SEE Grade Promotion 2078 (2022) Solved Computer Science [A]
Group ‘A’
1. Answer the following questions in one
sentence: 6x1=6
a)
What is web browser?
Ans: Web browser is a
computer program that access web pages and displays them on the user’s
computer.
b)
Mention any two services provided by internet.
Ans: Any two
services provided by internet are Search engine and E-mail.
c)
What is the default extension of MS-Access?
Ans: The default extension of Ms-Access is :
.mdb (2003 version) and .accdb (2007 version).
d)
Which object of MS-Access is used to retrieve data from the table?
Ans: Query is used to retrieve data from a table.
e)
Write any one advantage of Modular Programming.
Ans: Any one advantage of modular programming is:
The debugging of
the program becomes easier and faster.
f)
Mention any two basic data type of C language?
Ans: Any two basic data types of C language are: int
and char.
2. Write appropriate technical term for the following:
a) Network of Networks. Internet
b) Computer program that protects computer from computer
virus. Antivirus software
3. Write the full form of the following:
a) POP: Post Office Protocol
b) AI: Artificial Intelligence
Group B (24 Marks)
4.
Answer the following questions.
9x2=18
a)
What is computer network? List any two importance of it.
Ans: Computer network is a group of two
or more computers and devices connected to each other through wired or wireless
media to exchange data and information and share hardware, software and other
resources.
Any two importance of computer
network are:
1. A network connected computers
can share hardware devices such as scanner, printer, hard disk, etc.
2. Networking also provides the
facility of data and software backup system.
b)
What is computer ethics? Write down any two ethics of it.
Ans: Computer ethics is a set of moral principles or code of conducts that
regulate the use of computers systematically without making harm to other
users.
Any two computer ethics are:
· Do not use a computer to publish fake information.
· Do not search the file or record of other people.
c)
What is computer security? Write any two hardware security measures.
Ans: Computer security refers to the protection of computer systems and data
from unauthorized access, theft or misuse and damage and action to prevent such
incidents.
The name of any two hardware
security measures are:
Regular Maintenance
Power
Protection device (Volt guard, Spike guard, UPS)
d)
Give two differences between E-Commerce and Traditional Commerce.
Ans: Any two
differences between E-Commerce and Traditional Commerce are:
E-Commerce |
Traditional Commerce |
Traditional commerce is the buying
and selling of goods and services through physical stores and in-person
transactions, without using digital technology. |
Ecommerce refers
to the buying and selling of goods or services using the internet. |
Delivery of goods is instant. |
Delivery of goods takes time. |
e) Write ant two symptoms of computer virus.
Ans: Any symptoms of computer virus are:
· Program takes
long time to load.
· Increased use of
disk space and growth in file size.
f) What is DBMS? Write any two examples.
Ans: DBMS
is a computerized system that stores data, processes them and provides
information in an organized form
Any two examples of DBMS are MS-Access and Oracle.
g) What is primary key? List any two advantages of it.
Ans: A
primary key is a unique field in a database table that identifies each record
uniquely.
Any two advantages of primary key are:
1.
To
reduce and control duplication of the record in a table.
2.
To set the relationship between tables.
h) What is data sorting? List any two advantages of using
it.
Ans: The process of
arranging all the records in a table either ascending or descending order based
on field or fields is known as sorting. Sorted data is easier to handle than
unsorted data.
Any two
advantages of using it are:
1.
Sorting
helps to organize data and make it easier to find and retrieve specific
information.
2.
Sorting
can save time and improve efficiency by allowing users to quickly access the
data they need.
i)
List the field name from the following table structure.
Symbol No. |
Name |
Marks |
00100200Q |
Surya Gurung |
85 |
00100201R |
Birendra Sharma |
91 |
Ans: The
field names are Symbol No., Name and Marks.
5.
Write down the output of the given program. Show with dry run in
table. 2
DECLARE
SUB Result(C$)
C$=”COMPUTER”
CALL
Result(C$)
END
SUB
Result(C$)
FOR
C=1 TO LEN(C$) STEP 2
M$=MID$(C$,C,1)
N$=N$+M$
NEXT
C
PRINT
N$
END
SUB
Dry
run
C$ |
C=1TO
8 step 2 Yes |
M$=
MID$(C$,C,1) |
N$
=N$+M$ |
PRINT
N$ |
COMPUTER |
|
C |
C |
CMUE |
|
3
to 8 Yes |
M |
CM |
|
|
5
to 8 Yes |
U |
CMU |
|
|
7
to 8 Yes |
E |
CMUE |
|
|
9
to 8 No Loop
Exits |
|
|
The
output of the program is
CMUE
6.
