Saturday, March 23, 2024

150 Questions and Answers Collections - Final Revision – Short Questions – Computer Science [18Marks]

 





1.1 Networking & Telecommunications

 

1. What is data communication? Write the basic elements of data communication.

Data communication is the process of transferring data and information between computers and other electronic devices.

The basic elements of data communication are: data (message), sender, medium, receiver and protocol.

  

2. What is computer network?

Computer network is a group of two or more computers and devices connected to each other through wired or wireless media to exchange data and information and share hardware, software and other resources.

 

3. Write any two advantages and disadvantages of computer network.

Any two advantages of computer network are:

1. A network connected computers can share hardware devices such as scanner, printer, hard disk, etc.

2. Networking also provides the facility of data and software backup system.

Any two disadvantages of computer network are:

1. Computer network can be route for computer virus and malware transmission.

2. Skilled manpower is required to manage and operate computer network.

 

4. "Computer network reduces the operation cost". Justify the statement.

Computer Network reduces expenses of an office because computer on a network share different hardware devices like printers, scanners, hard disk etc. And sharing those hardware devices will reduces the expense of an office. For example if there are twenty computers in an office, now for printing the data there is no need to buy twenty printers individually rather than simple network the computer and connect the printer on the network which helps in sharing of the one printer among twenty computers which reduces the cost of buying nineteen printers individually.

 

5. What is Transmission Media? Mention its types with at least any two examples of each.

A channel or path through which data and information are transmitted between connected devices in a network environment is called communication media. Its types are :

1.     Guided (Wired/bounded) communication media - Twisted pair Wire , Co-Axial Cable and fiber optic cable.

2.     Unguided (Wireless/unbounded) communication media - Radio Wave , Micro Wave and satellite communication

 

6. Differentiate between bounded media and unbounded media.

Bounded Media

Unbounded Media

The media which uses cable or wire to transfer data and information among computers are called bounded communication media.

Unbounded communication is a communication channel in which data and information are transferred between two devices without using wire or cable.

Bounded media is used for point-to-point communication.

Unbounded media is generally suited for radio broadcasting in all directions.

 

7. Distinguish between STP and UTP.

UTP (Unshielded Twisted Pair)

STP (Shielded Twisted Pair)

UTP cable is a twisted pair cable with wires that are twisted together

It is enclosed within a foil or mesh shield.

the UTP cable is used to establish the connection within a short distance, like a home or small industry.

Generally, it is used to establish the connection for enterprises over a long distance.

 

 

 

8. Define fiber optic cable. Write any two connectors used in it.

Fiber optics cable is one of the costlier cables used in data communication which uses light to carry a data signal through the cable.

The connectors used in fiber optics are ST Connector (Straight Tip) and FC Connector (Ferrule Connector)

 

9. What is the difference between Switch and Router?

                 Switch

                 Router

-A switch connects devices within a local area network (LAN) and allows them to communicate with each other.

-Switch is used for local communication within a LAN

-Router connects multiple LANs to form a wide area network (WAN) and routes data packets between them.

-Router is used for communication between different LANs or networks.

 

10. Classify computer network on the basis of geographical location and explain it.

Computer network can be classified on the basis of geographical location are LAN, MAN and WAN.

LAN (Local Area Network)

Local Area Network is a network that connects a group of computers in a small geographical area like a room, a building, school, etc. Computer lab networking and cyber networking are examples of LAN.

MAN (Metropolitan Area Network)

Metropolitan Area Network (MAN) is a network of computer spread over a city or town located in the same geographical area . Cable TV network and branches of banks are examples of MAN.

WAN (Wide Area Network)

A wide area network (WAN) is a computer network that covers a large geographical area comprising a region, a country, a continent or even the whole world . Internet, 4G Mobile Broadband Systems and satellite communication are the best examples of WAN.

 

11. Write a type of Computer Network.

The types of computer network are:

LAN (Local Area Network)

MAN (Metropolitan Area Network)

WAN (Wide Area Network)

 

12. Differentiate between LAN and WAN.

 

LAN

WAN

Local Area Network is a network limited within a small area like a room, a building, school, college, etc. generally connected through wire media.

Wide Area Network is a network that is extended to a large area i.e. whoke world in which computers are connected through wireless technology or media as satellite communication

LAN is owned, managed, and used by an individual or an organization. Therefore, it is a private network.

WAN can be either private or public. The Internet is the best example of public WAN.

 

13. Define Network Architecture. List out its types.

Network architecture defines how the computer communicates and interacts with each other on network.

Its types are:

1. Peer to Peer Network

2. Client-Server Network

3. Centralized Network

14. Differentiate between peer to peer and client-server network with figure.

 

client-server network

peer to peer network

The network model where one or more powerful computers (servers) provide the different network services and all other users of computer network (clients) access those services to perform user's tasks is known as client-server network

Peer to peer is a type of network model where all nodes on the network have an equal relationship with each other. It can share data, hardware and software with each other.

It provides central security administration and the network administrator is responsible for data security and other resources management of the network

It lacks centralized network administration, where the network administrator needs to manage security on each computer. It provides no reliable security and might put data in higher risks.

 

15. What is network topology? List any two types of network topology.

Network topology is the inter-connected pattern of network components

Any two types of network topology are bus topology and ring topology.

 

16. Define ring topology. Write its two advantages.

The type of topology in which each computer is connected to another computer with the last one connected to the first is called ring topology.

