MUTUAL ACADEMIC ACTIVITIES FORUM (MAAF)
Kathmandu, Nepal
Mid Term Examination 2076
Class : 10
Subject Computer Science
Full Marks: 50
Time: 1:30 hrs
Group A [Fundamentals – 22 Marks]
1. Answer the following questions. [5×2=10]
a) What do you mean by transmission media? Writes it types.
Ans: Transmission medium is a channel through which data or signals can be transmitted from one point to another. Its types are Guided Medium and Unguided Medium.
b) Define e-mail with its two advantages.
Ans: E-mail (Electronic mail) is one of the most popular services provided by the internet which sends and receives mail through the internet.
The two advantages of email are:
i) It allows to send and receive message across the world at very low cost.
ii) It is very fast compared to postal system.
The two advantages of email are:
i) It allows to send and receive message across the world at very low cost.
ii) It is very fast compared to postal system.
c) What is computer security? List some hardware security measures.
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
Some of the hardware security measures are:
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
d) Write any four effects of computer viruses.
The effects of computer virus are:
i) Virus can change the contents of file, and codes of program.
ii) Degrade the overall performance of computer system.
iii) Change in size of file by adding or removing text accordingly.
i) Virus can change the contents of file, and codes of program.
ii) Degrade the overall performance of computer system.
iii) Change in size of file by adding or removing text accordingly.
iv) Corrupting the system’s data.
e) Write the importance of multimedia technology in classroom teaching.
Ans: The role of multimedia in classroom teaching is that it allows user to manipulate subject matters according to user’s wish in different forms to make more interactive and effective explanation of the related subject matter to the students by the use of presentation.
2.a) Perform as indicated: [2×1=2]
i) (974)10 into octal
8
|
974
|
Rem
|
8
|
121
|
6
|
8
|
15
|
1
|
8
|
1
|
7
|
0
|
1
|
(974)10 = (1716)8
ii) (B52)16 into binary.
Soln:
Converting hexadecimal to binary
B = 1011
5 = 0101
2 = 0010
(B52)16 = (101101010010)2
b) Perform the following binary operations: [2×1=2]
i) (1011 + 10100) – (1001)
1
|
0
|
1
|
1
| ||
+
|
1
|
0
|
1
|
0
|
0
|
1
|
1
|
1
|
1
|
1
| |
-
|
1
|
0
|
0
|
1
| |
1
|
0
|
1
|
1
|
0
|
(1011 + 10100) – (1001) = (10110)
c) 1100101 ¸ 101
101
|
1100101
|
10100
|
101
| ||
00101
| ||
101
| ||
01
| ||
0
| ||
01
|
Q = 10100
R = 01
3. Match the following: [4×0.5=2]
a) Graphics checking for disk error
b) SMTP prevents gaining access
c) Scandisk moving images
d) Firewall network protocol
Still frame pictures
Answers:
a) Graphics Still frame pictures
b) SMTP network protocol
c) Scandisk checking for disk error moving images
d) Firewall prevents gaining access
4. Select the correct answer. [4×0.5=2]
a) A network device that amplifies the incoming signal creates a new copy of it and transmits.
i) Hub ii) Bridge iii) Repeater iv) Router
Ans: Repeater
b) Which is the multimedia software ?
i) Photoshop ii) MS Power point iii) VLC Player iv) All of them
Ans: All of them
c) A virus that damages the master boot record .
i) Macro ii) Boot sector iii) script iv) program
Ans: Boot sector
d) The hardware components of a network.
i) NOS ii) LAN iii) Switch iv) All of them
Ans: Switch
5. Give the appropriate technical terms of the following. [4×0.5=2]
a) The data handling capacity of communication system.
Ans: Bandwidth
b) The process of transferring data/file from users computer to the Internet server.
Ans: Upload
c) Online postal services.
Ans: E-mail
d) The artificial environment created by computer technology to entertain user.
Ans: Virtual Reality
6. Write the full form of the following: [4×0.5=2]
a) MPBS: Mega Bytes Per Second
b) BNC: British Naval Connector
c) CCTV: Closed Circuit Television
d) CAD: Computer Aided Designing
Group ‘B’ [Database Management System - 10 Marks]
7. Answer the following questions. [3×2=6]
a) What is database? Give some examples.
Ans: Database is a collection of related and organized information that can be used for different purpose.
Two examples of database are:
i) Dictionary
ii) Telephone Directory
Two examples of database are:
i) Dictionary
ii) Telephone Directory
b) What is primary key? Write its importance
Ans: Primary key is a field that uniquely identifies the record.
Ans: The importance of Primary key is:
i) It reduces and controls duplication of record in a table.
ii)It sets the relationship between tables.
i) It reduces and controls duplication of record in a table.
ii)It sets the relationship between tables.
c) Define query with its types
Ans: Query is an object of Ms-Access which extracts and arranges information from a table in a manner that is specified.
The different types of query are:
i) Select query
ii) Action query
In action query, we have update query, append query, delete query and make-table query.
The different types of query are:
i) Select query
ii) Action query
In action query, we have update query, append query, delete query and make-table query.
8. Choose the correct answer. [4×0.5=2]
a) Date& time data types occupies bytes of memory.
i) 4 ii) 2 iii) 8 iv) 16
Ans: 8
b) Fields are referred to as
i) Tables ii) tuples iii) relations iv) columns
Ans: Columns
c) The maximum number of characters that can be used in field name.
i) 255 ii) 3048 iii) 50 iv) 64
Ans: 64
d) A field property that specifies an expression and check for the invalid data.
i) Invalid Rule ii) Validation Rule iii) Input Mask iv) Format
Ans: Validation Rule
9. Match the following. [4×0.5=2]
a) Hyperlink label for a field
b) Fox pro data type
c) Memo DBMS
d) caption long text
search fast
Answers
a) Hyperlink data type
b) Fox pro DBMS
c) Memo long text
d) caption label for a field
10 a) Why is QBASIC is also called modular programming languages? [1]
Qbasic is also called modular programming because it divides program into many small, manageable, logical and functional modules or blocks.
b) Write difference between SUB and FUNCTION procedures. [1]
Ans:
SUB-procedure
|
FUNCTION-procedure
|
i) SUB-procedure does not return value.
|
i) FUNCTION-procedure must return a value.
|
ii) SUB-procedure is called by CALL statement.
|
ii) FUNCTION-procedure is called by statement and expression method.
|
c) Write the function of the following statements [2×0.5=1]
Writes # - It sends one or more data items to the specified file. INT – It rounds and returns the largest integer less than or equal to a numeric expression.
11. Rewrite the given program after correcting the bugs. [2]
REM To check the input no. is perfect square or not
DECLARE FUNCTION chk$ (a)
CLS
INPUT “Enter the number :”; a
CALL chk$ (a)
END
FUNCTION chk$(a)
m=SQUARE (a)
n=INT (m)
IF m=a THEN
c$=”Perfect Square”
ELSE
c$=”Not Perfect Square”
END IF
C$=chk$
END FUNCTION
Debugged Program
REM To check the input no. is perfect square or not
DECLARE FUNCTION chk$ (a)
CLS
INPUT “Enter the number :”; a
PRINT chk$ (a)
END
FUNCTION chk$(a)
m=SQR (a)
n=INT (m)
IF m=n THEN
c$=”Perfect Square”
ELSE
c$=”Not Perfect Square”
END IF
chk$ = c$
END FUNCTION
12. Write the output of the following program. [2]
DECLARE SUB NUM( )
CLS
CALL NUM
END
SUB NUM
A=3: B=7
FOR I =1 TO 5 STEP 2
PRINT A;
SWAP B, A
B=A+1
NEXT I
END SUB
Output:
3 7 8
13. Study the following program and answer the given questions. [2×1=2]
DECLARE FUNCTION SUM (N)
FOR I = 1TO 4
READ N
DATA 15 ,25, 69
PRINT SUM (N)
NEXT
END
FUNCTION SUM(N)
S=0
WHILE N<>0
R=N MOD 10
S=S+R
N=INT (N\10)
WEND
SUM=S
END FUNCTION
a) How many times the main function will be executed in the above program?
Ans: The main function will be executed 4 times.
b) List the relational operators used in the above proram?
Ans: The relational operators used are : = and < >
14
a) Write a program using SUB procedure to print series 1,2,3,5,8……………….13th terms. [3]
DECLARE SUB SERIES ( )
CLS
CALL SERIES
END
SUB SERIES
A = 1
B = 2
FOR I = 1 TO 13
PRINT A;
C = A + B
A = B
B = C
NEXT I
END SUB
b) Write a program to count number of non vowels character present on the supplied string using a FUNCTION procedure. [3]
DECLARE FUNCTION COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF NON VOWEL CHARACTERS= "; COUNT(S$)
END
FUNCTION COUNT (S$)
CC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ <> "A" AND C$ <> "E" AND C$ <> "I" AND C$ <> "O" AND C$ <> "U" THEN
CC = CC + 1
END IF
NEXT I
COUNT = CC
END FUNCTION
c) Write a program to store some students “registration no name class and phone number in sequential data file “record.dat “. [3]
OPEN “record.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Registration number”; R
INPUT “Enter Name”; N$
INPUT “Enter Class”; C
INPUT “Enter Phone Number”; P#
WRITE #1, R, N$, C, P#
INPUT “Do you want to continue (Y / N)”; CH$
LOOP WHILE UCASE$ (CH$) = “Y”
CLOSE #1
END