Saturday, February 21, 2026

SEE COMPUTER SCIENCE 2082 – FULL N FINAL REVISION –28 Marks– PREPARED BY – DEEPAK SHRESTHA

SEE COMPUTER SCIENCE 2082 – FULL N FINAL REVISION –28 Marks– PREPARED BY – DEEPAK SHRESTHA



1️ Write any two data types used in C language.

Answer: Two data types used in C language are int and char.

 

2️ What is modular programming?

Answer: Modular programming is a technique of dividing a program into small, manageable and logical modules or sub-programs.

 

3️ What is the maximum length of field name in MS-Access?

Answer: The maximum length of a field name in MS-Access is 64 characters.

 

4️ What is search engine?

Answer: A search engine is an online tool that helps users find information on the internet using keywords.

 

5️ What is the business done through internet?

Answer: The business done through the internet is called e-commerce.

 

6️ Which data type is used to store photo in MS-Access?

Answer: OLE Object data type is used to store photos in MS-Access.

 

7️ What is web browser?

Answer: A web browser is a software application used to access and display web pages on the internet.

 

8️ What is looping?

Answer: Looping is the process of repeating a statement or group of statements until a certain condition is satisfied.

 

9️ Name any two unguided transmission media.

Answer: Two unguided transmission media are radio waves and microwaves.

 

What is social media?

Answer: Social media are online platforms that allow users to create, share and interact with content and connect with others.

 

Which statement is used to call sub-procedure?

Answer: The CALL statement is used to call a sub-procedure.

 

What is the default extension of MS-Access?

Answer: The default extension of MS-Access is .accdb (and .mdb in older versions).

 

Which object of MS-Access is used to retrieve data from the table?

Answer: Query is used to retrieve data from a table.

 

What is network protocol?

Answer: A network protocol is a set of rules that govern communication between devices in a network.

Which data type is used to store date of birth in MS-Access?

Answer: Date/Time data type is used to store date of birth in MS-Access.

 

Write any two elements of database.

Answer: Two elements of a database are field and record.

 

Write any two benefits of e-governance service.

Answer: Two benefits of e-governance are transparency and easy access to government services.

 

Which type of query is used to calculate total marks in MS-Access?

Answer: Select query is used to calculate total marks in MS-Access.

 

List the different types of procedures in QBasic.

Answer: The two types of procedures in QBasic are Sub procedure and Function procedure.

 

Which format specifier is used for ‘int’ in C language?

Answer: The format specifier used for int in C language is %d.

 

What is telecommunication?

Answer: Telecommunication is the transmission of data and information from one place to another for communication.

 

Give any two examples of simplex mode.

Answer: Two examples of simplex mode are radio and television broadcasting.

 

Write the syntax of KILL statement.

Answer: The syntax of KILL statement is: KILL "filename".

 

What is online payment?

Answer: Online payment is the process of paying for goods or services through the internet.

 

Write down any two objects of MS-Access.

Answer: Two objects of MS-Access are table and form.

 

What is report?

Answer: A report is a database object used to present data in a formatted and printable manner.

 

Write the function of WRITE statement.

Answer: The WRITE statement is used to write data into a sequential file.

 

 

 

 

 

 

 

πŸ“˜ GROUP B

1️ What is Computer Network? Enlist any two advantages.

Answer:

A computer network is a group of two or more computers and devices connected together through communication media to share data and resources. It allows users to communicate and exchange information efficiently.

Advantages:

  1. Hardware devices like printers and scanners can be shared.
  2. Data and information can be exchanged quickly among users.

 

2️ What is Computer Ethics? Write any two ethics.

Answer:

Computer ethics refers to the moral principles and guidelines that regulate the proper use of computers and information technology. It encourages responsible and lawful behavior while using digital devices.

Any two ethics:

  1. Do not use a computer to harm others.
  2. Do not access or modify others’ files without permission.

 

3️ What is Computer Security? Write any two measures.

Answer:

Computer security is the protection of computer systems, data, and devices from unauthorized access, misuse, or damage. It ensures the safety and confidentiality of information.

