Friday, 28 December 2012

QUESTIONS-ch1,2,3



QUESTIONS:       CHAPTER1,2,3


Q1) Which communication channel(s) is/are suitable in each of the following situations:
a. Setting up a LAN
b. Transfer of data from a laptop to a mobile phone.
c. Transfer of data from one mobile phone to another.

Q2) Why a switch is called an intelligent hub?

Q3) What is Ogg Vorbis?

Q4) Distinguish between :Open Source Software and Propriety Software

Q5)Fill in the blanks:                                                                                                  
(a)    ……………………….refers to unauthorized access of someone else’s data, email, Computer-activity or data communication.
(b)   A system designed to prevent unauthorized access to  or from a private network is called…………………………..
                                                           
Q7) Beauty Lines Fashion Inc. is a fashion company with design unit 135 meters away from each other. The company recently connected their LANs using Ethernet cable to share the stock related information. But after joining their LANs they are not able to share the information due to loss of signal in between. You Suggest the Device to be installed for smooth communication.
                                   
Q8) Grijesh is confused about Wi-Fi. Whether it is a
(i) Type of network cable
(ii) Set of popular technologies and standards for wireless computer networking.
(iii) Set of computer programs that help people log in to the Internet.

Q9) Identify the types of topology from the following:
(i) In which each device with a point-to-point connection to every other device
in the network.
(ii) In which there are bi-directional links between each possible node.

Q10) Bholu is confused as he is unable to find the name of a network of computers and
other devices that is confined to a relatively small space- an office. Help him do that.

Q11Name an open standard for Office document.

Q12) It is a technology on computer networks whose purpose is to prevent unwanted networking connection according to some filtering/blocking rules. What is it?

Q13) Name the protocols used for sending & receiving mails.

Q14) Name two encodings used for Indian language computing.

Q15) Write the full forms of the following :                                                                (0.5 x 4=2)
             a). OSS             b). GNU             c). W3C             d). FOSS

Q16) Given the following MAC address:
00.A0.C9.14.C8.29
Q17) Tarini Fancy Inc. is planning in the Office Building to connect all computers, each spread over within distance of 50 Meters. Suggest the economical cable type having high speed data transfer which can be used to connect these computers.                              

a)    Explain its parts                                                                                               (2)
b)      Name the device links two networks with different protocols and it uses logical address.  (1)
c)      Mr. Jayanto Das is confused between Shareware and Open source software. Mention at least two points of difference to help him understand the same.  (2)

Q18) Arrange the following communication channels in ascending order of their data transmission rates.
ETHERNET CABLE, OPTICAL FIBER, TELEPHONE CABLE, COAXIAL CABLE.

Q19) Sujata says that the following numbers indicate an address:
208.77.188.166 What is the above address called? To which object/device is it assigned?

Q20) Name these:
(i)It is a software package that allows people to send electronic mail along a network of computers and workstation ?
(ii)It is a network topology in which there are bi-directional links between each possible  node ?  

Q21) Which communication channel(s) is/are suitable in each of the following situations:
a. Creating a remote control that can control multiple devices in a home.
b. Very fast communication between two offices in two different countries.
c. Communication in a hilly area
d. Communication within a city and its vicinity where cost of cabling is too high.

Q22)What do you mean by Denial of Service attacks?                                   
                       
Q23) Tara Nathani wants to upload and download files from/to a remote Internet server,write the name of the relevant communication protocol, which will let her do thesame.

Q24)Jai Khanna is confused between the terms Domain Name and URL. Explain the difference with the help of appropriate examples of each.

Q25)Identify the types of topology from the following:
(i) In which each device with a point-to-point connection to every other device in the network.
(ii) In which there are bi-directional links between each possible node.

Q27) Jayanto Das is confused between Shareware and OSS. Mention at least two points of differences to understand the same.

Q28) Which transmission media should be used to transfer data across two continents at very high speed?

Q29) It is a technology on computer networks whose purpose is to prevent unwanted networking connection according to some filtering/blocking rules. What is it?