Re-write the given program after correcting the bugs:
2
REM to display records from existing file.
CLS
OPEN “emp.txt” FOR APPEND AS #1
WHILE NOT EOF(#1)
WRITE #1, eN$, post$, salary
PRINT eN$, post$, salary
CLOSE#1
END
Debugged
Program
REM
to display records from existing file.
CLS
OPEN “emp.txt” FOR INPUT AS
#1
WHILE NOT EOF(1)
INPUT #1,
eN$, post$, salary
PRINT eN$, post$, salary
WEND
CLOSE #1
END
7.
Study the following program and answer the given
questions. 2x1=2
DECLARE
FUNCTION Prod(A,B)
CLS
INPUT
“Enter first number”; A
INPUT
“Enter second number”; B
PRINT
“The product of the two number=”; prod(A,B)
END
FUNCTION
Prod(A,B)
P=A*B
Prod=P
END
FUNCTION
a)
List all the numerical variables used in the program.
Ans: The numerical variables used in the program are A, B
and P
b)
List the local variable/s used in the above program.
The local variable/s used in the program are P.
8.
Convert / Calculate as per the instruction. 4x1=4
i)
(214)10 = (?)2
Soln:
2 |
214 |
Remainder |
2 |
107 |
0 |
2 |
53 |
1 |
2 |
26 |
1 |
2 |
13 |
0 |
2 |
6 |
1 |
2 |
3 |
0 |
2 |
1 |
1 |
1 |
0 |
1 |
(214)10 =
(11010110)2
i)
(ABC)16 = (?)2
Soln:
Hexadecimal
digit |
A |
B |
C |
Binary Equivalent value |
1010 |
1011 |
1100 |
(ABC)16 =
(101010111100)2
iii)
(1011) 2 × (101) 2 + (101) 2 =(?)2
|
|
1 |
0 |
1 |
1 |
|
|
x |
1 |
0 |
1 |
|
|
1 |
0 |
1 |
1 |
|
0 |
0 |
0 |
0 |
x |
1 |
0 |
1 |
1 |
x |
x |
1 |
1 |
0 |
1 |
1 |
1 |
Now,
1
1 0 1 1 1
+
1 0 1
1
1 1 1 0 0
(1011) 2 ×
(101) 2 + (101) 2 =(?)2 =(111100)2
iv) (101110) 2 ¸ (110) 2
11) |
10101 |
111 |
|
|
|
|
-11 |
|
|
100 |
|
|
- 11 |
|
|
11 |
|
|
-11 |
|
|
00 |
|
Quotient = 111
Remainder = 00
9
a) Write a program to calculate Area of circle using Function procedure and use
SUB procedure to calculate its circumference in Q-Basic. [Hint: [A=pr2], [C=2pr]
DECLARE
FUNCTION AREA (R)
DECLARE SUB
CIR(R)
CLS
INPUT “Enter
Radius”; R
PRINT “Area
of circle=”; AREA(R)
CALL CIR(R)
END
FUNCTION
AREA(R)
AREA = 22/7*R^2
END FUNCTION
SUB CIR(R)
C=2*22/7*R
PRINT
“Circumference of circle=”; C
END SUB
b)
Students Name, Class, Section and Address are stored in a data file called
“STUDENT.dat”. Write a program to print all the records of students.
OPEN
“student.dat” FOR INPUT AS #1
CLS
PRINT
“Name”, “Class”, “Section”, “Address”
WHILE NOT EOF(1)
INPUT #1,
N$, C, S$, A$
PRINT N$, C,
S$, A$
WEND
CLOSE #1
END
10.
Write a program in C language to input a number then check whether the number
is fully divisible by 5 or not.
#include<stdio.h>
#include<conio.h>
int main()
{
int n;
printf("Enter
any number: ");
scanf("%d",
&n);
if(n%5= =0)
printf("%d
is fully divisible by 5",n);
else
printf("%d
is not fully divisible by 5",n);
return 0;
}
OR
Write
a program in C language to display the series 2, 4, 6, 8 up to 10th terms.
#include<stdio.h>
#include<conio.h>
int main()
{
int i, a;
i=1;
a=2;
while(i<=10)
{
printf("%d \n", a);
a=a+2;
i++;
}
return 0;
}
***
No comments:
Post a Comment