Computer Science
Paper I
(Objective Type)
New Marks Scheme
Paper Code. No. 6835

Time Allowed: 20 Minutes
Maximum Marks : 17
Inter-A (Part- I )
Inter - A -2015 L.K . No- 815
Session (2012 - 2014)(2013-15)(2014-16

Note: Write answers to the Question on  the objective answer sheet provided. Four possible choices answers A ,b ,c , d to each Question are given. Which choice is correct , fill that circle in front of that question number. Use marker or  pen to fill the circle. Cutting or filling two or more circles will result in zero mark in that question.

Software to pursue internet is:

(A) Gateway              
(B) EFT                       
(C) Browser    
(D) None

Which of the following is an impact printer:

(A) Laser Printer        
(B) Dot Matrix           
(C) COM        
(D)Inkjet

A device used for optical character recognition is:

(A)Wand Reader       
(B) Cursor                  
(C) pen           
(D) MICR Reader

The layer that is responsible for flow control is called :

(A) Application          
(B) Session                 
(C) Physical    
(D) Transport

Modern Computer can perform calculation or process:

(A)per Second           
(B)Per minute             
(C) Nino         
(D) None

How many characters ASCII7 bit code represent:

(A) 128          
(B) 256           
(C) 500 
(D) 364

Communication between computer and keyboard involves:

(A) Simplex between
(B) half Duplex
(C) Full Duplex 
(D) None

Which of the following is related to business:

(A) Marketing            
(B) Stock Exchange   
(C) Banks 
(D) All these

The address of instruction under the process of exection is contained in :

(A)Program counter               
(B) Current Instruction Register        
(C) Memory address Register
(D) Memory Buffer Register 

Which component is used to connect different parts of the computer together :

(A)Bus Interconnection         
(B) Control Unit
(C) Main Memory                  
(D) None

Date and programs not being used by the computer is stored in :

(A) Secondary storage         
(B) Cache
(C) Primary Storage             
(D) Printer

Freely distributed software without violating copy-right laws are called:

(A) Share ware            
(B) Public Domain
(C) Copy Protected     
(D) None

An important characteristic of RAM  is :

(A) Read Only
(B) Write Only
(C) Not Volatile
(D) Volatile

The length of an IP address is:

(A) 8 bit  
(B) 16 bit
(C) 32 bit
(D) 64 bit

The output of compiler is:                                   

(A) Program
(B) Source Code
(C)  Linked Code  
(D) Object Code

The maximum no of partition that can be created on disk is:

(A) 2               
(B) 3      
(C) 4             
(D) None

Trojan Horse is a :

(A) Antivirus              
(B) virus
(C) Software   
(D) hard Ware

Computer Science
( Subjective)
Inter-A-2015
Inter (Part - I )
Time: 3 :10 Hours
Marks : 83
Session (2012-14)(2013-15)(2014-16)

Note: It is compulsory to attempt any (8 - 8 ) parts each from Q.No 2 and 3 and attempt any (6) parts from Q No. 4 Attempt any (3)questions from Part II.
Write same Question No, and its Part No as given in the question paper.
Make diagram where necessary.    

Section – I   (22x2 = 44)

Q.No.2

Q.N0.3

Q.No.4

Section – II (8x3=24)

Q.No.5. What is Non - Impact Printer? Discuss different types of Non - Impact Printers. (8)
Q.No.6. What is Bus Topology? Explain its working, advantages and disadvantages with diagram. (8)
Q.No.7. What is Data Transmission Mode? Explain its types with diagram and examples.(8)
Q.No.8. What is Bus Interconnection? Discuss different types of System Buses. (8)
Q.No.9. Explain different types of Viruses. (8)

Section-III  (5 x 3 =15)
(Practical Part)