Solved Model Set
SEE Question Paper Computer Science Solved Answers
Sajan Bajgain
Ans:These are the differences between peer-to peer and client/server network architecture:
b. What is the function of file transfer protocol (FTP)?
Ans:The functions of File Transfer Protocol(FTP) are:
i.It enables the downloading and uploading of files into the internet.
ii.It manages the interaction between the computers on internet.
c. What is cyber crime? Give any two examples.
Ans:The crimes done through the misuse of computers , network and internet is known as cyber crime.
The two examples of cyber crime are:
i.Hacking
ii.Phishing
d. Write any four preventive measures for computer hardware security.
Ans:Any four Preventive measures for solving Hardware security problems are:
i.Insurance
ii.Regular maintenance
iii.Protection from dusts.
iv.Use of Power protection device
e. Write any two medium for transmission of computer virus.
Ans:Any two mediums for transmission of computer virus are:
i.Downloading of malicious files through internet and use of corrupted files.
ii.Sharing infected files through portable storage devices like pen drives.
2. a.Convert as indicated:
i.(108)10 into binary
Ans:
∴ (108)10=(1101100)2
ii. (765)8into decimal
Ans:
(765)8=7*82+6*81+5*80
=448+48+5
=(501)10
∴(765)8=(501)10
b.Perform the following binary calculations:
i. 111*11
Ans:
111
*11
111
+1110
10101
∴111*11=10101
ii. Divide 1101 by 11
Ans:
100
11 ) 1101 (100
-11
00
-0
01
∴Quotient=100
∴Remainder=01
ii. Volt guard Online shopping
iii. Satellite link WAN
ivSound card Optical fiber
Multimedia
Ans:
E-commerce – Online shopping
Volt guard – Power protection device
Satellite link – WAN
Sound card – Multimedia
4. Choose the best answer:
a. Which of the following is remote login service?
Video conferencing ii. FTP iii. Telnet iv. TCP/IP
Ans: Telnet
b. Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging ii. Backup iii.Defragmentation iv. Scandisk
Ans: Defragmentation
c. Which of the following is an audio input device?
Printer ii. Microphone iii. Head phone iv. Speaker
Ans: Microphone
d. Virus is a type of ___________.
i. System program ii.Package program iii.Destructive program iv. Web program
Ans: destructive program
5. Technical terms:
. a. The data carrying capacity of communication channel.
Ans: Bandwidth
b. The moral principles that control cybercrime.
Ans: Computer ethics
c. Buying and selling product and services online.
Ans: E-commerce
d. An integration of text, audio, graphics and video.
Ans: Multimedia
Write down the full forms:
LAN : Local Area Network
VOIP : Voice Over Internet Protocol
Gbps : Giga bits per second
DVD : Digital Versatile Disk
6. Answer the following question:
a. Write any two advantages of computerized database.
Ans: The two advantages of computerized database are:
i.Larged volume of data can be stored in managed and systematic way.
ii.Retrieving of data is also easy due to data sorting and indexing.
b. Name any four objects of MS-Access database.
Ans: The four object of MS-Access are:
Ans: The method of arranging and grouping the data in ascending or in descending order in a database is known as data sorting.
7. State whether the following are true or false:
Indexing data Final output
Report View data
Yes/No Searching fast
Select query Picture
Data type
Ans:
9. Answer the following:
a. Mention the types of procedures used in QBasic.
Ans: The types of procedure used in QBasic are:
Ans: The two characteristics of C language are:
i.It can be used for making large and powerful programmes.
ii.It’s easy for programming since it is a High Level Programming Language.
c. Write down the function of:
SHARED
Ans: The function of SHARED is to declare a variable globally.
9. Re-write the following correcting the bugs:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ
CALL CUBE(No)
NEXT X
DATA 3, 5, 2, 6, 4
END
SUB CUBE( )
DISPLAY N^3
END SUB
Ans:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ No
CALL CUBE(No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(N)
PRINT N^3
END SUB
10. Write down the output:
DECLARE FUNCTION AVGE(A,B,C)
X=10
Y=5
Z=15
AV= AVGE(X,Y,Z)
RPINT “Average of three numbers”; AV
END
FUNCTION AVGE(A, B, C)
S=A+B+C
AVGE = S/3
END FUNCTION
Ans:
The output of the above programme is:
11. Study the following program and answer the following:
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END
SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB
a. List the library function used in the above program.
