60
Prepared by VRKS SASTRY TANIKELLA MARCH 2016 CJL in CSE, GJC, KOTHAPETA, E.G.Dt. 8227 Total No. of Questions 18 Total No. of Printed Pages - 2 COMPUTER FUNDAMENTALS AND MS OFFICE Paper I (English Version) Time: 3 Hours Max. Marks : 50 SECTION A 10 X 2 = 20 Note: ( i ) Answer ALL questions. ( ii ) Each question carries TWO marks. 1. What is a computer? 2. Define an operating system. 3. What are the tabs in the Ribbon ? 4. What is auto correct ? 5. What are the alignments in paragraph ? 6. What are Undo and Redo ? 7. What is macro ? 8. What is a template ? 9. Define database. 10. What is a Foreign Key ? SECTION B 5 X 6 = 30 Note: ( i ) Answer ANY FIVE questions. ( ii ) Each question carries SIX marks. 11. Draw the block diagram of digital computer and explain each unit neatly. 12. Write about desktop components . 13. Write the stepwise procedure to Create, Edit and Save a document in MS- Word. 14. Write about spell checker. 15. Write and explain any six FUNCTIONS. 16. Write about charts. 17. Write the steps for animation of slides. 18. Write the steps to create a simple table and enter five records.

Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Embed Size (px)

Citation preview

Page 1: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

8227

Total No. of Questions – 18

Total No. of Printed Pages - 2

COMPUTER FUNDAMENTALS AND MS – OFFICE

Paper I

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. What is a computer?

2. Define an operating system.

3. What are the tabs in the Ribbon ?

4. What is auto correct ?

5. What are the alignments in paragraph ?

6. What are Undo and Redo ?

7. What is macro ?

8. What is a template ?

9. Define database.

10. What is a Foreign Key ?

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Draw the block diagram of digital computer and explain each unit neatly.

12. Write about desktop components .

13. Write the stepwise procedure to Create, Edit and Save a document in MS- Word.

14. Write about spell checker.

15. Write and explain any six FUNCTIONS.

16. Write about charts.

17. Write the steps for animation of slides.

18. Write the steps to create a simple table and enter five records.

Page 2: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

8228

Total No. of Questions – 18

Total No. of Printed Pages - 2

PROGRAMMING IN ‘C’

Paper I

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. Define algorithm.

2. Write the symbols of flow chart with purpose.

3. What are the basic data types in ‘C’ ?

4. What is nested looping ?

5. Write the syntax of switch statement .

6. What is Recursion ?

7. Write two advantages of functions.

8. What is an array ?

9. Write any four file operation functions .

10. What is the difference between Structure and Union ?

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Write an algorithm to find greatest of given three numbers.

12. Explain arithmetic operators with examples.

13. Write about ‘ i f and if …. else ʼ statements with syntax.

14. Explain for loop with example.

15. Define function. Write any four mathematical functions in ‘ C ʼ .

16. Write a ‘ C ʼ program to find factorial of a given number using recursion.

17. Write a ‘ C ʼ program to add two given matrices .

18. What is a structure ? Explain in detail . 84

Page 3: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

8229

Total No. of Questions – 18

Total No. of Printed Pages – 2

ACCOUNTANCY AND TALLY

Paper I

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. Define Accountancy .

2. Define Journal .

3. What is Ledger ?

4. Define Cash Book.

5. What is Contra entry ?

6. Define debit note.

7. What is proper Journal ?

8. What is Trial Balance ?

9. What are the functional keys in Tally ?

10. What is Tally ?

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Explain the different types of Accounts .

12. What are the different types of cash book ?

13. From the following transactions prepare purchase book . Rs.

2013 Jan., 1 Purchased from Gopi 6,000

2013 Jan., 2 Purchased goods from Ravi 8,000

2013 Jan., 6 Purchased goods from Surya 10,000

2013 Jan., 10 Purchased goods from Suresh 2,000

2013 Jan., 11 Purchased goods from Babu 4,000

2013 Jan., 12 Purchased goods from Prasad 6,000

Page 4: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

14. Prepare double column cash book from the following particulars.

Rs.

2012 May 1 Cash Balance 40,000

Bank Balance 60,000

2012 May 6 Cash received from Ramesh 9,600

Discount allowed 400

2012 May 12 Cash paid to Mohan 6,800

Discount received 200

2012 May 18 Cash Purchase 8,000

2012 May 22 Salaries paid on cheque 10,000

15. From the following transactions prepare Trial Balance :

Rs. Rs.

Capital 60,000 Creditors 20,000

Sales 40,000 Buildings 70,000

Debtors 30,000 Purchases 46,000

Bad Debts 6,000 Bills Payable 32,000

16. What is Balance Sheet ? How is it prepared ?

17. What are the types of subsidiary books ?

18. What are the characteristics of Tally ?

Page 5: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

9227

Total No. of Questions – 18

Total No. of Printed Pages – 2

OOPS AND JAVA

Paper II

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. Who developed Java Language ?

2. What are the four main primitive data types of Java ?

3. What are various loop statements ?

4. What is Polymorphism ?

5. What is a Package ?

6. What is Debugging ?

7. What is Multitasking ?

8. What is an Applet ?

9. What is AWT ?

10. What is an Event ?

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Write any six main features of Java .

12. Explain Arithmetic Operators with examples .

13. Write about separators in Java .

14. Explain for loop with an example.

15. Write a Java program to find factorial of a given number.

16. Explain the overloading with an example.

17. Write the benefits or advantages of packages and Interfaces .

18. Write about the basic methods of Java Applet Class . 30

Page 6: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

9228

Total No. of Questions – 18

Total No. of Printed Pages – 2

RELATIONAL DATA BASE MANAGEMENT SYSTEMS

Paper II

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. What is a database ?

2. What is entity and entity set ?

3. What is a tuple ?

4. What is primary key ?

5. What are the commercial query languages ?

6. Write any two DDL commands .

7. What are the set operators in SQL ?

8. What is a database trigger ?

9. Who will be called as system analyst ?

10. What is data dictionary ?

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. What are the advantages of DBMS over file processing system ?

12. What are the functions of DBA ?

13. Explain mapping constraints with a neat diagram .

14. Explain about Relational Data Model .

15. Write any six Codd rules in Relational Model .

16. Explain any three DML commands with examples .

17. Explain the control structures in PL – SQL .

18. Explain different stages of software development life cycle in detail .

Page 7: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

9229

Total No. of Questions – 18

Total No. of Printed Pages – 2

DATA COMMUNICATION AND COMPUTER NETWORKS

Paper II

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. What is Data Communication ?

2. What is Computer Network ?

3. Expand BBN, GAN .

4. What are gateways ?

5. Write any four uses of E – mail .

6. What is Trojan ?

7. Define HTML .

8. What is Frame ?

9. Define event Handling .

10. Define Dom .

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Explain about various communication channels .

12. Explain different types of Computer Networks .

13. Explain any three Network Topologies .

14. Explain briefly about any three LAN components .

15. Explain any three Web Browsers .

16. Write the structure of an HTML Program .

17. Define a list Explain various types of lists used in HTML .

18. Write the differences between HTML and DHTML .

Page 8: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

8227

COMPUTER FUNDAMENTALS AND MS – OFFICE

Paper I

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. What is a computer?

A) Computer: It is an electronic device which processes given data to derive the

required and useful information. During the processing the computer has to perform

various functions like receives data (input) processes data (process) produces output

(information) stores results (storage).

2. Define an operating system.

A) Operating System: Operating System is system software. The operating system is a

collection of programs that control the operation of all hardware and other resources in

the computer system. It works like a mediator between computer and the hardware.

Ex: MS – DOS, WINDOWS, UNIX, LINUX

3. What are the tabs in the Ribbon ?

A) Ribbon has seven tabs: Home, Insert, Page Layout, References, Mailings, Review, and

View that contain many new and existing features of Word

.

4. What is auto correct ?

A) AutoCorrect tool in Word to retain certain text the way it is. To customize

AutoCorrect:

Click the Microsoft Office button

Click the Word Options Button

Click the Proofing tab

Click AutoCorrect Options button

5. What are the alignments in paragraph ?

A)

a. Align Left: the text is aligned with your left margin.

b. Center: The text is centered within your margins.

c. Align Right: Aligns text with the right margin.

d. Justify: Aligns text to both the left and right margins.

Page 9: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

6. What are Undo and Redo ?

A) Undo: Undo is helps to take the document to previous stage after most recent actions.

Redo: Redo helps to take the document to the advanced or most recent actions.

7. What is macro ?

A) Macro: The macro is a useful feature of excel that helps to automatic key commands

required to execute any command or task. Macros are advanced features that can speed

up editing or formatting we may perform often in an Excel worksheet.

