NEB 2071 computer science questions and solutions
set A
HSEB-GRADE XII - 2071(2014)
Computer Science [230-Supplementary]
Time: 3 hrs
Pass Marks: 27
Group “A”
Long Answer questions 4x10=40
Attempts any Four questions:
1.What are the data types available in C programming? Explain in details with examples.10
Ans:-
Integers:- An integer can be a whole number but not a fractional number. It can accept any + ve or –ve number. It is very common type of data used by computer. When we add/subtract/divide/multiply, we get integer but if output is in fractional, the system just truncates that decimal part and returns only integer part. Like 1+2 yields 3. 3 divided by 2 yields 1. For this data type in some language, we use some suffix like % or word like ‘int’.
Floating part:- If we are going to write a program which includes some like fraction type of data then we use this data type. Like, 1.23, -.34.45 etc. the computers recognize the real numbers having fractions easily and processes accordingly. For float type of data, we use some words like ‘float’ and some where suffix like ! or #.
Character type:- Simply a letter or a number or space or any other symbol which we use in program is called character. A single character is placed in a single quote like ‘a’ or ‘,’ or ‘1’ etc. but, if we combine many characters then we put inside double quote like “computer”, it has 8 characters. For this type, we use reserved word like ‘char’ in C and some where it is not needed.
String type: A data type which contains many characters together and mostly put inside double quote (in most language) is called string. Like “computing” or “education” etc. for this, we use reserved word char with some index value. In C, we can write char name[20];. Here name is a string type of data and holds up to 20 characters.
This data type is used for exponential values and for more accuracy of digits.It's working range is more than others. so if we want to use long numbers of any type and high accuracy then...? for example,
double ab;
'ab' is a variable of double type. It can store exponential values (3x104). It ca n be written as 3e+4 or 3E+4. If power is in negative form then it can be in 3e-4 or 3E-4. It has one advantage over others that it can be used in place of others easily.
2.What is looping? Write a program to calculate and display the multiplication table using loop.2+8
Ans:-
#include<stdio.h>
#include<conio.h>
void main()
{
int k=1,n;
printf("enter value of 'n'(as a number)\n");
scanf("%d",&n);
while(k<=10)
{
printf("%d*%d=%d\n",n,k,n*k);
k++;
}
getch();
}
Ans:-
The strcat() function is used to join or concatenate one string into another string.
Syntax:
strcat(strl,str2);
where str1,str2 are two strings. The content of string str2 is concatenated with string str1.
#include <stdio.h>
#include<string.h>
int main()
{
char str1[100],str2[100];
printf("Enter two strings = ");
scanf("%s%s",str1,str2);
strcat(str1,str2);
printf("After copying the string is %s ", str1);
return 0;
}
Syntax:-
strcpy(string1,string2);
or strcpy(destination,source);
When we copy string, this is done from source to destination (string2 to string1). If first is empty then there would not be over-writing.
Example;
#include<stdio.h>
#include<string.h>
void main()
{
char string1[100]="APPLE";
char string2[100]="grapes";
printf("copied string =%s",strcpy(string1,string2));
}
output-
We get here string1=grapes. Because 'grapes' is copied to firs string named "APPLE". We can also write in reverse order.
Syntax:
v=strcmp(strl,str2);
Where, str1 and str2 are two strings to be compared and v is a value returned by the function which is either zero(equal), positive value(descending) or negative value(ascending).
#include <stdio.h>
#include<string.h>
int main()
{
char str1[50],str2[50];
printf("Enter two strings : ");
scanf("%s%s",str1,str2);
int v=strcmp(str1,str2);
if(v==0)
printf("Both strings are same and have same ASCII value");
else if(v>0)
printf("%s comes after %s or %s has more ASCII value than %s",str1,str2,str1,str2);
else
printf("%s comes before %s or %s has more ASCII value than %s",str2,str1,str2,str1);
return 0;
}
syntax:
identifer=strlen(string);
For example,
#include<stdio.h>
#include<string.h>
void main()
{
char string[100]="apple";
int k;
k=strlen(string);
printf("length=%d",k);
}
It returns 5. It also counts white spaces present in a string.
If we want want , we can also input string using scanf() or gets().
It reverses the string given by us.
syntax:- strrev(string);
example:
#include<stdio.h>
#include<string.h>
void main()
{
char string[100]="apple";
printf("reverseed string=%s",strrev(string));
}
We get output "elppa". Instead of putting in output line, we can put it before printf.
