SEE Computer Science Specification Table 2076, Networking and Telecommunication, Ethical and Social Issues in ICT, Computer Security, E-Commerce, Contemporary Technology, Number System, Database Management System (MS Access), Modular Programming, Sequential File Handling, C Programming Basics, SEE Computer E-Book Grade IX and X
Tuesday, December 17, 2024
Friday, December 13, 2024
SOLVED PABSON, Lalitpur SEE PRE-QUALIFYING EXAMINATION-2081 Subject-Opt II. Computer Science
PABSON,
Lalitpur
SEE
PRE-QUALIFYING EXAMINATION-2081
Subject-Opt
II. Computer Science
Time:
3 hrs
Attempt all questions.
Group
A [20 Marks]
1. Answer the following questions
in one sentence: (6x1=6)
a)
What
is hacking?
Hacking is the act of breaking into computer systems or networks without
permission, often to steal, change, or destroy data, or to disrupt operations.
b)
Why
is browser needed?
Browser
is needed to access and view websites on the internet.
c)
Write
two examples of cyber-crime.
Any
two examples of cyber-crime are Phishing
and Hacking
d)
What
are the different data types available in C?
The
different data types available in C are int, char, double and float
e)
Which
data type is used to store paragraph in MS-Access?
The data
type used to store paragraph in MS-Access is Memo.
f)
What
is the use of CALL statement in modular programming?
The use
of CALL statement is to call sub-procedure in modular
programming.
2. Write the technical term for the
following statements:
a)
The
process of transferring data or files from a local device to a remote system,
server, or online platforms. Uploading
b)
The
responsible and ethical use of technology and digital platform to engage,
communicate, and participate in online communities effectively and safely. Digital
Citizenship
3. Write the full forms of the
following:
a)
IRC
- Internet Relay Chat
b)
CCTV
– Closed Circuit Television
Group
B [24 Marks]
4. Answer the following questions:
[9 x 2=18]
a)
What
do you mean by digital footprint? List any two ways to maintain our digital
reputation.
A digital footprint is the trail of data and information left behind by
an individual's online activities which includes social media posts, website
visits, online purchases, and other digital engagements.
Any
two ways to maintain our digital reputation are:
·
Think carefully before
sharing online, as it can be difficult to remove or change once it's posted.
·
Use privacy settings to
choose who can see your posts and keep your personal info, like your phone
number and address, private.
b)
Write
any two advantages and two disadvantages of cloud computing.
Any
two advantages of cloud computing are:
·
It
is easier to get back-up and restore the data.
·
It
reduces both hardware and software maintenance costs for organizations.
Any two disadvantages of cloud
computing are:
·
Storing sensitive data on remote
servers raises privacy issues.
·
Uploading and downloading large
volumes of data can be time-consuming.
c)
What
DBMS? List its two functions.
DBMS
is a computerized system that stores data, processes them and provides
information in an organized form.
Any
two functions are:
·
It
reduces data redundancy which means duplication of data.
·
It
allows multiple users to access the same data simultaneously.
d)
What
do you mean a by field property in MS Access? List any two field properties
with example.
Field
properties are settings or attributes that allow users to control various
aspects of data entry, validation, formatting, and behavior within the database.
Any
two field properties with example are:
·
Field Size - Field size is a field property
which is used to set the maximum size for data stored in the field that is set
to the Text or Number data type.
·
Caption
- Caption is a field property which gives alternative name given for any field.
The maximum size for this is 2048
characters.
e)
What
is form? List its uses.
Form
is one of the MS-Access database objects which provides graphical interface to
view, modify and add data in a table or multiple linked tables.
The
uses of form are:
·
Forms provide an easy-to-use
interface for data entry and manipulation, improving data accuracy and
completeness.
·
Forms can include validation rules
to ensure data quality and prevent errors.
f)
What
is hardware security? List any four methods to protect the data from your
computer.
Any
four methods to protect the data from computer are:
Password,
Backup, Scandisk and Antivirus
g)
What
is bus topology? Mention any two differences between bus and ring topology.
Bus
topology is a network configuration where all devices are connected to a single
central cable known as a "bus".
Any
two differences between bus and ring topology
Bus
Topology |
Ring
Topology |
Data
sent in both directions over a shared cable |
Data
sent in one direction around the ring |
Failure
in the bus can disrupt the entire network |
Single
point of failure can disrupt the network, but can be mitigated with dual
rings |
h)
What
is B2C? Give any two examples of B2C in Nepal.
B2C is
a type of e-commerce model which establishes the electronic business
relationships between a business organization (merchant) and final consumers.
Any
two examples of B2C in Nepal are: Daraz and Hamrobazar.
i)
What
is query? List its types.
Query
is an object of database that is used to view, retrieve, change and analyze
records from a table or multiple linked tables based on specified condition.
