SEE Computer Science Specification Table 2076, Networking and Telecommunication, Ethical and Social Issues in ICT, Computer Security, E-Commerce, Contemporary Technology, Number System, Database Management System (MS Access), Modular Programming, Sequential File Handling, C Programming Basics, SEE Computer E-Book Grade IX and X
Sunday, March 24, 2024
Saturday, March 23, 2024
150 Questions and Answers Collections - Final Revision – Short Questions – Computer Science [18Marks]
1.1 Networking
& Telecommunications
1. What is data communication? Write
the basic elements of data communication.
Data communication is the process of
transferring data and information between computers and other electronic
devices.
The basic elements of data communication
are: data (message), sender, medium, receiver and protocol.
2. What
is computer network?
3. Write any two advantages and disadvantages of computer
network.
Any two advantages of computer network are:
1. A
network connected computers can share hardware devices such as scanner,
printer, hard disk, etc.
2.
Networking also provides the facility of data and software backup system.
Any two disadvantages of computer network are:
1.
Computer network can be route for computer virus and malware transmission.
2.
Skilled manpower is required to manage and operate computer network.
4. "Computer network reduces the operation cost".
Justify the statement.
Computer Network reduces expenses of an office because computer on
a network share different hardware devices like printers, scanners, hard disk
etc. And sharing those hardware devices will reduces the expense of an office.
For example if there are twenty computers in an office, now for printing the
data there is no need to buy twenty printers individually rather than simple
network the computer and connect the printer on the network which helps in
sharing of the one printer among twenty computers which reduces the cost of
buying nineteen printers individually.
5.
What is Transmission Media? Mention its types with at least any two examples of
each.
A
channel or path through which data and information are transmitted between
connected devices in a network environment is called communication media. Its
types are :
1.
Guided (Wired/bounded) communication
media - Twisted pair Wire , Co-Axial Cable and fiber optic cable.
2.
Unguided (Wireless/unbounded)
communication media - Radio Wave , Micro Wave and satellite communication
6. Differentiate between bounded media and
unbounded media.
Bounded Media |
Unbounded Media |
The media which uses cable or wire to transfer
data and information among computers are called bounded communication media. |
Unbounded communication is a communication
channel in which data and information are transferred between two devices
without using wire or cable. |
Bounded media is used for point-to-point
communication. |
Unbounded media is generally suited for
radio broadcasting in all directions. |
7. Distinguish between STP and UTP.
UTP (Unshielded Twisted Pair) |
STP (Shielded Twisted Pair) |
UTP cable is a twisted pair cable with wires
that are twisted together |
It is enclosed within a foil or mesh
shield. |
the UTP cable is used to establish the
connection within a short distance, like a home or small industry. |
Generally, it is used to establish the
connection for enterprises over a long distance. |
8. Define fiber optic cable. Write any two connectors used in
it.
Fiber
optics cable is one of the costlier cables used in data communication which
uses light to carry a data signal through the cable.
The connectors used in fiber optics are
ST Connector (Straight Tip) and FC Connector (Ferrule Connector)
9. What is the difference between
Switch and Router?
Switch |
Router |
-A switch connects devices within a
local area network (LAN) and allows them to communicate with each other. -Switch is used for local
communication within a LAN |
-Router connects multiple LANs to
form a wide area network (WAN) and routes data packets between them. -Router is used for communication
between different LANs or networks. |
10. Classify computer network on the basis of geographical
location and explain it.
Computer network can be classified on the basis of geographical
location are LAN, MAN and WAN.
LAN (Local Area Network)
Local
Area Network is a network that connects a group of computers in a small
geographical area like a room, a building, school, etc. Computer lab networking
and cyber networking are examples of LAN.
MAN (Metropolitan Area Network)
Metropolitan
Area Network (MAN) is a network of computer spread over a city or town
located in the same geographical area . Cable TV network and branches of
banks are examples of MAN.
WAN (Wide Area Network)
A wide
area network (WAN) is a computer network that covers a large geographical area
comprising a region, a country, a continent or even the whole world . Internet,
4G Mobile Broadband Systems and satellite communication are the best examples
of WAN.
11. Write
a type of Computer Network.
The types of computer network are:
LAN (Local Area Network)
MAN (Metropolitan Area Network)
WAN (Wide Area Network)
12. Differentiate between LAN and WAN.
LAN |
WAN |
Local Area Network is a network limited within a small
area like a room, a building, school, college, etc. generally connected
through wire media. |
Wide Area Network is a network that is extended to a
large area i.e. whoke world in which computers are connected through wireless
technology or media as satellite communication |
LAN is owned, managed, and used by an individual or an
organization. Therefore, it is a private network. |
WAN can be either private or public. The Internet is the
best example of public WAN. |
13. Define Network Architecture. List out its types.
Network
architecture defines how the computer communicates and interacts with each
other on network.
Its
types are:
1.
Peer to Peer Network
2.
Client-Server Network
3.
Centralized Network
14. Differentiate between peer to peer
and client-server network with figure.
client-server network |
peer to peer network |
The network model where one or more
powerful computers (servers) provide the different network services and all
other users of computer network (clients) access those services to perform
user's tasks is known as client-server network |
Peer to peer is a type of network model
where all nodes on the network have an equal relationship with each other. It
can share data, hardware and software with each other. |
It
provides central security administration and the network administrator is
responsible for data security and other resources management of the network |
It
lacks centralized network administration, where the network administrator
needs to manage security on each computer. It provides no reliable security
and might put data in higher risks. |
15. What is network topology? List any two types of network topology.
Network
topology is the inter-connected pattern of network components
Any two types of network topology are bus topology and ring topology.
