2016


Time: 3 Hours

Max Marks: 50


PART – A


Answer the following questions in one sentence each. Each question carries 1 mark. (10 x 1 = 10)


Q1. What is transition effect?

Ans. A transition is an animation that occurs when presentation advances from one slide to the next during a slide show.


Steps to add transition in a presentation are as follows: -

  1. Click the slide to which you want to add a transition effect.
  2. Click the Transition Tab on the Ribbon and Click the More button in the transition group.
  3. Select a transition effect from the gallery.


Q2. Define website.

Ans. A website is a collection of related web pages (documents written in $\text{HTML}$) that are typically identified by a common domain name and published on a web server. It is a location on the World Wide Web that can be accessed by the public.


Q3. What is SMTP?

Ans. Simple Mail Transfer Protocol (SMTP) manages the transmission and outgoing mail over the internet. When we compose and send an e-mail, our e-mail client or server uses SMTP to relay the message to the recipients’ e-mail server.


Q4. Name any two system software.

Ans. Microsoft Windows and Linux.


Q5. What is GUI?

Ans. A GUI (Graphical User Interface) allows users to interact with computers and electronic devices through visual elements like icons, buttons, and menus, rather than typing commands. This makes devices more user-friendly and accessible to a wider audience by offering an intuitive, point-and-click experience for performing tasks and navigating systems.


Q6. Name any two word processors.

Ans. Microsoft Word and Google Docs.


Q7. What are the elements of Data Communication?

Ans. The five essential elements of Data Communication are:

  1. Sender (Source):The device that originates the data message.
  2. Receiver (Destination):The device that accepts the message.
  3. Medium (Transmission Medium):The physical path used for data transfer.
  4. Message: The actual data or information being communicated.
  5. Protocol: A set of rules that govern and define how data is transmitted and received.


Q8. What is DNS?

Ans. Domain Name Servers (DNS) are the Internet's equivalent of a phone book. They maintain a directory of domain names and translate them to Internet Protocol (IP) addresses. This is necessary because, although domain names are easy for people to remember, computers or machines, access websites based on IP addresses. A domain name is your website name. It is the address where Internet users can access your website.


Q9. What is range in MS Excel?

Ans. A range in MS Excel is a selection of two or more cells. (E.g., A1:A5 or A1:C3).


Q10. Name any two data types of MS Excel.

Ans. The two most common and fundamental data types in MS Excel are:

  1. Number: Used for all quantitative values, including integers, decimals, currency, percentages, dates, and times.
  2. Text (Label): Used for any combination of letters, numbers, and special characters that are not meant to be used in calculations (e.g., names, addresses, product codes).


PART – B


Answer the following questions in 4-5 lines each. Each question carries 4 marks. (4 x 4 = 16)


Q11. Differentiate between check box and option button.

Ans. The core difference between a Check Box and an Option Button (also known as a Radio Button) lies in the number of selections a user is allowed to make from a group of choices.


Feature Check Box Option Button (Radio Button)
Purpose To select zero, one, or multiple independent options from a list.To select one and only one option from a set of mutually exclusive choices.
Selection TypeNon-exclusive (Independent). Selecting one option does not affect the state of others.Mutually Exclusive. Selecting one option automatically deselects the currently chosen option in the same group.
Appearance Typically represented by a small square.Typically represented by a small circle
Default State Can be checked or unchecked by default, indicating an independent state (Yes/No).One option must be selected in a group to ensure a single, required choice is made.
Use Case Used for options like agreeing to Terms and Conditions, selecting pizza toppings, or choosing multiple interests.Used for choices like Gender, preferred Payment Method, or selecting a single shipping speed.


Q12. What is the difference between absolute and relative references in MS Excel?

Ans. The primary difference between absolute and relative references in MS Excel is how they behave when a formula is copied or filled to other cells.  


Feature Relative Reference Absolute Reference
Definition The cell address changes dynamically based on the relative position of the new cell.The cell address remains fixed regardless of where the formula is copied.
Syntax ExampleA1$A$1
Behaviour If a formula is copied one column right and one row down, the reference A1 changes to B2.The reference $A$1 always stays as $A$1.
Use Case Ideal for calculating totals, averages, or products across a series of rows or columns where the calculation needs to apply to different data in each row/column.Ideal for referring to a single fixed value (like a tax rate, discount rate, or a constant) that must be used in every calculation throughout a spreadsheet.


