Wednesday, 26 May 2021

Computer Science - SEE Model Question (Set-V)

 

Computer Science - SEE Model Question (Set-V)

Time: 1:30 hours                                                                             F.M.: 75

Group A

Group A : Fundamental [22 marks]

1.     Answer the following questions.                                                                       (5x2=10)

i.         What is a network protocol? Why is TCP/IP used?

ii.       Differentiate between postal mail and email.

iii.     What is cyber ethics? Write two cyber ethics.

iv.     How is backup helpful for protecting software?

v.       Write four possible symptoms of virus infection.

 

2.     a. Perform following binary operation:                                                            (2x1=2)

i.       1101001 + 10111

ii.     1101011 / 111

b. Convert as directed:             (2x1=2)

i.       (1010011001)2 into octal

ii.     (301)10 into hexadecimal

 

3.     Write full forms of:                                                                                             (4x0.5=2)

a. DVD             b. GIF                   c. DNS                   d. CAD

 

4.     Match the following.                                                                                           (4x0.5=2)

A

B

192.168.1.1

Video compression format

POP

IP Address

Data diddling

Download mail

AVI

Manipulate data illegally

 

5.     Select the correct answer.                                                                                 (4x0.5=2)

i.         What is the most intelligent device?

a. Hub    b. Repeater           c. Router               d. Switch

ii.       Which of this software is used for photo editing?

a. Photoshop        b. DVD Cutter      c. PowerPoint       d. Adobe premiere

iii.     Which virus gets activated on the specified day?

a. Trojan horse     b. Time bomb      c. Worm                 d. Autorun.inf

iv.     Which checks and fix the errors of disk?

a. Scandisk           b. Defrag               c. Lotus                 d. Character map

 

6.     Give the appropriate technical terms for:                                                    (4x0.5=2)

i.         It authenticates digital information by using computer cryptography.

ii.       It stores intermediate web pages from server requested by client computer.

iii.     It can destroy both files and boot sector.

iv.     The virtual world created with the use of multimedia and multimedia system and presented as it is real.

 

Group B : Database Management System (10 marks)

7.     Answer the following questions:                                                                         (3x2=6)

i.         Differentiate between manual and computerized database.

ii.       What is a default value? Write its importance.

iii.     How a form can provide security to data?

 

8.     Answer the following questions.                                                                      (4x0.5=2)

i.         …………….. identifies each record uniquely.

ii.       …………….. query makes changes to the data.

iii.     …………….. is used to display and print final result of database.

iv.     Auto number allocates …………… of memory space.

 

9.     Match the following.                                                                                           (4x0.5=2)

A

B

Multimedia

Retrieve records

OLE

Record

Tuple

Photo

Query

Digit, entry optional

 

Power point presentation

 

Group C : QBASIC Programming (18 marks)

10.  Answer the following questions.                                                                         (3x1=3)

i.         Write two features of C.

ii.       Differentiate between output and append mode.

iii.     Write the function of LINE INPUT# and KILL statements.

11.  Predict the output of:                                                                                                      (2)

DECLARE SUB EVE(BA$)

CLS

CALL EVE("CHOYU")

END

SUB EVE(BA$

        COL = 1

        FOR 1 = LEN(BA$) TO 1 STEP -2

        PRINT TAB(COL);MID$(BA$,COL,1)

                        COL = COL+1

        NEXT

END SUB

12.  Correct the errors in the program:                                                                             (2)

REM store records

CLS

OPEN "peaks.xls" FOR INPUT AS #75

DO

        INPUT "Enter peak"; P$

        INPUT "Enter district";D

        INPUT "Height";H

        WRITE P$,D$,H

        INPUT "Do U 1 2 add more";mor$

LOOP WHILE UCASE$(mor$)="y"

CLOSE#75

13.  Study the given program and answer the questions:                                             (2)

DECLARE FUNCTION KAT(N( ) )

CLS

DIM AR(4)

FOR I = 1 TO 4

        READ AR(I)

NEXT

PRINT KAT(AR(I))

DATA 2,1,0,4

END

FUNCTION KAT(N( ))

        FOR I = 1 TO 4

        S = S+N(I)

        NEXT

        KAT = S

END FUNCTION

        a. What is the return type of the function?

        b. Which line returns value to the calling module?

14.  a. Write s program in Qbasic to display 4,44,444,4444 using sub-procedure. (3)

b. Write a program to display sum of digits of a number using function procedure.

                                                                                                                                               (3)

c. A data file "pabson.txt" contains the records composed of the fields like school, principal, address, contact. Write a program in Qbasic to display records of the schools located in either Kathmandu or Palpa.   (3)

 

Æ Best of Luck Å

 

No comments:

Post a Comment

MCQ Question Bank Microsoft PowerPoint