Computer Fundamental (22 marks)
1. Answer the following questions: 2×5=10
a) What is network topology? Write any one advantage of star topology.
The arrangement or connection pattern of computer or nodes and other devices of the network are known as network topology.
Any one advantage of star topology is:
i) Failure of single computer or cable doesn’t affect the entire network.
b) Give any two advantages of E-mail over traditional mail.
Any two advantages of E-mail over traditional mail are
i) It allows sending and receiving message across the world at very low cost.
ii) Emails are usually received fairly quickly, most of the time a couple of seconds after they are sent.
c) List any two main aims of formulating cyber law in Nepal.
The two main aims of formulating cyber law in Nepal are:
i) To legalize the transaction through electronic media to control various types of electronic frauds
ii) To punish a person who does criminal activities through electronic means especially on computers.
d) Give any two symptoms of virus attack.
The two symptoms of virus attacks are:
i) Increased use of disk space and growth in file size
ii) Program takes long time to load.
e) Give the importance of UPS to the computer system.The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
2. a) Convert as instructed: 0.5×2=1
i) (BED)16 into binary
Converting Hexadecimal to Binary equivalent value
B = 1011
E = 1110
D = 1101
= (101111101101)2
ii) (1010111)2 into octal
Converting Binary to Octal equivalent value
001 = 1
010 = 2
111 = 7
=(127)8
b) Perform the binary calculations 0.5×2=1
3. Match the following 0.5×4=2
Group A Group B
i) Combination of several media a) Guided Media
ii) POP b) Power Protection Device
iii) UTP c) Multimedia
iv) UPS d) Protocol used in e-mail
e) CD-ROM
Answers
i) Combination of several media a) Multimedia
ii) POP b) Protocol used in e-mail
iii) UTP c) Guided Media
iv) UPS d) Power Protection Device
4. Choose the correct answer 0.5×4=2
a) Which of the following is an audio output device?
i) Microphone ii) Speaker iii) Monitor iv) Printer
Speaker
b) Which one is not a type of virus?
i) Message Carrying virus ii) Boot sector virus
iii)System virus iv)Special Purpose Application Infector
Special Purpose Application Infector
c) Which one is bounded media?
i) Fibre optics ii) Microwave
iii) Infrared iv)Laser
Fibre optics
d) Which one is an operating system software?
i) MS-Word ii) MS-Excel iii) Firefox iv) MS-DOS
MS-DOS
5. Give an appropriate technical term for the following. 0.5×4=2
a) A program that can disinfect a file from virus
Antivirus Software
b) A person who steals or destroys other’s data, information and program
Hacker
c) A company that provides internet service
ISP (Internet Service Provider)
d) A computer in a network which can provide services to other computer
Server
6. Write the full forms of: 0.5×4=2
a) TCP/IP = Transmission Control Protocol / Internet Protocol
b) LAN = Local Area Network
c) UPS = Uninterruptible Power Supply
d) FTP = File Transfer Protocol
Group B
Database (10 marks)
7. Answer the following: 2×3=6
a) Define data and information.
Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense.
Information is an organized collection of related data which gives a complete sense.
b) What is report? Give its importance.
Report is an object of database which displays the output in an effective way to present the data in a printed format.
The importance of report are:
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
c) Name any four data types that can be defined in MS-Access.
Any four data types that can be defined in MS-Access are:
i) Text
ii) Memo
iii) Number
iv) Yes/No
8. Choose the best answer. 0.5×4=2
a) The columns in database tables are called:
i) Record ii) Field iii) Report iv) Memo
Field
b) Which is suitable data type to store video?
i) Text ii) Number iii) Hyperlink iv) OLE object
OLE object
c) Text data type can store maximum of ___characters
i) 250 ii) 350 iii) 255 iv) 355
255
d) Which of the following is database application?
i) MS-Word ii) MS-Access iii) MS-Excel iv) QBASIC
MS-Access
9. Match the following 0.5×4=2
Group A Group B
i) Indexing Data a) Size upto 1 GB
ii) Form b) Column of datasheet
iii) Field c) Row on a datasheet
iv) OLE object d) Searching Fast
e) Graphical interface for data entry
Answers
Group A Group B
i) Indexing Data a) Searching Fast
ii) Form b) Graphical interface for data entry
iii) Field c) Column of datasheet
iv) OLE object d) Size upto 1 GB
Group C
Programming (18 marks)
10. a) What is a variable? 1
The data item whose value changes during the execution of a program is called variable.
b) Name any two data types used in C language. 1 Any two data types used in C language are:
i) char
ii) int
c) Give the functions of: 0.5×2=1
i) NAME AS
The NAME statement renames a file on a diskette. Only file name changes, data and program
ii) CLOSE
It closes one or all open files.
11. Rewrite the following program after correcting the bugs: 2
DECLARE SUB Series(.)
DLC
EXECUTE Series
END
SUB Series
REM to generate 2 2 4 6 10….. upto 10th term
P=2
Q=2
FOR Ctr=1 TO 5
DISPLAY P,Q,
P=P+Q
Q=P+Q
WEND
END Series()
Debugged Program
DECLARE SUB Series( )
CLS
CALL Series
END
SUB Series
REM to generate 2 2 4 6 10….. upto 10th term
P=2
Q=2
FOR Ctr=1 TO 5
PRINT P,Q,
P=P+Q
Q=P+Q
NEXT Ctr
END SUB
13. Study the following program and answer the questions: 1×2=2
DECLARE FUNCTION Sum(A,B)
INPUT “Enter first number:”; A
INPUT “Enter second number:”; B
PRINT “The sum of the two number=”;Sum(A,B)
END
FUNCTION SUM(A,B)
S=A+B
Sum=S
END FUNCTION
a) List the numerical variables used in the above program.
Ans: The numerical variables used in the above program are A, B, S
b) Will the program run if the first line (i.e. DECLARE….) is deleted?
Ans: Yes, the program will run if the first line (i.e. DECLARE...) is deleted.
14. a) Write a program using Function…..End Function to get temperature in Celsius from the user and then print the temperature in Fahrenheit.(hint: F=9C/5+32). 3
DECLARE FUNCTION CONVERT (C)
CLS
INPUT “ENTER TEMPERATURE IN CELCIUS”; C
PRINT “TEMPERATURE IN FARENHEIT=”; CONVERT (C)
END
FUNCTION CONVERT (C)
F = 9 * C / 5 + 32
CONVERT = F
END FUNCTION
b) Write a program using Sub….End Sub to get a word from the user and then print it in reverse order. 3
DECLARE SUB REV (S$)
CLS
INPUT "ENTER ANY STRING"; S$
CALL REV(S$)
END
SUB REV (S$)
FOR I = LEN(S$) TO 1 STEP -1
W$ = W$ + B$
NEXT I
PRINT "REVERSED STRING IS "; W$
END SUB
OPEN “Marks.dat” FOR INPUT AS #1
CLS
PRINT “NAME”, “ENGLISH”, “NEPALI”, “MATHS”, SCIENCE”
WHILE NOT EOF(1)
INPUT #1, N$, E, N, M, S
PRINT N$, E, N, M, S
WEND
CLOSE #1
END
***
Very helpful
ReplyDeletePls post solved paper of SEE 2075