Friday, December 22, 2023

SOLVED PABSON KTM SEE PRE QUALIFYING EXAMINATION 2080 - COMPUTER SCIENCE

 



PABSON, Kathmandu

SEE PRE-QUALIFYING EXAMINATION-2080

Subject: Opt. II Computer Science

Class: 10

Full Marks: 50

Time: 2 hrs.

Candidates are required to write their answers according to the instructions given.

 

Attempt all questions.

 

(Group 'A' 10×1=10)

 

1. Answer the following questions in one sentence: (6x1=6)

 

a) Give reason in short that "Computer network reduces the cost of operation."

Ans: Computer network reduces the cost of operation by sharing hardware and software.

 

b) List some areas where Al can help us.

Ans: Robotics and Education

 

c) Write opportunities and threats in social media.

Ans: Opportunities of social media is It creates awareness and innovate the way people live and Threats of social media is personal data and privacy can be easily hacked and shared on the internet.

 

d) What is primary key?

Ans: A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used to establish relationships between tables and enforce data integrity.

 

e) What is local and global variable in QBASIC?

Ans: Variables which are declared inside the procedure and its value is protected from outside interference is called local variables. Variables which are declared outside the procedure and its values can be accessed from any procedure or module.

is called global variables. 

 

f) Write any two format specifier used in C language.

Ans: int - %d, and float - %f

 

2. Write appropriate technical term for the following: (2x1=2)

 

a) Device used to connect a PC with a telephone line. MODEM

b) Law that governs the legal issues of cyberspace. Cyber Law

 

3. Write the full form of the following: (2x1=2)

 

a) GPS:  Global Positioning System

b) TCP/IP : Transmission Control Protocol / Internet Protocol

 

 

 

 

(Group 'B')

 

4. Answer the following questions: (9x2=18)

 

a) Write advantages and disadvantages of bus topology.

Advantages of bus topology

-It is the easiest network topology for connecting peripherals or computers in a linear fashion.

-The length of cable required is less than a star topology

Disadvantages of bus topology:

- Troubleshooting individual device issues is very hard.

-If the main cable is damaged, the whole network fails or splits into two.

 

b) What are the elements of digital citizenship?

Ans The elements of digital citizenship are:

- Digital access

-Digital commerce

- Digital communication

- Digital literacy

- Digital etiquette

- Digital law

-Digital rights and responsibilities

-Digital health and wellness

 

c) Differentiate between traditional commerce and e-commerce.

Traditional commerce refers to the commercial transactions or exchange of information, buying or selling product/services from person to person without use of internet which is a older method of business style and comes under traditional business. Now a days people are not preferring this as it is time taking and needs physical way of doing business. Example includes physical market/bazaar.

E-commerce refers to the commercial transactions or exchange of information, buying or selling product/services electronically with the help of internet which is a newer concept of business style and comes under e-business. Now a days people are preferring this as it is less time taking and does not need physical way of doing business everything can be done with laptop or smartphone and internet. Example includes online shopping sites.

 

d) Define cloud computing? Name any two services of it.

Cloud Computing refers to storing and accessing data and programs over the internet instead of storing on secondary storage devices.

Any two servicecs of it are

Infrastructure as a Service (IaaS): Customer can use processing, storage, networking, and other computing resources from cloud service providers to run their software system.

Software as a Service (SaaS): Customer subscribes the software services from a vendor for an annual subscription fee or sometimes free and use it over Internet.Services like Gmail, Google Drive, Office 365 are some of the examples of SaaS.

 

e) What is power protection device? Write its role in computer security.

Ans: Power protection device is device that control the voltage fluctuation and supply required amount of power to the respective device. Its role in computer security is to keep data and programs safe.

 

f) Differentiate between data and information.

Ans: Data are raw facts that is meaning less whereas information are meaningful and gives us clear meaning.

 

g ) What are field properties? Name any four of them.

Ans: Field Properties sets boundaries on what/how data is entered into table fields. Field size, caption, input mask, validation rule etc are the examples of field properties.

 

h) What are validation text and validation rules?

Ans: A validation rule is one way to restrict input in a table field or a control (such as a text box) on a form. Validation text lets you provide a message to help users who input data that is not valid.

 

i) List any two major differences between forms and reports.

Ans: Forms can be used for both input and output. Reports, on the other hand, are used for output, i.e., to convey information on a collection of items. Typically, forms contain data from only one record, or are at least based on one record such as data about one student, one customer, etc.

