Friday, July 11, 2025

PABSON Kathmandu FIRST TERMINAL EXAMINATION-2082 Subject: Opt. II Computer Science [SET B]

 


PABSON Kathmandu

FIRST TERMINAL EXAMINATION-2082

Subject: Opt. II Computer Science

Class: 10

Full Marks: 50

Time: 2 hrs.

Candidates are required to answer the questions in their own way words as for as practicable. Figures in the margin indicate the full marks.

 

Attempt all questions.

 

Group 'A' [10 Marks]

 

1. Answer the following questions in one sentence: (6x1=6)

 

 

a) What is data communication?

Data communication is the process of transferring data and information between computers and other electronic devices.

 

b) Name the connector used in coaxial cable.

The connector used in coaxial cable is BNC (British Naval Connector)

 

c) Give any two examples of simplex mode data communication.

Any two examples of simplex mode data communication are radio and newspaper.

 

d) What is an active digital footprint?

An active digital footprint is the record of data that we knowingly and willingly leave on the internet when we do something online.

 

e) Write any two-string library function used in QBasic.

Any two-string library function used in QBasic are MID$( ) and LEFT$( ).

 

f) Define the main module.

The top-level module is called main module which is located at the top of all procedures such as sub procedure or function procedure

 

2. Write appropriate technical term for the following:    (2x1=2)

a) Law that governs the legal issues of cyberspace. Cyber Law

b) The data carrying capacity of a communication channel. Bandwidth

 

3. Write the full form of the following:       (2x1=2)

a) TCP/IP – Transmission Control Protocol / Internet Protocol

b) ADSL – Asymmetric Digital Subscriber Line

 

 

Group 'B' [24 Marks]

 

4. Answer the following questions: (9x2=18)

 

a) Define bus topology? Write any two advantages of it.

Bus topology is a network configuration where all devices are connected to a single central cable known as a "bus" or backbone cable.

Any two advantages of bus topology are:

It’s easy to set up and doesn’t require a lot of cables.

It is used in small networks where not many devices are connected.

 

 

b) Why do we use repeaters?

We use repeaters to strengthen weak signals and allow data to travel over longer distances in a network.

 

c) "Computer networks reduce the cost of operation". Explain.

Computer networks reduce the cost of operation by allowing multiple computers to share resources such as printers, software, and internet connections. This means organizations do not have to buy separate devices or licenses for each computer, which saves money.

 

d) List any four services on the internet.

Any four services on the internet are E-Commerce, E-Mail, Video Conference, FTP.

 

e) Differentiate between client server network and peer to peer network architecture.

The difference between client server network and peer to peer network architecture are:

Client-Server Network

Peer to Peer Network

In a client-server network, powerful computers called servers provide resources and services, while other computers, known as clients, access these resources and services.

In a peer-to-peer network, all computers have equal roles and can both provide and request resources without a centralized server.

Security and data management are handled by the server. Network administrator manages and enforces security policies.

Security is managed individually on each peer. Each peer is responsible for its own security and data.

 

f) Write any two opportunities and threats in social media.

Any two opportunities and threats in social media are:

Opportunities:

Marketing and Branding: Promote businesses and engage with customers.

Information Sharing: Quickly access and share news and educational content.

Threats:

Privacy Risks: Personal information can be exposed or misused.

Cyberbullying: Harassment or bullying through online interactions.

 

g) How cyber ethics relate to data privacy?

Cyber ethics are the moral rules for using computers and the internet. They relate to data privacy because they teach us to protect others' personal information and not misuse it.
For example, it is against cyber ethics to share someone’s private photos or phone numbers without their permission.

 

h) Give any four elements of digital citizenship?

Any four elements of digital citizenship are:

v Digital Access: The state of full electronic participation in society.

v Digital Commerce: The act of promoting the purchase of goods through electronic means.

v Digital Communication: Electronic exchange of information.

v Digital literacy: Teaching and learning about teaching and technology.

 

i) How can you manage your digital footprint?

We can manage our digital footprint by being careful about what we post online, using strong privacy settings on social media, and not sharing personal information on unknown websites.
For example, think before posting photos, delete old accounts which is no longer in use, and regularly check who can see your posts.

