1

fy;tpg; nghJj;juhju cah;jug; guPl;ir> Kd;Ndhbf; fUj;juq;F – 2012 khjpup tpdhj;jhs; : jfty; njhlh;ghly; njhopy;El;gk; II B jahupj;J ntspapLtJ : fy;tp mikr;R mwpTWj;jy;fs;:  vitNaDk; ehd;F tpdhf;fis njupT nra;J tpilaspf;Ff. gFjp B (1)

(a) fzpdpapd; epidtfkhdJ mopjF epidtfk; (Volatile)> mopTwh epidtfk; (Nonvolatile) vd ,U tifg;gLk;. ,tw;Ws; mopjF epidtfj;jpd; gpujhd $Wfs; %d;wpid Fwpg;gpl;L> mtw;wpd; %yk;
A

B

C

D

(ABCD )

[,uz;lhk; gf;fk; ghh;f;f

2

(i) Nkw;fhl;lg;gl;Ls;s ju;f;fr;Rw;wpy; midj;J AND Eiothapy;fspdJk; tUtpisT 1 vdf; fUjp cz;ik ml;ltizia tbtikf;Ff. (ii) cz;ik ml;ltizapd; gb ju;f;fr;Rw;wpd; tUtpistpid fhl;Ltjw;fhd jh;f;ff; Nfhitapid vOJf. (iii) NkNy (ii) ,y; ck;khy; jug;gl;l jh;f;ff; Nfhitapid> G+ypad; (Boolean) ml;ruf;fzpjk; %yk; my;yJ fhu;dh ml;ltiz (K map) %yk; RUf;Ff. (iv) NkNy (ii) ,y; ngwg;gl;l jh;f;ff; Nfhitapid $l;Lj; njhiffspd; ngUf;fkhf (POS) khw;Wf. (v) NkNy %d;wpy; RUf;fpg; ngw;Wf;nfhs;sg;gl;l juf;ff; Nfhitf;fhd ju;f;fr;Rw;wpid tiuf. (2)

(a) juT gupkhw;wj;jpd; mbg;gilapy;> Nfhg;G gupkhw;w newpKiwf;Fk; (FTP) kPAiu gupkhw;w newpKiwf;Fk; (HTTP) ,ilapyhd NtWghl;ilj; jUf. (b) fPo;jug;gl;Ls;s $Wfspd; njhopw;ghl;bid tpsf;Ff. (i) upg;gPl;lu;(Repeater) (ii) Bridge (c) tFg;Gs;s IP tpyhrj;jpidg; gad;gLj;Jtij tpl (cassfull IP address) tFg;gw;w IP tpyhrj;jpid (classless IP address) gad;gLj;Jtw;fhd %y fhuzk; ahJ? (d) xU epWtdkhdJ fPo;tUk; IP tpyhrq;fis gad;gLj;Jkhapd; mit xt;nthd;wpdJk; tFg;G (class)> tiyaikg;G tpyhrk; (network address) kw;Wk; cgtiy kiwg;G (subnet mask) vd;gtw;iw vOJf.

IP tpyhrk;

tFg;G (class)

tiyaikg;G tpyhrk; (network address)

cgtiy kiwg;G (subnet mask)

172.16.10.0./16 10.10.10.0./10 192.168.10.0/26 190.100.100.10/19 (3)

ABC epWtdj;jpd; Kfhikj;Jt Njhw;wk; fPNo fhl;lg;gl;Ls;sJ.

ghlnewpf;F

cl;gpuNtrj;Jf;fhd

tiyg;gf;fj;jpd;

Kfg;Gj;

B

A

Contact administrator

C

D Nkw;fhl;lg;gLk; cUit gad;gLj;jp fPo;tUk; tpdhf;fSf;F tpilaspf;f.

[%d;whk; gf;fk; ghh;f;f

3

(a) Nkw;fhl;lg;gl;Ls;s tiyg;gf;fj;ij tbtikf;f HTML gad;gLj;jg;gl;Ls;sJld; mjd; tpidj;jpwid mjpfhpg;gjw;fhf css FwpaPLk; (code) gad;gLj;jg;gl;Ls;sJ. ,jd; %yk; ngwg;gLk; mD$yq;fs; ,uz;L jUf. (b) NkNy ‘A’ vDk; gFjpapd; vOj;JU msit 16 MfTk;> vOj;JU epwj;ij rptg;ghfTk;> vOj;JU tbtpid Arial MfTk; khw;Wtjw;fhd css FwpaPl;bid (code) vOJf. (c) cU ‘B’ gFjpapy; ‘member login from’ ,id cUthf;Ftjw;fhd HTML FwpaPl;bid vOJf. (d) ‘D’ vd fhl;lg;gl;Ls;s glj;ij tiyg;gf;fj;jpy; ,Ltjw;fhd HTML FwpaPl;bid vOJf. (fhl;lg;gl;Ls;s glkhdJ myweb vd;Dk; Nfhg;GiwapDs;; (folder) cs;s images vd;Dk; kw;nwhU Nfhg;GiwapDs; abc.jpg vDk; ngauhy; Nrkpf;fg;gl;Ls;sJ vd fUJf) (e) Nkw;gb

ABC

epWtdj;jpw;F

Gjpa cWg;gpdu; xUtu; njhlu;G

nfhs;Sk; NghJ

contact

administrator I f;spf; nra;tjd; %yk; admin.html gf;fj;jpw;F cs;Eiojy; Ntz;Lk;. ,jw;fhd css FwpaPl;bid vOJf. (4)

(a) rpy fzpdp epuyhf;f nkhopfshdJ njhFg;ghd;fisAk; (compiler)> thp nkhopkhw;wpfisAk; (Interpreter) gad;gLj;Jfpd;wd. Kjypy; %y FwpaPLfshdJ (Source code) Byte code tbtpw;F njhFf;fg;gLfpd;wd> gpd;dh; fzpdp epuyhf;f nkhopf;F khw;wg;gLfpd;wd. njhFg;ghd;fis jdpNa

gad;gLj;Jtij

tpl

njhFg;ghd;fisAk;

thp

nkhopkhw;wpfisAk;

xd;whfg;

gad;gLj;Jtjd; mD$yq;fis tpsf;Ff (b) Ez;nraypapDs; mike;Js;s Mizj; njhFjp fl;likg;G (ISA) nfhz;Ls;s nkhop> SQL nkhop

Mfpait

vj;jidahk;

jiyKiw

fzpdp

nkhopfshFk;?

mtw;wpw;fpilapyhd

NtWghLfs; ,uz;L tPjk; jUf (c)

d1=open('data.txt',’r’) li=d1.readline() info=li.split(',') for c in info: x=0 while xint(info[x+1]): s=int(info[x]) info[x]=int(info[x+1]) info[x+1]=s x+=1 print( info)

(i) NkNy fhl;lg;gl;Ls;s igj;jd; epuyhf;fj;jpy; gad;gLj;jg;gl;Ls;s fl;Lg;ghl;L ikg;Gf;fis (control structure) ngahpLf. (ii) NkNy fhl;lg;gl;Ls;s Nghypf;FwpaPl;L Kiwapid gha;r;rw; Nfhl;Lg;glj;jpy; fhl;LtJld;> fl;Lg;ghl;L mikg;Gf;fisAk; Fwpj;Jf; fhl;Lf.

[ehd;fhk; gf;fk; ghh;f;f

4

(d) fPo;fhl;lg;gl;Ls;s igjd; epuyhf;fj;jpy; mlq;fpAs;s igjd; nkhbAyhdJ “mypro” vd;Dk; Nfhg;GiwapDs; “dataAsc.py” vd;Dk; ngaupy; Nrkpf;fg;gl;Ls;sJ. mNj Nfhg;GiwapDs; “data.txt” vd;Dk; fPNo fhl;lg;gl;Ls;s juTf; Nfhg;Gk mlq;fpAs;sJ.

data.txt

4,8,5,3,1,9,4,6,2,7

A (i) ckf;F ,yFthf tpsq;fpf; nfhs;tjw;fhf A kw;Wk; B vd NkNy tifg;gLj;jpf; fhl;lg;gl;Ls;sJ. ,e;epuyhf;fj;jpy; A gFjpapdhy; Nkw;nfhs;sg;gLk; njhopw;ghl;bid tpsf;Ff. (ii) ,e;epuyhf;fj;jpy; B gFjpahdJ fl;Lg;ghl;L mikg;Gf;fspy; xd;whd “njupT nra;jy;” tifahFk;. ,q;F gad;gLj;jg;gl;Ls;s thpirahf;f njhopy;El;g Kiw (Sorting Techniques) ahJ? (iii) B gFjpapdhy; Nkw;nfhs;sg;gLk; nraw;ghl;bid tpsf;Ff. (iv) ,e;epuyhf;fj;jpid njhopw;gLj;jpa gpd;du; Njhw;wk;ngWk; tUtpistpid vOJf.