 

5. Write down the output of the given program.                           (2)

 

Show with dry run in table.

 

DECLARE SUB SERU ( )

CLS

CALL SERU

END

SUB SERU ()

X=2

C=1

WHILE C<=10

S=X^C

PRINT S;

C-C+1

WEND

END SUB

 

Dry Run

X

C

WHILE C<=10

S=X^C

PRINT S

2

1

1

2^1=2

2

 

2

2

2^2=4

4

 

3

3

2^3=4

8

 

4

4

2^4=4

16

 

5

5

2^5=4

32

 

6

6

2^6=4

64

 

7

7

2^7=4

128

 

8

8

2^8=4

256

 

9

9

2^9=4

512

 

10

10

2^10=4

1024

 

 

Output of the program is

2  4  8   16   32   64   128   256    512    1024

 

 

6. Re-write the given program after correcting the bugs: (2)

 

REM to store Name, post and salary

OPEN EMP.DOC FOR OUT AS #1

INPUT "Enter name"; N

INPUT "Enter post"; PS

INPUT "Enter salary"; S

INPUT #2, NS, P$, S

CLOSE #1

STOP

 

Debugged Program

REM to store Name, post and salary

OPEN "EMP.DOC" FOR OUTPUT AS #1

INPUT "Enter name"; N$

INPUT "Enter post "; P$

INPUT "Enter salary"; S

WRITE #1, N$, P$, S

CLOSE #1

END

 

7. Study the following program and answer the given questions: (2×1=2)

 

DECLARE FUNCTION COUNT (NS)

INPUT "Enter a word"; RS

C=COUNT(RS)

PRINT C

END

 

FUNCTION COUNT(NS)

FOR K=1 TO LEN(NS)

XS=MIDS(NS,K,1)

IF UCASES(XS)="A" THEN

X=X+1

END IF

NEXT K

COUNT=X

END FUNCTION

 

Questions:

 

a) List any two library functions used in above program.

Ans: Two library functions used in above program are UCASE$( ) and MID$( )

 

b) Write the use of variable "C" in line 3 [i.e. C=COUNT(RS)] given in the above program.

Ans: The use of variable "C" in line 3 [i.e. C=COUNT(RS)] is to store the value returned by

COUNT(RS) function.

 

(Group 'C’)

 

8. Convert/calculate as per the instruction:                                   (4x1=4)

 

i) (101101 + 1101) - (11011)

ii) (10111 × 11)  ¸ (110)

iii) (329) into octal

iv) (DA3)16 into binary

 

9. a) Write a program in QBASIC that allow user to enter radius of a circle. Create user define FUNCTION...END FUNCTION to find area of circle and SUB...END SUB to find volume of a cylinder. (4)

 

DECLARE FUNCTION AREA(R)

DECLARE SUB VOLUME(R, H)

CLS

INPUT "Enter the value of radius"; R

INPUT "Enter the value of height"; H


PRINT “Area of Circle”; AREA(R)

CALL VOULME(R, H)

END

 

FUNCTION AREA(R)

AREA = 22/7 * R ^ 2

END FUNCTION

 

SUB VOLUME(R, H)

V =  22/7 * R ^2 * H

Print "Volume of a cylinder is";V

END SUB

 

b) A sequential data file called "record'txt" has stored data under the field heading Roll No., Name, Gender, English, Nepali, Maths and Computer. WAP to display all the information of those students whose gender is ‘F’ and obtain mark in computer is more than 90. (4)

 

OPEN "record.txt" FOR INPUT AS #1

WHILE NOT EOF (1)

INPUT #1, roll, N$, G$, E, N, М, С

IF UCASES(G$) = "F" and C>90 THEN

PRINT roll, N$, GS, E, N, M. C

END IF

WEND

CLOSE #1

END

 

10. Write a program in 'C' language to check whether the supplied number is divisible by 5 or not.

 

 

#include<stdio.h>

#include<conio.h>

void main( )

{

int a;

printf(“Enter any number”);

scanf("%d", &a);

if (a % 5 = = 0)

{

printf("It is Divisible by 5");

}

else

{

printf("It is not Divisible by 5");

}

getch( );

}

 

 

or

 

Write a program C } language to display the series with their sum. 2,4,6,8......, up to 10th terms

 

#include<stdio.h>

#include<conio.h>

void main()

{

int a=2,i;

for (i=1;i<=10;i++)

{

Printf(“%d \t”, a);

s=s+a;

a=a+2;

}

printf("sum = %d",s);

getch( );

}

 

2 comments: