Pathibhara
English School, Itahari, Sunsari
First
Term Question 2082
Subject:
Computer Science
Group-A
[10 Marks]
- Answer
the following questions in one sentence. [6×1=6]
a. What term describes the unique address given to each device in a network?
IP address
is the term used to describe the unique address given to each device in a
network.
b. Give any two examples of bounded media for
data transmission.
Two examples of bounded media
are twisted pair cable
and coaxial cable.
c. List any two components of data communication.
Two components of data communication
are the sender
and the transmission medium.
d. Which datatype is suitable for storing graphic
content in MS-Access?
The
suitable datatype for storing graphic content in MS-Access is OLE Object.
e. What is a tuple in database?
A tuple in a database is a single row or record
in a table.
f. Define global variable in modular programming.
A global variable in modular programming is a
variable that is declared
outside all functions and is accessible throughout the program.
- Write
the appropriate technical terms for the following. [2×1=2]
a. The security barrier that monitors and filters incoming and outgoing
network
traffic. Firewall
b. The set of rules that govern how data is sent and received over
the internet. Protocol
- Write
the full forms. [2×1=2]
i. UTP - Unshielded Twisted Pair
ii. NOS - Network Operating System
Group-B [24 Marks]
4.
Answer the following questions. [9×2=18]
a. Write any one difference between LAN and MAN. Draw well-labelled diagram of star topology.
Any one difference
between LAN and MAN is
LAN (Local Area
Network) covers a small geographical area like a home,
office, or building, whereas MAN (Metropolitan Area Network) spans a larger area,
like a city or campus.
Diagram of star
topology:
[Computer]
|
[Computer] --- [Hub/Switch] --- [Computer]
|
[Computer]
b. What is ISP? Why internet is called network of network?
ISP (Internet Service
Provider) is a company that provides users access to the
Internet.
The Internet is called a network of networks
because it connects millions of smaller networks globally, allowing them to
communicate and share data.
c. What is malware? Mention two safety
measures you can take to avoid malware on your computer or
smartphone.
Malware
is a malicious software designed to harm, exploit, or disable computers and
networks.
Two safety measures you can take to avoid malware on
your computer or smartphone are:
· Install and regularly update antivirus
software.
· Avoid downloading files or clicking
links from unknown or untrusted sources.
d. Define hardware security. List any two
ways to protect hardware devices at home.
Hardware Security
refers to the protection of physical devices from theft, damage, or
unauthorized access.
Any two ways to protect hardware devices at home are:
· Use
surge protectors to prevent damage from power spikes.
· Lock
your devices or store them in secure places when not in use.
e. What is authentication? List some examples of biometric verifications.
The process of
identifying an individual usually based on a username and password is called an
authentication system.
Some examples of biometric verifications are:
· Fingerprint recognition
· Facial recognition
f. Explain about cryptography with a diagram.
Cryptography
is the technique of securing data by converting it into a coded format to
prevent unauthorized access.
Diagram
Plain Text →
[Encryption] → Cipher Text → [Decryption] → Plain Text
(Sender)
(Receiver)
g. You received an email claiming to
be from your bank, asking for your account password. What type of cyberattack
is this? What steps should you take in response?
The email is an example of a phishing attack,
which attempts to trick users into providing sensitive information.
The steps should be taken are:
· Do not reply or click on any links.
· Report the email to your bank and
delete it.
h. Write down the advantages of database
management system (DBMS) over traditional data storage system.
The advantages of database management system
(DBMS) over traditional data storage system
a) It reduces data redundancy which
means duplication of data.
b) It allows multiple users to access
the same data simultaneously.
c) Large volume of data can be stored
and updated easily.
d) It provides high security of data
as well as maintains accurate database.
i.
Define Query and Report in MS Access.
A
Query
in MS Access is a request to retrieve specific data from one or more tables
based on given criteria.
A
Report
is a formatted output that presents data from tables or queries, typically for
printing or sharing.
5.
Write the output of the following program by making
dry run table. [2]
DECLARE SUB series ( )
CALL series
END
SUB series ( )
i = 3
FOR c = 1 TO 5
t = i * (c ^ 2)
PRINT t;
NEXT c
END SUB
Dry Run
i |
c = 1 TO 5 |
t = i * (c ^ 2) |
PRINT t; |
3 |
1 TO 5 Yes |
3x(1^2)=3 |
3 |
|
2 TO 5 Yes |
3x(2^2)=12 |
12 |
|
3 TO 5 Yes |
3x(3^2)=27 |
27 |
|
4 TO 5 Yes |
3x(4^2)=48 |
48 |
|
5 TO 5 Yes |
3x(5^2)=75 |
75 |
|
6 TO 5 No |
|
|
The output of the program
is:
3 12 27 48 75
6.