4.Write a program to arrange the elements of an array in ascending order.10
Ans:-
#include<stdio.h>
#include<conio.h>
void main()
{
clrscr();
int arr[200];
int size;
int i,j,k;
printf("enter size of elements \n");
scanf("%d",&size);
printf("enter array's elements\n");
for(i=0;i<size;i++)
{
printf("enter elements for location=%d\n",i);
scanf("%d",&arr[i]);
}
printf("elements' sorting process started\n");
for(i=0;i<size;i++)
{
for(j=i+1;j<size;j++)
{
if(arr[i]>arr[j])
{
k=arr[i];
arr[i]=arr[j];
arr[j]=k;
}
}
}
printf("in ascending order,elements are\n");
for(i=0;i<size;i++)
{
printf("%d\n",arr[i]);
}
getch();
}
5.What is “fscanf” function? Write a program to display name, age and address reading from a file named “record.dat”.10
Ans:-
syntax:-
Group “B”
Short Answer questions 7x5=35
Attempts any Seven questions:
6.What is feasibility study? Why it is necessary before designing a system.2+3
Ans:-
why feasibility study? To get answer of following questions before we start actual development of system, we need fesaibility study.
What exactly is the project? Is it possible? Is it practicable? Can it be done?
Economic feasibility, technical feasibility, schedule feasibility, and operational feasibility - are the benefits greater than the costs?
Technical feasibility - do we 'have the technology'? If not, can we get it?
Schedule feasibility - will the system be ready on time?
Customer profile: Estimation of customers/revenues.
Determination of competitive advantage.
Operational feasibility - do we have the resources to build the system? Will the system be acceptable? Will people use it?
Current market segments: projected growth in each market segment and a review of what is currently on the market.
Vision/mission statement.
· Definition of proposed operations/management structure and management method etc.
Ans:-
A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics.
Purpose of networking:-
Networking for communication medium (have communication among people;internal or external)
Resource sharing (files, printers, hard drives, cd-rom/)
Higher reliability ( to support a computer by another if that computer is down)
Higher flexibility( different system can be connected without any problems)
- Sharing devices such as printers saves money.
- Site (software) licences are likely to be cheaper than buying several standalone licences.
- Files can easily be shared between users.
- Network users can communicate by email and instant messenger.
- Security is good - users cannot see other users' files unlike on stand-alone machines.
- Data is easy to backup as all the data is stored on the file server.
8.What is MS-Access? What are the basic components of Microsoft Access? List out.5
Or
What are operators used in C-programming? Explain with examples.1+4
- Tables.
- Queries.
- Relationships.
- Macros.
- Forms.
- Reports.
- Module
for example: +,-,= etc
It is of following types.
1)Arithmetic operator: It is used to do arithmetic calculations/operation.
It has following types.
+ -----------> used for addition.example is a+b. It means we are performing addition with the help of operand a and b
- ------------>It is used for subtraction.Example is a-b. It means we are performing subtraction with the help of operand a and b
* -------------------->used for multiplication.example is a*b. It means we are performing multiplication with the help of operand a and b
/---------------->used for division.example is a/b. It means we are performing division with the help of operand a and b
example
int a=5;
if(!(a==5))
{
printf("it is\n");
}
else
{
printf("it is not\n");
}
here ,the value is 5 but we get output "it is not".It is called reversing the output.
4) Assignment operator:
an operator ,symbolized by '=' character,is called assignment operator.It assigns value to variable.
example:
int a=6;
It means, we are assignming value 6 to variable a.
5)Unary operator:- this operator works on one operand only.It has two types.
I) increment operator:- It increases the value of given variable by one.For example: ++y or y++
It can be classified into pre-increment and post increment.
pre-increment:- It is written as ++x.It means first increase the value and then use that.
post-increment: It is written as x++.It means, first use that and then increase its value by one.
II)decrement operator:- It decreases the value of given variable by one.For example: --y or y--
It can be classified into pre-decrement and post decrement.
pre-decrement:- It is written as --x.It means first decrease the value and then use that.
post-decrement: It is written as x--.It means, first use that and then decrease its value by one.
9.Explain the array and structure with examples.2.5+2.5
Ans:-
Declaration of Array:
datatype array_name [size];
Example: - int marks [10]; int x[4]={1,2,3,4};
Array size is fixed at the time of array declaration.
Generally, we use for loop () to assign data or item in memory and also use this loop to extract data from memory location.
Types of Array:
There are 2 types of array.
a) One Dimensional Array (1-D): IT is an array where we use one subscript value.It stores value in row in contigous cells.
b) Two Dimensional Array (2-D):an array where we may use two or more than two subscript values.
| Column zero | Column one |
Row 0 à | 1(0,0) | 2(0,1) |
Row 1à | 3(1,0) | 4(1,1) |
Ans:-
Or
What is expert system? Explain the fields of expert system.1+4
- Information delivery is greatly simplified for citizens and businesses.
- It gives varied departments’ information to the public and helps in decision making.
- It ensures citizen participation at all levels of governance.
- It leads to automated services so that all works of public welfare is available to all citizens.
- It revolutionizes the functions of the government and ensures transparency.
- Each department and its actions is closely monitored.
- Public can get their work smartly done and save their time.
- It provides better services to citizens and brings government close to public. Public can be in touch with the government agency.
- It cuts middlemen and bribery if any.
Ans:-
2)Multimedia in Entertainment: Computer graphics techniques are now commonly use in making movies and games. this increase the growth of multimedia.
3)Movies: Multimedia used in movies gives a special audio and video effect. Today multimedia has totally changed the art of making movies in the world. Difficult effect, action are only possible through multimedia.
Accessibility
Multimedia requires electricity to be operated, which may not be available in some rural areas or may not be consistently available due to shortages and blackouts.
Distracting
Mulitimedia may take away the focus from the lesson due to its attention-grabbing formats.
Costly
Production of multimedia is more expensive than others because it is made up of more than one medium.Production of multimedia requires an electronic device, which may be relatively expensive.
Multimedia requires electricity to run, which adds to the cost of its use.
a) Digital divide b) Social impact of ICT
Ans:-
The digital divide is a problem that affects people from all walks of life. It is a multifaceted issue, but two main characteristics define this gap: access to high-speed internet and access to reliable devices. Many of the individuals who struggle from the digital divide face both.
In some areas, internet access is either limited, unavailable, or unaffordable for those who could be equipped. Even with a reliable internet connection, access to certain digital spaces can remain a challenge, always just out of reach for those who can’t afford costly tools like laptops and software.
This leaves countless students and professionals to rely on public computers or their mobile devices as their only tools to exist in an increasingly digital world. It leaves many more, like those in rural areas or living under the poverty line, without even that.
Positive impacts in society:-
1.File sharing/transferring:-
A file can be put on a "Shared Location" or onto a File Server for instant use by colleagues does not matter what is a size of file and how many will use it. Mirror servers and peer-to-peer networks can be used to ease the load of data transfer.
2.Internet banking:-
We know that almost all banks now-a-days are using this technology for its customers as an extra facility. Internet Banking/ Online Banking allows bank customers to do financial transactions on a website operated by the banks. The customers can do almost any kind of transaction on the secured websites. They can check their account balance, transfer funds, pay bills, etc. but security is a major issue for thi
Ans:-
15.Write short notes on :
a) Protocol b) Data Security
Ans:-
We have many examples like http, ftp, stp, tcp/IP etc.
TCP is one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets, TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees delivery of data and also guarantees that packets will be delivered in the same order in which they were sent.
Where as IP specifies the format of packets, also called datagram, and the addressing scheme. Most networks combine IP with a higher-level protocol called Transmission Control Protocol (TCP), which establishes a virtual connection between a destination and a source.
Ans:-
- Physical: - It says about sites where data is stored must be physically secured.
- Human: - It is an authorization is given to user to reduce chance of any information leakage or manipulation.
- Operating system: We must take a foolproof operating system regarding security such that no weakness in o.s.
- Network: - since database is shared in network so the software level security for database must be maintained.
- Database system: - the data in database needs final level of access control i.e. a user only should be allowed to read and issue queries but not should be allowed to modify data
THE END
---------------------------------------------------------------------------------------------------
set B
-----
HSEB-GRADE XII - 2071(2014)
Computer Science [230-D]
Time: 3 hrs Full Marks : 75
Pass Marks: 27
Group “A”
Long Answer questions 4x10=40
Attempts any Four questions:
1.Write a program which reads name of 100 students and sort them in alphabetical order.10
Ans:-
Sequence: Our program contains many lines of codes or instructions. This says about execution of lines one after another in a sequence or order. While writing program the codes should be in certain sequence to get desired output if not then we may get some like unexpected output. Flowchart can be used to represent like given below.
HERE, WE CAN SEE HOW A PROGRAM EXECUTES WRITTEN IN QB. AT FIRST, FIRST LINE GETS EXECUTED THEN SECOND AND SO ON.
SELECTION: THIS LOGICAL PART SAYS ABOUT “SELECTION OF CERTAIN BLOCK OF STATEMENTS/PARTS/” BUT UNDER CERTAIN CONDITION. IN OUR DAILY LIFE ALSO WE USE THIS CONCEPT, DON’T WE? LET’S TAKE AN EXAMPLE; IF I HAVE RS. 1000 THEN I WOULD DO THIS/THAT, IF NOT, THEN NOTHING I WILL. SO, YOU DO NOT THINK THAT IT’S SIMPLE TO UNDERSTAND ABOUT SELECTION. IN OUR PROGRAM, SOME WHERE WE HAVE TO USE THIS CONCEPT VERY FREQUENTLY. IT CAN BE REPRESENTED BY USING FLOW CHART AS GIVEN BELOW.
A SAMPLE PROGRAM IN QB/C LOOKS LIKE:
we can see here how an execution takes place. At first the condition is tested ,if it is satisfying then many instructions one after another execute and if the condition does not satisfy then other instruction get executed.
Just like if.... we can use other selection structure like if..else if,switch... etc if there are multiple conditions to be tested or included. they work in same manner as ‘if’ works as shown above.
Iteration (Looping):-It simply says execution of different statements/blocks again and again repeatedly under certain condition. When the condition dissatisfies, the execution stops. This is called iteration or looping. With the help of flowchart, we can represent as
In above flowchart or code we can see that there is an entry point ,condition testing and then executing many instructions,this execution just goes on or repeats again and again after checking condition.when the condition becomes false the further movement or execution does not occur and termination takes place.
For looping, we can use different other statements in same manner like while or do.. while or do...until etc. The working way and syntax are little bit different but we get same output.
second part:-
//'C' program to know a number is even or odd
#include<stdio.h>
#include<conio.h>
void main()
{
int x;
printf("enter a number\n");
scanf("%d",&x);
if(x%2==0)
{
printf("it is an even number");
}
else
{
printf("it is an odd number\n");
}
getch();
}
Ans:-
A pointer is a variable that stores a memory address. Pointers are used to store the addresses of other variables or memory items. Pointers are very useful for another type of parameter passing, usually referred to as Pass By Address. Pointers are essential for dynamic memory allocation.
Benefits:
1.It handles memory effectively.
2.Useful in file handling
3.Reduces spaces.
4.REduces execution time.
Example:
#include<stdio.h>
int main()
{
int *k;
int m=90;
k=&m;
printf("address=%d",k);
printf("value=%d",*k);
return 0;
}
here , k is a pointer and will store address of a variable m. It is then printed using printf(). To print its value we have to use indirection operator.
Ans:-
Declaration of Array:
datatype array_name [size];
Example: - int marks [10]; int x[4]={1,2,3,4};
Array size is fixed at the time of array declaration.
Generally, we use for loop () to assign data or item in memory and also use this loop to extract data from memory location.
Types of Array:
There are 2 types of array.
a) One Dimensional Array (1-D): IT is an array where we use one subscript value.It stores value in row in contigous cells.
b) Two Dimensional Array (2-D):an array where we may use two or more than two subscript values.
| Column zero | Column one |
Row 0 à | 1(0,0) | 2(0,1) |
Row 1à | 3(1,0) | 4(1,1) |
Ans:-
Short Answer questions 7x5=35
Attempts any Seven questions:
6.Describe different levels of feasibility study.5
Ans:-
It has following types.
7.Who is system analyst? List out the roles of system analyst.1+4
Ans:-
The persons who perform above task/system analysis,design and implementation activity is know as system analyst. Somewhere we say or call by names like business engineer, business analyst etc. The work of system analyst who designs an information system is just same as an architect of a house. They work as facilitators of the development of information systems and computer applications.
8.What is RDBMS? List out the functions of RDBMS.1+4
Ans:-
9.Describe “Operators” which are used in C-programming.5
for example: +,-,= etc
It is of following types.
1)Arithmetic operator: It is used to do arithmetic calculations/operation.
It has following types.
