Computer Science - SEE Model Question (Set-V)
Time: 1:30 hours F.M.:
75
Group A
Group A : Fundamental
[22 marks]
1. Answer
the following questions. (5x2=10)
i.
What is a network protocol? Why is TCP/IP
used?
ii.
Differentiate between postal mail and
email.
iii.
What is cyber ethics? Write two cyber
ethics.
iv.
How is backup helpful for protecting
software?
v.
Write four possible symptoms of virus
infection.
2. a. Perform
following binary operation: (2x1=2)
i.
1101001 + 10111
ii.
1101011 / 111
b. Convert
as directed: (2x1=2)
i.
(1010011001)2 into octal
ii.
(301)10 into hexadecimal
3. Write
full forms of: (4x0.5=2)
a.
DVD b. GIF c. DNS d. CAD
4. Match
the following. (4x0.5=2)
A |
B |
192.168.1.1 |
Video compression
format |
POP |
IP Address |
Data diddling |
Download mail |
AVI |
Manipulate data
illegally |
5. Select
the correct answer. (4x0.5=2)
i.
What is the most intelligent device?
a. Hub b. Repeater c.
Router d. Switch
ii.
Which of this software is used for photo
editing?
a.
Photoshop b. DVD Cutter c. PowerPoint d. Adobe premiere
iii.
Which virus gets activated on the
specified day?
a.
Trojan horse b. Time bomb c. Worm d. Autorun.inf
iv.
Which checks and fix the errors of disk?
a.
Scandisk b. Defrag c. Lotus d. Character map
6. Give
the appropriate technical terms for: (4x0.5=2)
i.
It authenticates digital information by
using computer cryptography.
ii.
It stores intermediate web pages from
server requested by client computer.
iii.
It can destroy both files and boot sector.
iv.
The virtual world created with the use of
multimedia and multimedia system and presented as it is real.
Group B : Database
Management System (10 marks)
7. Answer
the following questions: (3x2=6)
i.
Differentiate between manual and
computerized database.
ii.
What is a default value? Write its
importance.
iii.
How a form can provide security to data?
8. Answer
the following questions. (4x0.5=2)
i.
…………….. identifies each record uniquely.
ii.
…………….. query makes changes to the data.
iii.
…………….. is used to display and print final
result of database.
iv.
Auto number allocates …………… of memory
space.
9. Match
the following. (4x0.5=2)
A |
B |
Multimedia |
Retrieve records |
OLE |
Record |
Tuple |
Photo |
Query |
Digit, entry optional |
|
Power point
presentation |
Group C
: QBASIC Programming (18 marks)
10. Answer
the following questions. (3x1=3)
i.
Write two features of C.
ii.
Differentiate between output and append
mode.
iii.
Write the function of LINE INPUT# and KILL
statements.
11. Predict
the output of: (2)
DECLARE
SUB EVE(BA$)
CLS
CALL
EVE("CHOYU")
END
SUB
EVE(BA$
COL = 1
FOR 1 = LEN(BA$) TO 1 STEP -2
PRINT TAB(COL);MID$(BA$,COL,1)
COL = COL+1
NEXT
END SUB
12. Correct
the errors in the program: (2)
REM
store records
CLS
OPEN
"peaks.xls" FOR INPUT AS #75
DO
INPUT "Enter peak"; P$
INPUT "Enter district";D
INPUT "Height";H
WRITE P$,D$,H
INPUT "Do U 1 2 add more";mor$
LOOP
WHILE UCASE$(mor$)="y"
CLOSE#75
13. Study
the given program and answer the questions: (2)
DECLARE
FUNCTION KAT(N( ) )
CLS
DIM
AR(4)
FOR I =
1 TO 4
READ AR(I)
NEXT
PRINT
KAT(AR(I))
DATA
2,1,0,4
END
FUNCTION
KAT(N( ))
FOR I = 1 TO 4
S = S+N(I)
NEXT
KAT = S
END
FUNCTION
a. What is the return type of the
function?
b. Which line returns value to the
calling module?
14. a.
Write s program in Qbasic to display 4,44,444,4444 using sub-procedure. (3)
b.
Write a program to display sum of digits of a number using function procedure.
(3)
c.
A data file "pabson.txt" contains the records composed of the fields
like school, principal, address, contact. Write a program in Qbasic to display
records of the schools located in either Kathmandu or Palpa. (3)
Æ Best of Luck Å
No comments:
Post a Comment