DOEACC A Level A5-R3: STRUCTURED SYSTEM ANALYSIS AND DESIGN PAPER

Started by ganeshbala, Mar 13, 2009, 08:34 PM

Previous topic - Next topic

ganeshbala

DOEACC A Level A5-R3: STRUCTURED SYSTEM ANALYSIS AND DESIGN QUESTION PAPER

A5-R3: STRUCTURED SYSTEM ANALYSIS AND DESIGN

NOTE:

1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to
the question paper, as per the instructions contained therein. PART ONE is NOT to
be 1answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for

TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)


PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the "tear-off" answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which phase of Waterfall model decides whether the system is worthwhile executing or
not?
A) Requirement Analysis
B) Feasibility Analysis
C) Coding
D) System Design

1.2 Running the system under a live environment using Live data in order to find errors is known
as
A) Beta Testing
B) Alpha Testing
C) Acceptance Testing
D) System Testing

1.3 The detailed Graphical representation of the logic flow of data within the module is called as
A) Pseudo code
B) Program Flow chart
C) Structure Chart
D) None of the above

1.4 In an ER-Diagram, a weak entity is defined as
A) An Entity which is not dependent on any key.
B) An Entity, which is neither a key nor a part of a key.
C) An Entity, which is not a key itself but a part of a key.
D) An Entity, which is a key as well as part of a key.


1.5 The purpose of Database Normalization is
A) To eliminate the redundancy of data
B) To simplify planning of data
C) To achieve incremental approach of database
D) All of the above


1.6 The systems which are composed of only ideas, policies and theories and not of any
physical entity are called as
A) Closed Systems
B) Abstract Systems
C) Decision Support Systems
D) Adaptive systems

1.7 Which of the following tool of structured Analysis uses, narrative statements to describe a
procedure
A) Data Dictionary
B) Warnier – Orr Diagrams
C) Structure Chart
D) Structured English

1.8 Costs that are known to exist but whose financial value can not be accurately measured are
called as
A) Indirect Costs
B) Intangible Costs
C) Tangible Costs
D) Variable Costs

1.9 A Design concept which is natural extension of the information hiding concept and is defined
as the strength of different elements with in a module: -
A) Coupling
B) Cohesion
C) Abstraction
D) Problem Partitioning

1.10The solution to the problem of Risk analysis is attributed to –
A) Iterative Model
B) Spiral Model
C) Waterfall Model
D) Fountain Model

Q2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the "tear-off" sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Random File organization is not suited for applications requiring online enquiry.

2.2 Development of system with prototyping is always cheaper.

2.3 Testing is an expensive method for identification and removal for faults (bugs) in the system.

2.4 Data Dictionary is used to locate errors in the system descriptions.

2.5 An SRS should not be unambiguous.

2.6 Questionnaire is more expensive than conducting interviews of users scattered in many
branches.

2.7 The Net Benefit method does not consider the time value of money.

2.8 Owing to Technical Feasibility study, financial resources and budget is not considered.

2.9 The Analyst need not be a good trainer.

2.10 A Prototype is not an example of graphical method.


Q3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the "tear-off" answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y

3.1 Bottom-Up Design A. It is the process of creating, developing and refining a
working model of the final operational system.

3.2 Integration Testing B. It is dataflow-based methodology that identifies inputs
and outputs and describes the functional aspects of the
system.

3.3 Structure design C. It is a diagram showing the alternative actions that can
be performed in a process depending upon different
sets of conditions.

3.4 Data Dictionary D. A Type of maintenance that changes the software to
correct defects.

3.5 Adaptive Maintenance E. It is isolated from environmental influences.

3.6 Closed System F. Testing the interfaces between related modules of a
system.

3.7 Structured Walkthrough G. It is a design tool used to show the flow of data through
a system.

3.8 MIS H. It is a catalogue of all data elements, data structure and
processes described in logical DFD's.

3.9 Library Files I. It is a refined orientation of available sources of
information, which enables managers to tie planning
and control procedures to operational system of
implementation.

3.10 Prototyping J. It is an interchange of ideas among peers who review a
product presented by its author and agrees on the
validity of a proposed solution to a problem.

K. This design approach is basically based on the principle
of data abstraction.

L. These files generally contain application programs,
utility programs and system software package.

M. These files are copies made for long-term storage of
data that may be required at a much later date.

N. A Type of maintenance, which results in modification to
the software to accommodate changes to its external environment.