16.
Define ring topology. Write its two advantages.
The
type of topology in which each computer is connected to another computer with
the last one connected to the first is called ring topology.
Any
two advantages of ring topology are:
l In this topology
all computers, in close loop, act as a client or server to transfer the
information.
l Transmitting
network is not affected by high traffic or by adding more nodes.
17. Write advantages and disadvantages of bus topology.
Advantages of bus topology
l It is cost
effective and cable required is least compared to other network topology.
l It is used in
small networks and easy to understand.
Disadvantages of bus topology:
l Break/Failure in
main cable will make the whole network to malfunction.
l Heavy network
traffic or increase in nodes will degrade performance of network.
18. Explain about star topology with the help
of diagram.
Ans:
The network topology which connects all
nodes to central device called hub/switch through a cable is called star
topology. It provides fast performance and low network traffic. The
failure of one node does not affect the rest of the nodes.
Diagram
19. Draw a well labeled diagram of ring topology.
20. What is Internet? Write down its services.
The
worldwide connection of computer networks that use TCP/IP protocols to
communicate with one another using wire or wireless media as well as network
devices is called the Internet.
The services of internet are: WWW (World Wide Web), E-mail
(Electronic mail), FTP (File Transfer Protocol), IRC (internet Relay Chat) etc.
21. Write down the advantages of internet.
The
advantages of internet are:
a) Internet
has an endless knowledge supply which anyone can access that too free of cost.
b) Selling
and buying has become so easy with the use of internet and it has helped
millions to sell and buy their goods online.
c) Internet
has given us E-Mail which is fast, secure and reliable mode of communication.
d) It
makes easy to transfer the file or information.
22. Define two major uses of internet.
Any two major uses of internet are:
- The internet is used for sending and receiving emails, instant
messaging, video calls, and more.
- The internet is a vast source of information and provides access to a
wealth of knowledge and data.
23. What is search engine? Write any two popular search engines.
Search
engine is the communication program that searches documents on the basis of specified
keywords and returns a list of the web links that matches the keywords.
The name of any two popular search engines is google.com and ask.com
24. Give any two advantage of E-mail over traditional mail.
Any two advantage of E-mail over traditional mail
Emails can be sent and received almost instantly, allowing
for quick communication and faster decision making. Traditional mail, on the
other hand, can take several days to arrive.
Emails can be sent from anywhere with an internet
connection, and they can be easily organized and stored for future reference.
Traditional mail requires physical transportation, which can be inconvenient
and time-consuming.
25. What is web browser? List any two
web browsers.
Web browser is a
computer program that access web pages and displays them on the user’s
computer.
E.g., Mozilla
Firefox, Google Chrome, Internet Explorer, opera etc.
केही
गर्न नखोज्ने मान्छेलाई भाग्यले पनि साथ दिदैन ।
1.2 Ethical
and Social Issues in ICT
26. What
is computer ethics? Write any two of them.
Computer ethics is a set of moral principles or code of conducts that
regulate the use of computers systematically without making harm to other users.
Any two
cyber ethics are:
· Do not use a computer to publish fake information.
· Do not search the file or record of other people.
27. Write any four commandments of computer ethics.
Any four commandments of computer ethics are:
· You
should not use a computer to harm other people.
· You
should not search the file or record of other people.
· You
should not spread false and illegal information.
· You
should not destroy, erase or edit personal or group records.
28. What is digital citizenship? List
out the major themes of digital citizenship.
Digital citizenship refers to the
responsible and ethical use of technology and the internet which involves
understanding, practicing, and promoting appropriate behavior when using
digital tools and resources.
Major themes of digital citizenship
are :
lDigital Access: The state of full electronic
participation in society
l Digital Commerce: The act of promoting the purchase of
goods through electronic means
l Digital Communication: Electronic exchange of
information
l Digital literacy: Teaching and learning about teaching
and technology
29. Write any two tips to maintain digital reputation.
i. Be
transparent ii. Respond
to every review
30. What
is Digital Footprint? Write any two importance of it.
A digital footprint is the trail of data and information left behind by
an individual's online activities which includes social media posts, website
visits, online purchases, and other digital engagements.
Any two importance of it are:
It serves as a reflection of our identity, both
personally and professionally.
Our digital footprint promotes responsible
online behavior: protect our info, respect privacy, and think critically about
online content.
31. How can you manage your digital footprint?
l Subscribed
accounts and unused social media accounts which are no longer in use should be
unsubscribed or deleted.
l Ensure the
content posted protect your privacy.
l Not to forget
that online posts are private.
l To note that
parents, teachers and other people can view the content posted.
l Ensure the
content posted does not damage yours or others reputation.
32. What is cyber bullying? Give any four examples.
Cyberbullying
refers to harassment or bullying that takes place through
electronic devices and digital platforms, such as the internet, social media,
or messaging apps.
Examples
of cyber bullying are:
· Sending rude emails, texts or instant messages
online or on the phone
· Posting hurtful things about someone on social
media
· Taking an embarrassing photo or video and sharing
it without permission
· Pretending to be another person by creating a fake
online profile.
33. What is cyber law? Give some examples.
The
law which governs the legal issues in the cyber space regarding the internet or
WWW for digital data processing and transaction is called cyber law.
Examples of cyber law are Electronic and Digital Signature
Law, Cyber Crime Law, Intellectual property Law, Data Protection and Privacy
Law etc.
34. List any two objectives of formulating cyber law in
Nepal. OR Why is cyber law needed?
