SET 18
SEE Efficiency
Test: 2024
Candidates are
required to give their answers in their own words as far as practicable.
Subject: Computer
Science
1. Answer the
following questions:
a) List any two
services of Internet.
Ans: Any two
services of internet are E-Mail and Search Engine
b) Define
Cryptography.
Ans: Cryptography is the study of secure communications techniques that allow
only the sender and intended recipient of a message to view its contents
c) List the
services of Cloud Computing.
Ans: The services
of cloud computing are :
Infrastructure as a Service (IaaS):
Software as a Service (SaaS):
Platform as a Service (PaaS):
d) What is Online
Payment?
Ans: Online
payment refers to the payment for buying goods or services
through the Internet using different online payment gateway.
e) Which query is
used to modify and calculate data in DBMS?
Ans: Update query
is used to modify and calculate data in DBMS.
f) List any two
examples of format specifier (Conversion Character) used in C Language.
Ans: Any two
examples of format specifier (Conversion Character) used in C Language are %d
(int) and %f (float)
2. Give the
appropriate technical terms of the following:
a) The mode of
data communication in which data/information/signals are transmitted in both
side simultaneously. Full Duplex Mode
b) The network
security systems that monitor and control the traffic flow (data packets). Firewall
3. Write the full
form for the following:
a) POP : Post
Office Protocol
b) GCE : Google Compute Engine
4. Answer the
following questions:
a) What is
Transmission Media? Mention its types with at least any two examples of each.
Ans: A channel or
path through which data and information are transmitted between connected
devices in a network environment is called communication media.
Its types are :
1. Guided
(Wired/bounded) communication media - Twisted pair Wire , Co-Axial Cable
2. Unguided
(Wireless/unbounded) communication media - Radio Wave , Micro Wave
b) What do you
mean by Computer Security? Write any four security measures (mechanisms) of
Hardware Security.
Ans: Computer security refers to protecting computer and its content from
damage, theft or misuse and action to prevent such incidents.
Any four security measures
(mechanisms) of Hardware Security are:
a)
Regular
Maintenance
b)
Insurance
c)
Dust
free environment
d)
Power
Protection device (Volt guard, Spike guard, UPS)
c) Define Virtual
Reality. Write its application area.
Ans: Virtual
Reality (VR) is the use of computer technology to create a simulated
environment that doesn’t actually exist, that can give a feel of near real
world with all or some of senses experiencing the virtually simulated
environment.
Its application
areas are:
·
Gaming- VR Gaming
allows players to immerse (dip) themselves in virtual world and interact with
environment and characters
·
Education - VR can help students learn by making the content
more engaging and memorable.
d) What is Digital
Citizenship? List any four elements (themes) of Digital Citizenship.
Ans: Digital citizenship
refers to the responsible and ethical use of technology and the internet which
involves understanding, practicing, and promoting appropriate behavior when
using digital tools and resources.
Any four elements
(themes) of Digital Citizenship are:
lDigital Access:
The state of full electronic participation in society
l Digital Commerce:
The act of promoting the purchase of goods through electronic means
l Digital
Communication: Electronic exchange of information
l Digital literacy:
Teaching and learning about teaching and technology
e) List the types
of E-Commerce. Describe any one of them.
Ans: The types of Ecommerce Models are:
Business to Consumer (B2C):
Business to Business (B2B):
Consumer to Consumer (C2C):
Consumer to Business (C2B):
Business to Consumer (B2C):
The most common type of E-Commerce is
Business-to-Consumer. B2C establishes the electronic business relationships
between a business organization (merchant) and final consumers.
(e.g. You buy a pair of shoes from an online retailer)
Amazon. com is a good example of B2C e-commerce.
f) What is
MS-Access ? List any two features of MS-Access
Ans: MS-Access is
a relational database management system developed by Microsoft Corporation
which is used to store and manipulates large volume of data in multiple tables.
Any two features
of Ms-Access are:
a)
It provides the flexible ways to add, edit, delete and
display the related data.
b)
Queries help to view, change and analyse the data
indifferent ways.
g) Define Field
Name. Write any two rules for creating the Field Name
Ans: A field name refers to the name given to
a specific data element within a database table.
Any two rules for
creating the Field Names are:
Field names should clearly describe the data they represent.
Field names should consist of alphanumeric characters and
underscores (_) only.
h) Differentiate
between Form and Report.
The difference
between form and report are:
Form |
Report |
Form
is primarily used for entering data |
Report
is used for presenting the data. |
Form
is also used for displaying records but one record at a time. |
Report
is used for displaying whole records. |
Data
can be modified through the form. |
Data
can not be modified through report. |
Form
is designed to be used on screen. |
Report
are designed to be printed. |
1) What do you
mean by Indexing? Write its importance.
Indexing is a
field property which speeds up searching and sorting of records based on a
field.
Its importance is it helps databases quickly find and
retrieve data, making queries run faster.
