COMPUTER SCIENCE - TRITON SEE Model Question (Set-3) Solved
Computer Science - SEE Model Question (Set-III)
Time: 1:30 hours F.M.: 75
Group A : Fundamental [22 marks]
1.
Answer the following questions: [5x2=10]
a. What do you mean by communication media? Write any two examples
of guided media.
Communication
media is a pathway
through which data are transmitted in a network.
Any two examples of guided media are Fiber optic cable and Coaxial
cable.
b. Define e-mail. List out any two importance of e-mail.
E-mail
(Electronic mail) is one of the most popular services provided by the internet
which exchanges messages between the computers.
The
importance of email are:
i) It allows to send and receive message across the world at very low cost.
ii) It is very fast compared to postal system.
c. What is cyber law? Why is it important?
The
law which governs the legal issues in the cyber space regarding the internet or
WWW for digital data processing and transaction is called cyber law.
The
importance of cyber law is that it controls cyber-crime and misuse of computer.
d. What is computer virus? Give any two symptoms of computer
virus.
Computer
virus is a program written by the programmer with the intention of destroying
and damaging the data and programs residing in the computer system.
The
symptoms of computer virus are:
i) Program take long time to load.
ii) Increased use of disk space and growth in file size.
e. What is data backup? Write the importance of data backup
system.
Backup is a copy of a file which
is used in the event of the original file being corrupted.
Backup is essential to computer
security system to recover the important data and programs which gets lost or
damaged due to accidental or intentional harm.
2.
a. Convert as instructed: [2x1=2]
i) (450)10 into
Binary ii)
(111101)2 into Octal
b.
Perform binary calculations: [2x1=2]
i) 10111 × 110 ii) 101101÷101
3.
Match the following pairs: [4x0.5=2]
a) Cyber ethics di)
graphics, text, sound
b) Virus c)
main computer
c) Server a)
moral principle
d) Multimedia b)
damage data
----) Internet
4.
State whether the following statements are True or False: [4x0.5=2]
a) MAN connects two or more LAN together. True
b) Dialup connection is the easiest way to connect a computer to
the internet. True
c) Cyberspace is a virtual space used in Computer. True
d) Trojan is a kind of antivirus used in Computer. False
5.
Give the suitable technical terms of the followings: [4x0.5=2]
a) Doing business through online. E-Commerce
b) The secret word, phrase that gives user access to a particular
program. Password
c) The computer that acts the central authority in a network.
Server
d) Intentionally, gaining unauthorized access to an information
system. Hacking
6.
Give the full form of the followings: |4x0.5=2|
a) FTP – File Transfer Protocol
b) Wi-Fi - Wireless Fidelity
c) UPS – Uninterruptible Power Supply
d) ISP – Internet Service Provider
Group B: Database Management System (10 marks)
7.
Answer the following questions: [3x2=6]
a) What is a database? Give two examples.
Database
is a collection of related and organized information that can be used for
different purpose.
Two examples of database are:
i) Dictionary
ii) Telephone Directory
b) What is a table? Write its importance in database creation.
Table is an
object of database that stores large volume of data in the form of rows and
columns.
The
importance of table is that different properties of a field can be set in a
table and also it provides options for primary key which helps to make data
consistent.
c) What is a primary key? Write the use of primary key.
Primary
key is a field that uniquely identifies the record which neither accepts
duplicate values nor null values.
The
uses of Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
8.
State whether the following statements are True or False: [4x0.5=2]
a) The extension of MS-Access is .dbf. False
b) In query calculation also can be done. True
c) We cannot insert picture in database. False
d) With the help of the wizard also we can create a form. True
9.Match
the following groups: [4x0.5=2]
Group A Group
B
i. Currency iii
) 1 GB
ii. YES/No field iv
) 255 characters
iii. OLE field ii
) 1 bit
iv. Text field ---)
1 MB
i ) 8 bytes
Group C: QBASIC Programming (18 marks)
10. a) Define FUNCTION and SUB procedure. [1]
A
SUB-procedure is a small, logical and manageable functional part of program
which prefers specific task and does not return any value.
