Tuesday, January 23, 2024

SOLVED LALITPUR COMPUTER SCIENCE SEND UP EXAM-2080

 LALITPUR COMPUTER SCIENCE SEND UP EXAM-2080





Class: 10

Opt. Il Computer Science

Time: 2 hours.

Full Marks: 50

Group A [10 Marks]

1. Answer the following questions in one sentence:                              (6x1-6)

 

a) Name two bounded transmission media.

Ans: Any two bounded transmission media are Twisted Pair Cable and Fiber Optic Cable.

 

b) Give an example of cyber bullying.

Ans: An example of cyber bullying is sending rude emails, texts or instant messages online or on the phone

 

c) What is IoT?

Ans: IoT is a system of interrelated computing device to exchange information over a network without human-to-human or human to computer interaction

 

d) What type table do you create in MS Access to modify table structure?

Ans: We create table in design view in MS Access to modify table structure.

 

e) What is file mode?

Ans: File mode means opening a sequential file for one of the three modes of operation like output mode, input mode and append mode

 

f) Write any two numeric data type of C language.

Ans: Any two numeric data type of C language are int and double

 

2. Write the technical term for the following statements: (2x1=2)

a) A program in client computer to access internet. Web browser

b) A program that disinfects other programs. Antivirus software

 

3. Write the full forms of the following:

a) UTP – Unshielded Twisted Pair

b) ISDN – Integrated Services Digital Network

 

Group B (24 Marks]

 

4. Answer the following questions:                              (2×1=2)

 

a) What is ring topology? Mention its two advantages.

Ans: The type of topology in which each computer is connected to another computer with the last one connected to the first is called ring topology.

Any two advantages of ring topology are:

l In this topology all computers, in close loop, act as a client or server to transfer the information.

l Transmitting network is not affected by high traffic or by adding more nodes.

 

b) What is cyber law? What is the cyber law of Nepal called?

Ans: The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

The cyber law of Nepal is called The Electronic Transaction and Digital Signature Act-Ordinance.

 

c) Mention any four software security measures.

Any four software security measures are:

a)   Backup         

b)   Scandisk               

c)   Password

d)   Antivirus

 

e)   What is m-commerce? Write its two limitation.

M-Commerce refers to the process of buying and selling of goods and services through wireless handheld devices such as smartphones, tablets or personal digital assistants (PDAs).

Any two limitations are:

Mobile payment options are not available in every geographic location.

Without accessing the internet connections user will not be able to receive any data to purchase.

 

d) What is e-governance? List the types of e-governance.

E-Governance is a set of services provided by the government to public via electronic media especially using Internet.

The types of e-commerce are:

•       Government-to-Citizen(G2C)

•       Government-to-business (G2B)

•       Government-to-Government (G2G)

•       Government-to-Employee (G2E)

 

 

f) What is database? Write any two advantages of electronic data base.

A collection of systematically organized inter-related data is called a database. The purpose of data base is to store, organize and retrieve data.

Any two advantages of electronic data base are:

a)   It reduces data redundancy which means duplication of data.

b)   It allows multiple users to access the same data simultaneously.

 

g) What is field type? List any four field type supported by MS- Access.

Field type is an attribute for a field that determines the type of data that can be stored in that field.

Any four field type supported by MS- Access are:

Text, memo, Currency and Yes/No

 

h) Write two differences between filtering and querying.

Filtering

Querying

A filtering can be used to display all the data of a single table based on a specified condition

A querying can be used to display selected data from one or more tables based on a specified condition or no condition at all.

Altering the data displayed changes the original data of the table.

Manipulating the data of a saved query does not affect the original data.

 

i) What is report? Why is it prepared? What are the different parts of a report?

Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing.

Report is created to print documents according to user’s specifications of the summarized information through query or table.

The different parts of report are: Report Header, Report Footer, Page Header, Page Footer etc.

