Sunteți pe pagina 1din 202

Question Papers

2006-2009
Compulsory
M1-R3: IT TOOLS AND APPLICATIONS
M2-R3: BUSINESS SYSTEMS
M3-R3: INTERNET & WEB DESIGN

Elective (any one)


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH
‘C’ LANGUAGE
M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

New Revised Syllabus


Compulsory
M1-R4: IT Tools and Business Systems
M2-R4: Internet Technology and Web Design
M3-R4: Programming and Problem Solving through ‘C’ language

Elective (any one)


M4.1-R4: Application of .NET Technology
M4.2-R4: Introduction to Multimedia
M4.3-R4: Introduction to ICT Resources

PR Practical (Based on M1, M2, M3, M4 module syllabus)


PJ Project
2006 - January
M1-R3 to M4-R3
M1-R3: IT TOOLS AND APPLICATIONS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR
questions and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3.Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect
the answer book for PART TWO immediately after handing over the answer sheet
for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Number system using strings of 0’s and 1’s is termed as:
A) Decimal number system
B) Binary number system
C) Hexadecimal number system
D) Octal number system

1.2 Which one of the following is not hardware?


A) Magnetic Tape
B) VDU terminal
C) Printer
D) Assembler

1.3 Multiple choice examination answer sheets can be evaluated automatically by:
A) OMR
B) OCR
C) MICR
D) Scanner

1.4 To create large-size drawings, architects and engineers often use a device called a:
A) Plotter
B) Band printer
C) Line printer
D) Laser printer

1.5 To launch a program in a command-line interface, you must:


A) Click an icon
B) Type one or more memorized commands
C) Use a menu
D) None of the above

M1-R3 Page 1 of 5 January, 2006


1.6 The part of an operating system, which permanently resides in main memory is
A) Job scheduling module
B) Kernel
C) Translator
D) None of the above

1.7 Microsoft Office 97 includes the following:


A) Word 97
B) Outlook 97
C) Excel 97
D) All of the above

1.8 To insert clip art, pictures from disk into a Word Document, which of the following
method is used?
A) Insert, Picture command
B) Insert Object command
C) Add, Picture command
D) Insert, File command

1.9 Which of the following is not a tool for analyzing spreadsheet data?
A) What-if analysis
B) Mail merge
C) Goal seeking
D) Sorting

1.10 Which method can you use to navigate from one slide to another in a slide show?
A) Press the Esc key
B) Click the mouse button
C) Change the channels on the TV
D) None of the above

M1-R3 Page 2 of 5 January, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Main memory is a software component.


2.2 A computer's CD-ROM drive can read data disks, but it cannot play audio CDs.
2.3 The first successful GUI appeared on the Macintosh computer in 1984.
2.4 A utility program can be used to improve the function of an operating system in some way.
2.5 During the formatting process, a disk's surface is divided into sectors, which are then
further divided into rings, called tracks.
2.6 Bold, italics and bold italics are available for all fonts.
2.7 All sections in a document necessarily use the same margins.
2.8 You can add dates to worksheets, but spreadsheets cannot use dates in calculations.
2.9 In a spreadsheet, ordinary text is called a "label."
2.10Presentation programs let you create notes for each slide, which are visible only to you.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Booting A. uneven distribution of data on a hard disk.
3.2 Drivers B. The process of loading an operating system into a
computer’s main memory.
3.3 Fragmentation C. A pattern for a document that controls fonts, sizes
and other format settings.
3.4 Shell D. Series of program instructions that standardizes the
format of data between a computer and a peripheral
device.
3.5 Template E. The part of operating system that allows the user to
communicate or interact with it.
3.6 Workbook F. enables the applications software to interact with the
computer and help it manage its internal resources.
3.7 System Software G. Internal DOS command.
3.8 Voice-output device H. A collection of Excel worksheets.
3.9 TYPE I. Line editor.
3.10 vi J. External DOS command.
K. Converts digital data into speech-like sounds.
L. Linux command.
M. The innermost layer of the operating system.
N. A page in an Excel on which you enter data.

M1-R3 Page 3 of 5 January, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Nucleus B. Virus C. Electro-magnetic


D. Indents E. Shell F. Sectors
G. Conventional H. Ctrl+Enter I. Slide show
J. Slide sorter K. Upper L. Lab leader
M. Folio N. Tracks O. Ctrl+K

4.1 Data is recorded on the tape in the form of ____________ pulses.


4.2 ____________ memory consists of the first 640 kilobytes of RAM.
4.3 The innermost layer of the operating system is ________.
4.4 ____________ are logical concentric circles.
4.5 A(n) __________ consists of hidden programming instructions that are buried in an
applications or systems program; it can damage data, files and entire computer systems.
4.6 A(n) ___________ is the basic information about each page; usually the page numbers the
title of publication and the date of publication etc.
4.7 To insert a page break, press ___________.
4.8 A(n) ___________ is a row of dots or dashes that is inserted between two text elements.
4.9 _________ are added to margins, thereby increasing the white space and decreasing the
text area for specific paragraphs.
4.10The _______ view helps in getting the detailed picture of each slide.

M1-R3 Page 4 of 5 January, 2006


PART TWO
(Answer any FOUR of the following)

5.
a) Convert (7305)8 to Binary and (1023)10 to Hexadecimal.
b) What is a Mouse? Identify the five essential techniques for using a mouse.
c) What is the difference between systems software and applications software?
d) What is “Shareware”?
(4+4+4+3)

6.
a) As working with Linux OS all files and directories have security permissions; what are
those and how chmod command helps in operating all those permissions?
b) Explain the following DOS commands:
COPY *.txt + *.ref combin.doc
chkdsk c: > status.txt
c) What is the role of “Control Panel” in Windows?
(7+4+4)

7.
a) You may prefer your Word documents or multiple page letters to be printed without any
numbering on the first page, how it is achieved?
b) Define and explain how to adjust “Line spacing” & “paragraph spacing” in Word document.
c) Explain about Animating Text and Objects on the Slides of your Presentation.
(5+5+5)

8.
a) What is the difference between Embedded charts and Chart Sheet? What are
Legends and how to add on the chart?
b) What is the difference between relative and absolute references?
c) In Excel, we have three functions named a ROUND(), ROUNDDOWN(), ROUNDUP();
how these are different? Explain with examples.
(5+5+5)

9.
a) Word provides eight views: Normal, Outline, Print Layout, Web Layout, Print Preview,
Web Page Preview, Document Map and Full Screen. Explain?
b) What is the purpose of Presentation Software? Explain the features provided by MS
Power Point.
(8+7)

M1-R3 Page 5 of 5 January, 2006


M2-R3: BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR
questions and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect
the answer book for PART TWO immediately after handing over the answer sheet
for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which one of the following is not a liability?


A) Investments
B) Secured loans
C) Share capital
D) Reserves and surplus

1.2 When information flows from one department to another department, it is termed as:
A) Vertical flow
B) Parallel flow
C) Horizontal flow
D) Departmental flow

1.3 In executing a computer program ‘subtraction’ has been performed in place of addition
erroneously. The error may be called.
A) Syntax error
B) Arithmetic error
C) Error of commission
D) Logic error

1.4 Identify the invalid field name out of the following:


A) “RS.35.89”
B) “CURRENCY”
C) PQR 32
D) “32 PQR”

M2-R3 Page 1 of 5 January, 2006


1.5 Which of the following statements is false?
A) FIND and SEEK commands need Index file.
B) CONTINUE cannot be used to find the next matching record after using FIND/SEEK.
C) Contents of a variable can be searched with FIND and SEEK commands.
D) None of the above.

1.6 If SENT is a logical field in a database file, which of the following is a valid command?
A) DISPLAY FOR SENT = “T”
B) DISPLAY FOR SENT = “.T.”
C) DISPLAY FOR SENT
D) DISPLAY FOR SENT = T

1.7 The command used to add a new field to an active database file is
A) MODIFY LABEL
B) MODIFY COMMAND
C) MODIFY STRUCTURE
D) MODIFY REPORT

1.8 Payroll is integrated with financial accounts through


A) A month and journal voucher
B) On-line updation
C) Maintaining each employees record in a subsidiary ledger
D) All of the above

1.9 The command used to change the contents of a database file using contents of another file
by linking them on a common key field is
A) REPLACE
B) UPDATE
C) CHANGE
D) JOIN

1.10If AGE and SALARY are numeric field in a database file, which one of the following
commands is correct?
A) REPLACE ALL AGE WITH AGE + 1 FOR AGE < 20
B) REPLACE ALL AGE WITH AGE + 1 WHILE AGE > 20
C) REPLACE AGE WITH AGE + 1 FOR AGE < 20 ALL
D) All of the above.

M2-R3 Page 2 of 5 January, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 In double entry book keeping system, it is not necessary that debit equal credit.
2.2 Managing Director of a Private Limited Company is the owner of the company.
2.3 In software development life cycle the coding phase will precede design phase.
2.4 The computer can execute the source program and not the object program.
2.5 The REINDEX command automatically re-indexes all open index files for the database file
open in the current work area.
2.6 When a database file ABC.dbf is opened its index file ABC.cdx is opened automatically.
2.7 CLOSE ALL closes all files in all work areas.
2.8 LOCK( ) and FLOCK( ) are identical functions.
2.9 IF – ENDIF cannot be used within DO CASE - ENDCASE
2.10BOF( ) returns true when the record pointer is at the first record.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 EOQ A. Programming aid
3.2 Pseudo code B. Also copies index file
3.3 SET FILTER C. ACCEPT / SPACE
3.4 WITH CDX D. Executes a DOS program
3.5 Current Assets E. Creditors Analysis
3.6 Creates Character Variable F. Flow Chart
3.7 RUN G. Financial Accounts
3.8 Purchase bills H. Inventory Management System
3.9 Diamond I. TIME OUT
3.10 Used with WAIT WINDOW J. Restricts number of records with commands
K. Timely supply
L. Dead Lock

M2-R3 Page 3 of 5 January, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. CONFIG.FPW B. SET SKIP TO C. Cost


D. Character E. ALL TRIM( ) F. Centralized
G. Left & Right parenthesis H. Set function I. Balance Sheet
J. ABC Analysis K. A replica L. config.sys

4.1 Computerized Railway reservation system is an example of ________ data processing


system.
4.2 After every year the accountant merges the profit and loss of operations with ________.
4.3 ________ is a method where high value and bulk items are monitored for effective control of
materials.

4.4 Where as Foxpro for DOS uses CONFIG.FP as the configuration file, Foxpro for Windows
uses the ________ file.

4.5 The ________ command clears the one-to-many relationship.


4.6 Inventory included in the ________ of the item.

4.7 The REPLICATE( ) function repeats a specified ________ expression.


4.8 Pay image file is ________ of Pay slip.
4.9 The ________ function removes leading and trailing blanks from a character expression.

4.10The delimiters used to delimit subscripts, indexes, and conditions for arithmetic expressions
are ________.

M2-R3 Page 4 of 5 January, 2006


PART TWO
(Answer any FOUR questions)

5.
a) What are the main problems that can arise in capturing raw data for use within a computer
system?
b) Why is data validation necessary? What are the different types of data validation checks that
are kept in a programme?
c) Distinguish between structure programming and modular programming.
(5+5+5)

6.
a) How information is stored by FoxPro?
b) How does indexing works?
c) What is the relational database system? Explain with example.
(5+5+5)

7.
a) What are the three commonly used file organizations in business data processing?
Describe any one-file organization.
b) Explain Query designer and multiple tables.
(10+5)

8. The database table called PERSON contains the fields NAME, BASIC and HRA. Write
a set of commands to print a report with employee name and total salary for those
employees whose total salary is more than 2000. Total salary = BASIC + HRA. At the
end, the program should also print the total number of employees with those whose total
salary is more than 2000.
(15)

9.
a) What do you understand by Object Linking and Embedding?
b) Describe Computerised Inventory Control System.
(5+10)

M2-R3 Page 5 of 5 January, 2006


M3-R3: INTERNET & WEB DESIGN

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 TCP is a commonly used protocol at


A) Applications layer
B) Transport layer
C) Network layer
D) Physical layer

1.2 The process of keeping addresses in memory for future use is called:
A) Caching
B) Routing
C) Resolving
D) RFC

1.3 The following is NOT an Internet search engine:


A) Google
B) Webcrawler
C) Excite
D) Scientia ans

1.4 The domain name in a URL refers to the


A) protocol
B) file name
C) server
D) directory

1.5 The World Wide Web integrates which of the following:


A) E-mail, Telnet, Usenet
B) Sound and movies files
C) A and B
D) All Internet communication tools

M3-R3 Page 1 of 5 January, 2006


1.6 All web addresses start with which of the following?
A) Htp
B) http://
C) http:/
D) www

1.7 Which of the following terms is a “browser”?


A) Netscape
B) World Wide Web
C) Launcher
D) E-mail

1.8 Which of the following is not a method of accessing the web?


A) ISDN
B) MODEM
C) DSL
D) CPU

1.9 A word that is underlined on a web page is usually


A) Show emphasis
B) Recently added to the page
C) A link to another web page
D) The title of something

1.10 What is a cookie?


A) Computer code used to show animations and play sound.
B) Information sent to your computer that is used later to give information back to a visited
web site.
C) Computer code that automatically records all purchases and payments you make from
your computer.
D) An advertisement that will at some time be displayed on your computer screen.

M3-R3 Page 2 of 5 January, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Telnet is the basic Internet service that was designed to transfer files from one computer
system to another.
2.2 When the cursor pointer changes to a hand you are over a hyperlink.
2.3 URL stands for Universal Resource Locator.
2.4 Tim Berner-Lee is the “Father” of the WWW.
2.5 A feature of using e-commerce is that consumers can make purchases directly from the
business on the Internet saving time for both parties.
2.6 Usenet is a set of acceptable behaviours that users should follow while on the Internet.
2.7 The term “thumbnail”, in relation to a Web site on the Internet, refers to a small version
of a larger graphical image that you usually can click to display the full-sized image.
2.8 Software that may be used to help you locate Web pages on topics that you do not know
the addresses for is called search engines.
2.9 Download means to copy a file from your computer to another.
2.10 The two main file formats for images on the web are GIF and TIF.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 System of electronically joined computers A. Cursor
3.2 Software that allows you to explore the Internet B. Network
3.3 Movable indicator on computer screen C. Download
3.4 To shrink store data in less space D. Virus
3.5 To conform the identity of a computer user E. Browser
3.6 Connecting device between computers over a F. Hit
phone line
3.7 Central computer sharing resources and data with G. Authenticate
other computers on a network
3.8 Basic unit of an on-screen image H. Boot
3.9 To copy a file or program onto a personal I. Server
computer
3.10 Related site on Internet J. Modem
K. Compress
L. Pixel
M. Link
N. Scanner

M3-R3 Page 3 of 5 January, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. ZIP B. Hypertext C. <BODY>


D. <BR> E. Browsing F. Browser
G. World Wide Web H. Firewall I. Archie
J. URL K. Internet L. DNS

4.1 ________ is a program that allows the user to search for and use data on the internet.
4.2 ________ is a acronym for the address of a document found on the Internet.
4.3 HTML tag for creating a line break is ________.
4.4 ________ is a tool to help you find files on anonymous FTP servers.
4.5 ________ is hardware or software designed to keep network hackers out.
4.6 ________ is a worldwide collection of computer networks that allows people to find and
use information and communicate with others.
4.7 A(n) ________ program is used to archive and compress files.
4.8 ________ uses links also called hyperlinks.
4.9 Going from one place to another on the Internet is called ________.
4.10 A huge collection of electronic pages containing information about many different
subjects is called ________.

M3-R3 Page 4 of 5 January, 2006


PART TWO
(Answer any FOUR questions)

5.
a) Write the HTML code for creating the following layout.

THE EURO CUP RESULTS

GAME BRAZIL GERMANY

1 3 2

2 4 1

3 0 8

4 8 7

5 2 1

b) What are the Internet security threats? What constitutes a good firewall system?
(7+8)

6.
a) Discuss the need for MIME? What are the five different headers specified in MIME?
b) What are the Web Publishing Tools? Discuss any two of them.
(7+8)

7.
a) What are web cookies? Why are they required?
b) Discuss the Bookmarks.
c) What is the function of the following buttons in Internet Explorer Toolbar?
i) Search
ii) History
iii) mail
iv) print
v) refresh
(5+5+5)

8.
a) Describe the function of a router and why it is important.
b) Describe the differences between star, ring and bus topologies.
c) The Domain Name System (DNS) plays an integral part in the functionality of the
Internet. Describe the functionality of DNS and its component parts.
(5+5+5)

9. Write short notes on any three of the following:


a) Major Internet Services
b) TELNET
c) Search Engine
d) JavaScript
(5x3)

M3-R3 Page 5 of 5 January, 2006


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer
book for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 The following is a program


Main()
{
int x = 0;
while(x<=10)
for( ; ; )
if( ++ x%10 = =0)
break;
printf(“x = %d”, x);
}
What will be the output of the above program?
A) Will print x = 10
B) Will give compilation error
C) Will give runtime error
D) Will print x = 20

1.2 Consider the following variable declaration


Union x{
int i;
float f;
char c;

M4.1-R3 Page 1 of 6 January, 2006


}y;
if the size of i, f and c are 2 bytes, 4 bytes and 1 byte respectively then the size of the
variable y is:-

M4.1-R3 Page 2 of 6 January, 2006


A) 1 byte
B) 2 bytes
C) 4 bytes
D) 7 bytes

1.3 Pick up the odd one out from the following


A) x=x–1
B) x-=1
C) x--
D) x=-1

1.4 What is the value of ‘average’ after the following program is executed?
main()
{
int sum, index;
float average;
sum = 0;
for( ; ; ) {
sum = sum + index;
++ index;
if (sum > = 100) break;
}
average = sum / index;
}
A) 91/13
B) 91/14
C) 105/14
D) 105/15

1.5 Suppose i, j, k are integer variables with values 1, 2, 3 respectively. What is the value of
the following expression?
! (( j + k ) > (i + 5 ))
A) 6
B) 5
C) 1
D) 0

1.6 If a = -11 and b = -3. What is the value of a % b?


A) -3
B) -2
C) 2
D) 3

1.7 If c is a variable initialized to 1, how many times will the following loop be executed?
while(( c > 0 && (c < 60))
{
c ++;
}

M4.1-R3 Page 3 of 6 January, 2006


A) 61
B) 60
C) 59
D) 1

1.8 Which one of the following describes correctly a static variable?


A) This cannot be initialized.
B) This is initialized once at the commencement of execution and cannot be changed at run
time.
C) This retains its value through the life of the program.
D) This is same as an automatic variable but is placed at the head of a program.

1.9 What will be the output of the following program?


main()
{
int a, *ptr, b, c;
a = 25;
ptr = &a;
b = a + 30;
c = *ptr;
printf(“%d %d %d”, a, b, c);
}
A) 25, 25, 25
B) 25, 55, 25
C) 25, 55, 25
D) None of the above

1.10If a = 0×aa and b = a << 1 then which of the following is true


A) b=a
B) b = 2a
C) a = 2b
D) b=a-1

M4.1-R3 Page 4 of 6 January, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 It is not possible to print the % character as the function printf treats % as the beginning
of a conversion specification.
2.2 A structure can include one or more pointers as members.
2.3 It is not possible to have formatted input / output in ‘C’.
2.4 It is not possible to have nested if – else statements in ‘C’.
2.5 The increment operator ++ does not work with float variable.
2.6 *a is the same as a[ ] in a parameter declaration.
2.7 In ‘C’ programming language, strings are represented using an array.
2.8 Relational operators have higher precedence than arithmetic operators.
2.9 A structure cannot be a member of a union.
2.10*p++ increments the content of the location pointed by p.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 An Operator in ‘C’ permits two different expressions to A. The operator &&
appear in situations where only one expression is
ordinarily be used.
3.2 Variables, internal to a function, come into existence B. Static variables
when the function is called
3.3 No space allocated for storage of character during C. Global variables
compilation time
3.4 p is pointer to a function that returns a pointer to D. The comma operator (,)
integer
3.5 Self-referencing structure E. int *p[10]
3.6 Accomplishing indirection with pointer to structure F. automatic variable
3.7 Random access in the file; file specified through file G. Useful for link-list
descriptor implementation
3.8 Returns initialized storage in run-time H. seek
3.9 Variables can be defined in ‘C’ which occupies less I. fseek
space than character variables
3.10 Valid mode for opening a file; permits read and write J. calloc
K. w+
L. malloc
M. r+
N. bit-fields
O. arrow operator
P. int(*(*pc))
Q. char *s

M4.1-R3 Page 5 of 6 January, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Change B. trinary C. - operator


D. Automatic E. Variable F. “&” operator
G. Static H. Dynamically I. Externally
J. void K. A character L. An integer
M. EOF N. fclose O. True

4.1 printf( ) function uses _________ number of arguments.


4.2 ________ can be used as both binary and unary operators.

4.3 Link lists can be created _____________.


4.4 Loop invariants are assertions that remain _______ before and after execution of loops.

4.5 File descriptor is ______________.


4.6 Pointer arguments enable a function to access and _____ objects defined in the calling
routine.
4.7 The function getchar( ) returns _______ when there is no more input character.

4.8 Any pointer can be cast to __________ without loss of information.


4.9 To prevent the use of functions across different files, ____ storage class is used.

4.10 ? : is ________ operator.

M4.1-R3 Page 6 of 6 January, 2006


PART TWO
(Answer any FOUR questions)

5.
a) Discuss with the help of examples the action of break statement and the continue statement.
b) Does the null statement have any uses besides indication that the body of a loop is empty?
Explain.
c) What is the purpose of the \? Escape sequence?
(8+4+3)

6.
a) Is it legal to put a function declaration inside the body of another function? If yes, give an
example.
b) Is it legal for a function f1 to call f2, which then calls f1? Justify your answer.
c) Write a ‘C’ function that returns the k-th digit from the right in the positive integer n. For
example, digit(829,1) returns 9, digit(829,3) returns 8. If k is greater than the number of
digits in n then the function is to return –1. Include appropriate documentation in your
program.
(4+2+9)

7.
a) If a pointer is an address, what does the expression like p + j mean?
b) Is i[a] same as a[i]? Justify your answer.
c) Write the following function:
Bool search(int a[], int n, int x);
Where a is an array to be searched, n is the number of elements in the array, and x is
the search key. “search” should return TRUE if x matches some element of a, FALSE if it
doesn’t. Use pointer arithmetic to visit array elements. Include appropriate
documentation in your program.
(4+2+9)

8.
a) Develop an algorithm to do the following:
Read an array of 20 elements and then send all negative elements of the array to the
end without altering the original sequence.
b) Draw a flow chart and then write a ‘C’ program to generate first 15 members of the following
sequence.
1, 3, 4, 7, 11, 18, 29, …
(5+10)

9. Develop a flowchart and then write a program for analyzing a line of text stored in a file
by examining each of the characters and displaying into which of several different
categories vowels, constants, digits, white spaces it falls. Count of the number of vowels,
consonants, digits and white space characters. Include an appropriate documentation in
your program.
(15)

M4.1-R3 Page 7 of 6 January, 2006


M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 A Timer control that performs a task at programmer-specified intervals is


A) not visible to the user
B) always visible to the user
C) can be made visible by user
D) none of the above

1.2 A picture box is a control that displays


A) Images
B) User input
C) Output
D) Other controls

1.3 While using MsgBox(String, integer, title) function, if the integer argument value is 3, the
resulting MsgBox command buttons are
A) Abort, Retry, Ignore
B) Yes, No, Cancel
C) OK, Cancel, Retry
D) None of the above

1.4 When it is desired that a menu item does not appear at run time, it must be ensured that the
following property/properties must be set to false
A) Enabled
B) Visible
C) Both Enabled and Visible
D) Both Checked and Visible

M4.2-R3 Page 1 of 5 January, 2006


1.5 During the execution of a program in Visual basic, following property of List Box control
refers to the index corresponding to the list entry that has been clicked.
A) ListCount
B) ListIndex
C) Index
D) Value

1.6 The name of event that occurs first when a form is loaded into memory is
A) Load
B) Activate
C) Initialize
D) Resize

1.7 A method that refreshes all the contents of a RecordSet object from the data source by
reissuing the original command retrieving the data second time is called:
A) Refresh
B) Requery
C) StayInSync
D) Update

1.8 A form’s coordinates and dimensions onscreen are always measured in:
A) Point
B) Twips
C) Pixel
D) Inch

1.9 An event that occurs when a form is closed is called


A) Unload
B) Terminate
C) Deactivate
D) None of the above

1.10 The following function converts the numeric values of an indicated date to a visual basic
date data type.
A) DateValue
B) DateSerial
C) DateformatTime
D) None of the above

M4.2-R3 Page 2 of 5 January, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Static variables are always declared in a procedure.


