Friday, February 3, 2023

Solved SEE Boost Up Examination-2079 [Computer Science]

 

Solved SEE Boost Up Examination-2079 [Computer Science]

 




 

Candidates are required to give their answers in their own words as for as practicable. Credit shall be originality, not rote learning..

 

Group 'A'

 

1. Answer the following questions.

 

a) Write any two examples of full duplex modes of data transmission.

 

Ans: Any two examples of full duplex modes of data transmission are telephone and mobile.

 

b) List any two software security measures.

Ans: Any two software security measures are password and backup

 

c) Which data type is also known as logical data type in MS-Access?

Ans: Yes/No data type is also known as logical data type in MS-Access

 

d) Which query is used to view the data stored in database?

Ans: Select query is used to view the data stored in database

 

e) What will be the value of x in given c expression x=55 % 10?

Ans: The value value of x will be 5.

 

f) What is looping ?

Ans: Looping is a programming construct that repeatedly executes a block of code until a specified condition is met.

 

2. Write appropriate technical term: (2X1-2)

 

a) Digital marks created while using internet. Digital Footprint

 

 

b) The process of repeatedly executing some code until condition satisfies. Looping

 

3. Write full forms of the following:  (2X1=2)

 

bps: bits per second

 

VOIP: Voice Over Internet Protocol

 

Group 'B'

 

4. Answer the following questions: (9X2-18)

 

a) Define computer network. List two demerits of computer network.

Ans: Computer network is a group of two or more computers and devices connected to each other through wired or wireless media to exchange data and information and share hardware, software and other resources.

Any two demerits of computer network are:

·       Computer network can be route for computer virus and malware transmission.

·       Skilled manpower is required to manage and operate computer network.

 

 

(b) Give any two advantage of E-mail over traditional mail.

Ans: Any two advantage of E-mail over traditional mail

Emails can be sent and received almost instantly, allowing for quick communication and faster decision making. Traditional mail, on the other hand, can take several days to arrive.

Emails can be sent from anywhere with an internet connection, and they can be easily organized and stored for future reference. Traditional mail requires physical transportation, which can be inconvenient and time-consuming.

 

c) Define computer security How antivirus helps to secure computer software?

Ans: Computer security refers to the measures taken to protect computer systems and networks from unauthorized access, theft, damage, and disruption.

An antivirus helps to secure computer software by detecting and removing malicious software, such as viruses, spyware, and Trojans, that can harm the computer or steal sensitive information.

 

d) Define E-Commerce? Write the name of any two E-commerce sites.

Ecommerce refers to the buying and selling of goods or services using the internet.

The name of any two E-commerce sites  are sastodeal and daraz.

 

e) What is Cryptography? How encryption helps in data protection?

Ans: Cryptography is the practice of securing communication and data by converting it into a code to prevent unauthorized access or manipulation.

Encryption helps in data protection by providing a secure way to store and transmit sensitive information.

 

f) What is database? List two advantages of DBMS

 

Ans: A database is an organized collection of related information that can be used for different purpose so that it can easily be accessed, managed, and updated.

Any two advantages of DBMS are:

·       It controls data redundancy which means duplication of data.

·       It allows sharing the existing data by different programs.

 

g) What is data redundancy? How can it be reduced in database?

Ans: Data redundancy refers to the repetition of data in a database, where the same data is stored in multiple places.

Data redundancy can be reduced in a database by using normalization techniques. Normalization is the process of organizing data in a database to minimize redundancy and improve data integrity.

 

h) Define primary key. Write any two uses of it.

Ans: A key that uniquely identifies each record in a database is primary key.

Any two uses of it are:

i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.

 

1) Differentiate between fields and records with an examples.

Record

Field

Record is complete set of information.

Record is a collection of multiple related fields in a row which gives complete information about a person or thing.

E.g.: Ram Chabahil 4468790

Field is a small unit of information.

A column in a table is called field, and it contains a specific piece of information within a record.