Q13. Explain the structure of an html webpage.

Ans. A typical HTML document will have the following structure:

Document declaration tag

<html>

<head>

Document header related tags

</head>

<body>

Document body related tags

</body>

</html>


Basic Structure of an HTML Document:

In its simplest form, following is an example of an HTML document:

<!DOCTYPE html>

<html>

<head>

<title>This is document title</title>

</head>

<body>

<h1>This is a heading</h1>

<p>Document content goes here.....</p>

</body>

</html>

Note: HTML is not case sensitive. <HTML> and <html>, both are same.


Q14. Differentiate between micro computers, mini computers and mainframes.

Ans. The main difference between microcomputers, minicomputers, and mainframes is their size, processing power, capacity, and intended number of simultaneous users. These categories represent a scale of computing power, from personal use up to large-scale enterprise operations.


FeatureMicrocomputer Minicomputer Mainframe Computer
Size/CostSmallest, least expensive. Fits on a desktop or in a hand.Medium-sized, more expensive than a micro. Often rack-mounted server size.Largest and most expensive. Can fill a dedicated room or large cabinet.
Users Single-user (primarily).Multi-user, supporting up to a few hundred users simultaneously.Multi-user, supporting hundreds to thousands of users simultaneously.
Processing PowerLowest processing power. Uses a single microprocessor (CPU).Moderate to high processing power. Uses multiple processors.Extremely high processing power and throughput. Uses multiple, highly reliable processors.
Storage CapacityGigabytes (GB) to a few Terabytes (TB).Larger storage, often in the Terabyte range.Massive storage, capable of handling petabytes of data.
Primary UsePersonal computing, office work, small-scale tasks, gaming.Departmental servers, process control, data collection, and network management for small-to-midsize businesses.Large-scale transaction processing, bulk data processing, central databases (e.g., banks, airlines, government).
ExamplesDesktop PCs, Laptops, Smartphones, Tablets.IBM System/3, DEC PDP-11 (historical), mid-range servers.IBM z-Series, Unisys ClearPath.


PART – C


Answer the following questions in 400 words each. Attempt any three. Each question carries 8 marks. (3 x 8 = 24)


Q15. What do you mean by operating system? Give features of any two popular operating systems.

Ans. Operating System is a collection of special programs, which directly controls the computer. Its main purpose is to increase the efficiency of the computer system.

  1. The first program that loads on a computer when we switch it on is called its operating system.
  2. It is a program that acts as an interface between the software and computer hardware.
  3. It is a specialised set of programs that manages the overall functioning of the computer and its resources.
  4. It controls and monitors the execution of other programs and applications.


Functions of an operating system are as follows: -


1. Processor Management –

Operating System manages the working of a processor by allocating various jobs to it. It ensures that each process and application receives enough time by the processor to function properly.


2. Memory Management –

Operating system manages the sharing of the internal memory (RAM, Cache etc.) among the multiple applications to ensure the proper execution of every process.


3. Device Management –

Operating System controls the working of all input and output (I/O) devices. It receives  the request from these devices, performs the specific tasks, and communicate back to the requesting processor.


4. File Management –

Operating System keeps a track of the information regarding the creation, deletion, transfer, copy, and storage of files in an organised way. It also maintains the integrity of the data stored in those files, including directory structure.


5. Security –

Operating system provides various techniques that ensure the integrity and confidentiality of the user data. It is done using passwords, usernames, and firewall.


6. Error Detection –

Operating System checks the system time to time from any kind of external threat or malicious software activity. It also checks the hardware for any type of damage, and displays appropriate alerts to the users.


7. Job Scheduling –

In a multi-tasking operating system where multiple programs run at the same time, the operating system determines which application should run and in what order. It also checks how much time should be allocated to each application.


Here are the key features of two of the most popular operating systems: Microsoft Windows and Linux.


1. Microsoft Windows

Windows, developed by Microsoft, is the most widely used proprietary OS for personal computers.


