Showing posts with label Computer Science - Grade X - New Syllabus. Show all posts
Showing posts with label Computer Science - Grade X - New Syllabus. Show all posts

Wednesday, November 11, 2020

Modular Programming - Computer Science - Grade X - New Syllabus

 

Modular Programming

Questions and Answers [25]

1.      Modular programming [SEE 2075 U] [SLC 2066] [SEE 2065 S] [MM 2076] [PMT 2075K]
Modular programming is a technique used to divide program into many small, manageable, logical and functional modules or blocks.

 

2.      Qbasic is called Modular Programming [MFT 2075] [SQE 2074K]

QBasic is called modular programming because it divides program into many small, manageable, logical and functional modules or blocks.

3.      Advantages of modular programming [SEE 2073 U] [MFT 2075] [SQE 2074K]

i) Different programmers can design different program modules independently, which is required in a large and complex program.
ii) It is easy to design code and test the program modules independently.
iii) It is possible to use a single module in different places which reduces program codes.

4.      Main module
The top level controlling section or the entry point in modular programming is called main module.

5.      Sub module
Module is a block of statement that solves a particular problem. Sub module is a program which is written under the main module. A program may have one or more sub modules under main module.

6.      Procedure [SLC 2072] [SLC 2071] [SLC 2064] [SLC 2067] [SLC 2068 S] [SQE 2075K] [PMT 2075K]

Procedure is a block of statements that solves a particular program.

Procedure is a section of code which performs one or more specific tasks and can be accessed from remote location. 

There are two types of procedure – SUB Procedure and FUNCTION procedure

7.      SUB procedure [SLC 2064] [SLC 2065] [SLC 2069 S] [MM 2076]
A SUB procedure is a small, logical and manageable functional part of program which prefers specific task and does not return any value. SUB-procedure is called by CALL statement. SUB-procedure’s name does not accept data type symbol because it does not need to return a value.

8.      FUNCTION procedure [SLC 2064] [SLC 2065] [SLC 2069 S] [MM 2076]
A FUNCTION procedure is a small, logical and manageable functional part of a program which performs specific task and returns single value to the main program or calling module. FUNCTION-procedure is called by statement and expression method. FUNCTION-procedure’s name accepts data type symbols such as $, %, !, #, &, etc. and it depends on the type of value to be returned. E.g.: FUNCTION REV$ returns string.

9.      String function [SEE 2074 U]

String function is used with string it returns string value.

 

10.   Numeric function [SEE 2074 U]

Numeric function is used with number it returns numeric value.

 

11.   Library functions [SQE 2074K]
Library functions are built-in or readymade functions provided by QBASIC. E.g. MID$( ), LEN( ), SQR( ) etc.

12.   User defined function [SLC 2066 S] [SQE 2074K]
Function which is defined by the user according to the need is called user defined function.

13.   Parameters [SEE 2074]

Parameters are variables that will receive data (arguments value) sent to the procedures (SUB program and FUNCTION). Formal parameters are called parameter.

14.   Arguments
Arguments are the values that are sent to the procedures (SUB program and FUNCTION). Actual or real parameters are called arguments.

15.   CALL statement [SLC 2071] [PMT 2075K]
The function of CALL statement is to transfer the control to another procedure.

16.   DECLARE statement
The function of DECLARE statement is to declare procedure such as FUNCTION or SUB in modular programming.

17.   DIM SHARED statement
i) It makes variable accessible to all modules.
ii) It appears in main module/ program.

18.   SHARED [SLC 2071]

It is used in the sub program to share the values of certain variables between main module and sub program

19.   COMMON SHARED [SEE 2074 U]

It is used in the main program to share variable list between main module and all sub programs. This statement is used to declared variable global.

20.   Local Variable [SEE 2075 S2]

Variables which are declared inside the procedure are called local variables. Local variables are not visible to other modules or functions. Its value is protected from outside interference and has no effect on the variables outside the procedures. Local variable can access only in its own module.

21.   Global Variable [SEE 2075 S2]

Variables which are declared outside the procedure are called global variables.  Global variables are visible to other modules or functions. Its values can be accessed from any procedure or module. Global variable can be access throughout the program

22.   Passing arguments by value

When arguments are passed by value it makes a duplicate copy of arguments and their values (constants) are used directly in parameter. It doesn’t make any effect on values of variable which are passed to a procedure even they are changed in the procedure. To pass the argument by value, variable is enclosed in parenthesis.

 

23.   Passing arguments by reference

When arguments are passed by reference the address of the variables are passed to the procedure. The changes made in the procedure’s variable will affect the variables used at calling module. By default the value is passed by reference.

 

24.   Qbasic Operators [MFT 2075] [SQE 2074K]

Operators are special symbols that are meant for specific tasks or operators.

i) Arithmetic operators

ii) Relational operators

iii) Logical Operators

iv) String operator

 

25.   Static variable

The variable which is declared by using the “STATIC” keyword is called static variable.


 

Handling of data file

Questions and Answers [25]

1.      Data file

The file which contains data given by the user to the program and information provided by the user to the computer is called data file.

The different types of data file are:

a)      Sequential Access files - A data file that stores a sequential data file containing name, address of some people in the same order or in sequential order is called sequential access data file. It takes long time to access if the data file contains a large volume of data. In sequential access data file we cannot change the existing entry or insert a new entry.

b)     Random access files

2.      Program File

The file which contains a set of instructions that are needed for data processing is called program file.

3.      Mode of data file [SLC 2069]

Mode of data file means opening a sequential file for one of the three modes of operation like output mode, input mode and append mode.

4.      Modes of operation for opening a sequential file

a)      Output Mode: It is used to create a new data file and write data in it. If the file already exists its current contents will be destroyed.

b)     Input Mode: It is used to retrieve records or contents of existing data file.

c)      Append Mode: It is used to add more records in existing file. If the specified file does not exist APPEND mode creates it.

5.      File number

The number assigned to a file in order to identify it during processing is called file number.

Write down the functions of:

6.      OPEN statement: It opens a sequential file for one of the three possible operations (reading, writing, appending).

7.      WRITE statement [SEE 2075] [MM 2076]: It sends one or more data items to the specified file. It inserts commas between the data items. It encloses strings in double quotation marks.

8.      PRINT#: It adds spaces between data items while storing data. It does not enclose strings in double quotation marks.

9.      CLOSE statement [SEE 2074] [SEE 2073: It closes one or all open files.

10.   INPUT# statement [SEE 2075 U] [SEE 2075 S 2]: It reads data from the sequential data file.

11.   EOF( ) function [SEE 2075 S 2]: It is used to test the end of records with in a file.

12.   LINE INPUT statement: It reads the entire line or maximum 255 characters form the keyboard or the sequential file.

13.   INPUT$ function: It reads the specified number of characters form the data file.

14.   NAME statement [SEE 2073] [SLC 2071 S]: The NAME statement renames a file on a diskette. Only file name changes, data and program line remains intact.

15.   KILL statement [SEE 2074]: The KILL statement deletes the file or files from the specified drive and directory.

16.   MKDIR statement [SEE 2075 U]: It creates a subdirectory which is used to manage files.

17.   CHDIR statement: It allows QBASIC to change from one directory to another.

18.   RMDIR statement [SLC 2065] [SLC 2068 S]: It is used to remove or delete only the subdirectories from a disk. It can remove only empty subdirectories.

19.   FILES statement: The FILES statement displays the files of the current sub directory or specified sub directory.

20.   SHELL: The SHELL statement allows a program to run external programs or command line statements in Windows, MAC OS and Linux.

21.   INT [MM 2076] [MFT 2075]: It rounds and returns the largest integer less than or equal to a numeric expression.

22.   PRINT [PMT 2075K] : Display result on screen.

23.   MID$ ( ) [MFT 2075]: It is a string function that returns the specified number of characters from the specified location of string.

24.   LEN ( ) [SQE 2074K]: Returns the number of characters in a string or the number of bytes required to store a variable.

25.   SQR ( ) [SQE 2074K]: Returns the square root of a numeric expression.

 

Saturday, September 26, 2020

Contemporary Technology Computer Science - Grade X - New Syllabus,

Contemporary Technology       Computer Science - Grade X - New Syllabus,



What is Cloud Computing?

Cloud Computing is the use of hardware and software to deliver a service over a network (typically the Internet). With cloud computing, users can access files and use applications from any device that can access the Internet.

 

Examples of Cloud Computing

a)     Drop box, Face book, Gmail

b)     Google Drive, Apple iCloud

c)     Google Photos, Online Photoshop

d)     Word, Excel, PowerPoint

e)     Online gaming

f)      YouTube

 

Uses of Cloud Computing

a)     Store, backup and recovers data

b)     Host websites and blogs

c)     Make communication and send emails

d)     Deliver on demand software services

e)     Upload/download audio / video

 

Advantages of Cloud Computing

a)     Excellent accessibility - Cloud allows us to quickly and easily access store information anywhere, anytime in the whole world, using an internet connection.

b)     Backup and Restore Data - Once the data is stored in the cloud, it is easier to get back-up and restore that data using the cloud.

c)     Low Maintenance Cost - Cloud computing reduces both hardware and software maintenance costs for organizations.

d)     Mobility - Cloud computing allows us to easily access all cloud data via mobile.

e)     Data Security - Data security is one of the biggest advantages of cloud computing. Data is securely stored and handled.

 

Disadvantages of Cloud Computing

a)     Internet Connectivity - If you do not have good internet connectivity, you cannot access these data.

b)     Security - While sending the data on the cloud, there may be a chance that your organization's information is hacked by Hackers.

c)     Downtime The cloud providers may sometimes face technical outages that can happen due to various reasons, such as loss of power, low Internet connectivity, data centers going out of service for maintenance, etc. This can lead to a temporary downtime in the cloud service.

d)     Lacks of Support - Cloud computing companies fail to provide proper support to the customers. Moreover, they want their user to depend on FAQs or online help, which can be a tedious job for non-technical persons.

e)     Vendor lock-inWhen in need to migrate from one cloud platform to another, a company might face some serious challenges because of the differences between vendor platforms.  During migration, you might end up facing compatibility, interoperability and support issues.

 

Artificial intelligence

Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and reacts like humans. John McCarthy coined the term Artificial Intelligence in the year 1955.

Applications of AI

a)     Gaming − AI plays crucial role in strategic games such as chess, poker, tic-tac-toe, etc., where machine can think of large number of possible positions.

b)     Natural Language Processing − It is possible to interact with the computer that understands natural language spoken by humans.

c)     Expert Systems − There are some applications which integrate machine, software, and special information to impart reasoning and advising. They provide explanation and advice to the users. (for example, some expert systems help doctors diagnose diseases based on symptoms)

d)     Vision Systems − These systems understands the visual input on the computer. For example, Police use computer software that can recognize the face of criminal with the stored portrait made by forensic artist.

e)     Intelligent Robots − Robots are able to perform the tasks given by a human. They have sensors to detect physical data from the real world such as light, heat, temperature, movement, sound, bump, and pressure. They are capable of learning from their mistakes and they can adapt to the new environment.

Examples of AI

a)     Siri / Alexa- both use AI to help you complete tasks or answer questions on your mobile devices.

b)     Netflix / Youtube  - uses advanced predictive technology to suggest shows based on your viewing preferences or rating.

c)     Facebook Feed - filter content that is most likely to be of interest to the particular Facebook user and predict what they will want to see.

 

Virtual Reality

An artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment.

To "enter" a virtual reality, a user wears special gloves, earphones, and goggles, all of which receive their input from the computer system.

In this way, at least three of the five senses are controlled by the computer.

In addition to feeding sensory input to the user, the devices also monitor the user's actions.

The goggles, for example, track how the eyes move and respond accordingly by sending new video input.

Application areas of VR

a)     It can be used in medical studies to enable students to know the human body structure.

b)     It can be used in scientific research laboratories so that scientist can easily research on a specific topic.

c)     It can be used in entertainment like in games and movies to make the gaming experience more real and to allow individual to experience adventures under extreme conditions.

d)     It can be used in driving schools as it give a real look of roads and traffic.

e)     It can be used in military training for the soldiers to get familiar with different areas in the battlefield.

E-Governance

a)     The use of ICT and its application by the government for the provision of information and public services to the people.

b)     The basic purpose of e-governance is to simplify processes for all, i.e. government, citizens, businesses, etc. at National, State and local levels.

c)     It is the use of electronic means, to promote good governance

d)     An ordinary citizen gets the government facility through the internet.

 

Models of E-Governance

a)     Government-to-Citizen(G2C)

b)     Government-to-business (G2B)

c)     Government-to-Government (G2G)

d)     Government-to-Employee (G2E)

 

Government-to-Citizen(G2C)

a)     G2C-is transaction between the government to citizens.

b)     It helps the ordinary people to reduce the time and cost to conduct a transaction.

c)     A citizen can have access to the services anytime from anywhere.

d)     It includes online registration of birth/ death/marriage certificates, filling of income taxes, electricity bills, license renewals etc.