A
FUNCTION-procedure is a small, logical and manageable functional part of a
program which performs specific task and returns single value to the main
program or calling module.
b) Why is C called middle level language? [1]
Ans:
C is called middle level language because it combines elements of high level
language with some features of assembler.
c) Write down the function of INPUT and PRINT statements. [1]
INPUT
- It accepts data from the user.
PRINT
– It displays data in the computer screen.
11.
Debug the following program. [2]
DECLARE FACT(N)
CLS
INPUT”ENTER NUMBER”;A
CALL FACT(N)
END
SUB FACT(N)
FOR K=1 TO N
IF N MOD K = 1 THEN
PRINT K
IF END
WEND
END FUNCTION
Debugged
Program
DECLARE SUB
FACT(N)
CLS
INPUT”ENTER NUMBER”;A
CALL FACT(A)
END
SUB FACT(N)
FOR K=1 TO N
IF N MOD K = 0 THEN
PRINT K
END
IF
NEXT
K
END SUB
12.
Write the output of the given program. [2]
DECLARE SUB SERIES ( )
CLS
CALL SERIES
END
SUB SERIES
A = 3
FOR I = 1 TO 5
PRINT A;
IF A MOD 2 = 0 THEN
A = A \ 2
ELSE
A = A * 3 + 1
END IF
NEXT I
END SUB
Variable |
Variable |
Condition |
Output |
Statement
Check |
|
A |
I |
1
to 5 |
|
A
MOD 2 |
|
3 |
1 |
1
to 5 Yes |
3 10 5 16 8 |
3
MOD 2=0 1=0
No |
|
10 |
|
2
to 5 Yes |
|
10
MOD 2=0 0=0
Yes |
|
5 |
|
3
to 5 Yes |
|
5
MOD 2 = 0 1=0
No |
|
16 |
|
4
to 5 Yes |
|
16
MOD 2=0 0=0
Yes |
|
8 |
|
5
to 5 Yes |
|
8
MOD 2=0 0=0
Yes |
|
4 |
|
6
to 5 No |
|
|
|
Output
3 10 5 16 8
13.
Read the following program and answer the following questions. [2]
DECLARE SUB res(a$)
CLS
a$ = "KATHMANDU"
CALL res(a$)
END
SUB res(a$)
L = LEN(a$)
FOR x = L to 1 STEP -2
PRINT MID$(a$, x, 1);
NEXT x
END SUB
a. What will be the value of L if a$ = "I live in Nepal."?
Ans:
The value of L will be 15 if a$
= "I live in Nepal."
b. What happen if we remove the
statement line "CALL res(a$)"
?
Ans: If we remove
the statement line "CALL res(a$)"then the output screen will be blank.
14. a. Write a program to check whether an
entered number is perfect square or not using SUB…… END SUB statement. [3]
DECLARE SUB PERFECT (N)
CLS
INPUT "ENTER ANY NUMBER";
N
CALL PERFECT (N)
END
SUB PERFECT (N)
S = SQR(N)
IF S = INT(S) THEN
PRINT "PERFECT SQUARE"
ELSE
PRINT "NOT PERFECT SQUARE"
END IF
END SUB
b. Using FUNCTION …… END FUNCTION. Write a program to convert
given Nepali currency into US dollar. [Hints 1 US$ = 110 NC] [3]
DECLARE FUNCTION CONVERT (NC)
CLS
INPUT “ENTER VALUE IN NEPALESE
RUPEES”; NC
PRINT “DOLLAR CURRENCY VALUE=”; CONVERT (NC)
END
FUNCTION CONVERT (NC)
D = NC / 100
CONVERT = D
END FUNCTION
c. A sequential data file named "STUDENT.DAT" contains
name, class, roll no and address of the students. Write a program to display
all the students' records. [3]
OPEN
“STUDENT.DAT” FOR INPUT AS #1
CLS
WHILE NOT
EOF(1)
INPUT #1,
N$, C, R, A$
PRINT N$,
C, R< A$
WEND
CLOSE #1
END
No comments:
Post a Comment