2.2 Rnd returns a number in the range of 0<x<=1.
2.3 The keyword ByVal applies to all variables in the parameter list that follows it.
2.4 Function ASC returns the string representation of a numeric character representation.
2.5 A variant array can store many different types of values.
2.6 A fixed-size array can be assigned to a dynamic array.
2.7 Both & and + can be used to concatenate a string with numeric value.
2.8 An Active X control property pages can only be accessed at run-time.
2.9 Constant variables must be initialized with a constant expression and when they are
declared, they cannot be modified thereafter.
2.10 Iteration explicitly uses a repetition structure while recursion achieves repetition through
repeated procedure calls.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Option Compare A. Zorder
3.2 A file that stores images B. Unit of Measure to use
3.3 Object and event C. Cursor Type
3.4 AdOpenStatic D. Default type is binary
3.5 Return Value E. Cursor Location
3.6 To indicate whether objects of ADO model are F. Event Procedure
open or not.
3.7 Scale Mode Property G. Function Procedure
3.8 To generate Curved Shape on object H. Sub Procedure
3.9 Changes that are pending during record I. Pset Method
modified in batch updating
3.10 Change the RGB color of a point J. Circle Method
K. frx file
L. State property
M. Status

M4.2-R3 Page 3 of 5 January, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. ToolTipText G. child M. If/Then/Else/Endif


B. Array H. MaxValue N. Floating Point
C. constructive I. MaxLength O. Name
D. destructive J. J.User32.dll P. Caption
E. Variable K. CommonDialog Q. Variant
F. ListIndex L. ToolTipValue

4.1 The default data type is called _________.


4.2 The ______ Property identifies a form and is often prefixed with frm.
4.3 The _______property display a tool tip.
4.4 A location in a computer’s memory that may contain different values at various times
throughout program execution is called a _____________.
4.5 The ________ keyword indicates that procedures are contained in a DLL.
4.6 When a value is placed into memory location, it is known as _________ read-in.
4.7 The _________ property limits the number of characters input in a Textbox.
4.8 Lists and table of values are stored in ___________
4.9 The MDI application must have at least two forms, the parent form and one or more
________ form.
4.10 The open, Save, Font and color dialogs are all ________.

M4.2-R3 Page 4 of 5 January, 2006


PART TWO
(Answer any FOUR questions)

5.
a) Explain the difference between Resume and Resume Next in an error handler in the call
list.
b) Explain what happens when an error is raised in a procedure that does not contain an error
handler.
c) Explain with description the properties and methods of err object.
(5+5+5)

6.
a) What do you understand by User-defined data types? Explain and illustrate.
b) Write a procedure called Factorial that accepts input argument as integer and returns
the output as factorial of that input argument.
(7+8)

7.
a) How multiple data items, range of data items and logical expression handled in a Select
Case ……. End Select structure? Illustrate
b) Describe the variations of a Do…..Loop structures, stating clearly the purpose of each?
c) What are the different Windows appears at the start of Visual Basic (Ver6). How each
Window can be viewed?
(5+5+5)

8.
a) Differentiate between implicit variable declaration and explicit variable declaration by
running a VB program.
b) Differentiate between ListBox and ComboBox controls. List basic properties of these.
c) Write the source code for drawing methods of VB such as Circle and Line.
(5+5+5)

9.
a) What do you understand by event procedure? How does it differ from sub procedure and
function procedure?
b) Explain the three ways to create Active X controls.
c) Explain the key objects of ADO model that enable programmers to retrieve set of
records from a given data source.
(5+5+5)

M4.2-R3 Page 5 of 5 January, 2006


2006 - July
M1-R3 to M4-R3
M1-R3: IT TOOLS & APPLICATIONS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR
questions and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached


to the question paper, as per the instructions contained therein. PART ONE is
NOT to be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART
TWO will be supplied at the table when the answer sheet for PART ONE is
returned. However, candidates, who complete PART ONE earlier than one hour,
can collect the answer book for PART TWO immediately after handing over the
answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 One of the following is not an Operating System.


)A MS-DOS
)B COM
)C LINUX
)D MS-WINDOWS

1.2 One of the following is Input/Output device


)A Printer
)B Keyboard
)C VDU
)D Hard Disk

1.3 A CPU consists of at least


A) ALU and Registers
B) ALU and Control Unit
C) ALU and Memory
D) RAM and ROM

1.4 Which one of the following is a Primary Memory


A) RAM
B) Hard Disk
C) CD ROM
D) Floppy Disk

M1-R3 Page 1 of 6 July, 2006


1.5 One of the following language is written as the string of binary digits
A) ASSEMBLY
B) HIGH LEVEL
C) MACHINE
D) BASIC

1.6 To keep files, most operating systems support the concept of a


A) Track
B) Platter
C) Directory
D) Folder

1.7 One of the following is Sequential Access Memory


A) Magnetic Tape
B) Magnetic Disk
C) Magnetic Drum
D) Optical Disk

1.8 One of the following is not an Impact Printer


A) Daisy-Wheel
B) Dot - Matrix Printer
C) Chain Printer
D) Laser

1.9 One of the following is Application Software


A) Window - XP
B) Office - XP
C) Norton Antivirus
D) VMS

1.10 ROM means


A) Read Once Memory
B) Read Only Memory
C) Read On Memory
D) Read Other Memory

M1-R3 Page 2 of 6 July, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate
one and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 The translator that is used to translate a high-level language into a machine language is
system software and is called as the compiler.
2.2 A word processor package may have the facility for checking the spelling of words in a
document.
2.3 Word does not present a new blank document when you start the program but you need
to click the New Blank Document button at the far-left end of the Standard toolbar or press
Ctrl + N.
2.4 A real time system is used when there are rigid time requirements on the operation of a
processor or the flow of data, and thus is often used as a control device in a dedicated
application.
2.5 Many a times the Operating System does not act as a Resource Manager but only as
Device Manager.
2.6 A formula is always to be proceeded by specific operator like + or -.
2.7 Function keys are programmable keys.
2.8 The operating system provides the interface that a software application program needs to
communicate with the PC.
2.9 A mini diskette is more rugged than a micro floppy diskette.
2.10 TCP allows several concurrent logins to the same host.

M1-R3 Page 3 of 6 July, 2006


3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Multiprogramming A. The toolbar contain buttons that you can click to issue
commands.
3.2 Icons B. This is the area in which you can type text, draw any figure or
other objects.
3.3 Windows C. Used to select the text to be operated with other command
key.
3.4 Toolbar D. Bars let you bring different parts of a document into view
3.5 Shift Key E. Translating the HLL program input into an equivalent
machine language program.
3.6 Text Area F. Translate one line at a time of the program into machine
language.
3.7 Scrollbars G. Translate mnemonics into an equivalent machine language
program.
3.8 Compiler H. Translate source code into equivalent machine language
program.
3.9 Assembler I. Concept to store more than one program in computer
memory.
3.10 CPU J. System software.
K. Small symbols on the desktop.
L. Consists of ALU and CU.
M. Consists of ALU and Registers
N. Consists of ALU and Programs.

M1-R3 Page 4 of 6 July, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Intel B. Interpreter C. Hard


D. system E. A> F. 16-bit
G. external H. extension I. directory
J. refresh rate K. MD L. floppy
M. create N. file O. <>

4.1 IMB microcomputers are built around _________ microprocessors.


4.2 MS-DOS is an operating system basically developed for _________ microcomputers.

4.3 DOS can reside on the _________ disk as well as on hard disk.
4.4 command.com is known as command _________.

4.5 _________ prompt is displayed, if DOS is loaded from floppy drive.


4.6 The name of file contains two parts: ???????/ and _________.

4.7 DOS have two types of commands: internal and _________.


4.8 A new directory can be created by _________ command.

4.9 RD command is used to remove a _________ from the disk.


4.10 _________ is the number of times per second that the pixels are recharged so that their
glow remains bright.

M1-R3 Page 5 of 6 July, 2006


PART TWO
(Answer any FOUR questions)

5.
a) Explain the various components of CPU with the help of diagram. What are the input
and output devices? Name those devices, which are both input and output data.
b) For what purpose the WILD CARD COMMANDs are being used in DOS? What are the
steps for searching particular word in a document and replacing all with the same word
in the whole document?
c) What are non-impact printers? Explain the difference between Dot Matrix and Laser Printers.
(5+5+5)

6.
a) What is the various type of software? Explain each one of them in brief.
b) What do you understand by DOS prompt? List out the steps required to start DOS form
a floppy drive?
c) Explain the functions of an Operating System in a computer.
(5+5+5)

7.
a) What is template? What is the difference between template and a wizard?
b) Explain the difference between Relative and Absolute referencing. How can you
connect Relative reference into Absolute reference in MS-Excel?
c) Describe the Mail Merge operation in MS-Word. What are the steps involved in Mail
Merge Helper?
(5+5+5)

8.
a) What is a secondary storage? How does it differ from a primary storage?
b) Define the following terms with respect to a computer.
i) Sub-routine
ii) Information
iii) Firmware
(9+6)

9. Write short notes on any three of the following: -


)a Compilers and Interpreters
)b MICR
)c Creating Tables in MS-Word
)d Charts and Graphs in MS-Excel
(3x5)

M1-R3 Page 6 of 6 July, 2006


M2-R3: BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 In a data processing system, if the input data is processed, as the transaction occurs, it is
called
A) Parallel
B) Real time
C) Batch
D) Virtual

1.2 A sales invoice


A) Debits customers and credits sales
B) Credits customers and debits sales
C) Debits finished stock and credits sales
D) None of the above

1.3 A Sequential file organization is most suited for


A) Airline reservation
B) A library
C) A payroll system
D) None of the above

1.4 Which of the following statements is false?


A) FIND and SEEK Commands need an index file
B) CONTINUE cannot be used to find the next matching record after using FIND/SEEK
C) Contents of a variable can be searched within FIND and SEEK Commands.
D) None of the above

M2-R3 Page 1 of 6 July, 2006


1.5 The command used to change the contents of a database file using contents of another file
by linking them on a common key field is
A) REPLACE
B) UPDATE
C) CHANGE
D) JOIN

1.6 Which of the following is an invalid command?


A) SET TALK OFF
B) SET BELL ON
C) SET DATE TO BRITSH
D) SET ALTE ON

1.7 ROUND() function is


A) A numeric function
B) Used to round a number to a specified number of decimal places
C) Both A) and B)
D) None of the above.

1.8 Which of the following statements is not correct?


A) The STORE command can create more than one variable.
B) DATE( ) returns the current date.
C) YEAR( ) returns the numeric value of year from a date expression.
D) FIELD( ) returns the type of a specified field.

1.9 The command WAIT


A) causes all FoxPro processing to pause until any key is pressed
B) permits usage of a prompt which must be a character expression
C) has a default prompt which is "Press any key to continue…."
D) all of the above

1.10 The IIF( ) function


A) results in compactness in a program
B) is used whenever you have both an "if true" and "if false" part of the statement
C) will work only if both are same type of expression
D) all of the above

M2-R3 Page 2 of 6 July, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Data validation is generally accomplished by making use of various types of control totals.
2.2 The term stock includes manpower.
2.3 Balanced sheet shows the company's health at any instant while profit and loss shows the
company‘s performance.
2.4 A database file cannot be indexed on a logical field.
2.5 Structured programming diminishes the efficiency of coding of programs.
2.6 ??? will print the message in the same line and directly on printer.
2.7 UNIQUE command can be used to prevent the display or access of the duplicate records.
2.8 A function such as UPPER( ) can be used while indexing a database file with INDEX.
2.9 The following code:
Y="I am fine."
? LEN(Y)
will return the value as 8.
2.10SORT ON NAME + AMOUNT TO BANK is a valid command.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Recovery from failure A. It is called as macro function
3.2 Vendor rating B. It is called as substring function
3.3 Aid to programming C. Check point restart
3.4 Create memory variable D. =
3.5 & E. Quality product
3.6 $ F. Allowing full screen editing of several records
3.7 APPEND BLANK G. It is string function
3.8 REPLICATE( ) H. Pseudocode
3.9 SET SCOREBOARD I. The command is used to determine whether
FoxPro compares two values with an exact match
or with the first letters only
3.10 SET EXACT J. It is string function to isolate a section of a string
K. Used to decide whether message of top line and
status bar have to appear
L. The command adds a new record to the bottom of
the database

M2-R3 Page 3 of 6 July, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Weighted average B. .F. C. CEILING( )


D. Distributed E. REPLACE F. Assets
G. Centralized H. Dummy I. General ledger system
J. .T. K. FLOOR( ) L. Subsidiary ledgers

4.1 Loans to employees form part of_________.


4.2 Valuation of stock can be done by using _______ method.
4.3 Computerized Railway Reservation System is an example of _________data processing
system.
4.4 In a function, if we omit the RETURN in the end, a default value of _______ is returned
to the main program.
4.5 The ________ command will bring universal change to all records.
4.6 With the use of _______function, you can find out the nearest integer which is less than
or equal to the specified number.
4.7 A special field can be placed in a ________ record at the end of a file to indicate that all
valid records have been processed.
4.8 With the use of _______function, you can find the next higher integer that is more than
or equal to the specified number.
4.9 Capital + Liability - ________= Zero.
4.10 Examples of high volumes transactions are__________.

M2-R3 Page 4 of 6 July, 2006


PART TWO
(Answer any four questions.)

5.
a) What is the difference between an output file and a report file? Explain with suitable
examples.
b) What are the two standard methods used in data processing systems for organizing
data? Explain their relative advantages and disadvantages.
(5+10)

6.
a) Describe briefly the various types of fields supported in FoxPro.
b) Explain the roles of data files and index file in indexed sequential file organization.
c) What is report generator? What is its role in the overall design and/or usage of a
database?
(5+5+5)

7.
a) Explain the following:
i) INLIST( ) function
ii) SUBSTR( ) function
iii) TRIM( ) function
iv) CTOD( ) function
v) DATE( ) function
b) What is SQL? Explain the SELECT statement with example.
c) What is object linking and embedding? Give a suitable example in support of your
explanation.
(5+5+5)

8. Explain the following:


a) What are Visual FoxPro forms? List out features that may be incorporated into form to
facilitate easier data entry.
b) Write a procedure in FoxPro to reverse the first and last names of customers, which are
separated by a comma and one space. Assume the field name to be NAME in a
database called CUSTOMER.
c) What is Mail Merge Wizard? Explain it.
(6+6+3)

9. A college conducts entrance examination for admitting students into a course. The
following two tables are used for rank processing.

STUDENT MASTER MARKS MASTER

S_NO C (4) S_NO C (4)


PERCENTAGE N (5, 2) SCORE N (5, 2)
EXP_MON N (3)
TOTAL N (6, 2)
RANK N (2)

M2-R3 Page 5 of 6 July, 2006


S_NO is the primary key. PERCENTAGE is percentage of marks obtained in the
qualifying examination. EXP_MON is the work experience in months. TOTAL= SCORE +
PCR + ECR. For evaluating PCR and ECR use the following table. RANK is candidate's
position based on the score in entrance exam. The SCORE is marks obtained by the
candidate in entrance exam. The following credits are given to the student based on the
percentage of marks and work experience.

PERCENTAGE EXP_MON

>80 PCR=3 >=120 ECR=3


>65 & <=80 PCR=2 >=60 & <120 ECR=2
>=50 & <=65 PCR=1 >=24 & <60 ECR=1

Write a program in Visual FoxPro to calculate and print rank based on TOTAL.
(15)

M2-R3 Page 6 of 6 July, 2006


M3-R3: INTERNET AND WEB PAGE DESIGN

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Computers on the internet owned and operated by research institutions form part of the
A) com domain
B) edu domain
C) mil domain
D) None of the above.

1.2 Linux is
A) A person
B) A file
C) A program for copying files from one computer to another
D) An Operating system.

1.3 All web addresses start with which of the following?


A) htp
B) http://
C) http:/
D) www

1.4 The method of transferring files with roots in Unix is


A) Bin Hex
B) Unencoding
C) FTP
D) Telnet

M3-R3 Page 1 of 5 July, 2006


1.5 In HTML language the tag <U> displays text as
A) Boldface
B) Italics
C) Underlined
D) Colored

1.6 The H in HTML stands for


A) Hypo
B) High
C) Higher
D) Hyper

1.7 SMTP is a simple


A) TCP protocol
B) TCP/IP protocol
C) IP protocol
D) None of the above.

1.8 Main protocol used in Internet


A) IPX/SPX
B) TCP/IP
C) Token Bus
D) X.25

1.9 Web pages are uniquely defined using


A) IP addresses
B) URL
C) Domain
D) Filename

1.10A word that looks underlined on a web page is usually


A) an important word
B) the web address
C) a “link” to another web page
D) a mistake

M3-R3 Page 2 of 5 July, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Telnet is commonly used for remotely configuring routers or running applications on different
hosts on a network.
2.2 Unsolicited commercial e-mails are called SPAM.
2.3 The two parts of e-mil address is separated by @ symbol.
2.4 URL is simply an address of a document on the Internet.
2.5 IP addresses are unique.
2.6 SNMP is used for e-mail services on the Internet.
2.7 ASCII is used for designing web pages.
2.8 Browser is a program that searches documents for specific key words and returns a list of
documents.
2.9 HTML does not allow a web page to include an image.
2.10Firewalls cannot protect against viruses.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Web browser A. CGI
3.2 Colors that change like a sparkling rainbow B. VT-100
effect is called
3.3 A small program that can be embedded in C. .mil
another application
3.4 Telnet D. Applet
3.5 An accepted standard for interfacing web E. FTP
servers and external applications.
3.6 An equipment used for establishing dialup F. View information on Internet
connections to the internet
3.7 A most common type of terminal emulation G. Iridescence
3.8 Front page H. remote login sessions
3.9 Domain names for military institutions I. Modem
3.10 A protocol used for transferring files on the J. develop web sites
Internet
K. create database

L. .edu

M. IRC

N. .gov

M3-R3 Page 3 of 5 July, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. VB Script B. four C. <//body)


D. methods E. </A> F. Java Script
G. URL H. firewall I. V-Chat
J. applet K. <BR> L. three
M. <UL> N. attachment

4.1 Typing the _________ correctly is essential to find web sites.


4.2 HTML tag for creating a line break is_____________.
4.3 The _________ tag is used for bulleted, unordered list.
4.4 One of the IRC programs offered by Microsoft is __________.
4.5 _________ is a derivative of visual basic language.
4.6 A(n) ____________ is a document that can be sent along with e-mail.
4.7 There are ______________ octets in an IP address.
4.8 A(n) ___________is a small java program that can be embedded in another application.
4.9 In an object oriented system, a class is a collection of data and ________that operate on
that data.
4.10 ____________ stops unwanted traffic from entering the network.

M3-R3 Page 4 of 5 July, 2006


PART TWO
(Answer any four questions)

5.
a) What is a Local Area Network (LAN)? What are its advantages?
b) Briefly explain a Wide Area Network (WAN)?
c) What does the term Usenet mean?
(8+4+3)

6.
a) Define the Word Wide Web? What are the various features of World Wide Web?
b) What is the difference between Internet and worldwide web? Explain?
(8+7)

7.
a) What are the Internet security Threats? Explain them?
b) Define a firewall and what are its benefits?
(8+7)

8.
a) What is the main purpose of Telnet? What model does Telnet follow? Write a short
note how does it operate?
b) What is a Proxy Server? What are the advantages of a Proxy Server?
(8+7)

9. Write short note on the following:


a) Public Key and Private Key
b) Domain Name Servers
c) Browser
(5x3)

M3-R3 Page 5 of 5 July, 2006


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH 'C' LANGUAGE

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.

TOTAL TIME: 3 HOURS TOTAL MARKS: 100


(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1. In a for loop with a multi statement loop body, semicolons should appear following:
A) the for statement itself
B) the crossing brace in the multiple statement loop body
C) each statement within the loop body and the test expression
D) each statement within the loop only

1.2. When we execute X++; the value of the expression X++ :


A) is equal to the original value of X
B) is one more than the original value of X
C) is X times more than the original value of X
D) none of the above

1.3. An Array’s name is a:


A) Pointer constant
B) Pointer variable
C) Variable name
D) None of the above

1.4. What is printed?


for ( i=1; i<=5;)
i++;
printf(“%d”,i)
A) 23456
B) 12345
C) 123456
D) error

M4.1-R3 Page 1 of 6 July, 2006


1.5. What will assign in s, when we use the following pair of statements in c-program:
char *s;
s = “my car color is : white”;
A) first character of the string constant
B) complete string
C) address of the string storage
D) is a logical error

1.6. C uses pointers explicitly with:


A) Arrays
B) Structures
C) Functions
D) All of the above

1.7. The values of the following storage classes are initialized by the compiler
A) auto and extern
B) register and static
C) static and extern
D) auto and register

1.8. Consider the following declarations.


union id {
char color;
int size;
}
struct {
char country;
int date;
union id i;
} flag;
To assign a color to a flag, the correct statement would be
A) flag.color = ‘W’;
B) flag.i.color = ‘W’;
C) flag.color = ‘White’;
D) flag.i.color = ‘White’;

1.9. Which of the following is true for the switch statement:


switch(var)
{
};
A) Can be used when only one variable is tested
B) The variable must be an integral type
C) Each possible value of the variable can control a single branch
D) All of the above

1.10. Enumeration is:


A) A list of strings
B) A set of numbers
C) A set of legal values possible
D) None of the above

M4.1-R3 Page 2 of 6 July, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 An ampersand (&) is required before each variable name in printf.


2.2 It is an error to place the pound(#) sign of a preprocessor control line in any column except
column 1.
2.3 The goto statement is a branching statement in ‘C’ programming.
2.4 An expression with the star operator, such as *ptr, cannot occur on the left-hand side of an
assignment statement.
2.5 An array’s name by itself cannot occur as the left-hand side of an assignment statement.
2.6 Function calls cannot be nested.
2.7 Each function must have at least one return statement.
2.8 A linked list is a data structure, which is created by dynamic allocation of memory.
2.9 The declaration void function-name() indicates that function-name returns nothing to the
calling program.
2.10Member variables of two different structures may have the same name.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 a[i] can be written as A. Unending loop if no break statement inside
the body
3.2 calloc( ) B. p is a pointer to a function that returns integer
3.3 union C. allocate and clear memory
3.4 for(;;) D. *(a + i)
3.5 register variable E. allocates memory but does not clear memory
3.6 int(*p)[10] F. is a memory location that is used by several
different variables, which may be of different
type.
3.7 int(*p)(void*,void*) G. directives
3.8 do-while loop H. Increase in speed of execution
3.9 #include, #define I. p is pointer to an array of integers
3.10 typedef J. p is function that returns pointer to integer
K. This guarantees that the loop is executed at
least once before continuing
L. preprocessor
M. can be used to create variables of new types

M4.1-R3 Page 3 of 6 July, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. array B. string C. typedef


D. Cast E. structure F. EOF
G. void H. C functions I. gets
J. C preprocessor K. getstr L. DEFINE
M. & N. char O. malloc

4.1 The _________ operator is used to convert one data type to another.
4.2 If the pointer variable ptr holds the address of a char, the data type of *ptr will be
__________.
4.3 File is defined with a(n) __________ statement.
4.4 Functions of type __________ do not return a value to the calling segment.
4.5 A(n) __________ is a collection of variables under a single name.
4.6 ____________ reads a whole line of input into a string until a new line or EOF is
encountered.
4.7 Expressions can be made equivalent to a single identifier using the preprocessor
_________ command.
4.8 The ____________ is a program that is executed before the source code is compiled.
4.9 The ____________ operator is unary operator to find the value of a variable.
4.10Dynamic allocation of memory for structure can be done with the help of the _________
function.

M4.1-R3 Page 4 of 6 July, 2006


PART TWO
(Answer any four questions)

5.
a) Write the C Statements (all necessary statements) that open the file inf.dat for reading,
and open the file outf.dat for writing.
b) Write the C program to write
“Introduction to C-Programming”
to the file outf.dat.
c) Write a C program that reads integers from the file scores.dat. After all the integers have
been read, the program writes the sum of all the nonnegative integers to the video
display. Assume that the file scores.dat contains at least one integer.
(5+4+6)

6.
a) Write a ‘C’ program to calculate and display the monthly income of a salesperson
corresponding to the value of monthly sales input in the scanf() function, let us consider
the following commission schedule: (Note: use if-else statement)
Monthly Sales Income
Greater than or equal to Rs.50,000 375 plus 16% of sales

Less than Rs. 50,000 but


Greater than or equal to Rs. 40,000 350 plus 14% of sales

Less than Rs. 40,000 but


Greater than or equal to Rs. 30,000 325 plus 12% of sales

Less than Rs. 30,000 but


Greater than or equal to Rs. 20,000 300 plus 9% of sales

Less than Rs. 20,000 but


Greater than or equal to Rs. 10,000 250 plus 5% of sales

Less than Rs. 10,000 200 plus 3% of sales

b) What is printed after execution of each of the following C-programs?


1. void main()
{
float reals[5];
*(reals+1) = 245.8;
*reals = *(reals + 1);
printf(“ %f”, reals[0] );
}
2. void main( )
{
int nums[3];
int *ptr = nums;
nums[0] = 100;
nums[1] = 1000;
nums[2] = 10000;
printf( “%d\n”, ++*ptr );
printf( “%d”, *ptr );

M4.1-R3 Page 5 of 6 July, 2006


}

M4.1-R3 Page 6 of 6 July, 2006


3. void main()
{
int digit = 0;
while (digit <= 9)
printf( “%d\n”, digit++);
}

4. void main()
{
int a=7, b=6;
fun1(a,b);
printf(“\n a is %d b is %d”, a, b);
}

int fun1(int c,int d)


{ int e;
e = c * d;
d = 7 * c;
printf(:\n c is %d d is %d e is %d”, c, d, e);
return;
}
(7+[2x4])

7.
a) Write a C function word_count() to count the number of words in a given string and then
call in Main().
b) Write a C function print_upper() to prints its character argument in uppercase.
c) Write a macro that clears an array to zero.
(7+4+4)

8.
a) What is a Structure? Define a structure that contains the following members:
i) An integer quantity called acct_no
ii) A character called acct_type
iii) A 40-element character array called name
iv) A floating-point quantity called balance
v) A structure variable called lastpayment, of type date: defined as an integer called
month; an integer called day; an integer called year
vi) Include the user_defined data type account within the definition.
vii) Include structure variable customer, which is 100-element array of structures
called account.
b) What is Pointer in C? How Pointers and Arrays are related?
(8+7)
9. Write short notes on any three of the following:
a) Switch statement (give proper syntax and examples)
b) What do you mean by Loop? How while-loop and do-loop differs?
c) What is C Preprocessor? Explain any two C preprocessor commands with example.
d) Break and Continue Statements
(3x5)

M4.1-R3 Page 7 of 6 July, 2006


M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be answered
in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)

1.1 Which method is used to release the connection to a database?


A) Close
B) Cls
C) Close connection
D) None of the above

1.2 How do you create a method for a class?


A) Creating a public procedure in a class module
B Creating a private procedure in a class module
C) Creating a properties of class
D) None of the above

1.3 One advantage of the object browser over the properties window is that:
A) The browser can show both function and subroutine of the registered classes
B) The browser can set the properties of the registered classes
C) The browser can show both properties and methods of the registered classes.
D) All of the above

1.4 Properties can be viewed in two ways


A) Alphabetic and Numeric
B) Numeric and alphanumeric
C) Alphabetic and categorized
D) None of the above

M4.2-R3 Page 1 of 5 July, 2006


1.5 By default, the Text Box Control can hold the text of
A) Multipleline
B) Single Line
C) Password character
D) None of the above

1.6 All the following statements are true about variable scope except:
A) Local
B) Module
C) Global
D) Static

1.7 Which one of the following command tells that the child form was most recently active?
A) Show
B) Open
C) New
D) None of the above

1.8 When you compile an ActiveX Control, the file has an extension of
A) .ctl
B) .vbp
C) .ocx
D) None of the above

1.9 In ListBox, When Multi select properties set to 1, then


A) Multiple selections allowed
B) Multiple selections not allowed
C) Group selection allowed
D) None of the above

1.10 When the form receives focus from another form, the triggered event is
A) Load
B) Show
C) Activate
D) None of the above

M4.2-R3 Page 2 of 5 July, 2006


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)

2.1 IDE stands for Integration Development Environment


2.2 Placing the controls on the form creates user interface.
2.3 Local variables can be used anywhere within the program.
2.4 The Hide method removes Form from the display, and from the memory.
2.5 Set Focus method of TextBox places the cursor in a specified text box.
2.6 You can use the timer control to perform the tasks at regular intervals.
2.7 Debug window is same as Code window.
2.8 The MultiSelect property determines how the user can select the List’s items and must be set at
runtime.
2.9 Inheritance is a mechanism of deriving a new class from old one.
2.10 SQL commands are sent to the database by means of the Open method.

3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in
column Y. Enter your selection in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

X Y
3.1 Contains the information necessary to establish a A. Dynamic Cursor
connection
3.2 Allows to view additions, changes and deletions by B. Explicit Variable
other users
3.3 The embedded data are also linked to the document C. Object Linking
from which they come
3.4 Selected portion of a text string D. ConnectionString
3.5 Argument passing mechanism E. Step Out
3.6 To copy an image from a source to a designation F. ByVal and ByRef
3.7 Displays the request information during break mode G. Mid
3.8 The default property of Err object is H. BitBlt( )
3.9 Executes the reminder of the current procedure and I. Scale mode
breaks at the next line in the calling procedure
3.10 Sets control’s current system J. Immediate Window
K. Number
L. MsgBox

M4.2-R3 Page 3 of 5 July, 2006


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question paper,
following instructions therein. (1 x 10)

A. Scope B. AddItem C. Password Char


D. Frame E. Properties window F. DLL
G. Index H. User-defined I. QueryUnload
J. ForeColor K. Internal L. Jet
M. DataItem N. KeyDown

4.1 The ________________ is used to establish initial property values for the project.

4.2 ____________ Control is used to provide an identifiable grouping for other controls.
4.3 To explicitly type a variable, you must first determine its ____________.

4.4 The _______________ field is used to create an array of commands.


4.5 The ________________ property of TextBox hides text with a single character.

4.6 The ____________ method adds a row to an MSHFlexGrid.


4.7 The ____________ property of the Picture box or form determines the color of the shape you
draw.
4.8 When an MDI form is unloaded, the ___________ event is invoked first for the MDI form.

4.9 Calling DLL routines from your program is the same as calling a(n) ____________ procedure.
4.10 A(n) ____________ loaded at runtime does not need to be linked to your applications.

M4.2-R3 Page 4 of 5 July, 2006


PART TWO
(Answer any FOUR questions)

5.
a) Write a short note on Arrays?
b) Differentiate between the class module and the standard module?
c) Define Shadowing?
(5+5+5)

6.
a) How to change the position of the form during design time? And How to position it during run
time?
b) Write short on Timer Control.
c) What are different types of Data types in Visual Basic? Explain the user defined data types.
(7+4+4)

7.
a) What are three types of programming errors and explain them in brief?
b) Describe following layers of Visual basic application?
i) User interface
ii) Data interface
iii) Transaction interface
iv) External Access Interface
c) What is MDI? Briefly explain.
(5+6+4)

8.
a) Write Short notes on following objects?
i) Connection Object
ii) Recordset object
b) What is use of Popup menu? Explain, how to create the Popup menu in Visual Basic?
c) How to manipulate menu at run-time?
(6+5+4)

9.
a) Explain with example how the ADO allows you to access data from a database.
b) Distinguish among RUN, Design and Debug modes in Visual Basic.
(8+7)

M4.2-R3 Page 5 of 5 July, 2006


2007 - January
M1-R3 to M4-R3
M1-R3: IT TOOLS AND APPLICATIONS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which one of the following is not an input device?


)A Keyboard
)B Memory
)C Monitor
)D Mouse

1.2 One of the following is an Application Software.


)A DOS
)B Windows
)C Linux
)D MS Office

1.3 Which one of the following is DOS External Command?


A) COPY
B) FORMAT
C) DEL
D) DIR

1.4 Which one of the following is a Primary Memory?


A) RAM
B) Hard Disk
C) CD-ROM
D) Floppy Disk

1.5 Which is a bootable disk?


A) The hard disk of a Computer System
B) A disk which is used to load DOS into the RAM
C) A mini floppy disk

M1-R3 Page 1 of 5 January, 2007


D) A CD-ROM

M1-R3 Page 2 of 5 January, 2007


1.6 The number system that is the basis for computer operation as
A) Hexadecimal System
B) Octal System
C) ASCII
D) Binary System

1.7 If data is processed at once as soon as it arrives, this type of data processing is called
A) Real-Time Processing
B) Batch Processing
C) Off-Line Processing
D) None of the above

1.8 CPU reads the information from secondary memory


A) First information is transferred to main memory and from there, the CPU reads
B) Directly
C) Through registers
D) None of the above

1.9 One of the following is Diagnostic Software


A) Windows-XP
B) Office-XP
C) Norton Antivirus
D) Unix

1.10 Find the odd one out


A) Control Unit
B) Arithmetic Logic Unit
C) Registers
D) Printer

M1-R3 Page 3 of 5 January, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate
one and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 To be computer literate, you must be able to write computer programs.


2.2 The computerized processing of data can only be applied to the field of business.
2.3 The ASCII computer code is primarily used in the preparation of punched paper tapes and
has little value with terminal devices.
2.4 The binary system, the place value of a digit increases or decreases by power of 2.
2.5 The word ‘bit’ is contraction of the word ‘binary digits’.
2.6 The primary function of I/O peripherals is to facilitate computer-to-computer data
transmission.
2.7 The file protection ring is an important part of the label-checking operation to protect tape
files.
2.8 Dot-matrix printer technology is available in serial and line printers.
2.9 The octal number system has a base of 8 using number from 1 to 8.
2.10 The standard toolbar has buttons for the most common tasks you perform in PowerPoint,
such as saving, printing, or spell checking a presentation.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Application Package A. Provides a storage medium for the data and
instructions to be executed.
3.2 Utility programs B. Copy the selected matter without changing the
original text.
3.3 Memory C. Used to select the text to be operated with other
command key.
3.4 DOS D. Bars let you bring different parts of a document
into view.
3.5 Copy E. Provide a good user interface to ease the
process of maintaining the files & directories.
3.6 language processor F. Control + X
3.7 (568)8 G. Control + S
3.8 Save H. A software which bridges a specification or
execution gap
3.9 Menu Bar I. (101110010)2
3.10 CPU J. Spread sheets.
K. Software placed on the hard disk.
L. Consists of ALU and CU
M. Consists of ALU and Registers
N. Consists of ALU and Programs
O. (101011101)2
P. Bar where you can choose commands

M1-R3 Page 4 of 5 January, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Main Memory B. Primary storage C. Non-Volatile


D. Volatile E. Read Only Memory F. CPU
G. RAM H. Mainframes I. Compact
J. Hard K. Eight L. Processing
M. Four N. American Standard Code O. MD
for Information interchange
P. CD Q. American Set of Codes for R. RD
Information Interchange
S. Sixteen T. System, Application U. External
V. Vector, Interrupt

4.1 The components of a CPU are ______ the arithmetic-logic unit, and the control unit.
4.2 Semiconductor storage is ________ which means that the storage loses its data
representation when electrical power is interrupted.
4.3 Two basic types of semiconductor memory are random-access memory and _______
4.4 Computers are classified into four groups: microcomputers, minicomputers and ______
supercomputers.
4.5 There are two basic types of disk: ______ disk, and floppy disk.
4.6 ASCII stands for ______.
4.7 A byte consists of ______ bits.
4.8 Information to be processed by a computer is called ______.
4.9 DOS have two types of commands: Internal and ________.
4.10 A new directory can be created by ________ command.

M1-R3 Page 5 of 5 January, 2007


PART TWO
(Answer any FOUR questions)

5. Differentiate between:
a) Time Sharing and Real time Systems
b) Multiprogramming and Multitasking
c) Memory Management and Device Management
(3x5)

6.
a) What is spooling? Do you think that advanced personal computers will have spooling as
a standard feature in the future?
b) What is networking? Give the name of the essential hardware and software used for
networking.
c) What is computer virus? What is the remedy available for computer viruses? How does
it differ from bug?
(4+6+5)

7.
a) Explain the principle and working of laser printers.
b) Explain the basic differences between a Keyboard and Mouse?
c) What is an MICR device? Explain how it helps in faster processing of bank cheques
with greater accuracy.
(6+4+5)

8.
a) What are the basic differences between memories and storage devices? Explain the
working principle of any one of the storage device.
b) Linux has been developed as a cooperative effort over Internet. Comment on this
statement.
c) In Excel, we have three functions named as ROUND( ), ROUNDDOWN( ),
ROUNDUP( ); how these are different? Explain with examples.
(6+4+5)

9.
a) What is template? What is the difference between a template and wizard?
b) What are the features of Windows Operating System? Explain the following:
i) Disk Cleanup
ii) Disk De-Fragmentor
c) Explain the various components of CPU with the help of diagram.
(3x5)

M1-R3 Page 6 of 5 January, 2007


M2-R3: BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 A sales invoice


A) Debits customers and credits sales
B) Credits customers and debits sales
C) Debits finished stock and credits sales
D) None of the above

1.2 In a data processing system, if the input data is processed, as the transaction occurs, it
is called
A) Parallel
B) Real time
C) Batch
D) Virtual

1.3 Check digit is usually added to


A) Save As important tool for data validation
B) The product code in sales analysis system to ensure that variable information is
assigned to the correct item
C) General Ledger Code to ensure that correct account head is debited/credited
D) All of the above

1.4 In preparing test data the following is not a desirable characteristic


A) Every statement should be executed
B) Must be comprehensive
C) Users do not participate
D) None of the above

M2-R3 Page 1 of 5 January, 2007


1.5 Value of stock can be done by
A) LIFO
B) Standard Cost
C) Average Cost
D) Any of the above

1.6 Which of the following commands can be used to delete all Files with extension name
“*.BAK” in the current directory while running a DBMS software?
A) RUN DEL *.BAK
B) RUN ERASE *.BAK
C) !DEL *.BAK
D) All of the above

1.7 The function to remove leading and trailing spaces from a character expression is
A) TRIP( )
B) LTRIM( )
C) RTRIM( )
D) ALLTRIM( )

1.8 Which one of the following is an invalid statement?


A) A procedure can be entered in a procedure file or in the command File itself.
B) Each procedure begins with PROCEDURE <procedure name> Command.
C) A procedure normally ends with RETURN but we can skip the RETURN at the end of the
procedure.
D) None of the above

1.9 Which command is used for closing the text file that has been created with SET
ALTERNATE TO <file name> Command?
A) SET ALTERNATE OFF
B) CLOSE DATABASES
C) CLOSE ALTERNATE
D) CLEAR ALL

1.10 The MODIFY command is used to


A) Modify the structure of a database file
B) Modify a report format file
C) Add a new field to every record of a database file
D) None of the above

M2-R3 Page 2 of 5 January, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Capital is a liability head.


2.2 Leave record, though a function in personnel management does not form part of the
payroll system.
2.3 A credit purchase transaction increases the liability of a company.
2.4 For carrying out historical analysis, previous year consumption is stored in the item
master file.
2.5 Invoice detail file is a master file in a sales invoicing system.
2.6 If RATE is a numeric field, LIST RATE/1.1 is invalid.
2.7 Up to 10 database files can be opened in a work area.
2.8 A function such as UPPER( ) can be used while indexing a database file with INDEX.
2.9 One can create an index tag while defining the structure of the database file.
2.10 STORE[20] TO NUM creates a character variable.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y

3.1 Ageing Analysis A. Pseudo code

3.2 P & L of operations B. Delivery timeliness

3.3 LIFO C. Merge in Balance Sheet

3.4 Vendor rating D. INPUT

3.5 Aid to programming E. Debtor Control

3.6 Created numeric variable F. VALID

3.7 @..GET G. Inventory Valuation

3.8 .SPR H. OTHERWISE

3.9 DO CASE I. SELECT

3.10 NO DELETE J. BROWSE

K. Screen file

L. @..SAY..GET

M2-R3 Page 3 of 5 January, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Operating profit B. Payroll C. Software


D. Semantics E. Utility Programs F. Customer details
G. Key H. Module I. Indexed
J. Zero K. Net Profit L. GO TO

4.1 A portion of a program that performs a specific program function is called ________.
4.2 ________ is the difference between gross profit and operating expenses.
4.3 Typically, a computer based provident fund system uses inputs from the computerised
________.
4.4 A unique identifying value that is found in very record in a file is called a record
________.
4.5 Routine and mundane tasks such as sorting, copying etc. are done by ________.
4.6 Study of the meaning of the language structure is called the ________ of the language.
4.7 A database management system is essentially a specialized type of ________ package.
4.8 ________ file is a master file in a sales invoicing system.
4.9 To use the LOCATE command, the database file need not be sorted or ________.
4.10 ________ statement is not desirable in a structured program.

M2-R3 Page 4 of 5 January, 2007


PART TWO
(Answer any FOUR questions)
5.
a) What is meant by data processing?
b) How is database different from a file?
c) What is a sequential file? How do we decide to use a particular file organization for an
application?
(4+4+7)

6.
a) What is database? Briefly describe the characteristics of the database.
b) What is RDBMS? Mention any four advantages of the RDBMS.
(8+7)

7.
a) What is a report generator? Explain.
b) Distinguish between Structured Programming and Modular Programming.
c) Distinguish between Sorting and Indexing.
(5+5+5)

8. Write SQL commands for a) to f) and write the output of g) on the basis of table MOV.
No. Name Type Rating Stars Qty. Price
1. Gone with the wind Drama G Gable 4 39.95
2. Friday the 13th Horror R Jason 2 60.95
3. Top Gun Drama PG Cruise 7 49.95
4. Splash Comedy PG13 Hanks 3 29.95
5. Independence Day Drama R Turner 3 19.95
6. Risk Business Comedy R Cruise 2 44.95
7. Cocoon Sci-fi PG Ameche 2 31.95
8. Crocodile Dundee Comedy PG13 Harris 2 69.95
9. 101 Dalmatians Comedy G Hoffman 3 59.95
10. Tootsie Comedy PG Croft 1 29.95
a) Find the total value of the movie cassettes available in the library.
b) Display a list of all movies with price over 20 and sorted by Price.
c) Display all the movies sorted by QTY in decreasing order.
d) Display a report listing a movie number, current value and replacement value for each
movie in the above table. Calculate the replacement value for all movies as QTY * Price
* 1.15.
e) Count the number of movies where Rating is not “G”.
f) Insert a new movie in the MOV table. Fill the entire column with some values.
g) Give the output of the following SQL statement.
i) Select MAX(Price) from MOV where Price > 30.
ii) Select SUM(Price * QTY) from MOV where QTY < 4.
iii) Select COUNT(DISTINCT TYPE).
(2+2+2+2+2+2+3)

9. A database table called PERSON contains the fields NAME, BASIC and HRA. Write a
computer program to print a report with employee name and total salary for those
employees whose total salary is more than 10,000. Total Salary = BASIC + HRA. At the
end, the program should also print the total number of employees whose total salary is
more than 10,000.
(15)

M2-R3 Page 5 of 5 January, 2007


M2-R3 Page 6 of 5 January, 2007
M3: INTERNET AND WEB PAGE DESIGN

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Router is
A) A Hardware or a software on a computer network that examines the address at where the
data is being sent and decides by which path it should be transmitted to its destination.
B) A tool for sifting and locating specified information stored anywhere on the Internet.
C) A system designed to secure a network from unauthorized access or threatening action from
an external source, such as the Internet.
D) None of the above

1.2 Output that is made up of pictures, sound and video is best described as
A) Graphics
B) Multimedia
C) Hard copy
D) Multi aspect

1.3 Web sites contain many pages that can be navigated using
A) bars
B) threads
C) hyper links
D) strings

1.4 A network that can function without a server is a


A) ring network
B) star network
C) bus network
D) all of the above

M3-R3 Page 1 of 5 January, 2007


1.5 What is the World Wide Web?
A) a computer game
B) a software program
C) the part of the Internet that enables information-sharing via interconnected pages
D) another name for the Internet

1.6 On what type of switching does Internet work?


A) Line
B) packet
C) circuit
D) bits

1.7 Software that prevents external access to a system is termed


A) firewall
B) gateway
C) router
D) virus checker

1.8 Protocol is
A) software that facilitates connection to the internet
B) a list of rules for transferring data over a network
C) software that allows file copying
D) a gateway calling program for internet bridging.

1.9 Which one of the following is a valid email address?


A) Enquiries.guilds.co.@.uk
B) sales@enquiries.guilds.co.uk
C) @sales.enquiries@guilds.co.uk
D) sales.enquiries.guilds.co.uk

1.10 Shareware is software


A) you can buy and share with anyone
B) that you can use totally free of charge continually
C) you can obtain from anywhere but must purchase after a set condition
D) that can only be shared over an in-house network.

M3-R3 Page 2 of 5 January, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)
2.1 Telnet is the basic Internet service that was designed to transfer files from one computer
system to another.
2.2 An URL is a location address on the Internet.
2.3 Usenet is a set of acceptable behaviors that users should follow while on the Internet.
2.4 E-mail is limited to text-based messages.
2.5 Gopher organizes information on the Internet using a system of menus.
2.6 Hypertext is a text with many images and sounds.
2.7 No single organization controls additions, deletions and changes to the Internet.
2.8 Download means to copy a file from your computer to another.
2.9 The term "thumbnail", in relation to a Web site on the Internet, refers to a small version
of a larger graphical image that you usually can click to display the full-sized image.
2.10 The two main file formats for images on the web are GIF and TIF.
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y

3.1 System of electronically joined computers A. Cursor

3.2 Software that allows you to explore the Internet B. Network

3.3 Movable indicator on computer screen C. Download

3.4 Visit to a Web site D. Virus

3.5 To start up a computer E. Browser

3.6 Digital infection or poison F. Hit

3.7 To confirm the identity of a computer user G. Authenticate

3.8 Connecting device between computers over a phone line H. Boot

3.9 Central computer sharing resources and data with other I. Server
computers on a network

3.10 To copy a file or program onto a personal computer J. Modem

K. Compress

L. Pixel

M. Link

N. Scanner

O. Log on

M3-R3 Page 3 of 5 January, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Download B. Upload C. Network


D. Search Engine E. Hacker F. URL
G. Internet Service Provider H. Keyboard I. System Administrator
J. Motherboard K. Homepage L. Virus
M. Boot up N. Internet O. CPU
P. Floppy Disk Q. Hard Copy R. Soft Copy
S. Worm T. Web Browser U. Attachment

4.1 A global network connecting millions of computers, used to exchange data, news and
opinions is known as __________.
4.2 _________ is the first document, users see when they enter a site on the World Wide
Web.
4.3 __________ is a program that searches documents for specified keywords and returns a
list of the documents where the keywords were found. Example: Alta Vista and Excite.
4.4 _____________is a group of 2 or more computer systems linked together by telephone
lines, cables or radio waves.
4.5 __________ is abbreviated ISP; a company that provides access to the Internet.
4.6 ________ is a file attached to an email.
4.7 _______ is a computer enthusiast or expert who gains unauthorized access to computer
systems for the purpose of stealing and corrupting data.
4.8 ____________ is a program that is loaded onto your computer without your knowledge,
runs against your wishes and can also replicate itself; an unwanted program that is
dangerous because it can quickly use all available memory and bring the system to a
halt.
4.9 _________is a abbreviation for Uniform Resource Locator, the global address of
documents and other resources on the World Wide Web.
4.10 _________ is an individual responsible for maintaining a multi-user computer system.
Typical duties include; Adding and configuring new workstations, setting up user
accounts, installing system-wide software.

