Tuesday 7 April 2020

Triton Solution of Computer Science

 

Computer Science - SEE Model Question (Set-II)

Time: 1:30 hours                                                                             F.M.: 75

Group A

1.     Answer the following question:                                                                     (5×2=10)

a)       What do you mean by communication media? Give any two examples of guided media.

Ans:-

Communication media is the channel or electronic pathway through which data or signal can be transmitted from one point to another. Examples of guided media are:-

·         Twisted pair cable

·         Coaxial cable

b)      Compare and write the differences of e-mail with traditional postal mail.

Ans:- The difference of e-mail with traditional postal mail are :-

E-Mail

Postal Mail

It is very much slower then email

It is very much faster then postal mail

In postal mail, only the specific type of hand writing and style is used

In email any type of font and graphics can be used

It is not reliable

It is fully reliable

It does not support attachment

It support document attachment

 

c)       What is a backup? Why it is important in computer security system?

Ans: -

Backup is the process of making an additional or reserve copy of data, program  and software for future use when required.

Important of Backup system:-

Because if our original data, programs software are lost, deleted, or damaged in such case we can restore our data, programs or software in usable from the backup system.

d)      How does virus spread form one computer to another?

Ans:- Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected e-mail attachments etc.

e)       Why multimedia technology is becoming popular?

Ans:-Multimedia technologies presented the computerized society with opportunities and challenges that in many cases are unprecedented. It is becoming more and more popular because of the effectiveness of its applications in all aspects of human life.

3.     Select the correct answer:                                                                               (4×0.5=2)

a)       Computer virus has its infection to ----------------- .

i) Monitor                  ii) Mouse                       iii) Keyboard                iv) Hard disk

b)       Defragmentation is a process of ----------------- .

i)   Formatting the disk                                   ii) Relocation of the disk       

iii) Relocation of the files of the disk        iv) None

c)       Cyber law of Nepal was introduced in the year ----------------- .

i) 2057                       ii) 2060                          iii) 2061                        iv) 2062

d)       Data transmission will be faster using ----------------- .

i) Co-axial                        ii) Fiber Optics             iii) STP                          iv) UTP

4.     Write the full form of the following:                                                                    (4×0.5=2)

        a) DNS                               b) NAV                        c) VHF                           d) PNG

        DNS = Domain Network System

        NAV=Network Allocation Vector

        VHE= Virtual Home Environment

        PNG= Portable Network Graphic

5.     Match the following:                                                                                                 (4×0.5=2)

                Group A                             Group B

a)       Web Browser            (c)   Power protection device.

b)       Cyber ethics              (d)   To share hardware and software resources

c)       UPS                            (a)   Google Chrome

d)       Network                     ()     Bridge

                                                    (b)   Moral Principles

6.     Give the appropriate technical terms of the following:                          (4×0.5=2)

a)       The technique used to provide medical information and services through the Internet. Telehealth

b)       The moving graphic images.  Animation

c)       Website used to search information on the Internet. Search Engine

d)       An electronic equivalent of a signature. Digital Signature

 

Group ‘B’ [Database Management - 10 Marks]

7.    Answer the following question:              (3×2=6)

a)       Is MS-Access RDBMS? If yes, explain.

Yes, MS Access is a database and, more specifically, a relational database because database system which is used to manage and manipulate data in the relation database model.

b)       What is data redundancy? How can we reduce data redundancy?

Data redundancy occurs in database systems which have a field that is repeated in two or more tables. Database normalization prevents redundancy and makes the best possible usage of storage. The proper use of foreign keys can minimize data redundancy and reduce the chance of destructive anomalies appearing.

c)       What is query? List its types.

Query is the one of the most important object of Ms- Access. It is a way o fretrieving and editing information according to the specified criteria. The types of query are:-

                                I.            Select query

                              II.            Action query

                            III.            SQL query

                            IV.            Cross tab query

                              V.            Advance sort/ filter query

8.     Choose the correct answer [Choose all that apply]:                               (4×0.5=2)

a)       Which of the following is an example of database?

i) Oracle            ii) Ms-Access    iii) Tel. Directory         iv) All

b)       Primary Key doesn’t accept ----------------- value.

i) Null                 ii) Duplicate      iii) Both                 iv) None

c)       Which component of Ms-Access doesn’t allow entering data?

i) Form              ii) Report          iii) Table               iv) Query

d)       Which specifies an expression that checks for the invalid data?

i)   Validation Rule                    ii) Validation Text

iii) Input Mask                             iv) Required

 9.    Match the following:                                                                                         (4×0.5=2)

                Group A                                                 Group B

a)       Data Integrity                               (c)   No. of character can be entered

b)       Automatic                                     (c)   Validation Rule

c)       Field size                                       (d)   Caption

d)       Label for field                              ( )    Indexed

                                                                        (b)   Default value

 

Group ‘C’ [Programming - 18 Marks]

10.  a)    Write any two differences between SUB and FUNCTION procedures? (1)

        The different between SUB and FUNCTION procedure are:-

               

SUB Procedure

FUNCTION Procedure

This statement does not return value.

This statement returns a single value.

It is called by CALL statement

It is called by expression or PRINT statement

Printing is mainly done in Sub module

Printing is mainly done in main module

 

        b)    Give brief description of C language.                                                               (1)

        C is a general-purpose, a structured, standardization, system independent, high efficiency programming language which is         developed by Denis Ritchie in 1972 at AT&T.

        c)     Write down the function of the following statements:                    (2×0.5=1)

        i) NAME:-  NAME Statement Renames a file or directory.

        ii) PRINT# :- this statement is used to write or print data in formatted pattern to the data file or printer.

        Syntax:- PRINT# Using[file number],variable list]

11. Write the output of the following program.                                                                    (2)

DECLARE SUB result (n$)

n$ = "DMAAPAEFA"

CALL result(n$)

END

============================

SUB result (n$)

b = LEN(n$)

count = 2

WHILE count <= b

        x$ = x$ + MID$(n$, count, 1)

        count = count + 2

WEND

PRINT x$

END SUB

OUTPUT

MAAF

12.  Re-write the given program after correcting the bugs.                                               (2)

REM to displays records from 3nd to 7th position

OPEN “record.txt” FOR OUTPUT AS #2

WHILE NOT EOF(2)

INPUT #1, R, N$, A$, DOB$

P = P + 1

IF P<= 3 AND C>=7 THEN

PRINT R, N$, A$, DOB$

END IF

LOOP

CLOSE #2

END

Ans

REM to display records from 3rd to 7th position

OPEN ”record.Dat”  FOR OUTPUT as #2

WHILE NOT EOF(2)

P=P+1

IF P<= AND C>=7

PRINT R,N$, A$,DOB$

END IF

LOOP

CLOSE #2

END

13.  Study the following program and answer the given questions.                (2×1=2)

REM check the supplied no. is perfect square or not

DECLARE FUNCTION check (a)

CLS

INPUT "type any number: "; n

IF check(n) = 0 THEN

        PRINT "Perfect Square"

ELSE

        PRINT "Not Perfect Square"

END IF

END

=========================

FUNCTION check (x)

s = SQR(x)

IF s = FIX(s) THEN

check = 1

ELSE

check = 0

END IF

END FUNCTION

a)       Name the actual and formal parameter used in above program.

Ans:- CHECK(x) and SQR(x) are actual and formal parameters.

b)       Does the program give same output if FIX() function is replaced by INT() function?

Ans:- Yes, the program gives same output if INT() function is replaced by FIX().


No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint