Wednesday, May 12, 2021

COMPUTER SCIENCE - TRITON SEE Model Question (Set-2) Solved

 COMPUTER SCIENCE   - TRITON SEE Model Question (Set-2) Solved

Time: 1:30 hours F.M.: 75

Group A

 

1. Answer the following question: (5×2=10)

 

a) What do you mean by communication media? Give any two examples of guided media.

Ans: Transmission medium is a pathway through which data are transmitted in a network.

Any two examples of guided media are Twisted pair cable and Fiber optic cable

 

b) Compare and write the differences of e-mail with traditional postal mail.

Ans: The differences of e-mail with traditional postal mail are:

Email

Traditional Mail (Postal Mail)

1.     It is very fast medium. 

1.     It is slow in compared to Email.

2.     It is easy to send voice, images and other types of information through Email.

2.     Its is difficult to send other information than written.

3.     It is cheaper than postal mail.

3.     It is expensive in compared to Email.

4.     Recipients can receive message from anywhere.

4.     Recipients can receive message only at the marked place.

 

c) What is a backup? Why it is important in computer security system?

Ans: Backup is a copy of a file which is used in the event of the original file being corrupted.

Backup is essential to computer security system to recover the important data and programs which are lost or damaged from accidental and intentional harm.

 

d) How does virus spread form one computer to another?

Ans: Virus spread form one computer to another by

i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
iii) Downloading files and programs form the websites which are not secure
iv) Exchanging data and information over a network

 

e) Why multimedia technology is becoming popular?

Ans: Multimedia technology is becoming popular because it shares the ideas, views and thoughts of people in an interactive, effective and understandable way.

 

2. a) Perform the following Binary calculation: (2×1=2)

i) (100100) + (11011) – (11101)

ii) 1011101÷111

 

b) Perform as indicated: (2×1=2)

i) (608)10 into Octal

ii) (765)8 into Hexadecimal

 

 



 

3. Select the correct answer: (4×0.5=2)

a) Computer virus has its infection to ----------------- .

i) Monitor       ii) Mouse        iii) Keyboard iv) Hard disk

b) Defragmentation is a process of ----------------- .

i) Formatting the disk                                                 ii) Relocation of the disk      

iii) Relocation of the files of the disk           iv) None

c) Cyber law of Nepal was introduced in the year ----------------- .

i) 2057            ii) 2060          iii) 2061                      iv) 2062

d) Data transmission will be faster using ----------------- .

i) Co-axial      ii) Fiber Optics          iii) STP          iv) UTP

 

4. Write the full form of the following: (4×0.5=2)

a) DNS – Domain Name System

b) NAV – Norton Anti Virus

c) VHF – Very High Frequency

d) PNG - Portable Graphics Format

 

5. Match the following: (4×0.5=2)

Group A                             Group B

a) Web Browser                 (c) Power protection device.

b) Cyber ethics                   (d) To share hardware and software resources

c) UPS                                (a) Google Chrome

d) Network                                     (---) Bridge

(b) Moral Principles

 

6. Give the appropriate technical terms of the following: (4×0.5=2)

a) The technique used to provide medical information and services through the Internet. Telemedicine

b) The moving graphic images. Animation

c) Website used to search information on the Internet. Search Engine

d) An electronic equivalent of a signature. Digital Signature

 

Group ‘B’ [Database Management - 10 Marks]

 

7. Answer the following question: (3×2=6)

 

a) Is MS-Access RDBMS? If yes, explain.

Ans: Yes, MS-Access is a RDBMS. It is a database management system that is based on the relation model in which data is stored in the form of tables and the relationship among the data is also stored in the form of tables.

 

b) What is data redundancy? How can we reduce data redundancy?

Ans: Data redundancy is defined as the storing of the same data in multiple locations.

Data redundancy can be controlled in MS-Access by the use of “Primary Key”.

 

c) What is query? List its types.

Ans: Query is an object of a database which extracts and arranges information from a table.
The different types of query are:
i) Select query
ii) Action query
In action query, we have update query, append query, delete query and make-table query.

 

 

 

 

 

8. Choose the correct answer [Choose all that apply]: (4×0.5=2)

a) Which of the following is an example of database?

i) Oracle                      ii) Ms-Access                        iii) Tel. Directory     iv) All

b) Primary Key doesn’t accept ----------------- value.

i) Null                         ii) Duplicate               iii) Both                      iv) None

c) Which component of Ms-Access doesn’t allow entering data?

i) Form                        ii) Report                   iii) Table                     iv) Query

d) Which specifies an expression that checks for the invalid data?

i) Validation Rule      ii) Validation Text    iii) Input Mask            iv) Required

 

 

 

9. Match the following: (4×0.5=2)

Group A                                           Group B

a) Data Integrity                  (c) No. of character can be entered

b) Automatic                                    (a) Validation Rule

c) Field size                                     (d) Caption

d) Label for field                 (iv) Indexed

(b) Default value

 

Group ‘C’ [Programming - 18 Marks]

 

10. a) Write any two differences between SUB and FUNCTION procedures? (1)

Any two differences between SUB and FUNCTION procedures are

SUB-procedure

FUNCTION-procedure

i) SUB-procedure does not return value.

i) FUNCTION-procedure must return a value.

ii) SUB-procedure’s name does not accept data type symbol because it does not need to return a value.

ii) FUNCTION-procedure’s name accepts data type symbols such as $, %, !, #, &, etc. and it depends on the type of value to be returned. E.g.: FUNCTION REV$ returns string.

