IICT Fall 2021 Part B

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

CA

Question 1 [3 + 3 + 3 + 3 + 3 = 15 Marks]

a) List steps to enter the table of contents

b) What is an IP address? What is the significance of an IP address?

An IP address is a unique address that identifies a device on the internet or a local


network. IP stands for "Internet Protocol," which is the set of rules governing the
format of data sent via the internet or local network.
The purpose of an IP address is to handle the connection between devices that send
and receive information across a network. The IP address uniquely identifies every
device on the internet; without one, there's no way to contact them.

c) State the difference between the “Two Content” slide and a “Comparison slide” in
PowerPoint

Page 1 of 12
d) What are the main reasons behind a computer virus? List all the major sources of viruses.

e) What is the difference between a “tag” and an “element” in HTML?

HTML Tags: Tags are the starting and ending parts of an HTML element. They
begin with < symbol and end with > symbol. Whatever written inside < and >
are called tags.

Example: <b> </b>

HTML elements: Elements enclose the contents in between the tags. They
consist of some kind of structure or expression. It generally consists of a
start tag, content and an end tag.

Example: <b>This is the content.</b>

Question 2 [8 + 4 + 6 = 18Marks]

a) Fill in the missing Information in the table below about Database:

Example: Statement: ________Alter______                       Type: _________DDL_______

Statement: _______INSERT_______ Type: _________DML_____________

Statement: _CREATE/DROP/ALTER__ Type: ________DDL__________

Statement: _______ALTER_______ Type: _________DDL_____________

Statement: __ GRANT/REVOKE___ Type: ________DCL__________

Statement: _______DELETE_______ Type: ________DML____________

Statement: ___ GRANT/REVOKE__ Type: ________DCL__________

Statement: __INSET/UPDATE/DELETE_ Type: ________DML__________

Statement: _______DROP_________ Type: ________DDL___________

Page 2 of 12
b) Define the following terms with the help of at least one examples:

1. Meta-data.

The dictionary or catalog stores information about the database itself This is data
about data or ‘metadata’

2. Unstructured Data.

Very limited indication of data type E.g., a simple text document

3. Semi-structured Data.

Data may have certain structure but not all information collected has identical
structure Some attributes may exist in some of the entities of a particular type but not
in others

4. Tuples

Tuples are the rows of any tables, Information is stored as tuples or records in
relations or tables.

c.) Haya is a resident of Islamabad and has to access the website


https://scikit-learn.org/stable/modules/generated/sklearn.neighbors.KNeighborsClassifier.ht
ml using the internet services of Nayatel. 

1. What is a URL?

2. What is the type of protocol in the above example?

3. Identify the Domain name?

4. Identify the path and file name?

Page 3 of 12
5. Who is the internet service provider?

6. What is the purpose of Uniform Resource Locators?

Question 3 [5+5+5=15Marks]

Read the given scenario carefully and answer the questions accordingly:

A waiter takes an order at a table, and then enters it online via one of the six terminals located in the
restaurant dining room. The order is routed to a printer in the appropriate preparation area: the cold
item printer if it is a salad, the hot item printer if it is a hot sandwich, or the bar printer if it is a drink.
A customer’s meal check-listing (bill) the items ordered and the respective prices are automatically
generated. This ordering system eliminates the old three-carbon-copy guest check system as well as
any problems caused by a waiter’s handwriting. When the kitchen runs out of a food item, the cooks
send out an ‘out of the stock message, which will be displayed on the dining room terminals when
waiters try to order that item. This gives the waiters faster feedback, enabling them to give better
service to the customers. Other systems feature aid management in the planning and control of their
restaurant business. The system provides up-to-the-minute information on the food items ordered and
breaks out percentages showing sales of each item versus total sales. This helps management plan
menus according to customers’ tastes. The system also compares the weekly sales totals versus food
costs, allowing planning for tighter cost controls. In addition, whenever an order is voided, the reasons
for the void are keyed in. This may help later in management decisions, especially if the voids are
consistently related to food or service. Acceptance of the system by the users is exceptionally high
since the waiters and waitresses were involved in the selection and design process. All potential users
were asked to give their impressions and ideas about the various systems available before one was
chosen.

Questions:
1. What type of system has been used in the above-mentioned scenario, define it briefly? Comment
what could be done better.

Page 4 of 12
2. Identify different components of the information system discussed in the given scenario and
assign them proper categories.

3. Information system has their effect on society. Discuss what type of effect the above-mentioned
system has on its customers?

Question 4 [5 + 5 =10 Marks]

Considering the scenario given in the image and answer the questions below:

Page 5 of 12
Scenario 1:

You can see a Local network containing Jasmine, Jon, Nick and Alice’s machines. Nick and Alice try
to send a message to Jasmine at the same time which results in a collision. In the network Exponential
backoff is applied to resolve the collisions. What happens when the collision happens? Briefly explain
the given scenario:

In an Exponential backoff at each collision the waiting time is increased. When the collision happens a
random time slot let's say 10 seconds for Nick and 15 seconds for Alice is added to resolve the collision.
If the collision happens again the waiting time will be increased again. Let's say instead of 15 seconds Alice
has to wait for 25 seconds.

Scenario 2:

You can see a data packet that is being sent from Nick’s machine to a website codingbat.com Describe
in detail the life cycle of this data packet. Mention all the protocols and paths involved. When Nick
writes the address codingbat.com in the browser what steps are involved before the packet is sent out
to the Router. 

Page 6 of 12
Just check that the students have mentioned and described correctly about Domain name server, IP address,
MAC Address and Routing of the data packet forms source to destination.

Question 5 [12 Marks]

 Convert the following number systems. 

Decimal Binary Octal Hexa-decimal

33 100001 41 21

2.5625 10.1001 2.44 2.9

449 111000001 701 1C1

447 110111111 677 1BF

Question 6 [8 + 7 = 15 Marks]

a) Complete the following table:

Page 7 of 12
Solution:

++

Page 8 of 12
b) Write down the excel formula for assigning grades, the criteria will be the number of
complaints that are lodged against the customer service center. This means the fewer the
complaints; the more is the quality of service. i.e., 

Fill the following table given below by assigning grades;

Page 9 of 12
Question 7 [5 +10 = 15 Marks]

a. Carefully understand the HTML and CSS code and draw the output

HTML :

CSS:

Page 10 of 12
Solution:

Page 11 of 12
b. Carefully understand the HTML code and draw the output

Solution

Page 12 of 12

You might also like