Computer Science – XI

Second Term Examination  |  Marks: 50  |  Time: 3 Hrs

JAI BAJRANG
Jr. COLLEGE
KUMBHARI
Q.1.(A) — Select the correct alternative  (4 marks)

(1) ASCII code is basically  (iii) 7 bit code

Reason: ASCII uses 7 bits → can represent 2⁷ = 128 characters.

(2) Pseudo code is used in  (ii) Program design

Reason: Pseudo code is written during the design phase to plan the logic before coding.

(3) FTP is  (i) File Transfer Protocol

(4) When multiple computers are capable of processing then it is  (ii) Distributed computing

Q.1.(B) — Answer any TWO  (6 marks)
(a) What is Program Design?

Program design is the process of planning the solution to a problem before writing actual code. It involves breaking the problem into smaller logical steps and deciding how each step will be solved.

Tools used in program design:

  • Algorithm – step-by-step logical instructions
  • Flowchart – graphical representation of logic
  • Pseudo code – English-like description of program logic

Importance: Good program design reduces errors, saves time, and makes coding easier.

(b) Solve the following

i) (2CBA)₁₆ = ( ? )₂

Convert each hexadecimal digit to its 4-bit binary equivalent:

HexBinary
20010
C1100
B1011
A1010
∴ (2CBA)₁₆ = 0010 1100 1011 1010 ₂

ii) (1101101.1101)₂ = ( ? )₁₆

Group bits in sets of 4 from the decimal point (left = integer, right = fraction):

Integer part: 1101101 → group from right → 0110 1101 → 6 D Fraction part: .1101 → D ∴ (1101101.1101)₂ = 6D.D ₁₆
∴ (1101101.1101)₂ = 6D.D₁₆
(c) What are Algorithms?

An algorithm is a finite, well-defined, step-by-step set of instructions written to solve a particular problem.

Properties of an Algorithm:

  1. Input – Takes zero or more inputs
  2. Output – Produces at least one output
  3. Definiteness – Each step is clear and unambiguous
  4. Finiteness – Must end after a finite number of steps
  5. Effectiveness – Each step must be simple and practically executable
Q.2.(A) — Answer any TWO  (6 marks)
(a) Convert (1F8)₁₆

i) (1F8)₁₆ = ( ? )₂

HexBinary
10001
F1111
81000
∴ (1F8)₁₆ = 0001 1111 1000 ₂

ii) (1F8)₁₆ = ( ? )₁₀

= 1 × 16² + F × 16¹ + 8 × 16⁰ = 1 × 256 + 15 × 16 + 8 × 1 = 256 + 240 + 8 = 504
∴ (1F8)₁₆ = 504₁₀
(b) What is Transmission Medium?

A transmission medium is the physical or wireless path through which data travels from sender to receiver in a network.

Types:

  1. Wired (Guided):
    • Twisted Pair Cable – used in telephone and LAN
    • Coaxial Cable – used in cable TV
    • Optical Fiber – uses light; very high speed
  2. Wireless (Unguided):
    • Radio Waves – used in FM, Wi-Fi
    • Microwave – used in long-distance communication
    • Satellite – covers large areas globally
    • Infrared – short-range (TV remote)
(c) What is Centralized Computing? Explain.

Centralized computing is a type of computing in which all processing is done by one central, powerful computer (usually a mainframe or server). Other terminals (called dumb terminals) are connected to this central computer.

The terminals only send requests and display results — they do no processing themselves.

Advantages:

  • Easy to manage and maintain
  • All data is stored in one place (centralized control)
  • Better security

Disadvantages:

  • If central computer fails, the entire system stops working
  • Heavy load on the central computer
Q.2.(B) — Answer any ONE  (4 marks)
(a) Explain: (i) ASCII    (ii) BCD

i) ASCII (American Standard Code for Information Interchange):

  • ASCII is a 7-bit character encoding standard.
  • It can represent 2⁷ = 128 characters including letters, digits, and symbols.
  • Example: 'A' = 65 in decimal = 1000001 in binary.
  • Used to store and transmit text in computers.

ii) BCD (Binary Coded Decimal):

  • In BCD, each decimal digit is separately converted to its 4-bit binary equivalent.
  • Example: 25 in BCD = 0010 0101
  • Used in calculators and digital displays.
(b) Describe with example: (i) WWW    (ii) E-Commerce

i) WWW (World Wide Web):

  • The WWW is a system of interlinked hypertext documents accessed over the internet using a browser.
  • It was invented by Tim Berners-Lee in 1989.
  • Example: Visiting www.google.com – your browser loads a web page stored on a server.

ii) E-Commerce (Electronic Commerce):

  • E-Commerce means buying and selling of goods and services over the internet.
  • Types: B2B (Business to Business), B2C (Business to Consumer), C2C (Consumer to Consumer).
  • Example: Amazon, Flipkart – users browse products, place orders, and pay online.
Q.3.(A) — Answer any TWO  (6 marks)
(1) What is Networking? Explain what is Protocol.