 

 

5. Write the output of the given program showing the dry run table.

 

 

DECLARE SUB TTT(N)

CLS

X=2

CALL TTT(X^2)

END

 

SUB TTT(N)

T=2

WHILE T<=4

PRINT T*N

T=T+2

WEND

END SUB

 

X

N=X^2

T

WHILE 2<=4

PRINT T*N

T=T+2

2

2^2=4

2

2<=4 Yes

2*4=8

2+2=4

 

 

4

4<=4 Yes

4*4=16

4+2=6

 

 

6

6<=4 No

Loop Exits

 

 

 

The output of a program is:

8

16

 

 

6. Debug the following program:

Rem to print 5 records from data file HOSPITAL.TXT

OPEN "HOSPITAL.TXT" FOR APPEND AS #5

FOR REP = 1 TO 5

INPUT #3, PN$,AD$,G$,A

DISPLAY PN$,AD$,A, G$

NEXT REP

FINISH #5

END

 

Debugged Program

 

Rem to print 5 records from data file HOSPITAL.TXT

OPEN "HOSPITAL.TXT" FOR INPUT AS #5

FOR REP = 1 TO 5

INPUT #5, PN$,AD$,G$, A

PRINT PN$,AD$, G$, A

NEXT REP

CLOSE #5

END

 

7. Read the following program and answer the given questions. (2)

 

DECLARE SUB AA (N$)

 

CLS

W$= "CYBERCRIME"

CALL AA(W$)

END

 

SUB AA (N$)

R= LEN(N$)\2

E$=RIGHT$(NS,R) + LEFT$(N$,R)

PRINT E$

END SUB

 

Questions:

 

a) List all string variables from the program.

Ans: N$, W$ and E$ are the string variables used in the above program.

 

b) What type of operator is '+' in above program?

Ans: ‘+’ is an string operator which is used to concatenate strings.

 

 

 

 

Group C [16 Marks]

 

8. Convert/Calculate as per the instruction:

 

a) (111000001)2=(?)16

b) (521) (?) 10

c) (111) X (11)

d) (100110)2 (110)2





9. a. Write a program in QBASIC to define a function procedure to display the cube root of an integer supplied by the user. Use sub procedure module to calculate and print the difference between cube root and square root the same integer. [4]

 

DECLARE FUNCTION CUBE(N)

DECLARE SUB SQ(N)

CLS

COMMON SHARED C

INPUT "Enter any number"; N

PRINT "Cube root of a given number="; CUBE(N)

CALL SQ(N)

END

 

FUNCTION CUBE (N)

    C = N ^ (1 / 3)

    CUBE = C

END FUNCTION

 

SUB SQ (N)

    S = N ^ (1 / 2)

    D = C - S

    PRINT "difference between cube root and square root="; D

END SUB

b. A sequential data file 'STUDENT.DAT contains the information regarding name, class, section and gender of 50 students. Write a program to add five more records in the same file. [4]

OPEN “STUDENT.DAT” FOR APPEND AS #1

CLS
FOR I = 1 TO 5

INPUT “Enter Name”; N$

INPUT “Enter Class”; C

INPUT “Enter Section”; S$

INPUT “Enter Gender”;G$

WRITE #1, N$, C, S$, G$

NEXT I

CLOSE #1

END

 Write a program using C language to print the first 25 odd numbers between 50 to 100.

 

#include <stdio.h>

int main() {

  

    int count = 0;

    printf("The first 25 odd numbers between 50 to 100\n");

    for (int i = 50; i <= 100; i++)

    {

        if (i % 2 != 0)

        {

            printf("%d ", i);

            count++;

            if (count == 25)

                break;

        }

    }

      return 0;

}

10. Write a program using C language to input an integer then check whether the integer is negative or positive or zero.

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n>0)

printf("%d is positive number",n);

else if(n<0)

printf("%d is negative number",n);

else

printf("%d is zero number",n);

return 0;

}

No comments:

Post a Comment