- To control cyber-crime and misuse of
computer
- To legalize the transaction through electronic media to
control various types of electronic frauds
- To punish a person who does criminal activities through
electronic means especially on computers.
35. What is cyber-crime? Explain any one of them
Cyber
crime refers to criminal activities that are carried out using computers,
networks and the internet.
Phishing
is the fake attempt to obtain sensitive information such as usernames,
passwords and credit card details by disguising oneself as a trustworthy entity
in an electronic communication
36. List out any four cybercrimes.
Phishing, software piracy, hacking, pornography
37. Write
two major uses of IT policy.
IT policies offer clear guidelines for
employees on how to use technology in the organization, ensuring they
understand what's expected of them.
It sets rules to protect digital assets and
data from cyber threats, breaches, and unauthorized access.
38. Define social media with its any two
opportunities.
Social Media is an online tool that helps us to stay connected
with the whole world.
Give example of social
media
Examples of social media are facebook, instragram, twitter and
youtube.
39. Write about opportunities and threats in
social media.
Opportunities of using social media
a) It creates awareness and innovate
the way people live
b) Social media let us share
anything with others around the world.
c) It keeps us informed
about the world.
d) It creates brand exposure
for business to the largest audience.
Threats of using social media
a) Personal data and privacy
can be easily hacked and shared on the internet.
b) More chances of creating
fake accounts.
c) Negative impact on the
health.
d) Decrease the working
efficiency of people.
e) Spreading false or
unreliable information.
40.
List four ways to stay safe on social networks.
· Pick strong passwords and
update them frequently.
· Report harassment or
inappropriate content.
· Pause before you post.
· Look before you click.
हाम्रो
जीवनको उद्देश्य खुशी हुनु हो ।"- दलाई लामा
1.3 Computer Security
41. What is information security? Write any three
principles of information security.
Information
security is the practice of preventing unauthorized access, use, disclosure,
modification, recording or destruction of information.
Any
three principles of information security are:
a)
Confidentiality:-
Only authorized users can access the data resources and information.
b)
Integrity:-
Only authorized users should be able to modify the data when needed.
c)
Availability:-
Data should be available to users when needed.
42. What is computer security?
Computer security refers to protecting computer and its
content from damage, theft or misuse and action to prevent such incidents.
43. Define software security. Write any two protection measures for it.
Software security is the protection of computer systems and applications
from threats, such as hacking, virus attacks, and unauthorized access, to
ensure their confidentiality, integrity, and availability.
Any two protection measures for software security are:
1.
Backup
2.
Password
44. Mention any four hardware security measures.
a) Regular
Maintenance
b) Insurance
c) Air
condition system
d) Power
Protection device (Volt guard, Spike guard, UPS)
45. Give some examples of computer security.
Password, Biometric, Firewall, Cryptography etc.
46. Write any two measures to protect hardware and explain.
Regular Maintenance
Computer
system need regular maintenance to keep the computer hardware in good working
condition and it also helps to find out problems in hardware and correct the
problems before they cause several damages.
Power Protection Device
An
electric device that controls electric voltage and provides enough backup to
the computer system when there is power failure. Computer needs 220 volts to
240 volts constantly. Some common power protection devices are: UPS, Volt Guard
, CVT (Constant Voltage Transformer) etc.
47. Write the role of Ups in hardware
security.
UPS
protects hardware security by controlling fluctuation of electric voltage and
provides enough backup electric power to the computer system when there is
power failure.
48. What is power protection device? Write its role in
computer security.
Ans: Power protection device is device that control the
voltage fluctuation and supply required amount of power to the respective
device. Its role in computer security is to keep data and programs safe.
49. What is computer virus? Give some examples.
A
computer virus is a destructive program that copies itself and infects a PC,
spreading from one file to another, and then from one PC to another when the
files are copied or shared. E.g. C-Brain, Frodo, Disk Killer, I
Love You etc
50. Write any four symptoms of computer virus.
a)
Program takes long time to load.
b)
Increased use of disk space and growth in file size.
c)
Corrupting the system data.
d)
Renaming files with different names.
51. What is key logger?
Ans: A keylogger is a type of spyware that can be used to
record or track the keystrokes made by a user on a keyboard.
52. What is antivirus software? Name any two popular antivirus software.
Antivirus
software is a computer program used to prevent, detect, and remove malware.
Any two popular antivirus software are
Kaspersky and NOD 32.
53. How antivirus helps to secure computer software?
An antivirus helps to secure computer software by detecting
and removing malicious software, such as viruses, spyware, and Trojans, that
can harm the computer or steal sensitive information.
54. What is password? Write any two importance of password protection.
A
password is a string of characters including letters, digits, or other symbols
which confirms the identity of a user.
Any two importance of password protection are:
1.
Password secures the data by protecting the data from
unauthorized access.
2.
We have to keep the password secure and strong so that
unauthorized users may not gain access to the resource and misuse it with our
identity
55. Write the rules to be followed while creating the password?
l Don't use easily guessable the
name of a pet, child, family member, birthdays, birthplace, name of a favourite
holiday.
l Mix characters, numbers and
symbols. Also, mix small and capital letters.
56. What is password policy? Write any two important
criteria for creating strong password.
A password policy defines the password strength rules that
are used to determine whether a new password is valid.
Any two important criteria for creating strong password
are:
i. Do
not keep a password which can be easily guessed such as date of birth, nickname
etc.
ii. Keep
changing you password regularly.
57. What is firewall in computer. Write its type.
A firewall is the network security systems that monitors
and controls the traffic flow between the Internet and private network on the
basis of a set of user-defined rules.