M3-R3 Page 4 of 5 January, 2007


PART TWO
(Attempt any FOUR questions)

5.
a) What is the function of transport layer in OSI model?
b) What is a router? What is its use in networking? What protocol is used by routers to
select the best route and to communicate with each other?
c) Differentiate between:
i) LAN and WAN
ii) Synchronous and asynchronous transmission
(3+6+6)

6.
a) Why are Domain names required? What is the relationship between domain names and
IP addresses?
b) With reference to the Internet what is a “Cookie”? Briefly list some of the important
utilities of cookies.
c) What is a ‘Browser’? List the major browsers available. Also list the main features on
which the browsers can differ from each other.
(5+5+5)

7.
a) Describe the importance of search engines to the success of the Web and discuss the
characteristics of a successful search engine.
b) Write HTML Script to create the following web page
List 1.
1. Part 1
2. Part 2
3. Part 3
List 2.
• Section 1
• Section 2
• Section 3
c) What is an e-mail? How e-mails are sent and received? Which protocols are used for
sending and receiving mails?
(5+5+5)

8.
a) Briefly explain the following terms
i) MIME
ii) IMAP
b) How can you make your e-mail transaction more secure?
c) What is FTP and why do you need it?
(6+3+6)

9. Write short notes on any three of the following:


a) CGI
b) JAVA and JAVA Script
c) Firewalls
d) Software Piracy
(5+5+5)

M3-R3 Page 5 of 5 January, 2007


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 The && and || operators


A) compare two numeric values
B) combine two numeric values
C) compare two Boolean values
D) combine two Boolean values

1.2 The break statement causes an exit


A) only from innermost loop
B) only from innermost switch
C) from the innermost loop or switch
D) none of the above

1.3 Assuming var1 has value 20. What will following code print?
Printf(“%d %d\n”, var1--, ++var1);
A) 20 20
B) 19 20
C) 20 21
D) 21 22

1.4 When accessing a structure member, the identifier to the left of the dot operator is the
name of
A) a structure member
B) a structure tag
C) a structure variable
D) the keyword struct

M4.1-R3 Page 1 of 5 January, 2007


1.5 A static automatic variable is used to
A) make a variable visible to several functions
B) retain a value when a function is not executing
C) conserve memory when a function is not executing
D) none of the above

1.6 Which of the following directive creates functions like macros?


A) #include
B) #define
C) #undef
D) #ifdef

1.7 Which format specification is used in printf statement to print hexadecimal format
A) %i
B) %c
C) %x
D) %u

1.8 What will be the output of the following program:


Main()
{
int val = 500;
int *ptr = &val;
int **ptr1 = &ptr;
printf(“val = %d”, **ptr1);
}

A) 500
B) address of ptr
C) contents of ptr
D) none of the above

1.9 size of operator returns the size in bytes of


A) identifier
B) type
C) identifier or type
D) array

1.10The value of variable x after executing the following code will be:

val = -200;
x = (val >= 0 ) ? val : -val

A) 0
B) 200
C) –200
D) 1

M4.1-R3 Page 2 of 5 January, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 The #undef directive removes a name previously defined with #define directive.
2.2 The ‘C’ program can have only one command line argument.
2.3 The goto statement causes control to go to a function.
2.4 If you don’t use a return type in the function declaration, the compiler assumes that the
function does not return anything.
2.5 An array element is accessed using the dot operator.
2.6 Continue statement skips all subsequent statements in the loop body and triggers the next
iteration for the loop.
2.7 The strcmpi function compares two strings irrespective of case.
2.8 For loop allows a statement or compound statement to be executed at least once.
2.9 The fread function reads formatted data from a stream.
2.10 In ‘C’, unsigned int can have maximum range of values between 0 to 65535.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Group of related data items A. ?:
3.2 A file not used for text processing B. Recursion
3.3 Reserved word C. Structure
3.4 A variable that keeps its value even after program D. typecast
exits the block in which it is declared
3.5 A data type used for saving storage area E. keyword
3.6 The process by which function calls itself F. Union
3.7 An operation in which value of one type converted G. Binary file
into value of different type.
3.8 An operator expressed in three part expression H. Call by reference
3.9 A sequence of bytes flowing into or out of program I. Automatic variable
3.10 An external source file that contains declarations and J. Executable file
definitions.
K. Type checking
L. Static variable
M. stream
N. Header File

M4.1-R3 Page 3 of 5 January, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Union B. 4 C. float
D. indirection E. NuLL F. semicolon
G. void H. header file I. Function
J. 2 K. pragma L. 5
M. integers N. Macro O. Recursion

4.1 The expression 11%3 evaluates to __________.


4.2 In a 32 bit system float data type will occupy __________ bytes.
4.3 The closing brace of a structure is followed by __________.
4.4 A function that does not return anything has return type __________.
4.5 A(n) __________ cannot be passed to a function as an argument.
4.6 An instruction to the compiler to perform an action at compile time is called __________.
4.7 __________ is an example of derived data type.
4.8 Enumerations can be internally treated as __________.
4.9 Accessing a data object through a pointer rather than directly by name is called ______.
4.10 An identifier defined in a #define preprocessor directive to represent another series of
character is called __________.

M4.1-R3 Page 4 of 5 January, 2007


PART TWO
(Answer any FOUR questions; Include appropriate documentation, wherever necessary)

5.
a) Develop a flowchart and then write a C program to display all prime numbers less than
the number entered by the user.
b) Explain the difference between an array, structure and an enumerated data type.
(10+5)

6. Write an algorithm and then develop a program to evaluate the roots of a quadratic
equation. Define and use a function cal_roots() to calculate the roots such that roots are
also available in calling function i.e. use pointers.
(15)

7. Develop a flowchart and then write a C program to find the occurrence (single or
multiple) of a substring in a given string. The substring and string are entered by the
user. Also point out the location at which the substring occurs.
(15)

8.
a) Explain the difference between parameter passing mechanism “Call by value” and “Call
by reference”. Which is more efficient and why?
b) Develop a flowchart and logic to implement the stack data structure using link list.
(5+10)

9.
a) Draw a flowchart and then write a C program to enter the roll number and marks of any
three subjects of few students from the keyboard and write to a file.
b) It is said that “C is a middle level language and is good for system level programming.”
Describe three facilities available in ‘C’ which support this statement.
(10+5)

M4.1-R3 Page 5 of 5 January, 2007


M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 How do you allow the user to customize the toolbar in a form?
A) Write code to add buttons or remove buttons based on the user selection
B) Set the AllowCustomize property to True and the control takes care of the rest
C) Toolbar custom action is automatic with any toolbar
D) None of the above

1.2 What is the final keyword used to indicate the end (compilation) of a sub procedure?
A) End Sub
B) Exit Sub
C) End
D) None of the above

1.3 Which of the following is a valid data type in VB?


A) Integer
B) Float
C) Char
D) Variable

1.4 When is the Terminate event of a form triggered?


A) When the user moves to another form
B) When the form is unloaded
C) When for form is initialized
D) When all references to the form are deleted

M4.2-R3 Page 1 of 5 January, 2007


1.5 In setting up a text box as a bound control, which property specifies the field of the record
set to be displayed?
A) Name
B) DataSource
C) DataField
D) Caption

1.6 Which of the following is applicable to MDI application?


A) An MDI application need atleast one child and one parent form.
B) MDI Parent form contains labels and text boxes
C) Child forms may or may not contained within the borders of the parent form
D) Parent form provides an interface with which you can work

1.7 The Key property for Picture Box control is


A) Picture
B) Caption
C) List
D) Value

1.8 Which of the following statement tells VB to retry the statement that caused the error?
A) Resume Next
B) Resume
C) Retry
D) Resume Line

1.9 Which of the only event for a menu control is available?


A) Load
B) Resize
C) Click
D) KeyPress

1.10 A new property in a class module has been created; but its scope is not specified. What
scope is it?
A) Private
B) Friend
C) Public
D) Global

M4.2-R3 Page 2 of 5 January, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Menu Editor in VB provides a facility to assign hot key to menu item.
2.2 A variable is a name that references an area of memory which holds a temporary value.
2.3 LoadEvent statement is used to trigger an event in your activeX control.
2.4 *.jpg image file formats can be loaded into ImageList control.
2.5 If you want to remove controls dynamically from your form, you can only remove controls
from the form that you have created dynamically.
2.6 By setting the Index property one can create the first element of a control array.
2.7 The Recordset is used to retrieve records from the database.
2.8 Set property statement is required for a read only property.
2.9 The Form’s deactivate event is generated when another form receives the focus.
2.10 KeyPress event enable you to determine which key was pressed by the user.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Twips A. Key element to create data applications
B.Defa 3.2
ult
units
for
measu
ring
the
size of
the
form
3.3M LBound C. Event that can change the size and position of the control
ouse
Up
3.4 Count D. Line of code has been incorrectly entered
3.5 Panel objects E. Event used to activate pop-up menu
3.6 Recordset F. A condition in the program causes an error
3.7 ADODC G. A property of a control array
3.8 Resize H. Is used to create a method for a class
3.9 Run-time errors I. Only property supported by collections
3.10 Public procedure J. Set the Public property to True
K. Provides the link to specific data

M4.2-R3 Page 3 of 5 January, 2007


L. Status Bar control in which information is displayed

M4.2-R3 Page 4 of 5 January, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Collections B. Name C. FormLoad


D. Private class E. LostFocus F. Toolbar
G. Public class H. Modless I. Multilevel
J. Modal K. Property Get L. Polymorphism
M. PictureBox N. Control arrays O. Global

4.1 ___________ event is fired when user moves to another form.


4.2 A global variable is _________ in its scope.
4.3 ________ is the menu item property that you can change at runtime.
4.4 _________ provide means of organizing a group of related objects.
4.5 _________ form doesn’t allow the user to activate other window.
4.6 Any class defined in a standard executable program is a __________.
4.7 The _____________ control supports more events, properties and methods than Image
control.
4.8 ___________ relates to the use of the same method name in various objects.
4.9 One can create his own enhanced message and input dialog box using __________.
4.10 ___________ used to retrieve the current value of the property.

M4.2-R3 Page 5 of 5 January, 2007


PART TWO
(Answer any FOUR questions)

5.
a) Visual Basic application provides the interface between the user and the database. What
are the basic steps in developing VB applications?
b) Events are useful in the sense that they tell the form when to take actions. Write down
the steps in sequence to create Event in a Class.
c) Forms are used to develop the user interface. Write a program to create and remove
forms at run time.
(2+3+10)

6.
a) Variables are used by Visual Basic to hold information needed by your application.
What are Visual Basic data types? Briefly explain each type.
b) Arrays and collections provide a means of organizing a group of objects. What are the
differences between Control Arrays and Controls Collection?
c) What are the uses of Text Boxes in Windows Programs?
d) Modules are files that contain program code. List the different types of modules in VB.
(4+4+4+3)

7.
a) Write down the Form Methods to draw Lines and Circles.
b) How can we establish the connection of a data bound control to a database using the
Data Environment?
c) Give the differences between check box control and option button control.
(5+5+5)

8.
a) MDI applications are useful when it requires working with multiple documents. Write a
program to create MDI application.
b) Data validation is checking the input of a program against the conditions specified. Write
a program to check validating data at Field level.
c) Write short note on: Visual Basic standard controls.
(5+5+5)

9.
a) List Five Properties of the ADO Data Control Recordset and explain them.
b) Explain: Error trapping and handling in VB.
c) Write down the steps in sequence for adding and deleting records with the ADODC.
(5+5+5)

M4.2-R3 Page 6 of 5 January, 2007


2007 - July
M1-R3 to M4-R3
M1-R3: IT TOOLS AND APPLICATIONS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1. Octal equivalent of the pure binary bits (1001101)2 is:


A) 464
B) 715
C) 125
D) 115

1.2 Which of the following is not an example of an Application Software?


A) MS-Word
B) Screen saver program
C) Operating system
D) Antivirus program

1.3 A printer's image quality is usually measured in:


A) Characters per second
B) Pages per minute
C) Dots per inch
D) Pixels

1.4 What do folders let you do?


A) Organize the files on a disk
B) Ensure the computer starts properly
C) Name your files
D) Create a file allocation table

1.5 A dot matrix printer works by


A) Pushing pins against an inked ribbon
B) Using hammers to strike a spinning band of characters
C) Spraying ink on the page
D) Using heat to stick toner onto the page

M1-R3 Page 1 of 5 July, 2007


1.6 Some keyboards have a small joystick built into them, between the g and h keys. This
type of device is called a(n)
A) TrackStick
B) Alternative pointing device
C) Tracking device
D) Integrated pointing device

1.7 In MS-Word you can force a page break:


A) By positioning your cursor at the appropriate place and pressing the F1 key
B) By using the Insert/Section Break
C) By positioning your cursor at the appropriate place and pressing Ctrl+Enter
D) By changing the font size of your document

1.8 Embedded software is used in:


A) On-line Railway Information System
B) Mobile Phones
C) e-learning software
D) Multimedia Movies

1.9 In a spreadsheet, a statement that performs a calculation is called a(n)


A) Formula
B) Reference
C) Argument
D) Parameter

1.10 Which of the following can be embedded into a slide?


A) A Web page
B) An audio clip
C) A video clip
D) All of the above

M1-R3 Page 2 of 5 July, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 A storage device is a hardware component that writes data to and reads data from a storage
medium.
2.2 In a binary representation, we used digits 1 and 2.
2.3 ROM, which stands for read-only memory and is also known as firmware, cannot be written
on or erased by the computer user.
2.4 High-end laser printers offer resolutions as high as 300 dpi.
2.5 One of the operating system's function is to manage the way information is stored on and
retrieved from disks.
2.6 The default file extension for all Word documents is .doc
2.7 In order to create columnar data in Word you need to Set tabs or use the Table menu.
2.8 A1 is an example of an absolute cell reference.
2.9 The wrong choice of colors can make text difficult to read on a slide in Power Point.
2.10 A presentation usually includes a single slide.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Duplexing A. basic unit for storing data.
3.2 Cell B. the ability to print on both sides of a piece of paper
3.3 USB C. rounds a number up to the nearest integer or to the
nearest multiple of significance
3.4 Alt+Shift+X D. Single user system by several users
3.5 Style E. Use of mark terms you want to include in your index
3.6 Upper memory F. port for connecting peripheral devices to a PC
3.7 Assembler G. Internal DOS command
3.8 Time sharing system H. Interactive multi-programmed system with several
users.
3.9 DIR/w I. A collection of format setting that you can apply to a
paragraph or to selected text.
3.10 CEILING( ) J. is the memory located between 640 kilobytes and
1 megabyte of RAM.
K. Rounds a number down towards zero to be nearest
multiple of significance.
L. translates assembly language programs into
machine language
M. External DOS command
N. is the memory located onward 1 MB of RAM

M1-R3 Page 3 of 5 July, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

alignment hard laser


shell cursor Network Interface Card
Slides drag template
soft style slide view
VRAM online view pages

4.1 Printers are an essential resource for creating a(n) ________ copy.
4.2 For a computer to be connected to a LAN, the computer must have a(n) ________.
4.3 ________ chips are used to store display images for the monitor.
4.4 The part of operating system that allows the user to communicate, or interact, with it is
called the ________.
4.5 To resize a frame or text box, click it, then ________ one of its handle.
4.6 The ________ is the symbol on the screen that shows where data may be entered next.
4.7 ________ is a pattern for a document that controls fonts, sizes and other format settings.
4.8 ________ is a way of organizing text. It refers to the position of the text relative to the
margins.
4.9 The ________ helps in getting the detailed picture of each slide.
4.10 A collection of ________ is called a presentation.

M1-R3 Page 4 of 5 July, 2007


PART TWO
(Answer any FOUR of the following)

5.
a) Define the term “Byte”. What is the difference between bit and a byte?
b) Illustrate the difference between primary and secondary storage.
c) List any four devices which can be used both as Input and Output devices.
d) Convert (14E)16 and (6DC)16 to its binary equivalent.
(3+4+4+4)

6.
a) What is an Operating System? Discuss its application for a computer system?
b) What is the role of “Disk Cleanup” and “Disk Defragmenter” in Windows?
c) Explain the difference between Multiprogramming and Multiprocessing systems?
d) Illustrate three applications of Information Technology in Railways.
(4+4+4+3)

7.
a) Explain the components of CPU.
b) What is difference between application software and system software? Explain.
c) What is the difference between Assemblers and Compilers? Explain.
(5+5+5)

8.
a) How to work with macros in Excel?
b) What are cell references?
c) Consider the following worksheet and explain the meaning of formula written in cell B6,
and what will be the result of this?

A B
1 Property Value Commission
2 100,000 7,000
3 200,000 14,000
4 300,000 21,000
5 400,000 28,000
6 Formula =SUMIF(A2:A5,">160000",B2:B5)
(5+5+5)

9.
a) How do presentation programs help modern business operations?
b) What is the role of “slide transition” and “animation” in presentation?
c) How do you setup headers and footers in MS-Word? Discuss briefly.
d) How are tables and charts created in MS-Word? How do you insert a picture in
MS-Word?
(3+4+4+4)

M1-R3 Page 5 of 5 July, 2007


M2-R3: BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Purchases from suppliers form part of


A) Subsidiary ledger
B) Payroll transaction file
C) Balance sheet
D) Sales register

1.2 The objective in maintaining an inventory control operation is


A) To maximize the money invested
B) To reduce the cost of storing, handling and insuring a large quantity of goods
C) Hard Disk
D) Arithmetic Logic Unit

1.3 Which of the following is true about a disk file where WRITE statement will always place a
record in the next physical position?
A) Sequential file
B) Relative file
C) Indexed file
D) None of the above

1.4 The most efficient and well designed computerized payroll system would be
A) On-line real time system
B) Batch processing system
C) Both A) and B)
D) None of the above

M2-R3 Page 1 of 5 July, 2007


1.5 If AGE and SALARY are numeric fields in a database file, which of the following
commands is incorrect.
A) REPLACE ALL AGE WITH AGE+1 FOR AGE < 20
B) REPLACE ALL AGE WITH AGE+1 WHILE AGE > 20
C) REPLACE AGE WITH AGE+1 FOR AGE < 20 ALL
D) All of the above

1.6 The command to create a new database file based on two open database files is
A) SET RELATION
B) UPDATE
C) JOIN
D) None of the above

1.7 ? STUFF (“Baby”,3,2,”ba”) returns


A) baby
B) baba
C) Baba
D) Bob

1.8 The command REINDEX will


A) Rebuild all open index files in the currently SELLECTed work area using the key
expression defined by the original INDEX command
B) Rebuild all the index files on the hard disk
C) Rebuild all the index files in a particular directory
D) Both B) and C) above are correct

1.9 Which of the following is an invalid command?


A) SET TALK OFF
B) SET BELL ON
C) SET DATE TO BRITSH
D) SET ALTE ON

1.10 The command ? ISALPHA("D1353") will return


A) D
B) .F.
C) .T.
D) None of the above

M2-R3 Page 2 of 5 July, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 A suspense account reflects balances which do not have clear cut account heads defined.
2.2 A purchase transaction increases the liability of a company.
2.3 Invoice detail file is a master file in a sales invoicing system.
2.4 In indexed sequential operation, records are held in sequential order on the disk and the
index is kept permanently on the main storage for fast access.
2.5 While creating a report with CREAT REPORT, each record can occupy only one detail line.
2.6 Structured programming diminishes the efficiency of coding of programs.
2.7 SORT ON NAME + AMOUNT TO BANK is a valid command.
2.8 If a database file contains 5 fields, its structural compound index file can have a maximum of
5 index tags.
2.9 ALLTRIM() removes leading blanks from the specified character expression.
2.10Consider the following code:
X="Hello! How are you?"
? LEN(X)
will return the value as 16.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Inventory control A. match Dr and Cr
3.2 Stockout B. warning signal
3.3 Re-order level C. sends to printer
3.4 ??? D. displays in the same line
3.5 VAL( ) E. ABC analysis
3.6 TRANSFORM( ) F. inventory malfunction
3.7 IIF( ) G. provides a picture formatting to the
numeric output
3.8 Double entry books H. results in compactness in the program
code
3.9 ALIAS I. copies the contents of previous record to
the text
3.10 SET CARRY ON J. links the active database file to another
database file
K. alternate name for a database file
L. removes all records

M2-R3 Page 3 of 5 July, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. query language B. fields C. data processing


D. Identify the problems E. two F. data definition language
G. system flow chart H. LOCATE I. data manipulation language
J. transaction file K. three L. ASTERISKS

4.1 Every business transaction has ________ effects.


4.2 The ________ is used to define the structure of a database.
4.3 The ________ enables users to define their requirements for extracting the desired
information from the database in the form of queries.
4.4 ________ is defined as a series of actions or operations, which convert data into useful
information.
4.5 ________ is used to store input data until it can be processed.
4.6 ________ are the basis of FoxPro's indices.
4.7 Physical model of an information system is represented by ________.
4.8 If the table has no appropriate indices, you have to use ________.
4.9 The ________ command clears all data from the current window.
4.10 A periodic report can be used to ________.

M2-R3 Page 4 of 5 July, 2007


PART TWO
(Answer any FOUR questions.)

5.
a) Explain the role of planning in business.
b) What are the commonly used file organizations in business data processing?
c) What do you understand by object linking and embedding? Explain it.
(5+5+5)

6.
a) Distinguish between a master file and a transaction file.
b) How information is stored by FoxPro?
c) Distinguish between logical and relational operators?
(5+5+5)

7.
a) What is a relational database system? Explain with example.
b) Explain the IIF( ) function with an example.
c) Explain advantages of programming in visual FoxPro.
(5+5+5)

8.
a) What is the purpose of SET FILTER command? Give an example.
b) How forms are generated in visual FoxPro?
c) Explain one-to-many and many-to-one queries.
(5+5+5)

9.
a) How does a computerized payroll system work?
b) A database file ADDRESS contains name and address of employees working in a
company. Write a program in visual FoxPro to accept the name of a person in a variable.
Also check whether it exist in a database or not. If the file exists, display the NAME and
AGE from the database, otherwise display a message- “Name not found”.
(7+8)

M2-R3 Page 5 of 5 July, 2007


M3-R3: INTERNET AND WEB DESIGN

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Synchronous protocols


A) Transmit characters one at a time.
B) Allow faster transmission than asynchronous protocols do.
C) Are generally used by personal computers.
D) All of the above.

1.2 In OSI network architecture, the dialogue control and token management are
Responsibilities of
A) Session layer
B) Network layer
C) Transport layer
D) Data link layer

1.3 The X.25 standard specifies a


A) Technique for start-stop data
B) Technique for dial access
C) DTC/DCE interface
D) Data bit rate

1.4 The basic Ethernet design does not provide


A) Access control
B) Addressing
C) Automatic retransmission of a message
D) Multiple virtual networks

M3-R3 Page 1 of 5 July, 2007


1.5 Which of the following is not a standard synchronous communication protocol?
A) SDLC
B) SMTP
C) SLIP
D) PAS

1.6 An example of a bounded medium is


A) Coaxial cable
B) Wave guide
C) Fiber optic cable
D) All of the above

1.7 The area of coverage of a satellite radio beam is known as


A) Footprint
B) Circular Polarization
C) Beam width
D) Identity

1.8 The slowest transmission speeds are those of


A) Twisted pair wire
B) Coaxial cable
C) Fiber-optic cable
D) Microwaves

1.9 Error detection at a data link level is achieved by


A) Bit stuffing
B) Cyclic redundancy code
C) Hamming codes
D) Equalization

1.10 The 32-bit internet address 10000000000010100000001000011110 will be written in


dotted decimal Notation as.
A) 148.20.2.30
B) 164.100.9.61
C) 210.20.2.64
D) 128.10.2.30

M3-R3 Page 2 of 5 July, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1.A T-switch is used to re arrange the connection between computing equipments.


2.2.Digital signal change from one voltage to another in discrete copy jumps.
2.3.A modem operating at 300 bps can transmit about 30 characters per second.
2.4.A fiber-optic cable can conduct laser light.
2.5.T-switched networks route messages automatically among devices.
2.6.The term gateway is commonly used to define a facility, which interconnects two Networks
so that users on one network can communicate with users on another Network.
2.7 The physical layer, in reference to the OSI model, defines the interface between the X.
25 network and the packet mode device.
2.7.In reference to the OSI model, the data link layer can detect the physical layer.
2.8.The network layer is also known as packet layer.
2.10 ARPANET, a united state network was the second Wan (Wide Area Network).

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 In OSI network architecture the routing A. VDR
is performed by
3.2 Layer one of the OSI model is B. Ring network
3.3 Standard RS-232 signal C. Bipolar
3.4 The transmission signal coding method D. Network layer
of TI carrier
3.5 An important characteristics of LAN is E. Application independent interface
3.6 FDDI is F. Physical Layer
3.7 Modulation G. UDP
3.8 T-switch H. Rearrange of connection between
computing equipments.
3.9 Data Link Layer I. Transmission of signal without
modulation.
3.10 Baseband J. The virtual circuit interface to Packet-
switched service
K. Common bit oriented data link protocol
issued to ISO.
L. Converting digital signals to analog
signals.

M3-R3 Page 3 of 5 July, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. 32 kbps B. TFTP C. Switch


D. Half duplex E. FTPT F. TELNET
G. Scattering H. Modem I. Circuit switching
J. Data link layer K. Multiplexer L. X.25 level-2-ISO
M. AM radio transmission N. 64 kbps O. Packet Switching

4.1 A device that can convert digital signal to analog signals is ________.
4.2 The communication mode that supports two-way traffic but only one direction at a time is
________.
4.3 ________ OSI model is responsible for creating and recognizing from boundaries.

4.4 ________ Provide dedicated communication channel between two stations.


4.5 ________ TCP/IP protocols is used for file transfer with minimal capability and minimal
overhead.
4.6 ________ Protocol is used for remote terminal connection service.

4.7 The data rate of the ISDN basic access B-channel is ________.
4.8 Loss in signal power as light travels down the fiber is called ________.

4.9 ________ is a not example of network layer.


4.10 The frequency range 300kHz to 3 MHz is uses for ________.

M3-R3 Page 4 of 5 July, 2007


PART TWO
(Answer any FOUR questions)

5.
a) Describe OSI reference model with layered approach.
b) What is the network topology? Discuss the most common topologies.
c) Give the basic features of Intranet that differentiate it largely from Internet.
(5+6+4)

6.
a) What is data transmission? Give in brief the various characteristics.
b) Discuss the advantages of Firewalls.
c) Optical Fiber can be used for network connection to provide Noise resistance? Discuss
with its advantages.
(7+4+4)

7.
a) How does a router differ from a bridge?
b) How does e-mails are sent and received using SMTP & POP protocols.
c) How multicasting and broadcasting differentiate each other? Explain.
(5+5+5)

8.
a) What is ATM? Discuss all the four types of services of ATM.
b) Give HTML coding for the following table:
S.No. Name Class Entry No. Date of Birth Address
1. Sunil Kumar B. Tech. 06BT0573 01.10.1985 16, Sundar Nagar, N. Delhi.
2. Anil Kumar B. Tech. 07BT0763 02.11.1984 17, Janak Puri, N. Delhi.
3. Mamta B.E. 06BT0765 04.07.1984 32, Civil Lines, N. Delhi.
(8+7)

9. Define any three of the following.


a) FTP
b) ISDN
c) Cyber Crime
d) TCP/IP
(5x3)

M3-R3 Page 5 of 5 July, 2007


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book
for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which of the following is a valid octal constant?


A) 32
B) 032
C) 049
D) 0x49

1.2 Which of the following switch statement is not a valid statement to print “RED” if a character
variable ‘color’ has the value ‘R’ or ‘r’?
A) switch (color) { case ‘R’: case ‘r’: printf(“RED”); break; }
B) switch (color) { case ‘R’: printf(“RED”); break;
case ‘r’ : printf(“RED”); break; }
C) switch (toupper(color)) { case ‘R’: printf(“RED”); break; }
D) switch (color) { case ‘R’ || ‘r’ : printf(“RED”); break; }

1.3 What will be the output of the following code segment, if the function is called as
larger(10, 20) ?
int larger(int x, int y) {
int max = x;
if (max < y) {
max = y;
return y;
}
else
return x;
printf(“Larger of %d and %d is %d”, x, y, max);
}

M4.1-R3 Page 1 of 6 July, 2007


A) Program will not compile as the function has two return statements.
B) Program will not compile as no statement is allowed after return statement.
C) Larger of 10 and 20 is 20.
D) No output.

1.4 Given the code segment:


char a[] = “abc”, *p;
Which of the following assigns the starting address of the string “abc” to p?
A) p = a;
B) p = &a;
C) p = *a;
D) *p = a;

1.5 To read and write an existing file without overwriting, the following mode is uded.
A) r
B) w
C) r+
D) w+

1.6 If an array is defined as static char a[10]; then the elements of a will be set to
A) an undetermined value
B) zero
C) blank character
D) character ‘~0’

1.7 For the code segment


struct DOB { int date, month, year;};
struct person { char name[30];
struct DOB birthdate; } p, *ptr = &p;
Which of the following is not a valid expression to access year of birth date?
A) ptr -> birthdate.year
B) (*ptr). birthdate.year
C) ptr.birthdate.year
D) p.birthdate.year

1.8 Which of the following statement is false for the statement?


main(int ac, char *av[])
A) av is an array of pointers to strings.
B) av[0] represents the name of the program under execution.
C) the formal arguments names have to be argc and argv only.
D) the main function can return an integer to the calling function/program.

1.9 What will be the output of the following?


main() {
int a = ‘A’;
printf(“%d”, a);
A) 65
B) A
C) a
D) the program will not compile as an integer variable is assigned a character constant.

M4.1-R3 Page 2 of 6 July, 2007


1.10 Consider the following code segment:
for (odd_sum = 0, j = 1; *** ; j += 2)
odd_sum += j;
In order to sum all the odd numbers between 1 to 100; which of the following statements
cannot replace ***?
A) j <= 99
B) j < 99
C) j <= 100
D) j < 100

M4.1-R3 Page 3 of 6 July, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)

2.1 An escape sequence begins with a backward slash followed by an alphabetical character.
2.2 The for loop can be used only for the cases when the number of passes is known in
advance.
2.3 Let an array arr be a member of a structure s. If s is passed to a function, test as test(s),
then the changes in arr, if any, by test will not be reflected in the calling function.
2.4 In a recursive function with local variables, a different set of local variables with the same
name are created during each call.
2.5 Two enumeration constants defined in an enumeration definition can have same integral
value.
2.6 The sizeof operator can only be used with variables that are allocated space using malloc()
function.
2.7 If u is a union variable, then using isalpha(u) it is possible to know whether u is storing an
alphabet or not.
2.8 If a file is created with fwrite() function, then it is valid to read it using fscanf() function.
2.9 NULL is a keyword in C.
2.10 A function name can be passed as an argument to another function.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Self referential data structure A. Arrays
3.2 Converting to a different data type B. Flowchart
3.3 Creating new data type C. while(0)
3.4 Removing repetitive coding D. Register variables
3.5 Infinite loop E. Recursion
3.6 Pictorial representation of logic F. Function
3.7 Request to compiler G. Declaration
3.8 Defining constants H. typedef
3.9 Global variables I. #define
3.10 Space allocation to variables J. Static
K. Algorithm
L. Linked lists
M. type casting
N. Definition
O. External variables
P. for(; ;)

M4.1-R3 Page 4 of 6 July, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the
list below. Enter your choice in the “tear-off” answer sheet attached to the question paper,
following instructions therein. (1 x 10)

A. actual B. 4 C. character
D. false E. self-referential structure F. formal
G. stream oriented H. heterogeneous I. declaration
J. 1 K. 5 L. text
M. unknown N. non linear O. union
P. pointer Q. 0 R. linear
S. sparse array T. true U. unformatted
V. definition W. Integer X. linked list

4.1 The data structure with most of the entries as 0 (zero) is a(n) ________.
4.2 A null terminated array of ________ is a string.
4.3 A constant can be valid ________ argument to a function.
4.4 The statement struct point { int x, y;}; is a structure ________.
4.5 Linked list is a ________ data structure.
4.6 The expression pv + 3 is valid but not pv *3 if pv is a(n) ________ variable.
4.7 A(n) ________ file can be created with specially written program only.
4.8 The size of an array defined as char color[] = “BLUE”; is ________.
4.9 In expression ((j + k > 10) || (n > -3)), (n > -3) will be evaluated if (j + k > 10) is ________.
4.10 The loop do { … } while (0); will be executed ________ times.

M4.1-R3 Page 5 of 6 July, 2007


PART TWO
(Answer any FOUR questions)

5.
a) Write a ‘C’ program to compute the following series:
1 – x + x2/2 – x3/6 + x4/24 + + (-1)nxn/n!
Where n and x is to be accepted by the user.
b) Develop a flowchart and then write a ‘C’ program to sort strings passed to the program
through the command line arguments. Also display the sorted strings.
(6+9)

6.
a) Define a structure to store roll_no, name and marks of a student.
b) Using the structure of Q6. a), above write a ‘C’ program to create a file “student.dat”. There
must be one record for every student in the file. Accept the data from the user.
c) Using the “student.dat” of Q6. b), above write a ‘C’ program to search for the details of the
student whose name is entered by the user.
(3+6+6)

7.
a) Write a ‘C’ function to reverse a singly linked list by traversing it only once.
b) Write a ‘C’ function to remove those nodes of a singly linked list which have duplicate data.
Assume that the linked list is already in ascending order.
(7+8)

8.
a) What do you understand by loading and linking of a program?
b) Write a ‘C’ function to generate the following figure for n = 7.
1
1 3
1 3 5
1 3 5 7
1 3 5
1 3
1
The value of n is passed to the function as an argument. Print the triangle only if n is odd
otherwise print an error message.
c) Write a ‘C’ function to arrange the elements of an integer array in such a way that all the
negative elements are before the positive elements. The array is passed to it as an
argument.
(3+6+6)

9.
a) Write a recursive function in ‘C’ to count the number of nodes in a singly linked list.
b) Develop a flowchart and then write a ‘C’ program to add two very large positive integers
using arrays. The maximum number of digits in a number can be 15.
(5+10)

M4.1-R3 Page 6 of 6 July, 2007


M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1. Where you write Visual Basic code for your application?
A) Form Layout Window
B) The Code Editor Window
C) The Project Explorer Window
D) Form designer

1.2. Which of the following is not a property of a TextBox?


A) List count
B) Multiline
C) Scroll Bar
D) Max Length

1.3. Which of the following is not a Visual Basic object?


A) Command Button
B) Form
C) Project
D) Text Box

1.4. The statement: image1.Move X, Y is used to:


A) Move the image1 so that its upper-left corner has the X,Y coordinate
B) Move the image1 so that its center has the X,Y coordinate
C) Move the image1 so that its upper-right corner has the X,Y coordinate
D) Not a valid statement.

1.5. When is the Form_MouseDown() event procedure executed?


A) When the user clicks the mouse on the Exit button.
B) When a mouse button is pressed inside a free area of the form
C) When function key is pressed inside a free area of the form.
D) When the mouse moves inside a free area of the form.

M4.2-R3 Page 1 of 5 July, 2007


1.6. The InputBox() function :
A) used to display message
B) returns a string data
C) returns a numeric value
D) returns no value

1.7. The KeyPress event occurs:


A) When you press any key.
B) When you press any function key.
C) When you press any non-ASCII key.
D) When you press an ASCII key.

1.8. In Break Mode where can you change the value of variables?
A) The Watch window
B) The Locals window
C) The Immediate window
D) The Call Stack

1.9. When you require write a VB code to enter and commit the new records to the
database, which one of the following command of the control’s RecordSet is not
required?
A) ADDNew
B) Update
C) Delete
D) None of the above

1.10. When variables are passed by reference (ByRef) to a SUB program,


A) only the memory addresses of the variables are passed.
B) a value of a variable is passed.
C) a copy of the variable is passed.
D) none of the above

M4.2-R3 Page 2 of 5 July, 2007


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 A time control is not visible at runtime.


2.2 ListBoxes provide two property arrays into which you can place data: List and ItemData.
2.3 MsgBox() display a dialog box that always contain OK and Cancel command buttons.
2.4 Win32 API is a set of functions which can be used without the VB applications.
2.5 The lowest TabIndex setting is always 1.
2.6 The scroll bar controls use the Scroll and Change events to monitor the movement of the
scroll box along the scroll bar.
2.7 A LostFocus event procedure is primarily used for verification and validation updates.
2.8 A pop-up menu is a menu that is displayed over a form, independent of the menu bar.
2.9 If you load an MDI child window without having loaded its associated MDI Frame, the MDI
frame is not loaded automatically.
2.10 Exit statement allows you to exit prematurely from a block of statements in a control
structure, from a loop, or even from a procedure.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Property A. Present a set of choices to the user
3.2 ScaleMode B. DAO object
3.3 InputBox C. A logical set of records.
3.4 ComboBox D. The ActiveX control projects
3.5 Option buttons E. Sets the coordinates for plotting points.
3.6 DBEngine F. function to display messages.
3.7 Recordset G. function to get information from the user.
3.8 OCX file H. control combines the features of a text box and a list box.
3.9 Redim I. Static Array
3.10 PSet J. is a characteristic of an object, such as size, caption, or
color.
K. is the property defines the units of the coordinate system of
the object.
L. Dynamic Array
M. Sets the color of an individual pixel.
N. VB projects executable file

M4.2-R3 Page 3 of 5 July, 2007


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. SetText B. event handler C. PictureBox


D. TextBox E. MsgBox F. ListCount
G. Modeless H. Name I. Modal
J. Dynamic Array K. DataBaseName L. RecordSource
M. WindowState N. Separator Bar O. Control Array

4.1 The number of elements in the ListBox is maintained by VB via the ________ property.
4.2 You can change the size of the form by setting the ________ property of the form.
4.3 ________ is a horizontal line used to separate menu items.
4.4 ________ is a group of controls that share the same name and type.
4.5 ________ copies text onto the Clipboard.
4.6 The combination of the control’s name and the event’s name is unique and is the name of
the ________.
4.7 ________ Form takes total control of the application and won’t let the applications proceed
unless the Form is closed.
4.8 The ________ control is used to display images.
4.9 The ________ dialog box function is used to display the output.
4.10 The ________ property indicates where in the database the data will be found.

M4.2-R3 Page 4 of 5 July, 2007


PART TWO
(Answer any FOUR questions)

5.
a) What do you understand by event-driven programming in VB? Write down a few events
of a VB form.
b) What are the decision structures in VB? Describe Do While loop structure with an
example.
c) What is IDE (Integrated Development Environment) of VB? Write down five major
elements of VB IDE.
(5+5+5)

6.
a) How do you center a Form?
b) What does Option Explicit refer to?
c) What is the difference between the Enabled property and the Visible property of a
menu control?
d) Write code that displays a dialog box with the title “ERROR”, the message “Disk error!”,
an OK button, and an exclamation point icon.
e) Write code to places "Germany," "India," "France," and "USA" into a list box named
List1.
(3x5)

7.
a) What is a Combo box? When to use a Combo Box instead of a List Box? What are the
Style Properties of Combo Box? Which property on a Combo Box do you set with a
column name, prior to setting the DataSource, to display data in the combo box?
b) What is ADO? What are its objects?
(8+7)

8.
a) How to create Option Button groups?
b) An important characteristic of a graphic object is its color. You can use
the RGB() fuction or QBColor() fuction to specify the color of objects.
Explain how these two functions are different.
c) What is a menu control array? How do you create a menu control array for the Edit
menu controls Cut, Copy, and Paste (mnuEditItem) in the Menu Editor?
(4+4+7)

9. Describe any three of the following:


a) MDI Applications.
b) Image control and Picture control.
c) Common Dialog control.
d) Scroll Bar control.
e) Windows API functions.
(3x5)

M4.2-R3 Page 5 of 5 July, 2007


2008 - January
M1-R3 to M4-R3
M1-R3: IT TOOLS AND APPLICATIONS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book
for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x
10)

1.1 Which one is not an output device?


A) Printer
B) Monitor
C) Keyboard
D) Modem

1.2 An operating system is:


A) Integrated software
B) CD-ROM software
C) Application software
D) System software

1.3 One MB is equal to:


A) The amount of RAM in every computer
B) 1 billion bytes
C) 1024KB
D) 1 thousand bytes

1.4 The resolution of a printer is measured in:


A) Megabits
B) Hz
C) Dots per inch (DPI)
D) Inches (diagonal)

1.5 A computer port is used to:


A) Communicate with other computer peripherals
B) Download files from the web
C) Communicate with all hard drives
D) Connect computers together

M1-R3 Page 1 of 5 January, 2008


1.6 Which file extensions indicate only graphics files?
A) BMP and DOC
B) JPEG and TXT
C) TXT and STK
D) BMP and GIF

1.7 Which one is an e-mail address?


A) http://vianet.com/index.htm
B) D:\\Email\Standard
C) joesmart@billme.com
D) Chaminade.org/teachers/mailaddresses

1.8 To insert clip art, pictures from disk into a Word Document, which of the following method is
used?
A) Insert Picture command
B) Insert Object command
C) Add Picture command
D) Insert File command

1.9 Which of the following is not a tool for analyzing spreadsheet data?
A) What-if analysis
B) Mail merge
C) Goal seeking
D) Sorting

1.10 The multiplication arithmetic operator is represented by which of the following symbols?
A) ^
B) *
C) /
D) x

M1-R3 Page 2 of 5 January, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x
10)

2.1 If the text entered in a cell does not fit, Excel will display ##### to indicate that the text is too
long.
2.2 A mouse is a pointing device.
2.3 An example of an input device is a printer.
2.4 Microsoft office word is an application program.
2.5 When you download files you send files from your computer to the Internet.
2.6 A bit is bigger than a byte.
2.7 An inkjet printer hammers rows of pins against paper to produce words or pictures.
2.8 You can add dates to worksheets, but spreadsheets cannot use dates in calculations.
2.9 In a spreadsheet, ordinary text is called a "label."
2.10 Presentation programs create notes for each slide, which are visible only to the presenter.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Approximately a billion bytes or 10000 megabytes A. Text
3.2 A printed copy of computer output B. MODEM
3.3 The use of graphical symbols instead of text C. vi
commands to control common computer functions
3.4 The programs or instructions that tell the computer D. Hard Copy
what to do.
3.5 The sequence of operations that defines a solution to E. Multimedia
a problem in logic.
3.6 A communications device which converts electronic F. Graphical User Interface
signals from one kind to another for transmission
over circuits such as telephone lines, cable lines,
microwave, satellite, etc.
3.7 A permanent storage device, which uses a laser disk G. Spreadsheet
to read information
3.8 A combination of text, graphics, sound and animation H. Slide Show
3.9 What would be the best program for calculating I. del
numbers
3.10 Linux command J. CD ROM
K. Gigabyte
L. ALGORITHM
M. Router
N. Software

M1-R3 Page 3 of 5 January, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the
list below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

A. Operating system B. Virus C. Insert


D. MegaHertz E. Volatile F. Sectors
G. Clipboard H. Ctrl+Enter I. Word Processor
J. JPEG K. Upper L. Lab leader
M. Icon N. Case O. ASCII

4.1 RAM is a(n) ________ memory.


4.2 Ms-word is an example of a(n) ________.
4.3 The ________ generally controls interaction of the application software and all the hardware
components.
4.4 In Unix, commands are ________ sensitive.
4.5 ________ is the name of a code used to represent characters.
4.6 The ________ is a section of RAM where your computer stores copied data.
4.7 ________ is a format for image files.
4.8 The feature that moves text to make room for new words as they are keyed is called ________
mode.
4.9 ________ is a small picture or symbol representing a computer hardware function or
component.
4.10 The speed of the clock chip is measured in ________.

M1-R3 Page 4 of 5 January, 2008


PART TWO
(Answer any FOUR questions)

5.
a) Convert (7305)8 to Binary and (1023)10 to Hexadecimal.
b) Mention the basic functional units of a computer?
c) What are the differences between RAM and ROM?
d) What is the difference between systems software and applications software?
(4+4+3+4)

6.
a) What is the difference between impact and non impact printer?
b) Explain primary memory and its properties and types?
c) List and explain any two input and output devices.
d) With a neat diagram explain the working of a mouse.
(3+4+4+4)

7.
a) You may prefer your Word documents or multiple page letters to be printed without any
numbering on the first page, how is it achieved?
b) Define and explain how to adjust “Line spacing” & “paragraph spacing” in Word a document.
c) In Power Point, explain using a custom animation effect, how do you make text appear on a
slide letter by letter?
(5+5+5)

8.
a) What is the difference between Embedded charts and Chart Sheet? What are Legends and
how to add on the chart?
b) What is the difference between relative and absolute references?
c) In Excel, we have three functions named a ROUND(), ROUNDDOWN(), ROUNDUP();
how these are different? Explain with examples.
(5+5+5)

9.
a) What is a compiler? Give the differences between compiler and interpreter?
b) Explain the functions of an operating system?
c) What are the internal tasks or activities involved during booting of a computer?
(5+5+5)

M1-R3 Page 5 of 5 January, 2008


M2-R3: BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which one of the following is not a function of Management


A) Planning
B) Staffing
C) Co-operating
D) Controlling

1.2 Policy Formations is the function of


A) Top Level Management
B) Middle Level Management
C) Operational Management
D) All of the above

1.3 Which one of the following is not used for carrying out validation check
A) Picture Check
B) Range Check
C) Check Digit Check
D) Control Check

1.4 A field that uniquely identifies records in the table wizard is known as
A) Primary Key
B) Special Key
C) Unique Key
D) None of the above

1.5 If Age and Category are numeric fields in a table, which one of the following statement
is incorrect?
A) Replace all age with age+1 for age <20
B) Replace all age with age-1 while category>2
C) Replace age with age-1 for for age>20 all
D) None of the above

M2-R3 Page 1 of 5 January, 2008


1.6 The function to remove leading and trailing spaces from a character expression is
A) TRIM()
B) LTRIM()
C) RTRIM()
D) ALL TRIM()

1.7 Edit Checks and Controls are built into a computer based system to
A) Ensure that the transcription errors do not corrupt the result
B) Duplicate date does not enter into the computer system
C) Avoid transposition errors
D) All of the above

1.8 Which of the following command line is correct for displaying a record with the value
2000 in the field Phone and ‘false’ in the logical field Paid
A) Display for phone=200 AND paid =’false’
B) Display for phone=2000 .AND. paid=’false’
C) Display for phone=2000 .AND. .NOT. paid
D) Display for phone=2000 .AND.NOT.paid

1.9 A Sequential File Organisation is most suited for


A) Airline Reservation System
B) Library
C) Payroll System
D) None of the above

1.10 Over Time analysis is


A) Useful for formulating personnel policies
B) Is derived from the payroll system
C) Both A) & B)
D) None of the above

M2-R3 Page 2 of 5 January, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 If SET EXACT is OFF, the command, List for name=’RAMA’ will display all the records
irrespective of whether the name field contains names like ‘RAMAKRISHNAN’,
’RAMANUJAM etc. besides RAMA.
2.2 The Top-Down approach to develop modular program involves working from general
to specific.
2.3 A function such as UPPER() can be used while sorting using a SORT command.
2.4 In Embedding, the embedded copy does not change even if the Original Object
Changes.
2.5 Using the SQL SELECT command, we can retrieve data from different tables even if
tables are not related.
2.6 SUM(Distinct) eliminates duplicate field values before determining the SUM.
2.7 The actual text that you enter in Memo fields gets stored in an auxiliary table file with
the extension .PPT.
2.8 In Mail Merge, Helper dialog box, you can only open an existing Data Source but
cannot create a new one.
2.9 Procedures are not used in Unstructured Programming.
2.10 A Relative File does not use an index to access records randomly.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Control Flow A. Retire Benefit
3.2 Time Ticket B. Changes the sequence of Instruction of execution.
3.3 Cross Tab C. The clause to define a condition on the group of
tuples.
3.4 ASIN() D. Summarizing data in rows and column.
3.5 Having E. Ensures that certain fields are in correct format.
3.6 LIFO F. To Pass privileges to another user.
3.7 Embedding G. Valuation of Stock
3.8 Grant H. carried out on programme code
3.9 Picture Check I. For Insert a copy of the object from one application
into another.
3.10 Functional Testing J. Function that returns arc of numeric value in radians
between - ∏/2 and +∏/2.
K. To test the validation of data
L. To move to the 2nd cell/column in the next row
M. Latest information
N. To check the position of the picture
O. Asynchronous

M2-R3 Page 3 of 5 January, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Validation B. Floor() C. Between


D. Flow Chart E. Skip-1 F. Lowest
G. Revoke H. Linking I. Highest
J. Keyfield K. Grid Off/On L. Embedding
M. Picture Check N. Avg()

4.1. The fields within a logical record on which files are sorted are called ________.
4.2. The command used to cancel the Database privilege is called ________.
4.3. The Process of ascertaining the logical conformity of data to certain prescribed
characteristics is termed as ________.
4.4. The term used to describe the establishment of a connection between the source and
destination document is called ________.
4.5. In ABC analysis, C category of items represents ________ proportional value of the
inventory.
4.6. The function that returns the absolute value of a numeric expression is called ________.
4.7. The ________ command moves the record pointer to the previous record.
4.8. The option which hides vertical line that normally appears between columns are called
________.
4.9. ________ ensures that certain fields are in the correct format.
4.10. The operator which is used in place of relation as well as logical operator is
called _______.

M2-R3 Page 4 of 5 January, 2008


PART TWO
(Answer any FOUR questions)

5.
a) Explain in brief the functions of different Levels of Management in an organization.
b) Mention four advantages and disadvantages of Index File Organization.
c) Describe the various modes of processing of data.
(5+5+5)
6.
a) What is RDBMS? Explain with a suitable example.
b) Explain advantages of Structured Programming?
c) What are Visual FoxPro forms? List out features that may be incorporated into a form to
facilitate easier data entry?
(4+4+7)
7.
a) What is Mail-merge Wizard? Explain in detail with an example.
b) Why should we use LOCATE instead of SEEK when a filter is set?
c) Consider a typical Employee table. How would you handle the following queries on such
a table?
i) Write a query inquiring the details of an Employee whose Employee
code = 421
ii) Write a query inquiring the details of all Employees according to Designation.
iii) Write a query to update Employee Salary by 10,000 whose Age > 29.
iv) Write a SQL Command to add Emp_Phone column into Employee table.

Employee Table Structure


Field name Type Width
Emp_Code Numeric 4
Emp_Name Character 30
Emp_Designation Character 10
Emp_Age Numeric 2
Emp_Salary Numeric 5
(5+5+5)

8.
a) What is Cross Tab Wizard? Explain the steps involved in creating query using Cross Tab
Wizard.
b) Differentiate DO WHILE--ENDDO and SCAN – ENDSCAN. Using these, write a program
that would print the Name, Designation and Basic Salary for every person in the table
with a salary more than Rs.5000.
(7+8)

9.
a) What are the three ways to copy data into or out of Visual FoxPro? Explain one of them
in detail.
b) How a Computerized Inventory Control System works? Explain.
(7+8)

M2-R3 Page 5 of 5 January, 2008


M3-R3: INTERNET AND WEB DESIGN

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which of the following is a web server?


A) Mozilla Firefox
B) Postfix
C) Bind
D) Apache

1.2 What does http stand for?


A) HTML Text Transfer Protocol
B) Hyper Text Transfer Protocol
C) High Transfer Tier Program
D) HTML Type Transfer Protocol

1.3 What is a spider?


A) A program that crawls around the web and stores pages in search engines
B) Hacking software that spreads virally
C) Software that examines network vulnerabilities
D) A protocol for distributing large files

1.4 Which one of the following is NOT an example of an extension in a URL?


A) .gov
B) .edu
C) .npr
D) .com

1.5 In HTML, what does a <textarea> tag do?


A) Creates a paragraph
B) Aligns text
C) Renders a box that you can type in

M3-R3 Page 1 of 5 January, 2008


D) Defines the borders of a webpage

M3-R3 Page 2 of 5 January, 2008


1.6 What does FTP stand for?
A) Firewall Transfer Programming
B) File Transmission Protocol
C) File Transfer Protocol
D) File Transfer Program

1.7 What product did Amazon first sell?


A) Online Advertising
B) Books
C) Music
D) DVDs and Video

1.8 How many bits are in a byte?


A) 8
B) 1
C) 24
D) 256

1.9 How many layers are there in the OSI model?


A) 3
B) 5
C) 7
D) 10

1.10 On the internet, which version of the Internet Protocol is the most widely used?
A) IPv1
B) IPv3
C) IPv4
D) IPv6

M3-R3 Page 3 of 5 January, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Portal is another word for search engine.


2.2 The Internet and the World Wide Web are the same.
2.3 An address such as www.cnn.com is an IP address.
2.4 The term “Multimedia” on a computer system means that you can run full motion video,
stereo sound and text at the same time.
2.5 A LAN is a large area network.
2.6 A byte is commonly used as a unit of storage measurement in computers.
2.7 The Internet has a loose tiered hierarchical structure of ISPs.
2.8 A datagram is an independent, self-contained message sent over the network whose
arrival, arrival time and content are not guaranteed.
2.9 JPEG is a lossy compression technique.
2.10 HTML does not allow a web page to include an image.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 This refers to how much data you can send through a A. Download
network or modem connection.
3.2 This is the logic that computers use to determine if a B. JPEG
statement is true or false.
3.3 Placeholders for saving web addresses, or URLs. C. MODEM
3.4 The process of transferring a copy of a file from a server to D. Digital certificate
a client computer over the internet.
3.5 A method used to send authenticated information over E. Home Page
web.
3.6 A site, or directory, that contains the same information as F. Bandwidth
another site.
3.7 A website's first page or an individual's unique, personal G. SMTP
page
3.8 This is the protocol used by computers to transfer web H. HTML
pages to one another.
3.9 a file format for the storage of graphics in a computer file I. URL
3.10 An electronic device that allows your computer to J. Mirror site
exchange information with other computers over phone
lines.
K. Bookmarks
L. FTP
M. Boolean

M3-R3 Page 4 of 5 January, 2008


N. HTTP

M3-R3 Page 5 of 5 January, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Javascript B. Automated search C. RFC


D. DAQ E. Packet switching F. Circuit switching
G. DNS H. Mail server I. UDP
J. URL K. Hypertext L. FTP
M. TCP and IP N. ISP

4.1 The documents that define TCP/IP and related Internet technology are called
________.
4.2 A(n) ________ system permits multiple pairs of computers to communicate across a
shared network with minimal delay.
4.3 A company that offers Internet access is known as ________.
4.4 A computer connected to the Internet needs both ________ software.
4.5 A computer on the Internet only needs to know one ________.
4.6 Menus embedded in text are called ________.
4.7 Given a valid ________, a browser can go directly to the page without passing through
other documents.
4.8 Some public mailing lists and newsgroups maintain a file of ________ and answers.
4.9 ________ is an active document technology.
4.10 ________ tools help users to find a set of pages that contain information related to a
given topic.

M3-R3 Page 6 of 5 January, 2008


PART TWO
(Answer any FOUR questions)

5.
a) What is Internet? What are various applications of Internet?
b) What are the ways to find needed information on the Internet? How can you find
information, when you know or don.t know its location URL?
c) What are Web browsers and what are they used for? What Web browsers do you know?
(5+5+5)

6.
a) What is meant by HTML and HTTP? What are the four basic operations specified by a
browser that HTTP supports?
b) What is email? What is a "mail box"? How does an email address look like? What are the
protocols used for sending/receiving e-mails?
c) How is the header output from a CGI program interpreted by the server?
(5+5+5)

7.
a) Explain, how does a client test a server using Telnet.
b) What is MIME? How does it help in sending binary data via e-mail message?
c) Distinguish between LAN, WAN and MAN on the basis of architecture and geographical
area coverage.
(5+5+5)

8.
a) What do you understand by the term “Hierarchy” of Usenet Newsgroups? How do you
identify a newsgroup?
b) i) Write HTML Script to create the following Web page.
LIST1.
1. Breakfast
2. Lunch
3. Dinner
LIST2.
* Cars
* Trucks
* Buses
ii) Give HTML commands to achieve the following:
Put the following in bold typeface “I am Bold”
Put the following in italic typeface “This is Italic”
(8+7)

9. Write short notes on any three of the following:


a) Multimedia applications
b) JAVA and JAVA Script
c) Search Engines
d) Firewall
(5x3)

M3-R3 Page 7 of 5 January, 2008


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Given the following code fragment:


void main(void)
{
char x = ‘\0’;
char n = ‘N’;
printf(“%u” ”%s\n”, &n, &n);
}
What will be the result of execution?
A) ddddd N ( where d represents any digit)
B) 78 N
C) 78 garbage
D) compilation error

1.2 Given the following code fragment:


int main(void)
{
int raw[20], i, sum=0;
int *p = raw;
for (i=0; i < 20; i++)
*(p+i) = I;
for(i=0; i < 20; I += sizeof(int))
sum += *(p+i)
printf(“sum = %d\n”, sum);
return();
}
What will be the result of execution?

M4.1-R3 Page 1 of 6 January, 2008


A) sum = 10
B) sum = 40
C) sum = 60
D) sum = 190

1.3 What is the missing statement in the following function which copies string x into string y
void strcpy( char *x, char *y)
{
while (*y != ‘\0’)
………………… /* missing stament */
*x = ‘\0’;
}
A) x=y
B) *x++ = *y++
C) (*x)++ = (*y)++
D) none of the above

1.4 Consider the following program,


main( )
{
int x = 49;
for(;x;)
x--;
printf(“%d\n”, x);
}
the output of the program will be
A) 49
B) 0
C) -49
D) none of the above

1.5 # define dp(e) printf(#e “ = %d\n”,e)


main( )
{
int x =3, y = 2;
dp(x/y)
}
What will be the output of the program?
A) prints x/y = 1
B) prints #e = 1.5
C) prints #x/y = 1
D) none of the above

1.6 Assume that i, j and k are integer variables and their values are 8, 5 and 0 respectively.
What will be the values of variables i and k after executing the following expressions?
k = ( j > 5) ? ( i < 5) ? i-j: j-i: k-j;
i -= (k) ? (i) ? (j): (i): (k);
A) -3 and 3
B) 3 and -5
C) 3 and -3
D) -5 and 3

M4.1-R3 Page 2 of 6 January, 2008


1.7 The && and | | operators
A) compare two numeric values
B) combine two numeric values
C) compare two boolean values
D) none of the above

1.8 An external variable is one


A) Which resides in the memory till the end of the program
B) Which is globally accessible by all functions
C) Which is declared outside the body of any function
D) All of the above

1.9 Find the error in the following program:


main( )
{
int m;
char g;
switch(m)
{
case 5 : grade=”P”;break;
case 2 : grade=”Q”;break;
case 2 : grade=”R”;break;
default : grade=”S”;break;
}
}
A) No two labels may be identical
B) switch statement cannot have more than three labels
C) case label cannot be numbers
D) none of the above

1.10 Consider the following program:


main( )
{
char *k=”xyz;
f(k);
printf(“%s\n”,k);
}

f(char *k)
{ k = malloc(4); strcpy(k, “pq”); }
What will be the output?
A) pq
B) xyz
C) syntax error
D) none of the above

M4.1-R3 Page 3 of 6 January, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Arrays in ‘C’ language are always stored in column-major fashion.


2.2 for(;;) will give syntax error in ‘C’ language.
2.3 For command line arguments, argv is a pointer to an array of pointers.
2.4 A member of any structure is referred to in an expression by a construction of the form
structure-name → member.
2.5 Bitwise fields can be of any type.
2.6 goto statement transfer the control from one function to another.
2.7 An array’s name is a pointer constant.
2.8 C allows different variables to have the same name.
2.9 Variables defined in the same function always have the same scope.
2.10Each symbol constant requires a separate # define directive to create it.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Parameter passing scheme in ‘C’ A. Dangling pointer
3.2 Size of ‘char’ variable in byte/bytes B. Postfix expression
3.3 Heap C. Call by value
3.4 Double (*X)[10] D. 2
3.5 0x7FFF refers to a constant E. Garbage pointer
3.6 Implementation of library function F. Expression
3.7 Pointer with address of a free variable G. Area for Dynamic memory allocation
3.8 Object H. 1
3.9 Lvalue I. Storage
3.10 Function call J. Double x[10]
K. Octal
L. Header
M. Double x[ ] [10]
N. Hexadecimal
O. Library

M4.1-R3 Page 4 of 6 January, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

Equality Inequality Equal


Different Double Single
Fixed Variable fseek(fp, 0L, 0)
fseek(fp, 0L, 1) semicolon prenthesis
4 bytes do…while while…do
| || t
(*t)

4.1 Operators &, ^, = = have ________ precedence.


4.2 The logical operator = = checks for ________ of two values.
4.3 A character constant is a sequence of one or more characters enclosed in ________
quotes.
4.4 printf( ) function uses ________ number of arguments.
4.5 rewind (fp) and ________ performs the same operation.
4.6 The contents of two pointers that point to adjacent variables of type float differ by
________.
4.7 A function name must be followed by ________.
4.8 ________ iterative statement will always be executed atleast once.
4.9 ________ is the bitwise inclusive or operator.
4.10 If “t” is a pointer to a structure then “t→” is the same as ________.

M4.1-R3 Page 5 of 6 January, 2008


PART TWO
(Answer any FOUR questions)

5.
a) The sequence of Fibonacci numbers is defined as below:
f(i) = f(i-1) + f(i-2) with f(0) = 1 and f(1) = 1
Draw a flowchart and then develop a ‘C’ program to calculate and display Fibonacci
numbers.
b) Write a ‘C’ program to calculate the frequencies of different alphabets, present in a given
string. The string of alphabets is to be taken as input from the keyboard.
(7+8)

6.
a) Write a ‘C’ program to do the following:
i) Accept a sequence of integer numbers from the keyboard
ii) Sort the sequence in ascending order
iii) Output the position of each element of the input sequence in the sorted array.
b) Develop a flowchart and then develop ‘C’ program to find the union of two set of
characters, taken as input from the keyboard.
(8+7)

7.
a) Write a ‘C’ program to accept any 3 digit integer number from the keyboard and display
the word equivalent representation of the given number.
b) Write a ‘C’ program to accept a date in the format DD/MM/YYYY and add an integer to
get the resultant date.
(9+6)

8. Define a suitable data structure to store the information like student name, roll number,
enrolment centre and marks of five different subjects. Write a ‘C’ function to insert
sufficient data in your data structure and function to print the name of the student and
the total obtained marks who have secured highest total marks for each and every
enrolment centre
(15)

9.
a) Define a self referential structure to represent a set of integer numbers in linked list form.
b) Write a ‘C’ function to split the list in several sub-lists depending on the number of digits
representing the integers i.e. single digit integers will form a list, double digit numbers
will form another list and so on.
(3+12)

M4.1-R3 Page 6 of 6 January, 2008


M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be answered
in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)

1.1 Which of the following provides quick access to commonly used commands in the programming
environment?
A) Toolbox
B) Object Browser
C) Toolbars
D) None of the above

1.2 The programming Errors that cause the program to crash during execution are called
A) Syntactic Errors
B) Logical Errors
C) Compilation Errors
D) None of the above

1.3 Calling procedure from outside a module depends on one of the following:
A) The type of procedure
B) Where the procedure is located
C) Where the calling program is located
D) All of the above

1.4 A Visual Basic control’s DataMember property refers to:


A) Recordset object
B) Command object
C) Connection object
D) Data Environment

M4.2-R3 Page 1 of 5 January, 2008


1.5 Which of the following statements about pop-up menus are true?
A) A pop-up menu can not be used as a main menu.
B) A pop-up menu can be created from a sub-level menu.
C) A pop-up menu should have only single levels.
D) All of the above.

1.6 The event occurs when certain key of keyboard is pressed


A) KeyType
B) KeyPress
C) KeyEnter
D) None of these

1.7 In Visual Basic IDE, a convenient way to execute certain menu commands is provided by
A) Tool Box
B) Immediate Window
C) Tool Bar
D) Menu Bar

1.8 Which of the following properties sets the control`s current coordinate system?
A) ScaleMOde
B) ScaleWidth & ScaleHeight
C) ScaleLeft 7 ScaleRight
D) Width & Height

1.9 What are the three types of property procedure that can be created for a class?
A) Add, Get, Remove
B) Set, Retrieve, Remove
C) Let, Set, Get
D) Let, Get, Remove

1.10 Which of the following defines the data in the class?


A) Variables
B) Constructors
C) Methods
D) Objects

M4.2-R3 Page 2 of 5 January, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)

2.1. The Toolbox is a window that provides you a set of tools that are used at design time to place
controls on a form.
2.2. addOpenKeyset is a default cursor.
2.3. TypeOf is both a statement and function.
2.4. The default value of password char property is “*” which tells the control to display the
characters as entered.
2.5. The body of Do Until is executed only if the loop continuation test is True.
2.6. The method Line is used for drawing lines and boxes.
2.7. All API functions have their argument passed by reference.
2.8. Data can be accessed from the class without creating the object of that class.
2.9. ConnectionString is the method of Connection object.
2.10. Enumeration is the method to declare a related group of constant.

3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in
column Y. Enter your selection in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

X Y
Option Base A. Arrange property
Combing the control structures B. UBound function
File List Box C. InputBox
Polymorphism D. Recursive
Largest Integer Index of Control Array E. Stacking
Placement of child window controlled by F. Event Procedure
Largest possible Subscript of Array G. Function Procedure
Ampersand (&) H. Sub Procedure
A procedure calls itself directly or indirectly I. PathChange Event
through another call
Unit for coordinate system J. Select Case logic
K. Array
L. UBound Property
M. StrechBlt() function
N. Notify method
O. To create an access key
P. Twip

M4.2-R3 Page 3 of 5 January, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question paper,
following instructions therein. (1 x 10)

A. Caption B. Get C. Recordset


D. Value E. Centre F. Forms and Controls
G. Reactivate H. Top_right side I. Load Picture()
J. Retry Button K. Getfile L. On Error
M. Timer N. TextBox O. Retrive
P. Unload

4.1 By default, Project Explorer is docked in ________.


4.2 ________ property is used to change name of label control.
4.3 A(n) ________ event of a form trigger when form losses its focus.
4.4 ________ is used to gain access to an existing drive, file or folder.
4.5 The ________ control is visible only at design time.
4.6 To use ADO set the Reference option from Project menu as ________.
4.7 The elements of user interface are ________.
4.8 To load graphics on a control at run time, you have to use the ________ function.
4.9 The ________ statement enables you to trap runtime error.
4.10________ Property procedure is used to retrieve the value of information from a class.

M4.2-R3 Page 4 of 5 January, 2008


PART TWO
(Answer any FOUR questions)

5.
a) Write short notes on trigger with an example?
b) What are the various parts of the Design State of the Visual Basic IDE?
c) Describe briefly for For...Next structure. How does it differ from Do…Loop structure? Illustrate with
examples.
(5+5+5)

6.
a) Write short notes on the following types of errors?
i) Syntax Errors
ii) Runtime Errors
iii) Logical Errors
b) Write a note on each of the following events?
i) Deactivate
ii) GotFocus
iii) Load
c) Write a program that uses a timer to produce a countdown from 10 down to 1 at one second intervals.
(5+5+5)

7.
a) Write short notes on Access Keys and Shortcut keys?
b) What do you understand by variant? What are the advantages and disadvantages associated with the use
of variants?
c) How will you create a checkbox? Describe with an example.
(5+5+5)

8.
a) Write short notes on any 3 of the following controls?
i) Line Control
ii) Image control
iii) Shape control
iv) Animation control.
b) What do you understand by Error Handler? How error codes are used within an Error Handler?
c) What are the characteristics of MDI and its child forms during run-time?
(5+5+5)

9.
a) What is the purpose of Form Load ( ) SubEvent in Visual Basic?
b) What is an API? Write Visual Basic code to declare an API function called ‘Sound Play’.
c) Which is the most powerful scope of a variable? Why?
(5+5+5)

M4.2-R3 Page 5 of 5 January, 2008


2008 - July
M1-R3 to M4-R3
M1-R3: IT TOOLS AND APPLICATIONS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 The connection between the computers and peripherals is called a


A) Port
B) Bus
C) I/O device
D) None of the above

1.2 Which one of the following is External DOS Command?


A) COPY
B) FORMAT
C) DEL
D) DIR

1.3 Virtual Memory is


A) Part of main memory only used for swapping
B) A technique to allow a program, of size more than the size of the main memory to run
C) Part of secondary storage used in program execution
D) None of the above

1.4 Baud rate is


A) The difference between the lowest and the highest frequency transmitted
B) Transmission capacity
C) Transmission speed of channel
D) None of the above.

1.5 Software designed for a specific purpose is called as


A) System Software
B) Compiler
C) Specific Software
D) Application Software

M1-R3 Page 1 of 5 July, 2008


1.6 Functions of operating system are:
A) Processor Management
B) Memory Management
C) Input/Output Management
D) All of the above

1.7 Which of the following charts is not likely to be included in an analysis or presentation
graphics package?
A) Bar
B) Pie
C) Temperature
D) Line

1.8 The printers that produce the output by pressing a print element and an inked ribbon
against the face of a continuous paper form is called:
A) Impact printer
B) Non-impact printer
C) Scanning printers
D) None of the above

1.9 The utility used to increase the speed of programs is called


A) Disk Fragmenter
B) Disk Cleanup
C) Disk Formatter
D) None of the above

1.10 Find the odd one out:


A) NORTON
B) McAFee
C) eScan
D) None of the above

M1-R3 Page 2 of 5 July, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Motherboard is the main circuit board in the computer where memory, CPU and other
components are plugged in.
2.2 Cache memory makes memory transfer rates higher and thus raise the speed of the
processor.
2.3 The laser printer uses a technology called thermal process.
2.4 You can protect scenario so other users cannot change or modify it.
2.5 Without a mouse one cannot work with MS-WINDOWS.
2.6 Folders organize files on a disk.
2.7 In Linux error messages are placed in a standard byte stream called the standard error.
2.8 In DOS system FATs are stored before boot sector.
2.9 #REF! Error in MS-Excel occurs when the formula refers to an invalie cell.
2.10MICR stands for Magnetic Ink Course Reader.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
FAT A. Is Dos command, indicates, which directories
MS-DOS should search.
Pivot Table B. Mixed Reference
To introduce page break C. Non impact printer
$G$10 D. CTRL+ENTER
Hyperlink can be E. The formula cannot use the number supplied.
identified by
#NUM1 F. Summarizes information within a worksheet.
PATH G. A table that the OS uses to search files on a DISK.
Slide Workspace H. Refers to the hierarchy of data in the spreadsheet.
Inkjet Printer I. SHIFT+ENTER
Level J. underline
K. Impact printer
L. Absolute Reference
M. The large white area where slides are created,
viewed and edited.

M1-R3 Page 3 of 5 July, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. 46687 B. Autoexec.Bat C. Macro


D. 1,073,741,824 E. Portrait F. 46567
G. Command.com H. Shortcut I. 1,048,576
J. Bulleted effects K. Universal Serial Bus L. Operating System
M. Unified Sorted Bullets N. Consolidate O. Mouse

4.1 Icons with an arrow in the lower left corner are ________ icons.
4.2 The decimal equivalent of hexadecimal number B65F is ________.
4.3 1 GB is equal to ________ bytes.
4.4 An organized collection of software that controls the overall operations of a computer is
called as ________.
4.5 ________ is a collection of keystrokes that is created and saved in an assigned control
key.
4.6 Internal commands in DOS are present in ________.
4.7 Outline view in power point displays contents in ________.
4.8 USB stands for ________.
4.9 ________ combines values of multiple worksheets into selected cells.
4.10 ________ is a pointing device.