Any two advantages of ring topology are:

l In this topology all computers, in close loop, act as a client or server to transfer the information.

l Transmitting network is not affected by high traffic or by adding more nodes.

 

17. Write advantages and disadvantages of bus topology.

Advantages of bus topology

l It is cost effective and cable required is least compared to other network topology.

l It is used in small networks and easy to understand.

Disadvantages of bus topology:

l Break/Failure in main cable will make the whole network to malfunction.

l Heavy network traffic or increase in nodes will degrade performance of network.

 

18. Explain about star topology with the help of diagram.

Ans:

The network topology which connects all nodes to central device called hub/switch through a cable is called star topology. It provides fast performance and low network traffic. The failure of one node does not affect the rest of the nodes.

Diagram

 

 

 

 

 

 

 

 

 

 

19. Draw a well labeled diagram of ring topology.

 

 

 

 

 

 

 

 

 

 

 

20. What is Internet? Write down its services.

The worldwide connection of computer networks that use TCP/IP protocols to communicate with one another using wire or wireless media as well as network devices is called the Internet.

The services of internet are: WWW (World Wide Web), E-mail (Electronic mail), FTP (File Transfer Protocol), IRC (internet Relay Chat) etc.

 

21. Write down the advantages of internet.

The advantages of internet are:

a)     Internet has an endless knowledge supply which anyone can access that too free of cost.

b)     Selling and buying has become so easy with the use of internet and it has helped millions to sell and buy their goods online.

c)     Internet has given us E-Mail which is fast, secure and reliable mode of communication.

d)     It makes easy to transfer the file or information.

 

22. Define two major uses of internet.

Any two major uses of internet are:

- The internet is used for sending and receiving emails, instant messaging, video calls, and more.

- The internet is a vast source of information and provides access to a wealth of knowledge and data.

 

23. What is search engine? Write any two popular search engines.

Search engine is the communication program that searches documents on the basis of specified keywords and returns a list of the web links that matches the keywords.

The name of any two popular search engines is google.com and ask.com

 

24. Give any two advantage of E-mail over traditional mail.

Any two advantage of E-mail over traditional mail

Emails can be sent and received almost instantly, allowing for quick communication and faster decision making. Traditional mail, on the other hand, can take several days to arrive.

Emails can be sent from anywhere with an internet connection, and they can be easily organized and stored for future reference. Traditional mail requires physical transportation, which can be inconvenient and time-consuming.

 

25. What is web browser? List any two web browsers.

Web browser is a computer program that access web pages and displays them on the user’s computer.

E.g.,  Mozilla Firefox, Google Chrome, Internet Explorer, opera etc.

 

 

केही गर्न नखोज्ने मान्छेलाई भाग्यले पनि साथ दिदैन

1.2 Ethical and Social Issues in ICT

26. What is computer ethics? Write any two of them.

Computer ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users.

Any two cyber ethics are:

·       Do not use a computer to publish fake information.

·       Do not search the file or record of other people.

 

27. Write any four commandments of computer ethics.

Any four commandments of computer ethics are:

·        You should not use a computer to harm other people.

·        You should not search the file or record of other people.

·        You should not spread false and illegal information.

·        You should not destroy, erase or edit personal or group records.

 

28. What is digital citizenship? List out the major themes of digital citizenship.

Digital citizenship refers to the responsible and ethical use of technology and the internet which involves understanding, practicing, and promoting appropriate behavior when using digital tools and resources.

Major themes of digital citizenship are :

lDigital Access: The state of full electronic participation in society

l Digital Commerce: The act of promoting the purchase of goods through electronic means

l Digital Communication: Electronic exchange of information

l Digital literacy: Teaching and learning about teaching and technology

 

29. Write any two tips to maintain digital reputation.

       i.          Be transparent           ii.          Respond to every review

 

30. What is Digital Footprint? Write any two importance of it.

A digital footprint is the trail of data and information left behind by an individual's online activities which includes social media posts, website visits, online purchases, and other digital engagements.

Any two importance of it are:

It serves as a reflection of our identity, both personally and professionally.

Our digital footprint promotes responsible online behavior: protect our info, respect privacy, and think critically about online content.

 

31. How can you manage your digital footprint?

l Subscribed accounts and unused social media accounts which are no longer in use should be unsubscribed or deleted.

l Ensure the content posted protect your privacy.

l Not to forget that online posts are private.

l To note that parents, teachers and other people can view the content posted.

l Ensure the content posted does not damage yours or others reputation.

 

32. What is cyber bullying? Give any four examples.

Cyberbullying refers to harassment or bullying that takes place through electronic devices and digital platforms, such as the internet, social media, or messaging apps.

Examples of cyber bullying are:

·       Sending rude emails, texts or instant messages online or on the phone

·       Posting hurtful things about someone on social media

·       Taking an embarrassing photo or video and sharing it without permission

·       Pretending to be another person by creating a fake online profile.

33. What is cyber law? Give some examples.

The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

Examples of cyber law are Electronic and Digital Signature Law, Cyber Crime Law, Intellectual property Law, Data Protection and Privacy Law etc.

 

34. List any two objectives of formulating cyber law in Nepal. OR Why is cyber law needed?

- To control cyber-crime and misuse of computer

- To legalize the transaction through electronic media to control various types of electronic frauds

- To punish a person who does criminal activities through electronic means especially on computers.