Networking: Networking means connecting two or more computers together using communication links so they can share data and resources (printers, internet, etc.).

Types of Networks:

  • LAN – Local Area Network (within a building)
  • MAN – Metropolitan Area Network (a city)
  • WAN – Wide Area Network (countries/worldwide)

Protocol: A protocol is a set of rules that governs communication between computers in a network. It ensures data is sent and received correctly.

Examples of Protocols: TCP/IP, HTTP, FTP, SMTP, POP3.

(2) Solve the following conversions

i) (A9B)₁₆ = ( ? )₁₀

= A × 16² + 9 × 16¹ + B × 16⁰ = 10 × 256 + 9 × 16 + 11 × 1 = 2560 + 144 + 11 = 2715
∴ (A9B)₁₆ = 2715₁₀

ii) (0011011101)₂ = ( ? )₁₀

= 0×2⁹ + 0×2⁸ + 1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 1×2³ + 1×2² + 0×2¹ + 1×2⁰ = 0 + 0 + 128 + 64 + 0 + 16 + 8 + 4 + 0 + 1 = 221
∴ (0011011101)₂ = 221₁₀

iii) (3905)₁₀ = ( ? )₁₆

3905 ÷ 16 = 244 remainder 1 244 ÷ 16 = 15 remainder 4 15 ÷ 16 = 0 remainder 15 → F Read remainders from bottom to top: F, 4, 1
∴ (3905)₁₀ = F41₁₆

Verification: 15×256 + 4×16 + 1 = 3840 + 64 + 1 = 3905 ✓

(3) What is E-Mail?

E-Mail (Electronic Mail) is a method of sending and receiving messages digitally over the internet. It allows users to send text, files, and attachments instantly to any person with an email address.

Components of E-Mail:

  • Sender's email address
  • Receiver's email address
  • Subject, Body, and Attachments

Protocols used:

  • SMTP (Simple Mail Transfer Protocol) – for sending email
  • POP3 / IMAP – for receiving email

Example: yash@gmail.com

Q.3.(B) — Solve any ONE  (4 marks)
(1) Advantages of Collaborative Computing
  1. Multiple users can work on the same project simultaneously from different locations.
  2. Improves productivity and reduces the time to complete tasks.
  3. Resources such as files, printers, and internet are shared easily.
  4. Easy communication through email, video conferencing, and messaging tools.
  5. Helps in decision making as different people can contribute ideas.
  6. Cost-effective as resources are shared among users.
(2) Convert the following

i) (98.58)₁₀ = ( ? )₂

Integer part – 98: 98 ÷ 2 = 49 r 0 49 ÷ 2 = 24 r 1 24 ÷ 2 = 12 r 0 12 ÷ 2 = 6 r 0 6 ÷ 2 = 3 r 0 3 ÷ 2 = 1 r 1 1 ÷ 2 = 0 r 1 Reading remainders bottom to top: 1100010 Fractional part – 0.58: 0.58 × 2 = 1.16 → 1 0.16 × 2 = 0.32 → 0 0.32 × 2 = 0.64 → 0 0.64 × 2 = 1.28 → 1 0.28 × 2 = 0.56 → 0 0.56 × 2 = 1.12 → 1 Fraction bits: .100101
∴ (98.58)₁₀ ≈ 1100010.100101₂

ii) (2E.8)₁₆ = ( ? )₁₀

= 2 × 16¹ + E × 16⁰ + 8 × 16⁻¹ = 2 × 16 + 14 × 1 + 8 ÷ 16 = 32 + 14 + 0.5 = 46.5
∴ (2E.8)₁₆ = 46.5₁₀
Q.4.(A) — Answer any TWO  (6 marks)
(1) Characteristics of an Algorithm
  1. Input: An algorithm takes zero or more inputs from the user.
  2. Output: It must produce at least one output or result.
  3. Definiteness: Every step must be clear, precise, and unambiguous.
  4. Finiteness: The algorithm must end after a finite number of steps.
  5. Effectiveness: Each step must be basic, simple, and practically possible to execute.
(2) What is Pseudo Code?