Its Types are:
- Network Firewall: A security system placed between a private internal
network and the internet to monitor and control incoming and outgoing network
traffic.
- Host-based Firewall: A software program installed on a single computer
or device to monitor and control incoming and outgoing network traffic for that
specific device.
58. Write its any two uses of firewall.
Firewalls act as a barrier between an
internal network and external networks (like the internet). By filtering
traffic, they help safeguard sensitive data and critical resources within the
network.
Firewalls enforce access control policies by
allowing or denying specific types of traffic based on criteria such as IP
addresses, ports, protocols, and packet contents.
59. What is Cryptography? How encryption helps in data
protection?
Cryptography is the practice of securing communication and
data by converting it into a code to prevent unauthorized access or
manipulation.
Encryption helps in data protection by providing a secure
way to store and transmit sensitive information.
60. What is Biometric? Write any four areas where
it is used.
Ans: Biometrics are physical or
behavioral human characteristics that can be used to digitally identify a
person to grant access to systems, devices or data.
Any four areas where biometric are used :
Mobile Device Security: secures smartphones
and tablets, allowing access only to authorized users.
Cybersecurity: Prevent unauthorized access to
sensitive data with multi-factor authentication.
Time and Attendance Tracking: track employee
attendance accurately.
Financial Transactions: secure access to
accounts and transactions.
61. What is biometric verification?
Ans: Biometric verification is a method of confirming an individual's
identity by analyzing and measuring unique physical or behavioral
characteristics like fingerprints, facial patterns and voice
हाँस्नुहोस्, किनकि
सुन्दर जीवन एक सुन्दर चीज हो र यसैमा मुस्कुराउन काफी छ ।
" मारलिन मुनरो
1.4 E-Commerce
62. What is E-commerce? Explain in short .
Ans: E-commerce refers to the buying and
selling of goods or services using the internet. E.g. Amazon, Flipkart, eBay,
sastodeal, daraz etc. The main goal of e-commerce is to reduce cost,
faster customer response and deliver the better quality service. It makes
buying/selling possible 24/7. There are no geographical boundaries for
e-business. Anyone can order anything from anywhere at any time.
63. Give two differences between E-Commerce and Traditional Commerce.
E-Commerce |
Traditional Commerce |
E-commerce
refers to the commercial transactions or exchange of information, buying or
selling product/services electronically with the help of internet. |
Traditional commerce refers to the
commercial transactions or exchange of information, buying or selling
product/services from person to person without use of internet. |
In e-commerce delivery of goods takes time. |
In traditional commerce delivery of goods is instant. |
64. Write the importance of
e-commerce.
The importance of e-commerce is to reduce cost, lower the product cycle time, faster
customer response and deliver the better quality service.
65. Write the name of any two E-commerce sites /companies
in Nepal.
The name of any two E-commerce sites are
sastodeal and daraz.
66. Mention the benefits and limitation of E-Commerce.
Ans: The benefits of E-Commerce are:
It
makes buying/selling possible 24/7.
It makes buying selling procedure faster, as well as easy to find
products.
The limitations of E-commerce are:
Need to be careful about the quality of product and service
delivery.
We cannot do any transaction without Internet access device.
67. List the
types of E-Commerce. Describe any one of them. The types of Ecommerce Models
are:
Business to Consumer (B2C): Business
to Business (B2B): Consumer to Consumer (C2C): Consumer to Business (C2B):
Business to Consumer (B2C):
The most common type of
E-Commerce is Business-to-Consumer. B2C establishes the electronic business
relationships between a business organization (merchant) and final consumers.
(e.g. You buy a pair of shoes from an online retailer)
Amazon. com is a good example of
B2C e-commerce.
68. What
is M-Commerce? Write any two important services.
M-Commerce refers to the process of buying and selling of goods and services through
wireless handheld devices such as smartphones, tablets or personal digital
assistants (PDAs).
Any two important services of m-commerce are:
Mobile Shopping: M-commerce enables users to browse, select, and
purchase products or services directly from their mobile devices like daraz,
hamrobazar, amazon etc.
Mobile Payments: This service involves making payments using
mobile device like e-sewa, khalti
69. Write any four examples of M-Commerce.
Any four examples of M-Commerce are:
i) Mobile Banking
ii) Digital wallets
iii) Mobile ticketing
iv) Mobile ordering and food delivery
70. Write the difference between E-Commerce and M-Commerce.
M-Commerce |
E-Commerce |
Mobile Commerce in short it is called as m-commerce. |
Electronic Commerce in short it is called as e-commerce. |
M-commerce activities are performed with the help of mobile
devices like smartphones, tablets, PDA’s (Personal Digital Assistant) etc. |
E-commerce activities are performed with the help of desktop
computers and laptops. |
M-commerce is conducted using mobile devices such as smartphones
and tablets. |
E-commerce is conducted using desktop or laptop computers. |
Examples of M-commerce includes mobile banking like paytm,
in-app purchasing Amazon mobile app. |
Examples of E-commerce includes Amazon, Flipkart, Quikr, Olx
websites. |
71. Define online payment with example.
Online
payment refers to the payment for buying goods or services
through the Internet using different online payment gateway.
Eg: eSewa Nepal, iPay, Khalti, etc.
72. Write some different modes of
electronic payment.
Some modes of electronic payment are:
a) Credit Card
b) Debit Card
c) Smart Card
e) Electronic Fund Transfer (EFT)
73.
Give two examples of digital wallets used in Nepal.
Any
two examples of digital wallets used in Nepal are e-sewa and Khalti.