1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13.

d1=open('data.txt') d1=open('data.txt') li=d1.readline() li=d1.readline() info=li.split(',') info=li.split(',') for forccinininfo: info: x=0 x=0 while whilexint(info[x+1]): int(info[x])>int(info[x+1]): s=int(info[x]) s=int(info[x]) info[x]=int(info[x+1]) info[x]=int(info[x+1]) info[x+1]=s info[x+1]=s x+=1 x+=1 print printinfo info

B (5)

(a) Kiwik ghpNrhjidapy; gad;gLj;jg;gLk; nts;isg; ngl;b Nrhjid (white box testing) kw;Wk; fWg;Gg; ngl;b Nrhjid; (black box testing) Mfpatw;Wf;fpilapyhd NtWghLfis tpsf;Ff. (b) ABC tpahghu epWtdk; jkJ tpahghu eltbf;ifapd; jpwid mjpfupg;gjw;fhf fzpdp kag;gLj;jg;gl;l Kiwikia gpd;gw;w jPuk ; hdpj;jJ. ,q;F Kiwik gFg;gha;thshpd; gq;fpid Kiwik mgptpUj;jp tho;f;if tl;lj;Jld; njhlu;G gLj;jp tpsf;Ff. (c) ePut ; Po;r;rp (waterfall) khjpupia tpl RUsp (spiral) khjpupia gad;gLj;Jtjd; mD$yq;fs; ,uz;bidf; Fwpg;gpLf. (d) Kiwik gFg;gha;tpd; NghJ Kiwik gFg;gha;thsupdhy; gad;gLj;jg;gLk; gFg;gha;T cghakhf juTg;gha;Tg; tiuglj;jpid(DFD) Kd; itf;f KbAk;. ,t; tiuglj;jpd; %yk; tpsf;fg;gLk; fhuzpfs; 2 vOJf. (e) epWtdk; xd;wpy; Gjpjhf fzpdp Kiwik xd;iw nraw;gLj;Jk; (Implementation) NghJ rkhe;ju nraw;gLj;jy; KiwahdJ (parallel) kpfg; nghUj;jkhdJ vd epWtd cupikahsu; $Wthuhapd;> mjw;fhd fhuzq;fis RUf;fkhf tpsf;Ff.

[Ie;jhk; gf;fk; ghh;f;f

5

(6)

(a) ,yj;jpudpay; tzpfk; (E-Business) kw;Wk; ,yj;jpudpay; tu;j;jfk; (E-commerce) vd;tw;wpw;fpilapyhd NtWghl;bid tpsf;Ff. (b) fPNo tpahghu mikg;G tiffs; rpy jug;gl;Ls;sd. mtw;wpid cjhuzq;fSld; tpghpf;Ff.   

Pur Brick Brick and Click Pur click

(c) murpd; %yk; jkJ kf;fs; eyd; fUjp Government-to-citizens (G2C) Nrit epiwNtw;Wtjw;fhf ,yj;jpudpay; tzpf Kiwia kl;Lk; gpd;gw;wg;gLkhapd; mjdhyhd mD$yq;fs; ,uz;bidAk; gpujp$yq;fs; ,uz;bidAk; tpsf;Ff. (d) jpwd; kw;Wk; kdpj czu;tpid Gupe;Jf; nfhs;sf;$ba fzpdpapd; mD$yq;fs; 4 jUf. (e) nthd;-epAkhd; kw;Wk; f;thd;lk; (Quantum) fzpdp mikg;gpw;fpilapyhd gpujhd NtWghL ahJ? f;td;lk; fzpdp vt;tifahd njhopw;ghl;Lf;F nghUj;jkhdJ?

Part - B - QuestionsTM Support Seminar - 2012.pdf

mtw;wpd; %yk; ltpuaj;jpidf; fzpf;f (nfhj;jdp xd;wpd; ngWkjp 512 Byte vdf; fUjpw; nfhs;f). (c) fPo; fhzg;gLk; ju;f;fr;Rw;wpid mbg;gilahf nfhz;L gpd;tUk; tpdhf;fSf;F tpilaspf;Ff. (ABCD. ) A B C D.

823KB Sizes 0 Downloads 167 Views

Recommend Documents

EduInsight- Business Studies 2013 Support Seminar Question ...
EduInsight- Business Studies 2013 Support Seminar Question paper 2.pdf. EduInsight- Business Studies 2013 Support Seminar Question paper 2.pdf. Open.

