21
Dakshina Bharat Hindi Prachar Sabha, Madras February 2011 Post Graduate and Research Institute Distance Education Directorate DCA 1 st Semester Exam Assignment Question Paper Program: DCA, Paper Code: 1-FCIT Subject: Fundamentals of Computer & IT Max. Marks: 25 Q.A. Choose the correct one: [20 x 1 = 20] 1. EBCDIC stands for a. Extended Binary Coded Decimal Interchange Code b. Extended Bit Code Decimal Interchange Code c. Extended Bit Case Decimal Interchange Code d. Extended Binary Case Decimal Interchange Code 2. ACCII stands for a. American Stable Code for International Interchange b. American Standard Case for Institutional Interchange c. American Standard Code for Information Interchange d. American Standard Code for Interchange Information 3. Which of the following is first generation of computer a. EDSAC b. IBM-1401 c. CDC-1604 d. ICL-2900 4. FORTRAN is a. File Translation b. Format Translation c. Formula Translation d. Floppy Translation 5. Second Generation computers were developed during a. 1949 to 1955 b. 1956 to 1965 c. 1965 to 1970 d. 1970 to 1990 6. Which of the following memory medium is not used as main memory system? a. Magnetic core b. Semiconductor

Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

  • Upload
    hakiet

  • View
    270

  • Download
    3

Embed Size (px)

Citation preview

Page 1: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Dakshina Bharat Hindi Prachar Sabha, Madras

February 2011

Post Graduate and Research Institute Distance Education Directorate

DCA 1st Semester Exam Assignment Question Paper

Program: DCA, Paper Code: 1-FCIT

Subject: Fundamentals of Computer & IT

Max. Marks: 25

Q.A. Choose the correct one: [20 x 1 = 20]

1. EBCDIC stands for

a. Extended Binary Coded Decimal Interchange Code

b. Extended Bit Code Decimal Interchange Code

c. Extended Bit Case Decimal Interchange Code

d. Extended Binary Case Decimal Interchange Code

2. ACCII stands for

a. American Stable Code for International Interchange

b. American Standard Case for Institutional Interchange

c. American Standard Code for Information Interchange

d. American Standard Code for Interchange Information

3. Which of the following is first generation of computer

a. EDSAC

b. IBM-1401

c. CDC-1604

d. ICL-2900

4. FORTRAN is

a. File Translation

b. Format Translation

c. Formula Translation

d. Floppy Translation

5. Second Generation computers were developed during

a. 1949 to 1955

b. 1956 to 1965

c. 1965 to 1970

d. 1970 to 1990

6. Which of the following memory medium is not used as main memory system?

a. Magnetic core

b. Semiconductor

Page 2: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

c. Magnetic tape

d. Both a and b

7. One of the main feature that distinguish microprocessors from micro computers is

a. Words are usually larger in microprocessors

b. Words are shorter in microprocessors

c. Microprocessor does not contain I/O devices

d. Exactly the same as the machine cycle tim

8. The least significant bit of the binary number, which is equivalent to any odd decimal number, is:

a. 0

b. 1

c. 1 or 0

d. 3

9. What type of control pins is needed in a microprocessor to regulate traffic on the bus, in order to prevent two

devices from trying to use it at the same time?

a. Bus control

b. Interrupts

c. Bus arbitration

d. Status

10. When was the world’s first laptop computer introduced in the market and by whom?

a. Hewlett-Packard

b. Epson, 1981

c. Laplink traveling software In c. 1982

d. Tandy model-2000, 1985

11. Who developed a mechanical device in the 17th century that add, subtract, multiple, divide and find square

roots?

a. Napier

b. Babbage

c. Pascal

d. Leibniz

12. Most important advantage of an IC is its

a. Easy replacement in case of circuit failure

b. Extremely high reliability

c. Reduced cost

d. Low powers consumption

13. A disk storage medium in the form of an assembly containing a single rigid magnetic disk permanently is

a. Fixed disk

b. Disk cartridge

Page 3: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

c. Card punch

d. Card reader

14. A method of implementing a memory management system is

a. Buddy system

b. Bridge ware

c. Broadband coaxial system

d. All of the above

15. A plastic card similar to a credit card but having some memory and a microprocessor embedded within it is

a. Punched paper tape

b. Chip card

c. Card punch

d. Magnetic tape

16. Actual data processing operations are performed in the arithmetic logic section, but not in the …………………..

storage section of a processor unit

a. Primary

b. Accumulator

c. Buffer

d. Secondary

17. Which most popular input device is used today for interactive processing and for the one line entry of data for

batch processing?

