Group “A” Computer Fundamental (22 Marks) |
|
|||||||||||
1. |
Answer the following
questions: |
5x2=10 |
||||||||||
|
a)
Define
data communication. List its components. The
transmission of electronic data and information between two points, either
via analog or digital signal. The
components of data communication are: Sender Medium Protocols receiver Write
few advantages of multimedia in education field. Advantages
: It
has made education for specially-able students easier. A
teacher can teach a subject in interesting effective ways. A
student can learn subjects and express their reactions sitting at their home. It
is easier to learn from audio, images, graphics rather than text. c) What
is Software security? List out any two measures to protect computer software.
The protectidon of computer
software from unauthorized use, especially from being damaged, stolen or
pirated from various natural, intentional and accidental harm is software
protection. Some if its measures are: use of authentic and reliable
password use of antivirus software by using scandisk utility p)
Differentiate
between Internet and E-mail.
e) Computer
system is always in risk of viruses and threats. How do you prevent it from
the effect of virus and threat? |
|||||||||||
2. |
a) Convert as instructed: |
2x1=2 |
||||||||||
i)
(602)8 into
binary (602)8=(110000010)2 |
ii) (110001)2 into
decimal (110001)2=(32+16+0+0+0+1)=(49)10 |
|||||||||||
| ||||||||||||
3. |
Match
the following: |
4x0.5=2 |
||||||||||
Group ‘A’ |
Group ‘B’ |
|||||||||||
a) i.
Encryption |
i) i. Connects
computer with the network |
|||||||||||
b) ii.
Defragmentation |
ii) ii.The
process of making a file or massage unreadable |
|||||||||||
c) iii.
NIC |
iii) iii.Device
that regenerates signals |
|||||||||||
d) iv.
UPS |
iv) iv.
The process of consolidating fragmented files and folders |
|||||||||||
Encryption II Defragmentation IV NIC I UPS V |
v) v.
Hardware security |
|||||||||||
4. |
Choose the correct
answer: |
4x0.5=2 |
||||||||||
a) The process of
transferring a copy of a file from a remote server to the requesting computer
is…… |
||||||||||||
i) Uploading |
iii) Downloading |
|||||||||||
ii) FTP ans:iii |
iv) Netsurfing |
|||||||||||
b) Which is not the
network hardware components? |
||||||||||||
i) HUB |
iii) Repeater |
|||||||||||
ii) Windows NT ans: ii |
iv) Router |
|||||||||||
c) Cyber law of
Nepal was introduced in. |
||||||||||||
i) 2061 BS |
iii) 2063 BS |
|||||||||||
ii) 2060 BS ans: i |
iv) None of the
above |
|||||||||||
d) Which is not the
anti-virus program? |
||||||||||||
i) AVG |
iii) NAV |
|||||||||||
ii) Kaspersky ans: iv |
iv) None of the
above |
|||||||||||
5. |
Give an appropriate
technical terms for the following: |
4x0.5=2 |
||||||||||
a) A virus that
infects master boot record. Ans: boot sector |
||||||||||||
b) A person who seeks
and exploits weakness in a computer system or computer network. Ans: hacker |
||||||||||||
c) An application
which allow users to view documents on the WWW. Ans: web browser |
||||||||||||
d) Moral rules
followed by computer professionals ans: computer ethics |
||||||||||||
6. |
Write the full form
of: |
4x0.5=2 |
||||||||||
i) JPEG |
ii) STP |
iii) WLAN |
iv) ISP |
|||||||||
JPEG:
Joint photographic expert group STP:
Single twisted pair WLAN:
Wireless Local area network ISP:
Internet service provider Group “B” Database (10 Marks) |
||||||||||||
7. |
Answer
the following questions. |
3x2=6 |
||||||||||
a)
Define
DBMS? Write two of its function. DBMS is a office based software program which helps to manage
the data stored in a database. Functions: To arrange the data in sequential order. To reduce the data redundancy. b)Differentiate between Form and
Report
|
||||||||||||
b)
What
is validation rule and Input mask? Validation rule is a field property which sets an expression
to limit the data to be entered in a fields and input mask is a field
property which sets the pattern of all the data to be entered in a fields. |
||||||||||||
c)
Differentiate
between Form and Report. Form provides an interface to enter, edit and modify data
whereas report presents the final result of the data. Form is generally used to display one
complete record at a time whereas report can be created on the base of table
and query. |
||||||||||||
8. |
Select the best
alternatives for the following. |
4x0.5=2 |
||||||||||
a) OLE
object can store graphics, sound up to ……… GB i)
1 ii)
2 iii)
3 iv)
4 ans: i b) Which
of the following is field property? i)
Indexed ii)
Field
Size iii)
Caption iv)All
of the above ans: iv c) ………….
