Monday, May 3, 2021

PABSON SEE PRE BOARD EXAM 2077 SEE COMPUTER SCIENCE

 

PABSON SEE PRE BOARD EXAM 2077 SEE COMPUTER SCIENCE

1. Answer the following questions:   5x2=110

a) What is network protocol? List some network protocols.

Ans: Network protocol is a set of rules by which computers on the network communicate with each other.  Some network protocols are TCP/IP, SMTP, HTTP, POP etc.

 

b) State any two advantages and disadvantages of internet.

Ans: Any two advantages of internet are

·       Internet has an endless knowledge supply which anyone can access that too free of cost.

·       It makes easy to transfer the file or information.

Any two disadvantages of internet are

·       Pornography that can get in the hands of young children too easily.

·       Addiction to online games affects health leading to obesity and serious health issues.

 

c) What is the main aim to formulating cyber law in Nepal?

Ans: The main aim to formulating cyber law in Nepal are:

i) To legalize the transaction through electronic media to control various types of electronic frauds

ii) To punish a person who does criminal activities through electronic means especially on computers.

 

d) What is data backup? Why is data backup necessary to our business?

Ans : Backup is a copy of a file which is used in the event of the original file being corrupted. Backup is essential to business to recover the important data and programs which are lost or damaged or corrupted from accidental and intentional harm.

 

e) Write any two precautions against computer virus?

Ans: Any two precautions against computer virus are:

·       Scan the mail or unknown files of internet before opening in your computers.

·       Use a good antivirus program to scan floppy disk, CD, etc. before copying.

 

2a) Perform the following binary calculations:         2x1=2

            i) (1111+1101) - (1001)                     ii) (1101x11)  ¸  (101)

b) Convert the following as indicated:          2x1=2

            i) (235)8 into decimal            ii) (BA5) into binary


 





 

3. Match the following:          4x0.5=2

a) Malicious Software                                    - CD-ROM

b) Primary storage device                  - virus

c) Power Protection device                - copy right

d) Intellectual property law                - RAM

                                                            - UPS

 

Answers:

a) Malicious Software                                    - virus

b) Primary storage device                  - RAM

c) Power Protection device                - UPS

d) Intellectual property law                - copy right

 

4. Replace the following definitions with a technical term. 2

            a) Data carrying capacity of communication channel. Bandwidth

b) A string of characters used to verify the identity of user during the authentication process. Digital Signature

c) The process of transferring a copy of a file from a remote computer to the requesting computer. Downloading

d) An integration of text, audio, graphics and video. Multimedia

 

5. Write the full forms:          4x0.5=2

            a) CVT - Constant Voltage Transformer

            b) STP - Shielded Twisted Pair

            c) JPEG - Joint Photographic Experts Group

            d) DARPA - Defense Advanced Research Projects Agency

 

6. Choose the correct answer.            4x0.5=2

a) ……. is a standard for high-speed broadband internet access that uses towers and can cover an area of fifty kilometers.

            i) Wi-Fi             ii) WiMax            iii) 3G and 4G           iv) None of  above                                    b) Some of the methods of hardware protection are……

i) Fire alarms  ii) Security Lighting   iii) CCTV       iv) All of the above

c) Which of the following communication modes supports two-way traffic but in only one direction at a time.

i) Simplex       ii) Half-Duplex                       iii) Full duplex           iv) None of the above

d) Which of the audio formats were developed by Microsoft Corporation?

i) AIFF                        ii) MIDI                      iii) RealAudio             iv) WAV

 

7. Answer the following questions.   2x3=6

a) What happens when you enter text in a numeric field? List any two DBMS software.

Ans: When we enter text in numeric field, it displays the error message as “The value you entered does not match the Number data type in the column”. Any two DBMS software are: MS Access and SQL.

 

b) What do you understand by default value?

Ans:  The  default value property is used to define a default value that is automatically entered in field when you add a new record, at the time of data entry.

 

c) Write down any two advantages of query.

Ans: Any two advantages of query are:

·       To view records including some fields or all the fields of a table or multiple linked tables.

·       To perform mathematical calculation of a data.

 

 

 

8. Select the best alternatives for the following.       4x0.5=2

            a) ….. is suitable data type for gender field.

                        i) Yes/No        ii) Number      iii) OLE                      iv) Currency

            b) Field size, Format, Input Mask, Caption are………..

                        i) Key elements                      ii) Field Properties    iii) Navigating modes iv) Data types

            c) Column in a database table is called………..

                        i) Record         ii) Report        iii) Field                      iv) Memo

d) Which is not a type of query?

            i) Search         ii) Select         iii) Update      iv) All of the above

 

9. Match the following pairs: 4x05=2

            a) Database                 - Enhance fast searching

            b) Sort                         - Field type

            c) Yes/No                    - Data collected from field visit

            d) Long Integer           - Default value for number

                                                - Organized collection of related data

Answers

a) Database                 - Organized collection of related data

            b) Sort                         - Enhance fast searching

            c) Yes/No                    - Field type

            d) Long Integer           - Default value for number

                                                -

10. Answer the following questions: 1x3=3

            a) What are the benefits of using modular programming?