+ -----------> used for addition.example is a+b. It means we are performing addition with the help of operand a and b
- ------------>It is used for subtraction.Example is a-b. It means we are performing subtraction with the help of operand a and b
* -------------------->used for multiplication.example is a*b. It means we are performing multiplication with the help of operand a and b
/---------------->used for division.example is a/b. It means we are performing division with the help of operand a and b
example
int a=5;
if(!(a==5))
{
printf("it is\n");
}
else
{
printf("it is not\n");
}
here ,the value is 5 but we get output "it is not".It is called reversing the output.
4) Assignment operator:
an operator ,symbolized by '=' character,is called assignment operator.It assigns value to variable.
example:
int a=6;
It means, we are assignming value 6 to variable a.
5)Unary operator:- this operator works on one operand only.It has two types.
I) increment operator:- It increases the value of given variable by one.For example: ++y or y++
It can be classified into pre-increment and post increment.
pre-increment:- It is written as ++x.It means first increase the value and then use that.
post-increment: It is written as x++.It means, first use that and then increase its value by one.
II)decrement operator:- It decreases the value of given variable by one.For example: --y or y--
It can be classified into pre-decrement and post decrement.
pre-decrement:- It is written as --x.It means first decrease the value and then use that.
post-decrement: It is written as x--.It means, first use that and then decrease its value by one.
Ans:-
Networking:
A computer network, often simply referred to as a network, is a collection of computers and devices connected by communications channels that facilitates communications among users and allows users to share resources with other users. Networks may be classified according to a wide variety of characteristics.
Purpose of networking:-
Networking for communication medium (have communication among people;internal or external)
Resource sharing (files, printers, hard drives, cd-rom/)
Higher reliability ( to support a computer by another if that computer is down)
Higher flexibility( different system can be connected without any problems)
Scalable (computers and devices can be added with time without changing original network.
provides distributed and centralized management system for enterprise.
increase productivity.
cost reduction by sharing one application/hardware etc.
Application of networking in our daily life:
-E-mail (to send or get mails electronically worldwide)
- Scheduling programs and having meetings at same time across world.
- Video conferencing with sound without delay.
-teleconferencing for people.
-Automate banking facility
-to surf Internet facility
-telecommuting to work at home by accessing remote computer
-doing business and marketing
11.Describe the importance of OOP.5Ans:-
12.Describe computer crime and its various forms.5
Ans:-
Below is a listing of the different types of computer crimes today. Clicking on any of the links below gives further information about each crime.
Child pornography - Making or distributing child pornography.
Cyber terrorism - Hacking, threats, and blackmailing towards a business or person.
Cyberbully or Cyberstalking - Harassing others online.
Creating Malware - Writing, creating, or distributing malware (e.g. viruses and spyware.)
Denial of Service attack - Overloading a system with so many requests it cannot serve normal requests.
Espionage - Spying on a person or business
13.What is multimedia? List out the advantages of multimedia.1+4
Ans:-
2)Multimedia in Entertainment: Computer graphics techniques are now commonly use in making movies and games. this increase the growth of multimedia.
3)Movies: Multimedia used in movies gives a special audio and video effect. Today multimedia has totally changed the art of making movies in the world. Difficult effect, action are only possible through multimedia.
4)Games: Multimedia used in games by using computer graphics, animation, videos have changed the gaming experience. Presently, games provides fast action, 3-D effects and high quality sound effects which is only possible through multimedia.
5)Multimedia in Business: Today multimedia is used in every aspect of business. These are some of the applications:
14.Describe the objectives of e-governance.5
Ans:-
2.One of its goals is to create a cooperative structure between the government and the people and to seek help and advice from the people, to make the government aware of the problems of the people.
3.To increase and encourage people’s participation in the governance process.
4.e-Governance improves the country’s information and communication technology and electronic media, with the aim of strengthening the country’s economy by keeping governments, people and businesses in tune with the modern world.
5.One of its main objectives is to establish transparency and accountability in the governance process.
