Download as pdf or txt
Download as pdf or txt
You are on page 1of 10

4TPDC101

1.Bus

2.seven

3.Medium

4.Bus

5.CPU

6.random access memory

7.none of the above

8.Operationg system

9.all of the above

10.Attenuation

2.Software is a generic term used to refer to applications, scripts and programs that run on a device.
It can be thought as the variable part of a computer, while hardware is the invariable part. The two
main categories of software are application software and system software.

3.Advantages of computer networking

Resource sharing - using network-connected peripheral devices like printers, scanners and copiers,
or sharing software between multiple users, saves money. Sharing a single internet connection - it is
cost-efficient and can help protect your systems if you properly secure the network.

4.Word Processing refers to the act of using a computer to create, edit, save and print documents. In
order to perform word processing, specialized software (known as a Word Processor) is needed. One
example of a Word Processor is Microsoft Word, but other word processing applications are also
widely used.

5.In simplex mode, the signal is sent in one direction. In half duplex mode, the signal is sent in both
directions, but one at a time. In full duplex mode, the signal is sent in both directions at the same
time. In simplex mode, only one device can transmit the signal.

6.System software is a type of computer program that is designed to run a computer's hardware and
application programs. If we think of the computer system as a layered model, the system software is
the interface between the hardware and user applications. The operating system is the best-known
example of system software.
7. P2P The network consists of a direct link between two computers

Bus Uses a single cable which connects all the included nodes

Ring Every device has exactly two neighboring devices for communication purpose

Star All the computers connect with the help of a hub.

8.Excel uses a large collection of cells formatted to organize and manipulate data and solve
mathematical functions. Users can arrange data in the spreadsheet using graphing tools, pivot tables
and formulas. The spreadsheet application also has a macro programming language called Visual
Basic for Applications.

9.LAN means local area network. WAN means wide area network. LANs connect users and
applications in close geographical proximity (same building). WANs connect users and applications in
geographically dispersed locations (across the globe).

10.The client-server architecture refers to a system that hosts, delivers, and manages most of the
resources and services that the client requests. In this model, all requests and services are delivered
over a network, and it is also referred to as the networking computing model or client server
network.

4TPDC102

1. Windows 3.1
2. Left
3. windows 2000
4. To enhance the overall appearance of the document
5. Find and Replace
6. Find and Replace
7. Text group
8. displayed value
9. Shift + Up Arrow Key
10. All of The Above

2. Rows are a group of cells arranged horizontally to provide uniformity. Columns are a group of
cells aligned vertically, and they run from top to bottom.

3. Control Panel is a component of Microsoft Windows that provides the ability to view and change
system settings. It consists of a set of applets that include adding or
removing hardware and software, controlling user accounts, changing accessibility options, and
accessing networking settings.
4. Returns the average (arithmetic mean) of the arguments. For example, if the range A1:A20
contains numbers, the formula =AVERAGE(A1:A20) returns the average of those numbers.

For example, you can enter the following formula to count the numbers in the range
A1:A20: =COUNT(A1:A20). In this example, if five of the cells in the range contain numbers, the
result is 5.

The max() function returns the item with the highest value, or the item with the highest value in an
iterable.

The SUM function adds values. You can add individual values, cell references or ranges or a mix of all
three. For example: =SUM(A2:A10) Adds the values in cells A2:10.

f(-x) = (-x)2 = x2 for all values of x, as the square of a negative number is the same as the square of
the positive value of the number. This implies f(-x) = f(x), for all x. Hence, f(x) = x2 is an even
function. Similarly, functions like x4, x6, x8, etc.

5. Select Insert > Pictures > This Device for a picture on your PC. Select Insert > Pictures > Stock
Images for high quality images or backgrounds. Select Insert > Pictures > Online Pictures for a picture
on the web

Select the text or graphic that has the formatting that you want to copy.
On the Home tab, select. Format Painter in the Clipboard group.
The cursor changes to a. paintbrush icon.
Use the brush to paint over a selection of text or graphics to apply the formatting. ...
To stop formatting, press ESC.
6. Windows XP is an operating system that lets you use different types of applications or software.
For example, it allows you to use a word processing application to write a letter and a spreadsheet
application to track your financial information. Windows XP is a graphical user interface (GUI).
7. Windows operating system ships with some handy applications known as Windows
accessories. Calculator, Notepad, Paint, Explorer, WordPad are some of the most frequently used
accessories. Apart from above mentioned applications, Windows has a few tools for Ease of Access
and some System Tools.
8. Microsoft Office is a suite of desktop productivity applications that includes Microsoft Word,
Excel, PowerPoint, Outlook, and other programs. The first version of Microsoft Office was released in
1989, and since then it has become the most widely used office software around the world.
9. To create a hyperlink, click Insert > Link. In the Display text box, type the text that people will click
on. To link to a web address, type or paste the address in the Address box. Tip: If you don't need
display text that's friendlier to read than the web address, just type the web address.
10. Microsoft Excel enables users to format, organize and calculate data in a spreadsheet. By
organizing data using software like Excel, data analysts and other users can make information easier
to view as data is added or changed. Excel contains a large number of boxes called cells that are
ordered in rows and columns.

4TPDC103
1. All of the above
2. int array [5];
3. Private
4. &
5. //Comment
6. \n
7. Single-dimensional
8. Bool
9. Void
10. -30

2. Object-Oriented Programming is a type of programming approach that uses the concepts of


objects and classes. A program written within the Object-Oriented Programming approach will have
reusable blocks of codes termed classes. These classes are further used for creating instances of the
objects.

3. Object is an instance of a class. Class is a blueprint or template from which objects are created.
Object is a real world entity such as pen, laptop, mobile, bed, keyboard, mouse, chair etc. Class is a
group of similar objects

4. void swap(int *a, int *b, int c) {


if (--c)
swap(b, a, c);
else {
c = *a;
*a = *b;
*b = c;
}
5. A C++ program is written using these tokens, white spaces, and the syntax of the language. - Most
of the C++ tokens are basically similar to the C tokens with the exception of some additions and
minor modifications. - There are 48 keywords in C++. (There are 32 keywords in C language)
6. Basics of C++C ++ is an object oriented programming language, C ++ was developed by Jarney
Stroustrup at AT & T Bell lab, USA in early eighties. C ++ was developed from c and simula 67
language. C ++ was early called 'C with classes'.
7. A single-dimensional array is a linear structure of elements in C, where each element stores data
of the same data type and can be accessed using an index. For example, int numbers[5] = {1, 2, 3, 4,
5}; declares an integer array named 'numbers' with a size of 5 elements, containing the values 1 to 5.
8. Constructors in C++ are the member functions that get invoked when an object of a class is
created. There are mainly three types of constructors in C++, Default, Parameterized and Copy
constructors

Sample(Sample &t)
{
id=t.id;
}
9. What Is an Inheritance? Inheritance refers to the assets that an individual bequeaths to their
loved ones after they pass away. An inheritance may contain cash, investments such as stocks or
bonds, and other assets such as jewelry, automobiles, art, antiques, and real estate
Example:
#include <iostream>
using namespace std;

// base class
class Animal {

public:
void eat() {
cout << "I can eat!" << endl;
}

void sleep() {
cout << "I can sleep!" << endl;
}
};

// derived class
class Dog : public Animal {

public:
void bark() {
cout << "I can bark! Woof woof!!" << endl;
}
};

int main() {
// Create object of the Dog class
Dog dog1;

// Calling members of the base class


dog1.eat();
dog1.sleep();

// Calling member of the derived class


dog1.bark();

return 0;
}

Difference: Constructors are responsible for initializing the class and allocating memory to an
object. Destructors, conversely, are used to deallocate memory and destroy objects when
they are no longer needed. 2. A constructor is automatically invoked when an object is
created.
10.Polymorphism is defined as the process of using a function or an operator for more than
one purpose. In other words, we can also say that an operator or a function can serve us in
different ways. Let us say an operator '+' is used to add two integer numbers and it is also
used to concatenate two strings.
Polymorphism in C++ is when the behavior of the same object or function is different in
different contexts. It is of two types: Compile-time Polymorphism and Runtime
Polymorphism.
C++ has the ability to provide the operators with a special meaning for a data type, this
ability is known as operator overloading. Operator overloading is a compile-time
polymorphism. For example, we can overload an operator '+' in a class like String so that we
can concatenate two strings by just using +.
String Concatenation Using The strcat( ) FunctionFor example, in the strcat() fn, the destination
string must be a pointer to a character array containing a C++ string. This is because it works for C-
style strings only, that is, character arrays (str[]=”Unstoppable”).

4TPDC104
1. CREATE TABLE
2. Deletes a table called student.
3. Adds a column called ADDRESS in the table student
4. Data definition language (DDL)
5. Tuple
6. NOT NULL
7. Structured Query Language
8. Database Management System
9. Collection of Tables
10. All of the above

2. A database is an organized collection of structured information, or data, typically stored


electronically in a computer system. A database is usually controlled by a database management
system (DBMS).

3. DBMS performs several important functions that guarantee the integrity and consistency of the
data in the database. The most important functions of Database Management System are

Data Dictionary Management,


Data Storage Management,
Data Transformation and Presentation,
Security Management,
Multi user Access Control,
Backup and Recovery Management,
Data Integrity Management,
Database Access Languages andApplication Programming Interfaces and
4. Basic notations of ER diagrams are represented in the following figure:

5. Arguably, the most important characteristic of an entity is its primary key (a single attribute or
some combination of attributes), which uniquely identifies each entity instance. The primary key’s
function is to guarantee entity integrity. Furthermore, primary keys and foreign keys work together
to implement relationships in the relational model.

Natural Keys and Primary Keys:

A natural key or natural identifier is a real-world, generally accepted identifier used to distinguish—
that is, uniquely identify—real-world objects. As its name implies, a natural key is familiar to end
users and forms part of their day-to-ay business vocabulary. Usually, if an entity has a natural
identifier, a data modeler uses that as the primary key of the entity being modeled. Generally, most
natural keys make acceptable primary key identifiers.
6. A database management system (DBMS) is a collection of programs that manages the database
structure and controls access to the data stored in the database".
The DBMS serves as the intermediary between the user and the database. The database structure
itself is stored as a collection of files, So, we can access the data in those files through the DBMS.
The DBMS receives all application requests and translates them into the complex operations
required to fulfill those requests. The DBMS hides much of the database’s internal complexity from
the application programs and users.

Advantages of Database Management System (DBMS)


Improved data sharing

An advantage of the database management approach is, the DBMS helps to create an environment
in which end users have better access to more and better-managed data.
Such access makes it possible for end users to respond quickly to changes in their environment.

Improved data security


The more users access the data, the greater the risks of data security breaches. Corporations invest
considerable amounts of time, effort, and money to ensure that corporate data are used properly. A
DBMS provides a framework for better enforcement of data privacy and security policies.

Better data integration


Wider access to well-managed data promotes an integrated view of the organization’s operations
and a clearer view of the big picture. It becomes much easier to see how actions in one segment of
the company affect other segments.

Minimized data inconsistency


Data inconsistency exists when different versions of the same data appear in different places. For
example, data inconsistency exists when a company’s sales department stores a sales
representative’s name as “Bill Brown” and the company’s personnel department stores that same
person’s name as “William G. Brown,” or when the company’s regional sales office shows the price
of a product as $45.95 and its national sales office shows the same product’s price as $43.95. The
probability of data inconsistency is greatly reduced in a properly designed database.
Improved data access

The DBMS makes it possible to produce quick answers to ad hoc queries. From a database
perspective, a query is a specific request issued to the DBMS for data manipulation—for example, to
read or update the data. Simply put, a query is a question, and an ad hoc query is a spur-of-the-
moment question. The DBMS sends back an answer (called the query result set) to the application.
For example, end users, when dealing with large amounts of sales data, might want quick answers to
questions (ad hoc queries) such as:
- What was the dollar volume of sales by product during the past six months?
- What is the sales bonus figure for each of our salespeople during the past three months?
- How many of our customers have credit balances of 3,000 or more?

Improved decision making


Better-managed data and improved data access make it possible to generate better-quality
information, on which better decisions are based. The quality of the information generated depends
on the quality of the underlying data. Data quality is a comprehensive approach to promoting the
accuracy, validity, and timeliness of the data. While the DBMS does not guarantee data quality, it
provides a framework to facilitate data quality initiatives.

Increased end-user productivity


The availability of data, combined with the tools that transform data into usable information,
empowers end users to make quick, informed decisions that can make the difference between
success and failure in the global economy.

Disadvantages of Database Management System (DBMS):


Although the database system yields considerable advantages over previous data management
approaches, database systems do carry significant disadvantages. For example:

Increased costs
one of the disadvantages of dbms is Database systems require sophisticated hardware and software
and highly skilled personnel. The cost of maintaining the hardware, software, and personnel
required to operate and manage a database system can be substantial. Training, licensing, and
regulation compliance costs are often overlooked when database systems are implemented.

Management complexity
Database systems interface with many different technologies and have a significant impact on a
company’s resources and culture. The changes introduced by the adoption of a database system
must be properly managed to ensure that they help advance the company’s objectives. Given the
fact that database systems hold crucial company data that are accessed from multiple sources,
security issues must be assessed constantly.

Maintaining currency
To maximize the efficiency of the database system, you must keep your system current. Therefore,
you must perform frequent updates and apply the latest patches and security measures to all
components.
Because database technology advances rapidly, personnel training costs tend to be significant.
Vendor dependence. Given the heavy investment in technology and personnel training, companies
might be reluctant to change database vendors.
As a consequence, vendors are less likely to offer pricing point advantages to existing customers, and
those customers might be limited in their choice of database system components.

Frequent upgrade/replacement cycles


DBMS vendors frequently upgrade their products by adding new functionality. Such new features
often come bundled in new upgrade versions of the software. Some of these versions require
hardware upgrades. Not only do the upgrades themselves cost money, but it also costs money to
train database users and administrators to properly use and manage the new features.

7. Relational Algebra defines the theoretical foundation of manipulating table content using the
eight relational operators: SELECT, PROJECT, JOIN, INTERSECT, UNION, DIFFERENCE, PRODUCT, AND
DIVIDE. The relational operators have the property of closure that is applying operators on relations
produce relations.
8. The transaction refers to a small unit of any given program that consists of various low-level tasks.
Every transaction in DBMS must maintain ACID – A (Atomicity), C (Consistency), I (Isolation), D
(Durability). One must maintain ACID so as to ensure completeness, accuracy, and integrity of data.
9. In conclusion, File processing Systems have several disadvantages compared to modern database
management systems. These disadvantages include data redundancy, data inconsistency, limited
data sharing, security issues, lack of flexibility, limited scalability, and difficulty in maintenance.
10. Data normalization is the process of reorganizing data within a database so that users can utilize
it for further queries and analysis. Simply put, it is the process of developing clean data. This includes
eliminating redundant and unstructured data and making the data appear similar across all records
and fields.

You might also like