SLC Qualifying Examination SET C
SHREE GAURI SHANKAR HIGHER SECONDARY SCHOOL
Subject: Optional I: Computer Science Full Marks: 50
Time: 1:30 hrs Pass Marks: 16
Candidates are required to answer in their own words as far as practicable. Credit will be given to originality, not to rote-learning.
Attempt ALL the questions.
Computer Fundamentals (22 Marks)
1. Answer the following questions: [5×2=10]
a) Define Protocol ? Differentiate between protocol and topology.
b) What is password policy? How can password help in security?
c) Explain how does a virus work?
d) What is Multimedia? Explain its importance in any education.
e) What is cracking? How does it promote cyber crime?
2. a. Convert as instructed: [2×1=2]
i. (9AB)16 into Decimal ii. (1110101)2 into Octal
b. Perform binary calculations: [2×1=2]
i. (11101 + 10101) × 101 ii. (11000 ÷ 111)
3. Give the full forms of the following acronyms. [4×0.5=2]
a. HTTP b. ICT c. STP d. TCP
4. Match the following pairs: [4×0.5=2]
Router A computer in a network that utilizes the resources of other computer network
Client A self-sufficient computer that acts both as a server and a client
Server Any network device that can connect to the network and can transfer network data.
Peer The computer on the network that does all the processing for the user
5. Replace the following definitions with a technical term: [4×0.5=2]
a. Set of rules used to connect computers on Internet.
b. Technique of providing governance information and services through the Internet.
c. A set of instructions in plain English to do any jobs.
d. The sharpness of the image on the monitor screen determined by the number of pixels.
6. Select the best alternatives: [4×0.5=2]
a. ……… is method of making data transmitted over the network readable only by the receiver
i. Hacking ii. Encryption iii. Code iv. None of these
b. ……… is the generic term used to refer all the legal and regulatory aspects of Internet.
i. Cyber Ethics ii. Cyber Law iii. Cyberspace iv. Both I and II
c. ……… is the amount of memory needed to store four bits.
i. KB ii. Nibble iii. Byte iv. Word
d. ……… is a dedicated server responsible for storing and forwarding electronic mails.
i. Print server ii. Database server iii. Mail server iv. Client server
MS Access (10 Marks)
7. Answer the following questions in short: [3×2=6]
a. What is Table? Differentiate it with a Database.
b. Why is a table called primary object of database? Write any two components of table.
c. What is relationship? Why is relationship in database important.
8. Fill in the blanks: [4×0.5=2]
a. …........... supports different types of data to store for future.
b. A field in a table that matches the primary key column of another table is called ……….
c. ……… is a database object that extracts data from multiple tables based on a given criteria.
d. The maximum number of characters that a text data type can hold is ……….
9. State whether the following statements are true or false: [4×0.5=2]
a. Database cannot store the image data.
b. OLE is used to store music or sound in a database.
c. Field name can be up to 64 characters long.
d. A primary key helps to maintain data redundancy.
QBASIC Programming (18 Marks)
10. Answer the following questions:
a. What is modular programming? List any two advantages. 1
b Explain the programming structure of C. 1
c. Write down the use and syntax of the following functions. 1
i. EOF ii. FILES
11. Write the output of the given program: 
DECLARE SUB PRO (A, B$)
N = 62
INPUT “Enter a word”; S$
CALL PRO (N, S$)
PRINT “End of the Game.”
SUB PRO (A , B$)
X = A
R = X MOD 8
B$ = STR$ (R) + B$
X = (X - R) / 8
LOOP UNTIL X = 0
12. Rewrite the given program after correcting the bugs: 
REM SUM OF EVEN DIGITS
DECLARE FUNCTION RST (N)
INPUT "ENTER ANY NUMBER"; NUM
PRINT RESULT (N)
FUNCTION RST (N)
DO UNTIL N = 0
R = N MOD 10
IF R MOD 2 <> 0 THEN
S = S - R
N = N \ 10
S = RESULT()
13. Study the program and answer questions followed: [2×1=2]
DECLARE SUB MultiTABLE()
SHARED Num, Range
INPUT "Enter a number to generate a table: "; Num
INPUT "The Range of the table"; Range
FOR i = 1 TO Range
PRINT num; "*"; i; "="; Num * i
i. Write the use of CALL statement in the above program
ii. What change shall be made in the program if the SHARED statement is removed?
14. a. Write a program to print longest word among three different input words using FUNCTION…….END FUNCTION and print the number of characters in all three words. 3
b. Write a sub procedure to test if an input number is divisible by three and print the result. 3
c. A data file “Records.dat” which has numerous records in it with Name, Address, and Telephone numbers in it. Write a program to read the records and print those with age >18. 3