  1. User-Friendly GUI - Focuses on an intuitive and familiar Graphical User Interface (Start Menu, Taskbar, File Explorer) for non-technical users.


  1. Extensive Software Compatibility - Due to its massive market share, it has the widest range of third-party application support, including major productivity, creative, and gaming software (e.g., Microsoft Office, Adobe Suite, DirectX gaming).


  1. Plug and Play (PnP) - Features excellent automatic device recognition and driver installation, making it easy to connect and use new hardware devices instantly.


  1. Hybrid Kernel Architecture - Uses a hybrid kernel model that combines the speed of a monolithic kernel with the modularity and security of a microkernel.


2. Linux

Linux is an open-source, Unix-like operating system kernel that is distributed in many versions, known as distributions (e.g., Ubuntu, Fedora, Debian).


  1. Open Source and Free - Its source code is freely available for anyone to view, modify, and redistribute. Most distributions can be used at no cost.


  1. High Security and Stability - Known for its robust security model based on user permissions and file ownership, which makes it less susceptible to malware. It is also highly stable, often running for long periods without needing a reboot.


  1. Multi-User and Multitasking - Designed from the ground up to be a powerful multi-user system, allowing multiple users to log in and access system resources simultaneously without interference.


  1. Customization and Flexibility - Allows for unparalleled customization. Users can choose from a variety of desktop environments (GNOME, KDE) and strip down the OS to be lightweight for specific purposes, such as embedded systems or servers.


Q16. Describe the various types of topologies with suitable diagrams.

Ans. A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network.


Types of Network Topology –

Various types of network topologies include: -


1. Point-to-Point Topology – Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers connected back to back using a single piece of cable. Often, the receiving end of one host is connected to sending end of the other and vice-versa.

If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But the end hosts are unaware of underlying network and see each other as if they are connected directly.


2. Bus Topology – In case of Bus topology, all devices share single communication line or cable. Bus topology may have problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple forms of networking where a failure of a device does not affect the other devices. But failure of the shared communication line can make all other devices stop functioning.

Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the data from the line.


3. Star Topology – All hosts in Star topology are connected to a central device, known as hub device, using a point to-point connection. That is, there exists a point to point connection between hosts and hub. The hub device can be any of the following:

  1. Layer-1 device such as hub or repeater
  2. Layer-2 device such as switch or bridge
  3. Layer-3 device such as router or gateway


As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other hosts fails. Every communication between hosts, takes place through only the hub. Star topology is not expensive as to connect one more host, only one cable is required and configuration is simple.


4. Ring Topology – In ring topology, each host machine connects to exactly two other machines, creating a circular network structure. When one host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts. To connect one more host in the existing structure, the administrator may need only one more extra cable. Failure of any host results in failure of the whole ring. Thus, every connection in the ring is a point of failure. There are methods which employ one more backup ring.


5. Mesh Topology – In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to point connection to few hosts only. Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to point links.


Mesh technology comes into two types:


i. Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every new host n(n-1)/2 connections are required. It provides the most reliable network structure among all network topologies.


ii. Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all.


6. Tree Topology – Also known as Hierarchical Topology, this is the most common form of network topology in use presently. This topology imitates as extended Star topology and inherits properties of bus topology.

This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network is bifurcated into three types of network devices. The lowermost is access-layer where computers are attached. The middle layer is known as distribution layer, which works as mediator between upper layer and lower layer. The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which all nodes fork.

All neighbouring hosts have point-to-point connection between them. Similar to the Bus topology, if the root goes down, then the entire network suffers. Even though it is not the single point of failure. Every connection serves as point of failure, failing of which divides the network into unreachable segment.


7. Daisy Chain – This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are connected then it represents Ring topology.

Each link in daisy chain topology represents single point of failure. Every link failure splits the network into two segments. Every intermediate host works as relay for its immediate hosts.


8. Hybrid Topology – A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.

The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the best example of largest Hybrid topology.


Q17. Describe various mediums of data communication with suitable diagram.

Ans. Communication medium refers to the physical channel through which data is sent and received. The speed of data transmission or data rate depends upon the type of medium being used in the network.