Ans: The library function used in the above program is MID$.
b.List the conditional statement used in the above program.
Ans: The conditional statement used in the above program is:
IF …. THEN
12. Write a program using FUNCTION….END FUNCTION to input a string and count the total number of consonants.
Ans: DECLARE FUNCTION COUNT(W$)
CLS
INPUT “Enter a Word”; W$
PRINT “The total numberr of consonant is”; COUNT(W$)
END
FUNCTION COUNT (W$)
C = 0
FOR I = 1 TO LEN(W$)
B$ = MID$(W$, I, 1)
C$ = UCASE$(B$)
IF C$ <> “A” AND C$ <> “E” AND C$ <> “I” AND C$ <> “O” AND C$ <> “U” THEN C = C + 1
NEXT I
COUNT = C
END FUNCTION
13 Write a program using SUB……END SUB to find the area of circle.
Ans: DECLARE SUB AREA(R)
CLS
INPUT “Enter radius”; R
CONST PI=3.14
CALL AREA(R)
END
SUB AREA(A)
A=PI*R^2
PRINT “The area of circle=”; A
END SUB
14. A data file “Salary.Dat” contains the information of employee regarding their name, post and salary. Write a program to display all the information of employee whose salary is greater than 15000 and less than 40000.
Ans: OPEN “Salary.Dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, P$, S
IF S>15000 AND S<40000 THEN PRINT N$, P$, S
WEND
CLOSE #1
END
Sajan Bajgain
- Answer the following questions:
Ans:These are the differences between peer-to peer and client/server network architecture:
Peer-to peer | Client/server |
1.The type of network architecture in which all the connected computers acts as both client and server is known as Peer-to-Peer network architecture. |
1.The type of network architecture in which all other computers in a network known as clients are handled or controlled by a single computer known as server is known as Client/Server. |
2.It doesn’t have centralized server. | 2.It contains a separate centralized server. |
3.It is expensive to setup and less secure. | 3.It is cheaper to setup and more secure. |
Ans:The functions of File Transfer Protocol(FTP) are:
i.It enables the downloading and uploading of files into the internet.
ii.It manages the interaction between the computers on internet.
c. What is cyber crime? Give any two examples.
Ans:The crimes done through the misuse of computers , network and internet is known as cyber crime.
The two examples of cyber crime are:
i.Hacking
ii.Phishing
d. Write any four preventive measures for computer hardware security.
Ans:Any four Preventive measures for solving Hardware security problems are:
i.Insurance
ii.Regular maintenance
iii.Protection from dusts.
iv.Use of Power protection device
e. Write any two medium for transmission of computer virus.
Ans:Any two mediums for transmission of computer virus are:
i.Downloading of malicious files through internet and use of corrupted files.
ii.Sharing infected files through portable storage devices like pen drives.
2. a.Convert as indicated:
i.(108)10 into binary
Ans:
2 | 108 | Remainder |
2 | 54 | 0 |
2 | 27 | 0 |
2 | 13 | 1 |
2 | 6 | 1 |
2 | 3 | 0 |
1 | 1 |
∴ (108)10=(1101100)2
ii. (765)8into decimal
Ans:
(765)8=7*82+6*81+5*80
=448+48+5
=(501)10
∴(765)8=(501)10
b.Perform the following binary calculations:
i. 111*11
Ans:
111
*11
111
+1110
10101
∴111*11=10101
ii. Divide 1101 by 11
Ans:
100
11 ) 1101 (100
-11
00
-0
01
∴Quotient=100
∴Remainder=01
- Match the following:
ii. Volt guard Online shopping
iii. Satellite link WAN
ivSound card Optical fiber
Multimedia
Ans:
E-commerce – Online shopping
Volt guard – Power protection device
Satellite link – WAN
Sound card – Multimedia
4. Choose the best answer:
a. Which of the following is remote login service?
Video conferencing ii. FTP iii. Telnet iv. TCP/IP
Ans: Telnet
b. Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging ii. Backup iii.Defragmentation iv. Scandisk
Ans: Defragmentation
c. Which of the following is an audio input device?