E.g.: Name, Address, Telephone

 

 

 

 

 

 

5) Write the output of the following program. Show dry run in table. [2]

 

DECLARE FUNCTION EXAM$(W$)

W$ = "COMPUTER"

PRINT EXAM$(W$)

FUNCTION EXAM$ (W$)

    FOR P = 1 TO LEN(W$)

        K$ = MID$(W$, P, 1)

        IF P MOD 2 = 0 THEN

            K$ = LCASE$(K$)

        ELSE

            K$ = UCASE$(K$)

        END IF

        S$ = S$ + K$

    NEXT P

    EXAM$ = S$

END FUNCTION

 

Dry Run

Variable

Variable

Loop Check

Variable

Variable

O/P

W$

P

1 to 8

K$

S$

CoMpUtEr

COMPUTER

1

1 to 8 Yes

C

C

 

 

2

2 to 8 Yes

o

CoMpUtEr

 

 

3

3 to 8 Yes

M

 

 

 

4

4 to 8 Yes

P

 

 

 

5

5 to 8 Yes

u

 

 

 

6

6 to 8 Yes

T

 

 

 

7

7 to 8 Yes

e

 

 

 

8

8 to 8 Yes

R

 

 

 

9

9 to 8 No

Loop Exits

 

 

 

 

Output

CoMpUtEr

 

6) Rewrite the given program after correcting bugs,

REM PROGRAM DISPLAY RECORDS

OPEN INFO.DAT FOR INPUT AS #1

CLS

WHILE NOTEOF(2)

INPUT #1, NAME$,AGE,SALARY

DISPLAY NAME$, AGE, SALARY

LOOP WEND

CLOSE #1

END

Debugged Program

 

REM PROGRAM DISPLAY RECORDS

OPEN “INFO.DAT” FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

INPUT #1, NAME$,AGE,SALARY

PRINT NAME$, AGE, SALARY

WEND

CLOSE #1

END

 

Study the following program and answer the given questions.

 

 

DECLARE FUNCTION ABC$(N$)

CLS

INPUT “ENTER ANY WORD”; W$

PRINT “THE RESULT STRING IS”; ABC(W$)

END

 

FUNCTION ABC$ (N$)

FOR I=1 TO LEN (N$)

P$=MID$ (N$,I,1)

R$=P$+R$

NEXT I

SHARED R$

ABC$=R$

END FUNCTION

 

7) Study the following program and answer the given questions. [2]

 

a) List the arguments and parameters used in above program

Ans: The argument used in the above program is W$ and parameter is N$.

 

b) What is the use of SHARED in above program?

Ans: The SHARED keyword in QBASIC is used to declare variables that can be shared among different subroutines in a program.

 

Group 'C'

5)Perform the operations as indicated.

 

a) (10111)2-(?)10

b) (CCA)16 =  (?)2

c) (1110 + 1110) X 11

d) (111001) ÷ (101)


 



 

9) Answer the following questions, [4x2=8j

 

a) Write a program in QBASIC that asks principal, time and rate of interest and calculate simple interest and amount. Create a user- defined function to calculate simple interest and sub-program to calculate amount. Hint: [S1-P*T*R/1001, (A-P+SI)

DECLARE FUNCTION INTEREST(P,T,R)

DECLARE SUB AMOUNT(P,I)

CLS

INPUT "ENTER PRINCIAL"; P

INPUT "ENTER TIME"; T

INPUT "ENTER RATE"; R

PRINT "SIMPLE INTEREST="; INTEREST(P, T, R)

CALL AMOUNT(P, I)

END

FUNCTION INTEREST (P, T, R)

SHARED I

    I = P * T * R / 100

    INTEREST = I

END FUNCTION

SUB AMOUNT (P, I)

    A = P + I

    PRINT "AMOUNT="; A

END SUB


b) Write a sequential data file called "abc.dat" has stored data under the field heading Roll No., Name, English, Nepali and Computer. Write a program to display all the information of those students whose marks in computer is more than 45.

 

OPEN “abc.dat” FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

INPUT #1, R,N$,E,NE,C

IF C>45 THEN PRINT R, N$, E, NE, C

WEND

CLOSE #1

END

 

 

 

10) Write a c program to accept any three numbers and display their average.

 

#include<stdio.h>

int main()

{

 

  float num1, num2, num3;

  float sum, avg;

  printf("Enter three Numbers: ");

  scanf("%f %f %f",&num1, &num2, &num3);

  sum = num1 + num2 + num3;

  avg = sum / 3;

  printf("Entered numbers are: %.2f, %.2f and %.2f\n",

           num1, num2, num3);

   printf("Sum=%.2f\n", sum);

  printf("Average=%.2f\n",avg );

  return 0;

}

 

 

OR

 

Write a C program to find out the given number is odd or even

#include <stdio.h>

int main( ) {

    int num;

    printf("Enter an integer: ");

    scanf("%d", &num);

    if(num % 2 = = 0)

        printf("%d is even.", num);

    else

        printf("%d is odd.", num);

   

    return 0;

}

1 comment: