SLC
Qualifying Examination SET C
SHREE GAURI SHANKAR
HIGHER SECONDARY SCHOOL
Subject: Optional I: Computer
Science
Full Marks: 50
Time: 1:30
hrs
Pass Marks: 16
Candidates are required to answer in their
own words as far as practicable. Credit will be given to originality, not to
rote-learning.
Attempt ALL the questions.
Group 'A'
Computer Fundamentals (22
Marks)
1. Answer the
following
questions:
[5×2=10]
a)
Define Protocol ? Differentiate between protocol and topology.
b)
What is password policy? How can password help in security?
c)
Explain how does a virus work?
d)
What is Multimedia? Explain its importance in any education.
e)
What is cracking? How does it promote cyber crime?
2. a.
Convert as
instructed:
[2×1=2]
i. (9AB)16 into
Decimal
ii. (1110101)2 into Octal
b. Perform binary
calculations:
[2×1=2]
i. (11101 +
10101) × 101
ii. (11000 ÷ 111)
3. Give the full
forms of the following
acronyms.
[4×0.5=2]
a. HTTP
b. ICT
c. STP
d. TCP
4. Match the following
pairs:
[4×0.5=2]
Router A computer in a network that
utilizes the resources of other computer network
Client
A self-sufficient computer
that acts both as a server and a client
Server
Any network device that can
connect to the network and can transfer network data.
Peer
The computer on the network
that does all the processing for the user
5. Replace the
following definitions with a technical term: [4×0.5=2]
a.
Set of rules used to connect computers on Internet.
b.
Technique of providing governance information and services through the
Internet.
c.
A set of instructions in plain English to do any jobs.
d.
The sharpness of the image on the monitor screen determined by the number of
pixels.
6. Select the best
alternatives:
[4×0.5=2]
a.
……… is method of making data transmitted over the network
readable only by the receiver
i. Hacking ii.
Encryption iii. Code iv. None of
these
b.
……… is the generic term used to refer all the legal and
regulatory aspects of Internet.
i.
Cyber Ethics ii. Cyber Law iii.
Cyberspace iv. Both I and II
c.
……… is the amount of memory needed to store four bits.
i. KB
ii. Nibble
iii. Byte iv.
Word
d.
……… is a dedicated server responsible for storing and
forwarding electronic mails.
i.
Print server ii. Database server iii. Mail
server iv. Client server
Group 'B'
MS Access (10 Marks)
7. Answer the
following questions in
short:
[3×2=6]
a.
What is Table? Differentiate it with a Database.
b.
Why is a table called primary object of database? Write any two components of
table.
c.
What is relationship? Why is relationship in database important.
8. Fill in the
blanks:
[4×0.5=2]
a.
…........... supports different types of data to store for future.
b.
A field in a table that matches the primary key column of another table is
called ……….
c.
……… is a database object that extracts data from multiple tables based on
a given criteria.
d.
The maximum number of characters that a text data type can hold is ……….
9. State whether
the following statements are true or false: [4×0.5=2]
a.
Database cannot store the image data.
b.
OLE is used to store music or sound in a database.
c.
Field name can be up to 64 characters long.
d.
A primary key helps to maintain data redundancy.
Group 'C'
QBASIC Programming (18
Marks)
10. Answer the following
questions:
a.
What is modular programming? List any two advantages. 1
b
Explain the programming structure of
C.
1
c.
Write down the use and syntax of the following
functions. 1
i. EOF
ii. FILES
11. Write the output of the
given
program:
[2]
DECLARE
SUB PRO (A, B$)
N
= 62
INPUT
“Enter a word”; S$
CALL
PRO (N, S$)
PRINT
“End of the Game.”
END
SUB
PRO (A , B$)
X
= A
DO
R = X MOD 8
B$ = STR$ (R) + B$
X = (X - R) / 8
LOOP
UNTIL X = 0
PRINT
B$
END
SUB
12. Rewrite the given program
after correcting the
bugs:
[2]
REM
SUM OF EVEN DIGITS
DECLARE
FUNCTION RST (N)
INPUT
"ENTER ANY NUMBER"; NUM
PRINT
RESULT (N)
END
FUNCTION
RST (N)
DO
UNTIL N = 0
R = N MOD 10
IF R MOD 2 <> 0 THEN
S = S - R
END IF
N = N \ 10
LOOP
S
= RESULT()
END FUNCTION
13. Study the program and
answer questions followed:
[2×1=2]
DECLARE
SUB MultiTABLE()
SHARED
Num, Range
INPUT
"Enter a number to generate a table: "; Num
INPUT
"The Range of the table"; Range
CALL
MultiTABLE
END
SUB
MultiTABLE
FOR
i = 1 TO Range
PRINT num; "*"; i; "="; Num * i
NEXT
i
END
SUB
i. Write the
use of CALL statement in the above program
ii. What change
shall be made in the program if the SHARED statement is removed?
14.
a. Write a program to print longest word among three
different input words using FUNCTION…….END FUNCTION and print the number of
characters in all three words. 3
b. Write a sub procedure to test if an input number is
divisible by three and print the result. 3
c. A data file “Records.dat” which has numerous records
in it with Name, Address, and Telephone numbers in it. Write a program to read
the records and print those with age >18.
3
=