a. Mouse

b. Magnetic disk

c. Visual display terminal

d. Card punch

18. The storage capacity of a disk system depends on the bits per inch of track and the tracks per inch of

a. Cylinder

b. Hum

c. Cluster

d. Surface

19. Condensing output data to exhibit specific information

a. Calculating

b. Recording

c. Merging

d. Summarizing

20. Interface electronic circuit is used to interconnect I/O devices to a computer’s CPU or

a. ALU

b. Memory

Page 4: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

c. Buffer

d. Register

Q.B. Answer all of them:

1. What is RAM? Difference between RAM and ROM. [2]

2. Define types of ROM. [2]

3. Explain the block diagram of computer. [3]

Page 5: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Dakshina Bharat Hindi Prachar Sabha, Madras

February 2011

Post Graduate and Research Institute Distance Education Directorate

DCA 1st Semester Exam Assignment Question Paper

Program: DCA, Paper Code: 2-PC

Subject: Programming in C

Max. Marks: 25

Q.A. Answer all of them: [11 x 2 = 22]

1.

(a) Write a simple program to find the size of different basic data types in C.

(b) Write a program in C for arithmetic operations between two integers.

Your program should guide users with proper message/menu on the console.

(c) Write a function Pali (Sting S) to find whether S is palindrome or not.

2.

(a) Using Pointers,

(i) Write the character-counting function

(ii) Write the string-concatenation program

(b) Explain pointer arithmetic with example. Also explain advantages of malloc and calloc.

3. What will be output when you will execute following c code?

#include<stdio.h>

Void main () {

Printf(“%d\t”,sizeof(6.5));

Printf(“%d\t”,sizeof(90000));

}

Choose all that apply:

(A) 4 2 1

(B) 8 2 1

(C) 4 4 1

(D) 8 4 1

(E) 8 4 2

4. What will be output when you will execute following c code?

#include<stdio.h>

Void main () {

Page 6: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

double num=5.2;

int var=5;

printf(“%d\t”,sizeof(!num));

Printf(“%d\t”,sizeof(var=15/2));

Printf(“%d”,var);

}

Choose all that apply:

(A) 4 2 7

(B) 4 4 5

(C) 2 2 5

(D) 2 4 7

(E) 8 2 7

5. Consider on following declaration:

(i) Short i=10

(ii) Static=10

(iii) Unsigned i=10;

(iv) Const i=10

Choose correct one:

(A) Only (iv) is correct

(B) Only (ii) and (iv) are incorrect

(C) Only (ii), (iii) and (iv) are correct

(D) Only (iii) is correct

(E) All are correct declaration

6. What will be output when you will execute following c code?

#include<stdio.h>

Void main () {

Signed x,a;

Unsigned y,b;

a=(signed) 10u;

b=(unsigned)- 10

y= (signed) 10u + (unsigned) – 10;

x = y;

Printf(“%u\t”,a,b);

If(x==y)

Page 7: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Printf(“%d”,x,y);

else if(x!=y)

Printf(“%u %u”,x,y);

}

Choose all that apply:

(A) 10 – 10 0 0

(B) 10 – 10 65516 - 10

(C) 10 – 10 10 - 10

(D) 10 65526 0 0

(E) Compilation error

7. What will be output of the following c program?

#include<stdio.h>

int main () {

long int 1a=51;

Printf(“%Id”,Ia);

Return 0;

}

(A) 5

(B) 51

(C) 6

(D) Compilation error

(E) None of these

8. What will be output of the following c program?

#include<stdio.h>

int main () {

int max-val=100;

int max-val=10;

int avg-val=;

avg-val = max-val = min-val/2

Page 8: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Printf(“%d”,avg-val);

Return 0;

}

(A) 55

(B) 105

(C) 60

(D) Compilation error

(E) None of these

9. What will be output when you will execute following c code?

#include<stdio.h

Void main() {

Int a=100;

If(a>10)

printf(“M.S.Dhoni”);

else if (a>20)

printf(“M.E.K hussey”);

else if(a>30)

printf(:A.B. de Villiers”);

}

Chool all that apply:

(A) M.S. Dhoni

(B) A.b. de villiers

(C) M.S. Dhoni

M.E.K Hussey

A.B. de Villiers

(D) Compilation error: More than one

Conditions are true

(E) None of the above

10. What will be output when you will execute following c code?

#include<stdio.h>

Void main() {

Page 9: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Int a=5,b=10;

Clrscr();

If(a<++allb<++b)

Printf(“%d %d”, a,b);

Else

Printf(“John Terry”);

}

Choose all that apply:

(A) 5 10

(B) 6 11

(C) 6 10

(D) Compilation error

(E) John Terry

11. What will be output when you will execute following c code?

#include<stdio.h>

Void main() {

Int x=1, y-2;

If(--x &&--y)

Printf(“x=%d”,x,y);

Else

Printf(“%d%d”,x,y);

}

Choose all that apply:

(A) 1 2

(B) X=1 y=2

(C) 0 2

(D) X=0 y=1

(E) 0 1

Q.B. Answer ANY one of them [3]

1. What will be output when you will execute following c code?

#include<stdio.h>

Void main() {

Signed int a=-1;

Page 10: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Unsigned int b=-1u;

If(a==b)

Printf(“The Lord of the rings”);

else

Printf(:American Beauty”);

}

Choose all that apply:

(A) The Lord of the rings

(B) American Beauty

(C) Compilation error: Cannot compare signed number

With unsigned number

(D) Compilation error: Undefined symbol -1u

(E) Warning: Illegal operation

2. What will be output when you will execute following c code?

#include<stdio.h>

Void main() {

Char c=256;

Char ptr=”Leon”;

If(c==0)

While(!c)

If(ptr++)

Printf(“%+u”,c);

Else

break;

}

Choose all that apply:

(A) +256+256+256+256

(B) 0000

(C) +0+0+0+0

(D) It will print +256 at infinite times

(E) Compilation error

Dakshina Bharat Hindi Prachar Sabha, Madras

Page 11: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

February 2011

Post Graduate and Research Institute Distance Education Directorate

DCA 1st Semester Exam Assignment Question Paper

Program: DCA, Paper Code: 3-CN

Subject: Computer Networking

Max. Marks: 25

Q.A. Choose the correct one: [15 x 1 = 15]

1. Where does a computer add and compare data?

a. Hard disk

b. Floppy disk

c. CPU chip

d. Memory chip

2. Which of the following registers is used to keep track of address of the memory location where the next

instruction is located?

a. Memory Address Register

b. Memory Data Register

c. Instruction Register

d. Program Register

3. Pipelining strategy is called implement

a. Instruction execution

b. Instruction prefetch

c. Instruction decoding

d. Instruction manipulation

4. A stack pointer is

a. A 16-bit register in the microprocessor that indicate the beginning of the stack memory.

b. A register that decodes and executes 16-bit arithmetic expression.

c. The first memory location where a subroutine address is stored.

d. A register in which flag bits are stored

5. The branch logic that provides decision making capabilities in the control unit is known as

a. Controlled transfer

b. Conditional transfer

c. Unconditional transfer

d. None of above

6. A time sharing system imply

a. more than one processor in the system

b. more than one program in memory

Page 12: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

c. more than one memory in the system

d. None of above

10. What is the control unit’s function in the CPU?

a. To transfer data to primary storage

b. To store program instruction

c. To perform logic operations

d. To decode program instruction

11. What is meant by a dedicated computer?

a. Which is used by one person only

b. Which is assigned to one and only one task

c. Which does one kind of software

d. Which is meant for application software only

12. The most common addressing techniques employed by a CPU is

a. Immediate

b. Direct

c. Indirect

d. Register

e. All of the above

13. When a subroutine is called, the address of the instruction following the CALL instructions stored in/on the

a. Stack pointer

b. Accumulator

c. Program counter

d. D. stack

14. A microprogram written as string of 0’s and 1’s is a

a. Symbolic microinstruction

b. Binary microinstruction

c. Symbolic microprogram

d. Binary microprogram

15. Memory access in RISC architecture is limited to instructions

a. CALL and RET

b. PUSH and POP

c. STA and LDA

d. MOV and JMP

Q.B. Answer ANY Five of them: [5 x 2 = 10]

1. What are the five basic operations performed by the computer?

2. Define ALU, CU and CPU.

3. Distinguish between bit and byte.

Page 13: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

4. Define volatile and non-volatile memory.

5. Distinguish between impact and non-impact printers.

6. Define soft copy and hard copy terminals.

Page 14: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

(a) A CD-ROM is read only memory.