गल्ति
गर्नु मान्छे हुनुको प्रमाण हो
1.5 Contemporary Technology
74. What is contemporary technology?
Contemporary technology refers to the latest advancements
and inventions that we use in everyday life.
For example,
smartphones are a contemporary technology. They allow us to do things
like call, text, take pictures, browse the web, and use apps, all in one
device!
75. Define cloud computing with example.
Cloud
computing is a technology that allows users to access and use of computing
resources, like servers and software, over the internet.
Different examples:
File sharing and data storage: Dropbox
Cybersecurity: Force point
76. What are the advantages of cloud computing?
Cloud allows us to quickly and easily access, store
information anywhere, anytime in the whole world, using an internet connection.
Cloud computing reduces both hardware and software
maintenance costs for organizations.
77. Name any two services cloud computing.
Any two services of it are
Infrastructure as a Service (IaaS): Customer can use
processing, storage, networking, and other computing resources from cloud
service providers to run their software system.
Software as a Service (SaaS): Customer subscribes the
software services from a vendor for an annual subscription fee or sometimes
free and use it over Internet. Services like Gmail, Google Drive, Office 365
are some of the examples of SaaS.
78. What
is IoT? Write any two importance of it.
IoT
is a system of interrelated computing device to exchange information over a
network without human-to-human or human to computer interaction.
Any two importance of IoT are:
·
It reduces the human
effort, so it saves a lot of time.
·
Information is
easily accessible from any place at any time on any device.
·
i) Accessing
information is easy.
·
ii) Communication
between the connected devices becomes more transparent and easier.
79. How does IOT help in our daily life? Explain.
With
the use of IOT, accessing information is easy; we can control a device that is
miles apart in real time. Communication between the connected devices becomes
more transparent and easier.
There
are smartwatches and many other wearables that monitor our health
conditions on a real-time basis. So if some medical urgency is needed such
devices can initiate the necessary actions like alerting the family members,
calling an ambulance, etc.
80. Write any two areas where virtual reality are used.
Any two areas where virtual reality is used are Gaming and Education and
Training.
Its application areas are:
- It can be used in medical studies to enable
students to know the human body structure.
- It can be used in driving schools as it give a
real look of roads and traffic.
·
Gaming-
VR Gaming allows players to immerse (dip) themselves in virtual world and
interact with environment and characters
·
Education
- VR can help students learn by making the content more engaging and memorable.
81. Define virtual reality with its
characteristics.
Virtual
Reality (VR) is the use of computer technology to create a simulated
environment that doesn’t actually exist, that can give a feel of near real world
with all or some of senses experiencing the virtually simulated environment.
The characteristics of virtual reality are:
VR Gaming allows players to immerse (dip)
themselves in virtual world and interact with environment and characters
VR can help students learn by making the
content more engaging and memorable.
82. Define artificial intelligence (AI). Write any two uses of AI.
Ans: Artificial intelligence (AI) is an area of computer science
that emphasizes the creation of intelligent machines that work and reacts like
humans.
Any two uses of AI are
1.
AI can be used to detect fraud in financial
transactions, such as credit card fraud.
2.
AI can be used to diagnose diseases more accurately and
efficiently than humans can.
3. Robotics
– AI is used in robotics to control robots and make them perform task
autonomously.
4. Gaming -
The AI machines can play strategic games like chess, where the machine needs to
think of a large number of possible places.
5.
83. "Al is for the aid of people not their against. Explain.
AI
is an emerging branch in computer science, which interprets the means and
method of making computers think like human beings. AI is for the aid of
people not their against. AI reduces labor
and operational costs by automating tasks. AI
processes and analyzes data faster than humans, leading to quicker
decision-making. AI
can automate repetitive tasks, saving time and reducing errors. AI
systems can work continuously (24/7) without rest.
84. "Artificial Intelligence is threat
to humans". Give your opinion.
Ans: AI can be a threats to human. AI could
become uncontrollable and pose a threat to humanity. This could happen if AI
systems become more intelligent than humans and begin to act on their own,
without human guidance or control. AI could be used for bad things like
cyber attacks or making weapons that can decide on their own who to attack,
causing a lot of harm. It's like giving a sharp knife to a toddler - bad idea
85.
Write any two examples of Al.
Any
two examples of Al are: speech recognition (like Siri, Microsoft Cortana,
Amazon Echo, Google Home etc.), and self-driving cars.
86. What is mobile computing?
Write any four importance of it.
Ans: Mobile computing refers to the
use of portable computing devices, such as smartphones, tablets, laptops, and
wearables, that allow users to access and transmit data, information, and
applications without being tied to a fixed physical location.
Any four importance of it are:
It allows people to work and communicate from anywhere at any
time.
It keeps connected to the Internet, allowing to access information
all the times.
It increases the productivity of users reducing time and
cost.
It is one of the major handheld sources of entertainment for users
at present.
87. Why mobile computing is necessary
in present time? Write any two importance of it.
Ans: Mobile
computing refers to a variety of devices that allow people to access data and
information from wherever they are via a mobile device.
Any two importance of mobile computing
are:
· It allows
people to work and communicate from anywhere at any time.
· It keeps
connected to the Internet, allowing to access information all the times.
88. What is E-Government? Write any two website URL of
government of Nepal.
E-Governent is a set of services provided
by the government to public via electronic media especially using Internet.
Any two website URL of government of Nepal
https://moecdc.gov.np/ and
https://www.nepal.gov.np/
Two examples of e-government are:
Short messaging systems(SMS).
Automated telephone information services
89. List the types of E-governance. Describe any one of
them.
