SOLVED NPABSON SEE PRE BOARD EXAM - 2078
Subject: Computer F.M. :
50
1. Answer the following
questions in very short: 1×10=10
i. What is computer
network?
A
computer network means two or more computers connected with each other to share
data, hardware, software and other resources
ii. What is e-mail?
E-mail
(Electronic mail) is one of the most popular services provided by the internet
which exchanges messages between the computers through a network.
iii. What is full form
of ISDN?
The
full form of ISDN is Integrated Services Digital Network
iv. What is the full
form of WAN?
The
full form of WAN is Wide Area Network
v. Write the technical
term: The arrangement of connection patterns of computers or nodes and others
resources. Network Topology
vi. Write the technical
term: Commerce done by mobile. M-Commerce
vii. What is primary
key?
A
key that uniquely identifies each record in a database is primary key.
viii. What is DBMS?
Database management system (DBMS) is
a computerized system that stores data process them and provide information in
an organized form.
ix. What is modular
programming?
Modular
programming is a technique which divides a program into many small, manageable,
logical and functional modules or blocks.
x. Write down two data
type of C language.
The
two data types used in C language are char and int
3. Answer the following
questions in short: 2×9=18
i. What is transmission
medium? Write down with examples.
Transmission medium is a pathway that can transmit
information from a sender to a receiver through wired or wireless medium on a
network. Examples are: twisted pair cable, co-axial cable, radio
wave, microwave etc
ii. What is Internet?
Write down its services.
Internet
is an interconnection of several thousands of computers of different types
belonging to the various networks all over the world in order to share data and
information. The services of internet are: WWW (World Wide Web), E-mail
(Electronic mail), FTP (File Transfer Protocol), IRC (internet Relay Chat) etc.
iii. What is computer security? Give some
examples.
The
protection of computer systems and information from harm, theft, and
unauthorized use is called computer security. Examples are: Password,
Biometric, Firewall, Cryptography etc.
iv. What is cyber law? Give some examples.
Cyber law refers to the laws regarding the internet and
cyberspace which includes a wide variety of legal issues related to the use of
communication technology. Examples of cyber law are Electronic and Digital
Signature Law, Cyber Crime Law, Intellectual property Law, Data Protection and
Privacy Law etc.
v. What is computer
virus? Give some examples.
Computer
virus is a type of computer program which is written by the programmer with the
intent of destroying or damaging the data and programs residing in the computer
system. E.g. C-Brain, Frodo, Disk Killer, I Love You etc
vi. What is data type?
What happens while we enter text in number data type?
Data type is an attribute for a field
that determines what type of data it can contain. If
we enter text in a numeric field then it displays the errors.
vii. What is sort?
Sorting
is the process of arranging the record in ascending or descending order
according to a given field or fields.
viii. What is table? Is
table a database?
Table is an object of Ms-Access that
stores large volume of data in the form of rows and columns. No, Table is not a
database.
ix. What is report?
Report is an object of Ms-Access
which displays the output in an effective way to present the data in a printed
format.
x. Debug the following program.
DECLARE FUNCTION PAL$
(W$)
CLS
INPUT "Enter a
word"; W$
SHOW PAL$ (W$)
END
FUNCTION PAL$ (W$)
FOR I= LEN (W$) TO 1
STEP1
R$=R$+MID$ (W$, I, 1)
NECT I
IF R$-W$ THEM
P$="Palindrome"
ELSE
P$="Not
palindrome"
ENDIF
P$=PAL$
END FUNCTION
Debugged
Program
DECLARE FUNCTION PAL$
(W$)
CLS
INPUT "Enter a
word"; W$
PRINT
PAL$ (W$)
END
FUNCTION PAL$ (W$)
FOR I= LEN (W$) TO 1 STEP-1
R$=R$+MID$ (W$, I, 1)
NEXT
I
IF R$=W$ THEM
P$="Palindrome"
ELSE
P$="Not
palindrome"
ENDIF
PAL$
=P$
END FUNCTION
xi. What will be output?
DECLARE FUNCTION FACT
(N)
CLS
N=5
PRINT FACT (N)
END
FUNCTION FACT (N)
F=1
FOR I=1 TO N
F=F*I
NEXT I
FACT=F
END FUNCTION
Dry Run
Var. |
Var. |
Var. |
|
Output |
N |
F |
I |
FOR
I=1 to 5Yes |
|
5 |
1 |
1 |
|
|
|
1 |
2 |
2
to 5 Yes |
|
|
2 |
3 |
3
to 5 Yes |
|
|
6 |
4 |
4
to 5 Yes |
|
|
24 |
5 |
5
to 5 Yes |
|
|
120 |
6 |
6
to 5 No LoopExits |
120 |
Output
120
xii. Study the following program
and answer the given questions:
DECLARE SUB PC$ (N)
CLS
INPUT "Enter a number"; N
CALL PC$ (N)
END
SUB PC$ (N)
FOR I=2 TO N-1
R=N MOD I
IF C=0 THEN
PRINT "Prime
number"
ELSE
PRINT "Composite
number"
ENDIF
END SUB
a.
What
is the name of sub procedure?
The name of the sub procedure is
PC$( )
b.
List
the local variable.
The
local variable are N, I, R, C
1. Write a program in QBASIC to ask
a number and display sum of digits by using FUNCTION..END FUNCTION. [4]
DECLARE
FUNCTION SUM (N)
CLS
INPUT
"ENTER ANY NUMBER"; N
PRINT
"SUM OF DIGITS="; SUM(N)
END
FUNCTION SUM
(N)
S = 0
WHILE N
< > 0
R = N MOD
10
S = S + R
N = N \ 10
WEND
SUM = S
END FUNCTION
2. Write a program in QBASIC to
create a file "EMP.DAT" and store employees Name, Address, Salary and
Telephone number on the basis of user choice. [4]
OPEN “EMP.DAT” FOR OUPUT AS #1
DO
CLS
INPUT “ENTER NAME”; N$
INPUT “ENTER ADDRESS”; A$
INPUT “ENTER SALARY”; S
INPUT “ENTER TELEPHONE NUMBER”; T
WRITE #1, N$, A$, S, T
INPUT “DO YOU WANT TO CONTINUE”; CH$
LOOP WHILE UCASE$(CH$) = “Y”
CLOSE #1
END
3. Write a program in C language to
ask length, breadth and height and display volume of box. [4]
#include<stdio.h>
#include<conio.h>
int main()
{
int l,b,h,v;
printf("Enter length: ");
scanf("%d", &l);
printf("Enter breadth: ");
scanf("%d", &b);
printf("Enter height: ");
scanf("%d", &h);
v=l*b*h;
printf("Volume of box= %d",
v);
return 0;
}
2. Solve the problem as indicated:
1×4=4
i. (209)10
into Octal number
ii. (A0F)16
into Binary number.
i. (1011011)2
× (110)2
ii. (1110001)2
÷ (101)2