Q4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the "tear-off" answer sheet attached to the
question paper, following instructions therein. (1 x 10)
A. DBA B. Subsystem C. Data Collection
D. Encryption E. Coupling F. Legal Feasibility
G. DBMS H. Password I. Operational Feasibility
J. Implementation K. Decryption L. Logical DFD
M. Design N. Physical DFD O. Cohesion
P. Technical Feasibility

4.1Control is ________ that controls the activities of inputs, outputs and processors.

4.2The first level of Network security is the ________ protection.

4.3________ is an effective and practical method to secure data?

4.4System documentation is generally prepared during ________ phase of SDLC.

4.5________ is the person who is responsible for overall control of DBMS.

4.6The advantage of ________ is that it maintains the integrity to ensure that the data is
correct.

4.7________ is the strength of interconnections between modules.

4.8The DFD, which represent the model of the current system (manual or computerized), are
known as ________.

4.9________ is an important part of feasibility analysis and system analysis phases of SDLC.

4.10________ Ensures that the proposed system abides by all the laws of the business.



PART TWO
(Answer any FOUR questions)

5. a) Discuss the important characteristics of a system with proper examples. [5]
b) Distinguish between initial investigation and feasibility study. In what way are they
related to each other? [5]
c) Elaborate the technical and interpersonal skills required for a system analyst. [5]


6.a) What is 'Payback Method' of cost evaluation? Determine the feasibility of a project
based on this method for following data: [9]
- Capital invested on purchase of h/w and s/w – Rs. 100,000
- Benefits - Rs. 200,000
- Investment Credit - 10%
- Cost Investment - Rs. 20,000
- Company's Income Tax Bracket - 40%
- Local Taxes - 4%
- Installation Period - 1 Year
- Expected Life of Capital - 5 years
b) Distinguish in brief between the following: [6]
i) Brainstorming and Delphi Method
ii) Dichotomous and multiple choice questions
iii) Structural and Functional Testing


7.a) Enumerate the steps of structured Design Methodology.[6]
b) Elaborate the concepts of Coupling and cohesion in reference to modular design
approach. [5]
c) What are the different rules used while constructing the DFD? [4]


8. a) List and illustrate the primary uses and elements of a decision table with rules, which
should be followed in constructing decision tables. [5]
b) Write short notes on BPR (Business Process Reengineering) and CASE Tools. [5]
c) Compare the Object-Oriented approach with Module Oriented approach. [5]


9. a) What is the role of the audit control trail in conversion? Who performs it? Explain. [5]
b) What is the purpose behind Normalization? How does one normalize a file? Illustrate. [5]
c) What is a form? Summarize the characteristics of action, memory and report forms. [5]



Source : isc

ganeshbala

A4-R3: COMPUTER ORGANIZATION

NOTE:

1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to
the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for


TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)


PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the "tear-off" answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 A microprocessor has a data bus with 32 lines and address bus with 20 lines. The
maximum number of bits that can be stored in this memory is
A) 32 x 220
B) 32 x 232
C) 20 x 220
D) 20 x 232

1.2 Which memory is faster?
A) Register
B) Cache
C) RAM
D) Hard disk

1.3 Which of the following gates are called universal gates?
A) AND and OR
B) AND and NAND
C) XOR and XNOR
D) NAND and NOR

1.4 The decimal number +14 can be represented in 6 bit two's complement format as
A) 010010
B) 101110
C) 001110
D) 110010

1.5 The full adder performs binary addition on
A) 2 binary digits
B) 3 binary digits
C) 2 decimal digits
D) 3 decimal digits


1.6 A reverse polish notation is evaluated with the help of
A) Stack
B) RAM
C) ROM
D) None of the above

1.7 Pipeline arithmetic units are used to implement
A) Floating point operations
B) Multiplication of fixed-point numbers
C) A) and B) both
D) None of the above

1.8 In NOR latch, race condition occurs when
A) R=0, S=0
B) R=0, S=1
C) R=1, S=0
D) R=1, S=1

1.9 A register which can be incremented or decremented and whose primary function is
point to data, is called
A) Accumulator
B) Program Counter
C) Flat register
D) Index register

1.10 Which of the following is not arithmetic instruction?
A) MUL
B) STORE
C) INC
D) NEG


Q2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the "tear-off" sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Unicode uses 16 bits to represent a character.

