SEE Grade Promotion 2078
(2022) Solved Computer Science
Group ‘A’
1. Answer the following questions in one
sentence: 6×1=6
a) What is web browser?
Ans: Web browser is an application program used to access and view websites.
b) Mention any two services provided by
internet.
Ans: Any two services provided by internet are
Video conference and E-mail.
c) What is the default extension of MS-Access?
Ans: The default extension of Ms-Access is .mdb
(2003 version) and .accdb(2007 version).
d) Which object of MS-Access is used to retrieve
data from the table?
Ans: Query is used to retrieve data from a table.
e) Write any one advantage of Modular
Programming.
Ans: Any one advantage of modular programming is:
it is easy to
design, code and test the program modules independently.
f) Mention any two basic data type of C
language?
Ans: Any two basic data types of C language are:
int and
char.
2. Write appropriate technical term for the
following. 2×1=2
a) Network of Networks. Internet
b) Computer program that protects computer from
computer virus. Antivirus sofftware
3. Write the full form of the
following. 2×1=2
a) POP: Post Office Protocol
b) AI: Artificial Intelligence
Group B (24 Marks)
4. Answer the following
questions. 9x2=18
a) What is computer network? List any two
importance of it.
Ans: A computer network means two or more
computers connected with each other to share data, hardware, software and other
resources.
Any two importances of computer network are:
· Computer
in a network can access the network-connected hardware devices like printers,
disk drives, etc.
· Computers
in a network system share different software packages.
b) What is computer ethics? Write down any two
ethics of it.
Ans: Computer ethics refers to follow the
rules and regulation of computer technology and not to harm other computer
users knowingly or unknowingly.
Any two computer ethics are:
Not
to search the files or records of other people.
Not
to destroy, steal and use others computer passwords.
c) What is computer security? Write any two hardware
security measures.
Ans: The security
given to the computer for the protection of hardware, software and data from
being lost or damaged due to accidental or intentional harm is known as
computer security.
The name of any two hardware security measures
are:
Insurance Policy
Use power protection
device to protect computer from power fluctuation.
d) Give two differences between E-Commerce and
Traditional Commerce.
Ans: Any two differences between E-Commerce and Traditional Commerce are:
E-Commerce |
Traditional Commerce |
E-commerce refers to
the commercial transactions or exchange of information, buying or selling
product/services electronically with the help of internet. |
Traditional commerce
refers to the commercial transactions or exchange of information, buying or
selling product/services from person to person without use of internet. |
In e-commerce delivery
of goods takes time. |
In traditional commerce
delivery of goods is instant. |
e) Write ant two symptoms of computer virus.
Ans: Any symptoms
of computer virus are:
·
Program takes long time to load.
·
Increased use of disk space and growth in file
size.
f) What is DBMS? Write any two examples.
Ans: DBMS is a software which helps to extract,
view and manipulate data in an organized way.
Any two examples of DBMS are MS-Access and
Oracle.
g) What is primary key? List any two advantages
of it.
Ans: A key that uniquely identifies each record
in a database is called primary key.
Any two advantages of primary key are:
· It
reduces and controls duplication of record in a table.
· It
sets the relationship between tables.
h) What is data sorting? List any two advantages
of using it.
Ans: Sorting is the process of arranging the
record in ascending or descending order.
Any two
advantages of using it are:
i) It helps to
find specific information quickly.
ii) It helps to arrange data in alphabetical order.
i) List the field name from the following table
structure.
Symbol No. |
Name |
Marks |
00100200Q |
Surya Gurung |
85 |
00100201R |
Birendra Sharma |
91 |
Ans: The field names are Symbol No., Name
and Marks.
5. Write down the output of the given program.
Show with dry run in table. 2
DECLARE SUB Result(C$)
C$=”COMPUTER”
CALL Result(C$)
END
SUB Result(C$)
FOR C=1 TO LEN(C$) STEP 2
M$=MID$(C$,C,1)
N$=N$+M$
NEXT C
PRINT N$
END SUB
Dry run
Variable |
Variable |
Loop Check |
Variable |
Variable |
Output |
C$ |
C |
1TO 8 step 2 Yes |
M$ |
N$ |
|
COMPUTER |
1 |
|
C |
C |
|
|
3 |
3 to 8 Yes |
M |
CM |
|
|
5 |
5 to 8 Yes |
U |
CMU |
|
|
7 |
7 to 8 Yes |
E |
CMUE |
|
|
9 |
9 to 8 No Loop Exits |
|
|
CMUE |
|
|
|
|
|
|
Output
CMUE
6. Re-write the given program after correcting
the bugs: 2
REM
to display records from existing file.