8. What is a template ?

A) Template: template is a pattern or blueprint or model or “Starter” document contain

starting content or boilerplate text.

9. Define database.

A) Database: A collection of data designed to be used by different people is called a

database. It is collection of interrelated data with controlled redundancy to serve one or

more applications.

10. What is a Foreign Key ?

A) Foreign Key: A foreign key is a field or combination of fields that are related to the

primary key of another table.

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Draw the block diagram of digital computer and explain each unit neatly.

A )

Page 10: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

1. Input: This is the process of entering data and programs in to the computer system.

Therefore, the input unit takes data from us to the computer in an organized manner for

processing through an input device such as keyboard, mouse, MICR, OCR, Etc.,

2. Main Memory: It is also known as internal memory. It is very fast in operation.

The process of saving data and instructions is known as memory (storage). Data has to be

fed into the system before the actual processing starts. It contains a part of the operating

system Software, one or more execution programs being executed, the data being

processed and required by the programs for execution, and processed data awaiting

output.

3. Output: This is the process of producing results from the data for getting useful

information. Similarly the output produced by the computer after processing must also be

kept somewhere inside the computer before being given to you in human readable form

through the screen or printer. Again the output is also stored inside the computer for

further processing.

4. Control Unit (CU) : The next component of computer is the Control Unit, which acts

like the supervisor seeing that things are done in proper fashion. Control Unit is

responsible for coordinating various operations using time signal. The control unit

determines the sequence in which computer programs and instructions are executed.

Things like processing of programs stored in the main memory, interpretation of the

instructions and issuing of signals for other units of the computer to execute them. It also

acts as a switch board operator when several users access the computer simultaneously.

Thereby it coordinates the activities of computer’s peripheral equipment as they perform

the input and output.

5. Arithmetic Logical Unit (ALU) : After you enter data through the input device it is

stored in the primary storage. The actual processing of the data and instruction are

performed by Arithmetic Logical Unit. The major operations performed by the ALU are

addition, subtraction, multiplication, division, logic and comparison. Data is transferred

to ALU from storage unit when required. After processing the output is returned back to

storage unit for further processing or getting stored.

6. Secondary storage: It is also known as auxiliary memory. It is closely linked with the

main memory. Since main memory can’t be flooded with unwanted data at particular

moment, same is stored in auxiliary memory from which desired data is fed to main

memory as and when required by it. Thus secondary storage is used to hold mass of

information i.e., system software, application programs, cinemas, games and data files.

Obviously the capacity of secondary storage is very high compared to main memory.

Auxiliary memory usually in the form of Magnetic disk, Magnetic tape, CD’s, Memory

cards, Pen drives Etc.,

12. Write about desktop components .

A) The desktop components: Desktop: The desktop is the main screen area that you see after you turn on your

computer and log on to Windows.

Page 11: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Task Bar: The desktop is sometimes defined more broadly to include the taskbar. The

taskbar sits at the bottom of your screen. It shows you which programs are running and

allows you to switch between them.

Start Button: Start button , which we can use to access programs, folders, and computer

settings.

Desktop icons: Icons are small pictures that represent files, folders, programs, and other

items. When we first start Windows, we will see at least one icon on your desktop: The

Recycle Bin (more on that later).

My Computer

My Network neighbor hood

My Documents

Recycle bin

Internet Explorer

My Briefcase

a) My Computer: My computer is where we can manage all the devices, drives, files,

folders, and applications etc. Double clicking on the My Computer icon will display all

the specified drives and devices that are connected to the computer.

b) Network Neighbourhood: All the client computers connected in the same LAN will

be displayed. From here we access any computer connected in the same LAN.

c) My Documents: It contains the user personalized files.

d) Recycle Bin: All the deleted files / folders / programs will be stored in the recycle bin

directory.

e) Internet Explorer: It is web browser. It is used to browse the World Wide Web.

f) My Briefcase: Is used to store our personal documents, files and folders.

13. Write the stepwise procedure to Create, Edit and Save a document in MS - Word.

A) To Create a New Document: Select “Start” button form the desktop.

Select All Programs from “Start button” options

Select “Microsoft Office” option.

Select ”Microsoft Word 2007” from the options of “Microsoft Office”.

Edit a Document:

Making modifications in a document is known as editing.

Editing may be any one of the copy, cut, paste, undo and redo.

For any modification first we have to select the data.

For copy, cut and paste we can select the icons from “Clipboard” options of

“Home” tab.

Save a Document:

Click the Microsoft Office Button

Click Save or Save As or Press CTRL+S on the keyboard, or Click the File icon

on the Quick Access Toolbar.

Go to the location where we want to save the document in the hard disk

Provide name at “Filename”.

Select “Save” button.

Page 12: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

14. Write about spell checker.

A) Spell check: Used to check the spelling and grammar mistakes typed in a document.

The wrong words will be highlighted by red color under line. We can correct the mistakes

typed in the document with this facility.

Procedure: Place the cursor at the beginning of the document or the beginning of the section

that you want to check

Click the Review Tab on the Ribbon.

Click Spelling & Grammar on the Proofing Group.

Any errors will display a dialog box that allows you to choose a more appropriate

spelling or phrasing.

If you wish to check the spelling of an individual word, you can right click any

word that has been underlined by Word and choose a substitution.

15. Write and explain any six FUNCTIONS.

A) Mathematical functions: let us take a worksheet with simple data to explain mathematical

functions.

1. FACT: Returns the factorial of a number.

Syntax FACT(number)

Example: FACT(B2) gives 120 because B2 in Figure -1 contains 5 i.e., (1 x 2 x 3 x 4 x 5

= 120).

2. POWER: Returns the results of a number raised to a power

Syntax: POWER(number, power)

Example: POWER(B2,E2) gives result 25 because (52 = 25) 3. SQRT: Finds the square root of a value in the cell.

Syntax: SQRT(number)

Example: SQRT(C2) gives 2 because square root of 4 is 2.

4. SUM: The SUM function adds all the numbers that you specify as arguments.

Syntax: SUM(number1, [number2],[number3],[number4],…)

Example: SUM(A2:E2) Gives the result 20 because(3 + 5 +4 + 6 + 2 = 20)

5. SUMIF: You use the SUMIF function to sum the values in a range that meet criteria

that you specify.

Syntax: SUMIF(RANGE , CRITERIA)

Example: SUMIF(A2:E2,">4") Gives result 11 because (5 + 6).

6. MOD: Returns the remainder after number is divided by divisor. The result has the

same sign as divisor.

Syntax: MOD(number, divisor)

Page 13: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Number: is the number for which you want to find the remainder.

Divisor is the number by which you want to divide number.

Ex1: MOD(B2,A2) gives result 2 because remainder is 2 when 5 is divided by 3.

16. Write about charts.

A) Charts are used to display series of numeric data in a graphical format to make it easier to

understand large quantities of data and the relationship between different series of data. Here

charts are prepared from the following table.

Column charts Data that is arranged in columns or rows on a worksheet can be plotted in a column chart.

Column charts are useful for showing data changes over a period of time or for illustrating

comparisons among items.

Line charts Data that is arranged in columns or rows on a worksheet can be plotted in a line chart. Line

charts can display continuous data over time, set against a common scale, and are therefore

ideal for showing trends in data at equal intervals. In a line chart, category data is distributed

evenly along the horizontal axis, and all value data is distributed evenly along the vertical

axis.

Page 14: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Pie charts Data that is arranged in one column or row only on a worksheet can be plotted in a pie chart.

Pie charts show the size of items in one data series, proportional to the sum of the items. The

data points in a pie chart are displayed as a percentage of the whole pie.

Bar charts Data that is arranged in columns or rows on a worksheet can be plotted in a bar chart. Bar

charts illustrate comparisons among individual items.

Page 15: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Area charts Data that is arranged in columns or rows on a worksheet can be plotted in an area chart. Area

charts emphasize the magnitude of change over time, and can be used to draw attention to the

total value across a trend. For example, data that represents profit over time can be plotted in

an area chart to emphasize the total profit.

By displaying the sum of the plotted values, an area chart also shows the relationship of parts

to a whole.

XY (scatter) charts Data that is arranged in columns and rows on a worksheet can be plotted in an xy (scatter)

chart. Scatter charts show the relationships among the numeric values in several data series,

or plots two groups of numbers as one series of xy coordinates.

A scatter chart has two value axes, showing one set of numeric data along the horizontal axis

(x-axis) and another along the vertical axis (y-axis). It combines these values into single data

Page 16: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

points and displays them in irregular intervals, or clusters. Scatter charts are typically used

for displaying and comparing numeric values, such as scientific, statistical, and engineering

data.

17. Write the steps for animation of slides.

A) Slide Animation: Animation means to add a special visual or sound effect to text or an object.

