Solved SEE Boost Up Examination-2079 [Computer Science]
Candidates are required to give their answers
in their own words as for as practicable. Credit shall be originality, not rote
learning..
Group 'A'
1. Answer the following questions.
a) Write any two examples of full duplex modes
of data transmission.
Ans: Any two examples
of full duplex modes of data transmission are telephone and mobile.
b) List any two software security measures.
Ans: Any two software
security measures are password and backup
c) Which data type is also known as logical
data type in MS-Access?
Ans: Yes/No data type
is also known as logical data type in MS-Access
d) Which query is used to view the data stored
in database?
Ans: Select query is
used to view the data stored in database
e) What will be the value of x in given c
expression x=55 % 10?
Ans: The value value
of x will be 5.
f) What is looping ?
Ans: Looping is a
programming construct that repeatedly executes a block of code until a
specified condition is met.
2. Write appropriate technical term: (2X1-2)
a) Digital marks
created while using internet. Digital
Footprint
b) The process of
repeatedly executing some code until condition satisfies. Looping
3. Write full forms of the following: (2X1=2)
bps: bits per second
VOIP: Voice Over Internet Protocol
Group 'B'
4. Answer the following questions: ।
(9X2-18)
a) Define computer network. List two demerits
of computer network.
Ans: Computer network is a
group of two or more computers and devices connected to each other through
wired or wireless media to exchange data and information and share hardware,
software and other resources.
Any two demerits of
computer network are:
· Computer network can be route for computer virus and malware transmission.
· Skilled manpower is required to manage and operate computer network.
(b) Give any two advantage of E-mail over
traditional mail.
Ans: Any two advantage
of E-mail over traditional mail
Emails can be sent and
received almost instantly, allowing for quick communication and faster decision
making. Traditional mail, on the other hand, can take several days to arrive.
Emails can be sent
from anywhere with an internet connection, and they can be easily organized and
stored for future reference. Traditional mail requires physical transportation,
which can be inconvenient and time-consuming.
c) Define computer security How antivirus helps
to secure computer software?
Ans: Computer security
refers to the measures taken to protect computer systems and networks from
unauthorized access, theft, damage, and disruption.
An antivirus helps to
secure computer software by detecting and removing malicious software, such as
viruses, spyware, and Trojans, that can harm the computer or steal sensitive
information.
d) Define E-Commerce? Write the name of any
two E-commerce sites.
Ecommerce
refers to the buying and selling of goods or services using the internet.
The name of any two
E-commerce sites
are sastodeal and daraz.
e) What is Cryptography? How encryption helps
in data protection?
Ans: Cryptography is
the practice of securing communication and data by converting it into a code to
prevent unauthorized access or manipulation.
Encryption helps in
data protection by providing a secure way to store and transmit sensitive
information.
f) What is database? List two advantages of
DBMS
Ans: A database is an
organized collection of related information that can be used for different
purpose so that it can easily be accessed, managed, and updated.
Any
two advantages of DBMS
are:
·
It
controls data redundancy which means duplication of data.
·
It
allows sharing the existing data by different programs.
g) What is data redundancy? How can it be
reduced in database?
Ans: Data redundancy
refers to the repetition of data in a database, where the same data is stored
in multiple places.
Data redundancy can be
reduced in a database by using normalization techniques. Normalization is the
process of organizing data in a database to minimize redundancy and improve
data integrity.
h) Define primary key. Write any two uses of
it.
Ans: A key that
uniquely identifies each record in a database is primary key.
Any
two uses of it are:
i)
To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
1) Differentiate between fields and records
with an examples.
Record |
Field |
Record
is complete set of information. Record
is a collection of multiple related fields in a row which gives complete
information about a person or thing. E.g.:
Ram Chabahil 4468790 |
Field
is a small unit of information. A
column in a table is called field, and it contains a specific piece of
information within a record. E.g.:
Name, Address, Telephone |
5) Write the output of the following program.
