SEE
Preparation Examination 2076
PABSON
Examination Committee, Kaski
Subject
: Computer Science
Questions
a)
Write
the advantages of client/server over peer to peer network.
Advantages of client/server over peer to
peer network :
It provides central security
administration.
The network administrator is
responsible for data security and other resources management of the network.
b)
Write
any four advantages of E-mail over the traditional postal mailing system.
Any four advantages of E-mail over
traditional postal mailing system:
i.
It
allows to send and receive the message across the world at very low cost.
ii.
E-mail
is faster, cheaper, more reliable than traditional mail.
iii.
The
image, sound, video, and documents can be attached to e-mail messages.
iv.
Email
can be accessed from anywhere in the world.
c)
Write
the role of UPS and Spike guard in terms of power protection.
The
role of UPS in a computer security system is that it controls fluctuation of
electric voltage and provides enough backup electric power to the computer system when there is power failure.
The
role of spike guard is that it protects against spikes which can occur from
time to time.
d)
Write
the differences between linear and non-linear multimedia contents.
The difference between
Linear and Non-Linear Multimedia: The difference is in the interactivity.
If the user can control the access and the order of the content then it is a
non-linear structure. Note that the difference between linear and non linear is
blurring as time goes by. Watching a movie used to be an example of a linear
media experience, but now the DVD format allows you to have a non-linear
experience by choosing scenes and going forward and backward.
e)
What
is a self replicating program? Name any two destructive activities of such
program.
Self
replicating program is a type of computer program which is written by the
programmer with the intent of destroying or damaging the data and programs
residing in the computer system
Any two destructive activities of such
program.
Degrade
the overall performance of computer system.
Change in size of
file by adding or removing text accordingly.
(235)8
into decimal
=2×82+3×81+5×80
=2×64+3×8+5×1
=128+24+5
=157
(235)8
=(157)10
(BA5)16
into binary
Converting
each hexadecimal digit to 4 binary digit
B
= 1011
A
= 1010
5
= 0101
Combine
the binary groups
(BA5)16
=(101110100101)2
11111
– 1101
1 1 1 1 1
-1 1 0 1
1
0 0 1 0
11111
– 1101 = 10010
101101
/ 111
1
|
1
|
1
|
)
|
1
|
0
|
1
|
1
|
0
|
1
|
(
|
110
|
-
|
1
|
1
|
1
|
||||||||
1
|
0
|
0
|
0
|
||||||||
-
|
1
|
1
|
1
|
||||||||
0
|
0
|
1
|
1
|
||||||||
-
|
0
|
||||||||||
1
|
1
|
Quotient
– 110
Remainder
– 11
Match the following
Group
A Group B
a) Power
DVD player d) -Offline service
b) www.
psc.gov.np -online
service
c) USENET a)- multimedia software
d) Intranet b)-website
c)- Internet service
Select the best answer
a) The
types of media used in multimedia includes:
Text sound graphics All
b) Defragmentation
is a process of:
Formatting
a disk
Storing files into the
smallest number of contiguous regions
Scanning
and fixing the disk
None
c) Which
is not the networking operating device?
MS-DOS UNIX LINUX Windows NT
d) Which
of the following is not a virus?
Stealth Worm Winzip Trojan
Technical Terms
a) A
computer which is used to control the entire networks/clients. Server
b)
A company that provides internet
facility to the users with paying certain charge. ISP
c)
The simulation of movement created by
displaying a series of pictures or frames.
Animation
d)
A virus that damages documents
created in MS-Word and Ms-Excel Macro virus
Full Forms
a) PDF
– Portable Document Format
b) IMEI-International
Mobile Equipment Identity
c) MAC-Media
Access Control
d) MPEG-Moving
Picture Experts Group
Questions
a)
Write
the advantages of computerized database over manual database.
The
advantages of computerized database over manual database:
i.
It can store large volume of data.
It is very fast to find a specific record.
ii.
Data can be sorted into ascending or
descending order on multiple criteria.
iii.
The database can be kept secure by
use of passwords.
iv.
We can search data very easily.
b)
While
designing table structure which data types are suitable to store information
about teacher’s name, address, salary and date of birth.
Teacher’s name - Text
Address – Text
Salary – Currency
Date of birth – Date/Time
Address – Text
Salary – Currency
Date of birth – Date/Time
c)
What
is report? Why is it created?