Slide animation effects are predefined special effects that you can add to objects

on a slide. To apply an animation effect:

1. Select the object

2. Click the Animations tab on the Ribbon

3. Click Custom Animation

4. Click Add Effect

5. Choose the appropriate effect.

18. Write the steps to create a simple table and enter five records.

A) Create a table, starting in Design view In Design view, you first create the new

table's structure. You then switch to Datasheet view to enter data, or enter data by using

some other method, such as pasting, or importing.

1. On the Create tab, in the Tables group, click Table Design.

2. For each field in your table, type a name in the Field Name column, and then select a

data type from the Data Type list.

3. If you want, you can type a description for each field in the Description column. The

description is then displayed on the status bar when the cursor is located in that field in

Datasheet view.

4. After you have added all of your fields, save the table:

Page 17: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Click the Microsoft Office Button and then click Save, or press CTRL+S.

5. You can begin typing data in the table at any time by switching to Datasheet view and

clicking in the first empty cell. You can also paste data from another source, as described

in the section Copy data from another source into an Access table.

Student Name Year Marks M.Sindhu Kumari 2012-14 907

Sk.Lal Asha 2011-13 857

S.Naga Lakshmi 2010-12 882

A.Naresh 2009-11 803

Sk.Mustafa 2008-10 813

Page 18: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

8228

PROGRAMMING IN ‘C’

Paper I

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. Define algorithm. A) Algorithm :A set of sequential steps usually written in Ordinary Language to solve a

given problem is called an Algorithm.

2. Write the symbols of flow chart with purpose. A) Symbols of flow chart: Ellipse, Parallelogram, Rectangle, Diamond, Arrow and

Circle.

3. What are the basic data types in ‘C’ ? A) Basic Data Types : There are four basic data types in C language. They are Integer,

character, floating point and double.

4. What is nested looping ? A) Nested loop: A loop with in another loop is called nested loop.

5. Write the syntax of switch statement . A) Switch statement: A switch statement is used to choose a statement among several

alternatives.

Syntax: switch (expr)

{

case constant-1: statements1;

caseconstant-2: statements2;

———

———

default: statements n;

}

6. What is Recursion ? A) Recursion: Recursion can be defines as the process of a function by which it can

call itself.

7. Write two advantages of functions.

A) The main advantages of using a function are: Easy to write a correct small function.

Easy to read and debug a function.

Page 19: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Easier to maintain or modify such a function.

Small functions tend to be self documenting and highly readable

It can be called any number of times in any place with different parameters.

8. What is an array ? A) Array: Array can be defined as a collection of data objects of same type which are

stored in consecutive memory locations with a common variable name.

9. Write any four file operation functions .

A) File operation functions:

fopen( ), fclose( ), fprint( ), fscan( ).

FILE OPEN function fopen ( )

FILE CLOSE function fclose( )

FILE INPUT functions getc( ) and fscanf( )

FILE OUTPUT functions putc( ) and fprintf( )

10. What is the difference between Structure and Union ?

A)

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Write an algorithm to find greatest of given three numbers.

A) Algorithm: Step 1: Start

Page 20: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Step 2: Read the numbers X, Y, Z.

Step 3 : if (X > Y) BIG = X else BIG = Y

Step 4: if (BIG < Z) BIG = Z

Step 5: Print the greatest number i.e. BIG

Step 6: Stop.

12. Explain arithmetic operators with examples.

A) Arithmetic Operators

Operator Meaning + Addition

- Subtraction

* Multiplication

/ Division

% Modulo division

Ex: a and b are integer variables and assigned a=5 and b=3 then

Operator Purpose Arithmetic

Expression

Result

+ Addition a+b 8

- Subtraction a-b 2

* Multiplication a*b 15

/ Division a / b 1

% Remainder after

integer division

a%b 2

13. Write about ‘ if and if …. else ʼ statements with syntax.

A)

(a) if statement : The if statement is used to express conditional expressions. If the

given condition is true then it will execute the statements otherwise skip the statements.

The simple structure of ‘if’ statement is

if (< conditional expression>)

Statement-1;

(or)

The conditional expression is evaluated, if the expression is true the statements will be

executed. If the expression is false the statements are skipped and execution continues

with the next statements.

Example: a=20; b=10;

if ( a > b )

printf (“big number is %d” ,a);

b. if-else statements : . if (< conditional expression>)

statements-1

else

statements-2;

Page 21: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

The conditional expression is evaluated and if the expression is true the statements-1 will

be executed. If the expression is false the statements-2 will be executes.

Example: if ( a> b )

printf (“a is greater than b”);

else

printf (“a is not greater than b”);

c. Nested else-if statements :If some situations if may be desired to nest multiple if-else

statements. In this situation one of several different course of action will be selected.

Syntax if ( <exp1> )

Statement-1;

else if ( <exp2> )

Statement-2;

else if ( <exp3> )

Statement-3;

else Statement-4;

When a logical expression is encountered whose value is true the corresponding

statements will be executed and the remainder of the nested else if statement will be

bypassed. Thus control will be transferred out of the entire nest once a true condition is

encountered.

The final else clause will be apply if none of the exp is true.

d. nestedif-else statement : It is possible to nest if-else statements, one within another.

There are several different forms that nested if-else statements can take.

The most general form of two-layer nesting is

if(exp1)

if (exp3)

Statement-3;

else

Statement-4;

else

if(exp2)

Statement-1;

else

Statement-2;

One complete if-else statement will be executed if expression1 is true and another

complete if-else statement will be executed if expression1 is false.

14. Explain for loop with example. A) for loop: The execution of for loop is as follows

a) Initialization of the control variables is done first.

b) The value of the control variable is tested using the test condition. If the test condition

is true the body of the loop will be executed otherwise loop will be terminated.

Page 22: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

c) When the body of the loop is executed, the control is transferred back to the for

statement and it will be updated.

Syntax: for (exp1;exp2;exp3)

{

Body of the loop

}

exp1 : Initialization Expression.

exp2 : Condition or Control Expression.

exp3 : Update Expression.

Example: (Student can write any program)

/*creating a single dimensional array of characters and displaying them*/

#include<stdio.h>

#include<conio.h>

void main()

{inti,j,n;

char a[10];

clrscr();

printf("\n how many elements");

scanf("%d",&n);

printf("\n enter %d characters line by line\n",n);

for(i=0;i<n;++i)scanf("\n%c",&a[i]);

printf("\n given array\n");

for(j=0;j<n;++j)printf("\n%c",a[j]);

getch();

}

how many elements 5

enter 5 characters line by line

h

e

l

l

o

given array

h

e

l

l

o

15. Define function. Write any four mathematical functions in ‘ C ʼ . A) Function: A function can be defined as a subprogram which is meant for doing a

specific task.

inbuilt C functions in math.h file:

“math.h” header file supports all the mathematical related functions in C language. All

the arithmetic functions used in C language are given below.

Page 23: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

S.no Function Description

1 floor ( ) This function returns the nearest integer which is less than or equal to the

argument passed to this function.

2 round ( ) This function returns the nearest integer value of the float/double/long

double argument passed to this function. If decimal value is from ”.1 to

.5″, it returns integer value less than the argument. If decimal value is

from “.6 to .9″, it returns the integer value greater than the argument.

3 ceil ( ) This function returns nearest integer value which is greater than or equal

to the argument passed to this function.

4 sin ( ) This function is used to calculate sine value.

5 cos ( ) This function is used to calculate cosine.

6 cosh ( ) This function is used to calculate hyperbolic cosine.

7 exp ( ) This function is used to calculate the exponential “e” to the xth power.

8 tan ( ) This function is used to calculate tangent.

9 tanh ( ) This function is used to calculate hyperbolic tangent.

10 sinh ( ) This function is used to calculate hyperbolic sine.

11 log ( ) This function is used to calculates natural logarithm.

12 log10 ( ) This function is used to calculates base 10 logarithm.

13 sqrt ( ) This function is used to find square root of the argument passed to this

function.

14 pow ( ) This is used to find the power of the given number.

