Thursday, March 1, 2018

SEE Computer Science 2071 Solved

Answer the following questions:

a. Give two-two difference between peer-to-peer and client/server network architecture.
Ans:These are the differences between peer-to peer and client/server network architecture:
Peer-to peer
Client/server

1.The type of network architecture in which all the connected computers acts as both client and server is known as Peer-to-Peer network architecture.
1.The type of network architecture in which all other computers in a network known as clients are handled or controlled by a single computer known as server is known as Client/Server.

2. It doesn’t have centralized server.
2. It contains a separate centralized server.

3. It is expensive to setup and less secure.
3. It is cheaper to setup and more secure.

b. What is the function of file transfer protocol (FTP)?
Ans:The functions of File Transfer Protocol(FTP) are:
i.It enables the downloading and uploading of files into the internet.
ii.It manages the interaction between the computers on internet.

c. What is cyber crime? Give any two examples.
Ans: The crimes done through the misuse of computers, network and internet is known as
cyber crime. The two examples of cyber crime are:
i. Hacking
ii. Phishing

d. Write any four preventive measures for computer hardware security.
Ans:Any four Preventive measures for solving Hardware security problems are:
i. Insurance
ii. Regular maintenance
iii.Protection from dusts.
iv.Use of Power protection device

e. Write any two medium for transmission of computer virus.
Ans: Any two mediums for transmission of computer virus are:
i. Downloading of malicious files through internet and use of corrupted files.
ii. Sharing infected files through portable storage devices like pen drives.

2. a.Convert as indicated:
i.(108)₁₀ into binary
Ans:
Do your self.......

      (108)₁₀= (1101100)₂

ii. (765)₈
into decimal

Ans:
(765)8=7×8²+6×8¹+5×8⁰
=448+48+5
=(501)₁₀
∴               (765)₈=(501)₁₀

b.Perform the following binary calculations:
i. 111*11
Ans:
        111
        *11
̅̅̅        ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅
        111
   +1110
̅   ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅ ̅
    10101
∴   111*11=10101

ii. Divide 1101 by 11
Ans:

11 ) 1101 (100
        -11
       _____
         00   
          -0
      ______
           01

∴  Quotient=100
∴  Remainder=01

3. Match the following:
i. E-commerce                Power protection device
ii. Volt guard                    online shopping
iii. Satellite link                WAN
ivSound card                    Optical fiber
                                           Multimedia
Ans:
E-commerce – Online shopping
Volt guard – Power protection device
Satellite link – WAN
Sound card – Multimedia

4. Choose the best answer:
a. Which of the following is remote login service?
i.Video conferencing ii.FTP  iii.Telnet  iv.TCP/IP
Ans: Telnet
b. Process of arranging the scattered parts of file into a contiguous manner is _______.
i. debugging              ii.Backup            iii.Defragmentation           iv.Scandisk
Ans: Defragmentation
c. Which of the following is an audio input device?
i. Printer           ii. Microphone           iii. Head phone           iv. Speaker
Ans: Microphone
d. Virus is a type of ___________.
i. System program       ii. Package program        iii. Destructive program        iv. Web program
Ans: destructive program

5. Technical terms:
a. The data carrying capacity of communication channel.
Ans: Bandwidth
b. The moral principles that control cybercrime.
Ans: Computer ethics
c. Buying and selling product and services online.
Ans: E-commerce
d. An integration of text, audio, graphics and video.
Ans: Multimedia

Write down the full forms:
LAN :     Local Area Network
VOIP :    Voice Over Internet Protocol
Gbps :    Giga bits per second
DVD :      Digital Versatile Disk

6. Answer the following question:
a. Write any two advantages of computerized database.
Ans: The two advantages of computerized database are:
i. Larged volume of data can be stored in managed and systematic way.
ii. Retrieving of data is also easy due to data sorting and indexing.

b. Name any four objects of MS-Access database.
Ans: The four object of MS-Access are:
Table
Form
Query
Report

c. What is data sorting?
Ans: The method of arranging and grouping the data in ascending or in descending order in
a database is known as data sorting.

7. State whether the following are true or false:
Graphics can also be stored in MS-Access database. True
Maximum field size of memo field is 256 characters. False
A form is an object of MS-Access used for entering data. True
An action query makes changes in a table. True

8. Match the following:
Indexing data                                       Final output
Report                                                   View data
Yes/No                                                   Searching fast
Select query                                           Picture
                                                                 Data type
Ans:
Indexing data – Searching fast
Report – Final output
Yes/No – Data type
Select query – View data

9. Answer the following:
a. Mention the types of procedures used in QBasic.
Ans: The types of procedure used in QBasic are:
Sub procedure
Function procedure

b. Write two characteristics of C language.
Ans: The two characteristics of C language are:
i. It can be used for making large and powerful programmes.
ii. It’s easy for programming since it is a High Level Programming Language.

c. Write down the function of:
SHARED
Ans: The function of SHARED is to declare a variable globally.
CALL
Ans: The function of CALL statement is to call sub procedure for performing specific task.

9. Re-write the following correcting the bugs:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ
CALL CUBE(No)
NEXT X
DATA 3, 5, 2, 6, 4
END
SUB CUBE( )
DISPLAY N^3
END SUB
Ans:
DECLARE SUB CUBE(N)
CLS
FOR I = 1 TO 5
READ No
CALL CUBE(No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(N)
PRINT N^3
END SUB

10. Write down the output:
DECLARE FUNCTION AVGE(A,B,C)
X=10
Y=5
Z=15
AV= AVGE(X,Y,Z)
RPINT “Average of three numbers”; AV
END
FUNCTION AVGE(A, B, C)
S=A+B+C
AVGE = S/3
END FUNCTION
Ans:
Average of three numbers 10
The output of the above programme is:

11. Study the following program and answer the following:
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END
SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB

a. List the library function used in the above program.
Ans: The library function used in the above program is MID$
b.List the conditional statement used in the above program.
Ans: The conditional statement used in the above program is:
IF …. THEN

12. Write a program using FUNCTION….END FUNCTION to input a string and
count the total number of consonants.
Ans: DECLARE FUNCTION COUNT(W$)

CLS
INPUT “Enter a Word”; W$
PRINT “The total numberr of consonant is”; COUNT(W$)
END
FUNCTION COUNT (W$)
C = 0
FOR I = 1 TO LEN(W$)
B$ = MID$(W$, I, 1)
C$ = UCASE$(B$)
IF C$ <> “A” AND C$ <> “E” AND C$ <> “I” AND C$ <> “O” AND C$ <> “U” THEN C = C + 1
NEXT I
COUNT = C
END FUNCTION

13 Write a program using SUB……END SUB to find the area of circle.
Ans: DECLARE SUB AREA(R)
CLS
INPUT “Enter radius”; R
CONST PI=3.14
CALL AREA(R)
END
SUB AREA(A)
A=PI*R^2
PRINT “The area of circle=”; A
END SUB

14. A data file “Salary.Dat” contains the information of employee regarding their
name, post and salary. Write a program to display all the information of employee
whose salary is greater than 15000 and less than 40000.
Ans:
OPEN “Salary.Dat” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, P$, S
IF S>15000 AND S<40000 THEN PRINT N$, P$, S
WEND
CLOSE #1
END