Friday, March 16, 2018

SEE Computer 2073 solved

1. Answer the following questions.

a) Write any two advantages of BUS topology.
AnsThe advantages of bus topology are:
It is easy to set up computers and other devices in bus topology, because all the devices are connected through a single wire.
It requires fewer cable media, so it is cheaper than other topologies.

b) Define computer security.
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.

c) Write any two preventive measures to protect computer system from computer virus.
Ans: Any two preventive measures are:
i) Do not install pirated software, especially computer games
ii) Scan the mail or unknown files of internet before opening in your computers.
d) What is multimedia?
Ans: Multimedia is the integration of multiple forms of media, which presents information in more interesting and understandable way.

e) Write the use/function of File Transfer Protocol.
Ans: The use of File Transfer Protocol is to transfer the file from one computer to another computer. It helps to upload and download the files.

2. a) Perform the conversion as per the direction:
            i) (BAD)16 into binary
            Soln:
            Converting Hexadecimal to Binary
            B = 1011
            A = 1010
            D = 1101
            (BAD)16 = (101110101101)2

ii) (1111001)2 into octal
Soln:
Converting Binary to octal
001 = 1
111 = 7
001 = 1
(1111001)2 = (171)8
           
b) Perform the binary calculations:
            i) 11 × 10 + 11

1
1
×
1
0

0
0
1
1
×
1
1
0
Now, Adding with 11

           
1
0

+
1
1
1
0
0
1
                       
 11 × 10 + 11 = 1001
                       
            ii) 110  ¸ 10
10)
 110 (
11

-10


   10


   10


   00


            Quotient = 11
            Remainder = 00

3. Match the following:
a) Malicious software                        i) UPS
b) Primary storage device                  ii) virus
c) Power protection Device                iii) copyright
d) Intellectual property law                iv) RAM
                                                            v) CD-ROM

Answer
a) Malicious software            virus
b) Primary storage device      RAM
c) Power protection Device    UPS
d) Intellectual property law    copyright

4. State whether the following statements are true or false:
a) Computer Network reduces the cost. True
b) WWW is an organization which controls Internet. False
c) Microwave transmission is an example of bound media. False
d) The parts of the computer which can be seen and touched are called hardware. True

5. Write the appropriate technical terms of the following:
a) A type of network in which every computer works as both client and server.
Ans: Peer-to-peer network
b) Protocol used to receive email from the mail server.
Ans: POP( post office protocol)
c) The moving graphics images.
Ans: Animation
d) The law that controls cyber crimes.
Ans: Cyber Law

6. Write the full forms:
a) LAN: Local Area Network.
b)ROM: Read Only Memory.
c) SMTP: Simple Mail Transfer Protocol.
d)NOS: Network Operating System.

7. Answer the following questions.

a) Define data and database.
Ans: Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense. Database is a collection of related and organized information that can be used for different purpose.
b) What is primary key? Write its importance.
Ans: Primary key is a field that uniquely identifies the record. It is needed because it neither accepts duplicate values nor  permit null values.
The importance of Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
c) Name any four data types used in MS-Access.
Ans: Any four data types of MS-Access are:
i) Text
ii) Number
iii) Memo
iv) Currency
8. Select the correct answer:
a) The columns in a database table are called………………………
Ans: Field
b) Which is the suitable data type to store video?
Ans: OLE object
c) …………… object of MS-Access is used to print formatted data.
Ans: Report
d) Which is not a type of query?
Ans: Search

9. Match the following:
a) Query                     i) Printed format
b) Form                       ii) Stores data
c) Table                       iii) Allows view, edit, input data
d) Report                    iv) Extracts selected record for view
                                    v) DBMS

Answer
a) Query                     Extracts selected record for view
b) Form                       Allows view, edit, input data
c) Table                       Stores data
d) Report                    Printed format


10.
a) What is a loop?
Ans: Loop can de defined as repeating the statement of statement blocks for a number of times.
b) Write the functions of  NAME and CLOSE statements.
Ans: The function of NAME statement is to  renames a file on a diskette.  The function of CLOSE statement is to close one or all open files.
c) What is variable?
Ans: The data item whose value changes during the execution of a program is called variable.



11. Re-write the given program after correcting the bugs:
DECLARE SUB SUM(N)
INPUT “Any Number”; N
PRINT SUM(N)
END
SUB SUM (N)
S=0
WHILE N=0
R= R MOD 10
S=S+R
N=N/10
WEND
PRINT “Sum of digits”;S
END

Debugged Program

DECLARE SUB SUM(N)
INPUT “Any Number”; N
CALL SUM(N)
END
SUB SUM (N)
S=0
WHILE N< >0
R= N MOD 10
S=S + R
N=N 10
WEND
PRINT “Sum of digits”;S
END

12. Write the output of the following program.
DECLARE FUNCTION AREA (L, B)
CLS
LET L = 50
LET B = 10
LET ans = “; ans
PRINT “The area=”; ans
END

FUNCTION AREA (L, B)
Ar=L*B
AREA=ar
END FUNCTION

Output
The area = 500


13. State the following program and answer the given questions:
DECLARE FUNCTION Diff(A, B)
CLS
INPUT “Enter first number”; A
INPUT “Enter second number”; B
PRINT “The difference”; Diff(A, B)
END

FUNCTION Diff(A, B)
Difference= A – B
Diff = difference
END FUNCTION

List all the numeric variables used in the above program.
Ans: The numeric variables used in the above program are A, B and Difference

List the local variables used in the above program.
Ans: The local variables used in the above program is A, B and Difference

14
a) Write a program to calculate the area of four walls using Sub….End Sub. [Hint: Area=2H(L+B)
DECLARE SUB AREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
CALL AREA (L, B, H)
END

SUB AREA (L, B, H)
A = 2 * H * (L + B)
PRINT “AREA OF FOUR WALLS”; A
END SUB
b) Write a program to input a word in the main module and count the total number of vowel characters present in the word using FUNCTION…END FUNCTION.
DECLARE FUNCTION COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF VOWELS= "; COUNT(S$)
END

FUNCTION COUNT (S$)
VC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
COUNT = VC
END FUNCTION
c) Create a data file to store the records of few employees having Name, Address, Post, Gender and Salary fields.

            OPEN “std.rec” FOR OUTPUT AS #1
            DO
CLS
            INPUT “Enter Name”; N$
            INPUT “Enter Address”; A$
            INPUT “Enter Post”; P$
            INPUT “Enter gender”; G$
            INPUT “Enter Salary”; S
            WRITE #1, N$, A$, P$, G$, S
            INPUT “Do you want to continue”; CH$
            LOOP WHILE UCASE$(CH$)=”Y”
            CLOSE #1
            END

No comments:

Post a Comment