15 trunc.(.) This function truncates the decimal value from floating point value and

returns integer value

16. Write a ‘ C ʼ program to find factorial of a given number using recursion. A) /* factorial by using recursive function */

/*finds factorial by using recursion*/

#include<stdio.h>

#include<conio.h>

void main()

{

long factorial(int);

intnum;

long f;

clrscr();

printf("Enter a number n=");

scanf("%d", &num);

if (num< 0)

printf("Negative numbers are not allowed.\n");

else

{

f = factorial(num);

Page 24: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

printf("factorial of %ld is %ld\n", num, f);

}

getch();

}

long factorial(int n)

{

if (n == 0)

return 1;

else

return(n * factorial(n-1));

}

input Enter a number n= 5

output Factorial of 5 is 120

17. Write a ‘ C ʼ program to add two given matrices .

A)

/*matrix addition*/

#include <stdio.h>

#include<conio.h>

void main()

{

Intar,ac,br,bc, c, d, a[10][10], b[10][10], sum[10][10];

clrscr();

printf("Enter the number of rows in matrix-A: ");

scanf("%d", &ar);

printf("Enter the number of columns in matrix-A: ");

scanf("%d", &ac);

printf("Enter the number of rows in matrix-B: ");

scanf("%d", &br);

printf("Enter the number of columns in matrix-B: ");

scanf("%d", &bc);

if (( ar != br) || (ac!=bc)) gotolastpara;

printf("Enter %d elements of first matrix-A\n",ar*ac);

for ( c = 0 ; c <ar ; c++ )

for ( d = 0 ; d < ac ; d++ )

scanf("%d", &a[c][d]);

printf("Enter %d elements of second matrix-B\n",br*bc);

for ( c = 0 ; c <br ; c++ )

for ( d = 0 ; d <bc ; d++ )

scanf("%d", &b[c][d]);

for ( c = 0 ; c <ar ; c++ )

for ( d = 0 ; d <ac ; d++ )

sum[c][d] = a[c][d] + b[c][d];

printf("\n matrix-A is \n");

for ( c = 0 ; c <ar ; c++ )

{

Page 25: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

for ( d = 0 ; d < ac; d++ )

printf("%d\t", a[c][d]);

printf("\n");

}

printf("\n matrix-B is\n");

for ( c = 0 ; c <br ; c++ )

{

for ( d = 0 ; d <bc; d++ )

printf("%d\t", b[c][d]);

printf("\n");

}

printf("Sum of entered matrices(A+B):-\n");

for ( c = 0 ; c <ar ; c++ )

{

for ( d = 0 ; d < ac; d++ )

printf("%d\t", sum[c][d]);

printf("\n");

}

gotoendpara;

lastpara: printf("\n rows and columns are not equal, hence can not add matrices");

endpara:

getch();

}

Input Enter the number of rows in matrix-A 2

Enter the number of columns in matrix-A 2

Enter the number of rows in matrix-B 2

Enter the number of columns in matrix-B 3

rows and columns are not equal, hence can not add matrices

Enter the number of rows in matrix-A: 2

Enter the number of columns in matrix-A: 2

Enter the number of rows in matrix-B: 2

Enter the number of columns in matrix-B: 2

Enter 4 elements of first matrix-A

1

2

3

4

Enter 4 elements of second matrix-B

5

6

7

8

output matrix-A is

1 2

3 4

matrix-B is

Page 26: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

5 6

7 8

Sum of entered matrices(A+B):-

6 8

10 12

18. What is a structure ? Explain in detail .

A) Structure: A group of one or more variables of different data types organized

together under a single name is called a Structure.

a) Structure Declaration

The declaration of a structure specifies the grouping of various data items into a single

unit without assigning any resources to them. The syntax for declaring a structure in C is

as follows:

struct<Structure Name>

{

Data Type member-1;

Data Type member-2;

…. ….

DataType member-n;

};

The structure declaration starts with the structure header, which consists of the keyword

‘struct’ followed by a tag. The tag serves as a structure name, which can be used for

creating structure variables. The individual members of the structure are enclosed

between the curly braces and they can be of the similar or dissimilar data types. The data

type of each variable is specified in the individual member declarations.

Example: Let us consider an employee database consisting of employee number, name, and salary.

A structure declaration to hold this information is shown below:

struct employee

{

inteno;

char name [80];

float sal;

};

b) Structure Variables Similar to other types of variables, the structure data type variables can be declared using

structure definition.

struct

{

introllno;

char name[20];

float average;

} a, b;

In the above structure definition, a and b are said to be structure type variables. ‘a’ is a

structure type variable containing rollno, name, average as members, which are of

different data types. Similarly ‘b’ is also a structure type variable with the same members

of ‘a ‘.

Page 27: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

c) Structure Initialization The members of the structure can be initialized like other variables. This can be done at

the time of declaration.

Example struct address

{

char name [20];

char desgn [10];

char place [10];

} ;

i.e

struct address my-add = { ‘Sree’, ‘AKM’, ‘RREDDY’);

i.e

my-add . name = ‘Sree’

my-add . desgn = AKM

my-add . place = RREDDY

As seen above, the initial values for structure members must be enclosed with in a pair of

curly braces. The values to be assigned to members must be placed in the same order as

they are specified in structure definition, separated by commas. If some of the members

of the structure are not initialized, then the c compiler automatically assigns a value

‘zero’ to them.

d) Accessing of Structure Members As seen earlier, the structure can be individually identified using the period operator ( . ).

After identification, we can access them by means of assigning some values to them as

well as obtaining the stored values in structure members. The following program

illustrates the accessing of the structure members.

Example: Write a C program, using structure definition to accept the time and display it.

/ * Program to accept time and display it */

# include <stdio.h>

void main( )

{

struct

{

int hour, min;

float seconds;

} time;

printf ("Enter time in Hours, min and Seconds\n");

scanf ( "%d %d %f", &time . hour, & time . min, & time . seconds);

printf ( " The accepted time is %d %d %f " , time . hour, time . min, time . seconds);

}

Page 28: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

8229

Total No. of Questions – 18

Total No. of Printed Pages – 2

ACCOUNTANCY AND TALLY

Paper I

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. Define Accountancy .

2. Define Journal .

3. What is Ledger ?

4. Define Cash Book.

5. What is Contra entry ?

6. Define debit note.

7. What is proper Journal ?

8. What is Trial Balance ?

9. What are the functional keys in Tally ?

10. What is Tally ?

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Explain the different types of Accounts .

12. What are the different types of cash book ?

13. From the following transactions prepare purchase book . Rs.

2013 Jan., 1 Purchased from Gopi 6,000

2013 Jan., 2 Purchased goods from Ravi 8,000

2013 Jan., 6 Purchased goods from Surya 10,000

2013 Jan., 10 Purchased goods from Suresh 2,000

2013 Jan., 11 Purchased goods from Babu 4,000

2013 Jan., 12 Purchased goods from Prasad 6,000

Page 29: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

14. Prepare double column cash book from the following particulars.

Rs.

2012 May 1 Cash Balance 40,000

Bank Balance 60,000

2012 May 6 Cash received from Ramesh 9,600

Discount allowed 400

2012 May 12 Cash paid to Mohan 6,800

Discount received 200

2012 May 18 Cash Purchase 8,000

2012 May 22 Salaries paid on cheque 10,000

15. From the following transactions prepare Trial Balance :

Rs. Rs.

Capital 60,000 Creditors 20,000

Sales 40,000 Buildings 70,000

Debtors 30,000 Purchases 46,000

Bad Debts 6,000 Bills Payable 32,000

16. What is Balance Sheet ? How is it prepared ?

17. What are the types of subsidiary books ?

18. What are the characteristics of Tally ?

Page 30: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

9227

OOPS AND JAVA

Paper II

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. Who developed Java Language ? A) Java was developed by James Gosling at Sun Microsystems in 1995.

2. What are the four main primitive data types of Java ? a) The Four Primitive Data Types in JAVA are:

Integer: byte, short, int, and long.

Floating Point: float and double

Character: char

Boolean: variable with a value of true or false.

3. What are various loop statements ? A) Loop statements in Java are 3. those are

1) for loop

2) while loop

3) do – while loop

4. What is Polymorphism ?

A) Polymorphism: Polymorphism means the ability to take more than one form is called

Polymorphism.

5. What is a Package ? A) Package: Packages are a way of grouping a variety of classes and or interfaces

together. The grouping is done according to their functionality. Packages are act like

containers for classes.

Java packages are classified into two types. They are:

1. Java API Packages.

2. User – Defined Packages.

Syntax: 1. To create a package:

package package_name;

2. To import a package:

import package_name.*;

Page 31: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

6. What is Debugging ? A) Debugging: The process of identifying and removing user committed errors from a

program is called debugging.

7. What is Multitasking ? A) ) Multitasking: It is an operating system concept in which multiple tasks are

performed simultaneously.

8. What is an Applet ? A) Applet: An applet is a Java program that runs in a Web browser. An applet can be a

fully functional Java application because it has the entire Java API.

9. What is AWT ? A) AWT: AWT stands for Abstract Window Tool Kit. It is a portable GUI library

among various operating systems for stand-alone applications.

10. What is an Event ? A) Event: Changing the state of on object is called an Event. Ex:click on button,

dragging mouse etc.

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Write any six main features of Java .

A)

Features of Java:

1.Object Oriented: In java everything is an Object. Java can be easily extended since it

is based on the Object Model.

2.Platform Independent: When java program is compiled, it is not compiled into

platform specific machine, rather the into platform independent byte code. This byte

code is distributed over the web and interpreted by virtual machine (JVM) on whichever

platform it is being run.

