Wednesday, February 20, 2019

Solved SLC Examination-2066(2010)

SLC Examination-2066(2010)
            Computer Fundamental (22 marks)
  1. Answer the following question:
    a) What is computer network?
Ans: computer network means two or more computers connected with each other to share data, hardware, software and other resources.
  1. b) What is internet?Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all over the world.
  1. c) Write any four preventive measures to protect computer system from virus infection.Ans: Any four preventive measures to protect computer system from virus infection are:
    i) Write protect your floppy disks when using them on other computers.
    ii) Scan the mail or unknown files of internet before opening in your computers.
    iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
    iv) Don’t install pirated software, especially computer games.
  1. d) Write any two software used for multimedia.Ans: Any two software used for multimedia are:
  2. i) Windows Media Player
  3. ii) VLC Media Player
  1. e) What is hardware security?
 Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is hardware security.


  1. Match the following:
    Group AGroup B
    a) T-connector             i)Network
    b) Bridge                      ii) Power protection
    c) CD-ROM                 iii) Coaxial  cable
    d) Spike Guard                        iv)Multimedia component
    v)Virus scanning
    Answers
Group A                      Group B
a) T-connector             Coaxial  cable
b) Bridge                      Networkc) CD-ROM                 Multimedia componentd) Spike Guard                        Power protection
  1. Select the best answer:
    a) Which one is not a network topology?
    i) Starii) Ring             iii) Client / Server                     iv) Bus
Client/Server
  1. b) When was cyber law introduced in Nepal?
    i) 2061 B.S.ii) 2062 B.S.    iii) 2007 B.S.   iv) 2016 B.S.
2061 B.S.
  1. c) Multimedia technology is used in ………
    i) Educationii) Business      iii) Health care iv) All of the above
All of the above
  1. d) Boot sector virus infects ……..
    i) System fileii) Master boot record  iii) Application software          iv) Document file
                Master boot record
  2. Give appropriate technical terms:
    a) Rules and format to accept and transfer data in the computer network.
Protocol
b) Moral rules to be followed by computer and other professionals.
Computer ethics
c)  Making an extra copy of data and software.
Backup
d) A virus that corrupts system files of operating system.
File Infector virus
6. Write the full forms:
a)WWW           =          World Wide Web
b)MAN                        =          Metropolitan Area Network
c)OS                =          Operating System
d)NIC              =          Network Interface Card
Group B-Database (10 marks)
  1. Answer the following question:
  2. a) What is DBMS? Write any two examples of DBMS software.
Ans: DBMS is a software which is used to manage data, manipulate them and provide the information. Examples of DBMS are MS-Access and Oracle.
  1. b) List any four data types used in MS-Access.Ans: Any four data types used in Ms-Access are:
  2. i) Text
  3. ii) Memo
iii) Number
  1. iv) Yes/No
  1. c) What is form? Write any two advantages of using form.Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
Any two advantages of using form are:
  1.             It helps to display data in more presentable form than a datasheet can.
  2.             It provides an interactive platform for input of data into the database.
  3. Select the best answer:
    a) Date/Time occupies ……….bytes of memory.
    i) 4                   ii) 2                  iii) 8                 iv) 16
8
  1. b) The extension of database file in MS-Access is……….
    i) DBFii) DBM           iii) MDB          iv)DMB
MDB
  1. c) The object of MS-Access that is used to generate hard copy of records.
    i) Queryii) Table           iii) Form           iv) Report
Report
  1. d) A ………….. Key uniquely identifies a record.
    i) Primaryii) Foreign        iii) Composite  iv) None
    Primary
  2. Match the following:
    Group AGroup B
    a) Default value                       i) 255 Characters
    b) Fox Pro                    ii) Column Name
    c) Text                         iii) DBMS
    d) Field                                    iv)Field Properties
    v) Search fast
Answers
Group A                      Group B
a) Default value                       Field Properties
b) Fox Pro                    DBMSc) Text                         255 Characters
d) Field                                    Column Name
Group C-Programming
  1. a) What is modular program?Modular program is a technique used to divide program into many small, manageable, logical and functional modules or blocks.
  2. b) Write any two advantages of Structured programming.Ans: Any two advantages of Structured programming
  3. i) It is a high level language with some features of low level language.
    ii) It is mostly used to prepare system software.
  4. c) Write the function of following statement:
  5. i) Files
Ans: The FILES statement displays the files of the current sub directory or specified sub directory.
  1. ii) KILL
    Ans: The KILL statement deletes the file or files from the specified drive and directory.
  2. Debug the given program:
    DECLARE SUB Fibonic()
    REM *Fibonic series*
    CALL SUB Fibonic
    END
    SUB Fibonic
    a=1
    b=1
    FOR x=1 to 10
    DISPLAY a;
    a=a+b
    b=a+b
    END Fibonic
Debugged  program
DECLARE SUB Fibonic( )
REM *Fibonic series*
CALL  FibonicEND
SUB Fibonic
a=1
b=1
FOR x=1 to 10
PRINT a;
a=a+b
b=a+b
NEXT x
END SUB
  1. Write the output of the following program.
    DECLARE SUB Series()
    CALL Series
    END
    SUB Series
    X=1
    Y=1
    FOR Z=1 TO 4
    PRINT X;
    Y=Y+1
    X=X*10+Y
    NEXT Z
    END SUB

  1. Read the given program and answer the following questions:
    DECLARE FUNCTION Num(N)
    INPUT N
    S=Num(N)
    PRINT S
    END
    FUNCTION Num(N)
    X=Int(17/N)
    Y=15 MOD N
    Num=X +Y
    END FUNCTION
  2. i) Write the name of the function used in the above program.
Ans: The name of the function used in the above program is Num.
  1. ii) List out the mathematical function (Library function) used in the above program.
Ans: The mathematical function (Library function) used in the above program is INT ( ).
14. i) Write a program using Function Module to calculate and print the volume of a box.
            DECLARE FUNCTION VOLUME(L, B, H)
CLS
INPUT “ENTER LENGTH, BREADTH AND HEIGHT”; L, B, H
PRINT “VOLUME OF BOX”; VOLUME(L, B, H)
END
FUNCTION VOLUME (L, B, H)
VOLUME = L*B*H
END FUNCTION

  1. ii) Write a program to declare SUB procedure to print only the vowels from a given word.
DECLARE SUB DISPV (S$)
CLS
INPUT “ENTER ANY WORD”; S$
CALL DISPV(S$)
END
SUB DISPV(S$)
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = “A” OR C$ = “E” OR C$ = “I” OR C$ = “O” OR C$ = “U” THEN
PRINT B$
END IF
NEXT I
END SUB

iii) Write a program to create a sequential data file “Employee.Dat” to store employees’ name, address, age, gender and salary.
OPEN “Employee.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “ENTER EMPLOYEE’S NAME”; N$
INPUT “ENTER ADDRESS”; A$
INPUT “ENTER AGE”; A
INPUT “ENTER GENDER”; G$
INPUT”ENTER SALARY”; S
WRITE #1, N$, A$, A, G$, S
INPUT “DO YOU WANT TO CONTINUE”; CH$
LOOP WHILE UCASE$(CH$) = “Y”
CLOSE #1
END
***

No comments:

Post a Comment