CLS
OPEN “emp.txt” FOR APPEND AS #1
WHILE
NOT EOF(#1)
WRITE
#1, eN$, post$, salary
PRINT
eN$, post$, salary
CLOSE#1
END
Debugged Program
REM to display records from existing file.
CLS
OPEN “emp.txt” FOR INPUT AS #1
WHILE
NOT EOF(1)
INPUT #1, eN$, post$, salary
PRINT
eN$, post$, salary
WEND
CLOSE
#1
END
7. Study the following program and answer the
given questions. 2x1=2
DECLARE FUNCTION Prod(A,B)
CLS
INPUT “Enter first number”; A
INPUT “Enter second number”; B
PRINT “The product of the two number=”;
prod(A,B)
END
FUNCTION Prod(A,B)
P=A*B
Prod=P
END FUNCTION
a) List all the numerical variables used in the
program.
Ans: The numerical
variables used in the program are A, B and P
b) List the local variable/s used in the above
program.
The local variable/s used in the program are A, B and P.
8. Convert / Calculate as per the instruction.
4x1=4
i) (214)10 = (?)2
Soln:
2 |
214 |
Remainder |
2 |
107 |
0 |
2 |
53 |
1 |
2 |
26 |
1 |
2 |
13 |
0 |
2 |
6 |
1 |
2 |
3 |
0 |
2 |
1 |
1 |
1 |
0 |
1 |
\ (214)10 =
(11010110)2
i) (ABC)16 = (?)2
Soln:
Hexadecimal digit |
A |
B |
C |
Binary
Equivalent value |
1010 |
1011 |
1100 |
(ABC)16 = (101010111100)2
iii) (1011) 2 × (101) 2
+ (101) 2 =(?)2
|
|
1 |
0 |
1 |
1 |
|
|
x |
1 |
0 |
1 |
|
|
1 |
0 |
1 |
1 |
|
0 |
0 |
0 |
0 |
x |
1 |
0 |
1 |
1 |
x |
x |
1 |
1 |
0 |
1 |
1 |
1 |
Now,
1 1 0 1 1 1
+ 1
0 1
1 1 1 1 0 0
(1011) 2 × (101) 2
+ (101) 2 =(?)2 =(111100)2
iv) (101110) 2 ¸ (110) 2
11) |
10101 |
111 |
|
-11 |
|
|
100 |
|
|
- 11 |
|
|
11 |
|
|
-11 |
|
|
00 |
|
|
|
|
|
|
|
Quotient
= 111
Remainder = 00
9 a) Write a program to calculate Area of circle
using Function procedure and use SUB procedure to calculate its circumference
in Q-Basic.
[Hint: [A=pr2], [C=2pr]
DECLARE FUNCTION AREA (R)
DECLARE SUB CIR(R)
CLS
INPUT “Enter Radius”; R
PRINT “Area of circle=”; AREA(R)
CALL CIR(R)
END
FUNCTION AREA(R)
AREA = 22/7*R^2
END FUNCTION
SUB CIR(L,B)
C=2*22/7*R
PRINT “Circumference of circle=”; C
END SUB
b) Students Name, Class, Section and Address are
stored in a data file called “STUDENT.dat”. Write a program to print all the
records of students.
OPEN “student.dat” FOR INPUT AS #1
CLS
PRINT “Name”, “Class”, “Section”, “Address”
WHILE NOT EOF(1)
INPUT #1, N$, C, S$, A$
PRINT N$, C, S$, A$
WEND
CLOSE #1
END
10. Write a program in C language to input
a number then check whether the number is fully divisible by 5 or not.
#include<stdio.h>
#include<conio.h>
int main()
{
int n;
printf("Enter any number: ");
scanf("%d", &n);
if(n%5= =0)
printf("%d is fully divisible by 5",n);
else
printf("%d is not fully divisible by 5",n);
return 0;
}
OR
Write a program in C language to display the
series 2, 4, 6, 8 up to 10th terms.
#include<stdio.h>
#include<conio.h>
int main()
{
int i, a;
i=1;
a=2;
while(i<=10)
{
printf("%d \n", a);
a=a+2;
i++;
}
return 0;
}
No comments:
Post a Comment