COMPUTER SCIENCE - TRITON SEE Model Question (Set-2) Solved
Time: 1:30 hours F.M.: 75
Group A
1. Answer
the following question: (5×2=10)
a) What do you mean by communication media? Give any two examples
of guided media.
Ans: Transmission medium is a pathway
through which data are transmitted in a network.
Any two examples of
guided media are Twisted pair cable and Fiber optic cable
b) Compare and write the differences of e-mail with traditional
postal mail.
Ans: The differences
of e-mail with traditional postal mail are:
Email |
Traditional Mail (Postal Mail) |
1. It is very fast medium. |
1. It is slow in compared to Email. |
2. It is easy to send voice, images and other
types of information through Email. |
2. Its is difficult to send other information
than written. |
3. It is cheaper than postal mail. |
3. It is expensive in compared to Email. |
4. Recipients can receive message from anywhere. |
4. Recipients can receive message only at the
marked place. |
c) What is a backup? Why it is important in computer security
system?
Ans: Backup is a copy
of a file which is used in the event of the original file being corrupted.
Backup is essential to computer
security system to recover the important data and programs which are lost or
damaged from accidental and intentional harm.
d) How does virus spread form one computer to another?
Ans: Virus spread
form one computer to another by
i)
Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
iii) Downloading files and programs form the websites which are not secure
iv) Exchanging data and information over a network
e) Why multimedia technology is becoming popular?
Ans:
Multimedia
technology is becoming popular because it shares the ideas, views and thoughts
of people in an interactive, effective and understandable way.
2.
a) Perform the following Binary calculation: (2×1=2)
i) (100100) + (11011)
– (11101)
ii) 1011101÷111
b)
Perform as indicated: (2×1=2)
i) (608)10 into Octal
ii) (765)8 into
Hexadecimal
3.
Select the correct answer: (4×0.5=2)
a) Computer virus has its infection to ----------------- .
i) Monitor ii) Mouse iii)
Keyboard iv) Hard disk
b) Defragmentation is a process of ----------------- .
i) Formatting the disk ii) Relocation of the
disk
iii) Relocation of the files of the disk iv) None
c) Cyber law of Nepal was introduced in the year -----------------
.
i) 2057 ii) 2060 iii) 2061 iv) 2062
d) Data transmission will be faster using ----------------- .
i) Co-axial ii) Fiber
Optics iii) STP iv) UTP
4.
Write the full form of the following: (4×0.5=2)
a)
DNS – Domain Name System
b)
NAV – Norton Anti Virus
c)
VHF – Very High Frequency
d)
PNG - Portable Graphics Format
5.
Match the following: (4×0.5=2)
Group A Group
B
a) Web Browser (c)
Power protection device.
b) Cyber ethics
(d) To share hardware and software resources
c) UPS (a)
Google Chrome
d) Network (---)
Bridge
(b) Moral Principles
6.
Give the appropriate technical terms of the following: (4×0.5=2)
a) The technique used to provide medical information and services
through the Internet. Telemedicine
b) The moving graphic images. Animation
c) Website used to search information on the Internet. Search Engine
d) An electronic equivalent of a signature. Digital Signature
Group ‘B’ [Database Management - 10 Marks]
7.
Answer the following question: (3×2=6)
a) Is MS-Access RDBMS? If yes, explain.
Ans: Yes, MS-Access
is a RDBMS. It
is a database management system that is based on the relation model in which
data is stored in the form of tables and the relationship among the data is
also stored in the form of tables.
b) What is data redundancy? How can we reduce data redundancy?
Ans: Data redundancy
is defined as the storing of the same data in multiple locations.
Data redundancy can be controlled
in MS-Access by the use of “Primary Key”.
c) What is query? List its types.
Ans: Query is an object of a
database which extracts and arranges information from a table.
The different types of query are:
i) Select query
ii) Action query
In action query, we have update query, append query, delete query and
make-table query.
8.
Choose the correct answer [Choose all that apply]: (4×0.5=2)
a) Which of the following is an example of database?
i) Oracle ii) Ms-Access iii) Tel. Directory iv) All
b) Primary Key doesn’t accept ----------------- value.
i) Null ii) Duplicate iii) Both iv)
None
c) Which component of Ms-Access doesn’t allow entering data?
i) Form ii) Report iii)
Table iv) Query
d) Which specifies an expression that checks for the invalid data?
i) Validation Rule
ii) Validation Text iii) Input Mask iv) Required
9.