M1-R3 Page 4 of 5 July, 2008


PART TWO
(Answer any FOUR questions)

5.
a) In MS-Windows environment, what is the difference in using “My Computer” from
“Windows Explorer” for exploring contents of a computer?
b) When is a disk said to be fragmented? Write one disadvantage of a fragmented disk.
c) Explain the following DOS commands:
i) DELTREE
ii) RMDIR
iii) VER
(3+6+6)

6.
a) What is an Open Source Software? What are the advantages and disadvantages of
using Open Source Software?
b) What is multimedia? Discuss the role of multimedia in Marketing.
c) Draw a block diagram showing components of a computer. Explain functions of CPU in
detail.
(5+5+5)

7.
a) Explain Macro in reference to MS-Excel by giving a suitable example. What is an
automatic macro?
b) There are 500 employees in a company and their information stored in a database. Each
record contains Employee Number, Employee Name, Employee Address, Gender, Basic
pay, DA, HRA and Total Pay. Assume that this data is transferred to a worksheet where
each row refers to record of an employee. Now it is required to display only those
records which fulfil the following condition:
Display only those records who are females and their Total Pay is greater than
10,000.
Name the command in Excel that will be used for the above mentioned task and explain
the procedure step by step.

c) Explain the following:


i) Embedded Charts
ii) Absolute reference
iii) Legend
iv) Relative reference
(4+3+8)

8.
a) What are non-impact printers? Explain briefly any two of them.
b) What is a computer virus? What is the remedy available for computer viruses? How
does it differ from a bug?
c) What is template? What is the difference between a template and wizard?
(6+3+6)

9.
a) Describe the Mail Merge operation in Microsoft Word. What is Mail Merge Helper? What
are the steps involved in its usage?
b) Convert (24.25)8 to equivalent decimal number and hexadecimal number.
c) Explain about Animating Objects and Text while preparing slides presentation.
(5+5+5)

M1-R3 Page 5 of 5 July, 2008


M2-R3: BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Functions of Management include


A) Planning
B) Organizing
C) Control
D) All of the above

1.2 Reorder level is the level when inventory touches


A)Zero stock
B)Safety stock
C)Either (A) or (B)
D)None of the above.

1.3 If AGE and SALARY are numeric fields in a database file, which of the following
commands is incorrect?
A) REPLACE ALL AGE WITH AGE+1 FOR AGE < 20
B) REPLACE ALL AGE WITH AGE+1 WHILE AGE > 20
C) REPLACE AGE WITH AGE+1 FOR AGE < 20 ALL
D) All of the above

1.4 Double entry means


A) Same aspect is entered twice.
B) Entry is made in two sides of books.
C) Both the aspects of the transaction are recorded.
D) Two persons record the transaction

M2-R3 Page 1 of 6 July, 2008


1.5 Decision table is a
A) Tabular representation of program logic
B) Symbolic representation of a program logic
C) Graphical representation of a program logic
D) All of the above

1.6 In which of the cases written below output will be 2.27


A) ?ABS(2.27)
B) ?ABS(-2.27)
C) Both (A) and (B) are correct
D) None of the above correct

1.7 Let A=”02/04/1963”. Function to set out as 196 is


A) substr(A,7,2)
B) stuff(A,7,3)
C) substr(A,8,3)
D) substr(A,7,3)

1.8 The strategic level of Management is


A) Top Level
B) Middle Level
C) Supervisory Level
D) All of the above

1.9 Data types supported in Visual FoxPro are


A) Character and Currency
B) Date and Date time
C) Float and Numeric
D) All of the above

1.10 In FoxPro, database can be opened in


A) Exclusive Mode
B) Shared Mode
C) No Update Mode
D) All of the above

M2-R3 Page 2 of 6 July, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 The modes of occurs that relative files can have are Random and Sequential.
2.2 A task started within DO WHILE and ENDDO loop will be continued until the condition is
satisfied.
2.3 Sort on Name + Amount to Bank is a valid comment.
2.4 A Foreign key of a table is a Primary Key of another table.
2.5 Sum (distinct) eliminates duplicate field values before determining the SUM.
2.6 Constants of a variable can be searched within Find and Seek commands.
2.7 One can create a local view with view designer or can also create SQL view command.
2.8 UNIQUE index is one in which no two rows are permitted to have the same Index value.
2.9 The Recall command can recover records only if one is not issued PACK or ZAP command.
2.10 An Element function returns a number of an array element from the element’s subscripts.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 CDOW( ) A. programming aid
3.2 Pseudocode B. it exhibits the day of the week as character
3.3 Set Auto Save C. creates a third database file by combining records and
fields from two open database files when the specified
condition is true
3.4 DELETE D. remove all records from the active database file
3.5 Zero inventory level E. low inventory storage
3.6 JOIN F. It determines whether Visual FoxPro flushes data buffers
to disk, when you exit a read or return to the command
window.
3.7 SET ORDER G. marks the records for removal from the active database
file
3.8 TRIM( ) H. specifies which of the currently opened index files is the
controlling index
3.9 PUBLIC I. copies the contents of previous record to the text
3.10 SET CARRY ON J. links the active database file to another open database
file
K. defines memory variables as global and allows them to
be used by any program at any level
L. it is used to remove or trim off the trailing blanks from a
character string

M2-R3 Page 3 of 6 July, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. ADEL B. indexed C. Data Modelling


D. Distributed E. Structured Testing F. OLE band
G. Set Skip Off H. RTOD I. Random
J. sequential K. Grant L. Subsidiary ledgers
M. CronTab Wizard

4.1 The function used to delete an element from an array is ________.


4.2 The command which enables and disables a menu, menu bar and menu title is called
________.
4.3 An indexed file is essentially a(n) ________ file.
4.4 The data can be summarized into rows and columns by using ________.
4.5 Deadlock and livelock can be detected using ________.
4.6 Authorization command used for database Privilege is ________.
4.7 The function that returns the degrees in an angle with the given radians is called
________.
4.8 The process of identifying, documenting and implementing the data requirement is called
________.
4.9 A control that has, as its source, a general field in a table is called ________ control.
4.10 To use the LOCATE command, the database file need not be sorted or ________.

M2-R3 Page 4 of 6 July, 2008


PART TWO
(Answer any FOUR questions)

5.
a) What is data redundancy? Explain with an example. Explain how the database- oriented
approach of data organization help in reducing data redundancy as compared to
file-oriented approach.
b) Explain the advantages of structured programming.
c) Distinguish between the top-down program design and the bottom-up program design.
(7+4+4)

6.
a) Explain the basic principle used in indexed sequential file organization. Explain the roles
of data file and index file in indexed sequential file organization.
b) Explain in brief the client-server architecture.
c) Explain how reports are created in visual fox pro.
(5+5+5)

7.
a) When you develop a program, you typically start it with the following commands:
SET TALK OFF
SET BELL OFF
SET SCORE OFF
SET CENTURY ON
SET ESCAPE OFF
Explain what each one of these commands implies.
b) Explain in brief the concept of Polymorphism and Encapsulation.
c) Write a program in Visual FoxPro to find, how many vowels, consonants, special
characters and numeric digits are present in the supplied text,
(5+4+6)

8.
a) What do you understand by object linking and embedding?
b) Explain how a computerized inventory control system works.
(5+10)

M2-R3 Page 5 of 6 July, 2008


9. An entrance examination is conducted for admitting student into a course. The following
two tables are used for rank processing.

STUDENT MASTER MARKS MASTER

S_NO C(4) S_NO C(4)


PERCENTAGE N(5,2) SCORE N(5,2)
EXP_MON N(3)
TOTAL N(6,2)
RANK N(2)

S_NO is the primary key. PERCENTAGE is percentage of marks obtained in the


qualifying examination. EXP_MON is the work experience in months.
TOTAL = SCORE + PCR + ECR. For evaluating PCR and ECR use the following table.
RANK is candidate’s position based on the score in entrance exam. The SCORE is
marks obtained by the candidate in entrance exam. The following credits are given to the
student based on the percentage of marks and work experience.

PERCENTAGE EXP_MON

>80 PCR=3 >=120 ECR=3


>65 & <=80 PCR=2 >=60 & <120 ECR=2
>=50 & <=65 PCR=1 >=24 & <60 ECR=1

Write a program in Visual FoxPro to calculate and print RANK based on TOTAL.
(15)

M2-R3 Page 6 of 6 July, 2008


M3-R3: INTERNET AND WEB PAGE DESIGN

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Computers on the internet owned and operated by educational institutions form part of
the
A) com domain
B) edu domain
C) mil domain
D) None of the above

1.2 Unix is
A) A person
B) A file
C) A program for copying files from one computer to another
D) An Operating system

1.3 The Internet protocol (IP)


A) Ensures that connections are maintained between computers.
B) Handles software computer addresses.
C) Finds the quickest route between two computers.
D) None of the above.

1.4 The method of transferring files with roots in Unix is


A) Bin Hex
B) Unencoding
C) FTP
D) Telnet

M3-R3 Page 1 of 5 July, 2008


1.5 A web publishing tool developed by Microsoft is
A) Netscape Navigator
B) Front Page
C) Page Mill
D) Hot Metal

1.6 In time division multiplexing (TDM)


A) Several signals are sent on separate channels
B) Several signals are sent in time slotted mode on a channel
C) One signal is sent to several users
D) None of the above

1.7 SMTP is a simple


A) TCP protocol
B) TCP/IP protocol
C) IP protocol
D) None of the above

1.8 On the internet, which version of the Internet Protocol is the most widely used?
A) IPv1
B) IPv3
C) IPv4
D) IPv6

1.9 Web pages are uniquely defined using


A) IP addresses
B) URL
C) Domain
D) Filename

1.10 What is a cookie?


A) Computer code used to show animations and play sound.
B) Information sent to your computer that is used later to give information back to a visited
web site.
C) Computer code that automatically records all purchases and payments you make from
your computer.
D) An advertisement that will at some time be displayed on your computer screen.

M3-R3 Page 2 of 5 July, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 All web addresses start with http:\\


2.2 In a ring topology, any node can communicate with any other node directly.
2.3 SMTP is associated with electronic mail.
2.4 A single hypertext document can contain link to one document on the World Wide Web.
2.5 HTML does not allow construction dynamic web pages.
2.6 JPEG is a lossless compression technique.
2.7 IP addresses are unique.
2.8 There are upto six levels of header tag in HTML.
2.9 WAN is based on Ethernet.
2.10Asynchronous communication is slower than synchronous communication.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
One of the commonly used web browser A. Pixel
A video-standard commonly used on internet B. Freeware
Basic unit of an on-screen image C. encryption
Software available for trial period after which it D. Band width
must be registered to use
Scrambling of a message for security E. Link
Data carrying capacity of a channel F. TCP/IP
Related site on Internet G. Byte
Set of protocols that handles data transmitted H. Internet Explorer
across the Internet
IP address I. MPEG-4
The electronic device in a modem that decodes J. Shareware
an incoming signal and extracts data
K. 170.113.242.2
L. Altavista
M. JPEG
N. Demodulator

M3-R3 Page 3 of 5 July, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. v-chat B. FTP C. Applet


D. Modem E. DSL F. Unzip
G. Ethernet H. URL I. Kbps
J. DHCP K. Browser L. Cookie
M. Band width N. Two O. VRL
P. Bit

4.1 Device for translating digital signals into analog signals and vice versa is called a(n)
________.
4.2 The address of a page on the World Wide Web is called ________.
4.3 The speed of your net access is defined in terms of ________.
4.4 An information file placed on your computer by a web page that one has visited is known
as ________.
4.5 ________ is a small Java program that can be embedded in an HTML page.
4.6 ________ a Client program (software) that is used to look at various kinds of Internet
resources.
4.7 ________ is a protocol by which a machine can obtain an IP number (and other network
configuration information) from a server on the local network.
4.8 ________ is a method for moving data over regular phone lines.
4.9 ________ is a very common method of networking computers in a LAN.
4.10 ________ is a way to login to another Internet site for the purposes of retrieving and/or
sending files.

M3-R3 Page 4 of 5 July, 2008


PART TWO
(Answer any FOUR questions)

5.
a) Give the HTML program segment for collecting information using forms. Information is
name and comment.
b) What are the two different types of Newsgroups, explain?
c) What does the term Usenet mean?
(8+4+3)

6.
a) What do you understand by the term URL? What are the different components that
make an URL?
b) What is the difference between Internet and World Wide Web? Explain.
c) Give the five different headers specified in MIME?
(5+5+5)

7.
a) Describe the function of a router and why it is important.
b) Explain with diagram the differences between star, ring and bus topologies.
c) The Domain Name System (DNS) plays an integral part in the functionality of the
Internet. Describe the functionality of DNS and its component parts.
(5+5+5)

8.
a) What are the Internet security Threats? Explain how can they be avoided?
b) Define a firewall. What are its benefits?
c) What is the difference between dynamic and static web sites?
(8+4+3)

9.
a) What is the main purpose of Telnet? What model does Telnet follow? Write a short note
on how it operates?
b) What is VRML? How does it differ from HTML?
(8+7)

M3-R3 Page 5 of 5 July, 2008


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 int z,x=5, y=-10, a=4, b=2;


z=x++ - --y * b / a;
What will be the final value of z?
A) 5
B) 6
C) 10
D) 11

1.2 With every use of memory allocation function, what function should be used to release
allocated memory which is no longer needed?
A) dropmem( )
B) dealloc( )
C) release( )
D) free( )

1.3 int warr[3][2][2] = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12};


What will be the value of warr[2][1][0]?
A) 5
B) 7
C) 9
D) 11

1.4 char *ptr;


char myString[ ] = “abcdefg”;
ptr = myString;
ptr += 5;
The pointer ptr points to which string?
A) fg
B) efg
C) defg
D) cdefg

M4.1-R3 Page 1 of 6 July, 2008


1.5 Suppose that x is initialized as:
short int x; /* assume x is 16 bits in size */
What is the maximum number that can be printed using printf (“%d\n”, x),
A) 127
B) 128
C) 255
D) 32,767

1.6 When applied to a variable, what does the unary “&” operator yield?
A) The variable’s address
B) The variable’s right value
C) The variable’s binary form
D) The variable’s value

1.7 How is a variable accessed from another file?


A) via the extern specifier.
B) via the auto specifier.
C) via the global specifier.
D) via the pointer specifier.

1.8 What does the following function print?


func(int i)
{if(i%2) return 0;
else return 1;}
main( )
{
int=3;
i=func(i);
i=func(i);
printf(“%d”, i);
}
A) 3
B) 1
C) 0
D) 2

1.9 Given the piece of code


int a[50];
int *pa;
pa=a;
To access the 6th element of the array which of the following is incorrect?
A) *(a+5)
B) a[5]
C) pa[5]
D) *(*pa + 5)

1.10 Regarding the scope of the variables; identify the incorrect statement:
A) automatic variables are automatically initialized to 0
B) static variables are automatically initialized to 0
C) the address of a register variable is not accessible
D) static variables cannot be initialized with any expression

M4.1-R3 Page 2 of 6 July, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 ‘C’ programs are converted into machine language with the help of an interpreter.
2.2 Every ‘C’ program must contain a main( ).
2.3 Putchar( ) is used only for single character input.
2.4 calloc(…) allocates a block of memory for an array of elements of a certain size.
2.5 A printf( ) statement can generate only one line of output.
2.6 A switch expression can be of any data type.
2.7 ‘While’ is an entry as well as exit controlled loop statement.
2.8 ‘C’ treats character string simply as arrays of characters.
2.9 A function in ‘C’ should have at least one argument.
2.10 sprintf(…) writes data to the character array whereas printf(…) writes data to the
standard output device.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Data structure used by malloc for object creation A. %
3.2 Operator for giving remainder B. call by reference
3.3 do-while C. entry controlled loop
3.4 while D. a^=b^=a^=b
3.5 func1(x, y) is an example of E. object file
3.6 assignment of a with b F. heap
3.7 Which is not portable? G. call by value
3.8 Which is not possible in C? H. exit controlled loop
3.9 Swan a and b without temporary variable I. a=b
3.10 Compiler converts a source File to J. binary file
K. No match
L. #
M. textfile
N. a>b

M4.1-R3 Page 3 of 6 July, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

A. Macro B. One or zero C. Randomly


D. External E. Max F. True
G. String H. Automatic I. Extern
J. Register K. Dynamic L. SWITCH
M. Word Not Available N. EOF O. Arbitrary
P. typeDef

4.1 An external variable definition must not begin with storage class specifier ________.
4.2 A register variable is expected to be placed in the machine ________.
4.3 For ________ and static variables, initialisers must be constant expressions.
4.4 When a function calls itself, each invocation gets a fresh set of ________ variables,
independent of the previous invocation.
4.5 #define statement calls for simplest type of ________ substitution.
4.6 The function lseek provide a way to read or write a file in ________ order.
4.7 printf(“%.*s”, max, s) can be used to print at most ________ characters from a string s.
4.8 FILE is defined with a(n) ________ statement.
4.9 The process of allocating memory at run time is known as ________.
4.10 The function getchar( ) returns ________ when there is no more input character.

M4.1-R3 Page 4 of 6 July, 2008


PART TWO
(Answer any FOUR questions)

5.
a) What is structured programming? Explain and give examples of relevant constructs
using pseudo-code. Highlight the advantages and disadvantages of structured
programming.
b) What is an execution error? Differentiate it from syntactic error. Give examples.
c) It is said that ‘C’ is a middle level assembly language. Mention those features of ‘C’
which enable this description.
(8+3+4)

6.
a) Write and explain the action of WHILE statement. Develop a program in ‘C’ language to
compute the average of every third integer number lying between 1 and 100. Include
appropriate documentation.
b) Develop a function to calculate sum of n even integers starting from a given even
integer.
c) Identify all the compound statements which appear in the following program segment:
{
sum=0;
do {
scanf(“%d”, &i);
if (i < 0)
{
i=-i;
++flag;
}
sum += i;
} while (i != 0);
}
(7+5+3)

7.
a) Define an array. How are arrays processed in ‘C’? Illustrate by taking two-dimensional
arrays as examples.
b) What are subscripts? How are they specified? What restrictions apply to the values that
can be assigned to subscripts in ‘C’ language?
c) Write a ‘C’ program that will enter a line of text, store in an array and then display
backwards. The length of the line should be undefined, (being terminated by ENTER
key), but less than 80 characters.
(4+4+7)

8.
a) What is a pointer in ‘C’? How is a pointer variable declared? Give examples and explain.
Enumerate the utility of pointer variables.
b) A program in ‘C’ language contains the following declaration:
static int x[8] = {1,2,3,4,5,6,7,8};
i) What is the meaning of x?
ii) What is the meaning of (x + 2)?
iii) What is the meaning of *x?
iv) What is the meaning of (*x + 2)?
v) What is the meaning of *(x + 2)?

M4.1-R3 Page 5 of 6 July, 2008


c) What is a structure? How does a structure differ from a union? Give examples. For what
kind of applications, union data structure is useful? How are arrays different from
structure?
(4+5+6)

9.
a) How can a procedure be defined in ‘C’? Give an example. Bring out the differences
between function and procedure.
b) Draw a flowchart and then develop an interactive ‘C’ program which finds whether a
given integer number is prime or not. Make use of a function subprogram.
(6+9)

M4.1-R3 Page 6 of 6 July, 2008


M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to


the question paper, as per the instructions contained therein. PART ONE is NOT to
be answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO
will be supplied at the table when the answer sheet for PART ONE is returned.
However, candidates, who complete PART ONE earlier than one hour, can collect the
answer book for PART TWO immediately after handing over the answer sheet for
PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 After you save a project, Visual Basic automatically adds one more to your project. This
file holds information about each of your project’s forms. The extension of this file is
A) vba
B) vbw
C) bas
D) vbp

1.2 Which line of code will enable an error trap and send code execution to an error handler
for any run-time error?
A) On Error HandlerError
B) On Error GoTo 0
C) On Error GoTo RuntimeErrorHandler
D) On Error Resume Next

1.3 Each control, in a Visual Basic form, is identified by


A) Caption Property
B) Text Property
C) Value Property
D) Name Property

1.4 The Event that occurs when a form gets the focus
A) GotFocus
B) Activate
C) Initialize
D) load

1.5 Which of the following property values will change during execution of a program when a
list entry of list box control is clicked?
A) Index
B) ListIndex
C) Caption

M4.2-R3 Page 1 of 5 July, 2008


D) None of the above

M4.2-R3 Page 2 of 5 July, 2008


1.6 An Integer value that specifies how new points are generated from Line, Circle and
Pset are drawn does not apply to one of the followings:
A) DrawMode
B) DrawStyle
C) FillStyle
D) DrawWidth

1.7 When creating a menu, how do you create a menu separation bar:
A) In the Caption text box, enter an ampersand (&)
B) Select Menu Separator check box
C) In the Caption text box, enter a hyphen (-)
D) In the Caption text box, enter the text “Separator”

1.8 A form is being configured before it is loaded, when which one of the following event is
triggered
A) Initialize
B) Activate
C) GotFocus
D) Load

1.9 In order to ensure that the member of a class are accessible only to methods of that
class, such member must be specified as
A) Local
B) Private
C) Public
D) None of the above

1.10 With ADO, which method is used to add a new record to a recordset
A) Insert
B) Update
C) AddNew
D) Append

M4.2-R3 Page 3 of 5 July, 2008


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 The Properties window is also called the Immediate window.


2.2 The load event of the form is triggered when the form has been loaded into memory and
when it becomes the active form.
2.3 The Case Else statement is an essential component of Select Case … End Case
structure and therefore can appear anywhere within the structure.
2.4 For a local variable in a procedure to retain its value between calls, it must be declared
with the keyword static.
2.5 Flow of control with conventional control structure is generally clearer and more efficient
than with error handling.
2.6 Methods of a class are normally made Public and instance variables of a class are
normally made Private.
2.7 Method Line is not a method of Line Control.
2.8 The Windows API routines have a uniform appearance and calling mechanism.
2.9 If a variable is declared ‘Public’ then it has scope over application inside.
2.10 The Name Property is, as always, the first one to define by convention, menu control
begins with the menu prefix.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Instantiates an object of specified type A. Arrange property
3.2 Boolean Data type B. Index
3.3 Refreshes Cached records in a recordset C. Break Mode
3.4 To determine portion of screen to be painted D. End Statement
3.5 Grouping Control that provide similar functionality E. Debugging
3.6 Position of item in List control F. Sort Property
3.7 Terminating the Project Execution G. Control Arrays
3.8 Find and eliminating computer program errors H. Resync
3.9 Change value of a variable to test a scenario I. Clipping region
3.10 Contains the control Icons J. Tool Bar
K. New
L. Tool Box
M. Requery
N. ErrorHandler
O. ListIndex
P. I Group Arrays
Q. True or False

M4.2-R3 Page 4 of 5 July, 2008


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Object Window B. Sentinel C. Twip


D. DLL E. False F. True
G. Access Keys H. Public I. Private
J. ConnectionString K. ConnectionPath L. Selected
M. External N. DSL O. Object Browser
P. Get Q. Local

4.1 The Err object is an intrinsic object with ________ scope.


4.2 The click action on a particular item of List Box sets ________ property value to True.
4.3 A(n) ________ method is used to retrieve values of Private data of a class.
4.4 The ________ is a device independent unit of measurement.
4.5 While using a modal dialog box in an MDI application, use a form with its MDIChild
property set to ________.
4.6 While calling any ________ directly from Visual Basic, the built-in safety features of the
Visual Basic environment are lost.
4.7 The three possible scopes of an identifier are Global scope, Module scope and
________ scope.
4.8 ________ lists objects available for use in your project and gives you a quick way to
navigate through your code.
4.9 ADO property ________ specifies the database provider and the database to which
ADO Data Control should connect.
4.10 Well-designed menus have ________ for quick menu functionality.

M4.2-R3 Page 5 of 5 July, 2008


PART TWO
(Answer any FOUR questions)

5.
a) Discuss various design concepts when creating an interface focused on the needs of the
user.
b) What do you understand by User-Define Data type? Illustrate by defining a suitable data
type to represent details of an employee: FirstName, LastName, IDref, Street, State,
PinCode, HireDate, BirthDate and Salary.
c) Write a program that draws a series of nine circles, each separated by nine pixels.
(5+5+5)

6.
a) What is the purpose of if-then statement? Write an appropriate if-then statement or an If-
Then-Else block for each of the following situations.
i) Suppose the variable pay has been assigned the value of 6.50. Test the value of
variable Hours. If hours exceed 40, assign the value of 9.75 to pay.
ii) Test the value of variable Hours. If hours is less than or equal to 40, assign 6.00
to pay and assign “Regular” to string variable status. If pay exceeds 40, assign
9.75 to pay and assign “Overtime” to status.
Can a Select Case structure be used in this instance? If Yes then how?
b) Describe briefly the For Each … Next structure. How does it differ from For … Next
structure?
(7+8)

7.
a) Which statement declares Window API routines? Which qualifier Public or Private is
required for Windows API procedures that are declared inside a form module?
b) How do List Box and Combo Box differ from each other? Illustrate.
c) What do you understand by TextBox control? What are its features and uses?
(5+5+5)

8.
a) Explain the difference between Resume and Resume Next in an error handler in call
list.
b) Write appropriate event procedures for a form frmMovies that contains Command
Buttons: cmdAdd and cmdRemove. Besides it also contains List box: IstMovies and
also a text box: txtMovies. Initially, the form at run time displays five movies of your
choice. Another movie can be added to this list through text box and by clicking at a
command button cmdAdd and a selected movie of the list box can be removed by
clicking a command button cmdRemove.
(6+9)

9.
a) Write down the procedures for assigning the Short Keys to a menu using Menu Editor.
b) What do you mean by Common Dialog Control? Please state each of the names of
Dialog Box and its purpose.
c) What is difference between fixed size array and dynamic array? Explain with example of
each type of array.
(5+5+5)

M4.2-R3 Page 6 of 5 July, 2008


2009 - January
M1-R3 to M4-R3
M1-R3: IT TOOLS AND APPLICATIONS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and
PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer book
for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which one of the following is not an Output device?