Ans: The types of E-governance are:
· Government-to-Citizen(G2C)
· Government-to-business (G2B)
· Government-to-Government (G2G)
· Government-to-Employee (G2E)
Government-to-Citizen(G2C)
G2C-is
transaction between the government to citizens. It includes online registration
of birth/ death/marriage certificates, filling of income taxes, electricity
bills, license renewals etc.
90. Write down any four advantages of
E-Government.
Ans: Any four advantages of E-Government are:
Citizens can access government services and information
conveniently from anywhere.
It reduces paperwork and manual tasks, which can lead to
faster decision-making and service delivery.
E-governance systems promote transparency by making
government actions and decisions visible to the public.
Cheaper, more effective, and speedy
communications
91. What is E-Learning? Write some examples of it.
Ans: E-learning is a new concept of delivering digital
contents in learner oriented environment using information and communication
technology (ICT).
Examples are Virtual Classrooms from Zoom and Google Meet,
Online textbooks and eBooks, Video based learning platforms like YouTube etc.
92. What is e-banking? Write any two uses of it.
E-banking refers to conduct
financial transactions like funds transfer, payment of bills, opening bank
accounts online etc via the internet
Any two uses of e-banking are:
·
It
saves the time of customers as they can easily access their account with the
help of their device.
·
All
transactions are recorded & stored digitally. So, the chances of human
error are minimized.
मानिस
ठुलो दिलले हुन्छ, जातले होइन
2. Database Management
System
93. What
is database? Give any two examples.
A
collection of systematically organized inter-related data which store, organize and retrieve data is
called a database. E.g. Dictionary and Telephone Directory.
94. What
is Computerized database?
A computerized database is an organized
collection of structured data stored electronically on a computer system.
95. Write down the advantages of computerized
database.
a) It reduces data redundancy which
means duplication of data.
b) It allows multiple users to
access the same data simultaneously.
c) Large volume of data can be
stored and updated easily.
d) It provides high security of
data as well as maintains accurate database.
96. What is RDBMS? Give some examples of RDBMS software.
RDBMS
is a type of DBMS that uses a relational model to organize and manage data,
allowing users to easily retrieve and manipulate it.. Some examples of
RDBMS software : MySQL,
Oracle, MS Access, MariaDB
97. What is DBMS? Write any two advantages of it.
Database
management system (DBMS) is a computerized system that stores data, processes
them and provides information in an organized form.
Any two advantages of DBMS are:
1.
Large volume of data can be stored and updated easily.
2.
Provides data integrity and security.
3.
It helps to reduce
data redundancy which means duplication of data.
98. Write any two examples of DBMS.
Any four software of DBMS are : MS-Access, Oracle, Fox
pro, dBase etc.
99. What is MS Access? Write any two advantages of it.
MS Access is a relational database management system which
is used to store and manipulate large volumes of data in the form of table.
Any two advantages of MS Access are:
a) It
provides the flexible ways to add, edit, delete and display the related data.
b) Queries
help to view, change and analyse the data indifferent ways.
100. Write four objects of MS-Access.
Any four objects of MS-Access are Table, Form, Query and Report.
101.
Write a difference between database and DBMS. Give one example of manual
database.
Database |
DBMS |
A collection of systematically organized inter-related data is
called a database. |
Database management system (DBMS) is a computerized system that
stores data, processes them and provides information in an organized form |
Besides computers, databases can even be maintained in physical
ledgers, books, or papers. |
In a database management system (DBMS), all the records are
maintained only on a computer. |
In the case of the databases, very less information can be
modified at a time. |
In the database management system (DBMS), a lot of information
can be changed at one time (as it can have many users using it at the same
time). |
Eg. Dictionary, Marks Ledger, Telephone Directory, Attendance
Register etc. |
E.g. MS-Access, Oracle, MS-SQL Server, MySQL, PostgreSQL etc |
Telephone Directory is an example of manual database.
102. What
is key in DBMS? Write any two names of keys available in DBMS.
A key is
a field or combination of fields that uniquely identifies each record in a
table.
Any two
names of keys available in DBMS are primary key and foreign key.
103. What
is primary key? List any two advantages of it.
A
primary key is a field or combination of fields in a table that uniquely
identifies each record, and is used to establish relationships between tables
and enforce data integrity.
Any two advantages of primary key are:
·
It sets the relationship between tables.
·
It reduces and controls duplication of record in
a table
104. Why is primary key necessary in record?
A primary key is necessary in a database record because it reduce and control
duplication of the record in a table, sets the relationship between tables and
identifies each record of a table uniquely.
105. Write two examples of primary key fields.
Any two examples of primary key fields are SEE Registration
number, Username
106. What is data redundancy? How can it be reduced in
database?
Data redundancy refers to the repetition of data in a database,
where the same data is stored in multiple places.
Data redundancy can be reduced by
normalizing the database, eliminating duplicate data and storing it in separate
tables, and using foreign keys to establish relationships between the tables.
107.
What is a foreign key? Write two properties of primary key.
A
foreign key in MS Access is a field that establishes a relationship between two
tables by referencing the primary key of another table.
Any
two properties of primary key are:
It sets the
relationship between tables.
It reduces and
controls duplication of record in a table
108. Differentiate between Primary key
and Foreign key with example.
Primary key |
Foreign key |
A primary key is a field or combination of
fields in a table that uniquely identifies each record, and is used to
establish relationships between tables and enforce data integrity |
A foreign key in MS Access is a field that
establishes a relationship between two tables by referencing the primary key
of another table |
The primary key doesn’t allow null
values. |
Foreign key accepts multiple null
values. |
For example, in a table of
employees, each employee might have an ID number as their primary key. |
For example, in a table of orders,
the foreign key might be the customer ID number, linking the orders table to
a table of customer information. |
109. What is data type? What happens while we enter text in
number data type?
Data type is an attribute for a
field that determines the type of data that can be stored in that field. If we enter
text in a numeric field then it display an error message indicating that the
data type is incorrect.
110. List any four data types of MS-Access. Also mention its
function.
Any
four data types of MS-Access are:
i) Text - It is used for storing text or combination of text and
numbers. It can store up to 255 characters.
ii) Date/Time – Stores date and time
iii) Memo - It is used for storing lengthy text and numbers. It can store up to
65,535 characters.
iv) AutoNumber - Unique value generated by Access for each new record.
111. List out the objects of MS-Access. Explain about table.
The objects of MS-Access are table, form, query and report.
Tables
are the primary building block of database which stores and manages large
volume of data into rows and column. Tables
are essential for creating forms, queries, and reports that extract useful
insights and information from data. Tables provide security features to
restrict access to sensitive data and ensure data privacy
112. What is data processing?
Data processing is the method of collecting raw data and
translating it into usable information.
113. Differentiate between data and information.
Data |
Information |
Raw form of any facts, figures or entities are known as
data. |
The processed form of data is known as information. |
Data alone does not give any meaning. |
When the data becomes information it gives meaningful
result. |
Data does not directly helps in decision making. |
Information directly helps in decision making. |
For example, Aaradhya, 1000, account, balance etc. are
raw data individually does not give any meaning. |
For example, Aaradhya has 1000 balance in his bank
account. Here Aaradhya, 1000, account, balance all have their significant
meaning. |
114. What
is data sorting? List any two advantages of using it.
The
process of arranging all the records in a table either ascending or descending
order based on field or fields is known as sorting.
Any two advantages of sorting are:
Sorting helps to organize data and make it easier to find
and retrieve specific information.
Sorting can save
time and improve efficiency by allowing users to quickly access the data they
need
115. Define filtering.
Filtering is the process of viewing required
record of a table that matches the specifies criteria.
116.
Write any two differences between data sorting and data filtering.
Sorting |
Filtering |
The process of arranging all the records in a table either
ascending or descending order based on field or fields is known as sorting. |
Filtering is the process of viewing required record of a table
that matches the specifies criteria. |
Sorting affects the entire dataset. |
Filtering only affects the data that is displayed. |
Sorting is often used to make data easier to read. |
Filtering is used to find specific information. |
Sorting can be done in ascending or descending order. |
Filtering has various criteria that can be applied. |
117. Give any two examples of sorting.
Any two examples of data sorting are:
Alphabetical sorting: Sorting a list of names in alphabetical order, such
as arranging a phonebook by last name.
Numerical sorting: Sorting a list of numbers in ascending or descending
order, such as arranging a list of exam scores from highest to lowest.
118. How many ways to sort data in MS-Access?
We can sort data in MS-Access by ascending or
descending order on numbers or text.
119. List the field name from the following table structure.
Symbol No. |
Name |
Marks |
00100200Q |
Surya Gurung |
85 |
00100201R |
Birendra Sharma |
91 |
Ans: The field names are Symbol
No., Name and Marks.
120. List the field name and records used in the following table
structure.
Symbol_No |
Name |
Marks |
001009010 |
Hari Thapa |
85 |
00100901Q |
Binu Sharma |
91 |
Ans:
Field Names = Symbol_No, Name and Marks
Record = 00100900P Hari
Thapa 85 and 00100901Q Binu
Sharma 91
121.
Define Field Name. Write any two rules for creating the Field Name
A field name refers to the name given to a
specific data element within a database table.
Any two rules for creating the Field Names are:
Field names should clearly describe the data
they represent.
Field names should consist of alphanumeric
characters and underscores (_) only.
122. Write a similarity and a difference between Number
field type and Currency filed type.
Ans: similarity and a
difference between Number field type and Currency field type
Similarity:
Both
store numerical values: Both field types are designed to store numerical
data.
Difference:
Currency
field type is specialized for handling monetary values by including specific
currency formats and precision, whereas the Number field type is more generic
and can store any numerical data without currency-specific formatting.
123. Define field and record.
A
field is a column in a table which contains information about a certain type
for all records. Field is a smallest unit of information. E.g.: Name, Address, Telephone
A
record is a row in a table which contains information about single items in a
database. Record is complete set of information. E.g.:
Ram Chabahil 4468790
124. Differentiate between fields and records with an
examples.
Record |
Field |
A record is a row in a table which contains information
about single items in a database. |
A field is a column in a table which contains information
about a certain type for all records. |
Record is complete set of information. |
Field is a smallest unit of information. |
It is also called tuple. |
It is also known as attributes |
For example, in Table – Book Records, all the information
about a book is record. Here, the combination of Code, Book Name, Level,
Author, Year of Publication values forms a record. |
For example, in Table – Book Records, Code, Book Name,
Level, Author, Year of Publication are the fields of book records table. |
125. What are field properties? Name any four of them.
Field Properties sets boundaries on what/how data is
entered into table fields. Field size, caption, input mask, validation rule etc
are the examples of field properties.
126. What are validation text and validation rule?
Validation
Text is a field property which displays an error message that appears if the
data entered is invalid according to the specified validation rule.
Validation
Rule is a field property which is used to limit the values that can be entered
into a field.
127. Define table in a database? Explain why
it is important.
Ans: Table is a database object that
stores a collection of related data organized in rows and columns, where each
row represents a record and each column represents a field or attribute of that
record.
