Computer
Science
SEE Model Question
Time:
1 hr 30 min
F.M.
: 50
Group
‘A’ (10 Marks)
1.
Answer
the following questions in one sentence. [6×1=6]
a.
What
is internet?
Internet is an interconnection of
several thousands of computers of different types belonging to the various
networks all over the world in order to share data and information.
b.
What
is browser?
Web browser is a computer program that
access web pages and displays them on the user computer.
c.
Which
is the logical data type of MS Access?
Yes/No is the logical data type of MS
Access.
d.
Which
view is used to modify a table in MS-Access?
Design view is used to modify a table in
MS-Access.
e.
Which
is the structure programming language?
C language is the structure programming
language.
f.
Write
any two data types of C language.
int and char are any two data types of C
language.
2.
Write
appropriate technical terms for the following: [2×1=2]
a. Crimes
committed using electronic devices and cyber space. Cyber crime
b. A
malicious program of computer that damages data and software. Computer virus
3.
Write
the full forms of the following: [2×1=2]
a. UTP:
Uninterruptible Power Supply
b. WWW:
World Wide Web
Group
‘B’ [24 Marks]
4.
Answer
the following questions. [9×2=18]
a.
What
is computer network? Write any two disadvantages of it.
A computer network means two or more
computers connected with each other to share data, hardware, software and other
resources.
Any two disadvantages of it are:
i.
The sharing of information may leak the
privacy of other clients.
ii.
The networking cost is high
b.
What
is cyber ethics? Write any two cyber ethics.
Cyber
ethics can be defined as to follow the rules and regulation of computer
technology and not to harm other computer users knowingly or unknowingly.
Any two cyber ethics are:
i.
You
should not spread false and illegal information.
ii.
You
should not destroy, erase or edit personal or group records.
c.
What
is hardware security? Write the role of UPS in hardware security.
The security given to the machine and
peripheral hardware from theft and from electronic intrusion (interruption) and
damage.
The
role of UPS in hardware security system is that it controls fluctuation of
electric voltage and provides enough backup electric power to the computer
system when there is power failure.
d.
What
is e-banking? Write any two uses of it.
E-banking refers to conduct financial transactions like funds transfer, payment of bills,
opening bank accounts online etc via the internet
Any two uses of e-banking are:
i.
It saves the time of
customers as they can easily access their account with the help of their
device.
ii.
All transactions are
recorded & stored digitally. So, the chances of human error are minimized.
e.
What
is database management system? Give two examples.
DBMS is a software which helps to
extract, view and manipulate data in an organized way. E.g. MS-Access and
Oracle.
f.
What
is database? Give any two examples.
A database is an organized collection of
related information that can be used for different purpose so that it can
easily be accessed, managed, and updated. E.g. Dictionary and Telephone
Directory.
g.
Define
field and record.
A column in a table is called field, and
it contains a specific piece of information within a record.
Record is a collection of multiple
related fields in a row which gives complete information about a person or
thing.
h.
What
is a report? Write its use.
Report
is an object of Ms-Access which displays the output in an effective way to
present the data in a printed format.
Uses
of report are:
i.
It
helps to prepare well formatted output.
ii.
It
displays the information the way we want to view it.
i.
Define
form? Write any two uses of it.
Form
is an object of Ms-Access which provides graphical interface to enter data into
the tables or multiple linked tables.
Any
two uses of form are:
i.
It
provides an interactive platform for input of data into the database.
ii.
It
helps to display data in more presentable form than a datasheet.
DECLARE
FUNCTION OUTPUT1(A)
CLS
N=135
CALL
OUTPUT1(N)
END
SUB
OUTPUT1(A)
DO WHILE
A < > 0
R = A MOD
10
T = T + R
A = A \
10
LOOP
PRINT T
END SUB
5. Dry run Table
N |
A |
DO WHILE A <
> 0 |
R=A MOD 10 |
T=T + R |
A=A\10 |
PRINT T |
135 |
135 |
135 < > 0 Yes |
135 MOD 10 = 5 |
0+5=5 |
135\10=13 |
9 |
|
13 |
13 < > 0 Yes |
13 MOD 10=3 |
5+3=8 |
13\10=1 |
|
|
1 |
1 < > 0 Yes |
1 MOD 10=1 |
8 + 1=9 |
1\10=0 |
|
|
0 |
0 < > 0 No Loop Exits |
|
|
|
|
The
output of the program is:
9
6.
Re-write
the given program after correcting the bugs. [2]
REM to create a new file
CLS
OPEN “ABC.DAT” FOR INPUT AS #1
DO
INPUT
“Enter Name, Roll No & Total. “; N$, R, T
INPUT
#1, N$, R, T
INPUT
“Supply more records Y/N”; C$
LOOP WHILE UCASE(Y$)=”Y”
CLOSE #1
END
Debugged
Program
REM to create a new file
CLS
OPEN “ABC.DAT” FOR OUTPUT AS #1
DO
INPUT
“Enter Name, Roll No & Total. “; N$, R, T
WRITE #1, N$, R, T
INPUT
“Supply more records Y/N”; C$
LOOP WHILE UCASE$(C$)=”Y”
CLOSE #1
END
7.
Study
the following program and answer the given questions. [2×1=2]
OPEN “EMP.DAT” FOR INPUT AS #1
DO
INPUT #1, N$, A$, S
IF
UCASE$(A$)=”KATHMANDU” THEN
PRINT N$, A$, S
END IF
LOOP WHILE NOT EOF(1)
CLOSE #1
END
a.
Write
the use of statement “INPUT #1, N$, A$, S” in the above program.
the
use of statement “INPUT #1, N$, A$, S” in the above program to read data from
the data file EMP.DAT.
b.
What
happens if you remove “UCASE$” from the above program?
If
UCASE$ is removed then if Kathmandu is in small letters then it won’t be
displayed on the screen.
8.
Convert
/ Calculate as per the instruction. [4×1=4]
a. (ABC)16
= (?)8
Soln:
Converting
Hexadecimal value to binary
Hexa-decaimal number |
A |
B |
C |
Binary value in four bits |
1010 |
1011 |
1100 |
Again,
Converting
Binary to octal
Binary value in three bits |
101 |
010 |
111 |
110 |
Octal number |
5 |
2 |
7 |
6 |
(ABC)16
= (5276)8
b. (52)10
= (?)2
Soln:
|
|
Remainder |
2 |
52 |
|
2 |
26 |
0 |
2 |
13 |
0 |
2 |
6 |
1 |
2 |
3 |
0 |
2 |
1 |
1 |
2 |
0 |
1 |
(52)10
= (110100)2
a. (1010)2
+ (110)2 – (1111)2 = (?)2
|
1 |
0 |
1 |
0 |
|
+ |
1 |
1 |
0 |
1 |
0 |
0 |
0 |
0 |
- |
1 |
1 |
1 |
1 |
0 |
0 |
0 |
0 |
1 |
(1010)2
+ (110)2 – (1111)2 = (1)2
a. (1101101)2
¸
(110)2
110) |
1 |
1 |
0 |
1 |
1 |
0 |
1( |
10010 |
|
-1 |
1 |
0 |
|
|
|
|
|
|
0 |
0 |
0 |
1 |
1 |
0 |
|
|
|
|
|
|
-1 |
1 |
0 |
|
|
|
|
|
|
0 |
0 |
0 |
1 |
|
|
|
|
|
|
|
|
-0 |
|
|
|
|
|
|
|
|
1 |
|
Quotient=10010
Remainder=1
9.
a.
Write a program in QBASIC that allows the user to input length, breadth and
height and then calculate the area of 4 walls. Hint: [A = 2H(L+B)]
DECLARE
FUNCTION AREA (L, B, H)
CLS
INPUT
“ENTER LENGTH”; L
INPUT
“ENTER BREADTH”; B
INPUT
“ENTER HEIGHT”; H
PRINT
“AREA OF FOUR WALLS”; AREA(L, B, H)
END
FUNCTION
AREA (L, B, H)
A = 2 * H
* (L + B)
AREA = A
END FUNCTION
b.
Write a program to create a sequential data file named “Employ.Dat” to store
Name, Post, Address and Salary for the number of employees. The program should
terminate on user’s choice.
OPEN “Employ.Dat” FOR OUTPUT AS #1
TOP:
CLS
INPUT “Enter Name”; N$
INPUT “Enter Address”; A$
INPUT “Enter Post”; P$
INPUT “Enter Salary”; S
WRITE #1, N$, A$, P$, S
INPUT “Do you want to continue”; CH$
IF UCASE$(CH$)=”Y” THEN GOTO TOP
CLOSE #1
END
10. Write a program in C language to
input a number and then check whether the number is positive, negative or zero
number.
#include<stdio.h>
#include<conio.h>
int main()
{
int n;
printf("Enter
any number: ");
scanf("%d",
&n);
if(n>0)
printf("%d
is positive number",n);
else if(n<0)
printf("%d
is negative number",n);
else
printf("%d
is zero number",n);
return 0;
}
OR
Write
a program in C language to display the series 1, 1, 2, 3, 5, 8 upto 10th
terms.
#include<stdio.h>
#include<conio.h>
int main()
{
int a,b,c,i;
a=1;
b=1;
for(i=1;i<=10;i++)
{
printf("%d \n", a);
c=a+b;
a=b;
b=c;
}
return 0;
}
***