Pseudo code is an informal, English-like description of a program's logic. It is not written in any specific programming language — it uses simple English statements to describe steps.

Features:

  • Easy to understand by non-programmers
  • Used in program design phase
  • No special syntax rules — just simple logic

Example (Find if a number is positive or not):

START READ num IF num > 0 THEN PRINT "Number is Positive" ELSE PRINT "Number is not Positive" END IF END
(3) Double-Double Method (with example)

The double-double method is used to convert a binary number to decimal. Start from the leftmost bit, double it, and add the next bit. Repeat until all bits are used.

Example: (1101)₂ = ( ? )₁₀

Step 1: Start with leftmost bit = 1 Step 2: Double it and add next bit → 1×2 + 1 = 3 Step 3: Double and add next bit → 3×2 + 0 = 6 Step 4: Double and add next bit → 6×2 + 1 = 13
∴ (1101)₂ = 13₁₀

Verification: 1×8 + 1×4 + 0×2 + 1×1 = 8+4+0+1 = 13 ✓

Q.4.(B) — Solve any ONE  (4 marks)
(1) What is a Flowchart? Explain in detail.

A flowchart is a graphical or diagrammatic representation of the steps of an algorithm or program using standard symbols connected by arrows.

Standard Flowchart Symbols:

SymbolShapeUse
TerminalOvalStart / End of program
Input/OutputParallelogramREAD or PRINT operations
ProcessRectangleCalculations / assignments
DecisionDiamondConditions / branching (Yes/No)
Flow linesArrowsShow direction of flow
(2) Subtraction using 2's Complement

i) 1010 − 101

101 written as 4-bit: 0101 1's complement of 0101 = 1010 2's complement = 1010 + 1 = 1011 1010 + 1011 ────── 10101 ← carry (discard it) 0101
∴ 1010 − 101 = 0101₂ = 5₁₀    (Since 10 − 5 = 5 ✓)

ii) 1001 − 1110

1's complement of 1110 = 0001 2's complement = 0001 + 1 = 0010 1001 + 0010 ────── 1011 ← No carry → result is NEGATIVE 2's complement of 1011 = 0101
∴ 1001 − 1110 = −0101₂ = −5₁₀    (Since 9 − 14 = −5 ✓)
Q.5.(A) — Answer any TWO  (6 marks)
(1) Advantages of Flowchart
  1. Makes the logic of a program easy to understand visually.
  2. Helps in detecting errors (debugging) in the program logic.
  3. Acts as a guide during coding — programmer follows the flowchart.
  4. Useful for documentation — others can understand the program easily.
  5. Helps in communication between team members working on the same project.
  6. Simplifies complex logic into clear, understandable steps.
(2) What is Client-Server Network?

In a client-server network, computers are divided into two roles:

  • Server: A powerful computer that stores data and provides services (files, internet, printers) to other computers.
  • Client: A computer that requests services from the server.

Features:

  • Centralized control and management
  • Better security — data is stored on the server
  • Easy to add more clients (scalable)
  • If the server fails, clients cannot access resources
(3) What is Distributed Computing?

In distributed computing, processing is spread across multiple computers connected through a network. Each computer handles part of the task simultaneously, and the results are combined.

Advantages:

  • Fault tolerant – if one computer fails, others continue working
  • Faster processing due to parallel computation
  • Easily scalable by adding more computers
  • Efficient use of resources
  • No single point of failure
Q.5.(B) — Answer any ONE  (4 marks)
(1) Difference between LAN and WAN
PointLANWAN
Full FormLocal Area NetworkWide Area Network
Coverage AreaSmall (room / building)Large (country / world)
SpeedHigh (100 Mbps – 1 Gbps)Lower speed
CostLow setup costHigh setup cost
MaintenanceEasyComplex
Error RateLowHigher
ExampleSchool or office networkThe Internet
(2) Binary A = 11010, B = 01100 — Find A+B and A−B

i) A + B = ?

11010 (= 26₁₀) + 01100 (= 12₁₀) ─────── 100110 (= 38₁₀)
∴ A + B = 100110₂ = 38₁₀

ii) A − B = ?  (using 2's complement method)

1's complement of B (01100) = 10011 2's complement = 10011 + 1 = 10100 11010 + 10100 ─────── 101110 ← carry (discard it) 01110
∴ A − B = 01110₂ = 14₁₀    (Since 26 − 12 = 14 ✓)
✦ ✦ ✦