 

b) Give brief description of C language. (1)

C-language is a structured programming language that divides program into many functions.

Dennis Ritchie at Bell telephone laboratory developed C-language in 1972 AD.

C is mostly used to write system program such as operating system, language, compiler, text editor, language interpreters, utilities, etc.

 

c) Write down the function of the following statements: (2×0.5=1)

i) NAME - The NAME statement renames a file on a diskette.

ii) PRINT# - It sends one or more data items to the specified file.

 

11. Write the output of the following program. (2)

DECLARE SUB result (n$)

n$ = "DMAAPAEFA"

CALL result(n$)

END

============================

SUB result (n$)

b = LEN(n$)

count = 2

WHILE count <= b

x$ = x$ + MID$(n$, count, 1)

count = count + 2

WEND

PRINT x$

END SUB

 

Dry Run

Variable

Variable

Variable

Condition Check

Variable

Output

n$

b

count

count<=b

x$

MAAF

DMAAPAEFA

9

2

2<=9 Yes

M

 

 

 

4

4<=9 Yes

MA

 

 

 

6

6<=9 Yes

MAA

 

 

 

8

8<=9 Yes

MAAF

 

 

 

10

10<=9 No

 

 

 

 

 

Loop Exits

 

 

 

Output

MAAF

 

12. Re-write the given program after correcting the bugs. (2)

REM to displays records from 3nd to 7th position

OPEN “record.txt” FOR OUTPUT AS #2

WHILE NOT EOF(2)

INPUT #1, R, N$, A$, DOB$

P = P + 1

IF P<= 3 AND C>=7 THEN

PRINT R, N$, A$, DOB$

END IF

LOOP

CLOSE #2

END

 

Debugged Program

REM to displays records from 3nd to 7th position

OPEN “record.txt” FOR INPUT AS #2

WHILE NOT EOF(2)

INPUT #2, R, N$, A$, DOB$

P = P + 1

IF P>= 3 AND C<=7 THEN

PRINT R, N$, A$, DOB$

END IF

WEND

CLOSE #2

END

 

13. Study the following program and answer the given questions. (2×1=2)

REM check the supplied no. is perfect square or not

DECLARE FUNCTION check (a)

CLS

INPUT "type any number: "; n

IF check(n) = 0 THEN

PRINT "Perfect Square"

ELSE

PRINT "Not Perfect Square"

END IF

END

=========================

FUNCTION check (x)

s = SQR(x)

IF s = FIX(s) THEN

check = 1

ELSE

check = 0

END IF

END FUNCTION

a) Name the actual and formal parameter used in above program.

            Formal parameter – a, x                     Actual parameter - n

b) Does the program give same output if FIX() function is replaced by INT() function?

            Yes, the program will give same output if FIX() function is replaced by INT() function

 

14. a) Write a program to display the below output using SUB procedure. (3)

123456789

1234567

12345

123

1

 

DECLARE SUB SERIES ( )

CLS

CALL SERIES

END

 

SUB SERIES( )

A# = 123456789

FOR I = 1 TO 5

PRINT A#

A# = A# \ 100

NEXT I

END SUB

 

 

b) Write a program to calculate and print volume of cylinder using FUNCTION…END Function. (3)

 

DECLARE FUNCTION VOLUME (R, H)

CLS

INPUT “ENTER RADIUS”; R

INPUT “ENTER HEIGHT”; H

PRINT “VOLUME OF CYLINDER ”; VOLUME(R, H)

END

 

FUNCTION VOLUME (R, H)

VOLUME = 3.14 * R ^ 2 * H

END FUNCTION

 

c) Write a program that asks students’ name, roll and class and stores into “class.dat” only those records who are studying in class 10. User can supply the records as per his/her need. (3)

OPEN “class.dat” FOR OUTPUT AS #1

DO

CLS
INPUT “Enter name”; N$

INPUT “Enter Roll”; R

INPUT “Enter class”; C

IF C = 10 THEN WRITE #1, N$, R, C

INPUT “Do you want to add more records”; CH$

LOOP WHILE UCASE$(CH$)=”Y”

CLOSE #1

END


No comments:

Post a Comment