(b) Mouse is an output device.

(c) Printer is an important output device.

SET-4

1. What are the five basic operations performed by any computer system?

2. Draw a block diagram to illustrate the basic organization of computer system and explain the function

of various units.

3. What is input device? How does it differ from output device?

4. Differentiate between RAM and ROM. Also distinguish between PROM and EPROM.

5. What is cache memory? How is it different from primary memory?

6. Write short notes on (a) Control Unit (b) Random Access Memory (RAM)

Page 15: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Dakshina Bharat Hindi Prachar Sabha, Madras

February 2011

Post Graduate and Research Institute Distance Education Directorate

DCA 1st Semester Exam Assignment Question Paper

Program: DCA, Paper Code: 4-PCP

Subject: PC Packages

Max. Marks: 25

Q.A. Choose the correct one: [10 x 1 = 10]

1. In MS-Dos 6.22, which part identifies the product uniquely

a. MS

b. DOS

c. Ms-DOS

d. 6.22

2. While working with Ms-Dos which command transfers a specific file from one disk to another?

a. Copy

b. Diskcopy

c. Time

d. Rename

3. If you don’t know the current time, which command will you use to display

a. Copy

b. Ver

c. Time

d. Format

4. Which command divides the surface of the blank disk into sectors and assign a unique address to each one

a. Ver

b. Format

c. Fat

d. Chkdsk

5. Each time you turn on your computer, it will check on the control file

a. Command. Com, io.sys

b. Command.com, date.com, dir.com

c. Command.com, io.sys, msdos.sys

d. Chkdsk.exe

6. If you need to duplicate the entire disk, which command will you use?

Page 16: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

a. Copy

b. Diskcopy

c. Chkdsk

d. Format

7. Which of the following extensions suggest that the file is a backup copy

a. Bak

b. Bas

c. Com

d. Txt

8. Only filenames and extensions are to be displayed in wide format, which command you’ll use?

a. Dir/w

b. Dir a:

c. Dir/s

d. Dir/b

9. Which of the following does an operating system do in a stand-along computer system?

a. Manages the user’s files.

b. Provides the system facilities.

c. Provides the interface to allow the user to communicate with the computer.

d. Controls the various peripherals.

10. Which is the following is TRUE about a terminal on a time-sharing computer system?

Has its own CPU and some memory.

Has no memory or CPU of its own.

Q.B. Answer ANY Five of them: [5 x 3 = 15]

1. What is the cause of thrashing? How does the system detect thrashing? Once it detects thrashing, what can

the system do to eliminate this problem?

2. Explain briefly about, processor, assembler, compiler, loader, linker and the functions executed by them.

3. What are the different tasks of Lexical analysis?

4. Describe different job scheduling in operating systems.

5. Explain the difference between microkernel and macro kernel.

6. Write a small do shell script to find number of FF in the design.

7. Which is best page replacement algorithm and Why? How much time is spent usually in each phases and

why?

8. While running DOS on a PC, which command would be used to duplicate entire diskette?

9. Write a small dc shell script to find number of FF in design.

Page 17: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

Dakshina Bharat Hindi Prachar Sabha, Madras

February 2011

Post Graduate and Research Institute Distance Education Directorate

DCA 1st Semester Exam Assignment Question Paper

Program: DCA, Paper Code: 5-CO Subject: Computer Organization

Max. Marks: 25

Q.A. Answer ANY Twenty Five of them: [25 x 1 = 25]

1. In OSI network architecture, the dialogue control and token management are responsibility of

a. Session layer

b. Network layer

c. Transport layer

d. Data link layer

e. None of above

2. Which of the following communication modes support two-way traffic but in only one direction at a time?

a. Simplex

b. Half duplex

c. Three-quarters duplex

d. All of the above

e. None of the above

3. Which of the following statement is incorrect?

a. The difference between synchronous and asynchronous transmission is the clocking derived from the data in

synchronous transmission.

b. Half duplex line is a communication line in which data can move in two directions, but not at the same time.

c. Teleprocessing combines telecommunications and DP techniques in online activities

d. Batch processing is the preferred processing mode for telecommunication operation.