2.2 The advantage of immediate addressing is to restrict the operand to a number that fits
an address field.

2.3 Traps are synchronous procedures.

2.4 An Array processor is an example of SIMD.

2.5 The adjacent min terms in K-Map always differ by one bit.

2.6 The racing problem do not exists in RS flip-flop.

2.7 Scanner is one type of I/O device.

2.8 Program written using assembly language must be translated in machine language
before it can be executed.

2.9 CD-ROM uses magnetic field to store information on its surface.

2.10 The bus can be shared by more than one device.


Q3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the "tear-off" answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y

3.1 Half Adder A. Flip-flop

3.2 Registers B. FIFO

3.3 Radix C. Postfix notation

3.4 Instruction cycle D. Combinational circuit

3.5 Subroutine E. External interrupts

3.6 Stack F. Multiplexers

3.7 Reverse Polish notation G. LIFO

3.8 Traps H. A set of instructions

3.9 Strobe I. Base of Numeral System

3.10 Hit Ratio J. Fetch and decode instruction

K. Internal interrupts

L. Asynchronous Data Transfer

M. Prefix notation

N. Mask programming

O. Cache Memory performance measurement



Q4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the "tear-off" answer sheet attached to the
question paper, following instructions therein. (1 x 10)
A. CISC B. RISC C. Mantissa
D. Truth table E. MSI F. Isolated
G. ROM H. Direct address mode I. Flow chart
J. Encoder K. Speed L. Flip-flop
M. Locality N. RAM O. Exponent
P. Register Q. Program counter R. Indirect address mode
S. Accumulator T. VLSI U. Decoder

4.1 The cache memory works on the principle of ________.

4.2 In ________ the memory cells can be accessed for information transfer from any desired
random location.

4.3 A typical characteristic of ________ machine is that its instruction set size is kept less.

4.4 A(n) ________ is a binary cell capable of storing one bit of information.

4.5 A circuit that converts from binary to decimal is called ________.

4.6 The input-output relationship of binary variable of each gate can be represented in
tabular form by ________.

4.7 ________ devices contain thousands of gates within a single package.

4.8 A floating point number is normalized if most significant digit of the ________ is nonzero.

4.9 The ________ holds the address of next instruction to be read from memory after
current instruction is executed.

4.10 In ________ the effective address is equal to the address part of instruction.



PART TWO
(Answer any FOUR questions)


5. a) What is multiplexer? Draw diagram for 4-to-1 line multiplexer and explain role of data
selector in multiplexer. [5]
b) Explain the function of 4 bit adder-subtractor. [4]
c) Specify the IEEE proposed floating point single format representation in hexadecimal for
number: -38.5 [3]
d) Fill the missing values in the following expression. [3]
(27)10 = ( ______ )2 = ( ______ )8 = ( ______ )16


6. a) What is difference between a direct and indirect address instruction? How many
references to memory are needed for each type of instruction to bring an operand into a
processor register? [4]
b) Simplify the following Boolean function in product-of-sums form by means of four
variable map. Draw the logic diagram with OR-AND gates. [5]
F(w, x, y, z) = å (2, 3, 4, 5, 6, 7, 11, 14,15)
c) Show step by step multiplication process using Booth algorithm when the following
binary numbers are multiplied. [6]
Assume 5-bit register hold signed number. The multiplicand is +15.
(+15) x (+13)


7. a) Draw block diagram of DMA controller. Explain, how it works. [6]
b) List types of shift micro operations and explain circular shift micro operations. [5]
c) A digital computer has a memory unit of 64K x 16 and cache memory of 1K words. The
cache uses direct mapping with a block size of four words. How many bits are there in
the tag, index, block and the word fields of the address format? [4]


8. a) Describe the concurrency control and deadlock of an operating system. [6]
b) What is Interrupt? Explain in brief, different types of interrupt with example.[5]
c) Give difference between handshaking method and strobe pulse method of asynchronous
data transfer. [4]


9. a) What do you mean by virtual memory? Explain concept of address space and memory
space. [5]
b) What do you mean by forward reference problem? How assembler can solve this
problem? [5]
c) Write an assembly program to reverse a given string. [5]

ganeshbala

M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH 'C' LANGUAGE

NOTE:

1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to
the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for

TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)


1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the "tear-off" answer sheet attached to the question
paper, following instructions therein. (1 x 10)
1.1 int z, x=5, y=-10, a=4, b=2;
z=x++ - --y * b / a;
What will be the final value of z?
A) 5
B) 6
C) 10
D) 11

1.2 With every use of memory allocation function, what function should be used to release
allocated memory which is no longer needed?
A) dropmem( )
B) dealloc( )
C) release( )
D) free( )

1.3 int warr[3][2][2] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12};
What will be the value of warr[2][1][0]?
A) 5
B) 7
C) 9
D) 11

1.4 char *ptr;
char myString[ ] = "abcdefg";
ptr = myString;
ptr += 5;
The pointer ptr points to which string?
A) fg
B) efg
C) defg
D) cdefg


1.5 Suppose that x is initialized as:
short int x; /* assume x is 16 bits in size */
What is the maximum number that can be printed using printf ("%d\n", x),
A) 127
B) 128
C) 255
D) 32,767

1.6 When applied to a variable, what does the unary "&" operator yield?
A) The variable's address
B) The variable's right value
C) The variable's binary form
D) The variable's value

1.7 How is a variable accessed from another file?
A) via the extern specifier.
B) via the auto specifier.
C) via the global specifier.
D) via the pointer specifier.

1.8 What does the following function print?
func(int i)
{if(i%2) return 0;
else return 1;}
main( )
{
int=3;
i=func(i);
i=func(i);
printf("%d", i);
}
A) 3
B) 1
C) 0
D) 2

1.9 Given the piece of code
int a[50];
int *pa;
pa=a;
To access the 6th element of the array which of the following is incorrect?
A) *(a+5)
B) a[5]
C) pa[5]
D) *(*pa + 5)

1.10 Regarding the scope of the variables; identify the incorrect statement:
A) automatic variables are automatically initialized to 0
B) static variables are automatically initialized to 0
C) the address of a register variable is not accessible
D) static variables cannot be initialized with any expression



Q2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the "tear-off" sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 'C' programs are converted into machine language with the help of an interpreter.

2.2 Every 'C' program must contain a main( ).

2.3 Putchar( ) is used only for single character input.

2.4 calloc(...) allocates a block of memory for an array of elements of a certain size.

2.5 A printf( ) statement can generate only one line of output.

2.6 A switch expression can be of any data type.

2.7 'While' is an entry as well as exit controlled loop statement.

2.8 'C' treats character string simply as arrays of characters.

2.9 A function in 'C' should have at least one argument.

2.10 sprintf(...) writes data to the character array whereas printf(...) writes data to the
standard output device.


Q3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the "tear-off" answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y

3.1 Data structure used by malloc for object creation A. %

3.2 Operator for giving remainder B. call by reference

3.3 do-while C. entry controlled loop

3.4 while D. a^=b^=a^=b

3.5 func1(x, y) is an example of E. object file

3.6 assignment of a with b F. heap

3.7 Which is not portable? G. call by value

3.8 Which is not possible in C? H. exit controlled loop

3.9 Swan a and b without temporary variable I. a = b

3.10 Compiler converts a source File to J. binary file

K. No match

L. #

M. textfile

N. a > b


Q4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the "tear-off" answer sheet attached to the question
paper, following instructions therein. (1 x 10)

A. Macro B. One or zero C. Randomly
D. External E. Max F. True
G. String H. Automatic I. Extern
J. Register K. Dynamic L. SWITCH
M. Word Not Available N. EOF O. Arbitrary
P. typeDef


4.1 An external variable definition must not begin with storage class specifier ________.

4.2 A register variable is expected to be placed in the machine ________.

4.3 For ________ and static variables, initialisers must be constant expressions.

4.4 When a function calls itself, each invocation gets a fresh set of ________ variables,
independent of the previous invocation.

4.5 #define statement calls for simplest type of ________ substitution.

4.6 The function lseek provide a way to read or write a file in ________ order.

4.7 printf("%.*s", max, s) can be used to print at most ________ characters from a string s.

