Friday, November 23, 2018

Day 1 Practice Set [SLC / SEE Computer Science]


1.   Define data communication. Give any two examples of it.
Ans: A data communication system is the collection of hardware, software and other devices that allows to exchange data, information and voice between two or more devices through a wire or radio waves. The components of data communication are data, sender, medium, receiver and protocol.
Any two examples of data communication are e-mail and chat.

2.   What is internet?
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all over the world.

3.   What is computer security?
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.

4.   What is computer virus?
Ans: Computer virus is a type of computer program which is written by the programmer with the intent of destroying or damaging the data and programs residing in the computer system.

5.   What is multimedia? Name the five types of media used in multimedia technology.
Ans: Multimedia is the integration of multiple forms of media, which presents information in more interesting and understandable way.
The five types of media used in multimedia technology are:
i) Text                    ii) Audio         iii) Video               
iv) Graphics           v) Animation

6.   What is cyber law?
Ans: The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

7.   What is database? Give two examples.
Ans: Database is a collection of related and organized information that can be used for different purpose.
The two examples of database are:
i) Dictionary
ii) Telephone Directory

8.   What is Primary key? Why is it needed?
Ans: Primary key is a field that uniquely identifies the record. It is needed because it neither accepts duplicate values nor permit null values.

9.   Define table. Write different ways to create a table.
Ans: Table is an object of Ms-Access that stores large volume of data in the form of rows and columns.
The different ways to create table are:
i) Design view
ii) Using wizard
iii) Entering data

10.                   What is a modular programming?
Ans: Modular programming is a technique which divides the program into many small, manageable, logical and functional modules or blocks.

11.                   Write down the functions of:

a) OPEN statement:
It opens a sequential file for one of the three possible operations (reading, writing, appending).
b) WRITE# statement:
It sends one or store one or more data items to the specified file using either output or append mode.

12.                   Define C-language.
Ans: C-language is a structured programming language that divides program into many functions.

“To teach is to learn twice.”
Joseph Joubert

Wednesday, October 24, 2018

PABSON KATHMANDU MID TERM EXAM 2075 COMPUTER SCIENCE SOLVED




PABSON, Kathmandu
MID TERMINAL EXAM-2075
Opt II. Computer


Group A
Computer Fundamental (22 marks)

1. Answer the following questions:                           (5×2=10)
a.   What is network operating system? Give examples.
      Ans: Network Operating System is a software program that controls other software and hardware that runs on a network. Examples of network operating systems include UNIX, Windows 2000 server, and Netware.
b.   What is internet? Why is it called network of networks?
      Ans: The Internet is a global system of interconnected computer networks that uses the standard Internet protocol suite (often called TCP/IP, although not all applications use TCP) to serve billions of users worldwide. It is called network of networks because it consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies.
c.   State two advantages of multimedia technology.
      Ans: The two advantages of multimedia technology are listed below:
a. The use of multimedia can enhance every area in a presentation.
b. Multimedia enhances standard education techniques and makes learning process easier.
d.   What is cyber law? Why is it important?
      Ans: Cyber law refers to all the legal and regulatory aspects of Internet and the World Wide Web. Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace.
e.   What is antivirus software? Name some popular antivirus software.
      Ans: Antivirus software is a program designed to detect and remove viruses from the computer system. Some popular antivirus software available are: Avast, AVG antivirus and Norton Antivirus.
2.   a. Convert as indicated.                                                  (2×1=2)
      i. (105)8 into binary
      Soln:
      Converting Octal into Binary
      1 = 001
      0 = 000
      5 = 101
      (105)8 = (1000101)2

      ii. (357)16 into octal
      Soln:
      Converting hexadecimal into Binary,
      3 = 0011
      5 = 0101
      7 = 0111
      =(1 101 010 111)2
      Now,
      Converting Binary into Octal,
            001 = 1
      101 = 5
      010 = 2
      111 = 7
      (357)16 = (1527)8
b. Perform the binary operation.                                                  (2×1=2)
i. (111 ´ 11) – 111
            Soln:
1 1 1
´ 1 1
1 1 1
         1 1 1´    
       1 0  1  0 1
Now, Subtracting
            1 0 1 0 1
              -   1 1 1
              1  1  1 0
            (111 ´ 11) – 111 = 1110
ii. 1101 + 101 ¸ 110
            Soln:
            1 1 0 1
            + 1 0 1
             10010
            Now, Dividing
            110) 10010 ( 11
                     -110
                       110
                      -110
                        000
            Quotient = 11
            Remainder = 0
3. Match the following.                                                                      (4 x 0.5 = 2)
Group A                           Group B
a.     Microwave                 i. Multimedia
b.     Web browser              ii. Protocol
c.      Sound Card                 iii. Unguided Media
d.     TCP/IP                        iv. Microsoft Edge
v. Guided Media
Ans:
Group A                           Group B
a. Microwave                    i. Unguided media
b. Web browser                ii. Microsoft Edge 
c. Sound card                    iii. Multimedia
d. TCP/IP                          iv. Protocol
4. Choose correct answer.                                        (4 x 0.5 = 2 )
      a. In which topology are network devices connected through hub?
      i. Ring topology                ii. Bus topology         
      iii. Star topology              iv. None of the above
      b. Which is not related to internet?
      i. ISP         ii. TCP/IP        iii. WWW       iv. UPS
      c. ______ is a device that protects your PC from computer virus.
      i. UPS        ii. Voltage regulator   iii. NAV                      iv. None of them
      d. The route of virus transmission is ___________.
      i. Pen drive                       ii. Microphone            iii. Printer       iv. Mouse

5. Give the appropriate technical terms of the following:   2                                  (4×0.5=2)
a. A virus that damages documents created in Ms-Word and Ms-Excel.
Ans: Macro Virus
b. A technology that will enhance multimedia by supporting real time, interactive, three-dimensional graphics.
Ans: Virtual Reality
c. Protocol used by e-mail client to download e-mails from e-mail server.
Ans: POP
d.     Requires less media than others topology.
Ans: Bus Topology

6. Write the full forms of the followings.                             (4X 0. 5 = 2)
SPX  : Sequenced Packet Exchange
CDMA: Code Division Multiple Access
SIM     : Subscriber Identification Module
MUK : Multimedia  Upgraded Kits
Group ‘B’
[Database Management System - 10 Marks]
7. Answer the following questions:                                       (3×2=6)
a.   What is primary key? What is the purpose of primary key?
      Ans: A primary key is a field that uniquely identifies each record. A primary key prevents duplicate records from being entered in the table and is used to control the order in which records display in the table. This makes it faster for databases to locate records in the table and to process other operations. The primary key is also used to create a link between tables in a database.
b.   What is a data type? What are the different data types that can be stores on Access data field?
Ans: A data type is an attribute for a field that determines what type of data it can contain.
The different data types that can be stored on Access data field are: numeric, text, currency, date/time, AutoNumber, Yes/No, OLE object, Hyperlink and Lookup Wizard.
c.   What is a query? What is the purpose of the query in MS-Access?
Ans: A query is a database object that creates a datasheet of selected fields and records from one or more tables. You use queries to view data in different ways, analyze data, and even to change existing data.
8. Choose the correct answer:                                                        (4×0.5=2)
a. A database is the collection of __________.
i. Hardware                       ii. Software     iii. Record      iv. None of these
b. Which of the following is not a Microsoft Access database object?
i. Tables    ii. Queries       iii. Forms        iv. Sorting
c. The storage size of date and time is ___________.
i. 4 Bytes   ii. 6 Bytes       iii. 8 Bytes      iv. 10 Bytes
d. A collection of record for a single subject, such as all of the customer records.
i. Field      ii. Record        iii. Table         iv. Data

9. Match the following.                                                                  (4 x 0.5 = 2)
      Group A                           Group B
      Data type                          Field property
      Format                              Relationship
      Form                                 Referential Integrity
      One-to-one                                    Database object
                                                Memo
     
      Group A                           Group B
      Data type                          Memo
      Format                              Field property
      Form                                 Database object
      One-to-one                                    Relationship

Group C
[Programming-18 marks]
10. Answer the following questions.
a.   What is procedure? What are the two types of procedure used in QBASIC?

      Ans: Procedure is a small, logical and manageable functional part of the program. There are two types of procedure: SUB procedure and FUNCTION procedure.
b.   What is a modular programming?
Ans: A modular programming is the process of breaking down a problem into smaller tasks. These tasks can then be broken down into sub modules.
c.   Write the function of the following statements.
      i. CALL:  Used to transfer control to another procedure, a BASIC SUB program.
      ii. PRINT: Display result on the screen, 
11.  Find the output of the given program.                           2
     
      DECLARE SUB SER (P)
      P = 15
      CALL SER (P)
      END

      SUB SER (P)
      M = 3
      WHILE M < 10
      PR = M * P
      PRINT PR,
      M = M + 2
      WEND
      END SUB

      Ans: Output is:     45        75                    105                  135

12. Rewrite the given program after correcting the bugs.                         2

DECLARE FUNCTION REV$ (ST$)
CLS
INPUT “Enter string”, S$
LET R$= REV$(st$)
PRINT "The reverse string is :"; R$
END
===========================
FUNCTION REV$(ST$)
FOR I = LEN(ST$) TO 1
RV$= RV$+ MID$(ST$, 1, I)
NEXT I
RV$=REV$
END FUNCTION


Debugged program:
DECLARE FUNCTION REV$ (ST$)
CLS
INPUT “Enter string”, S$
LET R$= REV$(S$)
PRINT "The reverse string is :"; R$
END
===========================
FUNCTION REV$(ST$)
FOR I = LEN(ST$) TO 1 STEP - 1
RV$= RV$+ MID$(ST$, I, 1)
NEXT I
REV$=RV$
END FUNCTION
13.       Study the following program and answer the following questions that follow:                                                                                   2
DECLARE SUB OT (N$)
N$ = "Computer Science"
CALL OT(N$)
END
=========
SUB OT (N$)
B = LEN(N$)
c = 1
WHILE c <= B
m$ = MID$(N$, c, 1)
PRINT m$;
c = c + 2
WEND
END SUB
a. What is the value of B in the above program?
Ans: The value of B is 16 in the above program.
b. How many parameters are used in the above sub proevdure?
Ans: Only one parameter is used in the above program.
14.
a.   Write a program to create a procedure using SUB...END SUB to input the value of length, breadth and height of a box. The program should calculate the area and volume of the box.                                                           3
Solution:
DECLARE SUB area (l!, b!)
DECLARE SUB vol (l!, b!, h!)
INPUT “Enter a length of a box”; l
INPUT “Enter a breadth of a box”; b
INPUT “Enter a height of a box”; h
CALL area(l, b)
CALL vol(l, b, h)
END
SUB area (l, b)
a = l * b
PRINT “Area of a box:::”; a
END SUB
SUB vol (l, b, h)
v = l * b * h
PRINT “Volume of a box:::”; v
END SUB
b. Write a function procedure to count the number of words in an input string.                                                                                                   3
Solution:
DECLARE FUNCTION count! (s$)
INPUT “Enter a string:::”; s$
PRINT “No. of words in a sentence:::”; count(s$)
END
FUNCTION count (s$)
c = 1
FOR i = 1 TO LEN(s$)
a$ = MID$(s$, i, 1)
IF a$ = “ “ THEN c = c + 1
NEXT i
count = c
END FUNCTION
c. Write a program by SUB procedure to display following series.            3
                  1, 2, 3, 5, 8, 13, 21…… up to 10th terms.
     
DECLARE SUB PAT( )
CLS
CALL PAT
END
      SUB PAT
      A= 1
      B= 2
FOR I = 1 TO 10
PRINT A
C= A+B
A=B
B=C
NEXT I
END SUB
óóó
Source: Answer Key Pabson