Re-write
the given program after correcting the bugs. [2]
REM to find the
factorial of a given number
DECLARE FUNCTION
FACTO (N$)
CLS
INPUT "Enter
a number"; N
CALL FACTO (N)
END
FUNCTION FACTO ()
F = 1
WHILE N = 0
F = F * N
N = N - 1
WEND
FACTO = F
END FUNCTION
Debugged Program
REM to find the
factorial of a given number
DECLARE FUNCTION
FACTO (N)
CLS
INPUT "Enter
a number"; N
PRINT FACTO (N)
END
FUNCTION FACTO (N)
F = 1
WHILE N <
> 0
F = F * N
N = N - 1
WEND
FACTO = F
END FUNCTION
7.
Study
the given program and answer the given questions. [2]
DECLARE SUB SUM
(N)
CLS
INPUT "Enter
any number"; N
CALL SUM (N)
END
SUB SUM (N)
WHILE N > 0
R = N MOD 10
T = T + R
N = N \ 10
WEND
PRINT "The
Sum of individual digit is"; T
END SUB
Questions:
a) How many parameter(s) is used in the above program? List them.
One parameter is used in the program.
b) Write the use of MOD in above program.
The MOD
operator is used to find
the remainder.
Group-C [16 Marks]
8.
Convert/Calculate
the following as per instructions [4×1=4]
i. into Octal
986 ÷ 8 = 123, remainder 2
123 ÷ 8 = 15, remainder 3
15 ÷ 8 = 1, remainder 7
1 ÷ 8 = 0, remainder 1
(986)₁₀ = (1732)₈
ii. into Binary
Hex to Binary conversion (4-bit for each digit):
A = 1010
2 = 0010
D = 1101
(A2D)₁₆ = (101000101101)₂
iii.
11010
+ 10110
--------
110000
11010 + 10110 =
(110000)₂
iv.
101) |
1 |
0 |
1 |
1 |
1 |
0 |
(1001 |
|
1 |
0 |
1 |
|
|
|
|
|
0 |
0 |
0 |
1 |
1 |
0 |
|
|
|
|
|
1 |
0 |
1 |
|
|
|
|
|
0 |
0 |
1 |
|
Q=1001
R=1
9.
a.
Write
a program in QBASIC to calculate the area of a rectangle using SUB….. END SUB
and perimeter of rectangle using FUNCTION... END FUNCTION. [4]
DECLARE SUB Area(L, B)
DECLARE FUNCTION Perimeter(L, B)
CLS
INPUT "Enter Length: ", L
INPUT "Enter Breadth: ", B
CALL Area(L, B)
PRINT "Perimeter of Rectangle: ";
Perimeter(L, B)
END
SUB Area(L, B)
A = L * B
PRINT
"Area of Rectangle: "; A
END SUB
FUNCTION Perimeter(L, B)
Perimeter =
2 * (L + B)
END FUNCTION
b.
Write
a program in QBASIC to ask user any word and reverse it using SUB..... END SUB [4]
DECLARE SUB REV(W$)
CLS
INPUT "Enter any word: ", W$
CALL REV(W$)
END
SUB REV(W$)
FOR i =
LEN(W$) TO 1 STEP -1
R$ = R$
+ MID$(W$, i, 1)
NEXT i
PRINT
"Reversed Word: "; R$
END SUB
10.
Write
a program in QBASIC to ask user any number and check whether it is odd or even
using SUB..... END SUB. [4]
DECLARE SUB CHECK(N)
CLS
INPUT "Enter any number: ", N
CALL CHECK(N)
END
SUB CHECK(N)
IF N MOD 2 =
0 THEN
PRINT N;
" is Even"
ELSE
PRINT N;
" is Odd"
END IF
END SUB
OR,
Write
a program in QBASIC to count the occurrence of letter 'a' in the supplied
string using FUNCTION…END FUNCTION. [4]
DECLARE
FUNCTION CountA(S$)
CLS
INPUT
"Enter a string: ", S$
PRINT
"Number of 'a' in the string: "; CountA(S$)
END
FUNCTION
CountA(S$)
C = 0
FOR i = 1 TO LEN(S$)
IF MID$(LCASE$(S$), i, 1) =
"a" THEN
C = C + 1
END IF
NEXT i
CountA = C
END
FUNCTION
No comments:
Post a Comment