 

35. What is cyber-crime? Explain any one of them

Cyber crime refers to criminal activities that are carried out using computers, networks and the internet.

Phishing is the fake attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication

 

36. List out any four cybercrimes.

Phishing, software piracy, hacking, pornography

 

37. Write two major uses of IT policy.

IT policies offer clear guidelines for employees on how to use technology in the organization, ensuring they understand what's expected of them.

It sets rules to protect digital assets and data from cyber threats, breaches, and unauthorized access.

 

38. Define social media with its any two opportunities.

Social Media is an online tool that helps us to stay connected with the whole world.

Give example of social media

Examples of social media are facebook, instragram, twitter and youtube.

 

39.  Write about opportunities and threats in social media.

Opportunities of using social media

a)     It creates awareness and innovate the way people live

b)     Social media let us share anything with others around the world.

c)     It keeps us informed about the world.

d)     It creates brand exposure for business to the largest audience.

Threats of using social media

a)     Personal data and privacy can be easily hacked and shared on the internet.

b)     More chances of creating fake accounts.

c)     Negative impact on the health.

d)     Decrease the working efficiency of people.

e)     Spreading false or unreliable information.

 

40. List four ways to stay safe on social networks.

·       Pick strong passwords and update them frequently. 

·       Report harassment or inappropriate content.

·       Pause before you post.

·       Look before you click. 

 

हाम्रो जीवनको उद्देश्य खुशी हुनु हो "- दलाई लामा

 

1.3 Computer Security

41. What is information security? Write any three principles of information security.

Information security is the practice of preventing unauthorized access, use, disclosure, modification, recording or destruction of information.

Any three principles of information security are:

a)     Confidentiality:- Only authorized users can access the data resources and information.

b)     Integrity:- Only authorized users should be able to modify the data when needed.

c)     Availability:- Data should be available to users when needed.

 

42. What is computer security?

Computer security refers to protecting computer and its content from damage, theft or misuse and action to prevent such incidents.

 

43. Define software security. Write any two protection measures for it.

Software security is the protection of computer systems and applications from threats, such as hacking, virus attacks, and unauthorized access, to ensure their confidentiality, integrity, and availability.

Any two protection measures for software security are:

1.     Backup

2.     Password

 

44. Mention any four hardware security measures.

a)     Regular Maintenance

b)     Insurance

c)     Air condition system

d)     Power Protection device (Volt guard, Spike guard, UPS)

 

45. Give some examples of computer security.

Password, Biometric, Firewall, Cryptography etc.

 

46. Write any two measures to protect hardware and explain.

Regular Maintenance

Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages.

Power Protection Device

An electric device that controls electric voltage and provides enough backup to the computer system when there is power failure. Computer needs 220 volts to 240 volts constantly. Some common power protection devices are: UPS, Volt Guard , CVT (Constant Voltage Transformer) etc.

 

47. Write the role of Ups in hardware security.

UPS protects hardware security by controlling fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.

 

48. What is power protection device? Write its role in computer security.

Ans: Power protection device is device that control the voltage fluctuation and supply required amount of power to the respective device. Its role in computer security is to keep data and programs safe.

 

49. What is computer virus? Give some examples.

A computer virus is a destructive program that copies itself and infects a PC, spreading from one file to another, and then from one PC to another when the files are copied or shared. E.g. C-Brain, Frodo, Disk Killer, I Love You etc

 

 

50. Write any four symptoms of computer virus.

a)     Program takes long time to load.

b)     Increased use of disk space and growth in file size.

c)     Corrupting the system data.

d)     Renaming files with different names.

51. What is key logger?

Ans: A keylogger is a type of spyware that can be used to record or track the keystrokes made by a user on a keyboard.

 

52. What is antivirus software? Name any two popular antivirus software.

Antivirus software is a computer program used to prevent, detect, and remove malware.

Any two popular antivirus software are Kaspersky and NOD 32.

 

53. How antivirus helps to secure computer software?

An antivirus helps to secure computer software by detecting and removing malicious software, such as viruses, spyware, and Trojans, that can harm the computer or steal sensitive information.

 

54. What is password? Write any two importance of password protection.

A password is a string of characters including letters, digits, or other symbols which confirms the identity of a user.

Any two importance of password protection are:

1.     Password secures the data by protecting the data from unauthorized access.

2.     We have to keep the password secure and strong so that unauthorized users may not gain access to the resource and misuse it with our identity

 

55. Write the rules to be followed while creating the password?

l Don't use easily guessable the name of a pet, child, family member, birthdays, birthplace, name of a favourite holiday.

l Mix characters, numbers and symbols. Also, mix small and capital letters.

 

56. What is password policy? Write any two important criteria for creating strong password.

A password policy defines the password strength rules that are used to determine whether a new password is valid.

Any two important criteria for creating strong password are:

       i.          Do not keep a password which can be easily guessed such as date of birth, nickname etc.

      ii.          Keep changing you password regularly.

 

57. What is firewall in computer. Write its type.

A firewall is the network security systems that monitors and controls the traffic flow between the Internet and private network on the basis of a set of user-defined rules.

Its Types are:

- Network Firewall: A security system placed between a private internal network and the internet to monitor and control incoming and outgoing network traffic.

- Host-based Firewall: A software program installed on a single computer or device to monitor and control incoming and outgoing network traffic for that specific device.

 

58.  Write its any two uses of firewall.

Firewalls act as a barrier between an internal network and external networks (like the internet). By filtering traffic, they help safeguard sensitive data and critical resources within the network.

Firewalls enforce access control policies by allowing or denying specific types of traffic based on criteria such as IP addresses, ports, protocols, and packet contents.

 

59. What is Cryptography? How encryption helps in data protection?

Cryptography is the practice of securing communication and data by converting it into a code to prevent unauthorized access or manipulation.

Encryption helps in data protection by providing a secure way to store and transmit sensitive information.

 

60. What is Biometric? Write any four areas where it is used.

Ans: Biometrics are physical or behavioral human characteristics that can be used to digitally identify a person to grant access to systems, devices or data.

Any four areas where biometric are used :

Mobile Device Security: secures smartphones and tablets, allowing access only to authorized users.

Cybersecurity: Prevent unauthorized access to sensitive data with multi-factor authentication.

Time and Attendance Tracking: track employee attendance accurately.

Financial Transactions: secure access to accounts and transactions.

 

61. What is biometric verification?

Ans: Biometric verification is a method of confirming an individual's identity by analyzing and measuring unique physical or behavioral characteristics like fingerprints, facial patterns and voice

 

 

हाँस्नुहोस्, किनकि सुन्दर जीवन एक सुन्दर चीज हो यसैमा मुस्कुराउन काफी

" मारलिन मुनरो


 

1.4 E-Commerce

62. What is E-commerce? Explain in short .

Ans: E-commerce refers to the buying and selling of goods or services using the internet. E.g. Amazon, Flipkart, eBay, sastodeal, daraz etc. The main goal of e-commerce is to reduce cost, faster customer response and deliver the better quality service. It makes buying/selling possible 24/7. There are no geographical boundaries for e-business. Anyone can order anything from anywhere at any time.

 

63. Give two differences between E-Commerce and Traditional Commerce.

E-Commerce

Traditional Commerce

E-commerce refers to the commercial transactions or exchange of information, buying or selling product/services electronically with the help of internet.

Traditional commerce refers to the commercial transactions or exchange of information, buying or selling product/services from person to person without use of internet.

In e-commerce delivery of goods takes time.

In traditional commerce delivery of goods is instant.

 

64. Write the importance of e-commerce.

The importance of e-commerce is to reduce cost, lower the product cycle time, faster customer response and deliver the better quality service.

 

65. Write the name of any two E-commerce sites /companies in Nepal.

The name of any two E-commerce sites  are sastodeal and daraz.

 

66. Mention the benefits and limitation of E-Commerce.

Ans: The benefits of E-Commerce are:

It makes buying/selling possible 24/7.

It makes buying selling procedure faster, as well as easy to find products.

The limitations of E-commerce are:

Need to be careful about the quality of product and service delivery.

We cannot do any transaction without Internet access device.

 

67. List the types of E-Commerce. Describe any one of them. The types of Ecommerce Models are:

Business to Consumer (B2C): Business to Business (B2B): Consumer to Consumer (C2C): Consumer to Business (C2B):

 

Business to Consumer (B2C):

The most common type of E-Commerce is Business-to-Consumer. B2C establishes the electronic business relationships between a business organization (merchant) and final consumers. (e.g. You buy a pair of shoes from an online retailer)

Amazon. com is a good example of B2C e-commerce.

 

68. What is M-Commerce? Write any two important services.

M-Commerce refers to the process of buying and selling of goods and services through wireless handheld devices such as smartphones, tablets or personal digital assistants (PDAs).

Any two important services of m-commerce are:

Mobile Shopping: M-commerce enables users to browse, select, and purchase products or services directly from their mobile devices like daraz, hamrobazar, amazon etc.

Mobile Payments: This service involves making payments using mobile device like e-sewa, khalti

69. Write any four examples of M-Commerce.

Any four examples of M-Commerce are:

i) Mobile Banking

ii) Digital wallets

iii) Mobile ticketing

iv) Mobile ordering and food delivery

 

70. Write the difference between E-Commerce and M-Commerce.

 

M-Commerce

E-Commerce

Mobile Commerce in short it is called as m-commerce.

Electronic Commerce in short it is called as e-commerce.

M-commerce activities are performed with the help of mobile devices like smartphones, tablets, PDA’s (Personal Digital Assistant) etc.

E-commerce activities are performed with the help of desktop computers and laptops.

M-commerce is conducted using mobile devices such as smartphones and tablets.

E-commerce is conducted using desktop or laptop computers.

Examples of M-commerce includes mobile banking like paytm, in-app purchasing Amazon mobile app.

Examples of E-commerce includes Amazon, Flipkart, Quikr, Olx websites.

 

 

71. Define online payment with example.

Online payment refers to the payment for buying goods or services through the Internet using different online payment gateway.

Eg: eSewa Nepal, iPay, Khalti, etc.

 

72. Write some different modes of electronic payment.

Some modes of electronic payment are:

a) Credit Card

b) Debit Card

c) Smart Card

e) Electronic Fund Transfer (EFT)

73. Give two examples of digital wallets used in Nepal.

Any two examples of digital wallets used in Nepal are e-sewa and Khalti.