 

5. Write down the output of the given program, Show with a dry run table. (2×1=2)

DECLARE SUB Address (A$)

CLS

A$ = "KATHMANDU"

CALL Address(A$)

END

 

SUB Address(A$)

FOR I = 1 TO LEN(A$) STEP 2

    D$ = MID$(A$, I, 1)

    PRINT D$

NEXT I

END SUB

 

Dry Run

A$

I = 1 TO LEN(A$) STEP 2

D$ = MID$(A$, I, 1)

PRINT D$

KATHMANDU

1 to 9 step 2 Yes

1,1 = K

K

 

3 to 9 step 2 Yes

3, 1 = T

T

 

5 to 9 step 2 Yes

4, 1 = M

M

 

7 to 9 step 2 Yes

7, 1 = N

N

 

9 to 9 step 2 Yes

9, 1 = U

U

 

11 to 9 step 2 No

Loop Exits

 

 

 

The output of the program is

K

T

M

N

U

 

 

6. Rewrite the given program after correcting the bugs:

 

REM program find volume of rectangle

DECLARE FUNCTION V (L, B, H)

CLS

ENTER "enter length, breadth and height of rectangle"; L, B, H

PRINT VOLUME (L, B, H)

END

 

FUNCTION V (L, B, H)

VOL=L*B*H

VOL = V

END

 

Debugged Program

REM program find volume of rectangle

DECLARE FUNCTION V (L, B, H)

CLS

INPUT  "enter length, breadth and height of rectangle"; L, B, H

PRINT V (L, B, H)

END

 

FUNCTION V (L, B, H)

VOL=L*B*H

V = VOL

END FUNCTION

 

 

 

 

 

7. Study the following program and answer the given questions:           (2)

 

 

DECLARE FUNCTION text$ (A$)

 

CLS

INPUT "Enter any text"; T$

PRINT text$(T$)

END

 

FUNCTION text$ (T$)

FOR P=LEN (A$) TO 1 STEP-2

C$=C$+MID$ (A$, P, 1)

NEXT P

END FUNCTION

 

Question:

 

a) Write the formal and actual parameters used in the above program.

Formal Parameter = A$ and Actual Parameter = T$

 

b) Does the program run if the first statement (DECLARE) is deleted?

Yes, the program run if the first statement (DECLARE) is deleted

 

Group 'C' [16 Marks]

 

8. Convert/calculate as per instruction: (4)

 

 

i) (1101101)2=(?)16

 

ii) (175)8 = (?)10

 

 

iii) (110x10)-(11)

 

iv) (101101 / 110)

 

9. a) Write a Qbasic program to find the sum of three numbers either using sub procedure or using function procedure. (4)

 

DECLARE FUNCTION SUM (A, B, C)

CLS

INPUT "Enter first number: "; A

INPUT "Enter second number: "; B

INPUT "Enter third number: "; C

PRINT "Sum of three numbers is: "; SUM(A, B, C)

END

 

FUNCTION SUM (A, B, C)

    SUM = A + B + C

END FUNCTION

 

b) Write a program in Qbasic that asks length, breadth of the rectangle and calculate its area and perimeter. Create a user defined function to calculate area and sub program to calculate perimeter. [Hint: A=L* B, P=2[L+B]. (4)

 

 

 

DECLARE FUNCTION Area (L, B)

DECLARE SUB Perimeter (L, B)

CLS

INPUT "Enter length of rectangle: ", L

INPUT "Enter breadth of rectangle: ", B

PRINT "Area of rectangle is: "; Area(L, B)

CALL Perimeter(L, B)

END

 

FUNCTION Area (L, B)

    Area = L * B

END FUNCTION

 

SUB Perimeter (L, B)

    P = 2 * (L + B)

    PRINT "Perimeter of rectangle is: "; P

END SUB

 

10. Write a program in Qbasic to find volume and total surface area of a cylinder. Use FUNCTION....END FUNCTION to calculate volume and SUB...END SUB to calculate total surface area of cylinder. | Hint: V=Pr2h. TSA-2n Pr(r+h)| (4)

 

DECLARE FUNCTION VOL (R, H)

DECLARE SUB TSA (R, H)

CLS

INPUT "Enter radius of cylinder: ", R

INPUT "Enter height of cylinder: ", H

PRINT "Volume of cylinder is: "; VOL(R, H)

CALL TSA(R, H)

 

END

 

FUNCTION VOL (R, H)

    VOL = 22/7 * R * R * H

END FUNCTION

 

SUB TSA (R, H)

    T = 2 * 22/7 * R * (R + H)

    PRINT "Total Surface Area of cylinder is: "; T

END SUB

 

Or

 Write a Qbasic Program to print even number from 10 to 20 by using SUB… ENDSUB.

 

DECLARE SUB DISPLAY ( )

CLS

CALL DISPLAY

END

 

SUB DISPLAY ( )

    FOR N = 10 TO 20 STEP 2

        PRINT N

    NEXT N

END SUB

 

 

No comments:

Post a Comment