Tuesday, October 18, 2016

Solved SLC Send Up Kathmandu Pabson 2066


Send-up Examination solved- 2066
PABSON
Send-up Examination-2066
Group A
Computer Fundamental (22 marks)
1.      Answer the following questions:
a)      What is LAN? What are its main objectives?
Ans:  
A Local Area Network(LAN) is a small network of computers that are relatively near with each other within a small area like a room, building or within a short distance through wire or wireless media. Its main objectives are :
·         To share the hardware resources, data as well as softwares.
·         To reduce or control costs.
           
b)      What is file transfer protocol? Why it is important?
Ans:  
File Transfer Protocol is an Internet tool that allows the user to transfer file on one computer to another computer.
It is important because it is most commonly used to download a file from a server using the Internet or to upload a file to a server.

c)      Multimedia technology makes classroom presentation more interactive. Explain
Ans:
 Multimedia technology is very much useful in classroom. It helps to present the information about various topics in more interesting and interactive way which makes the learner easy to understand. It helps to give better ideas and concept to the students with good vocabulary.

d) What is a backup? Why is backup vital to computer security system.
            Ans:  
                        Backup is the system of copying data and programs into other location or creating    duplicate copies of it’s in a secured place.
                        Backups are vital to computer security system to save the important data and            programs from the accidental or intentional harm. When data and software are damaged             or lost, we can recover from the backup copy. So, backup is vital to computer security             system.

e) Write any four symptoms of computer virus.            Ans: The four symptoms of computer virus are as follows:
§  Program takes long time to load.
§  Corrupts the system’s data.
§  Programs open automatically without getting instructions.
§  Renames the files with different names.





















3. Match the following
   Group A                               Group B
a) Duplex                                 i) Online business
b) E-commerce                                    ii) A network component
c) Router                                  iii) Two way communication
d) Virus                                   iv) One way communication

Ans:
Group A                                    Group B
i) Duplex                     -           a) two way communication
ii) E-commerce            -                       b) Online business
iii) Router                    -           c) A network component
iv) Virus                      -           d) Destructive Program



4. Choose the best answer:a) A …………… is the main line of defense between a local network, or intranet, and the Internet.
i) USB Port      ii) Fire wall      iii) Encryption key       iv) None of the above
Ans: Firewall


b) A ……………… is a someone who uses a computer and a network Internet connection to include to intrude into another computer or system to perform an illegal act.
i) hacker                      ii) Programmer             iii) Terrorist      iv) Spammer
Ans: Hacker

c) ………… means any kind of multi way communication carried out in real time using telecommunications or computer network equipment.
i) Videoconferencing   ii) Data-conferencing   iii) Teleconferencing    iv) Serial conferencing
Ans: Videoconferencing

d) Each computer on the Internet has a unique numeric address called a ………..
i) domain address                    ii) protocol address      iii) IP address
Ans: IP address



5. Give appropriate technical terms for the following:a) Device which boots the strength of the received signal and retransmits it.Ans: Repeater

b) Number of bits transfer per second using network.Ans: Bandwidth

c) The artificial environment created by computer technology to entertain user.Ans: Virtual Reality

d) Type of network architecture that doesn’t specify a server and workstation.Ans: Peer-to-Peer Network


 6. Write the full forms of:a)VSAT- Very Small Aperture Terminal
b) VOIP- Voice Over Internet Protocol
c) NAT - Network Address Translation
d) BBS- Bulletin Board System
Group B
Database (10 marks)
7. Answer the following questions:

a) Define database. Give an example of database.
Ans:    
Database is a collection of related and organized information that is used to store, organize and extract data. Example: Telephone directory, dictionary etc.
b) Define primary key. Give its types.
Ans:
             Primary key is a field that uniquely identifies the record, it is needed because it neither accepts duplicate value nor null value. Its types are:
1.      Composite key 
2.       Foreign key

c) What is query? Mention its types.
Ans:
Query is an object of MS-Access which allows selecting specific data from one or more tables. Its types are:
3.      Select query
4.      Action Query


8. Select the best answer:a) Record of the table is also known as:
i) Tuple                        ii) Field                        iii) Text                        iv) All
Ans: Tuple

b) The column in access table is ……….
i) Field                         ii) Record         iii) Query         iv) None
Ans: Field

c) The logical data types of Access is
i) Yes/No         ii) Record         iii) Query         iv) None
Ans: Yes/No

d) …………… accelerates the Query and sort operations.
i) Index                        ii) Sort              iii) Number      iv) Filter
Ans: Index

9. Match the following:
 Group A                     Group B
a) Data Integrity           i) Smart tag
b) Automatic                ii) Validation Rule
c) Field Properties        iii) Caption
d) Label for field         iv) Indexed
                                    v) Default Value

Ans:
Group A                                  Group Ba) Data Integrity           -           Validation Rule
b) Automatic                -           Default value
c) Field properties        -           Indexed
d) 
Label for field         -           Caption

Group C 
Programming (18 marks)
10. a) What do you mean by parameter?
Ans: Variables in sub module or a procedure declaration which accept data or variables passed to them from the calling module are known as parameters.
b) Mention two characteristics of ‘C’ language.
Ans: The characteristics of  C language are:
·         It is simple and easy to use.
·         It occupies less memory space.

c) Write down the function of the following statements:
i) COMMON SHARED                        ii) KILL
Ans: The function of:
i.                 COMMON SHARED :    It is used to declare global variable in main module.
ii.                KILL:     It deletes the file or files from the specified drive and directory.

11. Write the output of the given program: DECLARE SUB RESULT()
CLS
CALL RESULT
END

SUB RESULT()
W$=”SCIENCE”
L=LEN(W$)
X=1: Y=3
FOR I = 1 TO L STEP 2
PRINT TAB(Y) ; MID$(W$,X,L)
X=X+1
L=L-2
Y=Y+1
NEXT I
END SUB











12. Rewrite the following program after correcting the bugs:DECLARE SUB RESULT()
DIM N(10)
CLS
FOR J = 1 TO 10
INPUT “Enter any number”; X(J)
LOOP
PINT “Sum of Even numbers”; SUMEVEN(())
END

FUNCTION SUMEVEN(N())
S=0
FOR K = 1 TO 10
IF N(K) MOD 2=0 THEN
S=S+N(K)
END
NEXT K
S=SUMEVEN
ENDFUNCTION
Ans:
DECLARE SUB RESULT()
DIM N(10)
CLS
FOR J = 1 TO 10
    INPUT "Enter any number"; X(J)
NEXT J
PRINT "Sum of Even numbers"; SUMEVEN(N())
END

FUNCTION SUMEVEN (N())
S = 0
FOR K = 1 TO 10
    IF N(K) MOD 2 = 0 THEN
        S = S + N(K)
 END IF
NEXT K
 SUMEVEN = S
END  FUNCTION
13. Study the following program and answer the following questions:
OPEN “DETAIL.DAT” FOR INPUT AS #1
OPEN “TEMP.DAT” FOR OUTPUT AS #2
INPUT “Name of the student”; NM$
FOR I = 1 TO 10
INPUT #1, N$,C,A
NEXT I
CLOSE #1,#2
KILL “DETAIL.DAT”
NAME “TEMP.DAT” AS “DETAIL.DAT”
END

a) What is the main objective of the above program?
Ans: The main objective of above program is to delete the record of supplied name of student.

b)  If the data file “DETAIL.DAT” contains only 8 record, then the program will run? If not then what will be the error message?
Ans: The error message will be displayed as “INPUT PAST END OF FILE”.
 
14. a)
 Write a program to input age of the voters and check whether they can cast the vote or not. Using SUB-END SUB.
Ans:
DECLARE SUB CHECK(N)
CLS                                                     
INPUT ”Enter age of voter”; N
CALL CHECK(N)
END

SUB CHECK(N)
IF N> = 18 THEN
PRINT “You can cast vote.”
ELSE
PRINT “You cannot cast vote.”
END IF
END SUB
b) Write a program to create a user defined function to input a number and check if it is multiple of 5 or not.
Ans:
DECLARE FUNCTION CHECK$(N)
CLS
INPUT “Enter any number”; N
PRINT N; “is” ; CHECK$(N)
END

FUNCTION CHECK$(N)
IF N MOD 5 = 0  THEN
CHECK$ = “multiple of  5”
ELSE
CHECK$ = “not multiple of 5”
END IF
END FUNCTION

c) ) Write a program to create a sequential data file “RESULT.DAT” to store name, address and marks obtained in 3 different subjects of students.Ans:
OPEN “LIB.TXT” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter name”; N$
INPUT “Enter address”; A$
INPUT “Enter marks in three subjects”; M1, M2, M3
WRITE #1, N$, A$, M1, M2, M3
INPUT “Do you want to continue?”; CH$
LOOP WHILE UCASE$(CH$) = “Y “
CLOSE #1
END
***


No comments:

Post a Comment