 

 

 

गल्ति गर्नु मान्छे हुनुको प्रमाण हो

 


 

 

1.5 Contemporary Technology

74. What is contemporary technology?

Contemporary technology refers to the latest advancements and inventions that we use in everyday life. 

For example,  smartphones are a contemporary technology. They allow us to do things like call, text, take pictures, browse the web, and use apps, all in one device!

 

75. Define cloud computing with example.

Cloud computing is a technology that allows users to access and use of computing resources, like servers and software, over the internet.

Different examples:

File sharing and data storage: Dropbox

Cybersecurity: Force point

 

76. What are the advantages of cloud computing?

Cloud allows us to quickly and easily access, store information anywhere, anytime in the whole world, using an internet connection.

Cloud computing reduces both hardware and software maintenance costs for organizations.

 

77. Name any two services cloud computing.

Any two services of it are

Infrastructure as a Service (IaaS): Customer can use processing, storage, networking, and other computing resources from cloud service providers to run their software system.

Software as a Service (SaaS): Customer subscribes the software services from a vendor for an annual subscription fee or sometimes free and use it over Internet. Services like Gmail, Google Drive, Office 365 are some of the examples of SaaS.

 

78. What is IoT? Write any two importance of it.

IoT is a system of interrelated computing device to exchange information over a network without human-to-human or human to computer interaction.

Any two importance of IoT are:

·       It reduces the human effort, so it saves a lot of time. 

·       Information is easily accessible from any place at any time on any device. 

·       i) Accessing information is easy.

·       ii) Communication between the connected devices becomes more transparent and easier.

 

79. How does IOT help in our daily life? Explain.

With the use of IOT, accessing information is easy; we can control a device that is miles apart in real time. Communication between the connected devices becomes more transparent and easier.

There are smartwatches and many other wearables that monitor our health conditions on a real-time basis. So if some medical urgency is needed such devices can initiate the necessary actions like alerting the family members, calling an ambulance, etc.

 

80. Write any two areas where virtual reality are used.

Any two areas where virtual reality is used are Gaming and Education and Training.

Its application areas are:

  • It can be used in medical studies to enable students to know the human body structure.
  • It can be used in driving schools as it give a real look of roads and traffic.

·        Gaming- VR Gaming allows players to immerse (dip) themselves in virtual world and interact with environment and characters

·        Education - VR can help students learn by making the content more engaging and memorable.

 

81. Define virtual reality with its characteristics.

Virtual Reality (VR) is the use of computer technology to create a simulated environment that doesn’t actually exist, that can give a feel of near real world with all or some of senses experiencing the virtually simulated environment.

The characteristics of virtual reality are:

VR Gaming allows players to immerse (dip) themselves in virtual world and interact with environment and characters

VR can help students learn by making the content more engaging and memorable.

 

82. Define artificial intelligence (AI). Write any two uses of AI.

Ans: Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and reacts like humans.

Any two uses of AI are

1.     AI can be used to detect fraud in financial transactions, such as credit card fraud.

2.     AI can be used to diagnose diseases more accurately and efficiently than humans can.

3.     Robotics – AI is used in robotics to control robots and make them perform task autonomously.

4.     Gaming - The AI machines can play strategic games like chess, where the machine needs to think of a large number of possible places.

5.      

 

83. "Al is for the aid of people not their against. Explain.

AI is an emerging branch in computer science, which interprets the means and method of making computers think like human beings. AI is for the aid of people not their against. AI reduces labor and operational costs by automating tasks. AI processes and analyzes data faster than humans, leading to quicker decision-making. AI can automate repetitive tasks, saving time and reducing errors. AI systems can work continuously (24/7) without rest.

 

84. "Artificial Intelligence is threat to humans". Give your opinion.

Ans: AI can be a threats to human. AI could become uncontrollable and pose a threat to humanity. This could happen if AI systems become more intelligent than humans and begin to act on their own, without human guidance or control. AI could be used for bad things like cyber attacks or making weapons that can decide on their own who to attack, causing a lot of harm. It's like giving a sharp knife to a toddler - bad idea

 

85. Write any two examples of Al.

Any two examples of Al are: speech recognition (like Siri, Microsoft Cortana, Amazon Echo, Google Home etc.), and self-driving cars.

 

 86. What is mobile computing? Write any four importance of it.

Ans: Mobile computing refers to the use of portable computing devices, such as smartphones, tablets, laptops, and wearables, that allow users to access and transmit data, information, and applications without being tied to a fixed physical location.

Any four importance of it are:

It allows people to work and communicate from anywhere at any time.  

It keeps connected to the Internet, allowing to access information all the times.  

It increases the productivity of users reducing time and cost.  

It is one of the major handheld sources of entertainment for users at present.

87. Why mobile computing is necessary in present time? Write any two importance of it.

Ans: Mobile computing refers to a variety of devices that allow people to access data and information from wherever they are via a mobile device.

Any two importance of mobile computing are:

·       It allows people to work and communicate from anywhere at any time.  

·       It keeps connected to the Internet, allowing to access information all the times.  

88. What is E-Government? Write any two website URL of government of Nepal.

E-Governent is a set of services provided by the government to public via electronic media especially using Internet.

Any two website URL of government of Nepal

https://moecdc.gov.np/ and https://www.nepal.gov.np/

Two examples of e-government are:

Short messaging systems(SMS).

Automated telephone information services

 

89. List the types of E-governance. Describe any one of them.

Ans: The types of E-governance are:

·       Government-to-Citizen(G2C)

·       Government-to-business (G2B)

·       Government-to-Government (G2G)

·       Government-to-Employee (G2E)

Government-to-Citizen(G2C)

G2C-is transaction between the government to citizens. It includes online registration of birth/ death/marriage certificates, filling of income taxes, electricity bills, license renewals etc.

 

90. Write down any four advantages of E-Government.

Ans: Any four advantages of E-Government are:

Citizens can access government services and information conveniently from anywhere. 

It reduces paperwork and manual tasks, which can lead to faster decision-making and service delivery. 

E-governance systems promote transparency by making government actions and decisions visible to the public. 

Cheaper, more effective, and speedy communications

 

91. What is E-Learning? Write some examples of it.

Ans: E-learning is a new concept of delivering digital contents in learner oriented environment using information and communication technology (ICT).

Examples are Virtual Classrooms from Zoom and Google Meet, Online textbooks and eBooks, Video based learning platforms like YouTube etc.

 

92. What is e-banking? Write any two uses of it.

E-banking refers to conduct financial transactions like funds transfer, payment of bills, opening bank accounts online etc via the internet

Any two uses of e-banking are:

·       It saves the time of customers as they can easily access their account with the help of their device.

·       All transactions are recorded & stored digitally. So, the chances of human error are minimized.

 

मानिस ठुलो दिलले हुन्छ, जातले होइन

2. Database Management System

93. What is database? Give any two examples.

A collection of systematically organized inter-related data  which store, organize and retrieve data is called a database. E.g. Dictionary and Telephone Directory.

 

94. What is Computerized database?

A computerized database is an organized collection of structured data stored electronically on a computer system. 

 

95. Write down the advantages of computerized database.

a)    It reduces data redundancy which means duplication of data.

b)    It allows multiple users to access the same data simultaneously.

c)    Large volume of data can be stored and updated easily.

d)    It provides high security of data as well as maintains accurate database.

 

96. What is RDBMS? Give some examples of RDBMS software.

RDBMS is a type of DBMS that uses a relational model to organize and manage data, allowing users to easily retrieve and manipulate it.. Some examples of RDBMS software : MySQL, Oracle, MS Access, MariaDB

 

97. What is DBMS? Write any two advantages of it.

Database management system (DBMS) is a computerized system that stores data, processes them and provides information in an organized form.

Any two advantages of DBMS are:

1.     Large volume of data can be stored and updated easily.

2.     Provides data integrity and security.

3.     It helps to reduce data redundancy which means duplication of data.

 

98. Write any two examples of DBMS.

Any four software of DBMS are : MS-Access, Oracle, Fox pro, dBase etc.

 

99. What is MS Access? Write any two advantages of it.

MS Access is a relational database management system which is used to store and manipulate large volumes of data in the form of table.

Any two advantages of MS Access are:

a)     It provides the flexible ways to add, edit, delete and display the related data.

b)     Queries help to view, change and analyse the data indifferent ways.

100. Write four objects of MS-Access.

Any four objects of MS-Access are Table, Form, Query and Report.

 

101. Write a difference between database and DBMS. Give one example of manual database.

Database

DBMS

A collection of systematically organized inter-related data is called a database.

Database management system (DBMS) is a computerized system that stores data, processes them and provides information in an organized form

Besides computers, databases can even be maintained in physical ledgers, books, or papers.

In a database management system (DBMS), all the records are maintained only on a computer.

In the case of the databases, very less information can be modified at a time.

In the database management system (DBMS), a lot of information can be changed at one time (as it can have many users using it at the same time).

Eg. Dictionary, Marks Ledger, Telephone Directory, Attendance Register etc.

E.g. MS-Access, Oracle, MS-SQL Server, MySQL, PostgreSQL etc

Telephone Directory is an example of manual database.

102. What is key in DBMS? Write any two names of keys available in DBMS.

A key is a field or combination of fields that uniquely identifies each record in a table.

Any two names of keys available in DBMS are primary key and foreign key.

 

103. What is primary key? List any two advantages of it.

A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used to establish relationships between tables and enforce data integrity.

Any two advantages of primary key are:

·       It sets the relationship between tables.

·       It reduces and controls duplication of record in a table

 

104. Why is primary key necessary in record?

A primary key is necessary in a database record because it reduce and control duplication of the record in a table, sets the relationship between tables and identifies each record of a table uniquely.

 

105. Write two examples of primary key fields.

Any two examples of primary key fields are SEE Registration number, Username

 

106. What is data redundancy? How can it be reduced in database?

Data redundancy refers to the repetition of data in a database, where the same data is stored in multiple places.

Data redundancy can be reduced by normalizing the database, eliminating duplicate data and storing it in separate tables, and using foreign keys to establish relationships between the tables.

 

107. What is a foreign key? Write two properties of primary key.

A foreign key in MS Access is a field that establishes a relationship between two tables by referencing the primary key of another table.

Any two properties of primary key are:

It sets the relationship between tables.

It reduces and controls duplication of record in a table

 

108. Differentiate between Primary key and Foreign key with example.

Primary key

Foreign key

A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used to establish relationships between tables and enforce data integrity

A foreign key in MS Access is a field that establishes a relationship between two tables by referencing the primary key of another table

The primary key doesn’t allow null values.

Foreign key accepts multiple null values.

For example, in a table of employees, each employee might have an ID number as their primary key.

For example, in a table of orders, the foreign key might be the customer ID number, linking the orders table to a table of customer information.

  

109. What is data type? What happens while we enter text in number data type?

Data type is an attribute for a field that determines the type of data that can be stored in that field. If we enter text in a numeric field then it display an error message indicating that the data type is incorrect.

 

110. List any four data types of MS-Access. Also mention its function.

Any four data types of MS-Access are:
i) Text - It is used for storing text or combination of text and numbers. It can store up to 255 characters.
ii) Date/Time – Stores date and time
iii) Memo - It is used for storing lengthy text and numbers. It can store up to 65,535 characters.
iv) AutoNumber - Unique value generated by Access for each new record.

 

111. List out the objects of MS-Access. Explain about table.

The objects of MS-Access are table, form, query and report.

Tables are the primary building block of database which stores and manages large volume of data into rows and column. Tables are essential for creating forms, queries, and reports that extract useful insights and information from data. Tables provide security features to restrict access to sensitive data and ensure data privacy

 

112. What is data processing?

Data processing is the method of collecting raw data and translating it into usable information.

 

113. Differentiate between data and information.

 

Data

Information

Raw form of any facts, figures or entities are known as data.

The processed form of data is known as information.

Data alone does not give any meaning.

When the data becomes information it gives meaningful result.

Data does not directly helps in decision making.

Information directly helps in decision making.

For example, Aaradhya, 1000, account, balance etc. are raw data individually does not give any meaning.

For example, Aaradhya has 1000 balance in his bank account. Here Aaradhya, 1000, account, balance all have their significant meaning.

 

114. What is data sorting? List any two advantages of using it.

The process of arranging all the records in a table either ascending or descending order based on field or fields is known as sorting.

Any two advantages of sorting are:

Sorting helps to organize data and make it easier to find and retrieve specific information.

Sorting can save time and improve efficiency by allowing users to quickly access the data they need

 

115. Define filtering.

Filtering is the process of viewing required record of a table that matches the specifies criteria.

 

116. Write any two differences between data sorting and data filtering.

 

Sorting

Filtering

The process of arranging all the records in a table either ascending or descending order based on field or fields is known as sorting.

Filtering is the process of viewing required record of a table that matches the specifies criteria.

Sorting affects the entire dataset.

Filtering only affects the data that is displayed.

Sorting is often used to make data easier to read.

Filtering is used to find specific information.

Sorting can be done in ascending or descending order.

Filtering has various criteria that can be applied.

 

117. Give any two examples of sorting.

Any two examples of data sorting are:

Alphabetical sorting: Sorting a list of names in alphabetical order, such as arranging a phonebook by last name.

Numerical sorting: Sorting a list of numbers in ascending or descending order, such as arranging a list of exam scores from highest to lowest.

 

 

118. How many ways to sort data in MS-Access?

We can sort data in MS-Access by ascending or descending order on numbers or text.

 

119. List the field name from the following table structure.

Symbol No.

Name

Marks

00100200Q

Surya Gurung

85

00100201R

Birendra Sharma

91

 

Ans: The field names are Symbol No., Name and Marks.

 

120. List the field name and records used in the following table structure.

Symbol_No

Name

Marks

001009010

Hari Thapa

85

00100901Q

Binu Sharma

91

Ans:

Field Names = Symbol_No, Name and Marks

Record = 00100900P   Hari Thapa  85   and    00100901Q   Binu Sharma   91

 

121. Define Field Name. Write any two rules for creating the Field Name

A field name refers to the name given to a specific data element within a database table.

Any two rules for creating the Field Names are:

Field names should clearly describe the data they represent.

Field names should consist of alphanumeric characters and underscores (_) only.

 

122. Write a similarity and a difference between Number field type and Currency filed type.

Ans: similarity and a difference between Number field type and Currency field type

Similarity:

Both store numerical values: Both field types are designed to store numerical data.

Difference:

            Currency field type is specialized for handling monetary values by including specific currency formats and precision, whereas the Number field type is more generic and can store any numerical data without currency-specific formatting.

 

123. Define field and record.

A field is a column in a table which contains information about a certain type for all records. Field is a smallest unit of information. E.g.: Name, Address, Telephone

A record is a row in a table which contains information about single items in a database. Record is complete set of information. E.g.: Ram Chabahil 4468790

 

124. Differentiate between fields and records with an examples.

 

Record

Field

A record is a row in a table which contains information about single items in a database.

A field is a column in a table which contains information about a certain type for all records.

Record is complete set of information.

Field is a smallest unit of information.

It is also called tuple.

It is also known as attributes

For example, in Table – Book Records, all the information about a book is record. Here, the combination of Code, Book Name, Level, Author, Year of Publication values forms a record.

For example, in Table – Book Records, Code, Book Name, Level, Author, Year of Publication are the fields of book records table.

125. What are field properties? Name any four of them.

Field Properties sets boundaries on what/how data is entered into table fields. Field size, caption, input mask, validation rule etc are the examples of field properties.

 

126. What are validation text and validation rule?

Validation Text is a field property which displays an error message that appears if the data entered is invalid according to the specified validation rule.

Validation Rule is a field property which is used to limit the values that can be entered into a field.