Mediums of data communication can be classified as Wired and Wireless: -


1. Wired – it is the transmission used in which signals are confined to a specific path using wires or cables. It is also referred to as Guided or Bounded Transmission media. Its features include:

  1. High Speed
  2. Secure
  3. Used for comparatively shorter distances


Types of Wired Media are as follows: -


a. Twisted Pair Cable – It consists of 2 separately insulated conductor wires wound about each other. Generally, several such pairs are bundled together in a protective sheath. They are the most widely used Transmission Media.


Twisted pair is of two types:


i. Unshielded Twisted Pair (UTP) – This type of cable has the ability to block interference and does not depend on a physical shield for this purpose. It is used for telephonic applications.


Its advantages include:

  1. Cheap
  2. Easy to install
  3. High speed capacity


Its disadvantages include:

  1. Susceptible to external interference
  2. Lower capacity and performance in comparison to STP
  3. Short distance transmission due to attenuation


ii. Shielded Twisted Pair (STP) – This type of cable consists of a special jacket to block external interference. It is used in fast-data-rate Ethernet and in voice and data channels of telephone lines.


Its advantages include:

  1. Better performance at a higher data rate in comparison to UTP
  2. Eliminates crosstalk
  3. Comparatively faster


Its disadvantages include:

  1. Comparatively difficult to install and manufacture
  2. More expensive
  3. Bulky


b. Coaxial Cable – it is called coaxial as it contains two conductors that are parallel to each other. It is surrounded by PVC installations.

There are two types of coaxial cables: Baseband (dedicated cable bandwidth) and Broadband (cable bandwidth is split into several ranges). Cable TVs and analogue television networks widely use Coaxial cables.


Advantages of Coaxial Cable include:

  1. Bandwidth is high.
  2. Much higher noise immunity.
  3. Data transmission without distortion.
  4. Inexpensive.


Disadvantages of Coaxial Cable include:

  1. Difficult to install.
  2. Single cable failure can fail entire network.


c. Optical Fibre – these are similar to coaxial cable. It uses electric signals to transmit data. It has bandwidth more than 2 GBPS. It is used for transmission of large volumes of data.


Advantages of Optical Fibre include:

  1. High Quality Transmission
  2. High Speed
  3. Used for both analogue and digital signals
  4. No electromagnetic interference


Disadvantages of Optical Fibre include:

  1. It is expensive.
  2. Difficult to install.
  3. Maintenance is expensive.
  4. Unidirectional, i.e., will need another fibre, if we need bidirectional communication.


2. Wireless – wireless media send the data through air, which is available to everyone who has a device capable of receiving them. media. No physical medium is required for the transmission of electromagnetic signals. It is also referred to as Unguided or Unbounded Transmission media.


Its features include:

  1. Signal is broadcasted through air
  2. Less Secure
  3. Used for larger distances


Types of wireless media are as follows: -


a. Microwaves – It is a line of sight transmission i.e. the sending and receiving antennas need to be properly aligned with each other. The distance covered by the signal is directly proportional to the height of the antenna. Frequency Range: 1GHz – 300GHz. These are majorly used for mobile phone communication and television distribution.


b. Radio Waves – These are easy to generate and can penetrate through buildings. The sending and receiving antennas need not be aligned. Frequency Range: 3 KHz – 1GHz. AM and FM radios and cordless phones use Radio waves for transmission. Further Categorized as: Terrestrial and Satellite.


c.Infrared – Infrared waves are used for very short distance communication. They cannot penetrate through obstacles. This prevents interference between systems. Frequency Range: 300GHz – 400THz. It is used in TV remotes, wireless mouse, keyboard, printer, etc.


Q18. Describe various types of programming languages in detail.

Ans. A language is a system of communication. A programming language is a formal constructed language designed to communicate instruction to a machine, particularly a computer. In the earlier computers, low level languages like machine language and assembly language were used. Nowadays, high level languages are used.


Low Level Languages:

Low level languages can be classified as: -


1. Machine Language –

All digital computers work on the basics of binary numbers (0 and 1). The instructions given in binary numbers, which the computer understands are called the ‘machine Code’ or ‘Machine Language’. Machine language is the basic language but programming in this language is very difficult and time consuming. It is the only language which the computer understands without translation. Programmes written in machine language can only be used on the computer model for which that language is written. That’s why this language is called machine-oriented. It is rarely used for programming nowadays.