15.Write short notes on :
a) Cyber Law b) Expert System
Ans:-
Cyber law is a new and quickly developing area of the law that pertains to persons and companies participating in e-commerce development, online business formation, electronic copyright, web image trademarks, software and data licenses, online financial transactions, interactive media, domain name disputes, computer software and hardware, web privacy, software development and cybercrime which includes, credit card fraud, hacking, software piracy, electronic stalking and other computer related offenses.
set C
-------
HSEB-GRADE XII - 2071(2014)
Computer Science [230-C]
Time: 3 hrs
Group “A”
Long Answer questions 4x10=40
Attempts any Four questions:
1.What is function? Write a program to generate factorial of a given number using recursive function2+8
Ans:-
1. Function Declaration (Function Prototype)
2. Function Call
3. Function Definition
For example,
#include <stdio.h>
#include <stdlib.h>
int recur(int n);
int main()
{
int n;
printf("ente a number\n");
scanf("%d",&n);
printf("the factorial value is\n");
printf("%d",recur(n));
getch();
return 0;
}
int recur(int n)
{
if(n<=0)
{
return 1;
}
else
{
return n*recur(n-1);
}
}
2.Describe any five “file string handling functions” with examples.10
Ans:-
syntax:
identifer=strlen(string);
For example,
#include<stdio.h>
#include<string.h>
void main()
{
char string[100]="apple";
int k;
k=strlen(string);
printf("length=%d",k);
}
It returns 5. It also counts white spaces present in a string.
If we want want , we can also input string using scanf() or gets().
2)strrev():- It reverses the string given by us.
syntax:- strrev(string);
example:
#include<stdio.h>
#include<string.h>
void main()
{
char string[100]="apple";
printf("reverseed string=%s",strrev(string));
}
We get output "elppa". Instead of putting in output line, we can put it before printf.
3)strlwr(): This function is used to convert given string into lower case.
syntax:-
strlwr(string);
Example;
#include<stdio.h>
#include<string.h>
void main()
{
char string[100]="APPLE";
printf("string in lowercase=%s",strlwr(string));
}
It gives us "apple" as an output.
4)strupr():This string function is used to convert all characters of string into upper case.
syntax:
strupr(string);
example:-
#include<stdio.h>
#include<string.h>
void main()
{
char string[100]="apple";
printf("string in uppercase=%s",strupr(string));
}
Syntax:-
strcpy(string1,string2);
or strcpy(destination,source);
When we copy string, this is done from source to destination (string2 to string1). If first is empty then there would not be over-writing.
Example;
#include<stdio.h>
#include<string.h>
void main()
{
char string1[100]="APPLE";
char string2[100]="grapes";
printf("copied string =%s",strcpy(string1,string2));
}
output-
We get here string1=grapes. Because 'grapes' is copied to firs string named "APPLE". We can also write in reverse order.
Like these all, we have many other string handling functions like, strcat(),strchr(),strdup(),strset() etc.
3.What is looping? Describe “for”, “while” and “do-while” loops with appropriate examples.1+9
Ans:-
Definition:-
It executes the program statements repeatedly until the given condition is true. It checks the condition at first; if it is found true then it executes the statements written in its body part otherwise it just gets out of the loop structure. It is also known as entry control or pre-test loop.Syntax of while Loop:
initialization;
while(condition)
{
statements;
increment/decrement;
}
Where initialization means starting point, control means stopping points and increment/decrement means counter.
Flowchart:-
Examaple:
#include<stdio.h>
int main()
{
int i=1;
while(i<=20)
{
printf("%d,",i);
i=i+1;
}
return 0;
}
Output:
If we execute this we will get 1,2,3....20
do..while loop:-
initialization;
do
{
statements;
increment/decrement;
int main()
{
int i=1;
do
{
printf("%d,",i);
i=i+1;
}while(i<=20);
return 0;
}
Output:
If we execute this we will get 1,2,3....20
for loop:-
for(initialization;condition;increment/decrement )
{
statements;
}
int main()
{
int i;
for(i=1;i<=20;i++)
{
printf("%d,",i);
}
return 0;
}
Output:
If we execute this we will get 1,2,3....20
Ans:-
5.Write a program to find greatest number among four numbers.10
Ans:-
Short Answer questions 7x5=35
Attempts any Seven questions:
6.What is system analysis and design? Describe briefly.5
Ans:-
Once the problems identified, it is time to analyze the type of software that could answer the problems encountered. System analysis (may be by system analyst) will take a look at possible software. The goal of a system analysis is to know the properties and functions of software that would answer the concerns solicited from intended users.
System Analysis would lead in determining the requirements needed in software. These requirements in software should be implemented otherwise the software may not answer the concerns or may lack in its usage. This stage will somehow determine how the software should function.
It is the study of complete business system or parts of business system and application of information gained from that study to design,documentation and implementation of new or improved system. This field is closely related to operations research. An analyst work with users to determine the expectation of users from the proposed system.
The development of a computer-based information system often comprises the use of a systems analyst. When a computer-based information system is developed, systems analysis would constitute the following steps/points.