Its
types are : Select Query and Action Query
Write the output of the given
program showing the dry run table. (2)
DECLARE SUB test()
CALL test
END
SUB test
X=0
FOR K=10 TO 4 STEP-2
A=K^2
X=X+A
NEXT K
PRINT X
END SUB
X |
K=10 TO 4 STEP-2 |
A=K^2 |
X=X+A |
PRINT X |
|
0 |
10 TO 4 YES |
10^2=100 |
0+100=100 |
|
|
|
8 TO 4 YES |
8^2=64 |
100+64=164 |
|
|
|
6 TO 4 YES |
6^2=36 |
164+36=200 |
|
|
|
10 TO 4 YES |
4^2=16 |
200+16=216 |
|
|
|
2 TO 4 NO LOOP EXITS |
|
|
216 |
|
|
|
|
|
|
|
The output of the program is :
216
6. Re-write the following program
correcting the bug.
REM To copy all data from
sequential data file INFO.DAT to NEWINFO.DAT.
OPEN "INFO.DAT" FOR INPUT
AS #1
OPEN "NEWINFO.DAT" FOR
INPUT AS #2
DO WHILE NOT EOF(1)
LINE INPUT #1, ALL$
COPY #2, ALL$
WEND
FINISH #1,#2
END
Debugged Program
REM To copy all data from
sequential data file INFO.DAT to NEWINFO.DAT.
OPEN "INFO.DAT" FOR INPUT
AS #1
OPEN "NEWINFO.DAT" FOR OUTPUT
AS #2
DO WHILE NOT EOF(1)
LINE INPUT #1, ALL$
WRITE #2, ALL$
LOOP
CLOSE #1,#2
END
7. Read the program given below and
answer the questions that follows.(2)
DECLARE FUNCTION RETURNS(A$)
LINE INPUT "Enter a
Sentence"; S$
PRINT RETURN$(S$)
END
FUNCTION RETURNS(A$)
FOR T=1 TO LEN(A$)
E$= MID$(A$,T,1)
IF E$ SPACE$(1) THEN
R$=E$+R$
END IF
NEXT T
RETURN$=R$
END FUNCTION
Questions:
a) List all the string library
function(s) from the program.
The
string library function(s) from the program are: LEN( ), MID$( ), SPACE$( )
b) How many times loop T execute,
if A$= 'MY PRIDE MY NATION"?
T
execute 18 times, if A$= 'MY PRIDE MY NATION"?
Group C [16 Marks]
8. Convert /Calculate as per the
instructions. (4 x 1)
i. (111101100)2 into octal
Soln:
Converting binary to octal
111 = 7
101 = 5
100 = 4
(111101100)2 = (754)8
ii (401)16 into Decimal
Soln:
(401)₁₆
= (4 × 16²) + (0 × 16¹) + (1 × 16⁰)
= (1025)₁₀
=4×256 + 0 × 16 + 1 × 1
=1024 + 0 + 1
=1025
(401)16 = (1025)10
iii. (10101)2-(11011)2+(10001)2
iy (101101)2 ¸ (100)
100) |
1 |
0 |
1 |
1 |
0 |
1 |
(1011 |
|
1 |
0 |
0 |
|
|
|
|
|
|
|
1 |
1 |
0 |
|
|
|
|
|
1 |
0 |
0 |
|
|
|
|
|
|
1 |
0 |
1 |
|
|
|
|
|
1 |
0 |
0 |
|
|
|
|
|
|
|
1 |
|
Q=1011
R=1
Write a program in QBASIC that asks
length, breadth and height of room and calculates its area and volume. Create a
user-defined function to calculate area and sub-program to calculate volume.
(4) [Hint: Area=LxB Volume LXBXH]
DECLARE FUNCTION
AREA(L,B)
DECLARE SUB VOL(L,B,H)
CLS
INPUT “Enter Length”; L
INPUT “Enter Breadth”; B
INPUT “Enter Height”; H
PRINT “Area of room=”;
AREA(L,B)
CALL VOL(L,B,H)
END
FUNCTION AREA(L,B)
AREA = L * B
END FUNCTION
SUB VOL(L,B,H)
V=L*B*H
PRINT “Volume of Room=”;
V
END SUB
19. A sequential data file called
"STUDENT.DAT" has stored data under the field heading Registration
No., Class, Section, Name, Date of Birth and Gender. Write a program to display
all the information of class NINE students whose gender is 'FEMALE'. (4)
OPEN “STUDENT.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, R, CL, SE$,
N$, D$, G$
IF UCASE$(G$)=”FEMALE”
AND CL=9 THEN
PRINT R, CL, SE$, N$,
D$, G$
END IF
WEND
CLOSE #1
END
11. Using C language, write a program
to input three integers then display the highest integer. (4)
#include <stdio.h>
int main()
{
int num1, num2, num3;
printf("Enter three integers: ");
scanf("%d %d %d", &num1, &num2, &num3);
if (num1 >= num2 && num1 >= num3)
{
printf("The highest integer is:
%d\n", num1);
}
else if (num2 >= num1 &&
num2 >= num3)
{
printf("The highest integer is:
%d\n", num2);
} else
{
printf("The highest integer is:
%d\n", num3);
}
return 0;
}
OR
Using C language, write a program
to display all even numbers from 20 to 40 along with their sum.
#include <stdio.h>
int main()
{
int sum = 0;
printf("Even numbers from 20 to 40 are:\n");
for (int i = 20; i <= 40; i++) {
if (i % 2 == 0)
{
printf("%d ", i);
sum += i;
}
}
printf("\nSum of even numbers from 20 to 40 is: %d\n", sum);
return 0;
}