Tuesday, October 18, 2016

Solved SLC Send Up Kathmandu Pabson 2068


PABSON SEND UP 2068
Optional II [Computer Science]
Examinees are required to answer in their own words as far as practicable. Credit shall be given to clarity and originality, not rote learning.
Time: 1 hour 30 minutes                                                                                            Full Marks: 50
Subject: Computer                                                                                                     Pass Marks:20
Attempt all the questions.
Group A
Computer Fundamental (22 Marks)

1. Answer the following questions:                                                    5×2=10           
a)      Define network. Write any two disadvantages of it.
Ans: A network means two or more than two computers connected to each other to share data, hardware, software and other resources.
Any two disadvantages of computer network are as follows:
i.           Failure of network stops application being opened.
ii.         Network failure causes loss of data.

b)      Define email. Write any two advantages of email comparing to postal mailing system.
Ans: The most popular service provided by the internet which is used to send and receive mail through the internet is known as e-mail.
Any two advantages of e-mail comparing to postal mailing are as follows:
i.   E-mail is faster and cheaper than postal service.
ii. E-mail allows us to send and receive message, documents, sounds, etc. across the world.

c)      What is multimedia technology? Write any two benefits of it.
Ans: the integration of several forms of media such as text, audio, video, etc. which helps to present the information in more interactive and understandable way is known as multimedia technology.
Any two benefits of it are as follows:
i.   It makes teaching-learning easier in the classroom.
ii.    It makes presentation of related subject matter attractive.

d)      Define the term computer security. Write three software security measures.
Ans: The security given to the computer from being lost or damaged due to accidental or intentional harm is known as computer security.
Any three software security measures are:
i.               Defragmentation
ii.              Scan disk
iii.            Backup

e)      What is computer virus? Write any three precautions to protect computer system from virus.
Ans: A type of computer program which is written by the computer programmer with the intent of damaging or destroying the data or programs residing in the computer system is known as computer virus.
Any three precautions to protect computer system from virus are as follows:
i.                    Do not install pirated softwares, especially computer games.
ii.                  Always scan files downloaded from the internet or transferred over the network before executing them.
iii.                Do not interchange the interchange disk among the computers.

























3.  Match the following:                                                                     4×0.5=2
            Group A                                              Group B
a)      Topology                     set of rules to make communication
b)      Protocol                       bounded media
c)      Blue tooth                    connection pattern of computer in network.
d)      Coaxial                                    unbounded media
Protocol
Ans:
Group A                                              Group B
a)      Topology         -           connection pattern of computer in network.
e)      Protocol           -           set of rules to make communication
b)      Blue tooth        -           unbounded media
c)      Coaxial                        -           bounded media

4. Choose the correct answer.                                                                       4×0.5=2
a)      Device that connects two network with different protocols.
i) NIC              ii) HUB                        iii) Switch        iv) Gateway
Ans: Gateway

b)      Visual communication between two different computers.
i) Virtual Reality          ii) Touch Screen          iii) Animation
iv) Video Conference
Ans: Video Conference

c)      Computers connected within an organization, which is controlled by single organization.
i) WAN                        ii) MAN                       iii) LAN           iv) None
Ans: LAN

d)      Which of the following is not cyber ethics?
i) Should not use computer to harm people
ii) should not use computer to steal
iii) should destroy data of other people
iv) All of the above
Ans: Should destroy data of other people

5. Give an appropriate technical term for the following.                  4×0.5=2
a)      Technology that allows combining text, sound, video etc.
Ans: Multimedia technology
b)      Buying and selling good through internet.
Ans: E-commerce
c)      A virus that infects boot record.
Ans: Boot sector virus
d)      A technology that makes teaching-learning easier in a classroom.
Ans: CAL (Computer Aided Learning)

6. Write the full forms.                                                                                   4×0.5=2
            a) ISP-Internet Service Provider
            ii) FTP- File Transfer Protocol
iii) WAN- Wide Area Network
iv) STP-Shielded Twisted Pair

Group B
Database (10 Marks)

7. Answer the following:                                                                    3×2=6
a)      Define DBMS. Write any two advantages of it.
Ans: The software which is used to manage data, manipulate them and provide the information is known as DBMS (Database Management Software).
Any two advantages of it are as follows:
i.     It controls data redundancy, which means duplication of data.
ii.   Large volume of data can be stored and updated easily.

b)      What is field? Write any four data types of MS-Access.
Ans: A column in a table which contains a specific piece of information within a record is known as field.
Any four data types of MS-Access are as follows:
i.     Text
ii.   Memo
iii. Number
iv. Currency

c)      Define query. Differentiate between select and action query.
Ans: Query is an object of MS-Access which allows to select specific data from one or more tables.
The differences between select and action query are as follows:







8. Choose the best answer.                                                                 4×0.5=2
a)      Correct data type to store logical data
i) Text              ii) Number       iii) Yes/No       iv) None
Ans: Yes/No
b)      It is an organized and formatted view of data using table.
i) Report          ii) Form            iii) Table          iv) None
Ans: Report
c)      Maximum size of field name is
i) 64                 ii) 50                iii) 255             iv) None
Ans: 255
d)      The extension of MS-Access file is
i) ADB             ii) MDB           iii) DBM          iv) None
Ans: MDB
9. Match the following.                                                                                   4×0.5=2
Group A                                              Group B
a)      Field                does not accept null value
b)      Data                 logical data type
c)      Primary key     raw facts
d)      Memo              a column of data
64000 characters
Ans:
            Group A                                  Group B
a)      Field                -           a column of data
b)      Data                 -           raw facts
c)      Primary key     -           does not accept null value
d)      Memo              -           64000 characters
Group C
Programming (18 Marks)
10. a) Define Modular programming.                                                              1
Ans: Modular programming is a technique in which a program is divided into different small manageable program blocks, which are called modules or sub-programs or procedure.

b) Why is C language called middle level language.                                              1
Ans: C language is called middle-level language because it combines the elements of high-level language with some features of assembler.

c) Give the functions of:                                                                            1
      i) KILL                        ii) EOF
Ans:The functions of:
                         i.     KILL: It deletes the files or files from the specified drive and directory.
                       ii.     EOF: It detects the End OF File marker reading data from an OPEN sequential file.
11. Rewrite the following program after correcting the bugs.                                 2
            DECLARE FACT(N)
            CLS
            INPUT”ENTER NUMBER”;A
            CALL FACT(N)
            END
            SUB FACT(N)
            FOR K=1 TO N
            IF N MOD K = 1 THEN
            PRINT K
            IF END
            END FUNCTION
Ans:
DECLARE SUBFACT(N)
            CLS
            INPUT”ENTER NUMBER”;A
            CALL FACT(A)
            END
            SUB FACT(N)
            FOR K=1 TO N
            IF N MOD K = 1 THEN
            PRINT K
            END IF
END SUB

12. Write the output of the following program.                                            2
            DECLARE FUNCTION EXAM(N)
            CLS
            FOR K=1 TO 3
            READ ABC
            S=S+EXAM(ABC)
            NEXT K
            PRINT S
            DATA 4,3,5
            END
            FUNCTION EXAM (N)
            EXAM =(N*N*N) MOD 2
            END FUNCTION
Ans:














13. Study the following program and answer the questions:                                    2
            DECLARE SUB TEST(A,B,C)
            INPUT”ENTER THREE DIFFERENT NUMBER:”;X,Y,Z
            CALL TEST(X,Y,Z)
            END
            SUB TEST(A,B,C)
            IF A>B AND A>C THEN
            T=A+B+C
            ELSEIF B>A AND B>C THEN
            T=A*B*C
            ELSE
            T=(B+A)/C
            END IF
            PRINT T
            END SUB
a)      List formal and real parameters used in the above program.
Ans: The formal parameters are A, B and C and real parameters are X,Y and Z.
b)      What happens when CALL TEST(X,Y,Z) is replaced by CALL TEST(A,B,C)
Ans: When Call TEST(X, Y,Z) is replaced by CALL TEST(A, B, C), the value received will be A=0, B=0 and C=0.

14.a) Write a sub procedure to print the following series.        3
            2,4,7,11,16 UP TO 10th term
Ans:       DECLARE SUB SERIES ( )
               CLS
               CALL SERIES
               END
              
               SUB SERIES ( )
               A=2
               B=2
               FOR I = 1 TO 10
               PRINT A
               A=A+B
               B=B+1
               NEXT I
               END SUB

b) Write a function procedure to check input number is prime or composite. Input number in the main module and pass it as a parameter.        3
Ans:
DECLARE FUNCTION CHECK(N)
CLS
INPUT “Enter any number”; N
P=CHECK(N)
IF P=2 THEN
PRINT P;”is prime number”
ELSE
PRINT P;”is composite number”
END IF
END

FUNCTION CHECK(N)
C=0
FOR I=1 TO N
IF N MOD I = 0 THEN C=C+1
NEXT I
CHECK = C
END FUNCTION
c) A data file named “EMP.DAT” contains some records with fields Code, Name, Post and Salary. Write a program to print odd position records of the data file.                     3
Ans:
OPEN “EMP.DAT” FOR INPUT AS #1
CLS
C=0
WHILE NOT EOF(1)
INPUT #1, CO, N$, P$, S
C=C+1
IF C MOD 2 = 1 THEN PRINT CO, N$, P$, S
WEND
CLOSE #1
END
***

No comments:

Post a Comment