4. Which of the following is considered a broad band communication channel?

a. Coaxial cable

b. Fiber optics cable

c. Microwave circuits

d. All of above

5. Which of the following is not a transmission medium?

a. Telephone lines

b. Coaxial cables

c. Modem

d. Microwave systems

Page 18: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

6. Which of the following does not allow multiple uses or devices to share one communication line?

a. Doubleplexer

b. Multiplexer

c. Concentrator

d. controller

7. Which of the following statement is incorrect?

a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one

communication line

b. HDLC is a standard synchronous communication protocol.

c. RTS/CTS is the way the DTE indicates that it is ready to terminal data and the way the DCW indicates that it is

ready to accept data

d. RTS/CTS is the way the terminal indicates ringing

8. Which of the following is an advantage to using fiber optics data transmission?

a. Resistance to data theft

b. Fast data transmission rate

c. Low noise level

d. All of above

9. Which of the following is required to communicate between two computers?

a. Communications software

b. Protocol

c. Communication hardware

d. All of above including access to transmission medium

10. The transmission signal coding method of TI carrier is called

a. Bipolar

b. NRZ

c. Manchester

d. Binary

11. Which data communication method is used to transmit the data over a serial communication link?

a. Simplex

b. Half-duplex

c. Full-duplex

d. B and c

e. None of above

12. Which of the following types of channels moves data relatively slowly?

a. Wide band channel

b. Voice band challen

c. Narrow band channel

Page 19: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

13. Most data communications involving telegraph lines use:

a. Simplex lines

b. Wideband channel

c. Narrowband channel

d. Dialed service

14. A communications device that combines transmissions from several I/O devices into one line is a

a. Concentrator

b. Modifier

c. Multiplexer

d. Full-duplex line

15. How much power (roughly) a light emitting diode can couple into an optical fiber?

a. 100 microwatts

b. 440 microwatts

c. 100 picowatts

d. 10 miliwatts

16. The synchronous modems are more costly than the asynchronous modems because

a. they produce large volume of data

b. they contain clock recovery circuits

c. they transmit the data with stop and start bits

d. they operate with a larger bandwidth

e. none of above

17. Which of the following statement is correct?

a. terminal section of a synchronous modem contains the scrambler

b. receiver section of a synchronous modem contains the scrambler

c. transmission section of a synchronous modem contains the scrambler

d. control section of a synchronous modem contains the scrambler

e. none of the above

18. Which of the following communications lines is best suited to interactive processing

applications?

a. Narrow band channel

b. Simplex lines

c. Full duplex lines

d. Mixed band channels

19. A remote batch-processing operation in which data is solely input to a central computer would require

a. telegraph line

b. simplex lines

c. mixed bad channel

Page 20: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

d. all of above

20. A band is always equivalent to

a. a byte

b. a bit

c. 100 bits

d. None of above

21. The loss in signal power as light travels down the fiber is called

a. Attenuation

b. Prorogation

c. Scattering

d. Interruption

22. Avalanche photodiode receivers can detect bits of transmitted data by receiving

a. 100 photons

b. 200 photons

c. 2000 photons

d. 300 photons

23. Communication circuits that transmit data in both directions but not at the same time are operating in

a. A simplex mode

b. A half duplex mode

c. A full duplex mode

d. An asynchronous mode

24. An example of a medium speed, switched communications service is

a. Series 1000

b. data phone 50

c. DDD

d. all of the above

25. In communication satellite, multiple repeaters are known as

a. Detector

b. Modulator

c. Stations

d. transponders

26. While transmitting odd-parity coded symbols, the number of zeros in each symbol is

a. Odd

b. Even

c. A and b both

d. unknown

27. Data communications monitors available on the software marked include

Page 21: Dakshina Bharat Hindi Prachar Sabha, Madras February · PDF fileBinary microinstruction c. Symbolic microprogram d. Binary microprogram 15. Memory access in RISC architecture is limited

a. ENVIRON/1

b. TOTAL

c. BPL

d. Telnet

28. An example of an analog communication method is

a. Laser beam

b. Microwave

c. Voice grade telephone line

d. all of the above