Friday, March 19, 2021

Solved Computer Science Supplementary Exam 2065

 


Solved Computer Science Supplementary Exam 2065
Group A
COMPUTER FUNDAMENTALS (22 marks)
1. Answer the following questions:
a) Explain about network topology. Write any two advantages of computer networking.
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as network topology.
Any two advantages of computer networking are :
i. Computer in network share different software packages.
ii. Communication made by computer network is very cheap.

b) What is internet? Write any two advantages of Internet.
Ans: Internet is a collection of millions of computers of different types belonging to various networks all over the world.
Any two advantages of internet are as follows:
i. The internet provides very fast and cheap communication.
ii. It is easy to access information of different governments and countries.

c) What is antivirus software?  List any two antivirus software.
Ans: Those software which are designed to detect and remove viruses from the computer system to ensure a virus free environment is known as anti-virus software.
Any two antivirus software are:
i. Norton Antivirus
ii. McAfee

d) What is multimedia? Write any two applications of it.
Ans: The integration of several forms of media like audio, video, animation, etc. to present information in more interactive and understandable way is known as multimedia.
Any two applications of it are as follows:
i. Adding special effects in movies:
Multimedia is used in movies to add special effects to make movie more realistic and interesting.
ii. Preparing presentation:
Multimedia is used in preparing presentation which helps to convey information in more interesting and interactive way.

e) What do you mean by software security? Write any two methods to protect the computer software.
Ans: The security given to various software or data from being lost or damaged due to accidental or intentional harm is known as software security.
Any two methods to protect the computer software are:
i. Defragmentation
ii. Scan disk

















































3. Match the following:
Group A                                      Group B
i) McAfee                                a) Supplies continuous power
ii) UPS                                     b) Internet protocol
iii) Web Browser                                  c) Antivirus software
iv) TCP/IP                                d) Internet explorer
                                                e) Computer virus
Ans:
Group A                                      Group B
i) McAfee        -                       a) Antivirus software
ii) UPS             -                       b) Supplies continuous power
iii) Web Browser          -           c) Internet explorer
iv) TCP/IP        -                       d) Internet Protocol

4. State whether the statements are True or False
a) MODEM is necessary to access the internet. False
b) Fiber optics use light to carry a data signal through cable. True
c) Multimedia does not include animation. False
d) Cyber ethics are moral principles that make aware to the computer users. True

5. Give appropriate technical terms:
a) Network of networks.
Ans: Internet
b) A secret code that gives the user to access particular program and system.
Ans: Password
c) Use of Internet to buy and sell goods and services.
Ans: E-commerce
d) The rules and regulations to systematize the computer related  technology.
Ans: Cyber law

6. Give the full form:
a) Kbps            - Kilobits per second
b) NIC - Network Interface Card        
c) MODEM- Modulator Demodulator
d) FTP - File Transfer Protocol

Group B
DATABASE MANAGEMENT (10 marks)
7. Answer the following

a) Define data and database.
Ans: Data can be numbers, letters or symbols representing facts and figures that may or may not give complete sense.
Database is a collection of related and organized information that is used to store, organize and extract data.

b) Name any four data types that can be defined in MS-ACCESS.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii. Text
iii. Memo
iv. Auto number



c) What is a form? Give its importance.
Ans: Form is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
Importance of form are as follows:
i. It provides an interactive platform for input if data into the database.
ii. It helps to display data in more presentable form than a datasheet can.

8. State whether the following statements are true or false.
a) A query is used to select fields and records from many tables. True
b) MS-ACCESS is a spread-sheet software. False
c) Index decreases the speed of the query and short operations. False
d) The data in primary key field need to be unique and not null. True

9. Match the following:
   Group A                       Group B
i) MS-ACCESS                        a) analyze and present data in a printed format
ii) Data update             b) Query
iii) Field                       c) a piece of information related to someone or something
iv) Report                    d) Database management software
                                    e) collection of related fields.
Ans:
   Group A                       Group B
i) MS-ACCESS            -           a) Database management software
ii) Data update -           b) Query
iii) Field           -           c) a piece of information related to someone or something
iv) Report        -           d) analyze and present data in a printed format
                                   

Group C
Programming(18 marks)

10. a) Define modular programming.
Ans: Modular programming is a technique in which a program is divided into different small manageable program blocks, which are called modules or sub programs.

b) Name any two data types used in C language.
Ans: Any two data types of C language are:
·         char
·         int
c) Give the functions of NAME and CLOSE statements.
Ans:
NAME: The function of NAME statement is to rename a file on a diskette
CLOSE: The function of CLOSE statement is to close one or all open files.