It is important because entire data is
managed and kept in a table for the future retrieval process. It makes sure
that the information stays accurate and consistent.
128. Is table a database?
No, Table is not a database. A table is an object inside a database.
129. In how many ways we can create a
table in Ms Access?
Design view
Datasheet view
Using wizard
130. What
type of work is done in MS-Access using form and query object.
Form
provides graphical interface to view, modify and add data in a table or
multiple linked tables.
Query
is used to view, retrieve, change and analyze records from a table or multiple
linked tables based on specified condition.
131. Define form. Write any two uses of it.
Form
is one of the MS-Access database objects that is primarily used to create an
interface for entering data in a table or multiple linked tables.
Any two uses of form are:
1.
Form displays complete record one at a time, so we can
view and modify records using the form.
2.
Forms provides
GUI (Graphical Users Interface) using which users interact with
MS-Access database.
3. Forms
provide an easy-to-use interface for data entry and manipulation, improving
data accuracy and completeness.
4. Forms
can include validation rules to ensure data quality and prevent errors.
134. What is report in MS-Access? Mention the importance of report in
database.
Ans: Report
is one of the MS-Access database objects used to present information in an
effective and organized format that is ready for printing.
The importance of report in database are:
1. Reports
provide a formatted presentation of data that is easy to read and understand.
2. Reports
enable users to summarize, analyze, and visualize data in meaningful ways.
135. What is query? List out its types.
Query
is an object of database that is used to view, retrieve, change and analyze
records from a table or multiple linked tables based on specified condition.
Its
types are:
Select
query is a type of query which is used to select and display the
relevant data from the database.
Action
query
is a query that makes changes to or removes many records in just one operation.
Types of action query are Update, Delete, Append and Make Table query
136. Write any two ways to create query?
Design view and Using wizard
137. Why is query object used in MS-Access? Give two
reasons.
Queries enable users to retrieve specific data from tables
or other data sources, based on specified criteria.
Queries allow users to filter, sort, and group data in
meaningful ways.
138. What is action query? Write its
type.
An action query is a type of query that makes changes to or removes many records in just one
operation.
It’s types are :
- Append Query: Adds new records to an existing table.
- Update Query: Modifies existing records in a table.
- Delete Query: Deletes records from a table.
- Make Table Query: Creates a new table based on data from
one or more tables.
139. Why update query is necessary in Database system? Give
reasons
Update Query is used to add, change, delete the information
in an existing record. It allows user to update data of a field at once. So, it
is necessary in MS Access database system.
140. List any two advantages of query.
· Queries enable users to retrieve
specific data from tables or other data sources, based on specified criteria.
· Queries allow users to filter, sort,
and group data in meaningful ways.
141. Differentiate between select query and update query.
Select Query |
Update Query |
- A select query is the most common category which is used to extract
specific information from one or more tables in a database. - The Select query is used to select data from a database. |
- Update query is a type of action query which makes global changes to
a group of records in one or more tables. - The Update query is used to update existing records in a table. |
142. Differentiate between select query and action query.
Select
Query |
Action
Query |
Select
query is simply used to select and display the relevant data from the
database. |
An
action query is a query that makes changes to or removes many records in just
one operation. |
It
does not make change to database. |
It
makes change to database. |
A
query does not save data; rather, it displays information from tables. |
Action
query allows to preview the query results before performing it, which is a
nice feature. |
A
select query is a database item that presents information in Datasheet view. |
Multiple
records can be added, updated, or deleted simultaneously using action
queries. |
143.
Differentiate between Form and Report.
The difference between form and report are:
Form |
Report |
Form is primarily used for entering data |
Report is used for presenting the data. |
Form is also used for displaying records but one record at
a |
Report is used for displaying whole |
time. |
records. |
Data can be modified through the form. |
Data can not be modified through report. |
Form is designed to be used on screen. |
Report are designed to be printed. |
144.
Differentiate between query and report.
Query |
Report |
Query is an object of database that is used to view, retrieve, change
and analyze records from a table or multiple linked tables based on specified
condition |
Report is one of the MS-Access database objects used to present
information in an effective and organized format that is ready for printing |
Queries help filter large amounts of
data into more manageable quantities. |
Reports present data in meaningful
formats so that conclusions and information about the data can be more easily
seen. |
145.
What do you mean by Indexing? Write its importance.
Indexing is a field property which speeds up searching and
sorting of records based on a field.
Its
importance is it helps databases quickly find and retrieve data, making queries
run faster.
146. Why caption field property is used in
MS-Access?
Caption is a field property which gives
alternative name given for any field.
The maximum size for this is 2048 characters.
147. What is global variable? How it is
declared?
Ans: Variables which are declared outside the
procedure and whose values can be accessed from any procedure or module are
called global variables. It is declared by using SHARED, DIM SHARED or
COMMON SHARED statement.
148. Define built in function? Explain about
the use of LEN() function in QBASIC.
Ans: Built-in functions are readymade
functions provided by QBASIC. LEN ( ) function returns the number of characters
in a string or the number of bytes required to store a variable.
149.
What is passing argument by value in QBasic?
Call by value is a
method of calling a procedure in which actual data are passed to the calling
procedure module. It is done by enclosing each parameter by a separate
parenthesis ( ).
150.
What is passing argument by reference in QBasic?
Call by reference is
a method of calling a procedure in which the reference (address) of parameters
are passed to the calling procedure module instead of actual value. By default,
the parameters are passed using call by reference method
जीवन हो घाम छाँया
सुख-दुःख दुवै हुन्छ