Any two measures:

  1. Install antivirus software to prevent malware attacks.
  2. Use strong passwords and firewall protection.

 

4️ What is Software Security? Write any two measures.

Answer:

Software security refers to the protection of computer programs and applications from hacking, viruses, and unauthorized modification. It ensures that software functions safely and correctly.

Any two measures:

  1. Update software regularly to fix vulnerabilities.
  2. Use licensed and genuine software only.

 

5️ Define E-Commerce. Write any two benefits.

Answer:

E-commerce is the buying and selling of goods and services over the internet through electronic transactions. It allows businesses and customers to perform transactions online.

Any two benefits:

  1. Customers can shop anytime and from anywhere.
  2. It reduces operational and transportation costs.

 

 

6️ What is DBMS? Write any two advantages.

Answer:

DBMS (Database Management System) is software used to create, store, manage, and retrieve data efficiently in an organized manner. It helps in systematic handling of large amounts of information.

Any two advantages:

  1. Reduces duplication of data.
  2. Provides better data security and control.

 

7️ What is Primary Key? List any two advantages.

Answer:

A primary key is a field in a database table that uniquely identifies each record and does not allow duplicate or null values.

Any two advantages:

  1. Ensures uniqueness of records.
  2. Helps establish relationships between tables.

 

8️ What is Query? Mention its types.

Answer:

A query is a database object used to retrieve, filter, and manipulate specific data from one or more tables based on given conditions.

Types of query:

  1. Select Query
  2. Action Query (Update, Delete, Append, Make Table)

 

9️ What is Form? Write any two uses.

Answer:

A form is a database object used to enter, edit, and display data in a structured and user-friendly format.

Any two uses:

  1. Simplifies data entry.
  2. Allows modification of existing records.

 

πŸ”Ÿ What is Report? Why is it necessary?

Answer:

A report is a database object used to present data in a formatted and printable layout. It organizes information in a clear and structured way.

It is necessary because it summarizes data and produces professional output for printing and presentation.

 

πŸ”Ή What is Data Sorting? List any two advantages.

Answer:

Data sorting is the process of arranging records in ascending or descending order based on a specific field such as name, roll number, or marks. It helps organize data systematically.

Any two advantages:

  1. Makes data easier to understand.
  2. Helps in quick searching of records.

πŸ”Ή What is Antivirus Software? Name any two examples.

Answer:

Antivirus software is a program designed to detect, prevent, and remove viruses and other malicious software from a computer system. It protects the system from security threats.

Examples:

  1. Norton Antivirus
  2. Kaspersky Antivirus

πŸ”Ή Define Artificial Intelligence (AI). Write any two uses.

Answer:

Artificial Intelligence (AI) is the branch of computer science that enables machines to perform tasks that normally require human intelligence, such as learning and decision-making.

Any two uses:

  1. Self-driving cars
  2. Medical diagnosis systems

 

πŸ”Ή What is M-Commerce? Write any two important services.

Answer:

M-Commerce (Mobile Commerce) is the buying and selling of goods and services using mobile devices such as smartphones through wireless internet.

Any two services:

  1. Mobile banking
  2. Online shopping apps

 

πŸ”Ή What is IoT? Write any two importance of it.

Answer:

Internet of Things (IoT) refers to a network of interconnected devices that communicate and exchange data through the internet without human intervention.

Any two importance:

  1. Reduces human effort through automation.
  2. Allows remote monitoring and control of devices.

 

πŸ”Ή Define Field and Record.

Answer:

A field is a column in a database table that stores a specific type of data.
A record is a row in a table that contains complete information about one entity.

 

πŸ”Ή What are the symptoms of computer virus?

Answer:

A computer virus is a harmful program that affects system performance.

Any two symptoms:

  1. Slow performance of the computer.
  2. Files and programs may get corrupted or deleted.

 

 

πŸ”Ή What is Network Topology? List any two types.

Answer:

Network topology refers to the physical or logical arrangement of computers and devices in a network.

Any two types:

  1. Star topology
  2. Bus topology

 

πŸ”Ή Define Virtual Reality. Write any two areas where it is used.

Answer:

Virtual Reality (VR) is a computer-generated simulated environment that appears real and allows users to interact with it.

