SEE COMPUTER SCIENCE 2082 – FULL N FINAL REVISION –28 Marks– PREPARED BY – DEEPAK SHRESTHA
1️⃣ Write any two data types used in C
language.
Answer: Two data types used in C language
are int and char.
2️⃣ What is modular programming?
Answer: Modular programming is a technique
of dividing a program into small, manageable and logical modules or
sub-programs.
3️⃣ What is the maximum length of
field name in MS-Access?
Answer: The maximum length of a field name
in MS-Access is 64 characters.
4️⃣ What is search engine?
Answer: A search engine is an online tool
that helps users find information on the internet using keywords.
5️⃣ What is the business done through
internet?
Answer: The business done through the
internet is called e-commerce.
6️⃣ Which data type is used to store
photo in MS-Access?
Answer: OLE Object data type is used to
store photos in MS-Access.
7️⃣ What is web browser?
Answer: A web browser is a software
application used to access and display web pages on the internet.
8️⃣ What is looping?
Answer: Looping is the process of
repeating a statement or group of statements until a certain condition is
satisfied.
9️⃣ Name any two unguided transmission
media.
Answer: Two unguided transmission media
are radio waves and microwaves.
What is social media?
Answer: Social media are online platforms
that allow users to create, share and interact with content and connect with
others.
Which statement is used to call
sub-procedure?
Answer: The CALL statement is used to call
a sub-procedure.
What is the default extension of
MS-Access?
Answer: The default extension of MS-Access
is .accdb (and .mdb in older versions).
Which object of MS-Access is used
to retrieve data from the table?
Answer: Query is used to retrieve data
from a table.
What is network protocol?
Answer: A network protocol is a set of
rules that govern communication between devices in a network.
Which data type is used to store
date of birth in MS-Access?
Answer: Date/Time data type is used to
store date of birth in MS-Access.
Write any two elements of database.
Answer: Two elements of a database are
field and record.
Write any two benefits of
e-governance service.
Answer: Two benefits of e-governance are
transparency and easy access to government services.
Which type of query is used to
calculate total marks in MS-Access?
Answer: Select query is used to calculate
total marks in MS-Access.
List the different types of
procedures in QBasic.
Answer: The two types of procedures in
QBasic are Sub procedure and Function procedure.
Which format specifier is used for
‘int’ in C language?
Answer: The format specifier used for int
in C language is %d.
What is telecommunication?
Answer: Telecommunication is the
transmission of data and information from one place to another for
communication.
Give any two examples of simplex
mode.
Answer: Two examples of simplex mode are
radio and television broadcasting.
Write the syntax of KILL statement.
Answer: The syntax of KILL statement is:
KILL "filename".
What is online payment?
Answer: Online payment is the process of
paying for goods or services through the internet.
Write down any two objects of
MS-Access.
Answer: Two objects of MS-Access are table
and form.
What is report?
Answer: A report is a database object used
to present data in a formatted and printable manner.
Write the function of WRITE
statement.
Answer: The WRITE statement is used to
write data into a sequential file.
📘 GROUP B
1️⃣ What is Computer Network? Enlist
any two advantages.
Answer:
A
computer network is a group of two or more computers and devices connected
together through communication media to share data and resources. It allows
users to communicate and exchange information efficiently.
Advantages:
- Hardware
devices like printers and scanners can be shared.
- Data
and information can be exchanged quickly among users.
2️⃣ What is Computer Ethics? Write any
two ethics.
Answer:
Computer
ethics refers to the moral principles and guidelines that regulate the proper
use of computers and information technology. It encourages responsible and
lawful behavior while using digital devices.
Any
two ethics:
- Do
not use a computer to harm others.
- Do
not access or modify others’ files without permission.
3️⃣ What is Computer Security? Write
any two measures.
Answer:
Computer
security is the protection of computer systems, data, and devices from
unauthorized access, misuse, or damage. It ensures the safety and
confidentiality of information.
Any
two measures:
- Install
antivirus software to prevent malware attacks.
- Use
strong passwords and firewall protection.
4️⃣ What is Software Security? Write
any two measures.
