prepared by vrks sastry tanikella march 2016 …files.csevoc.webnode.com/200000068-6503f66fc0/march...
TRANSCRIPT
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
8227
Total No. of Questions – 18
Total No. of Printed Pages - 2
COMPUTER FUNDAMENTALS AND MS – OFFICE
Paper I
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. What is a computer?
2. Define an operating system.
3. What are the tabs in the Ribbon ?
4. What is auto correct ?
5. What are the alignments in paragraph ?
6. What are Undo and Redo ?
7. What is macro ?
8. What is a template ?
9. Define database.
10. What is a Foreign Key ?
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Draw the block diagram of digital computer and explain each unit neatly.
12. Write about desktop components .
13. Write the stepwise procedure to Create, Edit and Save a document in MS- Word.
14. Write about spell checker.
15. Write and explain any six FUNCTIONS.
16. Write about charts.
17. Write the steps for animation of slides.
18. Write the steps to create a simple table and enter five records.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
8228
Total No. of Questions – 18
Total No. of Printed Pages - 2
PROGRAMMING IN ‘C’
Paper I
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. Define algorithm.
2. Write the symbols of flow chart with purpose.
3. What are the basic data types in ‘C’ ?
4. What is nested looping ?
5. Write the syntax of switch statement .
6. What is Recursion ?
7. Write two advantages of functions.
8. What is an array ?
9. Write any four file operation functions .
10. What is the difference between Structure and Union ?
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Write an algorithm to find greatest of given three numbers.
12. Explain arithmetic operators with examples.
13. Write about ‘ i f and if …. else ʼ statements with syntax.
14. Explain for loop with example.
15. Define function. Write any four mathematical functions in ‘ C ʼ .
16. Write a ‘ C ʼ program to find factorial of a given number using recursion.
17. Write a ‘ C ʼ program to add two given matrices .
18. What is a structure ? Explain in detail . 84
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
8229
Total No. of Questions – 18
Total No. of Printed Pages – 2
ACCOUNTANCY AND TALLY
Paper I
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. Define Accountancy .
2. Define Journal .
3. What is Ledger ?
4. Define Cash Book.
5. What is Contra entry ?
6. Define debit note.
7. What is proper Journal ?
8. What is Trial Balance ?
9. What are the functional keys in Tally ?
10. What is Tally ?
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Explain the different types of Accounts .
12. What are the different types of cash book ?
13. From the following transactions prepare purchase book . Rs.
2013 Jan., 1 Purchased from Gopi 6,000
2013 Jan., 2 Purchased goods from Ravi 8,000
2013 Jan., 6 Purchased goods from Surya 10,000
2013 Jan., 10 Purchased goods from Suresh 2,000
2013 Jan., 11 Purchased goods from Babu 4,000
2013 Jan., 12 Purchased goods from Prasad 6,000
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
14. Prepare double column cash book from the following particulars.
Rs.
2012 May 1 Cash Balance 40,000
Bank Balance 60,000
2012 May 6 Cash received from Ramesh 9,600
Discount allowed 400
2012 May 12 Cash paid to Mohan 6,800
Discount received 200
2012 May 18 Cash Purchase 8,000
2012 May 22 Salaries paid on cheque 10,000
15. From the following transactions prepare Trial Balance :
Rs. Rs.
Capital 60,000 Creditors 20,000
Sales 40,000 Buildings 70,000
Debtors 30,000 Purchases 46,000
Bad Debts 6,000 Bills Payable 32,000
16. What is Balance Sheet ? How is it prepared ?
17. What are the types of subsidiary books ?
18. What are the characteristics of Tally ?
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
9227
Total No. of Questions – 18
Total No. of Printed Pages – 2
OOPS AND JAVA
Paper II
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. Who developed Java Language ?
2. What are the four main primitive data types of Java ?
3. What are various loop statements ?
4. What is Polymorphism ?
5. What is a Package ?
6. What is Debugging ?
7. What is Multitasking ?
8. What is an Applet ?
9. What is AWT ?
10. What is an Event ?
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Write any six main features of Java .
12. Explain Arithmetic Operators with examples .
13. Write about separators in Java .
14. Explain for loop with an example.
15. Write a Java program to find factorial of a given number.
16. Explain the overloading with an example.
17. Write the benefits or advantages of packages and Interfaces .
18. Write about the basic methods of Java Applet Class . 30
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
9228
Total No. of Questions – 18
Total No. of Printed Pages – 2
RELATIONAL DATA BASE MANAGEMENT SYSTEMS
Paper II
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. What is a database ?
2. What is entity and entity set ?
3. What is a tuple ?
4. What is primary key ?
5. What are the commercial query languages ?
6. Write any two DDL commands .
7. What are the set operators in SQL ?
8. What is a database trigger ?
9. Who will be called as system analyst ?
10. What is data dictionary ?
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. What are the advantages of DBMS over file processing system ?
12. What are the functions of DBA ?
13. Explain mapping constraints with a neat diagram .
14. Explain about Relational Data Model .
15. Write any six Codd rules in Relational Model .
16. Explain any three DML commands with examples .
17. Explain the control structures in PL – SQL .
18. Explain different stages of software development life cycle in detail .
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
9229
Total No. of Questions – 18
Total No. of Printed Pages – 2
DATA COMMUNICATION AND COMPUTER NETWORKS
Paper II
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. What is Data Communication ?
2. What is Computer Network ?
3. Expand BBN, GAN .
4. What are gateways ?
5. Write any four uses of E – mail .
6. What is Trojan ?
7. Define HTML .
8. What is Frame ?
9. Define event Handling .
10. Define Dom .
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Explain about various communication channels .
12. Explain different types of Computer Networks .
13. Explain any three Network Topologies .
14. Explain briefly about any three LAN components .
15. Explain any three Web Browsers .
16. Write the structure of an HTML Program .
17. Define a list Explain various types of lists used in HTML .
18. Write the differences between HTML and DHTML .
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
8227
COMPUTER FUNDAMENTALS AND MS – OFFICE
Paper I
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. What is a computer?
A) Computer: It is an electronic device which processes given data to derive the
required and useful information. During the processing the computer has to perform
various functions like receives data (input) processes data (process) produces output
(information) stores results (storage).
2. Define an operating system.
A) Operating System: Operating System is system software. The operating system is a
collection of programs that control the operation of all hardware and other resources in
the computer system. It works like a mediator between computer and the hardware.
Ex: MS – DOS, WINDOWS, UNIX, LINUX
3. What are the tabs in the Ribbon ?
A) Ribbon has seven tabs: Home, Insert, Page Layout, References, Mailings, Review, and
View that contain many new and existing features of Word
.
4. What is auto correct ?
A) AutoCorrect tool in Word to retain certain text the way it is. To customize
AutoCorrect:
Click the Microsoft Office button
Click the Word Options Button
Click the Proofing tab
Click AutoCorrect Options button
5. What are the alignments in paragraph ?
A)
a. Align Left: the text is aligned with your left margin.
b. Center: The text is centered within your margins.
c. Align Right: Aligns text with the right margin.
d. Justify: Aligns text to both the left and right margins.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
6. What are Undo and Redo ?
A) Undo: Undo is helps to take the document to previous stage after most recent actions.
Redo: Redo helps to take the document to the advanced or most recent actions.
7. What is macro ?
A) Macro: The macro is a useful feature of excel that helps to automatic key commands
required to execute any command or task. Macros are advanced features that can speed
up editing or formatting we may perform often in an Excel worksheet.
8. What is a template ?
A) Template: template is a pattern or blueprint or model or “Starter” document contain
starting content or boilerplate text.
9. Define database.
A) Database: A collection of data designed to be used by different people is called a
database. It is collection of interrelated data with controlled redundancy to serve one or
more applications.
10. What is a Foreign Key ?
A) Foreign Key: A foreign key is a field or combination of fields that are related to the
primary key of another table.
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Draw the block diagram of digital computer and explain each unit neatly.
A )
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
1. Input: This is the process of entering data and programs in to the computer system.
Therefore, the input unit takes data from us to the computer in an organized manner for
processing through an input device such as keyboard, mouse, MICR, OCR, Etc.,
2. Main Memory: It is also known as internal memory. It is very fast in operation.
The process of saving data and instructions is known as memory (storage). Data has to be
fed into the system before the actual processing starts. It contains a part of the operating
system Software, one or more execution programs being executed, the data being
processed and required by the programs for execution, and processed data awaiting
output.
