Solved
SEE Supplementary-Upgrade 2075 (2019) - Computer Science
Full Marks: 50
Time: 1:30 hrs
Group
A [Fundamentals – 22 Marks]
1. Answer the following questions. [5×2=10]
a)
What
is network topology? Name any of two
Ans: The arrangement or connection pattern of computers
or nodes and other devices of the network is called network topology.
Any two topologies are:
Bus Topology
Bus Topology
Star Topology
b)
Define
web browser with examples.
Ans:
Web browser is a computer program that access web pages and displays them on
the user computer. Examples of web browsers are Mozilla Firefox, Google chrome,
internet explorer, opera etc.
c)
What
is computer ethic?
Ans: Computer ethic refers to follow the
rules and regulation of computer technology and not to harm other computer
users knowingly or unknowingly.
d)
Write
the importance of backup in data and software security.
Ans: The importance of backup in data
and software security is to recover the important data and programs from
accidental and intentional harm. They are stored in different storage devices
like hard disk, CDs and pen drives. When the data and software gets lost or
damaged the backup system helps to recover the lost or damaged data or software
from the backup copy of data and software.
e)
Write
any two precautions to protect computer from virus.
Ans: Any two precautions to protect
computer from virus are
i) Use a good antivirus program to scan
floppy disk, CD, etc. before copying.
ii) Do not install pirated software, especially computer games.
ii) Do not install pirated software, especially computer games.
2.a)
Perform as indicated: [2×1=2]
i) (546)8 into decimal
Soln:
=5
× 82 + 4 × 81 + 6 × 80
=5
× 64 + 4 × 8 + 6 × 1
=320
+ 32 + 6
=358
(546)8 = (358)10
ii) (1011100111)2
into Hexadecimal.
Soln:
Converting binary to hexadecimal
10 1110
0111
0010 = 2
1110 = E
0111 = 7
(1011100111)2
= (2E7)16
b) Perform the
following binary operations: [2×1=2]
i) 1011 × 101
|
|
|
1
|
0
|
1
|
1
|
|
|
|
×
|
1
|
0
|
1
|
|
|
|
1
|
0
|
1
|
1
|
|
|
0
|
0
|
0
|
0
|
×
|
+
|
1
|
0
|
1
|
1
|
×
|
×
|
|
1
|
1
|
0
|
1
|
1
|
1
|
1011 × 101 = 110111
c) 100101 ¸
110
110
|
100101
|
110
|
|
-110
|
|
|
110
|
|
|
-110
|
|
|
001
|
|
|
-0
|
|
|
1
|
|
Q
= 110
R
= 1
3. Match the following: [4×0.5=2]
a) Microwave Protocol
b) UTP
Power
protection device
c) UPS
Unguided media
d) SMTP Internet
Guided media
Answers:
a) Microwave Unguided media
b) UTP
Guided media
c) UPS
Power
protection device
d) SMTP Protocol
4. Select the correct answer. [4×0.5=2]
a) When
was cyber law introduced in Nepal?
i) 2057 ii) 2055 iii) 2061 iv)
2069
Ans:
2061
b) Which
is not communication media?
i) NOS ii)
Satellite iii) Infrared
iv) STP
Ans:
NOS
c) Software
used in multimedia system.
i) Animator ii)
Flash player iii) Power point iv) All of them
Ans:
All of them
d) A
program that is used to detect and remove virus.
i) C- Brain ii)
Worm iii) Trojan Horse iv)
Kaspersky
Ans:
Kaspersky
5. Give the appropriate technical
terms of the following. [4×0.5=2]
a) A
type of network architecture in which every computer works as a both client and
server.
Ans:
Peer to Peer Network
b) Company
provides Internet services.
Ans:
ISP (Internet Service Provider)
c) The
moving images.
Ans:
Animation
d) The
law that control cyber crimes.
Ans:
Cyber Law
6. Write the full form of the
following: [4×0.5=2]
a) PDF:
Portable Document Format
b) WLAN:
Wireless Local Area Network
c) HTTP:
Hyper Text Transfer Protocol
d) JPEG:
Joint Photographic Experts Group
Group
‘B’ [Database Management System - 10
Marks]
7. Answer the following questions. [3×2=6]
a)
Define
DBMS with any two examples.
