[go: up one dir, main page]

0% found this document useful (0 votes)
24 views6 pages

Hse 1 Computer Application Key em Final

This document provides the answer key for the HSE First Year Examination in Computer Applications for March 2024, detailing the correct answers for multiple-choice questions, short answer questions, and long answer questions. It includes instructions for evaluation and specifies the maximum marks for each part of the exam. The document covers various topics related to computer applications, including functions of the control unit, operating systems, HTML, and cybercrime.

Uploaded by

ruthaveltabi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views6 pages

Hse 1 Computer Application Key em Final

This document provides the answer key for the HSE First Year Examination in Computer Applications for March 2024, detailing the correct answers for multiple-choice questions, short answer questions, and long answer questions. It includes instructions for evaluation and specifies the maximum marks for each part of the exam. The document covers various topics related to computer applications, including functions of the control unit, operating systems, HTML, and cybercrime.

Uploaded by

ruthaveltabi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

DIRECTORATE OF GOVERNMENT EXAMINATIONS, CHENNAI-6.

HSE FIRST YEAR EXAMINATION, MARCH - 2024


COMPUTER APPLICATIONS - ANSWER KEY

NOTE:
1. Answer written in BLACK or BLUE ink pen should be evaluated.
2. Choose the correct answer and write the option code.
3. In one of them (option or answer) is wrong, then award zero mark only.

Maximum Marks : 70
PART - I
Answer All Questions : 15×1=15

S.No. Option Answer Mark


1 (d) RAM 1
2 (b) 32 1
3 (b) Pentium IV 1
4 (b) ext2 1
5 (c) Format 1
6 (c) 625 1
7 (d) F5 1
8 (a) WLAN 1
9 (d) <body> 1
10 (b) Name 1
11 (d) SVG 1
12 (d) Dynamic Hyper Text Markup Language 1
13 (c) switch 1
14 (c) Local variable 1
15 (d) Decryption 1

1|Page
PART – II
Answer Any Six Questions.
Question No. 24 is compulsory 6×2=12

Q.No ANSWER Marks


16 Funtions of Control unit: 2
• The control unit controls the flow of data between the CPU, memory and
I/O devices.
(OR)
• It also controls the entire operation of a computer.
17 (46)10 = (101110)2 2

18 Any Two Operating Systems. 2


19 Any Two valid differences. 2
20 Design already created as the basis for a new presentation.
2
(or)
Premade design used to create a new presentation
21 Phishing:
Phishing is a type of computer crime used to attack, steal user data, including 2
login name, password and credit card numbers etc through emails.
(or)
Phishing scams are fraudulent attempts by cyber criminals to obtain private
information.
22 Three Lists in HTML:
1. Numbered List / Ordered List 2
2. Un-numbered List / Unordered List
3. Definition List
23 Tamil Search engines: 2
1. Google
2. Bing
(OR)
Any Two suitable Search Engine names.
24 Cyber crime:
A cybercrime is a crime which involves computer and network.
(OR) 2
Cybercrime is an intellectual, white-collar crime. Those who commit such
crimes generally manipulate the computer system in an intelligent manner.

2|Page
PART – III
Answer Any Six Questions.
Question No. 33 is compulsory 6×3=18

Q.No ANSWER Marks

25 Classification of Microprocessors based on Instruction Set:


• Reduced Instruction Set Computers (RISC) 1½
• Complex Instruction Set Computers (CISC) 1½
26 Method I:
• Open Computer Icon, File → New → Folder 1½

Method II:

• On the Desktop, right click → New → Folder.
(OR)
(Any other Two suitable methods)
27 = (A1+A2+A3) / 3 (Or) = AVERAGE(A1:A3) (Or) = SUM(A1:A3) / 3
(OR) 3
(Any other valid Formula)
28 dir attribute : 1½
specifies the direction of the text to be aligned within the entire
document. It is global attribute.
lang attribute : 1½
specify the language used within the document. Predefined language
code will be used for this purpose.
29 Method:
Method attribute of the form tag is used to identify how the form element 1½
names and values will be sent to the server.
Action:
The action attribute identifies the server side program or script that will 1½
process the form.
30 Advantages of CSS:
1. Maintainability 1
2. Reusability
3. Easy to understand

For explanation of the above 2

3|Page
Q.No ANSWER Marks
31 1. Strings, 2. Numbers, 3. Booleans. 1

String : A string is a list of characters.


Numbers : Numbers can be integer or floating-point numerical value 2
Boolean : Boolean can be any one of two values: true or false.
Function:
32 A function is a block of JavaScript code that is defined once but may be 1½
executed or invoked any number of times.

JavaScript supports two types of functions.


• Pre-defined or Library Functions 1½
• User-defined Functions
33
(a) 1000001012 (or) 000001012 (or) 1012 1½

(b) 1001012 (or) 001001012 1½

PART– IV
Answer All Questions 5×5=25

Q.No ANSWER Marks


34 I. Bar Code / QR Code Reader 2
(a)
II. Inkjet Printers 2
III. Multimedia Projectors 1
(with brief explanation)
(OR)
(b) 1. Programmable Read Only Memory(PROM)
2. Erasable Programmable Read Only Memory (EPROM) 2
3. Electrically Erasable Programmable Read Only Memory (EEPROM)

Brief explanation of the above 3


35 Header: is a section of the document that appears in the top margin. 1½
(a)
Footer: is a section of the document that appears in the bottom margin. 1½

Inserting page numbers:


• Place the insertion pointer in the footer area. 2
• Insert → Fields → Page Number
(OR)

4|Page
Q.No ANSWER Marks
35 Five types of Internet Services:
(b) (Any five) 2
1. Wireless
2. Mobile
3. Hotspots
4. Broadband
5. DSL
6. Cable
7. Satellite
8. ISDN
9. Dongles / Data Card
(Explain any 5) 3

36 Points to be noted while creating User Interface:


(a) 1. Enable the user to retain this expertise for a longer time.
2. Satisfy the customer based on their needs.
3. Save user’s precious time. 5
4. Satisfy the customer.
5. Reduce number of errors committed by the user.

(OR)
(b)
(i) (58.46)10 = (111010.0111….)2 3

(ii) (1) 1’s Complement of (-24) = (11100111)2


2’s Complement of (-24) = (11101000)2 1

(2) 1’s Complement of (-65) = (10111110)2


2’s Complement of (-65) = (10111111)2 1

5|Page
Q.No ANSWER Marks

37 Links:
(a) Link is an important feature of HTML to connect web resources.
(OR)
Link in HTML is used to create hyperlinks to web content. 2
(OR)
Make connection with a part of content of same document or an external
document.

Types of Links: 1
1. Internal Links
2. External Links
2
Explanation of the above types
(OR)
(b) JavaScript supports three kind of popup boxes:
• Alert box 1
• Confirm box
• Prompt box.

Explanation of the above. 4

38 The different ways of finding a file or folder (2 ways):


(a) 1. Using search box – Brief explanation. 2½
2. Using computer icon – Brief explanation. 2½
(OR)
Any two suitable methods

(OR)
(b) Different types of cyber attacks:
1. Virus 2
2. Worms
3. Spyware
4. Ransomware

Explanation of the above. 3

6|Page

You might also like