5. Write the
output of the following program showing necessary rough: (1\times2=2)
DECLARE SUB SERIES
( )
CLS
CALL SERIES
END
SUB SERIES
A$="NEPAL"
B=1
FOR I=LEN(A$) TO 1
STEP-2
IF B< >3
THEN
PRINT MID$(A$, B,
I)
ELSE
PRINT MID$(A$, 1, I)
END IF
B=B+1
NEXT I
END SUB
Dry Run Table
A$ |
B |
I=LEN(A$) TO 1
STEP-2 |
IS B< >3 ? |
Yes PRINT MID$(A$,
B, I) |
No PRINT MID$(A$,
1, I) |
B=B+1 |
NEPAL |
1 |
5 TO 1 STEP-2
Yes |
1< > 3 Yes |
MID$(NEPAL,1,5) NEPAL |
|
1+1=2 |
|
2 |
3 TO 1 STEP-2 Yes |
2< > 3 Yes |
MID$(NEPAL,2,3) EPA |
|
2+1=3 |
|
3 |
1 TO 1 STEP-2 |
3 < > 3 No
|
|
MID$(NEPAL,1,1) N |
3+1=4 |
|
4 |
-1 TO 1 STEP-2 Loop Exits |
|
|
|
|
The output of the
program is:
NEPAL
EPA
N
6. Rewrite the
program after correcting the bugs:
REM to calculate
the sum of even numbers existing in the set of given numbers.
DECLARE FUNCTION
evenpro(A)
FOR C=1 TO 5
READ N
S=S+evenpro(A)
NEXT C
PRINT Ssum of even
numbers:"; S
DATA 1, 2, 3, 4,
5, 6, 7, 8, 9, 10
END
FUNCTION
evenpro(A)
R=A MOD 2
IF R< >0
THEN
A=evenpro
ENDIF
END FUNCTION
Debugged Program
REM to calculate
the sum of even numbers existing in the set of given numbers.
DECLARE FUNCTION
evenpro(A)
FOR C=1 TO 10
READ N
S=S+evenpro(N)
NEXT C
PRINT “Sum of
even numbers:"; S
DATA 1, 2, 3, 4,
5, 6, 7, 8, 9, 10
END
FUNCTION
evenpro(A)
R=A MOD 2
IF R=0
THEN
evenpro = A
ENDIF
END FUNCTION
7. Read the
following program and answer the following questions:
OPEN
"BUSRIDER.TXT" FOR INPUT AS #1
OPEN "TEMP.TXT"
FOR OUTPUT AS #2
CLS
WHILE NOT EOF (1)
INPUT #1,
STUDENTNAME$, CLASS, BUSCODE, BUSSTOP$
IF UCASE$(BUSSTOP$)
< > UCASE$("KATHMANDU") THEN
WRITE #2,
STUDENTNAME$, CLASS, BUSCODE, BUSSTOP$
PRINT STUDENTNAME$,
CLASS, BUSCODE, BUSSTOP$
END IF
WEND
CLOSE #1 #2
KILL
BUSRIDER.TXT"
NAME
"TEMP.TXT" AS "BUSRIDER TXT”
END
a) What is the
main objective of the program given above?
Ans: The main objective
of the program given above is to delete all those records whose bus stop is
KATHMANDU.
b) Do you get any
problem in above program if "Kill" statement is removed? Give reason.
Ans: Yes, We get problem
in above program if "Kill" statement is removed because if the kill
statement is not used then busrider.txt file won’t be deleted and NAME statement
cannot rename TEMP.TXT to BUSRIDER.TXT because file name is already exists. So,
it can’t be renamed.
|
GROUP-C
(Long Questions-16
Marks)
8.
Calculate/Convert as per the instruction:
a) (111011) × (1010)
- (10111)
c) (ABC85)16= (?)2
b) (11011010)¸ (11101)
d) (986)10=(?)2
|
|||
|
|||
9. a) Write a
QBASIC program that asks radius and calculate Area of Sphere and Volume of
Sphere. Create a USER DEFINED FUNCTION to calculate Volume of Sphere and
SUB-PROGRAM to calculate Area of Sphere. [Hint: AOS-4pir2 and
VOS-4/3pir3
|
DECLARE SUB AREA (R)
DECLARE FUNCTION VOL(R)
CLS
INPUT “Enter Radius”; R
CALL AREA(R)
PRINT “Volume of sphere=”; VOL(R)
END
b) Write a QBASIC
program that asks for Employee name and stores its reverse form into a
sequential data file "Reverse Txt". Make a provision so that user can
input 10 records at each program execution.
OPEN
"REVERSE.TXT" FOR OUTPUT AS #1
CLS
FOR J = 1 TO 10
INPUT "ENTER EMPLOYEE'S NAME"; N$
B$ = " "
FOR I = LEN(N$) TO 1 STEP -1
B$ = B$ + MID$(N$, I, 1)
NEXT I
WRITE #1, B$
NEXT J
CLOSE #1
END
10. Write a
program in C language that asks the value of 3 sides of a triangle then check
whether triangle is Equilateral, Isosceles or Scalene.
#include
<stdio.h>
|
int
main()
{
int side1, side2, side3;
printf("Enter three sides of triangle:
");
scanf("%d%d%d", &side1,
&side2, &side3);
if(side1= =side2 && side2= =side3)
{
printf("Equilateral
triangle.");
}
else if(side1= =side2 || side1= =side3 ||
side2= =side3)
{
printf("Isosceles
triangle.");
}
else
{
printf("Scalene
triangle.");
}
return 0;
}
"Good
Luck"
Great to see the efficiency test results for 2024! If you're looking for reliable hosting solutions to support your projects, be sure to check out Host ever for excellent performance and support.
ReplyDelete