Merits of Machine Language –

  1. Efficient use of storage: language instructions and their storage in computer memory can be controlled.
  2. Instructions of a machine language program are immediately executable. They require no compilation or translation steps.
  3. Machine language instructions can be used to manipulate the individual bits in a byte of computer storage.


Demerits of Machine Language –

  1. Machine language is machine dependent.
  2. Although easily used by the computer, a machine language is difficult to program. It is necessary for the programmer either to memorise the dozens of code numbers for the commands in the machine’s instructions set or to constantly refer to a reference card.
  3. It is difficult to correct or modify machine language programs. To locate errors is about as tedious as writing them initially.


2. Assembly Language –

The language which substitutes letters and symbols for the numbers in the machine program is called an ‘assembly language’ or ‘symbolic language’.


Assembly Code / Symbolic Programs: a program written in symbolic language that uses symbols instead of numbers is called an ‘assembly code’.


Assembler: the translator program that translates an assembly code into the computer’s machine code is called an assembler. It is a system program which is supplied by the computer manufacturer. It is called ‘assembler’ because in addition to translating the assembly code into machine code, it also assembles the machine code into the main memory of the computer.


Source Program: a symbolic program written by a programmer in assembly language is called source program.


Object Program: after the source program has been converted into machine language by an assembler, it is referred to as an object program.


Merits of Assembly Language:

  1. It is not required to keep track of memory locations.
  2. It is efficient in terms of execution and main memory usage.
  3. Revision of complete program is quite easy.
  4. Requires fewer instructions to accomplish the same result.
  5. Assembly language programs are easier for people to modify than machine language program.


Demerits of Assembly Language:

  1. Programs cannot be executed on small size computers.
  2. It takes longer to code because of the more complex nature of language.
  3. Lack of portability of programs between computers of different makes.


High Level Languages:

High level languages were developed to overcome the limitations of low level languages. They are not machine dependent. They are problem oriented. Instructions given in high level languages are known as statements. BASIC, PASCAL, ALGOL, C are the primary high level languages.


High level languages can be classified as: -

  1. ALGOL (Algorithmic Language)
  2. BASIC (Beginners All Purpose Symbolic Instruction Code)
  3. FORTRAN (Formula Translations)
  4. COBOL (Common Business Oriented Language)
  5. PL/1 (Programming Language/1)
  6. C Language


Merits of High Level Languages –


1. Machine Independence: high level languages are machine independent. There is no need of rewriting programs if computers are changed or used of another manufacturer.


2. Easy to learn and use: very similar to languages normally used by us in our day to day life.


3. Fewer Errors: since the programmer need not write all the small steps carried out by the computer, he is much less likely to make an error.


4. It is more user friendly.


Demerits of High Level languages –


1. Lack of Flexibility: because of automatic features of high level languages and not under the control of programmer, they are less flexible than assembly languages.


2. Slow functioning: runs slower due to generality of statements. These are machine independent.


3. Lower Efficiency: as high level languages take more time to run and require more main storage, they are less efficient in the use of CPU and other facilities.


Object Oriented Languages:

Object-oriented languages are programming languages that follow the object-oriented programming (OOP) paradigm. This paradigm centres around the concept of "objects," which are instances of "classes." Objects encapsulate both data (attributes) and the functions that operate on that data (methods).

Fourth generation languages are non-procedural and object oriented in which the programmer has to instruct what to do and what not to do. With the help of these languages, programs can be developed easily.


Common Object Oriented Languages are –


1. C++: this language is developed from C language. It was developed in 1983. Although it is an object oriented language, still it has the attributes for structured programming.


2. JAVA: it was developed by Sun Micro Systems of USA. It is mostly used for internet applications. It requires JAVA compiler in the computer.


3. Oracle: it was developed by Oracle Corporation, USA. It is a non-procedural language related to RDBM (Relational Database Management System). SQL (Structured Query Language is used in Oracle.


4. SQL (Structured Query Language): it is used for database packages like Oracle, Sybase etc. it allows the easy access of the required data from database. Database editing, updating, management has been made quite easy through SQL.