LALITPUR COMPUTER SCIENCE SEND UP EXAM-2080
Class:
10
Opt. Il
Computer Science
Time: 2
hours.
Full Marks: 50
Group A
[10 Marks]
1.
Answer the following questions in one sentence: (6x1-6)
a) Name
two bounded transmission media.
Ans: Any two
bounded transmission media are Twisted Pair Cable and Fiber Optic Cable.
b) Give
an example of cyber bullying.
Ans: An example of
cyber bullying is sending rude emails, texts or instant messages online or
on the phone
c) What
is IoT?
Ans: IoT is a
system of interrelated computing device to exchange information over a network
without human-to-human or human to computer interaction
d) What
type table do you create in MS Access to modify table structure?
Ans: We create
table in design view in MS Access to modify table structure.
e) What
is file mode?
Ans: File mode means
opening a sequential file for one of the three modes of operation like output
mode, input mode and append mode
f) Write
any two numeric data type of C language.
Ans: Any two
numeric data type of C language are int and double
2. Write
the technical term for the following statements: (2x1=2)
a) A
program in client computer to access internet. Web browser
b) A
program that disinfects other programs. Antivirus software
3. Write
the full forms of the following:
a) UTP – Unshielded Twisted
Pair
b) ISDN – Integrated Services
Digital Network
Group B
(24 Marks]
4.
Answer the following questions: (2×1=2)
a) What
is ring topology? Mention its two advantages.
Ans: The type of
topology in which each computer is connected to another computer with the last
one connected to the first is called ring topology.
Any two advantages
of ring topology are:
l In this topology all computers, in
close loop, act as a client or server to transfer the information.
l Transmitting network is not
affected by high traffic or by adding more nodes.
b) What
is cyber law? What is the cyber law of Nepal called?
Ans: The law which
governs the legal issues in the cyber space regarding the internet or WWW for
digital data processing and transaction is called cyber law.
The cyber law of
Nepal is called The Electronic Transaction and Digital Signature Act-Ordinance.
c)
Mention any four software security measures.
Any four software
security measures are:
a)
Backup
b)
Scandisk
c)
Password
d)
Antivirus
e) What is
m-commerce? Write its two limitation.
M-Commerce refers to the process of buying and selling of goods and services through
wireless handheld devices such as smartphones, tablets or personal digital
assistants (PDAs).
Any two limitations are:
Mobile payment options are not available in every
geographic location.
Without accessing the internet connections user will
not be able to receive any data to purchase.
d) What
is e-governance? List the types of e-governance.
E-Governance is a
set of services provided by the government to public via electronic media
especially using Internet.
The types of
e-commerce are:
• Government-to-Citizen(G2C)
• Government-to-business (G2B)
• Government-to-Government (G2G)
• Government-to-Employee (G2E)
f) What
is database? Write any two advantages of electronic data base.
A collection of
systematically organized inter-related data is called a database. The purpose
of data base is to store, organize and retrieve data.
Any two
advantages of electronic data base are:
a)
It
reduces data redundancy which means duplication of data.
b)
It
allows multiple users to access the same data simultaneously.
g) What
is field type? List any four field type supported by MS- Access.
Field type is an attribute for a field that determines the
type of data that can be stored in that field.
Any four
field type supported by MS- Access are:
Text, memo, Currency
and Yes/No
h) Write
two differences between filtering and querying.
Filtering |
Querying |
A filtering can
be used to display all the data of a single table based on a specified
condition |
A querying can
be used to display selected data from one or more tables based on a specified
condition or no condition at all. |
Altering the
data displayed changes the original data of the table. |
Manipulating the
data of a saved query does not affect the original data. |
i) What
is report? Why is it prepared? What are the different parts of a report?
Report is one of
the MS-Access database objects used to present information in an effective and
organized format that is ready for printing.
Report is created to print documents according to user’s
specifications of the summarized information through query or table.
The different parts of report are: Report Header, Report
Footer, Page Header, Page Footer etc.
5. Write
the output of the given program showing the dry run table.