Answer:
Software
security refers to the protection of computer programs and applications from
hacking, viruses, and unauthorized modification. It ensures that software
functions safely and correctly.
Any
two measures:
- Update
software regularly to fix vulnerabilities.
- Use
licensed and genuine software only.
5️⃣ Define E-Commerce. Write any two
benefits.
Answer:
E-commerce
is the buying and selling of goods and services over the internet through
electronic transactions. It allows businesses and customers to perform
transactions online.
Any
two benefits:
- Customers
can shop anytime and from anywhere.
- It
reduces operational and transportation costs.
6️⃣ What is DBMS? Write any two
advantages.
Answer:
DBMS
(Database Management System) is software used to create, store, manage, and
retrieve data efficiently in an organized manner. It helps in systematic
handling of large amounts of information.
Any
two advantages:
- Reduces
duplication of data.
- Provides
better data security and control.
7️⃣ What is Primary Key? List any two
advantages.
Answer:
A
primary key is a field in a database table that uniquely identifies each record
and does not allow duplicate or null values.
Any
two advantages:
- Ensures
uniqueness of records.
- Helps
establish relationships between tables.
8️⃣ What is Query? Mention its types.
Answer:
A
query is a database object used to retrieve, filter, and manipulate specific
data from one or more tables based on given conditions.
Types
of query:
- Select
Query
- Action
Query (Update, Delete, Append, Make Table)
9️⃣ What is Form? Write any two uses.
Answer:
A
form is a database object used to enter, edit, and display data in a structured
and user-friendly format.
Any
two uses:
- Simplifies
data entry.
- Allows
modification of existing records.
🔟 What is Report? Why is it
necessary?
Answer:
A
report is a database object used to present data in a formatted and printable
layout. It organizes information in a clear and structured way.
It
is necessary because it summarizes data and produces professional output for
printing and presentation.
🔹 What is Data Sorting? List any two
advantages.
Answer:
Data
sorting is the process of arranging records in ascending or descending order
based on a specific field such as name, roll number, or marks. It helps
organize data systematically.
Any
two advantages:
- Makes
data easier to understand.
- Helps
in quick searching of records.
🔹 What is Antivirus Software? Name
any two examples.
Answer:
Antivirus
software is a program designed to detect, prevent, and remove viruses and other
malicious software from a computer system. It protects the system from security
threats.
Examples:
- Norton
Antivirus
- Kaspersky
Antivirus
🔹 Define Artificial Intelligence
(AI). Write any two uses.
Answer:
Artificial
Intelligence (AI) is the branch of computer science that enables machines to
perform tasks that normally require human intelligence, such as learning and
decision-making.
Any
two uses:
- Self-driving
cars
- Medical
diagnosis systems
🔹 What is M-Commerce? Write any two
important services.
Answer:
M-Commerce
(Mobile Commerce) is the buying and selling of goods and services using mobile
devices such as smartphones through wireless internet.
Any
two services:
- Mobile
banking
- Online
shopping apps
🔹 What is IoT? Write any two
importance of it.
Answer:
Internet
of Things (IoT) refers to a network of interconnected devices that communicate
and exchange data through the internet without human intervention.
Any
two importance:
- Reduces
human effort through automation.
- Allows
remote monitoring and control of devices.
🔹 Define Field and Record.
Answer:
A
field is a column in a database table that stores a specific type of data.
A record is a row in a table that contains complete information about one
entity.
🔹 What are the symptoms of computer
virus?
Answer:
A
computer virus is a harmful program that affects system performance.
Any
two symptoms:
- Slow
performance of the computer.
- Files
and programs may get corrupted or deleted.
🔹 What is Network Topology? List any
two types.
Answer:
Network
topology refers to the physical or logical arrangement of computers and devices
in a network.
Any
two types:
- Star
topology
- Bus
topology
🔹 Define Virtual Reality. Write any
two areas where it is used.
Answer:
Virtual
Reality (VR) is a computer-generated simulated environment that appears real
and allows users to interact with it.
Any
two uses:
- Gaming
- Medical
training
🔹 What is Password? Write any two
importance of password protection.