Report
is an object of Ms-Access which displays the output in an effective way to
present the data in a printed format.
Report
is created to print documents according to user’s specifications of the
summarized information through query or table.
True/False
1. Primary
key field must not be blank. True
2. The
extension of database file created by MS-Access if .DBF. False
3. Memo
field accepts 32757 characters. False
4. With
the help of wizard also we can create a form. True
Match the following
a) Currency
field c) 1 GB
b) YES/NO
field d) 255 characters
c) OLE
field b) 1 BIT
d) Text
field 1
MB
a) 8 Bytes
Questions
Write any two advantages of modular
programming.
Advantages of modular programming
i) Different programmers can
design different program modules independently, which is required in a large
and complex program.
ii) It is easy to design code and test the program modules independently.
ii) It is easy to design code and test the program modules independently.
Write any two features of C
programming language.
Features of C- language
i) Simple and easy to use
ii)
Occupies less memory
Write function of DIM SHARED and
FILES
The FILES statement displays the
files of the current sub directory or specified sub directory.
DIM SHARED specifies that variables
are shared with all SUB or FUNCTION procedures in the module.
Debug
DECLARE
FUNCTION CHK$(A)
CLS
INPUT “Enter any number”; R
INPUT “Enter any number”; R
PRINT
CHK$(A)
END
FUNCTION CHK$(A)
FUNCTION CHK$(A)
M=A
WHILE
A>0
R=A
MOD 10
S
= S + R^3
A
= INTEGER (A/10)
LOOP
IF
S = M THEN
CHK$=”Armstrong”
ELSE
CHK$=
“Not Armstrong”
END
FUNCTION
Debugged
program
DECLARE
FUNCTION CHK$(A)
CLS
INPUT “Enter any number”; A
INPUT “Enter any number”; A
PRINT
CHK$(A)
END
FUNCTION CHK$(A)
FUNCTION CHK$(A)
M=A
WHILE
A>0
R=A
MOD 10
S = S + R^3
A
= INT (A/10)
WEND
IF
S = M THEN
CHK$=”Armstrong”
ELSE
CHK$=
“Not Armstrong”
ENDIF
END
FUNCTION
OUTPUT
DECLARE
SUB Find( )
CLS
CALL
Find
END
SUB
Find
S=25
FOR
N = 1 TO 11 STEP 2
S
= S + N
NEXT
N
PRINT
“Calculated value=”; S
END
SUB
OUTPUT
Calculated
value=61
Analytical
Questions
DECLARE
SUB sum(N)
CLS
INPUT
“Any number”; N
CALL
sum(N)
END
SUB
sum(N)
WHILE
N<>0
R=N
MOD 10
S
= S + R
N
= INT(N/10)
WEND
PRINT
“Sum=”; S
END
SUB
a) What
will be the result if input value is 123?
The result is
Sum=6
b) What
happens if we change WHILE N<>0 into WHILE N=0?
The
program will displays error output
Sum=0
Write a program using function procedure
to count total number of vowels in an entered word.
DECLARE FUNCTION COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF VOWELS= ";
COUNT(S$)
END
FUNCTION COUNT (S$)
VC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR
C$ = "I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
COUNT = VC
END FUNCTION
Write a program to check whether an
entered number is palindrome or not using SUB.
DECLARE SUB PALIN (N)
CLS
INPUT "ENTER ANY NUMBER";
N
CALL PALIN (N)
END
SUB PALIN (N)
A = N
S = 0
WHILE N < > 0
R = N MOD 10
S = S * 10 + R
N = N \ 10
WEND
IF A = S THEN
PRINT "NUMBER IS
PALINDROME"
ELSE
PRINT "NUMBER IS NOT
PALINDROME"
END IF
END SUB
A
data file “SEARCH.INF” contains numerous data under the fields NAME, AGE,
ADDRESS and PHONE NUMBER of employees. Write a program in QBASIC to scan all
the data then search and display only the employee’s data according to entered
name.
OPEN
“SEARCH.INF” FOR INPUT AS #1
CLS
INPUT
“ENTER NAME TO SEARCH DATA”; S$
WHILE
NOT EOF(1)
INPUT
#1, N$, A, AD$, P
IF
UCASE$(S$)=UCASE$(N$) THEN
PRINT
N$,A,AD$,P
END
IF
WEND
CLOSE
#1
END
No comments:
Post a Comment