3. Output: This is the process of producing results from the data for getting useful
information. Similarly the output produced by the computer after processing must also be
kept somewhere inside the computer before being given to you in human readable form
through the screen or printer. Again the output is also stored inside the computer for
further processing.
4. Control Unit (CU) : The next component of computer is the Control Unit, which acts
like the supervisor seeing that things are done in proper fashion. Control Unit is
responsible for coordinating various operations using time signal. The control unit
determines the sequence in which computer programs and instructions are executed.
Things like processing of programs stored in the main memory, interpretation of the
instructions and issuing of signals for other units of the computer to execute them. It also
acts as a switch board operator when several users access the computer simultaneously.
Thereby it coordinates the activities of computer’s peripheral equipment as they perform
the input and output.
5. Arithmetic Logical Unit (ALU) : After you enter data through the input device it is
stored in the primary storage. The actual processing of the data and instruction are
performed by Arithmetic Logical Unit. The major operations performed by the ALU are
addition, subtraction, multiplication, division, logic and comparison. Data is transferred
to ALU from storage unit when required. After processing the output is returned back to
storage unit for further processing or getting stored.
6. Secondary storage: It is also known as auxiliary memory. It is closely linked with the
main memory. Since main memory can’t be flooded with unwanted data at particular
moment, same is stored in auxiliary memory from which desired data is fed to main
memory as and when required by it. Thus secondary storage is used to hold mass of
information i.e., system software, application programs, cinemas, games and data files.
Obviously the capacity of secondary storage is very high compared to main memory.
Auxiliary memory usually in the form of Magnetic disk, Magnetic tape, CD’s, Memory
cards, Pen drives Etc.,
12. Write about desktop components .
A) The desktop components: Desktop: The desktop is the main screen area that you see after you turn on your
computer and log on to Windows.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Task Bar: The desktop is sometimes defined more broadly to include the taskbar. The
taskbar sits at the bottom of your screen. It shows you which programs are running and
allows you to switch between them.
Start Button: Start button , which we can use to access programs, folders, and computer
settings.
Desktop icons: Icons are small pictures that represent files, folders, programs, and other
items. When we first start Windows, we will see at least one icon on your desktop: The
Recycle Bin (more on that later).
My Computer
My Network neighbor hood
My Documents
Recycle bin
Internet Explorer
My Briefcase
a) My Computer: My computer is where we can manage all the devices, drives, files,
folders, and applications etc. Double clicking on the My Computer icon will display all
the specified drives and devices that are connected to the computer.
b) Network Neighbourhood: All the client computers connected in the same LAN will
be displayed. From here we access any computer connected in the same LAN.
c) My Documents: It contains the user personalized files.
d) Recycle Bin: All the deleted files / folders / programs will be stored in the recycle bin
directory.
e) Internet Explorer: It is web browser. It is used to browse the World Wide Web.
f) My Briefcase: Is used to store our personal documents, files and folders.
13. Write the stepwise procedure to Create, Edit and Save a document in MS - Word.
A) To Create a New Document: Select “Start” button form the desktop.
Select All Programs from “Start button” options
Select “Microsoft Office” option.
Select ”Microsoft Word 2007” from the options of “Microsoft Office”.
Edit a Document:
Making modifications in a document is known as editing.
Editing may be any one of the copy, cut, paste, undo and redo.
For any modification first we have to select the data.
For copy, cut and paste we can select the icons from “Clipboard” options of
“Home” tab.
Save a Document:
Click the Microsoft Office Button
Click Save or Save As or Press CTRL+S on the keyboard, or Click the File icon
on the Quick Access Toolbar.
Go to the location where we want to save the document in the hard disk
Provide name at “Filename”.
Select “Save” button.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
14. Write about spell checker.
A) Spell check: Used to check the spelling and grammar mistakes typed in a document.
The wrong words will be highlighted by red color under line. We can correct the mistakes
typed in the document with this facility.
Procedure: Place the cursor at the beginning of the document or the beginning of the section
that you want to check
Click the Review Tab on the Ribbon.
Click Spelling & Grammar on the Proofing Group.
Any errors will display a dialog box that allows you to choose a more appropriate
spelling or phrasing.
If you wish to check the spelling of an individual word, you can right click any
word that has been underlined by Word and choose a substitution.
15. Write and explain any six FUNCTIONS.
A) Mathematical functions: let us take a worksheet with simple data to explain mathematical
functions.
1. FACT: Returns the factorial of a number.
Syntax FACT(number)
Example: FACT(B2) gives 120 because B2 in Figure -1 contains 5 i.e., (1 x 2 x 3 x 4 x 5
= 120).
2. POWER: Returns the results of a number raised to a power
Syntax: POWER(number, power)
Example: POWER(B2,E2) gives result 25 because (52 = 25) 3. SQRT: Finds the square root of a value in the cell.
Syntax: SQRT(number)
Example: SQRT(C2) gives 2 because square root of 4 is 2.
4. SUM: The SUM function adds all the numbers that you specify as arguments.
Syntax: SUM(number1, [number2],[number3],[number4],…)
Example: SUM(A2:E2) Gives the result 20 because(3 + 5 +4 + 6 + 2 = 20)
5. SUMIF: You use the SUMIF function to sum the values in a range that meet criteria
that you specify.
Syntax: SUMIF(RANGE , CRITERIA)
Example: SUMIF(A2:E2,">4") Gives result 11 because (5 + 6).
6. MOD: Returns the remainder after number is divided by divisor. The result has the
same sign as divisor.
Syntax: MOD(number, divisor)
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Number: is the number for which you want to find the remainder.
Divisor is the number by which you want to divide number.
Ex1: MOD(B2,A2) gives result 2 because remainder is 2 when 5 is divided by 3.
16. Write about charts.
A) Charts are used to display series of numeric data in a graphical format to make it easier to
understand large quantities of data and the relationship between different series of data. Here
charts are prepared from the following table.
Column charts Data that is arranged in columns or rows on a worksheet can be plotted in a column chart.
Column charts are useful for showing data changes over a period of time or for illustrating
comparisons among items.
Line charts Data that is arranged in columns or rows on a worksheet can be plotted in a line chart. Line
charts can display continuous data over time, set against a common scale, and are therefore
ideal for showing trends in data at equal intervals. In a line chart, category data is distributed
evenly along the horizontal axis, and all value data is distributed evenly along the vertical
axis.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Pie charts Data that is arranged in one column or row only on a worksheet can be plotted in a pie chart.
Pie charts show the size of items in one data series, proportional to the sum of the items. The
data points in a pie chart are displayed as a percentage of the whole pie.
Bar charts Data that is arranged in columns or rows on a worksheet can be plotted in a bar chart. Bar
charts illustrate comparisons among individual items.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Area charts Data that is arranged in columns or rows on a worksheet can be plotted in an area chart. Area
charts emphasize the magnitude of change over time, and can be used to draw attention to the
total value across a trend. For example, data that represents profit over time can be plotted in
an area chart to emphasize the total profit.
By displaying the sum of the plotted values, an area chart also shows the relationship of parts
to a whole.
XY (scatter) charts Data that is arranged in columns and rows on a worksheet can be plotted in an xy (scatter)
chart. Scatter charts show the relationships among the numeric values in several data series,
or plots two groups of numbers as one series of xy coordinates.
A scatter chart has two value axes, showing one set of numeric data along the horizontal axis
(x-axis) and another along the vertical axis (y-axis). It combines these values into single data
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
points and displays them in irregular intervals, or clusters. Scatter charts are typically used
for displaying and comparing numeric values, such as scientific, statistical, and engineering
data.
17. Write the steps for animation of slides.
A) Slide Animation: Animation means to add a special visual or sound effect to text or an object.
Slide animation effects are predefined special effects that you can add to objects
on a slide. To apply an animation effect:
1. Select the object
2. Click the Animations tab on the Ribbon
3. Click Custom Animation
4. Click Add Effect
5. Choose the appropriate effect.
18. Write the steps to create a simple table and enter five records.
A) Create a table, starting in Design view In Design view, you first create the new
table's structure. You then switch to Datasheet view to enter data, or enter data by using
some other method, such as pasting, or importing.
1. On the Create tab, in the Tables group, click Table Design.
2. For each field in your table, type a name in the Field Name column, and then select a
data type from the Data Type list.
3. If you want, you can type a description for each field in the Description column. The
description is then displayed on the status bar when the cursor is located in that field in
Datasheet view.
4. After you have added all of your fields, save the table:
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Click the Microsoft Office Button and then click Save, or press CTRL+S.
