Friday, February 14, 2020

Solved Computer Science [Pabson Kaski 2076]


SEE Preparation Examination 2076
PABSON Examination Committee, Kaski
Subject : Computer Science

Questions

a)     Write the advantages of client/server over peer to peer network.
Advantages of client/server over peer to peer network :
It provides central security administration.
The network administrator is responsible for data security and other resources management of the network.
b)     Write any four advantages of E-mail over the traditional postal mailing system.
Any four advantages of E-mail over traditional postal mailing system:
                           i.          It allows to send and receive the message across the world at very low cost.
                         ii.          E-mail is faster, cheaper, more reliable than traditional mail.
                        iii.          The image, sound, video, and documents can be attached to e-mail messages.
                        iv.          Email can be accessed from anywhere in the world.

c)      Write the role of UPS and Spike guard in terms of power protection.
The role of UPS in a computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
The role of spike guard is that it protects against spikes which can occur from time to time.

d)     Write the differences between linear and non-linear multimedia contents.
The difference between Linear and Non-Linear Multimedia: The difference is in the interactivity. If the user can control the access and the order of the content then it is a non-linear structure. Note that the difference between linear and non linear is blurring as time goes by. Watching a movie used to be an example of a linear media experience, but now the DVD format allows you to have a non-linear experience by choosing scenes and going forward and backward.


e)      What is a self replicating program? Name any two destructive activities of such program.
Self replicating program is a type of computer program which is written by the programmer with the intent of destroying or damaging the data and programs residing in the computer system
Any two destructive activities of such program.
Degrade the overall performance of computer system.
Change in size of file by adding or removing text accordingly.


(235)8 into decimal

=2×82+3×81+5×80
=2×64+3×8+5×1
=128+24+5
=157
(235)8 =(157)10





(BA5)16 into binary
Converting each hexadecimal digit to 4 binary digit
B = 1011
A = 1010
5 = 0101
Combine the binary groups
(BA5)16 =(101110100101)2



11111 – 1101
1  1  1  1  1
   -1  1  0  1
 1  0  0  1  0
11111 – 1101 = 10010

101101 / 111

1
1
1
)
1
0
1
1
0
1
(
110




-
1
1
1









1
0
0
0








-
1
1
1









0
0
1
1










-
0










1
1



Quotient – 110
Remainder – 11





Match the following
Group A                                                            Group B
a)      Power DVD player            d)  -Offline service
b)     www. psc.gov.np                              -online service
c)      USENET                             a)- multimedia software
d)     Intranet                               b)-website
              c)- Internet service
Select the best answer
a)      The types of media used in multimedia includes:
Text                      sound                   graphics                              All
b)     Defragmentation is a process of:
Formatting a disk
Storing files into the smallest number of contiguous regions
Scanning and fixing the disk
None
c)      Which is not the networking operating device?
MS-DOS              UNIX                    LINUX                 Windows NT
d)     Which of the following is not a virus?
Stealth                  Worm                   Winzip                 Trojan

Technical Terms
a)      A computer which is used to control the entire networks/clients. Server
b)     A company that provides internet facility to the users with paying certain charge. ISP
c)       The simulation of movement created by displaying a series of pictures or frames.  Animation
d)     A virus that damages documents created in MS-Word and Ms-Excel  Macro virus

Full Forms
a)      PDF – Portable Document Format
b)     IMEI-International Mobile Equipment Identity
c)      MAC-Media Access Control
d)     MPEG-Moving Picture Experts Group

Questions
a)     Write the advantages of computerized database over manual database.
The advantages of computerized database over manual database:
                 i.          It can store large volume of data. It is very fast to find a specific record.
               ii.          Data can be sorted into ascending or descending order on multiple criteria.
              iii.          The database can be kept secure by use of passwords.
              iv.          We can search data very easily.

b)     While designing table structure which data types are suitable to store information about teacher’s name, address, salary and date of birth.
Teacher’s name - Text
Address – Text
Salary – Currency
Date of birth – Date/Time

c)      What is report? Why is it created?
Report is an object of Ms-Access which displays the output in an effective way to present the data in a printed format.
Report is created to print documents according to user’s specifications of the summarized information through query or table.

True/False
1.      Primary key field must not be blank. True
2.      The extension of database file created by MS-Access if .DBF. False
3.      Memo field accepts 32757 characters. False
4.      With the help of wizard also we can create a form. True

Match the following
a)      Currency field                                  c) 1 GB
b)     YES/NO field                                    d) 255 characters
c)      OLE field                                           b) 1 BIT
d)     Text field                                           1 MB
                                                                           a) 8 Bytes
Questions
Write any two advantages of modular programming.
Advantages of modular programming
i) Different programmers can design different program modules independently, which is required in a large and complex program.
ii) It is easy to design code and test the program modules independently.
Write any two features of C programming language.
Features of C- language
i) Simple and easy to use
ii) Occupies less memory

Write function of DIM SHARED and FILES
The FILES statement displays the files of the current sub directory or specified sub directory.
DIM SHARED specifies that variables are shared with all SUB or FUNCTION procedures in the module.


Debug
DECLARE FUNCTION CHK$(A)
CLS
INPUT “Enter any number”; R
PRINT CHK$(A)
END
FUNCTION CHK$(A)
M=A
WHILE A>0
R=A MOD 10
S = S + R^3
A = INTEGER (A/10)
LOOP
IF S = M THEN
CHK$=”Armstrong”
ELSE
CHK$= “Not Armstrong”

END FUNCTION

Debugged program
DECLARE FUNCTION CHK$(A)
CLS
INPUT “Enter any number”; A
PRINT CHK$(A)
END
FUNCTION CHK$(A)
M=A
WHILE A>0
R=A MOD 10
S = S + R^3
A = INT (A/10)
WEND
IF S = M THEN
CHK$=”Armstrong”
ELSE
CHK$= “Not Armstrong”
ENDIF
END FUNCTION

OUTPUT
DECLARE SUB Find( )
CLS
CALL Find
END
SUB Find
S=25
FOR N = 1 TO 11 STEP 2
S = S + N
NEXT N
PRINT “Calculated value=”; S
END SUB

OUTPUT
Calculated value=61

Analytical Questions
DECLARE SUB sum(N)
CLS
INPUT “Any number”; N
CALL sum(N)
END
SUB sum(N)
WHILE N<>0
R=N MOD 10
S = S + R
N = INT(N/10)
WEND
PRINT “Sum=”; S
END SUB
a)      What will be the result if input value is 123? 
The result is
Sum=6
b)     What happens if we change WHILE N<>0 into WHILE N=0?  
The program will displays error output
Sum=0

Write a program using function procedure to count total number of vowels in an entered word.
DECLARE FUNCTION COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF VOWELS= "; COUNT(S$)
END

FUNCTION COUNT (S$)
VC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
COUNT = VC
END FUNCTION
Write a program to check whether an entered number is palindrome or not using SUB.
DECLARE SUB PALIN (N)
CLS
INPUT "ENTER ANY NUMBER"; N
CALL PALIN (N)
END
SUB PALIN (N)
A = N
S = 0
WHILE N < > 0
R = N MOD 10
S = S * 10 + R
N = N \ 10
WEND
IF A = S THEN
PRINT "NUMBER IS PALINDROME"
ELSE
PRINT "NUMBER IS NOT PALINDROME"
END IF
END SUB

A data file “SEARCH.INF” contains numerous data under the fields NAME, AGE, ADDRESS and PHONE NUMBER of employees. Write a program in QBASIC to scan all the data then search and display only the employee’s data according to entered name.
OPEN “SEARCH.INF” FOR INPUT AS #1
CLS
INPUT “ENTER NAME TO SEARCH DATA”; S$
WHILE NOT EOF(1)
INPUT #1, N$, A, AD$, P
IF UCASE$(S$)=UCASE$(N$) THEN
PRINT N$,A,AD$,P
END IF
WEND
CLOSE #1
END




No comments:

Post a Comment