A) Plotter
B) Speech synthesizer
C) MICR
D) Smart and intelligent terminal

1.2. An example of a volatile memory is:


A) CD-ROM
B) RAM
C) ROM
D) HardDisk

1.3. What do folders enable a user to do?


A) Organize the files on a disk
B) Ensure the computer starts properly
C) Name your files
D) Create a file allocation table

1.4. Which of the following belongs to systems software?


A) Word processing software
B) Web browsers
C) Operating system
D) Spreadsheet software

1.5. A Time sharing system is:


A) Batch processing approach
B) Interactive multi-user multiprogramming approach
C) Single user system
D) Single user Multiprocessing approach

M1-R3 Page 1 of 5 January, 2009


1.6. How does the keyboard's Backspace key work?
A) It erases characters to the left of the cursor.
B) It erases characters to the right of the cursor.
C) It moves the cursor left.
D) It erases the character above the cursor.

1.7. Which keystroke will take you at the beginning of the next or previous page of the
document?
A) Ctrl+PageUp and Ctrl+PageDown
B) Shift+Home and Shift+End
C) Ctrl+Home and Ctrl+End
D) The only way is by using the right scroll bar

1.8. Which of the following menu option is used to display the Custom Animation task pane in
PowerPoint by choosing Custom Animation option
A) Format
B) Tools
C) Slide Show
D) Window

1.9. The advantage of using a spreadsheet is:


A) Calculations can be done automatically
B) Changing data automatically updates calculations
C) More flexibility
D) All of the above

1.10. Which of the following allows you to communicate with multiple users at the same time?
A) Instant messaging
B) E-mail
C) A chat room
D) A photo community

M1-R3 Page 2 of 5 January, 2009


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 A 16-bit CPU can process 2 bytes at a time.


2.2 An electronic multiplexer can be considered as a multiple-input, single-output switch, and
a de-multiplexer as a single-input, multiple-output switch.
2.3 An EPROM is a type of computer memory chip and is non-volatile.
2.4 Hard disks can be divided into one or more logical disks called partitions. This division is
described in the partition table found in sector 0 of the disk.
2.5 Audio-output devices can output only music.
2.6 Mnemonics are associated with machine language.
2.7 MEM and CLS are internal DOS commands.
2.8 You can add dates to worksheets, but spreadsheets cannot use dates in calculations.
2.9 Linux is a proprietary software.
2.10 The kernel is a program that constitutes the central core of a computer operating system.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 SCANDISK A. utility to create disk partition
3.2 AutoCorrect B. Half a byte
3.3 Motherboard C. parallel port
3.4 RS-232 D. relative cell reference
3.5 Resolution E. utility that checks your hard disk for logical and physical
errors on the drive.
3.6 Nibble F. Inserts new text
3.7 Drivers G. Series of program instructions that standardizes the format
of data between a computer and a peripheral device.
3.8 $A$1 H. The main circuit board of a microcomputer.
3.9 Memory I. serial port
3.10 latency J. refers to the time delay
K. DOS command
L. refers to the amount of storage you have in your computer
M. absolute cell reference
N. translates assembly language programs into machine
language
O. The number of distinct pixels in each dimension that can be
displayed.
P. A collection of format settings that you can apply to a
paragraph or to selected text.

M1-R3 Page 3 of 5 January, 2009


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. impact B workspace C. Sequential


D. AutoFill E. non-impact F. Alt+Shift+X
G. Shell H. DIP I. Spreadsheet
J. CPU K. MIPS L. line spacing
M. spacing N. Memory Management O. Fill
P. kernel

4.1 Multiprogramming systems are designed to maximize ________ usage.


4.2 Line printers and dot-matrix printers are ________ printers.
4.3 Recording of data on tape is in ________ form.
4.4 ________ is a measure of a computer’s processing speed.
4.5 The ________ is where the data will be entered and displayed.
4.6 In Excel ________ allows the user to enter repetitive data quickly.
4.7 The part of operating system that allows the user to communicate, or interact, with it is
called the ________.
4.8 Use ________ to mark terms you want to include in your index.
4.9 ________ determines the amount of vertical space between lines of text in a paragraph.
4.10 One of the main functions of the operating system is ________.

M1-R3 Page 4 of 5 January, 2009


PART TWO
(Answer any FOUR questions)

5.
a) What is the function of ALU in a microcomputer system?
b) What is BIOS?
c) What is Pointing device? Name different types of pointing device?
d) Express the following binary fractions to their decimal equivalents:
(0.111)2 (11011.101)2
(3+4+4+4)

6.
a) As working with Linux OS all files and directories have security permissions; what are
those and how chmod command helps in operating all those permissions?
b) What are the three types of user interface?
c) What is the difference between systems software and applications software?
(7+4+4)

7.
a) What is clip art? How clip art is inserted in MS-Word document?
b) What is the Normal Template?
c) What is AutoText?
d) How do you create a table? Explain, the purpose of split cell and merge cells in a table
with example.
(3+3+3+6)

8.
a) What do you mean by Reference Operators in Excel?
b) How can a worksheet be renamed?
c) What are Labels? Illustrate the methodology to enter Numbers as Labels in Excel sheet?
d) How is a macros defined and executed in Excel?
(3+3+3+6)

9.
a) Describe Slide Transition and Animation Features of PowerPoint. Why are these features
used in presentations?
b) What is the difference between embedded charts and Chart Sheet? What are Legends
and how are they added on a chart?
(8+7)

M1-R3 Page 5 of 5 January, 2009


M2-R3: BUSINESS SYSTEMS

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer
book for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Input: A=”11/05/1983” Choose the right function to get Output: 198
A) ?SUBSTR(A,7,2)
B) ?STUFF(A,7,3)
C) ?SUBSTR(A,8,3)
D) ?SUBSTR(A,7,3)

1.2 What is output of expression: A=CEILING(5.4)?


A) 5
B) 4
C) 6
D) none of the Above

1.3 The operation carried out on an input data for examining its acceptability is termed
A) Checking
B) Moderation
C) Verification
D) Validation

1.4 Decision Table is a


A) Tabular representation of a program logic
B) Symbolic representation of a program logic
C) Graphical representation of a program logic
D) All of the above

1.5 The command to create a new database file based on two open database files is
A) SET RELATION
B) UPDATE
C) JOIN
D) None of the above

M2-R3 Page 1 of 5 January, 2009


1.6 The ??? Indicates
A) Print text to Output Screen
B) Print text directly to printer
C) Comment
D) Logical Operation

1.7 Edit Checks and Controls are built into a computer based system to
A) Ensure that transcription errors do not corrupt the result
B) Duplicate date does not enter into the computer system
C) Avoid transposition errors
D) All of the above

1.8 Which one correct for display a record with the value 2000 in the field phone and ‘false’
in the logical field paid.
A) Display for phone=2000 .AND. .NOT. paid
B) Display for phone=2000 AND paid =’false’
C) Display for phone=2000 AND. paid=’false’
D) Display for phone=2000 .AND.NOT.paid

1.9 What is the Output of the following program?


For I=1 to 10
?”Hello”
if(I >5)
if(I <6)
EXIT
Endif
Endif
Endfor

A) Hello will print 5 times


B) Hello will print 6 times
C) Hello will print 1 time
D) Hello will print 10 times

1.10 Which one is not a function of Management?


A) Staffing
B) Controlling
C) Planning
D) Co-operating

M2-R3 Page 2 of 5 January, 2009


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 In a real-time system, all changes are recorded on a online transaction file and the
master file updated for repost production when required.
2.2 Structured programming threat to the efficiency of coding of programs.
2.3 The Top-Down approach involves working from general to specific.
2.4 Constants of a variable can be searched within FIND and SEEK commands.
2.5 Natural join joins the tables according to columns those have same name.
2.6 SUM (Distinct) eliminates duplicate field values before determining the SUM.
2.7 The actual text that you enter in Memo fields gets stored in an auxiliary table file with the
extension .ppt.
2.8 A foreign key of a table is a primary key of another table.
2.9 Procedures are used in unstructured Programming.
2.10 Indexed data will occupy more area than Direct-access data.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 SPACE() A. Alternate name for database file.
3.2 ALIAS B. Changes the sequence of Instruction of execution
3.3 Cross Tab C. The clause to define a condition on the groups of
tuples
3.4 PICTURE”@!” D. summarizing data in rows and column
3.5 Having E. Ensures that certain files are in correct format
3.6 LIFO F. To pass privileges to another user
3.7 ADEL G. Valuation of Stock
3.8 Grant H. can detect deadlock and livelock
3.9 Picture Check I. For insert a copy of the object from one application into
another
3.10 Structural Testing J. Change alphabets to upper case
K. Create empty character string
L. Deletes an element from an array

M2-R3 Page 3 of 5 January, 2009


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. Validation B. VED C. Between

D. Flow Chart E. Skip-1 F. RTOD

G. AVG H. FIFO I. CTOD

J. Grant K. List L. DTOC

M. Floor N. Revoke O. Picture Check

4.1 The ________ function is used to convert data expression to a character expression.
4.2 Authorization command used for Database privilege is ________.
4.3 ________ show sequence of instructions in a single program or subroutine.
4.4 ________ method is used to Stock Valuation.
4.5 ________ analysis is useful in stock Controlling of spare parts required for maintenance.
4.6 The function that returns the degrees in an angle with the given number of radians is
________.
4.7 Command moves the record pointer to the previous record is ________.
4.8 The ________ command is used for searching.
4.9 The operator, which is used in place of relation, as well as logical operator is called
________.
4.10 The Process of ascertaining the logical conformity of data to certain prescribed
characteristics is termed as ________.

M2-R3 Page 4 of 5 January, 2009


PART TWO
(Answer any FOUR questions)

5.
a) Explain the methods of analysis for acquiring information for Long Term Planning.
b) Differentiate between procedures and functions in programming language.
c) Distinguish between Distributed Data Processing and Centralized Data processing?
(5+5+5)

6.
a) Distinguish between index and relative file organization.
b) What are Visual FoxPro forms? List out features that may be incorporated into form to
facilitate easier data entry?
c) Define Inventory Control System (ICS)? Give different analysis schemes used in ICS.
(5+5+5)

7.
a) Define WHERE, ORDER BY, GROUP BY, HAVING, IN clauses in SQL?
b) What are the main functions of DBMS and how will you differentiate it from File
Management System?
c) Consider a following database tables.
Empmaster (empcode,desgcode,empname,age,salary)
Desgmaster (desgcode,desgdescription)
i) Write a SQL Query to display details of an Employee whose empcode is 422.
ii) Write a SQL Query to update Employee Salary by 10,000 whose Age > 29.
iii) Write a SQL Query to delete an age column from Empmaster.
iv) Write a SQL Query to add empphone column into Employee table.
v) Write a SQL Query to print Average, Maximum, Minimum salary.
(5+5+5)

8.
a) What is Cross Tab Wizard? Explain the steps involved in creating query using Cross Tab
Wizard.
b) Write a procedure in FoxPro to reverse the first and last names of employee, which is
separated by a space. Assume the field name to be NAME in a database called
EMPLOYEE.
c) Define different modes of viewing the table in Visual FoxPro? How can we operate these
modes?
(5+5+5)

9.
a) Write procedure to display one record at a time(column view) from database
EMPLOYEE.dbf.
Record 3 of 7
Example: First name: Neha
Last name: Sharma
Address: 119 Delhi

Press Right arrow to view next record


Press Left arrow to view previous record
Press ESC to exit

b) Explain RQBE with an example?


(10+5)

M2-R3 Page 5 of 5 January, 2009


M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH ‘C’ LANGUAGE

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer
book for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 The operator & is used for


A) Bitwise AND
B) Bitwise OR
C) Logical AND
D) Logical OR

1.2 Built-in data structures in ‘C’ are


A) Arrays
B) Structures
C) Files
D) All of the above

1.3 The size of a character variable in ‘C’ is


A) 4 byte
B) 8 bytes
C) 16 bytes
D) None of the above

1.4 What is the output of the following program segment?


#include<stdio.h>
main()
{
int i=10, m=10;
clrscr();
printf(“%d”, i>m?i*i:m/m,20);
getch();
}

M4.1-R3 Page 1 of 5 January, 2009


A) 20
B) 1
C) 120
D) 100 20
1.5 Data type of the controlling statement of a SWITCH statement cannot of the type:
A) int
B) char
C) short
D) float
1.6 How long the following loop runs:
for (x=0; x=3; x++)
A) Three time
B) Four times
C) Forever
D) Never
1.7 An expression contains assignment, relational and arithmetic operators. If parentheses
are not specified, the order of evaluation of the operators would be:
A) assignment, arithmetic, relational
B) relational, arithmetic, assignment
C) assignment, relational, arithmetic
D) arithmetic, relational, assignment
1.8 The CONTINUE statement cannot be used with
A) for
B) switch
C) do
D) while
1.9 Output of the following program will be:
main( )
{
int a [ ] = {1, 2, 9, 8, 6, 3, 5, 7, 8, 9};
int *p = a+1;
int *q = a+6;
printf (“\n%d”, q-p);
}
A) 9
B) 5
C) 2
D) None of the above
1.10 Size of the following union (assume size of int=2; size of float=4 and size of char = 1):
union Jabb
{
int a;
float b;
char c;
};
A) 2
B) 4
C) 1
D) 7

M4.1-R3 Page 2 of 5 January, 2009


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 Scalar data types are not supported by ‘C’ language.


2.2 ‘C’ language allows arrays of any dimensions.
2.3 A structure cannot be read as a single entity.
2.4 The associativity of operator ! is from left to right. .
2.5 J++ executes faster than J+1 because ++ is faster than +.
2.6 Two structures cannot be compared automatically.
2.7 The code "a[i] = i++;" is valid and will execute.
2.8 Arrays automatically allocate space when declared.
2.9 sizeof(‘a’) is not 1.
2.10 Float value can be added to a pointer.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 The operator && is an example of A. Arrays
3.2 Preprocessor commands are always B. Storage class
preceded by
3.3 Header files in ‘C’ contain C. /0
3.4 Structures in ‘C’ can be used with D. Shifting bits
3.5 Static defines a E. #
3.6 Null character is represented by F. string.h
3.7 File manipulation functions are available G. Masking
in
3.8 An example of unconditional control H. Switch statement
structure is
3.9 Header file required for strcpy I. Logical
3.10 The bitwise AND operator is used for J. #define
K. Macro definitions
L. stdio.h
M. Goto
N. strcpy
O. Library functions

M4.1-R3 Page 3 of 5 January, 2009


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. integer array B. pointers C. program


D. printf( ) and scanf( ) E. character array F. &&
G. function H. Main I. getw( )
J. reference, value K. static L. for
M. extern N. ternary O. register
P. putw( ) Q. main( )

4.1 Formatted I/O can be produced with the routine(s) ________.


4.2 The ________statement is used to loop as long as a specified condition is met.
4.3 To create a string variable, me must declare a(n) ________ with enough elements to
contain the entire string.
4.4 Call by ________ is more efficient than call by file.
4.5 exit( ) function is used to terminate the ________.
4.6 The only operator that contains three operands is ________ operator.
4.7 The declaration ________ does not allocate storage space for variable.
4.8 The function ________ reads an integer from a file.
4.9 All buffers are cleared when a ________ closed.
4.10 Preprocessor directives are placed in the source program before the function ________.

M4.1-R3 Page 4 of 5 January, 2009


PART TWO
(Answer any FOUR questions)
5.
a) What are the commonly used input functions in ‘C’? Write their syntax and explain the
purpose of each.
b) Develop a flowchart and then write a program to compute the roots of a quadratic
equation A*X^2 + B*X + C = 0. Allow the possibility that (B^2 – 4*A*C) <= 0.
(6+9)
6.
a) What are logical, syntactic and execution errors? Give examples of each. Which is most
difficult to find and why?
b) Enumerate features of a good ‘C’ program. Describe the commonly used techniques as
to how ‘C’ programs can be made highly readable and modifiable.
c) What is an algorithm? Develop an algorithm to test whether a given number is a prime
number.
(5+5+5)
7.
a) Develop loops using
i) While statement
ii) Do-while statement
iii) For statement
that will calculate the sum of every third integer, beginning with k=2 for all values of
k <= 100.
b) Write a function that will compute
Y = X^n
Where Y and X are floating point numbers and n is an integer number. Use this function
and print the output

X n Y
… … …

Check for possible exceptions that may occur during computations with regard to the
magnitude of computed values.
(6+9)
8.
a) How does an array differ from a structure? Give and explain the syntax of array and
structure as defined in ‘C’.
b) How are one-dimensional and two-dimensional arrays stored in computer memory?
Illustrate with an example.
c) Develop a program to multiply two matrices with sizes 3x4 and 4x5. Your program
should take care of the fact that no element of either matrix can be negative. Include
appropriate documentation.
(6+2+7)
9.
a) Give the main advantage of storing data as a file. Describe various ways in which data
files can be categorized in ‘C’. Illustrate by examples.
b) What is an indirection operator? Explain its usage to access a multidimensional array
element. Illustrate your answer by an example.
c) ‘C’ compiler supports many pre-processor commands. Write their names only.
(6+6+3)

M4.1-R3 Page 5 of 5 January, 2009


M4.1-R3 Page 6 of 5 January, 2009
M4.2-R3: PROGRAMMING THROUGH VISUAL BASIC

NOTE:
1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer
book for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which of the following event is not associated with Form?


A) Initialize
B) Load
C) Deactivate
D) QueryReload

1.2 Which type of variable’s value is preserved during procedure calls?


A) Static Local Variable
B) Global Variable
C) Module Variable
D) Dynamic Local Variable

1.3 In each project you can have only one


A) Form
B) BAS module
C) Class module
D) MDI Form

1.4 Which control is used to inform the user about the progress state of a lengthy operation?
A) StatusBar
B) ProgressBar
C) ToolBar
D) CoolBar

1.5 Which of the following menu lists a collection of commands related to external modules
that integrate into the environment?
A) Help Menu
B) Tools Menu
C) Add-In Menu
D) Window Menu

M4.2-R3 Page 1 of 5 January, 2009


1.6 Windows API is
A) a collection of exe files
B) a collection of DLLs
C) a collection of VB files
D) a collection of GUI files

1.7 Which object in the Data Environment designer represents an action performed on a
database?
A) Control
B) Form
C) Action
D) Command

1.8 You can write diagnostic messages from your application’s code to immediate window
using which of the following statement.
A) Print
B) Out
C) Debug. Print
D) Put

1.9 Which object lets you specify all the necessary parameters – for example, the server and
the database names, the user’s name and password and the timeout – before opening
the data sources?
A) The Connection
B) The RecordSet
C) The Command
D) The Parameter

1.10 Which of the following commands, when pressed on a keyboard, will lead to the event
occurrence?
A) KeyType
B) KeyPress
C) KeyEnter
D) FormLoad

M4.2-R3 Page 2 of 5 January, 2009


2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1 x 10)

2.1 When a control is created from the Toolbox, its Font property reflects the font of the
parent form.
2.2 Label control cannot get focus.
2.3 End toolbar will end the current running application and return you to Run mode.
2.4 ComboBox controls is support multiple selections.
2.5 The Parent property is a run time only property (that is, you don’t see it in the Properties
window), which returns a reference to the form that hosts the control.
2.6 Visual Basic 6.0 is command driven programming.
2.7 You can also use the Public attribute for module-level variables, for all module types
except BAS modules.
2.8 Option Explicit statement is used to force declaration of variables.
2.9 Shortcut keys allow the user to access menu function using a single key or key
combination.
2.10 Encapsulation is the ability of different classes to expose similar (or identical) interfaces
to the outside.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 The Erase statement A. Exposes only two meaningful properties: Interval
and Enabled.
3.2 DirList Box B. Is the method that can be used to redraw a
content of control?
3.3 Object C. The intrinsic controls that benefit most from the
SendMessage API
3.4 Int D. Can be used to destroy an array
3.5 twips E. Is the measure by which default Top and Left
properties are measured in relative to a
container control
3.6 label control F. Controls background color is active only if you
also set the Style property to 1-Graphical.
3.7 Timer control G. A file control that displays the folders of the
current drive.
3.8 Refresh H. Is used to create a method for a class
3.9 TextBox controls I. Is an entity that embeds both data and the code
that deals with it
3.10 CommandButton J. Is the function used to truncate a number to the
integer values equal or lower than its argument
function
K. Where& characters have no special meaning
L. Can be used to destroy text

M4.2-R3 Page 3 of 5 January, 2009


4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the “tear-off” answer sheet attached to the
question paper, following instructions therein. (1 x 10)

A. tiff B. twip C. MouseUp


D. Index E. Ctrl+L F. Password Char
G. Toolbar control H. Value I. ListBox
J. Visibility K. Property Get L. Polymorphism
M. Mouse N. PictureBox O. MouseDown

4.1 The Image control is similar to the ________ control, but it can’t act as a container for
other control and has other limitations.
4.2 The Call Stack window appears only when you break the execution of a running program
and press ________.
4.3 ________ and ComboBox controls also fire Click events whenever their ListIndex
properties change.
4.4 The Button parameter passed to ________ events reports which button has just been
pressed.
4.5 ________ is the default property of Option Button.
4.6 ________ of a variable is the portion of code from which that variable can be accessed.
4.7 Visual Basic’s default coordinate system uses a unit called ________.
4.8 The ________ field is used to create an array of menu commands.
4.9 The ________ exposes the Buttons collection, which in turn contains Button objects.
4.10 The ________ property of TextBox hides text with a single character.

M4.2-R3 Page 4 of 5 January, 2009


PART TWO
(Answer and FOUR questions)

5.
a) What do you mean by “Event-Driven-Programming”? What are the basic components of
any VB Project? Explain the different project types available in VB.
b) What is an MDI Form? Explain, how it differs from normal form. Which property has to
set to make a form a child form of the MDI parent form?
c) Differentiate between followings:
i) Picturebox and Image Controls
ii) Combobox and Listbox Controls
iii) Checkbox and OptionButton
(6+3+6)

6.
a) Types of data that can be stored in variable are associated with data types. Visual Basic
Applications supports several native data types. Explain Visual Basic data types by
giving example for each.
b) A control array can be created only at design time and at least one control must belong
to it. Which are the different ways to create control array? How control array adds
flexibility to programs?
c) Visual Basic supports pop-up menus, those context-sensitive menus that most
commercial applications show when you right-click on an user interface object. How
pop-up menu can be created in Visual Basic? Explain with example.
(5+5+5)

7.
a) What do you mean by bug and debugging? Explain in brief types of errors in VB. Also
list down the statements of Error Handling.
b) Explain the following constructs with properties, events and methods.
i) TextBox
ii) Label
iii) Command Button
c) The common dialog control provides a standard set of dialog boxes for operations such
as opening and saving files, setting print options and selection colors and fonts. Explain
various methods to display the desired dialog box of common dialog control.
(5+5+5)

8.
a) What is an array? Explain declaration and processing of one and two dimensional array.
How to create dynamic array?
b) What is a module? Give different types of module with examples.
c) How many cursor types and lock types are there in ActiveX Data Objects (ADO)?
(5+5+5)

9.
a) Forms are used to develop the user interface. Explain Form in brief with its important
properties. Also list the sequence of events while opening and closing the Form. Write a
program to create and remove forms at run time.
b) Create a database application using Datagrid Control and Data Access Objects (DAO)
control. Show the steps and coding for Displaying, Adding and Removing Data from
Datagrid Control.
(6+9)

M4.2-R3 Page 5 of 5 January, 2009


2009 - July
M1-R3 to M4-R3