displays alternatives name of the field in data sheet from report. i)
Caption ii)
Text iii)
Memo iv)
Name ans: i d) Which
is the database? i) Schedule of SLC Exam ii)
Oracle iii)
Excel iv)
Ms-Access ans: i |
||||||||||||
9. |
Match
the following: |
4x0.5=2 |
||||||||||
Group ‘A’ |
Group ‘B’ |
|||||||||||
a) Data
redundancy |
i) Input
mask |
|||||||||||
b) Field
properties |
ii) Lookup
wizard |
|||||||||||
c) Data
type |
iii) Design
view |
|||||||||||
d) Change
the table structure |
iv) Data
repetition |
|||||||||||
Data redundancy:data
repetition Field properties:
input mask Data type: lookup
wizard Change the table
structure:design view |
v) Form |
|||||||||||
Group “C” Programming (18 Marks) |
||||||||||||
10. |
a) Differentiate
between outputs and append mode. Output mode creates
and opens the file that will receive output from the program whereas append
mode opens the existing file to which the output of the program is added. |
1 |
||||||||||
b)
What
is C operator? Give any two examples. C-operators are the special symbols which have specific
meaning in the program to perform various mathematical calculations and
logical operations. Eg: addition (+), subtraction (-) |
1 |
|||||||||||
c) Write
the function of the following statements: |
1 |
|||||||||||
i) NAME: It is used to rename a file. |
ii) INPUT
#: It is used to get the data from the file. |
|||||||||||
11. |
Write the output of
following program: |
2 |
||||||||||
DECLARE FUNCTION
Res(A) CLS A=20 PRINT Res(A) END FUNCTION Res(A) FOR X = 1 TO A IF X MOD 2 <>
0 THEN S=S+X NEXT X Res=S END FUNCTION The output is: 100 (END IF is missed in the above
program) |
||||||||||||
12. |
Re-write the given
program after correcting the bugs: |
2 |
||||||||||
REM to store name ,
post and salary OPEN emp.doc FOR OUT
AS #1 INNPUT “
EnterPost”;p$ INPUT “Enter
Salary”;S WRITE 2,N$,P,S CLOSE #1 END Debugged program: REM "to store
name , post and salary" CLS OPEN "emp.doc"
FOR OUTPUT AS #1 INNPUT “
EnterPost”;p$ INPUT “Enter
Salary”;S WRITE#1,N$,P$,S CLOSE #1 END |
||||||||||||
13. |
Study the following
program and answer the given questions: |
2x1=2 |
||||||||||
DECLARE FUNCTION
DIGIT_SUM(N) CLS INPUT “Enter any
numbers:”;NUM S=DIGIT_SUM(N) PRINT “ Sum of
digits=”;S Function
DIGIT_SUM(N) DO WHILE N >0 R =N MOD 10 S1=S1+R N=INT(N/10) LOOP DIGIT_SUM=S1 END FUNCTION |
||||||||||||
a)
How
many parameters are used in the program? Ans: 1 |
||||||||||||
b)
What
will be the value of S1 if the value of NUM is 15? Ans: 6 |
||||||||||||
14. |
a) WAP to accept length, breadth and height of a room in main module and calculate its area and volume using FUNCTION….END…..FUNCTION? (3) DECLARE FUNCTION AREA (l,b) DECLARE FUNCTION VOL (L,B,H) CLS INPUT “length, breadth and
height”;l,b,h PRINT “AREA”;AREA(L,B) PRINT “VOLUME”;VOL (L, B, H) END FUNCTION AREA(L,B) A=L*B AREA=A END FUNCTION FUNCTION VOL (L, B, H) V=L*B*H VOL=V END FUNCTION |
|||||||||||
b) WAP
check whether a input number is Armstrong or not using SUB …..END SUB. (3) . DECLARE SUB CHECK(N) CLS INPUT”ENTER”;N CALL CHECK(N) END SUB CHECK(N) Let P=N WHILE N<>0 R= N MOD 10 S=S+R^3 N=N\10 WEND IF S=P THEN PRINT “ARMSTRONG" ELSE PRINT "NOT" END IF END SUB |
||||||||||||
c) A
sequential data file “KAAM.TXT” contains name, address and salary fields of
information about employee. Write a program to display those employee whose
address is Dharmasthali and salary below
30000. (3) CLS OPEN “KAAM.TXT” FOR INPUT AS #1 PRINT "NAME", "ADDRESS","SALRY" DO WHILE NOT EOF(1) INPUT #1, NAME$, ADD$, S IF UCASE$(ADD$)=”DHARMASTHALI” AND
S<30000 THEN PRINT NAME$, ADD$, S END IF CLOSE #1 END ******** |
||||||||||||
Computer Fundamentals,qbasic programming solutions , SLC / SEE computer science questions solved , qbasic programming,Computer Networks ,Operating Systems, Word Processing (MS Word),Spreadsheet Calculation (MS Excel),Presentation Systems (MS PowerPoint),Database Management System (MS Access)
Friday, 17 April 2020
Computer Science Solution[ Red Bus Kathmandu]
Subscribe to:
Post Comments (Atom)
-
Entrance Exam Question for Class 11 | CCRC Entrance Model Question - 2077 | Entrance Question for Grade XI
-
Match the Following Networking and Telecommunication 1. [SLC 2064] a) Radio Wave ...
-
1. Define information clearly. Ans: Information is organized or classified data, which has some meaningful values for the receiver....
No comments:
Post a Comment