Friday, January 3, 2025

SOLVED TRITON SEE MODEL QUESTIONS | OPT.II Computer Science - Set 3

 SOLVED TRITON SEE MODEL QUESTIONS | OPT.II Computer Science - Set 3

 


COMPUTER - SEE Model Question (Set-III)

Time: 2 Hours                                                                       F.M.: 50

                                   Group A ' 10 marks'

1.   Answer the following questions in one sentence. (6 × 1 = 6)

a.     Which connector is used with coaxial cable?

BNC connector is used with coaxial cable.

 

b.     Why data decryption is necessary?

Data decryption is necessary to convert encrypted (coded) data into readable form.

 

c.      Which data types are used to store graphics and numeric characters in MS-Access?

OLE object is used for graphic and Number data type is used for numeric character

 

d.     List any two objects of MS-Access.

Any two objects of MS-Access are Query and Form.

 

e.      What is the function of MOD in Qbasic?

The function of MOD in Qbasic is to find remainder.

 

f.      Write the name of unary operators used in C-language.

The name of unary operators used in C-language are: Increment (++) and decrement (- -)

 

2.   Write appropriate technical term.         (2x1=2)

a.      Network connecting device that boosts the data signal. Repeater

 

b.     A code of behavior for using internet. Computer Ethics

 

3.   Write the full form for the following: (2x1=2)

a.      POP – Post Office Protocol

 

b.     GCE - Google Compute Engine

 

Group B '24 marks'

4.   Answer the following questions: (9x2=18)

a.     "The internet is called network of networks." Justify in your words.

Ans: The Internet is called a "network of networks" because it connects millions of private, public, academic, business, and government networks globally, enabling them to communicate and share resources.

 

b.     What is hacking? What is the purpose of hacking?

Ans: Hacking is the unauthorized access to or manipulation of computer systems or networks, typically to steal, alter, or destroy data, or disrupt services.

The purpose of hacking can be to steal or alter data, disrupt services, spy on communications, or sometimes, to test and improve security measures (ethical hacking).

 

c.      Define antivirus software with four examples.

Ans: Antivirus software is a program designed to detect, prevent, and remove malware from computer systems. Examples include Norton, McAfee, Avast, and Bitdefender.

 

d.     What is E-commerce? Write any four Nepali e-commerce web sites.

Ans: E-commerce is the buying and selling of goods and services over the internet. Four Nepali e-commerce websites are Daraz, SastoDeal, HamroBazar, and Muncha.

 

e.      What is AI? List any four areas of AI.

Ans: Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and reacts like humans.

Four areas of AI are natural language processing, robotics, Machine Learning, and computer vision.

 

f.      What is DBMS? Give some examples of DBMS software.

Ans: DBMS is a computerized system that stores data, processes them and provides information in an organized form. E.g. MS-Access, Oracle,  MySQL, Fox Pro etc

 

g.     What does data type used for? List out any four data types in MS-Access.

Data type is used for determining the type of data that can be stored in that field.

Any four data types in MS-Access are: text, memo, number and currency.

 

h.     Differentiate between select query and action query.

 

Select Query

 

Action Query

Select query is simply used to select and display the relevant data from the database.

 

An action query is a query that makes changes to or removes many records in just one operation.

It does not make change to database.

 

It makes change to database.

 

i.       What is report? Write down its important.

Ans: Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing.

Any two importance of the report are:

·       Reports provide a formatted presentation of data that is easy to read and understand.

·       Reports enable users to summarize, analyze, and visualize data in meaningful ways.

 

5.   Write the output of following program with necessary rough: (1x2=2)

DECLARE SUB SERIES ( )

CLS

CALL SERIES

END

A$="NEPAL"

B=1

FOR I =LEN (A$) to 1 STEP-2

IF B < > 3 THEN

PRINT MID$(A$, B, I)

ELSE

PRINT MID$(A$, 1, I)

END IF

B=B+1

NEXT I

END SUB

 

DRY RUN

A$

B

I =LEN (A$) to 1 STEP-2

B< > 3

 PRINT MID$(A$,B,I)

yes

MID$(A$, 1, I)

no

B=B+1

 

NEPAL

1

5 to 1 YES

1 < > 3 YES

NEPAL

 

1+1=2

 

2

3 to 1 YES

2 < > 3 YES

EPA

 

2+1=3

 

3

1 to 1 YES

3 < > 3 NO

 

N

 

 

4

7 TO 5 NO

LOOP EXITS

 

 

 

 

OUTPUT

NEPAL

EPA

N

 

6.   Re-write the given problem after correcting bugs:      (2x1=2)

REM to check whether the supplied no is even or odd

DECLARE SUB TEST(N)

CLS

INPUT "ENTER THE NUMBER;";N$

CALL TEST(N)

Y=2

R=Y MOD N

IF R=1 THEN

PRINT"EVEN"

OR

PRINT"ODD"

END

END SUB

 

Debugged Program

 