3. Simple: Java is designed to be easy to learn. If we understand the basic concept of

OOP java would be easy to master.

4,Secure: With java’s secure feature it enables to develop virus – free, tamper – free

systems. Authentication techniques are based on public – key encryption.

5.Architetural – Neutral: Java compiler generates an architecture – neutral object file

format which makes the compiled code to be executable on many processors with the

presence Java runtime system.

6. Portable: We may carry the java byte code to any platform.

7. Robust: Java makes an effort to eliminate error prone situations by emphasizing

mainly on compile time error checking and runtime checking.

Page 32: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

8.Multi – threaded: With java’s multi-threaded feature it is possible to write programs

that can do many tasks simultaneously. This design feature allows developers to

construct smoothly running interactive applications.

9.. Interpreted: Java byte code is translated on the fly to native machine instructions and

is not stored any where. The development process is more rapid and analytical since the

linking is an incremental and light weigh process.

10.High Performance: With the use of Just – In – Time compilers Java enables high

performance.

11.Distributed: Java is designed for the distributed environment of the internet.

12. Dynamic: Java programs can carry extensive amount of run-time information that

can be used to verify and resolve accesses to objects on run – time.

12. Explain Arithmetic Operators with examples . A) Arithmetic Operators: Arithmetic Operators are used to perform arithmetic

operations on two operands.

Ex: a and b are integer variables and assigned a=5 and b=3 then

Operator Purpose Arithmetic

Expression

Result

+ Addition a+b 8

- Subtraction a-b 2

* Multiplication a*b 15

/ Division a / b 1

% Remainder after

integer division

a%b 2

13. Write about separators in Java .

A)

SEPARATORS PURPOSE

Parentheses ( )

Encloses arguments in method definitions and calling; adjusts

precedence in arithmetic expressions; surrounds cast types and

delimits test expressions in flow control statements

Braces { } defines blocks of code and automatically initializes arrays

Brackets [ ] declares array types and dereferences array values

Semi colon ; terminates statements

Comma ,

separates successive identifiers in variable declarations; chains

statements in the test,

expression of a for loop

Period . Selects a field or method from an object; separates package

names from sub-package and class names

: Used after loop labels

Page 33: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

14. Explain for loop with an example. A) for loop: The execution of for loop is as follows

a) Initialization of the control variables is done first.

b) The value of the control variable is tested using the test condition. If the test condition

is true the body of the loop will be executed otherwise loop will be terminated.

c) When the body of the loop is executed, the control is transferred back to the for

statement and it will be updated.

Syntax: for(exp1;exp2;exp3)

{

Body of the loop

}

exp1 : Initialization Expression.

exp2 : Condition or Control Expression.

exp3 : Update Expression.

Ex: //To find the sum of n natural numbers

import java.util.Scanner;

class Sumnnos{

public static void main(String args[]){

int i,s=0,n;

System.out.println("Enter an integer:");

Scanner in=new Scanner(System.in);

n=in.nextInt();

for(i=1;i<=n;i++){

s+=i;

}

System.out.println("sum of "+n+"natural numbers is "+s);

}}

Output:

Enter an integer: 5

sum of 5 natural numbers is 15

15. Write a Java program to find factorial of a given number. A) ) // program to find the factorial by using while loop

import java.util.Scanner;

class Factoria{

public static void main(String args[]){

int i,f=1,n;

System.out.println("Enter an Integer:");

Scanner in = new Scanner(System.in);

n = in.nextInt();

i = 1;

while(i<=n){

f*=i;

++i;

Page 34: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

}

System.out.println("Factorial of"+n+"is" +f);

}}

Output:

Enter an Integer: 8

Factorial of 8 is 40320

16. Explain the overloading with an example. A) Overloading: Overloading means creating more than a single method with same

name with different signatures.

Java identifies the methods with by comparing their signatures like return types,

constructor parameters & access modifiers used.

Ex: class Overload {

void test(int a){

System.out.println("a:"+a); }

void test(int a, int b){

System.out.println("a and b:"+a+","+b);}

double test(double a){

System.out.println("double a" +a);

return a*a; }}

class MethodOverloading{

public static void main(String args[ ]){

Overload overload=new Overload();

double result;

overload.test(10);

overload.test(20,30);

result=overload.test(2.5);

System.out.println("Result:"+result);

}}

Output: a: 10

a and b: 20,30

double a: 2.5

Result: 6.25

17. Write the benefits or advantages of packages and Interfaces .

A) Benefits of packages (or) Benefits by organizing classes into Packages: 1. Provides reusability of the class by the other programs existing in the same

package.

2. In packages, classes can be unique compared with classes in other packages.

3. Packages provide a way to “hide” classes thus preventing other programs or

packages from accessing classes that are meant for internal use only.

Page 35: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

4. Packages offers a way of separation between “Design” and “Coding” by

designing classes and decide their relationships first and implementing the java

code needed for the methods next.

Benefits or Advantages of Interfaces: 1. The legal implementations for a class are defined in the interface.

2. Java provides an alternate approach for multiple inheritance known as Interfaces

to support the multiple inheritance.

3. A java class cannot be subclass of more than one super class but it can implement

more than one interface.

18. Write about the basic methods of Java Applet Class . A) Basic methods of Applet (or) Life Cycle of an applet: Four methods give us the

framework on which we build an applet.

1. init ( ) : This method is intended for whatever initialization is needed for our

applet. It is called after the param tags inside the applet tag have been processed.

2. start ( ) : This method is automatically called after the browser calls the init

method. It is also called whenever the user returns to the page containing the

applet after having gone off to other pages.

3. stop ( ): This method is automatically called when the user moves off the page on

which the applet sits. It can, therefore, be called repeatedly in the same applet.

4. destroy ( ) : This method is only called when the browser shuts down normally

5. paint ( ) : Invoked immediately after the start() method and also any time the

applet needs to repaint itself in the browser. The paint() method is actually

inherited from the java awt.

Page 36: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

9228

RELATIONAL DATA BASE MANAGEMENT SYSTEMS

Paper II

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. What is a database ? A) Database: A database is a collection of logically related information that is organized

in a systematic manner so that it can easily be accessed, managed, and updated.

2. What is entity and entity set ? A) Entity: An Entity is an “object” that exists and is distinguishable from other objects.

For example, Student of a college having some specific properties.

Entity Set: The Entity Set is a set of entities of the same type, that share the same

properties or Attributes. The set of all students in a class., can be defined as the entity-

set.

3. What is a tuple ? A) Tuple: Tuple is a row of a table or a Record of a table.

4. What is primary key ? A) Primary key: The column value which uniquely identifies the record in the table will

be defined as primary key.

5. What are the commercial query languages ? A) Commercial query languages: Commercial Query Languages are needed for the

commercial database systems. These languages are more user-friendly. Some of the

commercial Query languages are SQL , QBE ,Quel etc.,

6. Write any two DDL commands . A) DDL Commands: insert, select, delete and update.

7. What are the set operators in SQL ? A) Set operators: Union , Union all , Intersect , Minus

8. What is a database trigger ? A) Database Trigger: A database trigger is a stored procedure that will be executed

when an event is occurred i.e., insert, update, delete statement is issued against the

associated table.

9. Who will be called as system analyst ?

Page 37: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

A) System analyst: A person who analyses a system by the use of scientific techniques

in order to determine where and how the improvements can be made with a view to meet

objectives in a more efficient and economical manner is called System Analyst.

10. What is data dictionary ?

A) Data Dictionary: Data Dictionary is a repository that contains descriptions of all data

objects produced by the software.

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. What are the advantages of DBMS over file processing system ?

A) Advantages of DBMS over File Processing system are

1) Provides for mass storage of relevant data.

2) Make easy access of the data to user.

3) Allows for the modification of data in a consistent manner.

4) Allows multiple users to be active at a time

5) Eliminate or reduce the redundant data.

6) Provide prompt response to the users request for data.

7) Supports Backup and recovery of data.

8) Protect data from physical hardware failure and unauthorized access.

9) Constraints can be set to database to maintain data integrity.

12. What are the functions of DBA ?

A) 1. Schema definition

2. Storage structure and Access method definition

3. Schema physical organization and modification

4. Granting of authorization for data access

5. Routine maintenance

1. Schema Definition: The DBA creates the original database schema by executing a set

of definition statements in the DDL.

2. Storage structure and Access method definition: DBA will decide the actual storage

structure and different access methodologies for the database.

3. Schema physical organization and modification: The DBA carries out the changes

to the schema and physical organization to reflect the changing needs of the organization

or to alter the physical organization to improve the performance.

4. Granting of authorization for data access: By granting different types of

authorization, the database administrator can regulate which of the database various can

access.

