Monday, February 17, 2020

Solved Kathmandu PABSON Computer Science 2076 - SEE Qualifying Examination


Subject: Computer Science
Model Answer

Group ‘A’- [Fundamentals - 22 marks]
1.            Answer the following question:   (5×2=10)
a)      Define network topology. Write any two disadvantages of computer network.
Ø  The arrangement or connection pattern of computer or nodes and other devices of network are known as network topology.
Advantages of network:
i)                 Computer in a network system share different software packages.
ii)               Data in a network environment can be updated from any computer.
Disadvantages of network:
i)       Network failure cause loss of data.
ii)     System opens to hackers.
b)     Explain WWW.
Ø  The World Wide Web (WWW) is one of the services provided by Internet. The WWW service can be accessed by using a protocol called HTTP. It provides information on various topics through different web sites using text, image, animation, video, sound and other media. It is often referred to as the Internet.
c)      How can software prevent data loss?
Ø  Software prevent data loss by following ways:
i)       Antivirus software can detect and remove viruses from computer.
ii)     Software for scan disk checks files, folders, bad sectors and any other errors of the specific disk and fix them.
iii)   Software for backup helps in securing the information by keeping the important computer data or files in another location.
d)     Write down the role of multimedia technology in classroom.
Ø  Multimedia is the integration or combination form of different media. The word multimedia is made up of two separate words ‘multi’ and ‘media’ which means many and materials through which information may be provided to the people.
Classroom presentation becomes more interactive with the use of multimedia technology because it presents the information in the variety of forms with effective explanation of the related subject matter to the students. The learner is also able to learn the subject matter easily.
e)      List any four steps taken to protect a computer from a virus.
Ø  The steps taken to protect a computer from a viruses are:
i)       Use updated anti-virus software.
ii)     Scan the mail or unknown files of Internet before opening in the computer.
iii)   Do not install pirated software.
iv)    Do not use free distributed software.
2.            a)           Perform the following Binary calculation:             (2×1=2)
               i)            (101101) + (1111) – (10110)
Ø (100110)
               ii)           101101÷101
Ø (Quotient = 1001 Remainder = 0)
               b)           Perform as indicated:                                                  (2×1=2)
[Note: Students have to show the whole process to get full marks.]
               i)            (305)8 into Decimal
Ø (197)10
               ii)           (CAF)16 into Binary
Ø (110010101111)2
3.            Select the correct answer:                                                         (4×0.5=2)
a)      ----------------- is the main line of defense between a local network, or intranet, and the Internet.
               i) USB port          ii) Encryption key             iii) Firewall        iv) None
b)     ----------------- is someone who uses a computer and a network Internet connection to intrude into another computer of system to perform an illegal act.
               i) Programmer     ii) Hacker           iii) Terrorist        iv) Spammer
c)      ----------------- means any kind of multi way communication carried out in real time using telecommunication or computer network equipment.
               i) Video Conferencing      ii) Data Conferencing
               iii) Teleconferencing       iv) Serial Conferencing
d)     Each computer on the Internet has a unique address called a(n) ----------------- .
               i) domain name   ii) protocol address           iii) IP address    iv) URL

4.            Write the full form of the following:         (4×0.5=2)
a)    BNC       =             British Naval Connecter
b)    AVG      =             Anti-Virus Guard
c)    UPS        =             Uninterruptible Power Supply
d)    BBS       =             Bulletin Board System

5.            Match the following:       (4×0.5=2)
Ø  Group A               Group B
a)      Duplex                 (i) two way of communication Online business
b)     E-commerce        (ii) Online business
c)      Router                  (iii) a network component
d)     Virus                    (iv) destructive program

6.            Give the appropriate technical terms of the following:      (4×0.5=2)
a)      Medium that carries data without physical path.      =             Unguided Medium
b)     A secret word that gives a user access to a particular program and system.     =             Password
c)      A technology that makes teaching-learning easier in a classroom.     =             Multimedia Technology
d)     A program that controls the functions of the hardware device.           =             Operating System Software




Group ‘B’ - [Database Management -10 Marks]
7.            Answer the following question:   (3×2=6)
a)      What is database Management System? Give any two example of Database management system software.
Ø  DBMS (Database Management System) is a software that defines a database, stores the data and supports a query language, produces reports, and creates data entry forms.
Some DBMS software are MS-Access, Oracle and FoxPro etc.
b)     Differentiate between Select query and Action query.
Ø  A select query retrieves information that we want from one or more tables in a database.
An action query is a query that makes changes to or moves many records in just one operation. Some action queries are Delete, Append and Update.
c)      Identify a record, field and value from the following table structure.
Roll
Name
Marks
1
Sarika Pradhan
46
2
Utsav Khadka
45
Ø  Record:
1
Sarika Pradhan
46
Field:
Marks
46
45
Value: 46, Utsav Khadka etc.
8.            Write True or False        (4×0.5=2)
a)      A group of related field that describe a person, place, or thing is called a field.
Ø  False
b)     MS Access can import tables from other application.
Ø  True
c)             Field name can be up to 64 characters long.
Ø  True
d)     Removing a primary key does not delete a field.
Ø  True
9.            Match the following:       (4×0.5=2)
Ø  Group A               Group B
a)      Caption                (i)A descriptive name for the field.
b)     Field Size             (ii)Setting the maximum size for data stored.
c)      Default Value     (iii) A value that is automatically entered for new record.
d)     Format                  (iv)Specifies how the field will be displayed.
              