Any two uses:

  1. Gaming
  2. Medical training

 

πŸ”Ή What is Password? Write any two importance of password protection.

Answer:

A password is a secret combination of characters used to protect computer systems and accounts from unauthorized access.

Any two importance:

  1. Prevents unauthorized access.
  2. Protects personal and confidential data.

 

πŸ”Ή What are Validation Rule and Validation Text?

Answer:

Validation Rule is a field property in MS-Access that restricts the type of data entered in a field.
Validation Text is the error message displayed when invalid data is entered.

 

πŸ”Ή Give the differences between Select Query and Action Query.

Answer:

Select Query

Action Query

It is used to retrieve and display data from one or more tables.

It is used to modify data in a table.

It does not change the original data.

It changes the original data permanently.

Example: Viewing records based on a condition.

Example: Update, Delete, Append, Make Table queries.

 

πŸ”Ή What is Backup? How does it help to secure data?

Answer:

Backup is a duplicate copy of important data stored separately for safety. It helps recover data in case of system failure, virus attack, or accidental deletion.

 

πŸ”Ή What is Social Media? Write any one reason why it is popular.

Answer:

Social media are online platforms that allow users to create, share, and interact with content and communicate globally.

It is popular because it enables instant communication and fast information sharing.


πŸ”Ή Differentiate between Guided and Unguided Media.

Answer:

Guided Media

Unguided Media

Guided media uses physical cables or wires to transmit data.

Unguided media uses wireless signals to transmit data.

Data travels through a fixed path.

Data travels through air or space without physical connection.

Examples: Twisted pair cable, Coaxial cable, Fiber optic cable.

Examples: Radio waves, Microwaves, Satellite communication.

 

πŸ”Ή What is E-Governance? Give any two examples.

Answer:

E-Governance is the use of electronic systems and the internet to provide government services to citizens efficiently.

Any two examples:

  1. Online tax payment
  2. Online PAN registration

 

πŸ”Ή What is Data Communication? List two modes.

Answer:

Data communication is the process of transferring data between two or more devices through communication channels.

Two modes:

  1. Simplex
  2. Duplex

 

πŸ”Ή What is Table? Which view is used to modify a table?

Answer:

A table is the main database object in MS-Access used to store data in rows and columns.

Design View is used to modify the structure of a table.

 

πŸ”Ή Give any two differences between Form and Report.

Answer:

Form

Report

A form is used to enter, edit, and view data in a database.

A report is used to present data in a formatted and printable layout.

Data can be modified through a form.

Data cannot be modified through a report.

 

 

 

FULL FORMS

1️ STP – Shielded Twisted Pair

2️ POP – Post Office Protocol

3️ G2G – Government to Government

4️ ISP – Internet Service Provider

FTP – File Transfer Protocol

MAN – Metropolitan Area Network

AI – Artificial Intelligence

IoT – Internet of Things

URL – Uniform Resource Locator

NIC – Network Interface Card

OTP – One Time Password

UPS – Uninterruptible Power Supply

VR – Virtual Reality

WAP – Wireless Application Protocol

TECHNICAL TERMS

A program that protects computer from computer virus / A program that can disinfect a file from virus.

Answer: Antivirus Software

Network of networks.

Answer: Internet

Learning through the electronic media.

Answer: E-Learning

Digital trails created while using internet / The recording of interaction with the digital world.

Answer: Digital Footprint

Law that governs the legal issues of cyberspace.

Answer: Cyber Law

The smallest unit to represent information on a quantum computer.

Answer: Qubit (Quantum Bit)

A system of copying data and information into another location.

Answer: Backup

A company which provides services of Internet.

Answer: Internet Service Provider (ISP)

A secret group of characters used to protect computer system from unauthorized users.

Answer: Password

An artificial environment created by a computer system that appears real.

Answer: Virtual Reality

Data transmission in only one direction.

Answer: Simplex Mode

The websites that search documents for specified keywords in WWW.

Answer: Search Engine

An illegal activity done through computer and internet.

Answer: Cyber Crime

The rate at which data is transmitted through a given medium.

Answer: Bandwidth


No comments:

Post a Comment