You are on page 1of 14

SHRI CHIMANBHAI PATEL INSTITUTE OF

COMPUTER APPLICATION
GUJARAT UNIVERSITY PAPER -2008
C.F.D.P

1. ATTEMPT THE FOLLOWING:(Any fourteen)

1) List the four applications of computer


Ans. The four applications of the computer are as follows:
 System software
 Application software
 Utility software
1) Write down the types of rom
Ans. The types of rom are as follows:
Rom=read only memory
Prom = programmable read only memory
Eprom=erasable programmable read only memory
2) Give four advantages of Bluetooth
3) USB Stands for Universal serial bus
4) UPC Stands for Universal product code
5) SPOOLING Stands for Simultaneous peripherals
operation online.
6) What is software?
Ans. The term software refers to the set of computer programs,
procedures and associated documents(like flowchart and
algorithm)which describe the program and how to be used.
7) What do you mean by volatile memory?
8) List the types of computer.
Ans. The types of computer are as follows:
 Desktop Computer(Personal Computer)
 Laptop Computer(Notebook Computer)
 Palmtop Computer(Pocket p.c)
9) List the Input Devices.
Ans. The input devices are as follows:
1. Keyboard devices
2. Point and draw devices
3. Data scanning devices
4. Digitizer
5. Electronic cards based devices
6. Voice recognition devices
7. Vision based devices
10) The speed of Dot matrix printer is 40-500 characters
per second
11) Data need to be sorted for sequential file
12) What is Database?
Ans. Database is a collection of a related data which is stored
and treated as a unit for information retrieval
13) What is filters in Access? Mention its types.
14) What is wizard?
Ans. The term wizard means which walks through the steps for
creating a basic query.
15) State the significance of cross tab query.
Ans. The significance of cross tab query is to display
summarized values (like sums, counts, and averages)
16) Why are forms used in access?
Ans. The forms are used to enter data in access

2.(A) Attempt the following : (Any Four)

1) What is MICR ? Explain with an example.


Ans. MICR means Magnetic Ink Character Recognition. For
E.g When a customer presents a filled cheque at bank ,a bank
employee manually enters the amount written on the cheque in
the lower right corner of the cheque by using an MICR
inscriber which prints the same with the magnetic ink. The date
of transaction is automatically recorded for all the cheques
processed that day. This cheque is then processed using an
MICR reader-sorter, which can recognize magnetic-ink
character. The MICR reader sorter reads the data on the
cheques and sorts the cheques for the distribution to other
banks or for further processing.

2) Explain the block diagram of a computer.


Ans.
3) What is the difference between dot matrix and laser
printer?
Ans.
Dot matrix printer Laser printer

• Dot matrix printers are • Laser printer are


character printers page printers which
which print characters print one page at a
at a time. time.
• Dot matrix printers are • Laser printers are
impact printers non impact printers
because they print by because they do not
hammering the pins have hammers
on the inked ribbon to striking on an inked
leave ink impression ribbon or paper.
on the paper. • Laser printers are
• Dot matrix printers are faster in printing
normally slow with speed than other
speed usually ranging printers which can
between 30 to 600 print 500 to 1000
characters per second pages per minute.
• Dot matrix printers are • Laser printers can
cheap in terms of both print better quality
initial cost and cost of and because of
operation . printing speed it is
more expensive then
other printers.

4) What is file matching and merging ?


Ans.

5) Explain in brief the concept of data processing.


Ans. DATA PROCESSING CYCLE

Origination of data
Data originated on
Source Documents
Time cards, sales orders,
There for we can find that data
Purchase orders, involves
etc.
processing is the restructuring,
manipulation
INPUT OF DATA or recording of data by people
data by peopleData
or record
Machine ,
in medium
suitable for Input and
to handling
increase their
by data usefulness and value for some
processing
system, punch cards, floppy Storage of Data
particular purpose.
disk etc.The Filing cabinet, Micro
fundamental operation which film, disk
floppy disk,
aremagnetic
carried tapsout in
any data processing
Processing of data
Data entered in to the systems
etc.

function areand
and processed as stated below.
stored.calc
ulaed,composed etc.
1. Origination
Outout if 2. Input
information
Summerise, reports &
Document prepare Output
consisting of Printed or type
Written form.
3. Manipulation
4. Output
5. Storage

1) Organization:
The first function involved in the processing of data is
the original
of the data to be processed . Specifically, the nature , type
and origin of the
source document Must be determined. The source documents
are those
document produced in the process of communicating within
organization
such as sales order , purchase order.

2) Input:
The second function involved in the processing of data
is input of
data stored on this documents in to the data processing
system. The input of
the data processing system occurs when data stored in the
documents is
recorded in some manner acceptable for entry in to data
processing system.

3) Manipulation:

a) Classifying : The classifying data involves the


identification of like
data according to one or more characteristics. For example,
employee time
cards may be group by department, each employee time
cards belongs to the
group of the department.

b) Sorting : After data is classified, it is usually necessary


to arrang or
rearrange The data in to some logical order to facilitate
processing. This
arranging or rearranging is called a sorting.

c) Verification of data: This involves checking its


accuracy prior to
submitting it for processing.

d) Scanning: This involves searching for and assimilating


facts
about events and relationships in the organizations outside
environment.

e) Recording: Generally the processing of data provides


intermediate
results.This intermediate result may be recorded until
further processing.
For , instant In the calculation of each employee net pay,
intermediate
results such as the gross pay, and taxes of the employee
must be retained
temporarily far later use.

f) Filtration: which is the screening out of


extraneous data? Indexing
involves assigning codes to an item of data
within a reference system in
order to facilitate the retrieval of that data.
g) Output: After the various operations on
the data have been
completed, the delivery or communication of
the information or results
must be carried out by

h) Reporting: which is the formal


presentation and distribution of
processed data. Issuance of documents, such as
cheques, involves, and reports.