Show dry run in table. [2]
DECLARE FUNCTION
EXAM$(W$)
W$ =
"COMPUTER"
PRINT EXAM$(W$)
FUNCTION EXAM$ (W$)
FOR P = 1 TO LEN(W$)
K$ = MID$(W$, P, 1)
IF P MOD 2 = 0 THEN
K$ = LCASE$(K$)
ELSE
K$ = UCASE$(K$)
END IF
S$ = S$ + K$
NEXT P
EXAM$ = S$
END FUNCTION
Dry Run
Variable |
Variable |
Loop Check |
Variable |
Variable |
O/P |
W$ |
P |
1 to 8 |
K$ |
S$ |
CoMpUtEr |
COMPUTER |
1 |
1 to 8 Yes |
C |
C |
|
|
2 |
2 to 8 Yes |
o |
CoMpUtEr |
|
|
3 |
3 to 8 Yes |
M |
|
|
|
4 |
4 to 8 Yes |
P |
|
|
|
5 |
5 to 8 Yes |
u |
|
|
|
6 |
6 to 8 Yes |
T |
|
|
|
7 |
7 to 8 Yes |
e |
|
|
|
8 |
8 to 8 Yes |
R |
|
|
|
9 |
9 to 8 No Loop Exits |
|
|
|
Output
CoMpUtEr
6) Rewrite the given program after correcting
bugs,
REM PROGRAM DISPLAY
RECORDS
OPEN INFO.DAT FOR
INPUT AS #1
CLS
WHILE NOTEOF(2)
INPUT #1, NAME$,AGE,SALARY
DISPLAY NAME$, AGE,
SALARY
LOOP WEND
CLOSE #1
END
Debugged Program
REM PROGRAM DISPLAY
RECORDS
OPEN “INFO.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, NAME$,AGE,SALARY
PRINT NAME$, AGE, SALARY
WEND
CLOSE #1
END
Study the following program and answer the
given questions.
DECLARE FUNCTION
ABC$(N$)
CLS
INPUT “ENTER ANY
WORD”; W$
PRINT “THE RESULT
STRING IS”; ABC(W$)
END
FUNCTION ABC$ (N$)
FOR I=1 TO LEN (N$)
P$=MID$ (N$,I,1)
R$=P$+R$
NEXT I
SHARED R$
ABC$=R$
END FUNCTION
7) Study the following program and answer the
given questions. [2]
a) List the arguments and parameters used in
above program
Ans: The argument used
in the above program is W$ and parameter is N$.
b) What is the use of SHARED in above program?
Ans: The SHARED
keyword in QBASIC is used to declare variables that can be shared among
different subroutines in a program.
Group 'C'
5)Perform the operations as indicated.
a) (10111)2-(?)10
b) (CCA)16
= (?)2
c) (1110 + 1110) X 11
d) (111001) ÷ (101)
9) Answer the following questions, [4x2=8j
a) Write a program in
QBASIC that asks principal, time and rate of interest and calculate simple
interest and amount. Create a user- defined function to calculate simple
interest and sub-program to calculate amount. Hint: [S1-P*T*R/1001, (A-P+SI)
DECLARE FUNCTION INTEREST(P,T,R)
DECLARE SUB AMOUNT(P,I)
CLS
INPUT "ENTER PRINCIAL"; P
INPUT "ENTER TIME"; T
INPUT "ENTER RATE"; R
PRINT "SIMPLE INTEREST="; INTEREST(P, T, R)
CALL AMOUNT(P, I)
END
FUNCTION INTEREST (P, T, R)
SHARED I
I = P * T * R / 100
INTEREST = I
END FUNCTION
SUB AMOUNT (P, I)
A = P + I
PRINT "AMOUNT="; A
END SUB
b) Write a sequential data file called
"abc.dat" has stored data under the field heading Roll No., Name,
English, Nepali and Computer. Write a program to display all the information of
those students whose marks in computer is more than 45.
OPEN “abc.dat” FOR
INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, R,N$,E,NE,C
IF C>45 THEN PRINT
R, N$, E, NE, C
WEND
CLOSE #1
END
10) Write a c program to accept any three
numbers and display their average.
#include<stdio.h>
int main()
{
float num1, num2, num3;
float sum, avg;
printf("Enter three Numbers: ");
scanf("%f %f %f",&num1,
&num2, &num3);
sum = num1 + num2 + num3;
avg = sum / 3;
printf("Entered numbers are: %.2f, %.2f
and %.2f\n",
num1, num2, num3);
printf("Sum=%.2f\n", sum);
printf("Average=%.2f\n",avg );
return 0;
}
OR
Write a C program to find out the given number
is odd or even
#include
<stdio.h>
int
main( ) {
int num;
printf("Enter an integer: ");
scanf("%d", &num);
if(num % 2 = = 0)
printf("%d is even.", num);
else
printf("%d is odd.", num);
return 0;
}
Best
ReplyDelete