5. You can begin typing data in the table at any time by switching to Datasheet view and
clicking in the first empty cell. You can also paste data from another source, as described
in the section Copy data from another source into an Access table.
Student Name Year Marks M.Sindhu Kumari 2012-14 907
Sk.Lal Asha 2011-13 857
S.Naga Lakshmi 2010-12 882
A.Naresh 2009-11 803
Sk.Mustafa 2008-10 813
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
8228
PROGRAMMING IN ‘C’
Paper I
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. Define algorithm. A) Algorithm :A set of sequential steps usually written in Ordinary Language to solve a
given problem is called an Algorithm.
2. Write the symbols of flow chart with purpose. A) Symbols of flow chart: Ellipse, Parallelogram, Rectangle, Diamond, Arrow and
Circle.
3. What are the basic data types in ‘C’ ? A) Basic Data Types : There are four basic data types in C language. They are Integer,
character, floating point and double.
4. What is nested looping ? A) Nested loop: A loop with in another loop is called nested loop.
5. Write the syntax of switch statement . A) Switch statement: A switch statement is used to choose a statement among several
alternatives.
Syntax: switch (expr)
{
case constant-1: statements1;
caseconstant-2: statements2;
———
———
default: statements n;
}
6. What is Recursion ? A) Recursion: Recursion can be defines as the process of a function by which it can
call itself.
7. Write two advantages of functions.
A) The main advantages of using a function are: Easy to write a correct small function.
Easy to read and debug a function.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Easier to maintain or modify such a function.
Small functions tend to be self documenting and highly readable
It can be called any number of times in any place with different parameters.
8. What is an array ? A) Array: Array can be defined as a collection of data objects of same type which are
stored in consecutive memory locations with a common variable name.
9. Write any four file operation functions .
A) File operation functions:
fopen( ), fclose( ), fprint( ), fscan( ).
FILE OPEN function fopen ( )
FILE CLOSE function fclose( )
FILE INPUT functions getc( ) and fscanf( )
FILE OUTPUT functions putc( ) and fprintf( )
10. What is the difference between Structure and Union ?
A)
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Write an algorithm to find greatest of given three numbers.
A) Algorithm: Step 1: Start
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Step 2: Read the numbers X, Y, Z.
Step 3 : if (X > Y) BIG = X else BIG = Y
Step 4: if (BIG < Z) BIG = Z
Step 5: Print the greatest number i.e. BIG
Step 6: Stop.
12. Explain arithmetic operators with examples.
A) Arithmetic Operators
Operator Meaning + Addition
- Subtraction
* Multiplication
/ Division
% Modulo division
Ex: a and b are integer variables and assigned a=5 and b=3 then
Operator Purpose Arithmetic
Expression
Result
+ Addition a+b 8
- Subtraction a-b 2
* Multiplication a*b 15
/ Division a / b 1
% Remainder after
integer division
a%b 2
13. Write about ‘ if and if …. else ʼ statements with syntax.
A)
(a) if statement : The if statement is used to express conditional expressions. If the
given condition is true then it will execute the statements otherwise skip the statements.
The simple structure of ‘if’ statement is
if (< conditional expression>)
Statement-1;
(or)
The conditional expression is evaluated, if the expression is true the statements will be
executed. If the expression is false the statements are skipped and execution continues
with the next statements.
Example: a=20; b=10;
if ( a > b )
printf (“big number is %d” ,a);
b. if-else statements : . if (< conditional expression>)
statements-1
else
statements-2;
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
The conditional expression is evaluated and if the expression is true the statements-1 will
be executed. If the expression is false the statements-2 will be executes.
Example: if ( a> b )
printf (“a is greater than b”);
else
printf (“a is not greater than b”);
c. Nested else-if statements :If some situations if may be desired to nest multiple if-else
statements. In this situation one of several different course of action will be selected.
Syntax if ( <exp1> )
Statement-1;
else if ( <exp2> )
Statement-2;
else if ( <exp3> )
Statement-3;
else Statement-4;
When a logical expression is encountered whose value is true the corresponding
statements will be executed and the remainder of the nested else if statement will be
bypassed. Thus control will be transferred out of the entire nest once a true condition is
encountered.
The final else clause will be apply if none of the exp is true.
d. nestedif-else statement : It is possible to nest if-else statements, one within another.
There are several different forms that nested if-else statements can take.
The most general form of two-layer nesting is
if(exp1)
if (exp3)
Statement-3;
else
Statement-4;
else
if(exp2)
Statement-1;
else
Statement-2;
One complete if-else statement will be executed if expression1 is true and another
complete if-else statement will be executed if expression1 is false.
14. Explain for loop with example. A) for loop: The execution of for loop is as follows
a) Initialization of the control variables is done first.
b) The value of the control variable is tested using the test condition. If the test condition
is true the body of the loop will be executed otherwise loop will be terminated.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
c) When the body of the loop is executed, the control is transferred back to the for
statement and it will be updated.
Syntax: for (exp1;exp2;exp3)
{
Body of the loop
}
exp1 : Initialization Expression.
exp2 : Condition or Control Expression.
exp3 : Update Expression.
Example: (Student can write any program)
/*creating a single dimensional array of characters and displaying them*/
#include<stdio.h>
#include<conio.h>
void main()
{inti,j,n;
char a[10];
clrscr();
printf("\n how many elements");
scanf("%d",&n);
printf("\n enter %d characters line by line\n",n);
for(i=0;i<n;++i)scanf("\n%c",&a[i]);
printf("\n given array\n");
for(j=0;j<n;++j)printf("\n%c",a[j]);
getch();
}
how many elements 5
enter 5 characters line by line
h
e
l
l
o
given array
h
e
l
l
o
15. Define function. Write any four mathematical functions in ‘ C ʼ . A) Function: A function can be defined as a subprogram which is meant for doing a
specific task.
inbuilt C functions in math.h file:
“math.h” header file supports all the mathematical related functions in C language. All
the arithmetic functions used in C language are given below.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
S.no Function Description
1 floor ( ) This function returns the nearest integer which is less than or equal to the
argument passed to this function.
2 round ( ) This function returns the nearest integer value of the float/double/long
double argument passed to this function. If decimal value is from ”.1 to
.5″, it returns integer value less than the argument. If decimal value is
from “.6 to .9″, it returns the integer value greater than the argument.
3 ceil ( ) This function returns nearest integer value which is greater than or equal
to the argument passed to this function.
4 sin ( ) This function is used to calculate sine value.
5 cos ( ) This function is used to calculate cosine.
6 cosh ( ) This function is used to calculate hyperbolic cosine.
7 exp ( ) This function is used to calculate the exponential “e” to the xth power.
8 tan ( ) This function is used to calculate tangent.
9 tanh ( ) This function is used to calculate hyperbolic tangent.
10 sinh ( ) This function is used to calculate hyperbolic sine.
11 log ( ) This function is used to calculates natural logarithm.
12 log10 ( ) This function is used to calculates base 10 logarithm.
13 sqrt ( ) This function is used to find square root of the argument passed to this
function.
14 pow ( ) This is used to find the power of the given number.
15 trunc.(.) This function truncates the decimal value from floating point value and
returns integer value
16. Write a ‘ C ʼ program to find factorial of a given number using recursion. A) /* factorial by using recursive function */
/*finds factorial by using recursion*/
#include<stdio.h>
#include<conio.h>
void main()
{
long factorial(int);
intnum;
long f;
clrscr();
printf("Enter a number n=");
scanf("%d", &num);
if (num< 0)
printf("Negative numbers are not allowed.\n");
else
{
f = factorial(num);
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
printf("factorial of %ld is %ld\n", num, f);
}
getch();
}
long factorial(int n)
{
if (n == 0)
return 1;
else
return(n * factorial(n-1));