Group ‘C’ - [Programming - 18 Marks]
10.          a)            How do you define global & local variable in QBASIC. Give an example.       (1)
Ø  The following statements are used to define global variable in QBASIC.
DIM SHARED
COMMOM SHARED
SHARED
For eg.
COMMON SHARED A$
In QBASIC, by default the variables are local. We also can define local variable using the DIM statement.
For eg. DIM A as INTEGER
               b)           List any three keywords of C language.      (1)
Ø  Any three keywords of C language are int, float, printf.
11.          Write down the function of the following statements:            (2×0.5=1)
a)    FILES   -              FILES command is used to list the files and directories from the current location.
b)    SHARED             -              SHARED statement is used to define global variables in sub modules.
                       For eg. SHARED A$

12.          Write the output of the following program.           (2)
        DECLARE SUB show (abc$)
CLS
abc$ = "ZHTUOMENXSA"
CALL show(abc$)
END
===================
SUB show (abc$)
y = 48
FOR I = 1 TO 5
        n = y MOD 7
        PRINT MID$(abc$, n, 1);
y = y - 1
NEXT I
END SUB
Ø  The output of the above program is:
MOUTH
[Note: The memory table should be shown to obtain full marks.]
13.          Re-write the given program after correcting the bugs.      (2)
        REM To add records in an existing file
CLS
OPEN "record.dat" FOR OUTPUT AS #1
aa:
INPUT "Name, class & roll "; n$, c, r
INPUT #2, n$, c, r
INPUT "more records "; y$
IF y$ = "y" THEN GOTO aa
CLOSE “record.dat”
END
Ø  REM To add records in an existing file
CLS
OPEN "record.dat" FOR APPEND AS #2
aa:
INPUT "Name, class & roll "; n$, c, r
WRITE #2, n$, c, r
INPUT "more records "; y$
IF y$ = "y" THEN GOTO aa
CLOSE #1
END
14.          Study the following program and answer the given questions.        (2×1=2)
REM check the supplied no. is perfect square or not
DECLARE FUNCTION check (a)
CLS
INPUT "type any number: "; n
IF check(n) = 0 THEN
        PRINT "Perfect Square"
ELSE
        PRINT "Not Perfect Square"
END IF
END
=========================
FUNCTION check (x)
s = SQR(x)
IF s = FIX(s) THEN
        check = 1
ELSE
        check = 0
END IF
END FUNCTION
a)      Does the program run without any mistakes? If not, why?
Ø  No, the program contains the logical error. The line
IF check(n) = 0 THEN
Should be
IF check(n) = 1 THEN
Or need same type of correction in Sub module.
b)     Does the program give same output if FIX() function is replaced by INT() function?
Ø  Yes, the program will have no different in their output.
15.  a)    Write a program to generate the below series using a SUB procedure.              (3)
        5  10  15  25  40  65  105 … … up to 10th terms.
Ø  DECLARE SUB display ()
CLS
CALL display
END
========================================
SUB display
a = 5: b = 10
PRINT a; b;
FOR i = 1 TO 8
        c = a + b
        PRINT c;
        a = b
        b = c
NEXT i
END SUB
               b)           Write a program that asks any 3 numbers and displays the difference between the greatest and the smallest value among the 3 supplied numbers using a FUNCTION procedure.               (3)
Ø  DECLARE FUNCTION diff (a, b, c)
CLS
INPUT "Type any 3 numbers "; a, b, c
PRINT "Difference = "; diff(a, b, c)
END

FUNCTION diff (x, y, z)
IF x > y AND x > z THEN
        G = x
ELSEIF y > x AND y > z THEN
        G = y
ELSE
        G = z
END IF
IF x < y AND x < z THEN
        S = x
ELSEIF y < x AND y < z THEN
        S = y
ELSE
        S = z
END IF
diff = G - S
END FUNCTION

               c)            Write a program that asks item’s name, rate and quantity and stores into “sales.txt”. The user can supply 10 records in each execution of the program.            (3)
Ø  OPEN "O", #2, "sales.txt"
CLS
FOR i = 1 TO 10
        INPUT "Item's name "; p$
        INPUT "Rate "; r
        INPUT "Quantity "; q
        WRITE #2, p$, r, q
NEXT i
CLOSE #2
END
*******************

No comments:

Post a Comment