Answer:
A
password is a secret combination of characters used to protect computer systems
and accounts from unauthorized access.
Any
two importance:
- Prevents
unauthorized access.
- Protects
personal and confidential data.
🔹 What are Validation Rule and
Validation Text?
Answer:
Validation
Rule is a field property in MS-Access that restricts the type of data entered
in a field.
Validation Text is the error message displayed when invalid data is entered.
🔹 Give the differences between
Select Query and Action Query.
Answer:
|
Select Query |
Action Query |
|
It is used to retrieve and
display data from one or more tables. |
It is used to modify data in a
table. |
|
It does not change the original
data. |
It changes the original data
permanently. |
|
Example: Viewing records based on
a condition. |
Example: Update, Delete, Append,
Make Table queries. |
🔹 What is Backup? How does it help
to secure data?
Answer:
Backup
is a duplicate copy of important data stored separately for safety. It helps
recover data in case of system failure, virus attack, or accidental deletion.
🔹 What is Social Media? Write any
one reason why it is popular.
Answer:
Social
media are online platforms that allow users to create, share, and interact with
content and communicate globally.
It
is popular because it enables instant communication and fast information
sharing.
🔹 Differentiate between Guided and
Unguided Media.
Answer:
|
Guided Media |
Unguided Media |
|
Guided media uses physical cables
or wires to transmit data. |
Unguided media uses wireless
signals to transmit data. |
|
Data travels through a fixed
path. |
Data travels through air or space
without physical connection. |
|
Examples: Twisted pair cable,
Coaxial cable, Fiber optic cable. |
Examples: Radio waves,
Microwaves, Satellite communication. |
🔹 What is E-Governance? Give any two
examples.
Answer:
E-Governance
is the use of electronic systems and the internet to provide government
services to citizens efficiently.
Any
two examples:
- Online
tax payment
- Online
PAN registration
🔹 What is Data Communication? List
two modes.
Answer:
Data
communication is the process of transferring data between two or more devices
through communication channels.
Two
modes:
- Simplex
- Duplex
🔹 What is Table? Which view is used
to modify a table?
Answer:
A
table is the main database object in MS-Access used to store data in rows and
columns.
Design
View is used to modify the structure of a table.
🔹 Give any two differences between
Form and Report.
Answer:
|
Form |
Report |
|
A form is used to enter, edit,
and view data in a database. |
A report is used to present data
in a formatted and printable layout. |
|
Data can be modified through a
form. |
Data cannot be modified through a
report. |
FULL
FORMS
1️⃣ STP – Shielded Twisted Pair
2️⃣ POP – Post Office Protocol
3️⃣ G2G – Government to Government
4️⃣ ISP – Internet Service Provider
FTP
– File Transfer Protocol
MAN
– Metropolitan Area Network
AI
– Artificial Intelligence
IoT
– Internet of Things
URL
– Uniform Resource Locator
NIC
– Network Interface Card
OTP
– One Time Password
UPS
– Uninterruptible Power Supply
VR
– Virtual Reality
WAP
– Wireless Application Protocol
TECHNICAL TERMS
A
program that protects computer from computer virus / A program that can
disinfect a file from virus.
Answer: Antivirus Software
Network
of networks.
Answer: Internet
Learning
through the electronic media.
Answer: E-Learning
Digital
trails created while using internet / The recording of interaction with the
digital world.
Answer: Digital Footprint
Law
that governs the legal issues of cyberspace.
Answer: Cyber Law
The
smallest unit to represent information on a quantum computer.
Answer: Qubit (Quantum Bit)
A
system of copying data and information into another location.
Answer: Backup
A
company which provides services of Internet.
Answer: Internet Service Provider (ISP)
A
secret group of characters used to protect computer system from unauthorized
users.
Answer: Password
An
artificial environment created by a computer system that appears real.
Answer: Virtual Reality
Data
transmission in only one direction.
Answer: Simplex Mode
The
websites that search documents for specified keywords in WWW.
Answer: Search Engine
An
illegal activity done through computer and internet.
Answer: Cyber Crime
The
rate at which data is transmitted through a given medium.
Answer: Bandwidth