5. Routine maintenance: DBA is the final authority to regulate daily activities.

Page 38: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

13. Explain mapping constraints with a neat diagram . A) There are 4 types of mapping constraints.

1. ONE – to – ONE relationship

2. MANY – to – ONE relationship

3. ONE – to – MANY relationship

4. MANY – to – MANY relationship

1. ONE – to – ONE relationship: An entity in A is associated with at most one entity

in B , An entity in B is also associated with at most one entity in A.

Example : Relationship between the entities principal and college. i.e., Principals can

lead a single college and a principal can have only one college.

2. Many – to – One relationship: An entity set in A is associated with at most one

entity in B, An entity in B however can be associated with any number of entities in A.

Example: Relationship between the entities Districts and state .i.e. many districts belong

to a single state but many states cannot belong to single district.

3. ONE – to - MANY relationship: An entity set A is associated with any number of

entities in B. An entity in B, however can be associated with at most one entity in A.

Page 39: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Example: Relationship between the entities class and student i.e., a class can have many

students but a student cannot be in more than one class at a time.

4. MANY – to – MANY relationship: An entity set A is associated with any number of

entities in B and an entity set in B is associated with any number of entities in A.

Example: Relationship between the Entities College and course .i.e. a college can have

many courses and course can be offered by many colleges.

14. Explain about Relational Data Model .

A) Relational Database : One of the major advantages of using a relational database is

its structural flexibility. It allows the users to retrieve the data in any combination

A relation is a two-dimensional array, consisting of horizontal rows and vertical

columns. Each row, column ie a cell contains a unique value and no two rows are

identical with respect to one another.

Relations are commonly referred as tables.. Every column in a database table acts

as attribute since the meaning of the column is same for every row of the database .A row

consists of a set of fields and hence commonly referred as a record.

Properties of Relational Database: The important properties of a relational

database are listed below:

1. A relational database is a collection of relations.

2. The database tables have a row column format.

3. Operators are available either to join or separate columns of the database table.

4. Relations are formed with respect to data only.

5. The tables can be accessed by using simple non-procedural statements.

6. The data is fully independent, that is it will be the same irrespective of the

access path used.

Structure of Relational Database:

Relational database systems are the most common DBMS today. These relational

DBMSs organize data into separate structures called tables, which can be linked via

common information to make data storage more efficient. A relational DBMS has the

following basic components:

Page 40: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

· fields - a separate piece of information which describe the data item.

· records – collection of fields.

· tables – collection of records.

· database - the collection of tables i.e the complete information.

A relational database consists of a collection of tables, each of which is assigned a

unique name. A row in a table represents a relationship among a set of values.

Consider the EMPLOYEE table as under.

EMPNO EMPNAME DESIGN SALARY

101 CHANUKYA ENGINEER 50000

102 KAVYA DOCTOR 40000

103 RATNAM LECTURER 35000

15. Write any six Codd rules in Relational Model .

A) CODD rules

Edgar F. Codd, proposed thirteen rules (numbered zero to twelve) and said that if

a Database Management System meets these rules, it can be called as a Relational

Database Management System. These rules are called as Codd’s12 rules. Hardly any

commercial product follows all.

0. Single Foundation Rule A RDBMS must manage its stored data using only its relational capabilities.

1. Information Rule

All information in the database should be represented in one and only one way -

as values in a table.

2. Guaranteed Access Rule Each and every datum (atomic value) is guaranteed to be logically accessible by

resorting to a combination of table name, primary key value and column name.

3. Systematic Treatment of Null Values Null values (distinct from empty character string or a string of blank characters

and distinct from zero or any other number) are supported in the fully relational

DBMS for representing missing information in a systematic way, independent of

data type.

4. Dynamic On-line Catalog Based on the Relational Model The database description is represented at the logical level in the same way as

ordinary data, so authorized users can apply the same relational language to its

interrogation as they apply to regular data.

5. Comprehensive Data Sublanguage Rule A relational system may support several languages and various modes of terminal

use. However, there must be at least one language whose statements are

expressible, per some well-defined syntax, as character strings and whose ability

to support all of the following is comprehensible:

Page 41: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

a. data definition

b. view definition

c. data manipulation (interactive and by program)

d. integrity constraints

e. authorization

f. transaction boundaries (begin, commit, and rollback).

6. View Updating Rule All views that are theoretically updateable are also updateable by the system.

7. High-level INSERT, UPDATE, and DELETE The capability of handling a base relation or a derived relation as a single operand

applies nor only to the retrieval of data but also to the insertion, update, and

deletion of data.

8. Physical Data Independence Application programs and terminal activities remain logically unimpaired

whenever any changes are made in either storage representation or access

methods.

9. Logical Data Independence Application programs and terminal activities remain logically unimpaired when

information preserving changes of any kind that theoretically permit

unimpairment are made to the base tables.

10. Integrity Independence Integrity constraints specific to a particular relational database must be definable

in the relational data sublanguage and storable in the catalog, not in the

application programs.

11. Distribution Independence The data manipulation sublanguage of a relational DBMS must enable application

programs and terminal activities to remain logically unimpaired whether and

whenever data are physically centralized or distributed.

12. Non - subversion Rule If a relational system has or supports a low-level (single-record-at-a-time)

language, that low-level language cannot be used to subvert or bypass the

integrity rules or constraints expressed in the higher-level (multiple-records-at-a-

time) relational language.

16. Explain any three DML commands with examples .

A) insert: The INSERT INTO Statement is used to add new rows of data to a table in

the database.

Syntax:

Insert into <table name> values (value1 , value2 , value3 , ..valueN);

Example: Following statements would create three records in student table:

insert into student values(101 , ‘chanukya’);

insert into student values(102 , ‘kavya’);

insert into student values(101 , ‘satish’);

Page 42: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

2.select: SELECT statement is used to fetch the data from a database table which

returns data in the form of result table. These result tables are called result-sets.

Syntax:

Select column1 , column2 , column from <table name>;

Here, column1, column2...are the fields of a table whose values you want

to fetch. If you want to fetch all the fields available in the field, then you can use

the following syntax:

Select * from <table_name>

Example1: select * from student;

Then the output will be

Stno stname

------- ---------

101 chanukya

102 kavya

103 satish

Example2: select stname from student;

Stname

---------

chanukya

kavya

satish

Example3: select * from student where stno >=102 ;

Then the output will be

Stno stname

------- ---------

102 kavya

103 satish

3.update: The UPDATE command is used to modify the existing records in a table.

You can use WHERE clause with UPDATE query to update selected rows

otherwise all the rows would be affected.

Syntax:

UPDATE < table name > SET column1 = value1, column2 = value2...., columnN =

valueN WHERE [condition];

Example:

Consider the student table having the following records:

Sql>select * from student;

Stno stname

------- ---------

101 chanukya

102 kavya

103 satish

sql> update student set stname = ‘ratnam’ where stno = 101;

Sql>select * from student;

Page 43: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

then the output will be as follows

Stno stname

------- ---------

101 ratnam

102 kavya

103 satish

4.delete: DELETE command is used to delete the existing records from a table.

You can use WHERE clause with DELETE query to delete selected rows,

otherwise all the records would be deleted.

Syntax:

Delete from <table name> where [condition] ;

Example:

Sql>select * from student;

then the output will be as follows

Stno stname

------- ---------

101 ratnam

102 kavya

103 satish

Sql>delete from student where stno = 101;

Sql> select * from student;

The output will be as follows

Stno stname

------- ---------

102 kavya

103 satish

17. Explain the control structures in PL – SQL .

A) PL/SQL can process the data using flow of control statements. The flow of control

can be classified into three categories

Conditional Controls

Iterative Controls

Sequential Controls

Conditional Controls: Conditional Statements are three types, those are

A. if statements

B. if then else statements

C. if then else if statements.

A) if statement: Sequence of statements can be executed based on some condition

using the if statement.

Syntax: if <condition> then

Statements;

end if;

B) if then else : Sequence of statements can be executed based on some condition

using the if statement. An else clause in the ‘if then else’ statement defines what is to

be done if the condition is false or null.

Page 44: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Syntax: if <condition> then

Statements;

else

Statement;

end if;

Iterative Controls: These statements are used to execute a particular statement for

repeated number of times.

A. Simple Loop

B. for Loop

C. while Loop

A) Simple Loop: Simple “loop” should be placed before the first statement in the

sequence and the keyword “end loop” after the last statement.

Syntax: loop

Statements;

end loop;

B) for Loop: The “for” loop will be executed for repeated number of times by

automatically declaring loop variable and also loop variable is always incremented by 1.

Syntax: for <variable> in [reverse] start …… end (star=lower bound, end= upper

bound)

loop

Statements;

end loop;

C) while Loop: In while loop the keyword “loop” has to be placed before the first

statement in the sequence statements to be repeated, while the keyword “end loop” will

be placed immediately after the last statement.