The development of a feasibility study, involving determining whether a project is economically, socially,, technologically, organisationally,legally, schedule feasible.
Conducting fact-finding measures, designed to ascertain the requirements of the system's end-users typically interviewing, questionnaires, or visual observations of work on the existing system.
In this phase we start design of proposed new system.It describes desired features and operations in detail, including screen layouts, business rules, process diagrams, pseudo code and other documentation. We can use two designing methods namely logical (what is required for IS) and physical (how to achieve requirements). At first we design logical and then it is converted into physical design. A prototype should be developed during the logical design phase if possible. The detailed design phase modifies the logical design and produces a final detailed design, which includes technology choices, specifies a system architecture, meets all system goals for performance, and still has all of the application functionality and behavior specified in the logical design.
This design can carry following activities:
Defining precisely the required system output
Determining the data requirement for producing the output
Determining the medium and format of files and databases
Devising processing methods and use of software to produce output
Determine the methods of data capture and data input
Designing Input forms
Designing Codification Schemes
Detailed manual procedures
Documenting the Design
We can use several tools while designing. They are: Algorithm, Flowchart, Pseudocode, etc. Let’s see in detail about these all designing tools.
7.What is database? List out the advantages of database management system.1+4Ans:-
- Reduced data redundancy
- Improved data security
- Reduced data entry, storage, and retrieval costs
- Facilitated development of new applications program
- improved data integrity (integrity:data should be accurate & accurate; it is done by providing some checks
- multiple users.
- Database systems are complex, difficult, and time-consuming to design
- Substantial hardware and software start-up costs
- Initial training required for all programmers and users
A DBMS is a system software package that helps the use of integrated collection of data records and files known as databases. It allows different user application programs to easily access the same database. DBMSs may use any of a variety of database models, such as the network model or relational model. In large systems, a DBMS allows users and other software to store and retrieve data in a structured way. Instead of having to write computer programs to extract information, user can ask simple questions in a query language.
Its roles can be listed as given below.
1. provides an interface to the user as well as to application
2. lets user to create,maintain databases.
3. provides high integrity and security to its data.
4. provides sharing facility to many users.
5. provides relationships between tables.
6. provides access level to different users.
7. maintains integrity,consistency of data e
8.What is Network topology? Describe any two network topologies with clear diagram.1+4
Ans:-
star topology:
Data on a star network passes through the hub, switch, or concentrator before continuing to its destination. The hub, switch, or concentrator manages and controls all functions of the network.
It also acts as a repeater for the data flow. This configuration is common with twisted pair cable; however, it can also be used with coaxial cable or fiber optic cable.
Fig. 2. Star topology
Advantages of a Star Topology
Easy to install and wire.
No disruptions to the network when connecting or removing devices.
Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
Requires more cable length than a linear topology.
If the hub, switch, or concentrator fails, nodes attached are disabled.
- Reduced chances of data collision as each node release a data packet after receiving the token.
- Token passing makes ring topology perform better than bus topology under heavy traffic.
- No need of server to control connectivity among the nodes.10. Describe the wireless network system. List out deices and equipment necessary for Wi-Fi network. 3+2
9.Describe the centralized and distributed database systems.5
Ans:-
Centralized system | Distributed System |
1.Job is centralized. | 1.Job is distributed. |
2. Can not process if main server fails. | 2. Can still be if a server fails;processing can be done by other servers. |
3. Security is given to one machine. | 3.Security is given to all. |
4.No need to have network for communication. | 4 Needs communication channel between all. |
5.Not so expensive to set up. | 5.It’s expensive to set up. |
6.Data speed is comparatively fast. | 6.Data speed is slow. |
7.Low quality performance. Diagrammatically it can be shown as | 7.High quality performance. Diagrammatically it can shown |
10.Describe the “coaxial cable” and “satellite” with examples.2.5+2.5
Ans:-
- It is an electrical cable with an inner conductor surrounded by a flexible, tubular insulating layer, surrounded by a tubular conducting shield.
- The term coaxial comes from the inner conductor and the outer shield sharing the same geometric axis.
- Coaxial cable is used as a transmission line for radio frequency signals, in applications such as connecting radio transmitters and receivers with their antennas, computer network (Internet) connections, and distributing cable television signals and uses many connectors.