            Ans: The benefits of using modular programming are:

i) It is easy to design code and test the program modules independently.
ii) It is possible to use a single module in different places which reduces program codes.

 

            b) What are the different types of operators used in C language?

Ans: The different types of operators used in C language are

·       Arithmetic operators

·       Assignment operators

·       Unary operators

·       Relational operators

·       Logical operators

·       Conditional operators

 

            c) Write down the function of NAME AS and LINE INPUT#.

LINE INPUT #: It reads the entire line or maximum 255 characters form the sequential file.

NAME AS statement : The NAME AS statement renames a file on a diskette.

 

 

 

 

 

 

 

 

11. Write the output of the following program.        2

DECLARE SUB Result (A)

A=2

CALL Result (A)
END
SUB Result (A)

WHILE A<=10

IF A MOD 4 = 0 THEN S=S+A

A=A+1

WEND

PRINT S

END SUB

 

 

Dry Run

 

Variable

Condition Check

Statement Check

Variable

Output

A

A<=10

A MOD 4=0

S

 

2

2<=10 Yes

2 MOD 4=0 No

 

 

3

3<=10 Yes

3 MOD 4=0 No

 

 

4

4<=10 Yes

4 Mod 4=0 Yes

0+4=4

 

5

5<=10 Yes

5 MOD 4=0 No

 

 

6

6<=10 Yes

6 MOD 4=0 No

 

 

7

7<=10 Yes

7 MOD 4=0 No

 

 

8

8 <=10 Yes

8 MOD 4=0 Yes

4+8=12

 

9

9<=10 Yes

9 MOD 4=0 No

 

 

10

10<=10 Yes

10 MOD 4=0 No

 

 

11

11<=10 No [Loop Exits]

 

 

12

 

Output

12

 

 

12. Rewrite the following program correcting bugs. 2

REM to count total no. of passed student

CLS

WHILE NOT EOF ( )

OPEN “I”, #1, RESULT.DAT

INPUT #1, ID, M1, M2, M3

IF M1>=32, M2>=32, M3>=32 THEN

X=X+1

END IF

WEND

PRINT “TOTAL RECORD”; X

END

 

 

 

 

Debugged Program

REM to count total no. of passed student

OPEN "I", #1, "RESULT.DAT"

CLS

WHILE NOT EOF(1)

    INPUT #1, ID, M1, M2, M3

    IF M1 >= 32 AND M2 >= 32 AND M3 >= 32 THEN

        X = X + 1

    END IF

WEND

PRINT "TOTAL RECORD OF PASSED STUDENT"; X

END

 

13. Read the following program and answer the questions:  2

DECLARE FUNCTION COUNT(N$)

CLS

INPUT “Enter any word”; R$

C=COUNT(R$)

PRINT C

END

FUNCTION COUNT(N$)

FOR K=1 TO LEN(N$)

X$=MID$(N$,K,1)

IF UCASE$(X$)=”A” THEN

X=X+1

END IF

NEXT K

COUNT=X

END FUNCTION

Questions:

a. List any two library functions used in the above program?

Ans: Any two library functions used in the above program are MID$( ) and MID$( )

 

b. Write the uses of variable “C” in line 4. [i.e. C=COUNT(R$)

Ans: the uses of variable “C” in line 4. [i.e. C=COUNT(R$)] is to call the function COUNT( ) and store the value returned by the function COUNT( ).

 

14 a. WAP to allow user to enter time in hour and convert to display in second using SUB…..END SUB.`3

 

DECLARE SUB CONVERT (H)

CLS

INPUT “Enter time in hour”; H

CALL CONVERT(H)

END

SUB CONVERT(H)

S=H*60*60

PRINT “Time in Seconds=”;S

END SUB

b. WAP to print new word of vowels only from a given word using FUNCTION…END FUNCTION.  3

 

DECLARE FUNCTION VOW$(A$)

CLS
INPUT “Enter any word”; A$

PRINT “Only Vowel letters are”; VOW(A$)

END

 

FUNCTION VOW$(A$)

FOR I = 1 TO LEN(A$)

B$=MID$(A$,I,1)

C$=UCASE$(B$)

IF C$=”A” OR C$=”E” OR C$=”I” OR C$=”O” OR C$=”U” THEN D$=D$+B$

NEXT I

VOW$=D$

END FUNCTION

 

c. Write a program to ask student’s name, class and marks secured in three subjects. Store the data in a sequential data file “Result.Dat” along with the total marks. Make a provision to ask the user to enter another record.

 

OPEN “Result.Dat” FOR INPUT AS #1

DO

CLS

INPUT “Enter Name”; N$

INPUT “Enter Class”; C

INPUT “Enter marks in three subjects”; X,Y,Z

T=X+Y+Z

WRITE #1, N$, C, X, Y, Z, T

INPUT “Do you want to enter more records(Y/N)”; CH$

LOOP WHILE UCASE$(CH$)=”Y”

CLOSE #1

END

 

 

2 comments:

  1. Thunder Titanium Lighting: A New Source for - TinNation
    This unique way of light comes titanium max courtesy microtouch titanium trim of TINN, the titanium tv alternative world's most successful independent solar system fram titanium oil filter supplier. black titanium rings

    ReplyDelete