Wednesday, 26 May 2021

Computer Science - SEE Model Question (Set-II)

 

Computer Science - SEE Model Question (Set-II)

Time: 1:30 hours                                                                             F.M.: 75

Group A

1.     Answer the following question:                                                                     (5×2=10)

a)       What do you mean by communication media? Give any two examples of guided media.

b)       Compare and write the differences of e-mail with traditional postal mail.

c)       What is a backup? Why it is important in computer security system?

d)       How does virus spread form one computer to another?

e)       Why multimedia technology is becoming popular?

2.     a)    Perform the following Binary calculation:                                            (2×1=2)

                i)    (100100) + (11011) – (11101)            ii)   1011101÷111

        b)    Perform as indicated:                                                                                   (2×1=2)

                i)    (608)10 into Octal                                   ii)   (765)8 into Hexadecimal

3.     Select the correct answer:                                                                               (4×0.5=2)

a)       Computer virus has its infection to ----------------- .

i) Monitor                  ii) Mouse                       iii) Keyboard                iv) Hard disk

b)       Defragmentation is a process of ----------------- .

i)   Formatting the disk                                   ii) Relocation of the disk       

iii) Relocation of the files of the disk           iv) None

c)       Cyber law of Nepal was introduced in the year ----------------- .

i) 2057                       ii) 2060                          iii) 2061                        iv) 2062

d)       Data transmission will be faster using ----------------- .

i) Co-axial                         ii) Fiber Optics             iii) STP                          iv) UTP

4.     Write the full form of the following:                                                                    (4×0.5=2)

        a) DNS                               b) NAV                        c) VHF                           d) PNG

5.     Match the following:                                                                                                 (4×0.5=2)

                Group A                             Group B

a)       Web Browser            (i)    Power protection device.

b)       Cyber ethics              (ii)   To share hardware and software resources

c)       UPS                            (iii)  Google Chrome

d)       Network                     (iv)  Bridge

                                                    (v)   Moral Principles

6.     Give the appropriate technical terms of the following:                          (4×0.5=2)

a)       The technique used to provide medical information and services through the Internet.

b)       The moving graphic images.

c)       Website used to search information on the Internet.

d)       An electronic equivalent of a signature.

 

Group ‘B’ [Database Management - 10 Marks]

7.    Answer the following question:              (3×2=6)

a)       Is MS-Access RDBMS? If yes, explain.

b)       What is data redundancy? How can we reduce data redundancy?

c)       What is query? List its types.

8.     Choose the correct answer [Choose all that apply]:                               (4×0.5=2)

a)       Which of the following is an example of database?

i) Oracle            ii) Ms-Access    iii) Tel. Directory iv) All

b)       Primary Key doesn’t accept ----------------- value.

i) Null                 ii) Duplicate      iii) Both                 iv) None

c)       Which component of Ms-Access doesn’t allow entering data?

i) Form              ii) Report           iii) Table               iv) Query

d)       Which specifies an expression that checks for the invalid data?

i)   Validation Rule                      ii) Validation Text

iii) Input Mask                             iv) Required

 9.    Match the following:                                                                                         (4×0.5=2)

                Group A                                                 Group B

a)       Data Integrity                               (i)    No. of character can be entered

b)       Automatic                                     (ii)   Validation Rule

c)       Field size                                       (iii)  Caption

d)       Label for field                              (iv)  Indexed

                                                                        (v)   Default value

 

Group ‘C’ [Programming - 18 Marks]

10.  a)    Write any two differences between SUB and FUNCTION procedures?       (1)

        b)    Give brief description of C language.                                                                   (1)

        c)     Write down the function of the following statements:                          (2×0.5=1)

        i) NAME               ii) PRINT#

11. Write the output of the following program.                                                                    (2)

DECLARE SUB result (n$)

n$ = "DMAAPAEFA"

CALL result(n$)

END

============================

SUB result (n$)

b = LEN(n$)

count = 2

WHILE count <= b

        x$ = x$ + MID$(n$, count, 1)

        count = count + 2

WEND

PRINT x$

END SUB

 

12.  Re-write the given program after correcting the bugs.                                               (2)

REM to displays records from 3nd to 7th position

OPEN “record.txt” FOR OUTPUT AS #2

WHILE NOT EOF(2)

INPUT #1, R, N$, A$, DOB$

P = P + 1

IF P<= 3 AND C>=7 THEN

PRINT R, N$, A$, DOB$

END IF

LOOP

CLOSE #2

END

13.  Study the following program and answer the given questions.                (2×1=2)

REM check the supplied no. is perfect square or not

DECLARE FUNCTION check (a)

CLS

INPUT "type any number: "; n

IF check(n) = 0 THEN

        PRINT "Perfect Square"

ELSE

        PRINT "Not Perfect Square"

END IF

END

=========================

FUNCTION check (x)

s = SQR(x)

IF s = FIX(s) THEN

check = 1

ELSE

check = 0

END IF

END FUNCTION

a)       Name the actual and formal parameter used in above program.

b)       Does the program give same output if FIX() function is replaced by INT() function?

14.  a)    Write a program to display the below output using SUB procedure.             (3)

              123456789

              1234567

              12345

                       123

               1

        b)    Write a program to calculate and print volume of cylinder using FUNCTION…END Function.    (3)

        c)     Write a program that asks students’ name, roll and class and stores into “class.dat” only those records who are studying in class 10. User can supply the records as per his/her need.                                (3)

No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint