write advantages of multimedia in education sector.
a.What is computer network? Write its types on the basis of geographical area.
b.Write any four differences between client server and peer to peer network model.
c.Define cyber crime with examples.
d.What is antivirus program? Write any two examples.
e.Write advantages of multimedia in education sector.
2.a. Convert the following as indicated: (2x1= 2)
i. (110100)2 into Decimal ii. (2A5)16 into Octal
b. Perform the following binary operations. (2x1=2)
i. (1110-1101)*101 ii. 100111/111
3.Match the following: (4x0.5=2)
i. (110100)2 into Decimal ii. (2A5)16 into Octal
b. Perform the following binary operations. (2x1=2)
i. (1110-1101)*101 ii. 100111/111
3.Match the following: (4x0.5=2)
Group A |
Group B
|
Hub
|
Connect different types of networks having same protocol
|
Router
|
Twisted Pair cable
|
BNC terminator
|
Transmission channel for WLAN
|
RJ 45
|
Connecting device within a network
|
Coaxial cable
|
4.Select the correct option for the following: (4x0.5=2)
a.Which of the following is the basic internet protocol?
HTTP ii. POP
TCP/IP iv. None of the above
b.Which of the following computer program is harmful?
i. Antivirus ii. Virus iii. Word processor iv. All of the above
c.A unique address to identify the computers on the network is :
i.Primary key ii. Host name iii. Domain name iv. IP Address
d.Which of the following is not cyber crime?
i.Should not use computer to harm people
ii.Should not use computer to steal data and information.
iii.Should destroy data of other people.
iv.All of the above
a.Which of the following is the basic internet protocol?
HTTP ii. POP
TCP/IP iv. None of the above
b.Which of the following computer program is harmful?
i. Antivirus ii. Virus iii. Word processor iv. All of the above
c.A unique address to identify the computers on the network is :
i.Primary key ii. Host name iii. Domain name iv. IP Address
d.Which of the following is not cyber crime?
i.Should not use computer to harm people
ii.Should not use computer to steal data and information.
iii.Should destroy data of other people.
iv.All of the above
5.Write appropriate technical term for the following: (4x0.5=2)
a.Real time visual communication service of internet.
b.A hardware device that converts digital signal to analog and vice versa.
c.A type of harmful computer program that infects the master boot record (MBR) of a disk.
d.A system program installed in server for managing resources and clients.
a.Real time visual communication service of internet.
b.A hardware device that converts digital signal to analog and vice versa.
c.A type of harmful computer program that infects the master boot record (MBR) of a disk.
d.A system program installed in server for managing resources and clients.
6.Give the full form. (4x0.5=2)
VOIP ii. FTP iii. PSTN iv. USB
VOIP ii. FTP iii. PSTN iv. USB
Group B
MS-Access (10 Marks)
MS-Access (10 Marks)
7. Answers the following questions: (3x1=3)
a. What is database? List any two DBMS.
b. Define primary key field wits its application in database management.
c. Differentiate between form and report.
a. What is database? List any two DBMS.
b. Define primary key field wits its application in database management.
c. Differentiate between form and report.
8.Select the correct option for the following: (4x0.5=2)
a. Which of the following is DBMS?
i. MS-Excel ii. MS-Access iii. Word Perfect iv. All of the above
b. What is the suitable data type to store Email ID?
i. Text ii. OLE object iii. Hyperlink iv. Memo
c. Which of the following is not Action query?
i. Append query ii. Delete query iii. Select query iv. Update query
d. Which of the following is not MS Access data type?
i. Text ii. Hyperlink iii. Number iv. Picture
a. Which of the following is DBMS?
i. MS-Excel ii. MS-Access iii. Word Perfect iv. All of the above
b. What is the suitable data type to store Email ID?
i. Text ii. OLE object iii. Hyperlink iv. Memo
c. Which of the following is not Action query?
i. Append query ii. Delete query iii. Select query iv. Update query
d. Which of the following is not MS Access data type?
i. Text ii. Hyperlink iii. Number iv. Picture
9. Fill in the blanks. (4x0.5=2)
The maximum field size of text field is ………… characters.
Byte is a number format which can contain positive numbers up to ………
………. is the default data type of MS Access
A caption of field can have maximum...... characters.
The maximum field size of text field is ………… characters.
Byte is a number format which can contain positive numbers up to ………
………. is the default data type of MS Access
A caption of field can have maximum...... characters.
Group C
QBASIC Programming (18 Marks)
QBASIC Programming (18 Marks)
10. Answers the following questions: (3x1= 3)
a. Write any two advantage of modular programming structure?
b. Write two basic data types of C language.
c. Write the functions of following commands:
i. WRITE # ii. KILL
a. Write any two advantage of modular programming structure?
b. Write two basic data types of C language.
c. Write the functions of following commands:
i. WRITE # ii. KILL
11. Write output of the following program. (2)
DECLARE FUNCTION NUM(X)
p=1011
R= NUM(p)
PRINT “THE RESULT IS:”; R
END
DECLARE FUNCTION NUM(X)
p=1011
R= NUM(p)
PRINT “THE RESULT IS:”; R
END
FUNCTION NUM(X)
WHILE X<>0
R= X MOD 10
S= R*2^q+S
X= X10
q=q+1
WEND
NUM=S
END FUNCTION
WHILE X<>0
R= X MOD 10
S= R*2^q+S
X= X10
q=q+1
WEND
NUM=S
END FUNCTION
12. Rewrite the following program correcting the bugs. (2)
REM to add 10 records in the data file “product.inf”
OPEN “product.inf” FOR OUTPUT AS #2
PRINT “enter product name, cost and quantity”
FOR i= 1 TO 10
INPUT # nam$, cost, qty
NEXT i
WRITE nam$, cost, qty
END
REM to add 10 records in the data file “product.inf”
OPEN “product.inf” FOR OUTPUT AS #2
PRINT “enter product name, cost and quantity”
FOR i= 1 TO 10
INPUT # nam$, cost, qty
NEXT i
WRITE nam$, cost, qty
END
13.Study the following program and answer the following question. (2)
DECLATE SUB SER (A, B)
X=2
Y=3
CALL SER(X, Y)
END
DECLATE SUB SER (A, B)
X=2
Y=3
CALL SER(X, Y)
END
SUB SER (A, B)
FOR I= 1 TO 5
PRINT A; B;
A=A+B
B=A+B
NEXT I
END SUB
List parameter and arguments used in this program.
What is the output of this program?
FOR I= 1 TO 5
PRINT A; B;
A=A+B
B=A+B
NEXT I
END SUB
List parameter and arguments used in this program.
What is the output of this program?
14. a. Write a program to display the series 4,4,8,12,20........10th terms using SUB procedure. (3)
b.
Write a program to define a user defined function to display total
number of consonants present in a word entered by a user in the main
module. (3)
c.
Write a program that creates a data file for a departmental store and
allows a user to store variable numbers of records, where each record
contains name of product, quantity in stock, net weight and price per
unit. (3)
***
624
views
|
Visitors reactions:
56%

happy
5%

sad
20%

amazed
6%

excited
14%

Comments
Post a Comment