Tuesday, October 18, 2016

Solved SLC Qulfy. Examination Ktm Pabson 2070


PABSON, Kathmandu

            S.L.C Qualifying Examination 2070

Subject: Opt II Computer Science                                               F.M.: 50

Time: 1.30hrs                                                                            P.M.: 20

Candidates are required to answer in their own words as far as practicable credit shall be given to creativity not for rote learning.

Group A (Fundamental – 22 Marks)

1.      Answer the following questions:                                2 × 5 = 10

a)      Mention the differences between client-server network model and peer-to-peer network/model.

Ans:  The difference between client - server network model and peer to peer network model are as follows:

Client/Server network
Peer to peer network
It consists of at least one server and one or more workstations.
It is a group of computer which function both as clients or workstations.
It provides the high security for the data.
It provides no reliable security and keep data under risk.


b)      What is internet? How is it different than intranet?

Ans: Intranet is a private computer network that uses the internet protocol to securely share any part of information of an organization.
Internet is worldwide interconnection of all smart communication devices whereas Intranet is a privately owned part of internet.

c)      Multimedia technology makes classroom presentation more interactive. Explain.

Ans: Multimedia technology is very much useful in classroom. It helps to present the information about various topics in more interesting and interactive way which makes the learner easy to understand. It helps to give better ideas and concept to the students with good vocabulary.



d)      What do you mean by computer security? List its types.
                   
     Ans: The security given to the computer for the protection of  hardware, software and other resources from being lost or damaged due to accidental or intentional harm is known as             computer security.
                        Its types are:
                        1) Hardware security.
                        2) Software security.
             

e)      List any four reasons for creating computer viruses.

Four reasons for creating computer viruses are:

1. To destroy or infect the boot sector of the disk.
2. To destroy application programs.
3. To destroy program files or boot records.
4. To infect the software document or template created using word processing or spreadsheet software.

































2.        Match the following.                                                   4 × 0.5 = 2
a)      UPS                       Multimedia
b)      TCP/IP                   Responsible for sending the mails
c)      SMTP                    Responsible for downloading the mails
d)      Speaker                  Compulsory protocol for computer
Hardware security


Answers

a)      UPS                       Hardware security
b)      TCP/IP                   Compulsory protocol for computer
c)      SMTP                    Responsible for sending the mails
d)      Speaker                  Multimedia


4. Replace the following definitions with a technical term. 2
a)      A network of computer formed by using cables.
Local Area Network
b)      Small program that can replicate itself without knowledge of user.
Computer Virus.
c)      One of the cheapest services provided by the internet.
 E-mail.
d)      The process of restoring encrypted data to its original form.
 Backup.

5. Write the full forms of:                                         4 × 0.5 = 2
      a. MPEG: Moving Picture Experts Group.    

b. PSTN: Public Switched Telephone Network.        

c. NIC: Network Interface Card.                

d.  RJ – 45: Registered Jack - 45


6. Choose the best answer.                                      4 × 0.5 = 2
a.        A real time communication service provided by internet is ………….
i.                     E-mail                           ii. Chat
iii.         FTP                              iv. Website
Chat

b.       The communication mode where receiver cannot respond immediately.
i.                     Half duplex                   ii. Full duplex
iii.         Simplex                         iv. None of the above
Half Duplex

c.       Cyber law of Nepal was enacted in Nepal in ………….. B.S.
i.                     2062                             ii. 2060
iii.         2061                             iv. 2068
2061

d.       A virus that infects the application program.
i.         Boot sector virus                 ii. Program virus
iii.   Multipartite                   iv. Stealth virus
                        Program virus

Group B (DBMS – 10 Marks)
7. Answer the following questions:                                  2 × 3= 6
a.       List any four advantages of DBMS.

Any four advantages of DBMS are as follows:
i. It is possible to control data redundancy.
ii. It allows sharing the existing database.
iii. It maintains accurate database.
iv. It provide better interacting environment to the user.


b.       What is an update query? List any two features of primary key.

Update query is a type of action query which makes global change in data of a table or more linked table.
                  Two features of primary key are as follows:
i. It sets the relationship between tables.
ii. Reduces and controls duplication of record in a table.


c.       List any two differences between Form and Report.

Two difference between Form and Report are :

Report
Form
It is used for viewing and printing data.
It is used to accept data for data entry to a query.
It allows output of data.
It allows to input a data.


8. State whether the given statements are true or false.    4 × 0.5 = 2
a.       A field name can have maximum of 64 characters. True.
b.       The Date/ Time field data type occupies 4 bytes of memory. False.
c.       A field cannot be declared without data type. True.
d.       A row of a table is known as field in MS-Access. False.


9.      Match the following.                                                   4 × 0.5 = 2
a.    Hyperlink                stores unique sequential number
b.    Yes/No                   Stores numbers
c.    Auto number           stores email address
d.    Number                  stores images
                                                Stores logical data

Answers
a. Hyperlink                  stores email address
b. Yes/No                     Stores logical data
c. Auto number             stores unique sequential number
     d. Number                     Stores numbers
                                               

Group C (Programming – 18 Marks)
10. Answer the following questions:                                            3
a. List a difference between Argument and Parameter?

A difference between Argument and parameter is:
Argument
Parameter
Arguments are values that are sent to the procedure.
These are variables that will receive data sent to the procedure.


b. Why C language is called middle level language?
            C is called middle level language because it combines elements of high level language with some features of assembler.

c. Write down the function of FILES statements and PRINT #command.
Function of file statement is to display the files of the current sub directory or specified sub directory. The function of PRINT# command is to send one or more data items to the specified file

11. Write the output of the following program.                 2
            DECLARE SUB DISPLAY(X)
            CLS
            FOR N = 1 TO 10 STEP 3
            CALL DISPLAY (N)
            NEXT N
            END
            SUB DISPLAY (X)     
            IF X MOD 2 =1 THEN PRINT X;
            END SUB










12. Rewrite the following program correcting the bugs.    2
REM to display a word by extracting characters of even position.
CLS
DECLARE SUB POS$(X$, Y$)
INPUT “ENTER A WORD:”; X$
CALL SUB POS$ (X$, Y$)
END
SUB WORD$(X$, Y$)
FOR P = 1 TO LEN (X$) STEP 2
E$ = LEFT$ (X$, 1, P)
WORD$ = E$ + WORD$
NEXT P
Y$ = WORD$
END SUB


Debugged Program
REM to display a word by extracting characters of even position.

DECLARE SUB WORD (X$, Y$)
CLS
INPUT "ENTER A WORD:"; X$
CALL WORD(X$, Y$)
PRINT Y$
END


SUB WORD(X$, Y$)
FOR P = 1 TO LEN(X$) STEP 2
E$ = MID$(X$, P, 1)
W$ = E$ + W$
NEXT P
Y$ = W$

END SUB



13. Read the following program and answer the questions:2         
            DECLARE SUB TEST (W$)
            CLS
            INPUT “ENTER A WORD”;A$
            CALL TEST (A$)
            END
            SUB TEST (W$)
            FOR K = 1 TO LEN (W$)
            U$ = MID$ (W$, K, 1) +U$ 
            NEXT K
            PRINT U$
            END SUB
Questions:                                                        
a.       List the arguments and parameters used in the above program.
Ans: The arguments and parameters used in the above program are
Parameter : W$
Argument: A$

b.       List the library functions used in the above program.
Ans: The library functions used in the above program are
LEN, MID$

14. a. WAP using function procedure that displays area of a circle. The program allows a user to input radius in the main module.             3

                        DECLARE FUNCTION AREA(R)
                        CLS
                        INPUT "PLEASE ENTER THE RADIUS OF THE CIRCLE"; R
                        CALL AREA(R)
                        END

                        SUB AREA (R)
                        A = 3.14 * R ^ 2
                        PRINT "THE AREA OF THE CIRCLE WITH RADIUS";R;"IS";A
                        END SUB


b. WAP to declare a function procedure that checks whether a enter number is prime or composite.                                                                                  3

DECLARE FUNCTION CHECK(N)
CLS
INPUT “Enter any number”; N
P=CHECK(N)
IF P=2 THEN
PRINT P;”is prime number”
ELSE
PRINT P;”is composite number”
END IF
END

FUNCTION CHECK(N)
C=0
FOR I=1 TO N
IF N MOD I = 0 THEN C=C+1
NEXT I
CHECK = C
END FUNCTION


c. A sequential data file named “Nabil.txt” contains record of clients of a bank including depositor’s name, deposited amount, time and rate of interest. WAP to display detail of all depositors including simple interest.3

OEN "Nabil.txt" FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, D$, A, T, R
S=(A*T*R)/100
PRINT D$, A, T, R, S
WEND
CLOSE #1
END




By: Roman


No comments:

Post a Comment