Wednesday, December 27, 2023

SOLVED National PABSON Kathmandu SEE PRE-QUALIFYING EXAMINATION-2080





 SOLVED National PABSON Kathmandu SEE PRE-QUALIFYING EXAMINATION-2080


Sub-Computer Science

 

Group A (10 Marks)

 

1. Answer the following questions in One sentence:

 

a)     What is web server?

Ans: A web server is a computer that serves requested HTML web pages, files or data to users or client computers over the internet or local network.

 

b)    List out any two applications of internet.

Ans: Any two applications of internet are E-mail and E-Commerce

 

c)     What is the extension of MS-Access 2007?

Ans: The extension of MS-Access 2007 is .accdb.

 

d)    What is report in MS-Access?

Ans: Report is an object of Ms-Access which is used to present information in an effective and organized format that is ready for printing.

 

e)     What is Modular programming?

Ans: Modular programming is a technique used to divide program into many small, manageable, logical and functional modules or blocks.

 

f)      Write down any two data type used in C-programming?

Ans: Any two data type used in C-programming are int and char.

 

2. Write appropriate technical term for the following                                         2×1=2

 

a Private networks that allow organizations to share information and resources among the internal users.

Intranet

 

b. The process of arranging the fragmented file in computer. Defragmentation

 

3. Write the full form of the following                                                        2×1=2

 

a FTP – File Transfer Protocol

 

b. IoT – Internet of Things

 

Group B (24 Marks)

 

4. Answer the following questions: 9×2-18

 

a. What is network topology? Write down the advantages of BUS topology

Ans: Network topology is the cabling structure of interconnected computers in LAN.

Advantages of bus topology are:

It is cost effective and cable required is least compared to other network topology.

It is easy to expand network.

 

 

 

b. What is cyber-crime? Explain with example.

Ans: Cybercrime refers to criminal activities or illegal actions that are conducted or facilitated through the use of digital technology or the internet.

Eg. Hacking. Computer hacking means stealing and destroying other data, information, files and program.

 

c. How password policy protects computer software and data? Explain

Ans: Password secures the data by protecting the data from unauthorized access. By implementing and enforcing a robust password policy, organizations and software systems can significantly reduce the risk of unauthorized access, data breaches, and cyberattacks. It's an essential element in safeguarding sensitive information and maintaining the security and integrity of computer software and data.

 

d. Write down the advantages and disadvantages of e- commerce.

Ans: The advantages and disadvantages of e- commerce are:

Advantages of E-commerce

It makes buying/selling possible 24/7.

There are no geographical boundaries for e-business. Anyone can order anything from anywhere at any time.

Disadvantages of E-commerce

Lack of personal touch. We cannot touch the goods physically.

Technical failure may affect the business system.

 

e Define e-governance. List out the advantages of e- governance.

Ans: E-Governance refers to the use of the digital technology by government to enhance the delivery of public services and engage with citizens more effectively.

The advantages of e- governance are:

Citizens can access government services and information conveniently from anywhere. 

It reduces paperwork and manual tasks, which can lead to faster decision-making and service delivery. 

 

f. What is DBMS? Give Example

Ans: DBMS is a software that manages databases, allowing users to store, access, and manipulate data in an organized and secure way.

E.g., MS-Access, Oracle, Fox pro, dBase etc.

 

g. What is data sorting? Last any two advantages of using it

Ans: Sorting refers to the process of organizing data in a specific order (ascending or descending) based on one or more fields in a table, query, or report. 

The advantages of sorting are:

Sorting helps to organize data and make it easier to find and retrieve specific information.

Sorting can save time and improve efficiency by allowing users to quickly access the data they need.

 

h. What is form? Explain.

Ans: Form is a database object that provides a graphical interface for users to view, enter, and edit data from one or more tables, queries, or other data sources. Forms provide an easy-to-use interface for data entry and manipulation, improving data accuracy and completeness. Forms can be linked to other objects, such as tables or queries, to simplify data management

 

i.  List out the data type used for the following data in MS Access

Student' Name, Students' Roll Number, Address, Fee paid

Ans; The data type used for the following data in MS Access are:

Studnent Name  Text

Student’s Roll Number – Autonumber

Address – Memo,                               Fee Paid - Currency

5. Write down the output of the following along with dry run table. 2

 

DECLARE SUB SENDUP(S$)

E$= “NPABSON"

CALL SENDUP(E$)

END

 

SUB SENDUP(S$)

FOR i = 1 to LEN(S$) STEP 1

IF i MOD 2<>0 THEN

EE$=EE$+LCASE$(MIDS(S$,I,1))

