Thursday, May 13, 2021

COMPUTER SCIENCE - TRITON SEE Model Question (Set-3) Solved

 COMPUTER SCIENCE   - TRITON SEE Model Question (Set-3) Solved

Computer Science - SEE Model Question (Set-III)

Time: 1:30 hours F.M.: 75

Group A : Fundamental [22 marks]

 

1. Answer the following questions: [5x2=10]

 

a. What do you mean by communication media? Write any two examples of guided media.

Communication media is a pathway through which data are transmitted in a network.

Any two examples of guided media are Fiber optic cable and Coaxial cable.

 

b. Define e-mail. List out any two importance of e-mail.

E-mail (Electronic mail) is one of the most popular services provided by the internet which exchanges messages between the computers.

The importance of email are:
i) It allows to send and receive message across the world at very low cost.
ii) It is very fast compared to postal system.

 

c. What is cyber law? Why is it important?

The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

The importance of cyber law is that it controls cyber-crime and misuse of computer.

 

d. What is computer virus? Give any two symptoms of computer virus.

Computer virus is a program written by the programmer with the intention of destroying and damaging the data and programs residing in the computer system.

The symptoms of computer virus are:
i) Program take long time to load.
ii) Increased use of disk space and growth in file size.

e. What is data backup? Write the importance of data backup system.

Backup is a copy of a file which is used in the event of the original file being corrupted.

Backup is essential to computer security system to recover the important data and programs which gets lost or damaged due to accidental or intentional harm.

 

2. a. Convert as instructed: [2x1=2]

i) (450)10 into Binary                        ii) (111101)2 into Octal

 

b. Perform binary calculations: [2x1=2]

i) 10111 × 110                                    ii) 101101÷101

 

 



 

 

 

 

 

 

 

 

 

 

 

 

3. Match the following pairs: [4x0.5=2]

a) Cyber ethics                       di) graphics, text, sound

b) Virus                                  c) main computer

c) Server                                 a) moral principle

d) Multimedia                                     b) damage data

----) Internet

4. State whether the following statements are True or False: [4x0.5=2]

a) MAN connects two or more LAN together. True

b) Dialup connection is the easiest way to connect a computer to the internet. True

c) Cyberspace is a virtual space used in Computer. True

d) Trojan is a kind of antivirus used in Computer. False

 

5. Give the suitable technical terms of the followings: [4x0.5=2]

a) Doing business through online. E-Commerce

b) The secret word, phrase that gives user access to a particular program. Password

c) The computer that acts the central authority in a network. Server

d) Intentionally, gaining unauthorized access to an information system. Hacking

 

6. Give the full form of the followings: |4x0.5=2|

a) FTP – File Transfer Protocol

b) Wi-Fi - Wireless Fidelity

c) UPS – Uninterruptible Power Supply

d) ISP – Internet Service Provider

 

Group B: Database Management System (10 marks)

 

7. Answer the following questions: [3x2=6]

 

a) What is a database? Give two examples.

Database is a collection of related and organized information that can be used for different purpose.
Two examples of database are:
i) Dictionary
ii) Telephone Directory

 

b) What is a table? Write its importance in database creation.

Table is an object of database that stores large volume of data in the form of rows and columns.

The importance of table is that different properties of a field can be set in a table and also it provides options for primary key which helps to make data consistent.

 

c) What is a primary key? Write the use of primary key.

Primary key is a field that uniquely identifies the record which neither accepts duplicate values nor null values.

The uses of Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.

 

8. State whether the following statements are True or False: [4x0.5=2]

a) The extension of MS-Access is .dbf. False

b) In query calculation also can be done. True

c) We cannot insert picture in database. False

d) With the help of the wizard also we can create a form. True

 

 

 

 

9.Match the following groups: [4x0.5=2]

 

Group A                     Group B

i. Currency                  iii ) 1 GB

ii. YES/No field          iv ) 255 characters

iii. OLE field              ii ) 1 bit

iv. Text field               ---) 1 MB

i ) 8 bytes

Group C: QBASIC Programming (18 marks)

 

10. a) Define FUNCTION and SUB procedure. [1]

A SUB-procedure is a small, logical and manageable functional part of program which prefers specific task and does not return any value.

