1. Answer the following questions in one sentence.
a) What is
network protocol?
Ans: A set of rules followed for
interconnection and communication between computers in a network is called network
protocol.
b) What is
Ecommerce?
Ans: E-commerce is also
known as electronic commerce or Internet commerce which means buying and
selling of goods, products, or services through Internet.
c) What is
the default size of text field in MS-Access?
Ans: The
default size of a text field is 50 characters (2003 version) and 255 characters
(2007 version) in MS-Access.
d) Which
data type is used to store photo in MS-Access?
Ans: The data type used to store photos is called an OLE
Object data type.
e) What is
looping?
Ans: Looping is the
process of repeating the execution of a statement or a block of statements
guided by a condition and is terminated when the given condition is satisfied.
f) List
any two data types used in C-programming language.
Ans: Any two data types used in C-programming language are
char and int.
2. Write
appropriate technical term for the following:
a) A program that can disinfect a file
from virus. Antivirus software
b) Learning through the electronic
media. E-Learning
3. Write
the full form of the following:
a) G2G – Government to Government
b) ISP – Internet Service Provider
4. Answer
the following questions:
a) What is
network topology? List any two types of network topology.
Ans: Network topology
is the inter-connected pattern of network components. Any
two types of network topology are bus topology and star topology.
b) What is
antivirus software? Name any two popular antivirus software.
Ans: Antivirus software
is a computer program used to prevent, detect, and remove malware.
Any two
popular antivirus software are Kaspersky and Norton Antivirus.
c) Define
cyber law and cyber crime.
Ans The law which
governs the legal issues in the cyber space regarding the internet or WWW for
digital data processing and transaction is called cyber law.
Cyber crime refers
to criminal activities that are carried out using computers, networks and the
internet.
d) Define
virtual reality. Write any two areas where virtual reality is used.
Ans: Virtual Reality
(VR) is the use of computer technology to create a simulated environment that
doesn’t actually exist, that can give a feel of near real world with all or
some of senses experiencing the virtually simulated environment.
Any two
areas where virtual reality is used are Gaming and Education and Training.
e) What is
password? Write any two importance of password protection.
Ans: A password is a
string of characters including letters, digits, or other symbols which confirms
the identity of a user.
Any two importance of password protection are:
1. Password secures the data by protecting the data from
unauthorized access.
2. We have to keep the password secure and strong so that
unauthorized users may not gain access to the resource and misuse it with our
identity
f) What is
DBMS? Write four objects of MS-Access.
Ans: DBMS is a
computerized system that stores data, processes them and provides information
in an organized form.
Any four objects of MS-Access are Table, Form, Query and
Report.
g) What
are validation text and validation rule?
Ans: Validation Text is
a field property which displays an error message that appears if the data
entered is invalid according to the specified validation rule.
Validation Rule is
a field property which is used to limit the values that can be entered into a
field.
h) What is
form? Write any two advantages of it.
Ans: Form is one of the
MS-Access database objects which provides graphical interface to view, modify
and add data in a table or multiple linked tables.
Any two advantages of form are:
1. Form displays complete record one at a time, so we can
view and modify records using the form.
2. Forms provides GUI (Graphical Users Interface) using
which users interact with MS-Access database.
i) What is
record? Why is primary key necessary in record?
Ans: A record is a row
in a table which contains information about single items in a database. Record
is complete set of information.
A
primary key is necessary in a database record because it reduce and control
duplication of the record in a table, sets the relationship between tables and
identifies each record of a table uniquely.
5. Write
down the output of the given program:
DECLARE
SUB Series(A)
CLS
A=20
CALL
Series(A)
END
SUB
Series(A)
FOR K=1
to 5
PRINT A;
A=A+10
NEXT K
END SUB
Dry Run Table
A |
K=1 to 5 |
PRINT A; |
A=A+10 |
20 |
1 to 5 yes |
20 |
20+10=30 |
30 |
2 to 5 yes |
30 |
30+10=40 |
40 |
3 to 5 yes |
40 |
40+10=50 |
50 |
4 to 5 yes |
50 |
50+10=60 |
60 |
5 to 5 yes |
60 |
60+10=70 |
70 |
6 to 5 no Loop exits |
|
|
The output
of the program is:
20 30 40
50 60
6.
Re-Write the given program after correcting the bugs:
REM
program to make a word reverse
DECLARE
FUNCTION Rev$(N$)
CLS
LNPUT
“Enter a word”; N$
DISPLAY
“Reversed is”; Rev$(N$)
END
EUNCTION
Rev$(N$)
FOR K=LEN$(N$)
To 1 STEP-1
B$=B$+MID$(N$,1,K)
NEXT K
B$=Rev$
END
FUNCTION
Debugged
Program
REM
program to make a word reverse
DECLARE
FUNCTION Rev$(N$)
CLS
INPUT “Enter
a word”; N$
PRINT “Reversed
is”; Rev$(N$)
END
FUNCTION Rev$(N$)
FOR K=LEN (N$)
To 1 STEP-1
B$=B$+MID$(N$,K,1)
NEXT K
Rev$=B$
END
FUNCTION
7. Study
the following program and answer the given questions:
DECLARE
FUNCTION SUM(N)
CLS
INPUT “Enter any number”; N
X=SUM(N)
PRINT
“The sum of individual digit is “; X
END
FUNCTION
SUM(N)
WHILE
N<>0
R=N MOD
10
S=S+R
N=INT(N/10)
WEND
SUM=S
END FUNCTION
a) Write
the function of INT.
Ans: It rounds and returns the largest integer less than or equal
to a numeric expression
b) How
many times does the WHILE ….WEND loop repeat if the value of N is 123?
Ans: The
WHILE ….WEND loop repeats 3 times if the value of N is 123.
8.
Convert/Calculate as per the instruction:
a)
(10110011)2 – (?)16
Soln:
Paired Binary Digit |
1011 |
0011 |
Binary Equivalent
value |
B |
3 |
(10110011)2 =
(B3)16
c) (1001
+ 110)2 – (1000)2
|
1 |
0 |
0 |
1 |
|
+ |
1 |
1 |
0 |
|
1 |
1 |
1 |
1 |
- |
1 |
0 |
0 |
0 |
|
0 |
1 |
1 |
1 |
(1001 +
110)2 – (1000)2 = (0111)2
b) (410)10 =
(?)2
2 |
410 |
Remainder |
2 |
205 |
0 |
2 |
102 |
1 |
2 |
51 |
0 |
2 |
25 |
1 |
2 |
12 |
1 |
2 |
6 |
0 |
2 |
3 |
0 |
2 |
1 |
1 |
2 |
0 |
1 |
(410)10 =
(110011010)2
d)
(10110)2 ¸ (101)2
iv)
(10110) 2 ¸ (101) 2
101) |
10110( |
100 |
|
-101 |
|
|
00010 |
|
|
-0 |
|
|
10 |
|
|
|
|
|
|
|
|
|
|
|
|
|
Quotient = 100
Remainder = 10
9. a)
Write a program in QBASIC that asks radius of a circle to calculate its area
and circumference. Create a user defined function to calculate area and sub
program to calculate circumference.
[Hint
A= pr2, C= 2pr]
DECLARE FUNCTION
AREA (R)
DECLARE SUB CIR (R)
CLS
INPUT “ENTER
RADIUS”; R
PRINT “AREA OF
SQUARE ”; AREA(R)
CALL CIR (R)
END
FUNCTION AREA (R)
AREA = 3.14 * R ^ 2
END FUNCTION
SUB CIR (R)
C = 2 * 3.14 * R
PRINT “CIRCUMFERENCE
OF CIRCLE”; C
END SUB
b) A
sequential data file called “Record.dat” has stored data under the field
headings: Roll No., Name, Gender, English, Nepali, Maths and Computer. Write a
program to display all the information of those students whose marks in English
is more than 40.
OPEN "Record.dat" FOR INPUT AS #1
CLS
WHILE NOT EOF (1)
INPUT #1, R, N$, G$, E, NP, M, C
IF E > 40 THEN PRINT R, N$, G$, E, NP,
M, C
WEND
CLOSE #1
END
10. Write
a program in C language that asks any two numbers and displays the greatest
among them.
#include<stdio.h>
#include<conio.h>
int main()
{
int a,b;
printf("Enter any two numbers:\n ");
scanf("%d %d", &a, &b);
if(a>b)
printf("The greatest number is %d", a);
else
printf("The greatest number is %d", b);
return 0;
}
OR
Write a
program in C-Langauge to display the series with their sum. 1,2,3,4….upto 10th terms.
#include
<stdio.h>
int
main()
{
int
j, sum = 0;
printf("The first 10 natural number is
:\n");
for (j = 1; j <= 10; j++)
{
sum = sum + j;
printf("%d ",j);
}
printf("\nThe Sum is : %d\n",
sum);
}
***
No comments:
Post a Comment