Friday, March 19, 2021

Solved Computer Science Supplementary Exam 2065

 


Solved Computer Science Supplementary Exam 2065
Group A
COMPUTER FUNDAMENTALS (22 marks)
1. Answer the following questions:
a) Explain about network topology. Write any two advantages of computer networking.
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as network topology.
Any two advantages of computer networking are :
i. Computer in network share different software packages.
ii. Communication made by computer network is very cheap.

b) What is internet? Write any two advantages of Internet.
Ans: Internet is a collection of millions of computers of different types belonging to various networks all over the world.
Any two advantages of internet are as follows:
i. The internet provides very fast and cheap communication.
ii. It is easy to access information of different governments and countries.

c) What is antivirus software?  List any two antivirus software.
Ans: Those software which are designed to detect and remove viruses from the computer system to ensure a virus free environment is known as anti-virus software.
Any two antivirus software are:
i. Norton Antivirus
ii. McAfee

d) What is multimedia? Write any two applications of it.
Ans: The integration of several forms of media like audio, video, animation, etc. to present information in more interactive and understandable way is known as multimedia.
Any two applications of it are as follows:
i. Adding special effects in movies:
Multimedia is used in movies to add special effects to make movie more realistic and interesting.
ii. Preparing presentation:
Multimedia is used in preparing presentation which helps to convey information in more interesting and interactive way.

e) What do you mean by software security? Write any two methods to protect the computer software.
Ans: The security given to various software or data from being lost or damaged due to accidental or intentional harm is known as software security.
Any two methods to protect the computer software are:
i. Defragmentation
ii. Scan disk

















































3. Match the following:
Group A                                      Group B
i) McAfee                                a) Supplies continuous power
ii) UPS                                     b) Internet protocol
iii) Web Browser                                  c) Antivirus software
iv) TCP/IP                                d) Internet explorer
                                                e) Computer virus
Ans:
Group A                                      Group B
i) McAfee        -                       a) Antivirus software
ii) UPS             -                       b) Supplies continuous power
iii) Web Browser          -           c) Internet explorer
iv) TCP/IP        -                       d) Internet Protocol

4. State whether the statements are True or False
a) MODEM is necessary to access the internet. False
b) Fiber optics use light to carry a data signal through cable. True
c) Multimedia does not include animation. False
d) Cyber ethics are moral principles that make aware to the computer users. True

5. Give appropriate technical terms:
a) Network of networks.
Ans: Internet
b) A secret code that gives the user to access particular program and system.
Ans: Password
c) Use of Internet to buy and sell goods and services.
Ans: E-commerce
d) The rules and regulations to systematize the computer related  technology.
Ans: Cyber law

6. Give the full form:
a) Kbps            - Kilobits per second
b) NIC - Network Interface Card        
c) MODEM- Modulator Demodulator
d) FTP - File Transfer Protocol

Group B
DATABASE MANAGEMENT (10 marks)
7. Answer the following

a) Define data and database.
Ans: Data can be numbers, letters or symbols representing facts and figures that may or may not give complete sense.
Database is a collection of related and organized information that is used to store, organize and extract data.

b) Name any four data types that can be defined in MS-ACCESS.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii. Text
iii. Memo
iv. Auto number



c) What is a form? Give its importance.
Ans: Form is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
Importance of form are as follows:
i. It provides an interactive platform for input if data into the database.
ii. It helps to display data in more presentable form than a datasheet can.

8. State whether the following statements are true or false.
a) A query is used to select fields and records from many tables. True
b) MS-ACCESS is a spread-sheet software. False
c) Index decreases the speed of the query and short operations. False
d) The data in primary key field need to be unique and not null. True

9. Match the following:
   Group A                       Group B
i) MS-ACCESS                        a) analyze and present data in a printed format
ii) Data update             b) Query
iii) Field                       c) a piece of information related to someone or something
iv) Report                    d) Database management software
                                    e) collection of related fields.
Ans:
   Group A                       Group B
i) MS-ACCESS            -           a) Database management software
ii) Data update -           b) Query
iii) Field           -           c) a piece of information related to someone or something
iv) Report        -           d) analyze and present data in a printed format
                                   

Group C
Programming(18 marks)

10. a) Define modular programming.
Ans: Modular programming is a technique in which a program is divided into different small manageable program blocks, which are called modules or sub programs.

b) Name any two data types used in C language.
Ans: Any two data types of C language are:
·         char
·         int
c) Give the functions of NAME and CLOSE statements.
Ans:
NAME: The function of NAME statement is to rename a file on a diskette
CLOSE: The function of CLOSE statement is to close one or all open files.

11. Re-write the given program correcting the bugs:
DECLARE SUB Series()
CLS
EXECUTE Series
END
SUB Series
A=2
B=2
FOR ctr= 1 to 5
            DISPLAY A;B;
            A=A+B
            B=A+B
            LOOP ctr
END Series()

Ans:
DECLARE SUB Series ( )
CLS
CALL Series
END

SUB Series
A=2
B=2
FOR ctr= 1 to 5
            PRINT A;B;
            A=A+B
            B=A+B
            NEXTctr
END SUB

12. Write the output of the following program.
DECLARE FUNCTION Interest(p,t,r)
CLS
LET p=30
LET t=40
LET r=6
LET d=Interest(p,t,r)
PRINT “The simple interest will be”; d
END
FUNCTION Interest(p,t,r)
answer = (p*t*r)/100
            Interest=answer
END FUNCTION











13. Analyse the program given below and answer the questions:
DECLARE FUNCTION Diff(A,B)
CLS
INPUT “Enter first number”;A
INPUT “Enter second number”;B

PRINT “The difference of the two number=”;Diff(A,B)
END
FUNCTION Diff(A,B)
D=A-B
Diff=D
END FUNCTION
a) What will be the output of the program if the user enters 200 as the first number and 100 as the second number?











b) Will the program run if the first line (i.e. DECLARE…..) is deleted?
Ans: Yes, the program will run if the first line (i.e. DECLARE…) is deleted.

14.a) Write a program using FUNCTION….END FUNCTION to get a word from the user and print the word in the reverse order.
Ans:
DECLARE FUNCTION REV$(S$)
CLS
INPUT “Enter any word”; S$
PRINT “The reverse word is”; REV$(S$)
END

FUNCTION REV$(S$)
FOR I = LEN(S$) TO 1 STEP -1
B$=MID$(S$, I, 1)
W$=W$+B$
NEXT I
REV$=W$
END FUNCTION
b) Write a program using SUB….END SUB to get radius of the circle and display the area.
Ans:
DECLARE SUB AREA(R)
CLS
CONST PI=3.1416
INPUT ”Enter radius”; R
CALL AREA(R)
END

SUB AREA(R)
A=PI*R^2
PRINT “The area of circle”; A
END
c) A sequential data file called “Marks.dat” contains roll number, name, English, Nepali, and Maths field. Write a program to display all the content of the data file.
Ans:
OPEN “MARKS.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, RN, N$, E, N, M
PRINT RN, N$, E, N, M
WEND
CLOSE #1
END
***

No comments:

Post a Comment