DECLARE
SUB TTT(N)
CLS
X=2
CALL
TTT(X^2)
END
SUB
TTT(N)
T=2
WHILE T<=4
PRINT T*N
T=T+2
WEND
END SUB
X |
N=X^2 |
T |
WHILE 2<=4 |
PRINT T*N |
T=T+2 |
2 |
2^2=4 |
2 |
2<=4 Yes |
2*4=8 |
2+2=4 |
|
|
4 |
4<=4 Yes |
4*4=16 |
4+2=6 |
|
|
6 |
6<=4 No Loop Exits |
|
|
The output of a
program is:
8
16
6. Debug
the following program:
Rem to
print 5 records from data file HOSPITAL.TXT
OPEN
"HOSPITAL.TXT" FOR APPEND AS #5
FOR REP =
1 TO 5
INPUT
#3, PN$,AD$,G$,A
DISPLAY
PN$,AD$,A, G$
NEXT REP
FINISH
#5
END
Debugged Program
Rem to print 5
records from data file HOSPITAL.TXT
OPEN
"HOSPITAL.TXT" FOR INPUT AS #5
FOR REP = 1 TO 5
INPUT #5,
PN$,AD$,G$, A
PRINT PN$,AD$, G$,
A
NEXT REP
CLOSE #5
END
7. Read
the following program and answer the given questions. (2)
DECLARE
SUB AA (N$)
CLS
W$=
"CYBERCRIME"
CALL
AA(W$)
END
SUB AA
(N$)
R= LEN(N$)\2
E$=RIGHT$(NS,R)
+ LEFT$(N$,R)
PRINT E$
END SUB
Questions:
a) List
all string variables from the program.
Ans: N$, W$ and E$
are the string variables used in the above program.
b) What
type of operator is '+' in above program?
Ans: ‘+’ is an
string operator which is used to concatenate strings.
Group C
[16 Marks]
8.
Convert/Calculate as per the instruction:
a)
(111000001)2=(?)16
b) (521)
(?) 10
c) (111)
X (11)
d)
(100110)2 (110)2
9. a.
Write a program in QBASIC to define a function procedure to display the cube
root of an integer supplied by the user. Use sub procedure module to calculate
and print the difference between cube root and square root the same integer.
[4]
DECLARE FUNCTION
CUBE(N)
DECLARE SUB SQ(N)
CLS
COMMON SHARED C
INPUT "Enter
any number"; N
PRINT "Cube
root of a given number="; CUBE(N)
CALL SQ(N)
END
FUNCTION CUBE (N)
C = N ^ (1 / 3)
CUBE = C
END FUNCTION
SUB SQ (N)
S = N ^ (1 / 2)
D = C - S
PRINT "difference between cube root
and square root="; D
END SUB
b. A
sequential data file 'STUDENT.DAT contains the information regarding name,
class, section and gender of 50 students. Write a program to add five more
records in the same file. [4]
OPEN “STUDENT.DAT”
FOR APPEND AS #1
CLS
FOR I = 1 TO 5
INPUT “Enter Name”;
N$
INPUT “Enter Class”;
C
INPUT “Enter
Section”; S$
INPUT “Enter
Gender”;G$
WRITE #1, N$, C,
S$, G$
NEXT I
CLOSE #1
END
Write a program using
C language to print the first 25 odd numbers between 50 to 100.
#include
<stdio.h>
int main() {
int count = 0;
printf("The first 25 odd numbers
between 50 to 100\n");
for (int i = 50; i <= 100; i++)
{
if (i % 2 != 0)
{
printf("%d ", i);
count++;
if (count == 25)
break;
}
}
return 0;
}
10.
Write a program using C language to input an integer then check whether the
integer is negative or positive or zero.
#include<stdio.h>
#include<conio.h>
int main()
{
int n;
printf("Enter any number: ");
scanf("%d", &n);
if(n>0)
printf("%d is positive number",n);
else if(n<0)
printf("%d is negative number",n);
else
printf("%d is zero number",n);
return 0;
}
No comments:
Post a Comment