4.8 FILE is defined with a(n) ________ statement.

4.9 The process of allocating memory at run time is known as ________.

4.10 The function getchar( ) returns ________ when there is no more input character.


PART TWO
(Answer any FOUR questions)

5. a) What is structured programming? Explain and give examples of relevant constructs
using pseudo-code. Highlight the advantages and disadvantages of structured
programming. [8]
b) What is an execution error? Differentiate it from syntactic error. Give examples. [3]
c) It is said that 'C' is a middle level assembly language. Mention those features of 'C'
which enable this description. [4]


6. a) Write and explain the action of WHILE statement. Develop a program in 'C' language to
compute the average of every third integer number lying between 1 and 100. Include
appropriate documentation.[7]
b) Develop a function to calculate sum of n even integers starting from a given even
integer.[5]
c) Identify all the compound statements which appear in the following program segment: [3]
{
sum=0;
do {
scanf("%d", &i);
if (i < 0)
{
i=-i;
++flag;
}
sum += i;
} while (i != 0);
}


7. a) Define an array. How are arrays processed in 'C'? Illustrate by taking two-dimensional
arrays as examples. [4]
b) What are subscripts? How are they specified? What restrictions apply to the values that
can be assigned to subscripts in 'C' language? [4]
c) Write a 'C' program that will enter a line of text, store in an array and then display
backwards. The length of the line should be undefined, (being terminated by ENTER
key), but less than 80 characters. [7]


8. a) What is a pointer in 'C'? How is a pointer variable declared? Give examples and explain.
Enumerate the utility of pointer variables. [4]
b) A program in 'C' language contains the following declaration: [5]
static int x[8] = {1,2,3,4,5,6,7,8};
i) What is the meaning of x?
ii) What is the meaning of (x + 2)?
iii) What is the meaning of *x?
iv) What is the meaning of (*x + 2)?
v) What is the meaning of *(x + 2)?
c) What is a structure? How does a structure differ from a union? Give examples. For what
kind of applications, union data structure is useful? How are arrays different from
structure? [6]


9. a) How can a procedure be defined in 'C'? Give an example. Bring out the differences
between function and procedure. [6]
b) Draw a flowchart and then develop an interactive 'C' program which finds whether a
given integer number is prime or not. Make use of a function subprogram. [9]

ganeshbala

M1-R3: IT TOOLS AND APPLICATIONS

NOTE:

1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to
the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for



PART ONE. TOTAL TIME: 3 HOURS TOTAL MARKS: 100 PART ONE – 40;

PART TWO – 60)

PART ONE
Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the "tear-off" answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 The connection between the computers and peripherals is called a
A) Port
B) Bus
C) I/O device
D) None of the above

1.2 Which one of the following is External DOS Command?
A) COPY
B) FORMAT
C) DEL
D) DIR

1.3 Virtual Memory is
A) Part of main memory only used for swapping
B) A technique to allow a program, of size more than the size of the main memory to run
C) Part of secondary storage used in program execution
D) None of the above

1.4 Baud rate is
A) The difference between the lowest and the highest frequency transmitted
B) Transmission capacity
C) Transmission speed of channel
D) None of the above.

1.5 Software designed for a specific purpose is called as
A) System Software
B) Compiler
C) Specific Software
D) Application Software

1.6 Functions of operating system are:
A) Processor Management
B) Memory Management
C) Input/Output Management
D) All of the above

1.7 Which of the following charts is not likely to be included in an analysis or presentation
graphics package?
A) Bar
B) Pie
C) Temperature
D) Line

1.8 The printers that produce the output by pressing a print element and an inked ribbon
against the face of a continuous paper form is called:
A) Impact printer
B) Non-impact printer
C) Scanning printers
D) None of the above

1.9 The utility used to increase the speed of programs is called
A) Disk Fragmenter
B) Disk Cleanup
C) Disk Formatter
D) None of the above

1.10 Find the odd one out:
A) NORTON
B) McAFee
C) eScan
D) None of the above


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the "tear-off" sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Motherboard is the main circuit board in the computer where memory, CPU and other
components are plugged in.

2.2 Cache memory makes memory transfer rates higher and thus raise the speed of the
processor.

2.3 The laser printer uses a technology called thermal process.

2.4 You can protect scenario so other users cannot change or modify it.

2.5 Without a mouse one cannot work with MS-WINDOWS.

2.6 Folders organize files on a disk.

2.7 In Linux error messages are placed in a standard byte stream called the standard error.

2.8 In DOS system FATs are stored before boot sector.

2.9 #REF! Error in MS-Excel occurs when the formula refers to an invalie cell.

2.10MICR stands for Magnetic Ink Course Reader.


3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the "tear-off" answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
1.FAT A. Is Dos command, indicates, which directories MS-DOS should search.
2.Pivot Table B. Mixed Reference
3.To introduce page break C. Non impact printer
4.$G$10 D. CTRL+ENTER
5.Hyper-link can be
identified by E. The formula cannot use the number supplied.
6.#NUM1 F. Summarizes information within a worksheet.
7.PATH G. A table that the OS uses to search files on a DISK.
8.Slide Workspace H. Refers to the hierarchy of data in the spreadsheet.
9.Ink-jet Printer I. SHIFT+ENTER
10.Level J. underline
K. Impact printer
L. Absolute Reference
M. The large white area where slides are created, viewed and edited.


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the "tear-off" answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. 46687 B. Autoexec.Bat C. Macro
D. 1,073,741,824 E. Portrait F. 46567
G. Command.com H. Shortcut I. 1,048,576
J. Bulleted effects K. Universal Serial Bus L. Operating System
M. Unified Sorted Bullets N. Consolidate O. Mouse

4.1 Icons with an arrow in the lower left corner are ________ icons.

4.2 The decimal equivalent of hexadecimal number B65F is ________.

4.3 1 GB is equal to ________ bytes.

4.4 An organized collection of software that controls the overall operations of a computer is called as ________.

4.5 ________ is a collection of keystrokes that is created and saved in an assigned control key.

4.6 Internal commands in DOS are present in ________.

4.7 Outline view in power point displays contents in ________.

4.8 USB stands for ________.

4.9 ________ combines values of multiple worksheets into selected cells.

4.10 ________ is a pointing device.



PART TWO
(Answer any FOUR questions)
5. a) In MS-Windows environment, what is the difference in using "My Computer" from
"Windows Explorer" for exploring contents of a computer? [3]
b) When is a disk said to be fragmented? Write one disadvantage of a fragmented disk. [6]
c) Explain the following DOS commands: [6]
i) DELTREE
ii) RMDIR
iii) VER

6. a) What is an Open Source Software? What are the advantages and disadvantages of
using Open Source Software? [5]
b) What is multimedia? Discuss the role of multimedia in Marketing. [5]
c) Draw a block diagram showing components of a computer. Explain functions of CPU in
detail. [5]

7. a) Explain Macro in reference to MS-Excel by giving a suitable example. What is an
automatic macro? [4]
b) There are 500 employees in a company and their information stored in a database. Each
record contains Employee Number, Employee Name, Employee Address, Gender, Basic
pay, DA, HRA and Total Pay. Assume that this data is transferred to a worksheet where
each row refers to record of an employee. Now it is required to display only those
records which fulfil the following condition:
Display only those records who are females and their Total Pay is greater than
10,000.
Name the command in Excel that will be used for the above mentioned task and explain
the procedure step by step. [3]
c) Explain the following: [8]
i) Embedded Charts
ii) Absolute reference
iii) Legend
iv) Relative reference

8. a) What are non-impact printers? Explain briefly any two of them. [6]
b) What is a computer virus? What is the remedy available for computer viruses? How
does it differ from a bug? [3]
c) What is template? What is the difference between a template and wizard? [6]

9. a) Describe the Mail Merge operation in Microsoft Word. What is Mail Merge Helper? What
are the steps involved in its usage? [5]
b) Convert (24.25)8 to equivalent decimal number and hexadecimal number. [5]
c) Explain about Animating Objects and Text while preparing slides presentation. [5]

ganeshbala

M3-R3: INTERNET AND WEB PAGE DESIGN
NOTE:

1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to
the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for

TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the "tear-off" answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Computers on the internet owned and operated by educational institutions form part of
the
A) com domain
B) edu domain
C) mil domain
D) None of the above

1.2 Unix is
A) A person
B) A file
C) A program for copying files from one computer to another
D) An Operating system

1.3 The Internet protocol (IP)
A) Ensures that connections are maintained between computers.
B) Handles software computer addresses.
C) Finds the quickest route between two computers.
D) None of the above.

