SOLVED PABSON
SEE PRE-BOARD EXAMINATION-2081
Subject: Opt. Il Computer Science
Class: 10
Group A
1. Answer the following questions in one sentences
a) Write the different architecture of computer network.
Ans: The different architecture of computer network are: centralized network, client / server network and peer to peer network.
b) What is Cyber bullying?
Ans: Cyber bullying refers to harassment or bullying that takes place through electronic devices and digital platforms, such as the internet, social media, or messaging apps.
c) Write any two services provided by Internet.
Ans: Any two services provided by Internet are E-mail and E-Commerce.
d) Which query is used to make change the data present in the database.
Ans: Action query is used to make change the data present in the database.
e) What is Primary Key?
Ans: A primary key is a unique field in a database table that identifies each record uniquely.
f) Write any two types of operators used in C language C language.
Ans: Any two operators used in C language are relational and aritgmetic
2. Write appropriate technical term for the following:
a) Law that governs the legal issues of cyberspace. Cyber Law
b) The website that search documents for specified keywords in Internet. Search Engine
3. Write the full form of the following:
a) POP – Post Office Protocol
b) ISP – Internet Service Provider
Group B
4. Answer the following questions:
a) Differentiate between LAN and MAN.
Ans: The difference between LAN and MAN are:
LAN |
MAN |
Local Area Network is a network limited within a small area like a room, a building, school, college, etc. generally connected through wire media. |
Metropolitan Area Network (MAN) is a network within the area like valley, city, metropolitan, etc. connected through wire or wireless technology or media. |
LAN is owned, managed, and used by an individual or an organization. Therefore, it is a private network. |
MAN’s ownership can be private or public. |
b) What is network topology? Write about star topology with suitable diagram.
Ans: Network topology refers to the layout or arrangement of devices within a Local Area Network (LAN).
Star topology is a type of network configuration where all devices are connected to a central device, typically a hub or a switch.
c) Write any four opportunities and threats in social media opportunities threats.\
Opportunities of using social media
Marketing and Branding: Promote businesses and engage with customers.
Information Sharing: Quickly access and share news and educational content.
Threats of using social media
Privacy Risks: Personal information can be exposed or misused.
Cyber bullying: Harassment or bullying through online interactions.
d) What is Online Payment? Write the different forms of e-payment in Nepal.
Ans: Online payment refers to the payment for buying goods or services through the Internet using different online payment gateway. The different forms of e-payment in Nepal are eSewa Nepal, iPay, Khalti etc.
e) What is cloud computing? What are the services provided by cloud computing.
The services provided by cloud computing are:
v Infrastructure as a Service (IaaS)
v Software as a Service (SaaS)
v Platform as a Service (PaaS)
f) Define Data and Information.
Data are raw form of any facts, figures or entities which does not give any meaning.
Information is the organized collection of inter-related data which has significant meaning.
g) What is MS-Access? Write the features of MS-Access.
MS Access is a relational database management system developed by Microsoft which allows users to store, manage, and analyze large volumes of data in a structured format using tables.
Features of MS-Access:
a) It provides the flexible ways to add, edit, delete and display the related data.
b) Queries help to view, change and analyse the data indifferent ways.
h) Define action query.
Action query is a query that makes changes to or removes many records in just one operation. The different types of query are:
Delete query, update query, append query and make table query.
i) What is table? Write the basic components of table.
Tables are the primary building block of database which stores and manages large volume of data into rows and column.
The components of table are field and record.
