SLC Qualifying Examination SET C Computer Science Question

Wednesday, October 26, 2016

SLC Qualifying Examination SET C Computer Science Question

SLC Qualifying Examination SET C
SHREE GAURI SHANKAR HIGHER SECONDARY SCHOOL
Subject: Optional I: Computer Science                              Full Marks: 50
Time: 1:30 hrs                                                                  Pass Marks: 16

Candidates are required to answer in their own words as far as practicable. Credit will be given to originality, not to rote-learning.

Attempt ALL the questions.

Group 'A'
Computer Fundamentals (22 Marks)
1.     Answer the following questions:                                      [5×2=10]
a)     Define Protocol ? Differentiate between protocol and topology.
b)     What is password policy? How can password help in security?
c)     Explain how does a virus work?
d)     What is Multimedia? Explain its importance in any education.
e)     What is cracking? How does it promote cyber crime?

2.     a.     Convert as instructed:                                               [2×1=2]
i.      (9AB)16 into Decimal               ii.         (1110101)2 into Octal
        b.     Perform binary calculations:                                     [2×1=2]  
i.      (11101 + 10101) × 101             ii.         (11000 ÷ 111)

3.     Give the full forms of the following acronyms.              [4×0.5=2]
        a. HTTP                b. ICT                          c. STP                          d.  TCP

4.     Match the following pairs:                                              [4×0.5=2]
Router                  A computer in a network that utilizes the resources of other computer network
Client                   A self-sufficient computer that acts both as a server and a client
Server                  Any network device that can connect to the network and can transfer network data.
Peer                     The computer on the network that does all the processing for the user
5.     Replace the following definitions with a technical term: [4×0.5=2]
a.     Set of rules used to connect computers on Internet. 
b.     Technique of providing governance information and services through the Internet.
c.     A set of instructions in plain English to do any jobs.
d.     The sharpness of the image on the monitor screen determined by the number of pixels.

6.     Select the best alternatives:                                            [4×0.5=2]
a.     ……… is method of making data transmitted over the network readable only by the receiver
        i. Hacking         ii. Encryption       iii. Code  iv. None of these
b.     ……… is the generic term used to refer all the legal and regulatory aspects of Internet.
        i. Cyber Ethics  ii. Cyber Law     iii. Cyberspace   iv.  Both I and II
c.     ……… is the amount of memory needed to store four bits.
        i. KB                 ii. Nibble           iii. Byte            iv. Word
d.     ……… is a dedicated server responsible for storing and forwarding electronic mails.
        i. Print server    ii. Database server   iii. Mail server  iv. Client server

Group 'B'
MS Access (10 Marks)
7.     Answer the following questions in short:                          [3×2=6]
a.     What is Table? Differentiate it with a Database.
b.     Why is a table called primary object of database? Write any two components of table.
c.     What is relationship? Why is relationship in database important.

8.     Fill in the blanks:                                                             [4×0.5=2]
a.     …........... supports different types of data to store for future.
b.     A field in a table that matches the primary key column of another table is called ……….
c.     ……… is a database object that extracts data from multiple tables based on a  given criteria.
d.     The maximum number of characters that a text data type can hold is ……….
9.     State whether the following statements are true or false: [4×0.5=2]
a.     Database cannot store the image data.
b.     OLE is used to store music or sound in a database.
c.     Field name can be up to 64 characters long.
d.     A primary key helps to maintain data redundancy.
                                                                                                                                                
Group 'C'
QBASIC Programming (18 Marks)
10.   Answer the following questions:                                                    
a.     What is modular programming? List any two advantages.     1
b      Explain the programming structure of  C.                               1
c.     Write down the use and syntax of the following functions.    1
        i. EOF                                   ii. FILES

11.   Write the output of the given program:                                    [2]       
DECLARE SUB PRO (A, B$)
N = 62
INPUT “Enter a word”; S$
CALL PRO (N, S$)
PRINT “End of the Game.”
END

SUB PRO (A , B$)
X = A
DO
   R = X MOD 8
   B$ = STR$ (R) + B$
   X = (X - R) / 8
LOOP UNTIL X = 0
PRINT B$
END SUB

12.   Rewrite the given program after correcting the bugs:             [2]
REM SUM OF EVEN DIGITS
DECLARE FUNCTION RST (N)
INPUT "ENTER ANY NUMBER"; NUM
PRINT RESULT (N)
END
FUNCTION RST (N)
DO UNTIL N = 0
  R = N MOD 10
    IF R MOD 2 <> 0 THEN
      S = S - R
    END IF
    N = N \ 10
LOOP
S = RESULT()
      END FUNCTION

13.   Study the program and answer questions followed:         [2×1=2]
DECLARE SUB MultiTABLE()
SHARED Num, Range
INPUT "Enter a number to generate a table: "; Num
INPUT "The Range of the table"; Range
CALL MultiTABLE
END

SUB MultiTABLE
FOR i = 1 TO Range
  PRINT num; "*"; i; "="; Num * i
NEXT i
END SUB
i.      Write the use of CALL statement in the above program
ii.     What change shall be made in the program if the SHARED statement is removed?

 14.  a.     Write a program to print longest word among three different input words using FUNCTION…….END FUNCTION and print the number of characters in all three words.  3
        b.     Write a sub procedure to test if an input number is divisible by three and print the result.   3
        c.     A data file “Records.dat” which has numerous records in it with Name, Address, and Telephone numbers in it. Write a program to read the records and print those with age >18.           3         
       

=