1.4 The method of transferring files with roots in Unix is
A) Bin Hex
B) Unencoding
C) FTP
D) Telnet

1.5 A web publishing tool developed by Microsoft is
A) Netscape Navigator
B) Front Page
C) Page Mill
D) Hot Metal

1.6 In time division multiplexing (TDM)
A) Several signals are sent on separate channels
B) Several signals are sent in time slotted mode on a channel
C) One signal is sent to several users
D) None of the above

1.7 SMTP is a simple
A) TCP protocol
B) TCP/IP protocol
C) IP protocol
D) None of the above

1.8 On the internet, which version of the Internet Protocol is the most widely used?
A) IPv1
B) IPv3
C) IPv4
D) IPv6

1.9 Web pages are uniquely defined using
A) IP addresses
B) URL
C) Domain
D) Filename

1.10 What is a cookie?
A) Computer code used to show animations and play sound.
B) Information sent to your computer that is used later to give information back to a visited
web site.
C) Computer code that automatically records all purchases and payments you make from
your computer.
D) An advertisement that will at some time be displayed on your computer screen.


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the "tear-off" sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 All web addresses start with http:\\

2.2 In a ring topology, any node can communicate with any other node directly.

2.3 SMTP is associated with electronic mail.

2.4 A single hypertext document can contain link to one document on the World Wide Web.

2.5 HTML does not allow construction dynamic web pages.

2.6 JPEG is a lossless compression technique.

2.7 IP addresses are unique.

2.8 There are upto six levels of header tag in HTML.

2.9 WAN is based on Ethernet.

2.10Asynchronous communication is slower than synchronous communication.


3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the "tear-off" answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y

One of the commonly used web browser A. Pixel
A video-standard commonly used on internet B. Freeware
Basic unit of an on-screen image C. encryption
Software available for trial period after which it
must be registered to use
D. Band width
Scrambling of a message for security E. Link
Data carrying capacity of a channel F. TCP/IP
Related site on Internet G. Byte
Set of protocols that handles data transmitted
across the Internet
H. Internet Explorer
IP address I. MPEG-4
The electronic device in a modem that decodes
an incoming signal and extracts data
J. Shareware
K. 170.113.242.2
L. Altavista
M. JPEG
N. Demodulator


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the "tear-off" answer sheet attached to the
question paper, following instructions therein. (1 x 10)
A. v-chat B. FTP C. Applet
D. Modem E. DSL F. Unzip
G. Ethernet H. URL I. Kbps
J. DHCP K. Browser L. Cookie
M. Band width N. Two O. VRL
P. Bit

4.1 Device for translating digital signals into analog signals and vice versa is called a(n)
________.

4.2 The address of a page on the World Wide Web is called ________.

4.3 The speed of your net access is defined in terms of ________.

4.4 An information file placed on your computer by a web page that one has visited is known
as ________.

4.5 ________ is a small Java program that can be embedded in an HTML page.

4.6 ________ a Client program (software) that is used to look at various kinds of Internet
resources.

4.7 ________ is a protocol by which a machine can obtain an IP number (and other network
configuration information) from a server on the local network.

4.8 ________ is a method for moving data over regular phone lines.

4.9 ________ is a very common method of networking computers in a LAN.

4.10 ________ is a way to login to another Internet site for the purposes of retrieving and/or
sending files.


PART TWO
(Answer any FOUR questions)

5.a) Give the HTML program segment for collecting information using forms. Information is
name and comment. [8]
b) What are the two different types of Newsgroups, explain? [4]
c) What does the term Usenet mean? [3]


6.a) What do you understand by the term URL? What are the different components that
make an URL? [5]
b) What is the difference between Internet and World Wide Web? Explain. [5]
c) Give the five different headers specified in MIME? [5]


7.a) Describe the function of a router and why it is important. [5]
b) Explain with diagram the differences between star, ring and bus topologies. [5]
c) The Domain Name System (DNS) plays an integral part in the functionality of the
Internet. Describe the functionality of DNS and its component parts. [5]


8. a) What are the Internet security Threats? Explain how can they be avoided? [8]
b) Define a firewall. What are its benefits? [4]
c) What is the difference between dynamic and static web sites? [3]


9. a) What is the main purpose of Telnet? What model does Telnet follow? Write a short note
on how it operates? [8]
b) What is VRML? How does it differ from HTML? [7]