A FUNCTION-procedure is a small, logical and manageable functional part of a program which performs specific task and returns single value to the main program or calling module.

 

b) Why is C called middle level language? [1]

Ans: C is called middle level language because it combines elements of high level language with some features of assembler.

 

c) Write down the function of INPUT and PRINT statements. [1]

INPUT - It accepts data from the user.

PRINT – It displays data in the computer screen.

 

11. Debug the following program. [2]

 

DECLARE FACT(N)

CLS

INPUT”ENTER NUMBER”;A

CALL FACT(N)

END

SUB FACT(N)

FOR K=1 TO N

IF N MOD K = 1 THEN

PRINT K

IF END

WEND

END FUNCTION

 

 

 

Debugged Program

 

DECLARE SUB FACT(N)

CLS

INPUT”ENTER NUMBER”;A

CALL FACT(A)

END

SUB  FACT(N)

FOR K=1 TO N

IF N MOD K = 0 THEN

PRINT K

END IF

NEXT K

END SUB

           

 

12. Write the output of the given program. [2]

DECLARE SUB SERIES ( )

CLS

CALL SERIES

END

SUB SERIES

A = 3

FOR I = 1 TO 5

PRINT A;

IF A MOD 2 = 0 THEN

A = A \ 2

ELSE

A = A * 3 + 1

END IF

NEXT I

END SUB

 

 

Variable

Variable

Condition

Output

Statement Check

 

A

I

1 to 5

 

A MOD 2

 

3

1

1 to 5 Yes

3 10 5 16 8

3 MOD 2=0

1=0 No

 

10

 

2 to 5 Yes


10 MOD 2=0

0=0 Yes

 

5

 

3 to 5 Yes


5 MOD 2 = 0

1=0 No

 

16

 

4 to 5 Yes


16 MOD 2=0

0=0 Yes

 

8

 

5 to 5 Yes


8 MOD 2=0

0=0 Yes

 

4

 

6 to 5 No

 

 

 

 

 

Output

3  10  5  16  8

 

13. Read the following program and answer the following questions. [2]

DECLARE SUB res(a$)

CLS

a$ = "KATHMANDU"

CALL res(a$)

END

SUB res(a$)

L = LEN(a$)

FOR x = L to 1 STEP -2

PRINT MID$(a$, x, 1);

NEXT x

END SUB

a. What will be the value of L if a$ = "I live in Nepal."?

Ans: The value of L will be 15 if a$ = "I live in Nepal."

b. What happen if we remove the statement line "CALL res(a$)" ?

                Ans: If we remove the statement line "CALL res(a$)"then the output screen will be blank.

 

 

 

14. a. Write a program to check whether an entered number is perfect square or not using SUB…… END SUB statement. [3]

 

DECLARE SUB PERFECT (N)

CLS

INPUT "ENTER ANY NUMBER"; N

CALL PERFECT (N)

END

SUB PERFECT (N)

S = SQR(N)

IF S = INT(S) THEN

PRINT "PERFECT SQUARE"

ELSE

PRINT "NOT PERFECT SQUARE"

END IF

END SUB

 

b. Using FUNCTION …… END FUNCTION. Write a program to convert given Nepali currency into US dollar. [Hints 1 US$ = 110 NC] [3]

 

DECLARE FUNCTION CONVERT (NC)

CLS

INPUT “ENTER VALUE IN NEPALESE RUPEES”; NC

PRINT “DOLLAR CURRENCY VALUE=”;  CONVERT (NC)

END

 

FUNCTION CONVERT (NC)

D = NC / 100

CONVERT = D

END FUNCTION

 

c. A sequential data file named "STUDENT.DAT" contains name, class, roll no and address of the students. Write a program to display all the students' records. [3]

 

OPEN “STUDENT.DAT” FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

INPUT #1, N$, C, R, A$

PRINT N$, C, R< A$

WEND

CLOSE #1

END


No comments:

Post a Comment