Syntax: while<condition>

loop

Statements;

end loop;

Sequential Controls: GOTO: GOTO statement change of the flow of control within PL/SQL block.

Syntax: GOTO<code_block_name>;

18. Explain different stages of software development life cycle in detail .

A. System Development Life Cycle :

The stages involved during System Development Life Cycle are ::

1. Recognition of need

2. Feasibility study

3. Analysis

4. Design

5. Implementation

6. Post implementation and maintenance

Page 45: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

1. Recognition of need: This gives a clearer picture of what actually the existing

system is. The preliminary investigation must define the scope of the project and

the perceived problems, opportunities and directives that triggered the project.

2. Feasibility Study: The goal of feasibility study is to evaluate alternative system

and to purpose the most feasible and desirable system for development. In the

process of feasibility study, the cost and benefits are estimated with greater

accuracy. If cost and benefit can be quantified, they are tangible ; if not , they are

called intangible.

3. System Analysis: System analysis is an in-depth study of end user information

needs that produces functional requirements that are used as the basis for the

design of a new information system.

4. System Design: System design can be viewed as the design of user interface,

data, process and

system specification .

5. System Implementation: Implementation is the stage where theory is converted

into practical. The implementation is a vital step in ensuring the success of new

systems. Even a well designed system can fail if it is not properly implemented.

6. Post Implementation and Maintenance: Once a system is fully implemented

and being operated

by end user, the maintenance function begins. Systems maintenance is the

monitoring, evaluating and modifying of operational information system to make

desirable or necessary improvements.

(OR)

1. Preliminary Investigation or Requirement Analysis.

2. Determination of information System

3. Design

4.Development of information system.

5. Testing

6. Implementation and Maintenance

1. Preliminary Investigation or Requirement Analysis: Before developing any system

investigation can be considered the project request must be examined to know what the

client needs. The important aspect of the preliminary investigation is the request for

information system feasibility.

2. Determination of information System: Developing information stem is a detailed

understanding of all important facts of the business needs. Analyst working with

employees and managers must study the business process to answer the following

questions.

a) What is being done.

b) How is it being done.

c) What type of transactions (or) decisions take place.

d) Does problem exist

e) If a problem exist, what is the effect.

Page 46: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

f) If a problem exist what is the reason.

3. Design: The most challenging phase of the SDLC is system design. The term design

describes a final system and the process by which it is developed. It refers to the

technical specifications often called logical design called physical design.

4.Development of information system: The system development is based on design

specification. The software developers may install software (or) they write new custom

design programs known as physical design.

5. Testing: The system testing checks the readiness, and accuracy of the system to

access, update and retrieve data from new files.

6. Implementation and Maintenance: It concerned with user training, site preparations

and file conversion. This method lastly but provides assurance against errors in the

candidate system.

Page 47: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

9229

DATA COMMUNICATION AND COMPUTER NETWORKS

Paper II

(English Version)

Time: 3 Hours Max. Marks : 50

SECTION A 10 X 2 = 20

Note: ( i ) Answer ALL questions.

( ii ) Each question carries TWO marks.

1. What is Data Communication ? A) Data Communication : Data communication is the transmission of electronic data

over some media. The media may be cables, microwaves or fiber optics.

Types of data communications are

Point to point communication

Point to multipoint communication

2. What is Computer Network ? A) Computer Network: A computer network is a group of computer systems and other

hardware devices that are linked together through communication channels to facilitate

communication and resource-sharing among a wide range of users.

3. Expand BBN, GAN . A) BBN: Back Bone Networks

GAN: Global Area Networks

4. What are gateways ? A) Gateways: A gateway is a network element that acts as an entrance point to another

network. For example an access gateway is a gateway between telephony network and

other network such as internet. LANs may have component called gateways, which

assists in transferring from one LAN to another LAN.

5. Write any four uses of E – mail . A) Uses of E-Mail are

1. Fast - Messages can be sent anywhere around the world in an instant .

2. Inexpensive - Transmission usually costs nothing, or at the most, very little .

3. Simple - Easy to use, after initial setup.

4. Efficient - Sending to a group can be done in one step .

5. Versatile - Pictures, power-points or other files can be sent too.

6. Printable – The hand copy is easy to obtain. We can correspond and save e-mail

message and also we get electronic copy of message.

6. What is Trojan ?

Page 48: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

A) Trojan : A Trojan is a malicious application that tricks as a authentic file or helpful

program but whose real purpose is, for example, to grant a hacker unauthorized access to

a computer. Trojan horses may steal information, or harm their host computer systems.

7. Define HTML .

A) HTML stands for Hyper Text Markup Language and it is used to create web pages.

8. What is Frame ?

A) Frame : Frame is used to broken the browser window into multiple regions.

9. Define event Handling . A) Event Handling : An event handler allows you to execute code when an event occurs

10. Define Dom . A) DOM: DOM is "a platform- and language-neutral interface that will allow programs

and scripts to dynamically access and update the content, structure, and style of

documents. The document can be further processed and the results of that processing can

be incorporated back into the presented stage."

SECTION – B 5 X 6 = 30

Note: ( i ) Answer ANY FIVE questions.

( ii ) Each question carries SIX marks.

11. Explain about various communication channels .

A)

The communication channels are

-Coaxial cable

-Twisted pair

-Microwaves

-Fiber optics

1.Coaxial cable: These cables consist of an inner copper wire of varying thickness

surrounded by insulation and other shielding. Their stiffness caused network

administrators difficulty in installing and maintaining thin net and thick net.

A type of wire that consists of a center wire surrounded by insulation and then a

grounded shield of braided wire. The shield minimizes electrical and radio frequency

interference.

Page 49: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Coaxial cabling is the primary type of cabling used by the cable television

industry and is also widely used for computer networks, such as Ethernet. Although more

expensive than standard telephone wire, it is much less susceptible to interference and

can carry much more data.

2.Twisted pair: A Twisted pair consists of two insulated copper wires typically about 1

mm thick. The wires are twisted together in a helical form. The purpose of twisting the

wires is to reduce electrical interference from similar pairs close by. The following figure

illustrates the twisted pair (two parallel wires constitute a simple antenna; a twisted pair

does not).

Twisted pair is the ordinary copper wire that connects home and many business

computers to the telephone company.

3.Microwaves: Microwave communication is a method of transmitting information or

energy by the use of radio waves whose wavelengths are conveniently measured in small

numbers of centimeter; these are called microwaves. This part of the radio spectrum

ranges across frequencies of roughly 1.0 gigahertz (GHz) to 30 GHz.

Microwave radio transmission is commonly used in point-to-point communication

systems on the surface of the Earth, in satellite communications, and in deep space radio

communications. Other parts of the microwave radio band are used for radars, radio

navigation systems, sensor systems, and radio astronomy.

Page 50: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

4.Optical fiber:

An optical fiber is a flexible, transparent fiber made of high quality extruded

glass (silica) or plastic, slightly thicker than a human hair. It can function as a waveguide,

or “light pipe”, to transmit light between the two ends of the fiber.

An Optical fiber cable has a cylindrical shape and consists of three concentric

sections; the core, the cladding and the jacket. The core is the innermost section and

consists of fiber made of glass or plastic. The core has diameter in the range 8-100

micrometers. Each fiber is surrounded by its own cladding, which is a glass or plastic

coating that has optical properties different from those of core. The interface between the

core and the cladding acts as a reflector to confine light that would otherwise escape the

core. The jacket is composed of plastic and other material layered to protect against

moisture, abrasion, crushing and other environmental damage.

Optical fibers are widely used in communications, which permits transmission over

longer distances and at higher bandwidths (data rates) than other forms of

Communication.

Most telephone company long-distance lines are now made of optical fiber.

12. Explain different types of Computer Networks .

Page 51: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

A) Different types of computer networks

• Depending upon the geographical area covered by a network, it is classified as:

– Local Area Network (LAN)

– Metropolitan Area Network (MAN)

– Wide Area Network (WAN)

– Personal Area Network (PAN)

LAN(Local Area Network):

A LAN is a network that is used for communicating among computer devices, usually

within an office building or home.

Is limited in size, typically spanning a few hundred meters, and no more than a mile

• Is fast, with speeds from 10 Mbps to 10 Gbps

• Requires little wiring, typically a single cable connecting to each device

• Has lower cost compared to MAN’s or WAN’s

MAN(Metropolitan Area Network):

• A MAN is a large computer network that usually spans a city or a large campus.

• A MAN is optimized for a larger geographical area than a LAN, ranging from several

blocks of

buildings to entire cities.

• A MAN might be owned and operated by a single organization, but it usually will be

used

by many individuals and organizations.