5. Write down the output of the given program. Show with dry run in table.
DECLARE SUB TEST(A$)
CLS
A$="PABSON"
CALL TEST(A$)
END
SUB TEST(A$)
FOR 1=1 TO LEN(A$)
B$ = MID$(A$, I, 1)
C$=C$+B$
NEXT I
PRINT C$
END SUB
Dry Run
A$ |
I = 1 TO LEN(A$) |
B$ = MID$(A$, I, 1)
|
C$=C$+B$
|
PRINT C$
|
PABSON |
1 TO 6 Yes |
P |
P |
PABSON |
|
2 TO 6 Yes |
A |
P+A=PA |
|
|
3 TO 6 Yes |
B |
PA+B=PAB |
|
|
4 TO 6 Yes |
S |
PAB+S=PABS |
|
|
5 TO 6 Yes |
O |
PABS+O=PABSO |
|
|
6 TO 6 Yes |
N |
PABSO+N=PABSON |
|
|
7 TO 6 No Loop Exits |
|
|
|
The output of the program is :
PABSON
6. Rewrite the given program after correcting the bugs
REM to display the data from sequential data file "marks.dat” having marks in english more than 35
CLS
OPEN “marks.dat” FOR OUTPUT AS#1
WHILE NOT EOF(2)
INPUT #1, N$, ENG, NEP, SCI
ENG+NEP+SCI = TOT
IF TOT >35 THEN PRINT N$, ENG, NEP, SCI
NEXT
CLOSE #1
END
Debugged Program
REM to display the data from sequential data file "marks.dat” having marks in english more than 35
CLS
OPEN “marks.dat” FOR INPUT AS#1
WHILE NOT EOF(1)
INPUT #1, N$, ENG, NEP, SCI
TOT = ENG+NEP+SCI
IF ENG >35 THEN PRINT N$, ENG, NEP, SCI
WEND
CLOSE #1
END
7. Study the following program and answer the given questions:
DECLARE FUNCTION GRADE (A)
CLS
INPUT "ENTER A NUMBER"; B
C=GRADE(B)
PRINT C
END
FUNCITON GRADE(X)
WHILE X< >0
R = X MOD 10
Z = Z + R
X = INT(X/10)
WEND
GRADE=Z
END SUB
Questions:
a) How many parameters are used in the above program?
Ans: One parameter is used in the above program. A AND X is formal parameter and B is actual parameter.
b) List the different library functions used in the program.
Ans: The library functions used in the program is INT( ).
Group C
Convert/calculate as per the instruction:
(a) (111)10 into (Binary)
Divide by the base 2 to get the digits from the remainders:
Division |
Quotient |
Remainder (Digit) |
(111)/2 |
55 |
1 |
(55)/2 |
27 |
1 |
(27)/2 |
13 |
1 |
(13)/2 |
6 |
1 |
(6)/2 |
3 |
0 |
(3)/2 |
1 |
1 |
(1)/2 |
0 |
1 |
= (1101111)2
(111)10 = (1101111)2
(b) (212)8 into (Hexadecimal)
Convert every octal digit to 3 binary digits,
212
= 2 1 2
2= 010
1 = 001
2 = 010
= 1000 1010
Convert every 4 binary digits to1 hex digit (see conversion tables):
8 = 1000
A = 1010
=8A
(212)8 =(8A)16
(c)11001-10101
|
1 |
1 |
0 |
0 |
1 |
+ |
1 |
0 |
1 |
0 |
1 |
|
10 |
1 |
1 |
1 |
0 |
11001+10101 = 101110
100101 / 1100
1100) |
1 |
0 |
0 |
1 |
0 |
1 |
(11 |
|
|
1 |
1 |
0 |
0 |
|
|
|
0 |
0 |
1 |
1 |
0 |
1 |
|
|
|
|
1 |
1 |
0 |
0 |
|
|
|
|
|
|
|
1 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Q = 11
R = 1
9a) Write a program in qbasic that ask to enter three different numbers then find out Product and Average. Create a user defined function PROD( ) to calculate product and sub procedure AVG( ) to calculate average.
DECLARE FUNCTION PROD(A, B, C)
DECLARE SUB AVG(A, B, C)
CLS
INPUT “Enter any three numbers”; A, B, C
PRINT “Product of three numbers=”; PROD(A, B, C)
CALL AVG(A, B, C)
END
FUNCTION PROD(A, B, C)
PROD = A * B * C
END FUNCTION
SUB AVG(A, B, C)
AV=(A+B+C)/3
PRINT “Average of three numbers=”; AV
END SUB
b) A sequential data file called "data.dat" has stored data under the field heading item name, quantity and rate. Write a program to display all the records with total.
OPEN “data.dat” for INPUT AS #1
CLS
PRINT “Name”, “Quantity”, “Rate”, “Total”
WHILE NOT EOF(1)
INPUT #1, N$, Q, R
T = Q * R
PRINT N$, Q, R, T
WEND
CLOSE #1
END
10. Write a program in C language to ask to enter a number then find out whether it is even or odd. 4
#include<stdio.h>
#include<conio.h>
int main()
{
int n;
printf("Enter any number: ");
scanf("%d", &n);
if(n%2= =0)
{
printf("%d is even number", n);
}
else
{
printf("%d is odd number", n);
}
return 0;
}
or
Write a C program to display the series 1, 4, 9. up to 10th term.
#include<stdio.h>
#include<conio.h>
int main()
{
int i;
i=1;
while(i<=10)
{
printf("%d \n", i*i);
i++;
}
return 0;
}
No comments:
Post a Comment