Printer ii. Microphone iii. Head phone iv. Speaker
Ans: Microphone
d. Virus is a type of ___________.
i. System program ii.Package program iii.Destructive program iv. Web program
Ans: destructive program
5. Technical terms:
. a. The data carrying capacity of communication channel.
Ans: Bandwidth
b. The moral principles that control cybercrime.
Ans: Computer ethics
c. Buying and selling product and services online.
Ans: E-commerce
d. An integration of text, audio, graphics and video.
Ans: Multimedia
Write down the full forms:
LAN : Local Area Network
VOIP : Voice Over Internet Protocol
Gbps : Giga bits per second
DVD : Digital Versatile Disk
6. Answer the following question:
a. Write any two advantages of computerized database.
Ans: The two advantages of computerized database are:
i.Larged volume of data can be stored in managed and systematic way.
ii.Retrieving of data is also easy due to data sorting and indexing.
b. Name any four objects of MS-Access database.
Ans: The four object of MS-Access are:
- Table
- Form
- Query
- Report
Ans: The method of arranging and grouping the data in ascending or in descending order in a database is known as data sorting.
7. State whether the following are true or false:
- Graphics can also be stored in MS-Access database. True
- Maximum field size of memo field is 256 characters. False
- A form is an object of MS-Access used for entering data. True
- An action query makes changes in a table. True
Indexing data Final output
Report View data
Yes/No Searching fast
Select query Picture
Data type
Ans:
- Indexing data – Searching fast
- Report – Final output
- Yes/No – Data type
- Select query – View data
9. Answer the following:
a. Mention the types of procedures used in QBasic.
Ans: The types of procedure used in QBasic are:
- Sub procedure
- Function procedure
Ans: The two characteristics of C language are:
i.It can be used for making large and powerful programmes.
ii.It’s easy for programming since it is a High Level Programming Language.
c. Write down the function of:
SHARED
Ans: The function of SHARED is to declare a variable globally.
- CALL
9. Re-write the following correcting the bugs:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ
CALL CUBE(No)
NEXT X
DATA 3, 5, 2, 6, 4
END
SUB CUBE( )
DISPLAY N^3
END SUB
Ans:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ No
CALL CUBE(No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(N)
PRINT N^3
END SUB
10. Write down the output:
DECLARE FUNCTION AVGE(A,B,C)
X=10
Y=5
Z=15
AV= AVGE(X,Y,Z)
RPINT “Average of three numbers”; AV
END
FUNCTION AVGE(A, B, C)
S=A+B+C
AVGE = S/3
END FUNCTION
Ans:
Average of three numbers 10 |
11. Study the following program and answer the following:
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END
SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB
a. List the library function used in the above program.
Ans: The library function used in the above program is MID$.
b.List the conditional statement used in the above program.
Ans: The conditional statement used in the above program is:
IF …. THEN
12. Write a program using FUNCTION….END FUNCTION to input a string and count the total number of consonants.
Ans: DECLARE FUNCTION COUNT(W$)
CLS
INPUT “Enter a Word”; W$
PRINT “The total numberr of consonant is”; COUNT(W$)
END
FUNCTION COUNT (W$)
C = 0
FOR I = 1 TO LEN(W$)
B$ = MID$(W$, I, 1)
C$ = UCASE$(B$)
IF C$ <> “A” AND C$ <> “E” AND C$ <> “I” AND C$ <> “O” AND C$ <> “U” THEN C = C + 1
NEXT I
COUNT = C
END FUNCTION
13 Write a program using SUB……END SUB to find the area of circle.
Ans: DECLARE SUB AREA(R)
CLS
INPUT “Enter radius”; R
CONST PI=3.14
CALL AREA(R)
END
SUB AREA(A)
A=PI*R^2
PRINT “The area of circle=”; A
END SUB
14. A data file “Salary.Dat” contains the information of employee regarding their name, post and salary. Write a program to display all the information of employee whose salary is greater than 15000 and less than 40000.
Ans: OPEN “Salary.Dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, P$, S
IF S>15000 AND S<40000 THEN PRINT N$, P$, S
WEND
CLOSE #1
END
Comments
Post a Comment