ELSE

EE$=EE$+UCASE$(MIDS(S$,I,1))

END IF

NEXT i

PRINT EE$

END SUB

 

Dry Run

E$

S$

i=1 to LEN(S$)

i MOD 2 <>0

E$

NPABSON

NPABSON

1 to 7

1 MOD 2 <>0

1<>0 Yes

n

 

 

2 to 7

2 MOD 2 <>0

0<>0 No

n+P=nP

 

 

3 to 7

3 MOD 2 <>0

1<>0 Yes

nP+a

nPa

 

 

4 to 7

4 MOD 2 <>0

0<>0 No

nPa+B

nPaB

 

 

5 to 7

5 MOD 2 <>0

1<>0 Yes

nPaB+s

nPaBs

 

 

6 to 7

6 MOD 2 <>0

0<>0 No

nPaBs+O

nPaBsO

 

 

7 to 7

7 MOD 2 <>0

1<>0 Yes

nPaBsO+n

nPaBsOn

 

 

8 to 7 loop exits

 

 

 

The output of the program is :

nPaBsOn

 


6. Re-Write the given program after correcting the bug: 2

 

REM display records of students from Data file

OPEN "Stdinfo.dat" FOR OUTPUT AS #1

PRINT "ROLL",  NAME", "ADDRESS", "CLASS" , "SECTION"

DO WHILE NOT EOF

INPUT #1, RN. N$, AD$, CL, S$

PRINT RN, NS, ADS, CL, S$

NEXT

STOP #1

END

 

Debugged Program

REM display records of students from Data file

OPEN "Stdinfo.dat" FOR INPUT AS #1

PRINT "ROLL",  NAME", "ADDRESS", "CLASS" , "SECTION"

DO WHILE NOT EOF (1)

INPUT #1, RN. N$, AD$, CL, S$

PRINT RN, NS, ADS, CL, S$

WEND

CLOSE #1

END

 


7. Study the following program and answer the given questions:

 

DECLARE SUB TEST (B$)

CLS

INPUT W$

CALL TEST(W$)

END

 

SUB TEST (B$)

FOR I=1 To LEN (B$)

PRINT RIGHT$(B$, i)

NEXT I

END SUB

 

a. Write the names of two built in functions used in the above program

Ans: the names of two built in functions used in the above program are LEN ( ) and RIGHT$ ( )

 

b. List the real parameters of the above program

Ans: The real parameters of the above program is W$

 

GROUP C (16 Marks)

 

8. Convert/Calculate as per the instruction: 4x14

 

1) (315)→(7)2

ii) (A4B)16 – ( ? )8

(1011) × (101) + (1001)

(10111) ¸ (101)

 

9. Answer the following

 

a. WAP to calculate area of rectangle using SUB...END SUB and arca of circle using FUNCTION...END Function.

 

DECLARE SUB AREA (L, B)

DECLARE FUNCTION ARE (R)

CLS

INPUT “ENTER LENGTH”; L

INPUT “ENTER BREADTH”; B

INPUT “ENTER RADIUS”; R

CALL AREA (L, B)

PRINT “AREA OF CIRCLE ”; ARE(R)

END

 

SUB AREA (L, B)

A = L * B

PRINT “AREA OF RECTANGLE=”; A

END SUB

 

FUNCTION ARE (L, B)

ARE = 3.14 * R ^ 2

END FUNCTION

 

b. Write a program to create a file "info.dat" and Store the name address and mobile number of 5 peoples

 

OPEN "info.dat" FOR OUTPUT AS #1

FOR I = 1 TO 5

INPUT "Enter Name"; N$

INPUT "Enter Address"; A$

INPUT “Enter mobile number”; M#

WRITE #1, r, N$, A$, M#

NEXT I

CLOSE #1

END

 

10. Write a program in C language to input a number and test whether it is odd or even. 4

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n % 2= = 0)

printf("%d is even number", n);

else

printf("%d is odd number", n);

return 0;

}

 

 

Tuesday, December 26, 2023

Solved Bhaktapur SEE MODEL SET-1 2080 Subject: Opt. II Computer Science

 




Bhaktapur SEE MODEL SET-1

 

Subject: Opt. II Computer Science 

Time: 1:30 hrs.                                                                              Full Marks: 50

 

 

Candidates are required to give answers according to the instructions given.

Group ‘A’

1. Answer the following questions in one sentence:                             [6x1=6]   

 

a)     Define bandwidth.

Ans: The amount of data that can be carried from one point to another in a given time period is called bandwidth.

 

b)    What is cyber-crime?