• A MAN often acts as a high speed network to allow sharing of regional resources.

• A MAN typically covers an area of between 5 and 50 km diameter.

• Examples of MAN: Telephone company network that provides a high speed DSL to

customers and cable TV network.

WAN( Wide Area Network):

• WAN covers a large geographic area such as country, continent or even whole of the

world.

• A WAN is two or more LANs connected together. To cover great distances, WANs

may transmit

data over leased high-speed phone lines or wireless links such as satellites.

• Multiple LANs can be connected together using devices such as bridges, routers, or

gateways, which enable them to share data.

• The world's most popular WAN is the Internet.

PAN(Personal Area Network):

• A PAN is a network that is used for communicating among computers and computer

devices (including telephones) in close proximity of around a few meters within a room

• It can be used for communicating between the devices themselves, or for connecting to

a larger

network such as the internet.

Page 52: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

• PAN’s can be wired or wireless

• A personal area network (PAN) is a computer network used for communication among

computer devices, including telephones and personal digital assistants, in proximity to an

individual's body.

• The devices may or may not belong to the person in question. The reach of a PAN is

typically a few meters.

13. Explain any three Network Topologies .

A)

Diagram Kind of

Topology Description, Advantages, and Disadvantages

Ring

Description:

Devices are connected from one to another to form a

ring shape.

Each host is connected to the next and the last node

is connected to the first.

A data token1 is used to grant permission for each

computer to communicate.

Advantages:

Easy to install and wire.

Because every computer is given equal access to the

token, no one computer can monopolize the

network.

Disadvantages:

Requires more cable than a bus topology.

If one computer fails it can affect the whole

network.

It is difficult to identify the problem if the entire

network shuts down.

Bus

Description:

All hosts are connected to the backbone cable in a

linear2 fashion.

Advantages:

Easy to connect a computer or peripheral.

Requires less cable length than a star topology.

Page 53: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Disadvantages:

If there is a break in the backbone cable, the entire

network shuts down.

Both ends of the backbone cable require terminators.

It is difficult to identify the problem if the entire

network shuts down.

Star

Description:

All hosts are connected to a single point of

concentration.

Usually uses a hub3 or switch4 as a center node.

Range limits are about 100 meters from the hub

Data on a star network passes through the hub or

concentrator before continuing to its destination.

Advantages:

It is easy to modify and add new computers to a star

network without disturbing the rest of the network.

If one node or workstation (beside the middle node)

goes down, the rest of the network will still be

functional.

The center of a star network is a good place to figure

out where the network faults are located.

You can use several cable types in the same network

if the hub you have can handle multiple cable types.

Disadvantages:

Requires more cable than a bus topology.

If the middle node goes down , then the entire

network goes down.

It is more expensive than because all cables must be

connected to one central point.

Tree

Description: One "root" node connects to other nodes,

which in turn connect to other nodes, forming a tree

structure. Information from the root node may have to pass

through other nodes to reach the end nodes.

Advantages:

• Point-to-point wiring for individual segments.

• Supported by several hardware and software vendors.

Page 54: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

• All the computers have access to the larger and their

immediate

networks.

Disadvantages:

• Overall length of each segment is limited by the type of

cabling used.

• If the backbone line breaks, the entire segment goes down.

• More difficult to configure and wire than other topologies.

Mesh

Description:

Each host is connected to all the other hosts.

Advantages:

Increased reliability since there are multiple paths

for each node to take.

Increased speed since shortcuts have been created by

add more cables/links.

Disadvantages:

The cost of cabling all the hosts together is

expensive and time consuming.

14. Explain briefly about any three LAN components .

A) 1. Server: A server is a computer in a network that shared by multiple users. There

are many kinds of servers in dedicated server networks. For example, file servers, printer

servers, and communication servers etc.,

2.Client : In a computer network, the client computer is the requesting machine from the

supplying machine, server.

3. NIC: The Network Interface Card (NIC) is a printed circuit board that plugs into a

network server and client computers. It enables the computer to be physically connected

to the network cable, which provides the physical layer connection among the computers

in the network.

15. Explain any three Web Browsers .

A) Web Browsers:

1. Internet Explorer

It was developed by Microsoft in 1994 and released in 1995 as a supportive package to

Page 55: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Microsoft Windows line of operating systems. According to statistics, its usage share

from 1999 to 2003-04 was around 95%. Microsoft occasionally releases updates for the

previous versions of IE, which have some enhanced capabilities. IE has come up a

preview release of Internet Explorer 11.

Features: There are regular Microsoft updates that IE supports. Favicon allows an image

to be used as a bookmark. It supports Integrated Windows Authentication. It’s icon is as

follows.

2. Mozilla Firefox

It is owned by Mozilla Corporation and was the result of an experimentation. 'Mozilla

Firefox' was officially announced in February 2004. It was earlier named Phoenix,

Firebird, and eventually Firefox. It is the second-most famous browser after Internet

Explorer, as there were around 100 million downloads within a year of its release. Until

November 2008, 700 million downloads were recorded.

Features: As it is an open source software, it allows everyone to access the code. It

supports tabbed browsing that allows the user to open multiple sites in a single window.

Session storage is also an important feature of Firefox, which allows the user to regain

access to the open tabs after he has closed the browser window. It’s icon is as follows.

3. Google Chrome

This web browser was developed by Google. Its beta and commercial versions were

released in September 2008 for Microsoft Windows.

Page 56: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

Features: The main standout feature is the malware and phishing warning that the

browser suggests when the user wants to browse a site. Also, there is a user tracking

option available withChrome. It’s icon is as follows.

16. Write the structure of an HTML Program .

A) Structure of an HTML Program.

In every HTML program has a rigid structure. The entire web page is enclosed within

<HTML> </HTML> tags. Within these tags two separate sections are created using the

<HEAD> </HEAD> tags and the <BODY> </BODY> tags. These sections are described

below.

1. < Head> tag

Information placed in this section is essential to the inner workings of the document and

has nothing to do with the content of the document. With the exception of information

contained within the <TITLE> </TITLE> tags, all information placed within the

<HEAD> </HEAD> tags is not displayed in the browser. The HTML tags used to

indicate the start and end of the head section are:

<HEAD>

<TITLE> </TITLE>

</HEAD>

The <TITLE> tag sets the title of the document which will be displayed in the title bar of

the browser window.

2. < Body> tag

The tags used to indicate the start and end of the main body of textual information are:

<BODY>

</BODY>

Page defaults like background color, text color, font size, font weight and so on can be

specified as attributes of the <BODY> tag. The attributes that the <BODY> tag takes are:

bgcolor, background, text, etc.,

Example

<html>

<head>

<title>

First Page

</title>

</head>

Page 57: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

<body>

This is My First Web Page

</body>

</html>

17. Define a list Explain various types of lists used in HTML .

A)

LISTS:

Lists are used to list out items, subjects or menu in the form of a list. HTML gives you

three different types of lists.

<ul> - An unordered list. This will list items using bullets

<ol> - A ordered list. This will use different schemes of numbers to list your items

<dl> - A definition list. This is arrange your items in the same way as they are

arranged in a dictionary.

HTML Unordered Lists:

This list is created by using <ul> tag. Each item in the list is marked with a bullet. The

bullet itself comes in three styles: squares, discs, and circles. The default bullet displayed

by most web browsers is the traditional full disc.

Example:

Page 58: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

This will produce following result:

You can use type attribute to specify the type of bullet you like. By default its is a disc.

Following are the possible way:

2.HTML Ordered Lists:

This list is created by using <ol> tag. Each item in the list is marked with a number. By

default The numbering starts from one and is incremented by one.

example:

Page 59: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

This will produce following result:

You can use type attribute to specify the type of numbers you like. By default its is a

generic numbers. Following are the other possible way:

3.HTML Definition Lists:

Definition List makes use of following three tags.

<dl> - Defines the start of the list

<dt> - A term

<dd> - Term definition

</dl> - Defines the end of the list

Example:

Page 60: Prepared by VRKS SASTRY TANIKELLA MARCH 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/MARCH 2016 cse... · Prepared by VRKS SASTRY TANIKELLA MARCH 2016 ... Prepared by VRKS

Prepared by VRKS SASTRY TANIKELLA MARCH 2016

CJL in CSE, GJC, KOTHAPETA, E.G.Dt.

This will produce following result:

18. Write the differences between HTML and DHTML .

A)

Differences between HTML and DHTML HTML

1. HTML means Hyper Text Markup Language.

2. It is referred as a static HTML and static in nature.

3. A plain page without any styles and Scripts called as HTML.

DHTML

1. DHTML means Dynamic Hyper Text Markup Language.

2. It is referred as a dynamic HTML and dynamic in nature.

3. A page with HTML, CSS, DOM and Scripts called as DHTML.