 

127. Define table in a database? Explain why it is important.

Ans: Table is a database object that stores a collection of related data organized in rows and columns, where each row represents a record and each column represents a field or attribute of that record.

It is important because entire data is managed and kept in a table for the future retrieval process. It makes sure that the information stays accurate and consistent.

 

128. Is table a database?

No, Table is not a database. A table is an object inside a database

 

129. In how many ways we can create a table in Ms Access?

Design view

Datasheet view

Using wizard

 

130. What type of work is done in MS-Access using form and query object.

Form provides graphical interface to view, modify and add data in a table or multiple linked tables.

Query is used to view, retrieve, change and analyze records from a table or multiple linked tables based on specified condition.

 

131. Define form. Write any two uses of it.

Form is one of the MS-Access database objects that is primarily used to create an interface for entering data in a table or multiple linked tables.

Any two uses of form are:

1.     Form displays complete record one at a time, so we can view and modify records using the form.

2.     Forms provides  GUI (Graphical Users Interface) using which users interact with MS-Access database.

3.     Forms provide an easy-to-use interface for data entry and manipulation, improving data accuracy and completeness.

4.     Forms can include validation rules to ensure data quality and prevent errors.

 

134. What is report in MS-Access? Mention the importance of report in database.

Ans: Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing.

The importance of report in database are:

1.     Reports provide a formatted presentation of data that is easy to read and understand.

2.     Reports enable users to summarize, analyze, and visualize data in meaningful ways.

 

135. What is query? List out its types.

Query is an object of database that is used to view, retrieve, change and analyze records from a table or multiple linked tables based on specified condition.

Its types are:

Select query is a type of query which is used to select and display the relevant data from the database.

Action query is a query that makes changes to or removes many records in just one operation. Types of action query are Update, Delete, Append and Make Table query

136. Write any two ways to create query?

Design view and Using wizard

 

137. Why is query object used in MS-Access? Give two reasons.

Queries enable users to retrieve specific data from tables or other data sources, based on specified criteria.

Queries allow users to filter, sort, and group data in meaningful ways.

 

138. What is action query? Write its type.

An action query is a type of query that makes changes to or removes many records in just one operation.

It’s types are :

- Append Query: Adds new records to an existing table.

- Update Query: Modifies existing records in a table.

- Delete Query: Deletes records from a table.

- Make Table Query: Creates a new table based on data from one or more tables.

 

139. Why update query is necessary in Database system? Give reasons

Update Query is used to add, change, delete the information in an existing record. It allows user to update data of a field at once. So, it is necessary in MS Access database system.

 

140. List any two advantages of query.

·       Queries enable users to retrieve specific data from tables or other data sources, based on specified criteria.

·       Queries allow users to filter, sort, and group data in meaningful ways.

 

141. Differentiate between select query and update query.

Select Query

Update Query

- A select query is the most common category which is used to extract specific information from one or more tables in a database.

- The Select query is used to select data from a database.

- Update query is a type of action query which makes global changes to a group of records in one or more tables.

- The Update query is used to update existing records in a table.

 

142. Differentiate between select query and action query.

Select Query

Action Query

Select query is simply used to select and display the relevant data from the database.

An action query is a query that makes changes to or removes many records in just one operation.

It does not make change to database.

It makes change to database.

A query does not save data; rather, it displays information from tables.

Action query allows to preview the query results before performing it, which is a nice feature.

A select query is a database item that presents information in Datasheet view.

Multiple records can be added, updated, or deleted simultaneously using action queries.

 

143. Differentiate between Form and Report.

The difference between form and report are:

Form

Report

Form is primarily used for entering data

Report is used for presenting the data.

Form is also used for displaying records but one record at a

Report is used for displaying whole

time.

records.

Data can be modified through the form.

Data can not be modified through report.

Form is designed to be used on screen.

Report are designed to be printed.

 

 

144. Differentiate between query and report.

Query

Report

Query is an object of database that is used to view, retrieve, change and analyze records from a table or multiple linked tables based on specified condition

Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing

Queries help filter large amounts of data into more manageable quantities.

Reports present data in meaningful formats so that conclusions and information about the data can be more easily seen.

 

 

145. What do you mean by Indexing? Write its importance.

Indexing is a field property which speeds up searching and sorting of records based on a field.

Its importance is it helps databases quickly find and retrieve data, making queries run faster.

 

146. Why caption field property is used in MS-Access?

Caption is a field property which gives alternative name given for any field.

The maximum size for this is 2048 characters.

 

147. What is global variable? How it is declared?

Ans: Variables which are declared outside the procedure and whose values can be accessed from any procedure or module are called global variables.  It is declared by using SHARED, DIM SHARED or COMMON SHARED statement.

 

148. Define built in function? Explain about the use of LEN() function in QBASIC.

Ans: Built-in functions are  readymade functions provided by QBASIC. LEN ( ) function returns the number of characters in a string or the number of bytes required to store a variable.


149. What is passing argument by value in QBasic?

Call by value is a method of calling a procedure in which actual data are passed to the calling procedure module. It is done by enclosing each parameter by a separate parenthesis ( ).

 

 

150. What is passing argument by reference in QBasic?

Call by reference is a method of calling a procedure in which the reference (address) of parameters are passed to the calling procedure module instead of actual value. By default, the parameters are passed using call by reference method

 

 

जीवन हो घाम छाँया
सुख-दुःख दुवै हुन्छ