11. Re-write the given program correcting the bugs:
DECLARE SUB Series()
CLS
EXECUTE Series
END
SUB Series
A=2
B=2
FOR ctr= 1 to 5
            DISPLAY A;B;
            A=A+B
            B=A+B
            LOOP ctr
END Series()

Ans:
DECLARE SUB Series ( )
CLS
CALL Series
END

SUB Series
A=2
B=2
FOR ctr= 1 to 5
            PRINT A;B;
            A=A+B
            B=A+B
            NEXTctr
END SUB

12. Write the output of the following program.
DECLARE FUNCTION Interest(p,t,r)
CLS
LET p=30
LET t=40
LET r=6
LET d=Interest(p,t,r)
PRINT “The simple interest will be”; d
END
FUNCTION Interest(p,t,r)
answer = (p*t*r)/100
            Interest=answer
END FUNCTION











13. Analyse the program given below and answer the questions:
DECLARE FUNCTION Diff(A,B)
CLS
INPUT “Enter first number”;A
INPUT “Enter second number”;B

PRINT “The difference of the two number=”;Diff(A,B)
END
FUNCTION Diff(A,B)
D=A-B
Diff=D
END FUNCTION
a) What will be the output of the program if the user enters 200 as the first number and 100 as the second number?











b) Will the program run if the first line (i.e. DECLARE…..) is deleted?
Ans: Yes, the program will run if the first line (i.e. DECLARE…) is deleted.

14.a) Write a program using FUNCTION….END FUNCTION to get a word from the user and print the word in the reverse order.
Ans:
DECLARE FUNCTION REV$(S$)
CLS
INPUT “Enter any word”; S$
PRINT “The reverse word is”; REV$(S$)
END

FUNCTION REV$(S$)
FOR I = LEN(S$) TO 1 STEP -1
B$=MID$(S$, I, 1)
W$=W$+B$
NEXT I
REV$=W$
END FUNCTION
b) Write a program using SUB….END SUB to get radius of the circle and display the area.
Ans:
DECLARE SUB AREA(R)
CLS
CONST PI=3.1416
INPUT ”Enter radius”; R
CALL AREA(R)
END

SUB AREA(R)
A=PI*R^2
PRINT “The area of circle”; A
END
c) A sequential data file called “Marks.dat” contains roll number, name, English, Nepali, and Maths field. Write a program to display all the content of the data file.
Ans:
OPEN “MARKS.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, RN, N$, E, N, M
PRINT RN, N$, E, N, M
WEND
CLOSE #1
END
***

Solved Computer Science SLC Examination-2065(2009)

 


Solved Computer Science SLC Examination-2065(2009)
            Computer Fundamental (22 marks)
1. Answer the following questions:

a. Define star topology with figure.
Ans: The topology in which all computers or the network devices are connected through a central device in the shape of star structure is called star topology.
Diagram of star topology




















b. List out any four services of internet.
Ans: Any four services of internet are
i) E-mail (Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce

c. Define computer ethics.
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.

d. Write down two measures of each to protect computer hardware and software.
Ans: Any two hardware security measures are:
ii) Insurance Policy
ii) Power Regulator Device
Any two software security measures are:
            i) Backup 
            iv) Password

e. What is anti-virus? Write down any two examples of anti-virus software.
Ans: Antivirus software is software designed to detect and remove virus from computer system to ensure virus free environment.
Any two examples of antivirus software are:
            i) Kaspersky    ii) NOD32


























3. Match the following:
Group A                                  Group B
a) Server                      i) HTTP
b) Node                                   ii) Work station
c) Protocol                   iii) Main computer
d) Coaxial cable           iv)Repeater
                                    v) Communication Media
Answers

Group A                      Group B
a) Server                      Main computer
b) Node                                   Work stationc) Protocol                   HTTPd) Coaxial cable           Communication Media
                                    

4. Select the best answer:
a)Which refers to the communication media?
i) UTP cable     ii) Fiber optic cable      iii) Satellite       iv) All of the above
            All of the above

b) Which is the correct Email ID?
i) Yahoo@ramesh        ii) Ramesh@yahoo.com          iii) @ramesh.yahoo.com          iv) None of the above

c) Route of virus transmission:
i) Pen drive      ii) Microphone             iii) Printer                     iv) Mouse
            Pen drive

d) Main component of multimedia is:
i) Floppy disk              ii) Floppy drive                        iii) Sound card             iv) Magnetic tape
            Sound card


5) Give appropriate technical terms:

a) A computer network limited within a room.
LAN (Local Area Network)

b) A program that destroys other program
Computer Virus

c) Law regarding internet (or Legal issues of Cyber Space).
Cyber Law

d) Buying and selling products and services online.
E-Commerce

6. Write the full forms:
a) UPS =          Uninterruptible Power Supply
b) TCP             =          Transmission Control Protocol
c) STP  =          Shielded Twisted Pair
d) NIC =          Network Interface Card







            Group B-  Database (10 marks)
7. Answer the following question:
a) What is database?
Ans:Database is a collection of related and organized information that can be used for different purpose.

b) While designing table structure which data types are suitable to store information about teacher’s name, address, salary, and date of birth.
While designing table structure the data types are suitable to store information about
teacher’s name = Text
Address = Memo
Salary = currency
Date of birth = Date / Time

c) Write down any two advantages of Query.
Any two importance of query are:
a.       It allows user to make calculations and change data in automated fashion.
b.      It provides option to delete all the unwanted data matching certain criteria.