Match the following: (4×0.5=2)
Group A Group
B
a) Data Integrity (c)
No. of character can be entered
b) Automatic (a)
Validation Rule
c) Field size (d)
Caption
d) Label for field
(iv) Indexed
(b) Default value
Group
‘C’ [Programming - 18 Marks]
10. a) Write any two differences between SUB
and FUNCTION procedures? (1)
Any
two differences between SUB and FUNCTION procedures are
SUB-procedure |
FUNCTION-procedure |
i) SUB-procedure does not return
value. |
i) FUNCTION-procedure must return a
value. |
ii) SUB-procedure’s name does not
accept data type symbol because it does not need to return a value. |
ii) FUNCTION-procedure’s name accepts
data type symbols such as $, %, !, #, &, etc. and it depends on the type
of value to be returned. E.g.: FUNCTION REV$ returns string. |
b) Give brief description of C language. (1)
C-language
is a structured programming language that divides program into many functions.
Dennis
Ritchie at Bell telephone laboratory developed C-language in 1972 AD.
C
is mostly used to write system program such as operating system, language,
compiler, text editor, language interpreters, utilities, etc.
c) Write down the function of the following statements: (2×0.5=1)
i)
NAME - The
NAME statement renames a file on a diskette.
ii)
PRINT# - It
sends one or more data items to the specified file.
11.
Write the output of the following program. (2)
DECLARE SUB result
(n$)
n$ =
"DMAAPAEFA"
CALL result(n$)
END
============================
SUB result (n$)
b = LEN(n$)
count = 2
WHILE count <= b
x$ = x$ + MID$(n$,
count, 1)
count = count + 2
WEND
PRINT x$
END SUB
Dry
Run
Variable |
Variable |
Variable |
Condition
Check |
Variable |
Output |
n$ |
b |
count |
count<=b |
x$ |
MAAF |
DMAAPAEFA |
9 |
2 |
2<=9
Yes |
M |
|
|
|
4 |
4<=9
Yes |
MA |
|
|
|
6 |
6<=9
Yes |
MAA |
|
|
|
8 |
8<=9
Yes |
MAAF |
|
|
|
10 |
10<=9
No |
|
|
|
|
|
Loop
Exits |
|
|
Output
MAAF
12.
Re-write the given program after correcting the bugs. (2)
REM
to displays records from 3nd to 7th position
OPEN
“record.txt” FOR OUTPUT AS #2
WHILE
NOT EOF(2)
INPUT
#1, R, N$, A$, DOB$
P =
P + 1
IF
P<= 3 AND C>=7 THEN
PRINT
R, N$, A$, DOB$
END
IF
LOOP
CLOSE
#2
END
Debugged
Program
REM to displays records from 3nd to 7th position
OPEN “record.txt” FOR INPUT AS #2
WHILE NOT EOF(2)
INPUT #2, R, N$, A$, DOB$
P = P + 1
IF P>= 3 AND C<=7 THEN
PRINT R, N$, A$, DOB$
END IF
WEND
CLOSE #2
END
13.
Study the following program and answer the given questions. (2×1=2)
REM
check the supplied no. is perfect square or not
DECLARE
FUNCTION check (a)
CLS
INPUT
"type any number: "; n
IF
check(n) = 0 THEN
PRINT
"Perfect Square"
ELSE
PRINT
"Not Perfect Square"
END
IF
END
=========================
FUNCTION
check (x)
s =
SQR(x)
IF s
= FIX(s) THEN
check
= 1
ELSE
check
= 0
END
IF
END
FUNCTION
a) Name the actual
and formal parameter used in above program.
Formal parameter – a, x Actual parameter - n
b) Does the program
give same output if FIX() function is replaced by INT() function?
Yes, the program will give same
output if FIX() function is replaced by INT() function
14. a)
Write a program to display the below output using SUB procedure. (3)
123456789
1234567
12345
123
1
DECLARE SUB SERIES ( )
CLS
CALL SERIES
END
SUB SERIES( )
A# = 123456789
FOR I = 1 TO 5
PRINT A#
A# = A# \ 100
NEXT I
END SUB
b) Write a program to
calculate and print volume of cylinder using FUNCTION…END Function. (3)
DECLARE FUNCTION VOLUME (R, H)
CLS
INPUT “ENTER RADIUS”; R
INPUT “ENTER HEIGHT”; H
PRINT “VOLUME OF CYLINDER ”; VOLUME(R, H)
END
FUNCTION VOLUME (R, H)
VOLUME = 3.14 * R ^ 2 * H
END FUNCTION
c) Write a program
that asks students’ name, roll and class and stores into “class.dat” only
those records who are studying in class 10. User can supply the records as per
his/her need. (3)
OPEN “class.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter name”; N$
INPUT “Enter Roll”; R
INPUT “Enter class”; C
IF C = 10 THEN WRITE #1, N$, R, C
INPUT “Do you want to add more records”;
CH$
LOOP WHILE UCASE$(CH$)=”Y”
CLOSE #1
END
No comments:
Post a Comment