Ans: Cybercrime refers to criminal activities or illegal actions that are conducted or facilitated through the use of digital technology or the internet.

 

c)     Define AI.

Ans: Artificial intelligence refers to the simulation of human intelligence in machines that are programmed to think and act like humans.

 

d)    What is the storage size of text and currency data type?

Ans: The storage size of text data type is 255 and currency data type is 8 bytes.

 

e)     Define modular programming.

Ans: Modular programming is a technique used to divide program into many small, manageable, logical and functional modules or blocks.

 

f)      Write any two features of C language.

Any two features of C language are:

It is a high level language with some features of low level language.

It is mostly used to prepare system software.

 

2. Write appropriate technical terms for the following:          [2x1=2]

a)     Physical layout of computers in a network. Network Topology

b)     A secret group of characters used to protect information systems from unauthorized users. Password

 

3. Write the full form of the following:                                                 [2x1=2]

a. STP   - Shielded Twisted Pair

b. NIC – Network Interface Card

 

Group ‘B’

4. Answer the following questions:                                               [9x2=18]

a)     Differentiate between client server architecture and peer to peer architecture.

Ans: The difference between client server architecture and peer to peer architecture are:

Client/ server network

Peer-to-Peer network

Client/ server network is a type of network model where at least one computer is designed as a server and other computers on the network called clients or workstations.

Peer-to-Peer network is a type of network model where all the computers have equal responsibilities on the network

It provides central security administration and the network administrator is responsible for data security and other resources management of the network.

It lacks centralized network administration, where the network administrator needs to manage security on each computer. It provides no reliable security and might put data in higher risks

 

 

b)    Write any four commandments of computer ethics.

Ans; Any four commandments of computer ethics are :

·       Do not use a computer to harm other people.

·       Do not use a computer to publish fake information.

·       Do not search the file or record of other people.

·        Do not destroy or delete the records of other people

 

c)     Define hardware security. Give any two measures of software security.

Ans: Hardware security is the protection given to the various hardware tools and equipment used in computer system from the accidental or intentional harm.

Any two measures of software security are:

Password and Backup

 

d)    What is VR? Mention its application areas.

Ans: Virtual reality is an artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment.

Any two areas where it is used are:

Gaming-  VR Gaming allows players to immerse (dip) themselves in virtual world and interact with

environment and characters

Education - VR can help students learn by making the content more engaging and memorable.

 

e)     What is mobile computing? Write any four importance of it.

Ans: Mobile computing refers to the use of portable computing devices, such as smartphones, tablets, laptops, and wearables, that allow users to access and transmit data, information, and applications without being tied to a fixed physical location.

Any four importance of it are:

It allows people to work and communicate from anywhere at any time.  

It keeps connected to the Internet, allowing to access information all the times.  

It increases the productivity of users reducing time and cost.  

It is one of the major handheld sources of entertainment for users at present.

 

f)      Define DBMS with examples.

Ans: Ans: DBMS is a software that manages databases, allowing users to store, access, and manipulate data in an organized and secure way.

Examples of DBMS software are : MS-Access, Oracle, Fox pro, dBase etc.

 

g)     Define data redundancy. How can it be reduced?

Ans: Data redundancy refers to the repetition or duplication of data within a database.

It can be reduced by normalizing the database, eliminating duplicate data and storing it in separate tables, and using foreign keys to establish relationships between the tables.

 

h)    What is data sorting? Write its two advantages.

Ans: Sorting refers to the process of organizing data in a specific order (ascending or descending) based on one or more fields in a table, query, or report.

Any two advantages of using it are:

Sorting helps to organize data and make it easier to find and retrieve specific information.

Sorting can save time and improve efficiency by allowing users to quickly access the data they need.

 

i)      Mention any four data types used in MS-Access.

Any four data types used in MS-Access are text, memo, Yes/No and Currency.

 

5. Write down the output of the given program.                                  [2]

            DECLARE FUNCTION TEXT$(A$)

CLS

            A$= “TECHNOLOGY”

            Y$= TEXT$(A$)

             PRINT Y$

            END

             

            FUNCTION TEXT$(A$)

            B= LEN(A$)

            FOR I = 1 TO B

              IF I MOD 2 = 1 THEN

              B$= B$+MID$(A$,I,1)

              END IF

            NEXT I

              TEXT$= B$

             END FUNCTION

 

Dry Run

A$

B

I=1 to B

IF I MOD 2 =1

B$=B$+MID$(A$,I,1)

Y$

PRINT Y$

TECHNOLOGY

10

1 to 10

1 MOD 2=1

1=1 yes

T

TCNLG

TCNLG

 

 

2 to 10

2 MOD 2=1

0=1 no

 

 

 

 

 

3 to 10

3 MOD 2=1

1=1 yes

T+C = TC

 

 

 

 

4 to 10

4 MOD 2=1

0=1 no

 

 

 

 

 

5 to 10

5 MOD 2=1

1=1 yes

TC+N=TCN

 

 

 

 

6 to 10

6 MOD 2=1

0=1 no

 

 

 

 

 

7 to 10

7 MOD 2=1

1=1 yes

TCN+L=TCNL

 

 

 

 

8 to 10

8 MOD 2=1

0=1 no

 

 

 

 

 

9 to 10

9 MOD 2=1

1=1 yes

TCNL+G

 

 

 

 

10 to 10

10 MOD 2=1

0=1 no

TCNLG

 

 

 

 

11 to 10

Loop Exit

 

 

 

 

 

The output of the program is

TCNLG

 

6.  Rewrite the following program after correcting the bugs.                  [2]

            DECLARE FUNCTION SUM(N)

CLS

            INPUT “ENTER A NUMBER”; N

            SU= SUM(N)

            PRINT “SUM =”; SUM(N)

             END

           

            FUNCTION SUM(N)

               WHILE N< > 0

                R = R MOD 10

                S= S + R

                 N = N \  10

              WEND

            S= SUM

            END SUB

Debugged Program

 

DECLARE FUNCTION SUM(N)

CLS

            INPUT “ENTER A NUMBER”; N

            SU= SUM(N)

            PRINT “SUM =”; SU

             END

           

            FUNCTION SUM(N)

               WHILE N< > 0

                R = N MOD 10

                S= S + R

                 N = N \  10

              WEND

            SUM=S

            END FUNCTION

 

 

7. Study the following program and answer the given questions.            [2]

            DECLARE SUB TEST(A$)

CLS

            A$= “COMPUTER”

            END

                       

SUB TEST (A$)

L= LEN(A$)

            FOR I =  L TO 1  STEP -2

              PRINT MID$(A$, I, 1)

              NEXT I

             END SUB

 

a)     What statement should be added in the main module to execute the program?

Ans: CALL TEST(A$) statement should be added in the main module to execute the program.

 

b)     List out the variables used in the above program with types.

Ans: the variables used in the above program are:

A$ - String Variable

L, I – Numeric Variable

 

Group ‘C’

8. Convert/ calculate as per the instruction.                                       [4]

 

a)     (670)8 = (?)10

b)     (FACE)16 = (?)2

c)     1100 x 110

d)     111011 ÷ 100

 

9. a) Write a program in QBASIC that asks for the length, breadth and height of a box. Create a user defined function to find the volume of the box and  sub procedure to find the total surface area of the box. [Hint: Vol=l x b x h ; Area=2(lb+bh+lh)                                                               [4]

 

    DECLARE SUB TSAREA (L, B, H)

DECLARE FUNCTION VOLUME (L, B, H)

CLS

INPUT “ENTER LENGTH”; L

INPUT “ENTER BREADTH”; B

INPUT “ENTER HEIGHT”; H

CALL TSAREA(L, B, H)

PRINT “VOLUME OF CUBOID ”; VOLUME(L, B, H)

END

 

SUB TSAREA (L, B, H)

T = 2 * (L * B + B * H + H * L)

PRINT “TOTAL SURFACE AREA OF CUBOID ”; T

END SUB

 

FUNCTION VOLUME (L, B, H)

VOLUME = L * B * H

END FUNCTION

 

 

 

b. Write a program to open a data file “Record.dat” which contains student’s name, class and address and print only those students’ records whose name  starts from an alphabet “A”.                         [4]

 

 

OPEN "Record.dat" FOR INPUT AS #1

CLS

WHILE NOT EOF (1)

  INPUT #1, N$, C, A$

A$ = UCASE$(LEFT$(N$,1))   

IF A$ = “A” THEN PRINT N$, C, A$

WEND

CLOSE #1

END

 

 

10.  Write a program in C language to enter a number and check if it is odd or

        even.                                                                                           [4]

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n % 2= = 0)

printf("%d is even number", n);

else

printf("%d is odd number", n);

return 0;

}

 

 

 

OR

        Write a program in C language to display the series:

         2, 4, 6, 8, 10, 12……………10th term.

 

#include <stdio.h>

 

int main()

{

    int a=2,i;

    for(i=1;i<=10;i++)

{

    printf("%d ", a);

    a=a+2;

}

    return 0;

}