Q30) Name two encodings used for Indian language computing

Q31) ABC SWITCHGEARS Ltd in Srinagar is setting up the network between its different departments located in different withgs. There are 4 wings named as Manufacturing (M), Research ( R), Administration (A) and Personnel (P).
Number of Computers
Wing M
15
Wing R
100
Wing A
50
Wing P
150

Distance between various wings are given below
Wing A to Wing M
100m
Wing A to Wing R
200m
Wing A to Wing P
400m
Wing M to Wing R
300m
Wing M to Wing P
100m
Wing R to Wing P
450m

 







                                i.            Suggest a suitable Topology for networking the computers of all wings (1)
                              ii.            Name the wing where the Server is to be installed. Justify your answer. (1)
                            iii.            Suggest the placement of Hub/Switch in the network. (1)
                            iv.            Mention and economic technology to provide Internet accessibility to all wings. (1)
Q32) Which of the following softwares are open source: (1) LINUX, MS WINDOWS 7, PHOTOSHOP, MYSQL
Q33)   What is snooping and phishing

Q34)    What are the common threats to Network Security?   

Q35) Differentiate between Phonetic Text Entry and Key map based Entry of Indian language text.

Q36) Answer the following questions:-
a)      A variable amount has a value 25365. Write the statement to display the value in a Label control named lblAmount.
b)      Predict output:
int t=5,p;
        do
        { int r=(t%2==0)?1:0; 
          
             if(r==1)
                 System.out.println(t+r);
             else
                  System.out.print(t+r);
        }while(++t<10);  

Q37) Rewrite the following code using if ..else.
           switch(ch) {
                 case ‘a’:
                 case ‘A’:
                 case ‘e’:
                 case ‘E’:
                 case ‘i’:
                 case ‘I’:
                 case ‘o’:
                 case ‘O’:
                 case ‘u’:
                 case ‘U’: ++v;
                                break;
                 default: others++;
             }


Q38)Write a program to input any number and print them in reverse order using while statement. Where as the input number must be positive. The following is the screen used to print the reverse of  a number.
                         
Q39) What's wrong with the while statement?
while( (ctr < 5) && (ctr > 30))
a the logical operator && cannot be used in a test condition.
b the while loop is an exit-condition loop.
c the test condition is always false.
d the test condition is always true.

Q40) What will be the value of x,y after execution.
Int x,y;
a)for(int x=0;x<10;x++)
y=x+++++x;
y++;

b)int i,j;
for(i=0;i<8;i=i+2)
for(j=0;j<i;j++)
System.out.println(“Hello”);


Q41)Manager of Bachat Bank has developed a java form for finding EMI to be paid by customers against repayment of loan.





 

Loan interest rates are(Yearly) -

Loan Type                        Interest Rate
Car Loan.                                14.5 %
Personal Loan                         13.25 %
Education Loan                       11.75 %

 


































a) Initially loan type should be set to Car Loan, jtxtRate should be disabled and jcmbYears  should have values 5,10,15, and 20.                         
(2)
 b) If loan amount is less than or equal to 0. It should display an error message “Invalid Amount” and cursor should point to jtxtLoanAmt.
(2)
c) When the user clicks the CmdCalcEMI button, the total payable EMI should be calculated and displayed in the jtxtEMI text box. To calculate EMI, firstly calculate compound interest using formula ci=p*(1+r/100)^t. Add compound interest to loan amount  and divide by time    (in months).
(4)
d) Write the code for jCmdExit button to stop the application and  jCmdClear command button to clear all the text boxes, option buttons. Also cursor should point on jtxtLoanAmt test box.
(2)

Q42)How many times the following loop will eb executed?
  int m=10,n=7;
while(m%n>=0)
{
m=m+1;
n=n+2;
}

Q43) K.K.Group of hotels has computerized it booking system. The following is the Booking From along with details: (You can assume various names for various controls of the form).

i) When the form loads text boxes for Room charges, fooding charges, discount and total are disabled. 1
ii) Write the code for exit button so that when a user clicks on exit button Application
will be closed. Also display a message “Thank you for your nice visit” before exiting the application. 2
iii) When the command button Calculate Charges is clicked all the charges along with discount & Total computed and displayed. 2
Then criterion for the calculation of charges is given below:
Total = (Room charges + fooding charges - discount)
Single Room:- Rs.400 per day Double Room :- Rs.700 per day
Breakfast:- Rs.100 per day Lunch: Rs.180 per day Dinner: Rs.200 per Day
Gold card member will be given 20% discount on total charges