REM to check whether the supplied no is even or odd

DECLARE SUB TEST(N)

CLS

INPUT "ENTER THE NUMBER:";N

CALL TEST(N)

END

 

SUB TEST(N)

Y=2

R=N MOD Y

IF R=0 THEN

PRINT"EVEN"

ELSE

PRINT"ODD"

END IF

END SUB

 

7.   Study the following program and answer the given questions: (2x1=2)

OPEN"Detail.dat"FOR INPUT AS #1

OPEN"Temp.dat"FOR OUTPUT AS#2

INPUT "Enter name of the students";Sn$

FOR I = 1 TO 10

INPUT # 1, Nm$, CI, A

IF Sn$ < > Nm$ THEN

WRITE # 2, Nm$, CI, A

END IF

NEXT I

CLOSE #1, #2

KILL "Detail.dat"

NAME "Temp.dat"AS"Detail.dat"

END

 

a.     What is the main objective of the program given above?

The main objective of the program is to delete the record of a specific student, identified by their name from the data file Detail.dat.

 

b.     Do you get any problem in the above program if "KILL" statement is removed? Give reason.

Yes, there would be a problem if the KILL statement is removed. Because without the KILL statement, both Detail.dat and Temp.dat will exist, and the renaming (NAME "Temp.dat" AS "Detail.dat") will fail because a file cannot be renamed to an existing file's name, causing an error and preventing the update.

 

Group C "16 mark"

8.   Calculate as per the instruction: (4x1=4)

(i)    (ABC)16 = (?)8         

 

Convert each hex digit to 4 binary digits

ABC

= A B C

A = 1010

B = 1011

C = 1100

= 101 010 111 100

convert each 3 binary digits to octal digits

= 101 010 111 100

101 = 5

010 = 2

111 = 7

100 = 4

     (ABC)16 = (5274)8      

 

    

(ii)    (435)10 = (?)2

 

Divide by the base 2 to get the digits from the remainders:

Division
by 2

Quotient

Remainder

(Digit)

(435)/2

217

1

(217)/2

108

1

(108)/2

54

0

(54)/2

27

0

(27)/2

13

1

(13)/2

6

1

(6)/2

3

0

(3)/2

1

1

(1)/2

0

1

= (110110011)2

(435)10 = (110110011)2

 

 

 

 

 

 

(iii)  (101)2 × (101)2 = (?)2

 

         

 

 

1

0

1

 

 

1

0

1

 

 

1

0

1

 

0

0

0

×

1

0

1

×

×

1

1

0

0

1

       

(101)2 × (101)2 = (11001)2

 

(iv)   (101101)2 ÷ (101)2

 

101)

1

0

1

1

0

1

(1001

-

1

0

1

 

 

 

 

 

0

0

0

1

0

1

 

 

 

 

-

1

0

1

 

 

 

 

 

0

0

0

 

 

Q = 1001

R = 0

 

9.   Answer the following questions: (4x2=8)

a.     Write a program in QBASIC that asks radius of a circle to calculate its area and circumference. Create a user-defined function to calculate area and sub-program to calculate circumference.

 

DECLARE FUNCTION AREA (R)

DECLARE SUB CIR (R)

CLS

INPUT "ENTER RADIUS"; R

PRINT " AREA OF A CIRCLE="; AREA (R)

CALL CIR (R)

END

 

FUNCTION AREA (R)

AREA = 3.14 * R ^ 2

END FUNCTION

 

SUB CIR (R)

C = 2 * 3.14 * R

PRINT " CIRCUMFERENCE OF CIRCLE =" ; C

END SUB

 

 

 

b.     A sequential data file called "Record.dat" has stored data under the field headings: Roll No., Name, Gender, English, Nepali, Maths and Computer. Write a program to display all the information of those students whose marks in English is more than 40.

 

OPEN " Record.dat " FOR INPUT AS #1

CLS

WHILE NOT EOF (1)

    INPUT #1, R, N$, G$, E, NE, M, C

    IF E > 40 THEN

PRINT “Your Roll No. is”, R

PRINT “Your Name is”, N$

PRINT “Your Gender is”, G$

PRINT “Your Marks in English is”, E

PRINT “Your Marks in Nepali is”, NE

PRINT “Your Marks in Math is”, M

PRINT “Your Marks in Computer is”, C

END IF

WEND

CLOSE #1

END

 

10.  Write a program in C language to input a number then check whether the number is fully divisible by 5 or not.

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n%5= =0)

printf("%d is divisible by 5",n);

else

printf("%d is not divisible by 5",n);

return 0;

}

 

 

OR,

Write a program in "C" language to display the series 2, 4, 6, 8 up to the 10th term.

 

#include<stdio.h>

int main()

{

    int n=2, i;

    for(i=1;i<=10;i++)

    {

        printf("%d  ",n);

        n=n+2;

    }

    return 0;

}

¯¯¯¯¯

No comments:

Post a Comment