SLC SUPPLEMENTARY 2068 SOLVED
a) Define Computer network.
Ans: A computer network means two or more than two computers connected to each other to share data, hardware, software and other resources.
b) What is E-mail? Give an example of valid E-mail I.D.
Ans: E-mail is one of the most popular service provided by the internet which is used to send and receive mail through the internet.
An example of valid E-mail I.D. is shr_ram01@gmail.com
c) Write any two advantages of multimedia in educational field.
Ans: Any two advantages of multimedia in educational field are:
· It helps to present the information in more interactive and understandable way.
· It makes studying much more interesting.
d) What is a computer hardware security?
Ans: The security given to various hardware tools and equipment from being lost or damaged due to accidental or intentional harm is known as computer hardware security. For e.g.: fire detector, protection from theft, etc.
e) What is a computer virus?
Ans: A type of computer program which is written by the programmer with the intent of damaging or destroying the data and programs residing in the computer system is known as computer virus.
3. Match the following: Group A Group B
a) LAN i) Within a city
b) MAN ii) Internet protocol
c) UPS iii) Within a city
d) IPX/SPX iv) Power supply device
v) Between countries
a) LAN i) Within a city
b) MAN ii) Internet protocol
c) UPS iii) Within a city
d) IPX/SPX iv) Power supply device
v) Between countries
Ans:
Group A Group B
a) LAN - Within a building
b) MAN - Within a city
c) UPS - Power supply device
d) IPX/SPX - Internet protocol
4. Select the best answer:
a) LAN - Within a building
b) MAN - Within a city
c) UPS - Power supply device
d) IPX/SPX - Internet protocol
4. Select the best answer:
a) Which of the following is not a guided data communication media?
i) Coaxial cable ii) Fiber optic iii) twisted pair iv) Satellite
Ans: Satellite
b) Process of arranging the scattered parts of file into a contiguous manner.
i) Backup ii) Defragmentation iii) Debugging iv) All of the above
i) Backup ii) Defragmentation iii) Debugging iv) All of the above
Ans: Defragmentation
c) Which of the following is remote login service?
i) Video conferencing ii) Telnet iii) FTP iv) TCP/IP
i) Video conferencing ii) Telnet iii) FTP iv) TCP/IP
Ans: Telnet
d) Which of the following is an anti-virus program?
i) NAV ii) Windows iii) Photoshop iv) All of the above
i) NAV ii) Windows iii) Photoshop iv) All of the above
Ans: NAV
5. Write the appropriate technical term:a) The data carrying capacity of communication channel.
5. Write the appropriate technical term:a) The data carrying capacity of communication channel.
Ans: Bandwidth
b) Hub or switch based network topology.
Ans: Star Topolgy
c) A computer virus that damages the documents created in MS-Word & MS-Excel.
Ans: Macro virus
d) The moral principles that control cyber-crime.
Ans: Cyber law
6. Write the full forms of:a) bps - bits per second
6. Write the full forms of:a) bps - bits per second
ii) MAN - Metropolitan Area Network
iii) FTP- -File Transfer Protocol
iv) URL -Uniform Resource Locator
Group B
Database (10 marks)
Database (10 marks)
7. Answer the following questions:
a) What is database?
Ans: Database is a collection of related and organized information that is used to store, organize and extract data.
b) What data types are used to store salary and date of the birth?
Ans: The data types that are used for:
· Salary – Currency
· Date of birth – Date/Time
c) What is query?
Ans: Query is an object of MS-Access which allows selecting specific data from one or more tables.
8. Select the best answer:
8. Select the best answer:
a) The maximum size of text field in MS-Access is …………
i) 50 ii) 10 iii) 6400 iv) 255
i) 50 ii) 10 iii) 6400 iv) 255
Ans: 255
b) The default data type in MS-Access is ……..
i) Number ii) Date/Time iii) Memo iv) Text
i) Number ii) Date/Time iii) Memo iv) Text
Ans: Text
c) Report can be generated by using data from …………
i) Table ii) Query iii) Forms iv) Both (i) &(ii)
i) Table ii) Query iii) Forms iv) Both (i) &(ii)
Ans: Both (i) & (ii)
d) …………….. query changes value in main table.
i) Select ii) Update iii) Both (i) &(ii) iv) None of the above
i) Select ii) Update iii) Both (i) &(ii) iv) None of the above
Ans: Update
9. Match the following:
Group A Group B
a) Indexing data i) Retrieves data conditionally
b) Long Text ii) DBMS
c) Fox Pro iii) Memo field
d) Query iv) Searching fast
v)Report
a) Indexing data i) Retrieves data conditionally
b) Long Text ii) DBMS
c) Fox Pro iii) Memo field
d) Query iv) Searching fast
v)Report
Ans:
Group A Group Ba) Indexing data - Searching fast
b) Long Text - Memo field
c) Fox Pro - DBMS
d) Query - Retrieves data conditionally
b) Long Text - Memo field
c) Fox Pro - DBMS
d) Query - Retrieves data conditionally
Group C
Programming (18 marks)
Programming (18 marks)
10. a) Mention the types of procedure.
Ans: The types of procedures are:
i. Function Procedure
ii. Sub Procedure
b) Write any one difference between Q-Basic and C language.
Ans: The difference between Q-Basic and C language are as follows:
Q-Basic
|
C language
|
It is mostly used to design application software.
|
It is mostly used to prepare system software.
|
c) Write the functions of the following:
i) KILL ii) RMDIR
Ans: The function of:
i. KILL: It deletes the file or files from the specified drive or directory.
ii. RMDIR: It removes or deletes only sub directory from a disk
11. Rewrite the following program after correcting the bugs.Rem to display the contents of a data file.
OPEN “Marks.dat” FOR OUTPUT AS #1
CLS
WHILE EOF(1)
INPUT #1, Name$, Age, Add$
DISPLAY Name$, Age, Add$
WEND
CLOSE 1
END
OPEN “Marks.dat” FOR OUTPUT AS #1
CLS
WHILE EOF(1)
INPUT #1, Name$, Age, Add$
DISPLAY Name$, Age, Add$
WEND
CLOSE 1
END
Ans:
Rem to display the contents of a data file.
OPEN “Marks.dat” FOR INPUT AS #1
CLS
WHILE NOTEOF(1)
INPUT #1, Name$, Age, Add$
PRINT Name$, Age, Add$
WEND
CLOSE #1
END
OPEN “Marks.dat” FOR INPUT AS #1
CLS
WHILE NOTEOF(1)
INPUT #1, Name$, Age, Add$
PRINT Name$, Age, Add$
WEND
CLOSE #1
END
12. Write down the output of the following program:DECLARE FUNCTION area(L,B)
LET L=10
LET B=5
PRINT “The area=”; area(L,B)
END
FUNCTION area(L,B)
A=L*B
area=A
END FUNCTION
13. Analyse the program and answer the following question:
DECLARE SUB ABC(X,Y,Z)
FOR P=1 TO 3
READ A,B,C
CALL ABC(A,B,C)
NEXT P
DATA 5,4,3,2,1,6,7,8,4
END
SUB ABC(X,Y,Z)
T=X+Y+Z
IF T MOD 2 = 0 THEN
PRINT T
END IF
END SUB
a) List any two variables used in the above program.
Ans: Any two variables used in the above program are: A and B
b) How many times SUB-procedure will be called when program is executed?
Ans: SUB-procedure will be called 3 times when the program is executed.
14.a) Write a program in QBASIC to find the total surface area of a box using FUNCTION….END FUNCTION.
Ans:
DECLARE FUNCTION TSA(L,B,H)
CLS
INPUT “Enter length, breadth and height”; L,B,H
PRINT “The total surface area of box=”; TSA(L,B,H)
END
FUNCTION TSA(L,B,H)
T=2*(L*B+B*H+L*H)
TSA=T
END FUNCTION
b) Write a program to input three different numbers in the main module then find the greatest number using SUB….END SUB.
Ans:
DECLARE SUB GREAT(A,B,C)
CLS
INPUT “Enter any three numbers”; A,B,C
CALL GREAT(A,B,C)
END
SUB GREAT(A,B,C)
IF A>B AND A>C THEB
PRINT A;”is greatest number”
ELSEIF B>A AND B>C THEN
PRINT B;”is greatest number”
ELSE
PRINT C;”is greatest number”
END IF
END SUB
c) Write a program to view those records from “Employee.dat” sequential data file having employee’s name, department, appointment data and salary whose salary is more than Rs.5000.
Ans:
OPEN “EMPLOYEE.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, D$, AD$, S
IF S > 5000 THEN PRINT N$, D$, AD$, S
WEND
CLOSE #1
END
Comments