- It is available in two types thin (10base2; means 100 MBPS and upto 200 meter) and thick (10base5 coax;means 10 MBPS, and upto 5oo meter). They are different in diameter and bandwidth. Most of television operators use this. They are obsolete and no longer in use for computer networking
- In the context of spaceflight, a satellite is an object which has been placed into orbit by human endeavor. Such objects are sometimes called artificial satellites to distinguish them from natural satellites such as the Moon.
- Satellites are usually semi-independent computer-controlled systems. Satellite subsystems attend many tasks, such as power generation, thermal control, telemetry, altitude control and orbit control
- satellite has on board computer to control and monitor system.
- Additionally, it has radio antennae (receiver and transmitter) with which it can communicate with ground crew.
- Most of the satellites have attitude control system(ACS).It keeps the satellite in right direction.
- Common types include military and civilian Earth observation satellites, communications satellites, navigation satellites, weather satellites, and research satellites. Space stations and human spacecraft in orbit are also satellites.
- Satellite orbits vary greatly, depending on the purpose of the satellite, and are classified in a number of ways. Well-known (overlapping) classes include low Earth orbit, polar orbit, and geostationary orbit.
11.Describe the different data types which are used in C-programming.5
Ans:-
Integers:- An integer can be a whole number but not a fractional number. It can accept any + ve or –ve number. It is very common type of data used by computer. When we add/subtract/divide/multiply, we get integer but if output is in fractional, the system just truncates that decimal part and returns only integer part. Like 1+2 yields 3. 3 divided by 2 yields 1. For this data type in some language, we use some suffix like % or word like ‘int’.
Floating part:- If we are going to write a program which includes some like fraction type of data then we use this data type. Like, 1.23, -.34.45 etc. the computers recognize the real numbers having fractions easily and processes accordingly. For float type of data, we use some words like ‘float’ and some where suffix like ! or #.
Character type:- Simply a letter or a number or space or any other symbol which we use in program is called character. A single character is placed in a single quote like ‘a’ or ‘,’ or ‘1’ etc. but, if we combine many characters then we put inside double quote like “computer”, it has 8 characters. For this type, we use reserved word like ‘char’ in C and some where it is not needed.
String type: A data type which contains many characters together and mostly put inside double quote (in most language) is called string. Like “computing” or “education” etc. for this, we use reserved word char with some index value. In C, we can write char name[20];. Here name is a string type of data and holds up to 20 characters.
This data type is used for exponential values and for more accuracy of digits.It's working range is more than others. so if we want to use long numbers of any type and high accuracy then...? for example,
double ab;
'ab' is a variable of double type. It can store exponential values (3x104). It ca n be written as 3e+4 or 3E+4. If power is in negative form then it can be in 3e-4 or 3E-4. It has one advantage over others that it can be used in place of others easily.
Ans:-
- Modularity for easier troubleshooting. Something has gone wrong, and you have no idea where to look. ...
- Reuse of code through inheritance. ...
- Flexibility through polymorphism. ...
- Effective problem solving.
13.Describe the applications areas of AI.5
Ans:-
14.Describe the advantages of multimedia.5
Ans:-
2)Multimedia in Entertainment: Computer graphics techniques are now commonly use in making movies and games. this increase the growth of multimedia.
3)Movies: Multimedia used in movies gives a special audio and video effect. Today multimedia has totally changed the art of making movies in the world. Difficult effect, action are only possible through multimedia.
4)Games: Multimedia used in games by using computer graphics, animation, videos have changed the gaming experience. Presently, games provides fast action, 3-D effects and high quality sound effects which is only possible through multimedia.
5)Multimedia in Business: Today multimedia is used in every aspect of business. These are some of the applications:
15.Write short notes on :2.5+2.5
a) E-commerce b) Normalization
Ans:-
- Online shopping web sites for retail sales direct to consumers
- Providing or participating in online marketplaces, which process third-party business-to-consumer or consumer-to-consumer sales
- Business-to-business buying and selling
- Gathering and using demographic data through web contacts and social media
- Business-to-business (B2B) electronic data interchange
- Marketing to prospective and established customers by e-mail or fax (for example, with newsletters)
- Engaging in pretail for launching new products and services
- Online financial exchanges for currency exchanges or trading purposes
Ans:-
All Slots | Online Casinos
ReplyDeleteWith a xo 카지노 progressive jackpot, you're 카지노싸이트 sure to get a better 온라인포커 chance of winning. We've got everything you need 룰렛 만들기 to be ready to dive into the world's 토토 사이트 제작 biggest slot