}
input Enter a number n= 5
output Factorial of 5 is 120
17. Write a ‘ C ʼ program to add two given matrices .
A)
/*matrix addition*/
#include <stdio.h>
#include<conio.h>
void main()
{
Intar,ac,br,bc, c, d, a[10][10], b[10][10], sum[10][10];
clrscr();
printf("Enter the number of rows in matrix-A: ");
scanf("%d", &ar);
printf("Enter the number of columns in matrix-A: ");
scanf("%d", &ac);
printf("Enter the number of rows in matrix-B: ");
scanf("%d", &br);
printf("Enter the number of columns in matrix-B: ");
scanf("%d", &bc);
if (( ar != br) || (ac!=bc)) gotolastpara;
printf("Enter %d elements of first matrix-A\n",ar*ac);
for ( c = 0 ; c <ar ; c++ )
for ( d = 0 ; d < ac ; d++ )
scanf("%d", &a[c][d]);
printf("Enter %d elements of second matrix-B\n",br*bc);
for ( c = 0 ; c <br ; c++ )
for ( d = 0 ; d <bc ; d++ )
scanf("%d", &b[c][d]);
for ( c = 0 ; c <ar ; c++ )
for ( d = 0 ; d <ac ; d++ )
sum[c][d] = a[c][d] + b[c][d];
printf("\n matrix-A is \n");
for ( c = 0 ; c <ar ; c++ )
{
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
for ( d = 0 ; d < ac; d++ )
printf("%d\t", a[c][d]);
printf("\n");
}
printf("\n matrix-B is\n");
for ( c = 0 ; c <br ; c++ )
{
for ( d = 0 ; d <bc; d++ )
printf("%d\t", b[c][d]);
printf("\n");
}
printf("Sum of entered matrices(A+B):-\n");
for ( c = 0 ; c <ar ; c++ )
{
for ( d = 0 ; d < ac; d++ )
printf("%d\t", sum[c][d]);
printf("\n");
}
gotoendpara;
lastpara: printf("\n rows and columns are not equal, hence can not add matrices");
endpara:
getch();
}
Input Enter the number of rows in matrix-A 2
Enter the number of columns in matrix-A 2
Enter the number of rows in matrix-B 2
Enter the number of columns in matrix-B 3
rows and columns are not equal, hence can not add matrices
Enter the number of rows in matrix-A: 2
Enter the number of columns in matrix-A: 2
Enter the number of rows in matrix-B: 2
Enter the number of columns in matrix-B: 2
Enter 4 elements of first matrix-A
1
2
3
4
Enter 4 elements of second matrix-B
5
6
7
8
output matrix-A is
1 2
3 4
matrix-B is
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
5 6
7 8
Sum of entered matrices(A+B):-
6 8
10 12
18. What is a structure ? Explain in detail .
A) Structure: A group of one or more variables of different data types organized
together under a single name is called a Structure.
a) Structure Declaration
The declaration of a structure specifies the grouping of various data items into a single
unit without assigning any resources to them. The syntax for declaring a structure in C is
as follows:
struct<Structure Name>
{
Data Type member-1;
Data Type member-2;
…. ….
DataType member-n;
};
The structure declaration starts with the structure header, which consists of the keyword
‘struct’ followed by a tag. The tag serves as a structure name, which can be used for
creating structure variables. The individual members of the structure are enclosed
between the curly braces and they can be of the similar or dissimilar data types. The data
type of each variable is specified in the individual member declarations.
Example: Let us consider an employee database consisting of employee number, name, and salary.
A structure declaration to hold this information is shown below:
struct employee
{
inteno;
char name [80];
float sal;
};
b) Structure Variables Similar to other types of variables, the structure data type variables can be declared using
structure definition.
struct
{
introllno;
char name[20];
float average;
} a, b;
In the above structure definition, a and b are said to be structure type variables. ‘a’ is a
structure type variable containing rollno, name, average as members, which are of
different data types. Similarly ‘b’ is also a structure type variable with the same members
of ‘a ‘.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
c) Structure Initialization The members of the structure can be initialized like other variables. This can be done at
the time of declaration.
Example struct address
{
char name [20];
char desgn [10];
char place [10];
} ;
i.e
struct address my-add = { ‘Sree’, ‘AKM’, ‘RREDDY’);
i.e
my-add . name = ‘Sree’
my-add . desgn = AKM
my-add . place = RREDDY
As seen above, the initial values for structure members must be enclosed with in a pair of
curly braces. The values to be assigned to members must be placed in the same order as
they are specified in structure definition, separated by commas. If some of the members
of the structure are not initialized, then the c compiler automatically assigns a value
‘zero’ to them.
d) Accessing of Structure Members As seen earlier, the structure can be individually identified using the period operator ( . ).
After identification, we can access them by means of assigning some values to them as
well as obtaining the stored values in structure members. The following program
illustrates the accessing of the structure members.
Example: Write a C program, using structure definition to accept the time and display it.
/ * Program to accept time and display it */
# include <stdio.h>
void main( )
{
struct
{
int hour, min;
float seconds;
} time;
printf ("Enter time in Hours, min and Seconds\n");
scanf ( "%d %d %f", &time . hour, & time . min, & time . seconds);
printf ( " The accepted time is %d %d %f " , time . hour, time . min, time . seconds);
}
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
8229
Total No. of Questions – 18
Total No. of Printed Pages – 2
ACCOUNTANCY AND TALLY
Paper I
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. Define Accountancy .
2. Define Journal .
3. What is Ledger ?
4. Define Cash Book.
5. What is Contra entry ?
6. Define debit note.
7. What is proper Journal ?
8. What is Trial Balance ?
9. What are the functional keys in Tally ?
10. What is Tally ?
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Explain the different types of Accounts .
12. What are the different types of cash book ?
13. From the following transactions prepare purchase book . Rs.
2013 Jan., 1 Purchased from Gopi 6,000
2013 Jan., 2 Purchased goods from Ravi 8,000
2013 Jan., 6 Purchased goods from Surya 10,000
2013 Jan., 10 Purchased goods from Suresh 2,000
2013 Jan., 11 Purchased goods from Babu 4,000
2013 Jan., 12 Purchased goods from Prasad 6,000
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
14. Prepare double column cash book from the following particulars.
Rs.
2012 May 1 Cash Balance 40,000
Bank Balance 60,000
2012 May 6 Cash received from Ramesh 9,600
Discount allowed 400
2012 May 12 Cash paid to Mohan 6,800
Discount received 200
2012 May 18 Cash Purchase 8,000
2012 May 22 Salaries paid on cheque 10,000
15. From the following transactions prepare Trial Balance :
Rs. Rs.
Capital 60,000 Creditors 20,000
Sales 40,000 Buildings 70,000
Debtors 30,000 Purchases 46,000
Bad Debts 6,000 Bills Payable 32,000
16. What is Balance Sheet ? How is it prepared ?
17. What are the types of subsidiary books ?
18. What are the characteristics of Tally ?
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
9227
OOPS AND JAVA
Paper II
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. Who developed Java Language ? A) Java was developed by James Gosling at Sun Microsystems in 1995.
2. What are the four main primitive data types of Java ? a) The Four Primitive Data Types in JAVA are:
Integer: byte, short, int, and long.
Floating Point: float and double
Character: char
Boolean: variable with a value of true or false.
3. What are various loop statements ? A) Loop statements in Java are 3. those are
1) for loop
2) while loop
3) do – while loop
4. What is Polymorphism ?
A) Polymorphism: Polymorphism means the ability to take more than one form is called
Polymorphism.
5. What is a Package ? A) Package: Packages are a way of grouping a variety of classes and or interfaces
together. The grouping is done according to their functionality. Packages are act like
containers for classes.
Java packages are classified into two types. They are:
1. Java API Packages.
2. User – Defined Packages.
Syntax: 1. To create a package:
package package_name;
2. To import a package:
import package_name.*;
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
6. What is Debugging ? A) Debugging: The process of identifying and removing user committed errors from a
program is called debugging.
7. What is Multitasking ? A) ) Multitasking: It is an operating system concept in which multiple tasks are
performed simultaneously.
8. What is an Applet ? A) Applet: An applet is a Java program that runs in a Web browser. An applet can be a
fully functional Java application because it has the entire Java API.
9. What is AWT ? A) AWT: AWT stands for Abstract Window Tool Kit. It is a portable GUI library
among various operating systems for stand-alone applications.
10. What is an Event ? A) Event: Changing the state of on object is called an Event. Ex:click on button,
dragging mouse etc.
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Write any six main features of Java .
A)
Features of Java:
1.Object Oriented: In java everything is an Object. Java can be easily extended since it
is based on the Object Model.
2.Platform Independent: When java program is compiled, it is not compiled into
platform specific machine, rather the into platform independent byte code. This byte
code is distributed over the web and interpreted by virtual machine (JVM) on whichever
platform it is being run.
3. Simple: Java is designed to be easy to learn. If we understand the basic concept of
OOP java would be easy to master.
4,Secure: With java’s secure feature it enables to develop virus – free, tamper – free
systems. Authentication techniques are based on public – key encryption.
5.Architetural – Neutral: Java compiler generates an architecture – neutral object file
format which makes the compiled code to be executable on many processors with the
presence Java runtime system.
6. Portable: We may carry the java byte code to any platform.
7. Robust: Java makes an effort to eliminate error prone situations by emphasizing
mainly on compile time error checking and runtime checking.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
8.Multi – threaded: With java’s multi-threaded feature it is possible to write programs
that can do many tasks simultaneously. This design feature allows developers to
construct smoothly running interactive applications.
9.. Interpreted: Java byte code is translated on the fly to native machine instructions and
is not stored any where. The development process is more rapid and analytical since the
linking is an incremental and light weigh process.
10.High Performance: With the use of Just – In – Time compilers Java enables high
performance.
11.Distributed: Java is designed for the distributed environment of the internet.
12. Dynamic: Java programs can carry extensive amount of run-time information that
can be used to verify and resolve accesses to objects on run – time.
12. Explain Arithmetic Operators with examples . A) Arithmetic Operators: Arithmetic Operators are used to perform arithmetic
operations on two operands.
Ex: a and b are integer variables and assigned a=5 and b=3 then
Operator Purpose Arithmetic
Expression
Result
+ Addition a+b 8
- Subtraction a-b 2
* Multiplication a*b 15
/ Division a / b 1
% Remainder after
integer division
a%b 2
13. Write about separators in Java .
A)
SEPARATORS PURPOSE
Parentheses ( )
Encloses arguments in method definitions and calling; adjusts
precedence in arithmetic expressions; surrounds cast types and
delimits test expressions in flow control statements
Braces { } defines blocks of code and automatically initializes arrays
Brackets [ ] declares array types and dereferences array values
Semi colon ; terminates statements
Comma ,
separates successive identifiers in variable declarations; chains
statements in the test,
expression of a for loop
Period . Selects a field or method from an object; separates package
names from sub-package and class names
: Used after loop labels
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
14. Explain for loop with an example. A) for loop: The execution of for loop is as follows
a) Initialization of the control variables is done first.
b) The value of the control variable is tested using the test condition. If the test condition
is true the body of the loop will be executed otherwise loop will be terminated.
c) When the body of the loop is executed, the control is transferred back to the for
statement and it will be updated.
Syntax: for(exp1;exp2;exp3)
{
Body of the loop
}
exp1 : Initialization Expression.
exp2 : Condition or Control Expression.
exp3 : Update Expression.
Ex: //To find the sum of n natural numbers
import java.util.Scanner;
class Sumnnos{
public static void main(String args[]){
int i,s=0,n;
System.out.println("Enter an integer:");
Scanner in=new Scanner(System.in);
n=in.nextInt();
for(i=1;i<=n;i++){
s+=i;
}
System.out.println("sum of "+n+"natural numbers is "+s);
}}
Output:
Enter an integer: 5
sum of 5 natural numbers is 15
15. Write a Java program to find factorial of a given number. A) ) // program to find the factorial by using while loop
import java.util.Scanner;
class Factoria{
public static void main(String args[]){
int i,f=1,n;
System.out.println("Enter an Integer:");
Scanner in = new Scanner(System.in);
n = in.nextInt();
i = 1;
while(i<=n){
f*=i;
++i;
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
}
System.out.println("Factorial of"+n+"is" +f);
}}
Output:
Enter an Integer: 8
Factorial of 8 is 40320
16. Explain the overloading with an example. A) Overloading: Overloading means creating more than a single method with same
name with different signatures.
Java identifies the methods with by comparing their signatures like return types,
constructor parameters & access modifiers used.
Ex: class Overload {
void test(int a){
System.out.println("a:"+a); }
void test(int a, int b){
System.out.println("a and b:"+a+","+b);}
double test(double a){
System.out.println("double a" +a);
return a*a; }}
class MethodOverloading{
public static void main(String args[ ]){
Overload overload=new Overload();
double result;
overload.test(10);
overload.test(20,30);
result=overload.test(2.5);
System.out.println("Result:"+result);
}}
Output: a: 10
a and b: 20,30
double a: 2.5
Result: 6.25
17. Write the benefits or advantages of packages and Interfaces .
A) Benefits of packages (or) Benefits by organizing classes into Packages: 1. Provides reusability of the class by the other programs existing in the same
package.
2. In packages, classes can be unique compared with classes in other packages.
3. Packages provide a way to “hide” classes thus preventing other programs or
packages from accessing classes that are meant for internal use only.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
4. Packages offers a way of separation between “Design” and “Coding” by
designing classes and decide their relationships first and implementing the java
code needed for the methods next.
Benefits or Advantages of Interfaces: 1. The legal implementations for a class are defined in the interface.
2. Java provides an alternate approach for multiple inheritance known as Interfaces
to support the multiple inheritance.
3. A java class cannot be subclass of more than one super class but it can implement
more than one interface.
18. Write about the basic methods of Java Applet Class . A) Basic methods of Applet (or) Life Cycle of an applet: Four methods give us the
framework on which we build an applet.
1. init ( ) : This method is intended for whatever initialization is needed for our
applet. It is called after the param tags inside the applet tag have been processed.
2. start ( ) : This method is automatically called after the browser calls the init
method. It is also called whenever the user returns to the page containing the
applet after having gone off to other pages.
3. stop ( ): This method is automatically called when the user moves off the page on
which the applet sits. It can, therefore, be called repeatedly in the same applet.
4. destroy ( ) : This method is only called when the browser shuts down normally
5. paint ( ) : Invoked immediately after the start() method and also any time the
applet needs to repaint itself in the browser. The paint() method is actually
inherited from the java awt.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
9228
RELATIONAL DATA BASE MANAGEMENT SYSTEMS
Paper II
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. What is a database ? A) Database: A database is a collection of logically related information that is organized
in a systematic manner so that it can easily be accessed, managed, and updated.
2. What is entity and entity set ? A) Entity: An Entity is an “object” that exists and is distinguishable from other objects.
For example, Student of a college having some specific properties.
Entity Set: The Entity Set is a set of entities of the same type, that share the same
properties or Attributes. The set of all students in a class., can be defined as the entity-
set.
3. What is a tuple ? A) Tuple: Tuple is a row of a table or a Record of a table.
4. What is primary key ? A) Primary key: The column value which uniquely identifies the record in the table will
be defined as primary key.
5. What are the commercial query languages ? A) Commercial query languages: Commercial Query Languages are needed for the
commercial database systems. These languages are more user-friendly. Some of the
commercial Query languages are SQL , QBE ,Quel etc.,
6. Write any two DDL commands . A) DDL Commands: insert, select, delete and update.
7. What are the set operators in SQL ? A) Set operators: Union , Union all , Intersect , Minus
8. What is a database trigger ? A) Database Trigger: A database trigger is a stored procedure that will be executed
when an event is occurred i.e., insert, update, delete statement is issued against the
associated table.
9. Who will be called as system analyst ?
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
A) System analyst: A person who analyses a system by the use of scientific techniques
in order to determine where and how the improvements can be made with a view to meet
objectives in a more efficient and economical manner is called System Analyst.
10. What is data dictionary ?
A) Data Dictionary: Data Dictionary is a repository that contains descriptions of all data
objects produced by the software.
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. What are the advantages of DBMS over file processing system ?
A) Advantages of DBMS over File Processing system are
1) Provides for mass storage of relevant data.
2) Make easy access of the data to user.
3) Allows for the modification of data in a consistent manner.
4) Allows multiple users to be active at a time
5) Eliminate or reduce the redundant data.
6) Provide prompt response to the users request for data.
7) Supports Backup and recovery of data.
8) Protect data from physical hardware failure and unauthorized access.
9) Constraints can be set to database to maintain data integrity.
12. What are the functions of DBA ?
A) 1. Schema definition
2. Storage structure and Access method definition
3. Schema physical organization and modification
4. Granting of authorization for data access
5. Routine maintenance
1. Schema Definition: The DBA creates the original database schema by executing a set
of definition statements in the DDL.
2. Storage structure and Access method definition: DBA will decide the actual storage
structure and different access methodologies for the database.
3. Schema physical organization and modification: The DBA carries out the changes
to the schema and physical organization to reflect the changing needs of the organization
or to alter the physical organization to improve the performance.
4. Granting of authorization for data access: By granting different types of
authorization, the database administrator can regulate which of the database various can
access.
5. Routine maintenance: DBA is the final authority to regulate daily activities.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
13. Explain mapping constraints with a neat diagram . A) There are 4 types of mapping constraints.
1. ONE – to – ONE relationship
2. MANY – to – ONE relationship
3. ONE – to – MANY relationship
4. MANY – to – MANY relationship
1. ONE – to – ONE relationship: An entity in A is associated with at most one entity
in B , An entity in B is also associated with at most one entity in A.
Example : Relationship between the entities principal and college. i.e., Principals can
lead a single college and a principal can have only one college.
2. Many – to – One relationship: An entity set in A is associated with at most one
entity in B, An entity in B however can be associated with any number of entities in A.
Example: Relationship between the entities Districts and state .i.e. many districts belong
to a single state but many states cannot belong to single district.
3. ONE – to - MANY relationship: An entity set A is associated with any number of
entities in B. An entity in B, however can be associated with at most one entity in A.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Example: Relationship between the entities class and student i.e., a class can have many
students but a student cannot be in more than one class at a time.
4. MANY – to – MANY relationship: An entity set A is associated with any number of
entities in B and an entity set in B is associated with any number of entities in A.
Example: Relationship between the Entities College and course .i.e. a college can have
many courses and course can be offered by many colleges.
14. Explain about Relational Data Model .
A) Relational Database : One of the major advantages of using a relational database is
its structural flexibility. It allows the users to retrieve the data in any combination
A relation is a two-dimensional array, consisting of horizontal rows and vertical
columns. Each row, column ie a cell contains a unique value and no two rows are
identical with respect to one another.
Relations are commonly referred as tables.. Every column in a database table acts
as attribute since the meaning of the column is same for every row of the database .A row
consists of a set of fields and hence commonly referred as a record.
Properties of Relational Database: The important properties of a relational
database are listed below:
1. A relational database is a collection of relations.
2. The database tables have a row column format.
3. Operators are available either to join or separate columns of the database table.
4. Relations are formed with respect to data only.
5. The tables can be accessed by using simple non-procedural statements.
6. The data is fully independent, that is it will be the same irrespective of the
access path used.
Structure of Relational Database:
Relational database systems are the most common DBMS today. These relational
DBMSs organize data into separate structures called tables, which can be linked via
common information to make data storage more efficient. A relational DBMS has the
following basic components:
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
· fields - a separate piece of information which describe the data item.
· records – collection of fields.
· tables – collection of records.
· database - the collection of tables i.e the complete information.
A relational database consists of a collection of tables, each of which is assigned a
unique name. A row in a table represents a relationship among a set of values.
Consider the EMPLOYEE table as under.
EMPNO EMPNAME DESIGN SALARY
101 CHANUKYA ENGINEER 50000
102 KAVYA DOCTOR 40000
103 RATNAM LECTURER 35000
15. Write any six Codd rules in Relational Model .
A) CODD rules
Edgar F. Codd, proposed thirteen rules (numbered zero to twelve) and said that if
a Database Management System meets these rules, it can be called as a Relational
Database Management System. These rules are called as Codd’s12 rules. Hardly any
commercial product follows all.
0. Single Foundation Rule A RDBMS must manage its stored data using only its relational capabilities.
1. Information Rule
All information in the database should be represented in one and only one way -
as values in a table.
2. Guaranteed Access Rule Each and every datum (atomic value) is guaranteed to be logically accessible by
resorting to a combination of table name, primary key value and column name.
3. Systematic Treatment of Null Values Null values (distinct from empty character string or a string of blank characters
and distinct from zero or any other number) are supported in the fully relational
DBMS for representing missing information in a systematic way, independent of
data type.
4. Dynamic On-line Catalog Based on the Relational Model The database description is represented at the logical level in the same way as
ordinary data, so authorized users can apply the same relational language to its
interrogation as they apply to regular data.
5. Comprehensive Data Sublanguage Rule A relational system may support several languages and various modes of terminal
use. However, there must be at least one language whose statements are
expressible, per some well-defined syntax, as character strings and whose ability
to support all of the following is comprehensible:
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
a. data definition
b. view definition
c. data manipulation (interactive and by program)
d. integrity constraints
e. authorization
f. transaction boundaries (begin, commit, and rollback).
6. View Updating Rule All views that are theoretically updateable are also updateable by the system.
7. High-level INSERT, UPDATE, and DELETE The capability of handling a base relation or a derived relation as a single operand
applies nor only to the retrieval of data but also to the insertion, update, and
deletion of data.
8. Physical Data Independence Application programs and terminal activities remain logically unimpaired
whenever any changes are made in either storage representation or access
methods.
9. Logical Data Independence Application programs and terminal activities remain logically unimpaired when
information preserving changes of any kind that theoretically permit
unimpairment are made to the base tables.
10. Integrity Independence Integrity constraints specific to a particular relational database must be definable
in the relational data sublanguage and storable in the catalog, not in the
application programs.
11. Distribution Independence The data manipulation sublanguage of a relational DBMS must enable application
programs and terminal activities to remain logically unimpaired whether and
whenever data are physically centralized or distributed.
12. Non - subversion Rule If a relational system has or supports a low-level (single-record-at-a-time)
language, that low-level language cannot be used to subvert or bypass the
integrity rules or constraints expressed in the higher-level (multiple-records-at-a-
time) relational language.
16. Explain any three DML commands with examples .
A) insert: The INSERT INTO Statement is used to add new rows of data to a table in
the database.
Syntax:
Insert into <table name> values (value1 , value2 , value3 , ..valueN);
Example: Following statements would create three records in student table:
insert into student values(101 , ‘chanukya’);
insert into student values(102 , ‘kavya’);
insert into student values(101 , ‘satish’);
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
2.select: SELECT statement is used to fetch the data from a database table which
returns data in the form of result table. These result tables are called result-sets.
Syntax:
Select column1 , column2 , column from <table name>;
Here, column1, column2...are the fields of a table whose values you want
to fetch. If you want to fetch all the fields available in the field, then you can use
the following syntax:
Select * from <table_name>
Example1: select * from student;
Then the output will be
Stno stname
------- ---------
101 chanukya
102 kavya
103 satish
Example2: select stname from student;
Stname
---------
chanukya
kavya
satish
Example3: select * from student where stno >=102 ;
Then the output will be
Stno stname
------- ---------
102 kavya
103 satish
3.update: The UPDATE command is used to modify the existing records in a table.
You can use WHERE clause with UPDATE query to update selected rows
otherwise all the rows would be affected.
Syntax:
UPDATE < table name > SET column1 = value1, column2 = value2...., columnN =
valueN WHERE [condition];
Example:
Consider the student table having the following records:
Sql>select * from student;
Stno stname
------- ---------
101 chanukya
102 kavya
103 satish
sql> update student set stname = ‘ratnam’ where stno = 101;
Sql>select * from student;
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
then the output will be as follows
Stno stname
------- ---------
101 ratnam
102 kavya
103 satish
4.delete: DELETE command is used to delete the existing records from a table.
You can use WHERE clause with DELETE query to delete selected rows,
otherwise all the records would be deleted.
Syntax:
Delete from <table name> where [condition] ;
Example:
Sql>select * from student;
then the output will be as follows
Stno stname
------- ---------
101 ratnam
102 kavya
103 satish
Sql>delete from student where stno = 101;
Sql> select * from student;
The output will be as follows
Stno stname
------- ---------
102 kavya
103 satish
17. Explain the control structures in PL – SQL .
A) PL/SQL can process the data using flow of control statements. The flow of control
can be classified into three categories
Conditional Controls
Iterative Controls
Sequential Controls
Conditional Controls: Conditional Statements are three types, those are
A. if statements
B. if then else statements
C. if then else if statements.
A) if statement: Sequence of statements can be executed based on some condition
using the if statement.
Syntax: if <condition> then
Statements;
end if;
B) if then else : Sequence of statements can be executed based on some condition
using the if statement. An else clause in the ‘if then else’ statement defines what is to
be done if the condition is false or null.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Syntax: if <condition> then
Statements;
else
Statement;
end if;
Iterative Controls: These statements are used to execute a particular statement for
repeated number of times.
A. Simple Loop
B. for Loop
C. while Loop
A) Simple Loop: Simple “loop” should be placed before the first statement in the
sequence and the keyword “end loop” after the last statement.
Syntax: loop
Statements;
end loop;
B) for Loop: The “for” loop will be executed for repeated number of times by
automatically declaring loop variable and also loop variable is always incremented by 1.
Syntax: for <variable> in [reverse] start …… end (star=lower bound, end= upper
bound)
loop
Statements;
end loop;
C) while Loop: In while loop the keyword “loop” has to be placed before the first
statement in the sequence statements to be repeated, while the keyword “end loop” will
be placed immediately after the last statement.
Syntax: while<condition>
loop
Statements;
end loop;
Sequential Controls: GOTO: GOTO statement change of the flow of control within PL/SQL block.
Syntax: GOTO<code_block_name>;
18. Explain different stages of software development life cycle in detail .
A. System Development Life Cycle :
The stages involved during System Development Life Cycle are ::
1. Recognition of need
2. Feasibility study
3. Analysis
4. Design
5. Implementation
6. Post implementation and maintenance
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
1. Recognition of need: This gives a clearer picture of what actually the existing
system is. The preliminary investigation must define the scope of the project and
the perceived problems, opportunities and directives that triggered the project.
2. Feasibility Study: The goal of feasibility study is to evaluate alternative system
and to purpose the most feasible and desirable system for development. In the
process of feasibility study, the cost and benefits are estimated with greater
accuracy. If cost and benefit can be quantified, they are tangible ; if not , they are
called intangible.
3. System Analysis: System analysis is an in-depth study of end user information
needs that produces functional requirements that are used as the basis for the
design of a new information system.
4. System Design: System design can be viewed as the design of user interface,
data, process and
system specification .
5. System Implementation: Implementation is the stage where theory is converted
into practical. The implementation is a vital step in ensuring the success of new
systems. Even a well designed system can fail if it is not properly implemented.
6. Post Implementation and Maintenance: Once a system is fully implemented
and being operated
by end user, the maintenance function begins. Systems maintenance is the
monitoring, evaluating and modifying of operational information system to make
desirable or necessary improvements.
(OR)
1. Preliminary Investigation or Requirement Analysis.
2. Determination of information System
3. Design
4.Development of information system.
5. Testing
6. Implementation and Maintenance
1. Preliminary Investigation or Requirement Analysis: Before developing any system
investigation can be considered the project request must be examined to know what the
client needs. The important aspect of the preliminary investigation is the request for
information system feasibility.
2. Determination of information System: Developing information stem is a detailed
understanding of all important facts of the business needs. Analyst working with
employees and managers must study the business process to answer the following
questions.
a) What is being done.
b) How is it being done.
c) What type of transactions (or) decisions take place.
d) Does problem exist
e) If a problem exist, what is the effect.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
f) If a problem exist what is the reason.
3. Design: The most challenging phase of the SDLC is system design. The term design
describes a final system and the process by which it is developed. It refers to the
technical specifications often called logical design called physical design.
4.Development of information system: The system development is based on design
specification. The software developers may install software (or) they write new custom
design programs known as physical design.
5. Testing: The system testing checks the readiness, and accuracy of the system to
access, update and retrieve data from new files.
6. Implementation and Maintenance: It concerned with user training, site preparations
and file conversion. This method lastly but provides assurance against errors in the
candidate system.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
9229
DATA COMMUNICATION AND COMPUTER NETWORKS
Paper II
(English Version)
Time: 3 Hours Max. Marks : 50
SECTION A 10 X 2 = 20
Note: ( i ) Answer ALL questions.
( ii ) Each question carries TWO marks.
1. What is Data Communication ? A) Data Communication : Data communication is the transmission of electronic data
over some media. The media may be cables, microwaves or fiber optics.
Types of data communications are
Point to point communication
Point to multipoint communication
2. What is Computer Network ? A) Computer Network: A computer network is a group of computer systems and other
hardware devices that are linked together through communication channels to facilitate
communication and resource-sharing among a wide range of users.
3. Expand BBN, GAN . A) BBN: Back Bone Networks
GAN: Global Area Networks
4. What are gateways ? A) Gateways: A gateway is a network element that acts as an entrance point to another
network. For example an access gateway is a gateway between telephony network and
other network such as internet. LANs may have component called gateways, which
assists in transferring from one LAN to another LAN.
5. Write any four uses of E – mail . A) Uses of E-Mail are
1. Fast - Messages can be sent anywhere around the world in an instant .
2. Inexpensive - Transmission usually costs nothing, or at the most, very little .
3. Simple - Easy to use, after initial setup.
4. Efficient - Sending to a group can be done in one step .
5. Versatile - Pictures, power-points or other files can be sent too.
6. Printable – The hand copy is easy to obtain. We can correspond and save e-mail
message and also we get electronic copy of message.
6. What is Trojan ?
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
A) Trojan : A Trojan is a malicious application that tricks as a authentic file or helpful
program but whose real purpose is, for example, to grant a hacker unauthorized access to
a computer. Trojan horses may steal information, or harm their host computer systems.
7. Define HTML .
A) HTML stands for Hyper Text Markup Language and it is used to create web pages.
8. What is Frame ?
A) Frame : Frame is used to broken the browser window into multiple regions.
9. Define event Handling . A) Event Handling : An event handler allows you to execute code when an event occurs
10. Define Dom . A) DOM: DOM is "a platform- and language-neutral interface that will allow programs
and scripts to dynamically access and update the content, structure, and style of
documents. The document can be further processed and the results of that processing can
be incorporated back into the presented stage."
SECTION – B 5 X 6 = 30
Note: ( i ) Answer ANY FIVE questions.
( ii ) Each question carries SIX marks.
11. Explain about various communication channels .
A)
The communication channels are
-Coaxial cable
-Twisted pair
-Microwaves
-Fiber optics
1.Coaxial cable: These cables consist of an inner copper wire of varying thickness
surrounded by insulation and other shielding. Their stiffness caused network
administrators difficulty in installing and maintaining thin net and thick net.
A type of wire that consists of a center wire surrounded by insulation and then a
grounded shield of braided wire. The shield minimizes electrical and radio frequency
interference.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Coaxial cabling is the primary type of cabling used by the cable television
industry and is also widely used for computer networks, such as Ethernet. Although more
expensive than standard telephone wire, it is much less susceptible to interference and
can carry much more data.
2.Twisted pair: A Twisted pair consists of two insulated copper wires typically about 1
mm thick. The wires are twisted together in a helical form. The purpose of twisting the
wires is to reduce electrical interference from similar pairs close by. The following figure
illustrates the twisted pair (two parallel wires constitute a simple antenna; a twisted pair
does not).
Twisted pair is the ordinary copper wire that connects home and many business
computers to the telephone company.
3.Microwaves: Microwave communication is a method of transmitting information or
energy by the use of radio waves whose wavelengths are conveniently measured in small
numbers of centimeter; these are called microwaves. This part of the radio spectrum
ranges across frequencies of roughly 1.0 gigahertz (GHz) to 30 GHz.
Microwave radio transmission is commonly used in point-to-point communication
systems on the surface of the Earth, in satellite communications, and in deep space radio
communications. Other parts of the microwave radio band are used for radars, radio
navigation systems, sensor systems, and radio astronomy.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
4.Optical fiber:
An optical fiber is a flexible, transparent fiber made of high quality extruded
glass (silica) or plastic, slightly thicker than a human hair. It can function as a waveguide,
or “light pipe”, to transmit light between the two ends of the fiber.
An Optical fiber cable has a cylindrical shape and consists of three concentric
sections; the core, the cladding and the jacket. The core is the innermost section and
consists of fiber made of glass or plastic. The core has diameter in the range 8-100
micrometers. Each fiber is surrounded by its own cladding, which is a glass or plastic
coating that has optical properties different from those of core. The interface between the
core and the cladding acts as a reflector to confine light that would otherwise escape the
core. The jacket is composed of plastic and other material layered to protect against
moisture, abrasion, crushing and other environmental damage.
Optical fibers are widely used in communications, which permits transmission over
longer distances and at higher bandwidths (data rates) than other forms of
Communication.
Most telephone company long-distance lines are now made of optical fiber.
12. Explain different types of Computer Networks .
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
A) Different types of computer networks
• Depending upon the geographical area covered by a network, it is classified as:
– Local Area Network (LAN)
– Metropolitan Area Network (MAN)
– Wide Area Network (WAN)
– Personal Area Network (PAN)
LAN(Local Area Network):
A LAN is a network that is used for communicating among computer devices, usually
within an office building or home.
Is limited in size, typically spanning a few hundred meters, and no more than a mile
• Is fast, with speeds from 10 Mbps to 10 Gbps
• Requires little wiring, typically a single cable connecting to each device
• Has lower cost compared to MAN’s or WAN’s
•
MAN(Metropolitan Area Network):
• A MAN is a large computer network that usually spans a city or a large campus.
• A MAN is optimized for a larger geographical area than a LAN, ranging from several
blocks of
buildings to entire cities.
• A MAN might be owned and operated by a single organization, but it usually will be
used
by many individuals and organizations.
• A MAN often acts as a high speed network to allow sharing of regional resources.
• A MAN typically covers an area of between 5 and 50 km diameter.
• Examples of MAN: Telephone company network that provides a high speed DSL to
customers and cable TV network.
WAN( Wide Area Network):
• WAN covers a large geographic area such as country, continent or even whole of the
world.
• A WAN is two or more LANs connected together. To cover great distances, WANs
may transmit
data over leased high-speed phone lines or wireless links such as satellites.
• Multiple LANs can be connected together using devices such as bridges, routers, or
gateways, which enable them to share data.
• The world's most popular WAN is the Internet.
PAN(Personal Area Network):
• A PAN is a network that is used for communicating among computers and computer
devices (including telephones) in close proximity of around a few meters within a room
• It can be used for communicating between the devices themselves, or for connecting to
a larger
network such as the internet.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
• PAN’s can be wired or wireless
• A personal area network (PAN) is a computer network used for communication among
computer devices, including telephones and personal digital assistants, in proximity to an
individual's body.
• The devices may or may not belong to the person in question. The reach of a PAN is
typically a few meters.
13. Explain any three Network Topologies .
A)
Diagram Kind of
Topology Description, Advantages, and Disadvantages
Ring
Description:
Devices are connected from one to another to form a
ring shape.
Each host is connected to the next and the last node
is connected to the first.
A data token1 is used to grant permission for each
computer to communicate.
Advantages:
Easy to install and wire.
Because every computer is given equal access to the
token, no one computer can monopolize the
network.
Disadvantages:
Requires more cable than a bus topology.
If one computer fails it can affect the whole
network.
It is difficult to identify the problem if the entire
network shuts down.
Bus
Description:
All hosts are connected to the backbone cable in a
linear2 fashion.
Advantages:
Easy to connect a computer or peripheral.
Requires less cable length than a star topology.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Disadvantages:
If there is a break in the backbone cable, the entire
network shuts down.
Both ends of the backbone cable require terminators.
It is difficult to identify the problem if the entire
network shuts down.
Star
Description:
All hosts are connected to a single point of
concentration.
Usually uses a hub3 or switch4 as a center node.
Range limits are about 100 meters from the hub
Data on a star network passes through the hub or
concentrator before continuing to its destination.
Advantages:
It is easy to modify and add new computers to a star
network without disturbing the rest of the network.
If one node or workstation (beside the middle node)
goes down, the rest of the network will still be
functional.
The center of a star network is a good place to figure
out where the network faults are located.
You can use several cable types in the same network
if the hub you have can handle multiple cable types.
Disadvantages:
Requires more cable than a bus topology.
If the middle node goes down , then the entire
network goes down.
It is more expensive than because all cables must be
connected to one central point.
Tree
Description: One "root" node connects to other nodes,
which in turn connect to other nodes, forming a tree
structure. Information from the root node may have to pass
through other nodes to reach the end nodes.
Advantages:
• Point-to-point wiring for individual segments.
• Supported by several hardware and software vendors.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
• All the computers have access to the larger and their
immediate
networks.
Disadvantages:
• Overall length of each segment is limited by the type of
cabling used.
• If the backbone line breaks, the entire segment goes down.
• More difficult to configure and wire than other topologies.
Mesh
Description:
Each host is connected to all the other hosts.
Advantages:
Increased reliability since there are multiple paths
for each node to take.
Increased speed since shortcuts have been created by
add more cables/links.
Disadvantages:
The cost of cabling all the hosts together is
expensive and time consuming.
14. Explain briefly about any three LAN components .
A) 1. Server: A server is a computer in a network that shared by multiple users. There
are many kinds of servers in dedicated server networks. For example, file servers, printer
servers, and communication servers etc.,
2.Client : In a computer network, the client computer is the requesting machine from the
supplying machine, server.
3. NIC: The Network Interface Card (NIC) is a printed circuit board that plugs into a
network server and client computers. It enables the computer to be physically connected
to the network cable, which provides the physical layer connection among the computers
in the network.
15. Explain any three Web Browsers .
A) Web Browsers:
1. Internet Explorer
It was developed by Microsoft in 1994 and released in 1995 as a supportive package to
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Microsoft Windows line of operating systems. According to statistics, its usage share
from 1999 to 2003-04 was around 95%. Microsoft occasionally releases updates for the
previous versions of IE, which have some enhanced capabilities. IE has come up a
preview release of Internet Explorer 11.
Features: There are regular Microsoft updates that IE supports. Favicon allows an image
to be used as a bookmark. It supports Integrated Windows Authentication. It’s icon is as
follows.
2. Mozilla Firefox
It is owned by Mozilla Corporation and was the result of an experimentation. 'Mozilla
Firefox' was officially announced in February 2004. It was earlier named Phoenix,
Firebird, and eventually Firefox. It is the second-most famous browser after Internet
Explorer, as there were around 100 million downloads within a year of its release. Until
November 2008, 700 million downloads were recorded.
Features: As it is an open source software, it allows everyone to access the code. It
supports tabbed browsing that allows the user to open multiple sites in a single window.
Session storage is also an important feature of Firefox, which allows the user to regain
access to the open tabs after he has closed the browser window. It’s icon is as follows.
3. Google Chrome
This web browser was developed by Google. Its beta and commercial versions were
released in September 2008 for Microsoft Windows.
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
Features: The main standout feature is the malware and phishing warning that the
browser suggests when the user wants to browse a site. Also, there is a user tracking
option available withChrome. It’s icon is as follows.
16. Write the structure of an HTML Program .
A) Structure of an HTML Program.
In every HTML program has a rigid structure. The entire web page is enclosed within
<HTML> </HTML> tags. Within these tags two separate sections are created using the
<HEAD> </HEAD> tags and the <BODY> </BODY> tags. These sections are described
below.
1. < Head> tag
Information placed in this section is essential to the inner workings of the document and
has nothing to do with the content of the document. With the exception of information
contained within the <TITLE> </TITLE> tags, all information placed within the
<HEAD> </HEAD> tags is not displayed in the browser. The HTML tags used to
indicate the start and end of the head section are:
<HEAD>
<TITLE> </TITLE>
</HEAD>
The <TITLE> tag sets the title of the document which will be displayed in the title bar of
the browser window.
2. < Body> tag
The tags used to indicate the start and end of the main body of textual information are:
<BODY>
</BODY>
Page defaults like background color, text color, font size, font weight and so on can be
specified as attributes of the <BODY> tag. The attributes that the <BODY> tag takes are:
bgcolor, background, text, etc.,
Example
<html>
<head>
<title>
First Page
</title>
</head>
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
<body>
This is My First Web Page
</body>
</html>
17. Define a list Explain various types of lists used in HTML .
A)
LISTS:
Lists are used to list out items, subjects or menu in the form of a list. HTML gives you
three different types of lists.
<ul> - An unordered list. This will list items using bullets
<ol> - A ordered list. This will use different schemes of numbers to list your items
<dl> - A definition list. This is arrange your items in the same way as they are
arranged in a dictionary.
HTML Unordered Lists:
This list is created by using <ul> tag. Each item in the list is marked with a bullet. The
bullet itself comes in three styles: squares, discs, and circles. The default bullet displayed
by most web browsers is the traditional full disc.
Example:
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
This will produce following result:
You can use type attribute to specify the type of bullet you like. By default its is a disc.
Following are the possible way:
2.HTML Ordered Lists:
This list is created by using <ol> tag. Each item in the list is marked with a number. By
default The numbering starts from one and is incremented by one.
example:
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
This will produce following result:
You can use type attribute to specify the type of numbers you like. By default its is a
generic numbers. Following are the other possible way:
3.HTML Definition Lists:
Definition List makes use of following three tags.
<dl> - Defines the start of the list
<dt> - A term
<dd> - Term definition
</dl> - Defines the end of the list
Example:
Prepared by VRKS SASTRY TANIKELLA MARCH 2016
CJL in CSE, GJC, KOTHAPETA, E.G.Dt.
This will produce following result:
18. Write the differences between HTML and DHTML .
A)
Differences between HTML and DHTML HTML
1. HTML means Hyper Text Markup Language.
2. It is referred as a static HTML and static in nature.
3. A plain page without any styles and Scripts called as HTML.
DHTML
1. DHTML means Dynamic Hyper Text Markup Language.
2. It is referred as a dynamic HTML and dynamic in nature.
3. A page with HTML, CSS, DOM and Scripts called as DHTML.