Ans: DBMS is software which is used
to manage data, manipulate them and provide the information in an organized
way. Any two examples are MS-Access and Oracle.
b)
What
is query?
Ans: Query is an object of Ms-Access
which extracts and arranges information from a table in a manner that is
specified.
c)
Why
is report created?
Ans: Report is created to print documents according to
user’s specifications of the summarized information through query or table.
8. State whether the following
statements are True or False. [4×0.5=2]
a) Column
is also called field. True
b) Primary
key field can accept duplicate values. False
c) Text
is and object of MS-Access. False
d) Auto
Number Data consumed 2 bytes of memory space. Flase
9. Match the following. [4×0.5=2]
a) Caption Logical
data type
b) OLE Error message
c) Data
Redundancy Picture
d) Yes/No Label
for field
Duplication of data
Answers
a) Caption Label
for field
b) OLE Picture
c) Data
Redundancy Duplication of data
d) Yes/No Logical
data type
10 a) What is modular programming? [1]
Modular programming is a technique
which divides program into many small, manageable, logical and functional
modules or blocks.
b) Write any two characteristics of
‘C’ Language. [1]
Ans: The characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the function of the
following statements [2×0.5=1]
MKDIR
- It creates a subdirectory which is used to manage files.
INPUT # – It reads data from the sequential data file.
INPUT # – It reads data from the sequential data file.
11. Rewrite the given program after
correcting the bugs. [2]
REM
program to read data from the data file.
OPEN
“STD.DAT” FOR OUTPUT AS #1
CLS
WHILE
NOT EOF(#1)
WRITE#1,
N$, R, C, P
PRINT
N$, R, C, P
WEND
CLOSE
“STD.DAT”
END
Debugged Program
REM
program to read data from the data file.
OPEN
“STD.DAT” FOR INPUT AS #1
CLS
WHILE
NOT EOF(1)
INPUT
#1, N$, R, C, P
PRINT
N$, R, C, P
WEND
CLOSE
#1
END
12. Write the output of the
following program. [2]
DECLARE
FUNCTION SUM ( a )
CLS
a
= 9
PRINT
SUM ( a )
END
FUNCTION
SUM ( a )
FOR
K = 1 to a
IF
K MOD 2 = 0 THEN
S
= S + K
END
IF
NEXT
K
SUM
= S
END
FUNCTION
Output:
20
13. Study the following program and
answer the given questions. [2×1=2]
DECLARE SUB TEST (N$ )
INPUT N$
CALL TEST ( N$ )
END
SUB TEST (N$ )
FOR P = 1 TO LEN ( N$ )
B$ = MID$ (N$, P, 1)
IF LCASE$ (B$) = “a”
THEN
C = C + 1
END IF
NEXT P
PRINT C
END SUB
a)
Write
the name of the sub procedure used in the above program.
Ans: The name of the sub procedure used
in the above program is TEST
b)
Write
any two library functions used in the above program.
Ans: Any two library functions used in the above
program are MID$( ) and LEN( )
14
a)
Write
a program to calculate the area of four walls of a room using Sub…..End Sub.
[3]
DECLARE SUB AREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
CALL AREA (L, B, H)
END
SUB AREA (L, B, H)
A = 2 * H * (L + B)
PRINT “AREA OF FOUR WALLS”; A
END SUB
b)
Using
Functions……End Functions Write a program to find odd or even. [3]
DECLARE FUNCTION CHECK$ (N)
CLS
INPUT “ENTER ANY NUMBER”; N
PRINT “The given number is “ CHECK$(N)
END
FUNCTION CHECK$ (N)
IF N MOD 2 = 0 THEN
CHECK$ = “Even Number”
ELSE
CHECK$ = “Odd Number”
END IF
END
FUNCTION
c)
Write
a program to create a data file ‘emp.dat’ to store employees name, post,
address and salary according to the need of the user. [3]
OPEN “record.dat” FOR
OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter Post”; P$
INPUT “Enter Address”; A$
INPUT “Enter Salary”; S
WRITE #1, N$, P$, A$, S
INPUT “Do you want to
continue (Y / N)”; CH$
LOOP WHILE UCASE$ (CH$)
= “Y”
CLOSE #1
END
nice question
ReplyDelete