PART A PART B
On the blank World Map provided, do the following: 1. create a Legend that includes a coloured symbol for each of the following: ○ health risk. ○ political instability. ○ natural disaster. 2. locate and place on the map each of the 6 risks you

WR330 Part B
Water Resources Act 1991 (as amended by the Water Act 2003), Environment Act 1995,. The Water Resources (Abstraction and Impounding) Regulations 2006. Introduction. Please read through this application form and the ... The Data Protection Act 1998. C

Part B: Reinforcements and matrices
market. Thus both matrix types will be studied. Moulding compounds will be briefly overviewed. For MMCs and CMCs, processing methods, types of materials, ...... A major application is garden decks (USA), picture frames and the ...... Primary processi

Part B: Reinforcements and matrices
Polymeric Matrix Composites (PMCs), Metal Matrix Composites (MMCs) and Ceramic. Matrix Composites (CMCs) will be discussed. For PMCs, synthetic and natural fibres as well as mineral particulate reinforcements will be studied. Polymeric matrices both,

PART B ”PHAS
reasoning or constraint satisfaction. Efficient .... algorithm to a larger class of constraint satisfaction problems. .... Computational science: Can get satisfaction.

Part B-1.pdf
Page 1 of 22. 1. Creating the E-Business, Part B- E-Business Strategy &Components by Rafat Abushaban. Creating the E-Business. Part B- Strategy and Components. Page 1 of 22. Page 2 of 22. 2. Creating the E-Business, Part B- E-Business Strategy &Compo

Deans Fall Seminar 2014 Part 3.pdf
... Part 3.pdf. Deans Fall Seminar 2014 Part 3.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Deans Fall Seminar 2014 Part 3.pdf. Page 1 of 56.

GeometryFinalReview Part A and B shorted GeometryFinalReview2 ...
GeometryFinalReview Part A and B shorted GeometryFinalReview2 JR.pdf. GeometryFinalReview Part A and B shorted GeometryFinalReview2 JR.pdf. Open.

CS2254 Part B with Ans.pdf
www.5starnotes.com. 12)Explain what semaphores are, their usage, implementation given to avoid. busy waiting and binary semaphores. Semaphore definition.

TLM4ALL@10TH-HINDI-PART-B-STUDY MATERIAL.pdf
Page 1 of 22. S.S.C. HINDI. STUDY MATERIAL. PART-B. Prepared by : D. Harsha Vardan M.A., H.P.T. TGT , Hindi.,. A.P. MODEL SCHOOL,. Punganur , Chittoor DT. www.tlm4all.com. Page 1 of 22 ...

Systems, Man and Cybernetics, Part B, IEEE Transactions ... - CiteSeerX
Imaging Science Division, Imaging Research and Advanced Development,. Eastman Kodak Company ...... Abstract—In this paper, an alternative training approach to the EEM- ... through an obstacle course from an initial configuration to a goal.

awes Chemistry (PGT) [Part 'B'].pdf
electrons involved per chromium atom is. (A) 2 (B) 3. (C) 4 (D) 1. 7. Which alloy contains Cu, Sn and Zn? (A) Gun metal (B) solder. (C) Type metal (D) Bronze. 8.

RP PART A & B WITH ANS.pdf
RP PART A & B WITH ANS.pdf. RP PART A & B WITH ANS.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying RP PART A & B WITH ANS.pdf. Page 1 ...

STATUS: ORIGINAL SUBMISSION Part B, Dispute ...
Nov 1, 2009 - OFFICE OF SPECIAL EDUCATION. PROGRAMS. FORM EXPIRES: 08/31/2009. STATE: GUAM. Each cell should be -9 or another number.

Science II M6 Part B(2nd Term).pdf
2' tu .%kaÓh u.ska i %djh lrk fydafudakh. l=ulao@. 3' tu fydafudakh u.ska bgqjk ld3⁄4hh. l=ulao@. 4' fuys 'B' jHqyh jeo.;a jkafka ixfiapkhgh'. ixfiapkh hkq l=ulao@.

Systems, Man and Cybernetics, Part B, IEEE ...
contact movements, a virtual trajectory is also modified to reduce control error. The method ... Computer simulations show that a smooth transition from free to contact .... on the end-effector of the manipulator; and m is the number of degrees of ..

PART B Module-I ANIMAL DIVERSITY 1 ... Accounts
Divisions(1)Agnatha.General character e.g.Petromyzon(2)Gnathostomata-General characters ..... Renewable and non-renewable resources.Natural resources ... energy.Water conservation-Rain water harvesting and water shed management.

PART B (5 × 16 = 80 marks)
Write a SIC code to copy an 11 byte character string to another. 3. What is program relocation? 4. How literal differs ... What are the tasks involved in document editing process? 10. What is the use of tracing? PART B ─ (5 ... b) i) Differentiate

English-Part-B-Paper-2 June 2013.pdf
.orddn't be ro see he, hel;led Piaflo sitring.n top or ilt waSon Dad sal'ut in r)t. hackytu'd nelt b the Chi.kenshed,looking sadJer rh'n I hi'l e\cr s"n hin. (i) Hoh Nas the Piano being t.len aaa! ? (,i) Why Nas Mum sad and sobbin8 ? (in) wherc was D