SLC Examination-2066(2010)
Computer Fundamental (22 marks)
1.
Answer
the following question:
a) What is computer network?
Ans: computer network means two or more
computers connected with each other to share data, hardware, software and other
resources.
b) What is internet?
Ans: Internet is an
interconnection of several thousands of computers of different types belonging
to the various networks all over the world.
c) Write any four
preventive measures to protect computer system from virus infection.
Ans: Any four
preventive measures to protect computer system from virus infection are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your
computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Don’t install pirated software, especially computer games.
d) Write any two
software used for multimedia.
Ans: Any two software
used for multimedia are:
i) Windows Media
Player
ii) VLC Media Player
e) What is hardware
security?
Ans: The security given to the various hardware tools or
equipment from being lost or damaged due to accidental or intentional harm is
hardware security.
2.
3.
Match
the following:
Group AGroup B
a) T-connector i)Network
b)
Bridge ii)
Power protection
c)
CD-ROM iii)
Coaxial cable
d) Spike
Guard iv)Multimedia
component
v)Virus scanning
Answers
Group
A Group B
a)
T-connector Coaxial cable
b)
Bridge Network
c)
CD-ROM Multimedia component
d) Spike
Guard Power
protection
4.
Select
the best answer:
a) Which one is not a network topology?
i) Star ii) Ring iii)
Client /
Server iv)
Bus
Client/Server
b) When was cyber law
introduced in Nepal?
i) 2061 B.S.ii) 2062 B.S. iii) 2007
B.S. iv) 2016 B.S.
2061 B.S.
c) Multimedia
technology is used in ………
i) Educationii) Business iii) Health
care iv) All of the above
All of the above
d) Boot sector virus
infects ……..
i) System fileii) Master boot record iii) Application
software iv)
Document file
Master
boot record
5. Give appropriate
technical terms:
a) Rules and format to accept and transfer data in the computer network.
Protocol
b) Moral rules to be followed by computer and other professionals.
Computer ethics
c) Making an extra copy of data and software.
Backup
d) A virus that corrupts system files of operating system.
File Infector virus
6. Write the full forms:
a)WWW = World
Wide Web
b)MAN = Metropolitan Area Network
c)OS = Operating System
d)NIC = Network Interface Card
Group B-Database (10 marks)
7.
Answer
the following question:
a) What is DBMS? Write
any two examples of DBMS software.
Ans: DBMS is a software which is used to
manage data, manipulate them and provide the information. Examples of DBMS are
MS-Access and Oracle.
b) List any four data
types used in MS-Access.Ans:
Any four data types used in Ms-Access are:
i) Text
ii) Memo
iii) Number
iv) Yes/No
c) What is form? Write
any two advantages of using form.Ans: Form is an object of MS-Access which provides a user
friendly interface to enter data in a table or multiple linked tables.
Any two advantages of using form are:
1.
It helps to display
data in more presentable form than a datasheet can.
2.
It provides an
interactive platform for input of data into the database.
8. Select the best
answer:
a) Date/Time occupies ……….bytes of memory.
i)
4 ii)
2 iii)
8 iv)
16
8
b) The extension of
database file in MS-Access is……….
i) DBFii)
DBM iii)
MDB iv)DMB
MDB
c) The object of
MS-Access that is used to generate hard copy of records.
i) Queryii) Table iii)
Form iv)
Report
Report
d) A ………….. Key
uniquely identifies a record.
i) Primaryii) Foreign iii)
Composite iv) None
Primary
9. Match the
following:
Group AGroup B
a) Default
value i)
255 Characters
b) Fox
Pro ii)
Column Name
c)
Text iii)
DBMS
d)
Field iv)Field
Properties
v) Search fast
Answers
Group
A Group B
a) Default
value Field Properties
b) Fox
Pro DBMS
c)
Text 255 Characters
d)
Field Column Name
Group C-Programming
10.
a)
What is modular program?Modular
program is a technique used to divide program into many small, manageable,
logical and functional modules or blocks.
b) Write any two
advantages of Structured programming.Ans: Any two advantages of Structured programming
i) It is a high level
language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the function
of following statement:
i) Files
Ans: The FILES statement displays the files of
the current sub directory or specified sub directory.
ii) KILL
Ans: The KILL statement deletes the file or files from the specified drive and
directory.
11.
Debug
the given program:
DECLARE SUB Fibonic()
REM *Fibonic series*
CALL SUB Fibonic
END
SUB Fibonic
a=1
b=1
FOR x=1 to 10
DISPLAY a;
a=a+b
b=a+b
END Fibonic
Debugged program
DECLARE SUB Fibonic( )
REM *Fibonic series*
CALL FibonicEND
SUB Fibonic
a=1
b=1
FOR x=1 to 10
PRINT a;
a=a+b
b=a+b
NEXT x
END SUB
12.
Write
the output of the following program.
DECLARE SUB Series()
CALL Series
END
SUB Series
X=1
Y=1
FOR Z=1 TO 4
PRINT X;
Y=Y+1
X=X*10+Y
NEXT Z
END SUB
13.
Read
the given program and answer the following questions:
DECLARE FUNCTION Num(N)
INPUT N
S=Num(N)
PRINT S
END
FUNCTION Num(N)
X=Int(17/N)
Y=15 MOD N
Num=X +Y
END FUNCTION
14.
i)
Write the name of the function used in the above program.
Ans: The name of the function used in the
above program is Num.
ii) List out the
mathematical function (Library function) used in the above program.
Ans: The mathematical function (Library
function) used in the above program is INT ( ).
14. i) Write a program using Function Module
to calculate and print the volume of a box.
DECLARE FUNCTION VOLUME(L, B, H)
CLS
INPUT “ENTER LENGTH, BREADTH AND HEIGHT”; L, B, H
PRINT “VOLUME OF BOX”; VOLUME(L, B, H)
END
FUNCTION VOLUME (L, B, H)
VOLUME = L*B*H
END FUNCTION
ii) Write a program to declare SUB procedure to print only the vowels from a
given word.
DECLARE SUB DISPV (S$)
CLS
INPUT “ENTER ANY
WORD”; S$
CALL DISPV(S$)
END
SUB DISPV(S$)
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = “A” OR C$ =
“E” OR C$ = “I” OR C$ = “O” OR C$ = “U” THEN
PRINT B$
END IF
NEXT I
END SUB
iii) Write a program to create a sequential data file “Employee.Dat” to store
employees’ name, address, age, gender and salary.
OPEN “Employee.dat”
FOR OUTPUT AS #1
DO
CLS
INPUT “ENTER EMPLOYEE’S
NAME”; N$
INPUT “ENTER ADDRESS”;
A$
INPUT “ENTER AGE”; A
INPUT “ENTER GENDER”;
G$
INPUT”ENTER SALARY”; S
WRITE #1, N$, A$, A,
G$, S
INPUT “DO YOU WANT TO
CONTINUE”; CH$
LOOP WHILE UCASE$(CH$)
= “Y”
CLOSE #1
END
***
No comments:
Post a Comment