Retrieval, which is the fetching of a


specific item or items of stored
information at the request of a user.

4) Storage: Finally, the results of the


processing of data must be
retained for future use of reference. This
function is called storage.

2. (B) Attempt the following : (Any Three)

1) Infrared.
2) Hard disk
3) Utility software :
Ans. Utility s/w assist the user with system
maintenance task. Such as disk formatting, data
compression, data backup and scanning the computer
for the virus

a) Disk formatting utility:


Whenever a new disk (which may be a hard disk,
floppy disk or optical disk)is to be used with a
system. It should be formatted properly according to
the requirement associated by o.s
(operating system)

b) Data compression utility:


This utility uses a compression means transform
files into a fraction of their normal size. So it occupies
less storage space.

c) Data backup utility


Data stored in a computer system can be damaged
or lost in several way such as disk crash, virus, h/w
problems or erased by the owner accidentally. So it is
always suggested to keep the backup of important
data. A backup utility is used to create copy of data
on some storage media like floppy disk, cd-rom,
magnetic tape

d) Anti-Virus utility
A computer virus is a piece of code attached to
the program. Whenever it is executed it infect other
programs or data. To save data from the loss or stolen
we are updating anti-virus s/w as a utility which can
remove and stop the virus which is coming into the
system.

4) Backup file
Ans. These files are taken in order to provide backup
copies. In case of loss or damage to current version
the copies files are used to backup or security.

3.(A) Attempt the following : (Any two)


1. Explain searching and sorting utilities of file
2. Explain batch processing. What are the
advantages of batch processing system.
3. Explain Indexed Sequential Access File
Organization.
Ans.The sequential and direct access file are
considered the opposite to each other. The index
sequential file a synthesis of these files types.
 The organization of an index sequential file
combines the positive effect of both
sequential and random access.
 In index sequential file records are stored
sequentially on a direct access
device(magnetic disk) and data is accessible
either randomly or sequentially.
 The sequential access of data occurs one
record at a time until the desire item of data
is found.
 This file organization is supports both batch
and online processing
 This type of file organization combines
advantages of sequential file and direct
access file.
 Records are stored sequentially by a key
record(identifying key) in a DASD(direct
access storage device)
 Index’s permits access to selected records
without searching the entire file. This
technique is known as IASM(Index
Sequential Access Method)

• Advantages :
 It permits the efficient and economical
use of sequential processing technique when
the activity rate is high.
 It permits quick and easy access to
records in a relatively efficient way when
the activity is small(low)

• Disadvantages or Drawbacks
 Slow retrieval compare to random access as searching of
index required time
 Less efficient in the use of storage space
 Relatively expensive h/w and s/w are required
 The application are material industry or accounts and
banking industry.

3(B) Attempt the Following: (Any Two)

1) Differentiate between multiprogramming and


real multi processing system
Ans. Multiprogramming
The method which executes two or more
different and independent programs by the
Same computer
Real multi processing system
If two are more CPU’s are connected
together and perform single or several
Operations simultaneously.
2) Differentiate between master file and transaction
file.
Ans. Master File
These files are permanent in nature For e.g
payroll. Master file having two types
1) Static Master file
2) Dynamic Master file

Transaction File
Transaction file are file in which data
related to business events is recorded. The
Further processing may be used these
transaction data to update master file or
Achieving of the transaction for audit
purpose

3) Differentiate between Online processing and


Real-time processing system.
Ans. Online processing
A device or system which is directly
connected with CPU and perform the
transaction immediately and it is called
online data processing.

Real time processing system


It pertains to online computer processing
which receives and processed data
Quickly to produce output of control

4. (A) Differentiate the following (Any Four)

1) Select count(*) from employees; & select *


from employees;
2) Where and Having clause.
3) Command button and Macro.
4) Entity and attribute
Ans. Entity: =
A unique identification for columns is
known as entity. For e.g emp no, field
Name
Attribute
The data available inside specific
field is called attribute for e.g E01,E02
5) Lookup wizard data type and combo box.
6) Foreign key and Composite key.
Ans. Foreign key
It is a combination of columns with
values based on the primary key values from
Another table
Composite key
Composite key is a primary or foreign
key composed of two or more columns.
4 (B) Consider a table and its fields as given below :
OR
4 (B) Attempt the following

1) Explain referential integrity using an example


Ans. If two tables are related with each other with some
relationship then user enter data in one
Table it is automatically reflected in another table
is called Referential integrity
For referential integrity between two tables it as
following conditions
 The matching field on the one side of the
relationship must be a primary key field or
have a unique index.
 The matching field must have the same data
types.
 Both tables must be part of the same access
database.
 Both the tables must be stored in proprietary
access file(.MDB)format
 The database containing the two tables must
be open.
 Existing data in the two tables cannot violate
any referential integrity rules.
For Example:
All orders in the order table must relate to
existing customers in the customer table.

2) What is the primary key? Is it compulsory to have


a primary key in a table ?
Ans. Primary key is uniquely identified by each and
every row available in a table for that
Specific field.
YES it is compulsory to have a primary key
in a table.
3) Why is relationship required between two or
more tables? How can we create a one tomany
Relationship ?
Ans.

You might also like