8. Select the best answer:
a) …………… is not the data type of MS-Access.
i) Number        ii) Text             iii) Memo         iv) Form
            Form

b) …………… is the DBMS.
i) Fox-Pro        ii) MS-Excel                 iii) Lotus-123   iv) All of the above
            Fox-pro

c) Primary key does not accept …………… 
i) Text              ii) Number       iii) Null value   iv) None of the above
            Null value

d) In MS-Access we enter data using ………….
i) Form             ii) Table           iii) Report        iv) Both (i) &(ii)
            Both (i) &(ii)

9. Match the following:
Group A                      Group B
a) Query                      i)Printed format
b) Form                                    ii) Stored data
c) Table                       iii) Allows view, edit, input data
d) Report                     iv) Extracts the selected record for view
                                    v) DBMS
Answers
Group A                      Group B
a) Query                      Extracts the selected record for view
b) Form                                    Allows view, edit, input data
c) Table                       Stores data
d) Report                     Printed format
                                               
Group C-Programming (18 marks)
10. a) Write down one difference between function and sub procedure.
Ans: One difference between function and sub procedure is
SUB-procedure
FUNCTION-procedure
SUB-procedure does not return value.
FUNCTION-procedure must return a value.

b) List any two data type used in C language.
Ans: Any two data type used in C language are char and int

c) Write down the functions of:
            i) RMDIR       
Ans: It is used to remove or delete only the subdirectories from a disk. It can remove only empty subdirectories.
            ii) NAME
Ans: The NAME statement renames a file on a disk.


11.Write the output of:
DECLARE SUB RESULT(A$)
A$ = "EDUCATION"
CALL RESULT(A$)                            
END

SUB RESULT (A$)
FOR C = 1 TO LEN(A$) STEP 2
 X$ = MID$(A$, C, 1)
PRINT X$
NEXT C
END SUB
















12. Re-write the following program after correcting:DECLARE FUNCTION SUM(a,b)
REM Program to sum given two numbers
Input ”Enter first number”; x
Input “Enter second number; y 
PRINT SUM(a,b)
END

FUNCTION SUM(x,y)
SUM=a+b
END


Debuged Program
DECLARE FUNCTION SUM (a,b)
REM Program to sum given two numbers
Input ”Enter first number”; x
Input “Enter second number; y 
PRINT SUM (x, y)
END

FUNCTION SUM(a, b)
SUM=a+b
END FUNCTION

13. Study the following program and answer the following question:
DECLARE FUNCTION xyz(N)
FOR I = 1 TO 5
READ N
Z=xyz(N)
S=S+Z
NEXT I
PRINT S
DATA 10,13,15,4,6
END

FUNCTION xyz(N)
IF N MOD 2=0 THEN xyz=N
END FUNCTION
a) What is the name of the function used in the above program?
Ans: The name of the function used in the above program is xyz.

b) How many times the function will be called in the above program?
Ans: The function will be called five times in the above program.


14. a) Write a program to store records regarding the information of Book number, Book’s name and Writer’s name in a sequential data file called “Library.dat”.
OPEN “Library.dat” FOR OUTPUT AS #1
            DO
CLS
INPUT “ENTER BOOK’S NUMBER”; BN
INPUT “ENTER BOOK’S NAME”; B$
INPUT “ENTER WRITER’S NAME”; N$
WRITE #1, BN, B$, N$
INPUT “DO YOU WANT TO CONTINUE”; CH$
LOOP WHILE UCASE$(CH$) = “Y”
CLOSE #1
END


b) Using FUNCTION……END FUNCTION, write a program to calculate distance travelled by a body. (Hint: s=ut+ (1/2) at2)
           
DECLARE FUNCTION DISTANCE (U,T, A)
            CLS
            INPUT “ENTER INITIAL VELOCITY, TIME AND ACCELERATION”; U, T, A
            PRINT “DISTANCE TRAVELLED BY BODY”; DISTANCE (U, T, A)
            END
           
            FUNCTION DISTANCE (U, T, A)
            DISTANCE = U*T+1/2*A*T^2
            END FUNCTION

c) Using SUB……….END sub, write a program to print the following serial 9, 7, 5,……1
           
            DECLARE SUB SERIES ( )
            CLS
            CALL SERIES
            END

            SUB SERIES ( )
            FOR I = 9 TO 1 STEP-2
            PRINT I
            NEXT I
            END SUB

***