Solved Model Set








SEE Question Paper Computer Science Solved Answers                                   
                                                              Sajan Bajgain
  1. Answer the following questions:
    a. Give two-two difference between peer-to-peer and client/server network architecture.
Ans:These are the differences between peer-to peer and client/server network architecture:
Peer-to peer Client/server
1.The type of network architecture in which
all the connected computers acts as both client and server is known as Peer-to-Peer network architecture.
1.The type of network architecture in which
all other computers in a network known as clients are handled or controlled by a single computer known as server is known as Client/Server.
2.It doesn’t have centralized server. 2.It contains  a separate centralized server.
3.It is expensive to setup and less secure. 3.It is cheaper to setup and more secure.
b. What is the function of file transfer protocol (FTP)?
Ans:The functions of File Transfer Protocol(FTP) are:
i.It enables the downloading and uploading of files into the internet.
ii.It manages the interaction between the computers on internet.
c. What is cyber crime? Give any two examples.
Ans:The crimes done through the misuse of computers , network and internet is known as cyber crime.
The two examples of cyber crime are:
i.Hacking
ii.Phishing
d. Write any four preventive measures for computer hardware security.
Ans:Any four Preventive measures for solving Hardware security problems are:
i.Insurance
ii.Regular maintenance
iii.Protection from dusts.
iv.Use of Power protection device
e. Write any two medium for transmission of computer virus.
Ans:Any two mediums for transmission of computer virus are:
i.Downloading of malicious files through internet and use of corrupted files.
ii.Sharing infected files through portable storage devices like pen drives.


2. a.Convert as indicated:

i.(108)10 into binary

Ans:
2 108 Remainder
2 54 0
2 27 0
2 13 1
2 6 1
2 3 0

1 1

(108)10=(1101100)2
ii. (765)8into decimal
Ans:
(765)8=7*82+6*81+5*80
=448+48+5
=(501)10

∴(765)8=(501)10
b.Perform the following binary calculations:
i. 111*11
Ans
111
*11
111
+1110
10101
∴111*11=10101

ii. Divide 1101 by 11
Ans:                                                     
                                                                      100       
                                      11 )        1101      (100
                                                   -11         
00
-0
01
∴Quotient=100
∴Remainder=01


  1. Match the following:
i. E-commerce                     Power protection device
ii. Volt guard                         Online shopping
iii. Satellite link                      WAN
ivSound card                        Optical fiber
Multimedia
Ans:
E-commerce    –       Online shopping
Volt guard       –  Power protection device
Satellite link     –       WAN
Sound card      –      Multimedia
4. Choose the best answer:
a. Which of the following is remote login service?
Video conferencing          ii. FTP              iii. Telnet         iv. TCP/IP
Ans: Telnet
b. Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging           ii. Backup        iii.Defragmentation      iv. Scandisk
Ans: Defragmentation
c. Which of the following is an audio input device?
Printer     ii. Microphone             iii. Head phone                        iv. Speaker
Ans: Microphone
d. Virus is a type of ___________.
i. System program  ii.Package program    iii.Destructive program   iv. Web program
Ans: destructive program
5. Technical terms:
. a. The data carrying capacity of communication channel.
Ans: Bandwidth
b. The moral principles that control cybercrime.
Ans: Computer ethics
c. Buying and selling product and services online.
Ans: E-commerce
d. An integration of text, audio, graphics and video.
Ans: Multimedia
Write down the full forms:
LAN : Local Area Network
VOIP : Voice Over Internet Protocol
Gbps : Giga bits per second
DVD : Digital Versatile Disk

6. Answer the following question:
a. Write any two advantages of computerized database.
AnsThe two advantages of computerized database are:
i.Larged volume of data can be stored in managed and systematic way.
ii.Retrieving of data is also easy due to data sorting and indexing.
b. Name any four objects of MS-Access database.
AnsThe four object of MS-Access are:
  1. Table
  2. Form
  3. Query
  4. Report
c. What is data sorting?
AnsThe method of arranging and grouping the data in ascending or in descending order in a database is known as data sorting.
7. State whether the following are true or false:
  1. Graphics can also be stored in MS-Access database.  True
  2. Maximum field size of memo field is 256 characters. False
  3. A form is an object of MS-Access used for entering data. True
  4. An action query makes changes in a table. True
8. Match the following:
Indexing data                     Final output
Report                                 View data
Yes/No                               Searching fast
Select query                       Picture
Data type
Ans:
  1. Indexing data   –      Searching fast
  2. Report               –       Final output
  3. Yes/No              –      Data type
  4. Select query     –       View data

9. Answer the following:
a. Mention the types of procedures used in QBasic.
AnsThe types of procedure used in QBasic are:
  1. Sub procedure
  2. Function procedure
b. Write two characteristics of C language.
AnsThe two characteristics of C language are:
i.It can be used for making large and powerful programmes.
ii.It’s easy for programming since it is a High Level Programming Language.
c. Write down the function of:
SHARED
AnsThe function of SHARED is to declare a variable globally.
  1. CALL
AnsThe function of CALL statement is to call sub procedure for performing specific task.
9. Re-write the following correcting the bugs:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ
CALL CUBE(No)
NEXT X
DATA 3, 5, 2, 6, 4
END
SUB CUBE( )
DISPLAY N^3
END SUB
Ans:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ No
CALL CUBE(No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(N)
PRINT N^3
END SUB

10. Write down the output:
DECLARE FUNCTION AVGE(A,B,C)
X=10
Y=5
Z=15
AV= AVGE(X,Y,Z)
RPINT “Average of three numbers”; AV
END
FUNCTION AVGE(A, B, C)
S=A+B+C
AVGE = S/3
END FUNCTION
Ans:
Average of three numbers 10
The output of the above programme is:


11. Study the following program and answer the following:
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END
SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB
a. List the library function used in the above program.
AnsThe library function used in the above program is MID$.
b.List the conditional statement used in the above program.
AnsThe conditional statement used in the above program is:
IF …. THEN
12. Write a program using FUNCTION….END FUNCTION to input a string and count the total number of consonants.
AnsDECLARE FUNCTION COUNT(W$)
CLS
INPUT “Enter a Word”; W$
PRINT “The total numberr of consonant is”; COUNT(W$)
END
FUNCTION COUNT (W$)
C = 0
FOR I = 1 TO LEN(W$)
B$ = MID$(W$, I, 1)
C$ = UCASE$(B$)
IF C$ <> “A” AND C$ <> “E” AND C$ <> “I” AND C$ <> “O” AND C$ <> “U” THEN C = C + 1
NEXT I
COUNT = C
END FUNCTION
13 Write a program using SUB……END SUB to find the area of circle.
AnsDECLARE SUB AREA(R)
CLS
INPUT “Enter radius”; R
CONST PI=3.14
CALL AREA(R)
END
SUB AREA(A)
A=PI*R^2
PRINT “The area of circle=”; A
END SUB
14. A data file “Salary.Dat” contains the information of employee regarding their name, post and salary. Write a program to display all the information of employee whose salary is greater than 15000 and less than 40000.
AnsOPEN “Salary.Dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, P$, S
IF S>15000 AND S<40000 THEN PRINT N$, P$, S
WEND
CLOSE #1
END

Leave a Reply



536
views


Visitors reactions:                               

56%

HAPPY

5%

SAD

20%

AMAZED

6%

EXCITED

14%

ANGRY

Comments

Popular

Multimedia and its applications

File handling on QBASIC:SOLVED

Networking and Telecommunication