 

Government-to-business (G2B)

a)     G2B it is the transaction between government to business.

b)     It is efficient for both government and business organizations.

c)     It enhances the efficiency and quality of communication and transparency of government projects.

d)     It includes online application forms, renewing licenses, registration etc.

 

Government-to-Government (G2G)

a)     G2G it is the transaction between government to government.

b)     Government agencies can share the same database using online communication.

c)     It can communicate with global government and local government as well.

d)     It provides safe and secure inter-relationship between domestic or foreign government.

 

Government-to-Employee (G2E)

a)     G2E it is the transaction between government to employee.

b)     G2E aims to bring employees together and improvise knowledge sharing.

c)     G2E provides online facilities to the employees like applying for leave, reviewing salary payment record and checking the balance of holiday.

d)     G2E is also the relationship between employees, government institutions, and their management.

 

Advantages of E-Governance

a)     Speed - Electronic technologies make communication better, and faster. It will take very less time for any policy, or scheme to reach to the people.

b)     Transparency - The use of e-governance helps make all functions of the business transparent.  All the information of each and every policy will be directly available to the citizens.

c)     Accountability - Accountability is answerability to the people by the government. Once the transparency is achieved the government will automatically become accountable.

d)     Reduction In Cost - A lot the Government expenditure goes towards the cost of buying stationery for official purposes. However, replacing them with smart phones and the internet can saves crores of money in expenses every year.

Disadvantages of  E-Governance

a)     Loss of Interpersonal Communication - Interpersonal communication is an aspect of communication that many people consider vital.

b)     High Setup Cost and Technical Difficulties  - the setup cost is very high and the machines have to be regularly maintained. Often, computers and internet can also break down and halts governmental work and services.

c)     Illiteracy - People who doesn’t know how to operate computers and smart phones will be very difficult for them to access and understand.

d)     Cybercrime/Leakage of Personal Information - There is always the risk of private data of citizens stored in government serves being stolen. Cybercrime is a serious issue; a breach of data can make the public lose confidence in the Government’s ability.

 

Mobile Computing

  A technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.

  A variety of devices that allow people to access data and information from wherever they are. 

  The main concept involves −

a)     Mobile communication - protocols, services, bandwidth, and portals necessary to facilitate and support the stated services.

b)     Mobile hardware - portable laptops, smart phones, tablet Pc's, Personal Digital Assistants.

c)     Mobile software - actual program that runs on the mobile hardware. Eg. Operating System

Benefits of Mobile Computing

a)     Connectivity: You can stay connected to all sources at all times.

b)     Social Engagement: You can interact with a variety of users via the Internet.

c)     PersonalizationYou can modify your mobile computing to your individual needs.

Features of Mobile Computing

a)     Easy to handle and carry these small devices.

b)     Ability to share data and collaboration between users.

c)     Data can be transferred easily between users.

d)     People can work from the comfort of any location they wish to as long as the connection and the security concerns are properly factored.

e)     The presence of high speed connections has also promoted the use of mobile computing.

 

The Internet of Things (IoT)

  A technology that connects all electronic devices together and prompts them to exchange information without any human intervention.

  A system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

  The term "The Internet of Things" was coined by Kevin Ashton in a presentation to Proctor & Gamble in 1999.

Components of IoT

a)     Sensors/Devices - Sensors/Devices collect data from their environment. e.g. Our phone is a device that has multiple sensors like GPS, camera, Motion etc. where data is being collected based on surroundings

b)     Connectivity to Cloud - The sensors/devices can be connected to the cloud and store, through a variety of methods including: Bluetooth, WiFi, Cellular etc.

c)     Data Processing  - Software perform data processing on cloud data to get a analyzed or computed data. e.g Computing the temperature within an acceptable range.

d)     User Interface - The analyzed or computed data is made useful to the end user via and alert(email, text, notification). e.g a alert message when temperature is beyond the acceptable range.

Applications of Internet of Things (IoT)

a)     Smart home - Smart home encapsulates the connectivity inside your homes. It includes smoke detectors, home appliances, light bulbs, windows, door locks, etc.

b)     Smart City - Smart city offers all types of use cases which include traffic management to water distribution, waste management, etc.

c)     Parking Sensors - IOT technology helps users to identify the real-time availability of parking spaces on their phone.

d)     Connected Cars - IOT helps automobile companies handle billing, parking, insurance, and other related stuff automatically.

e)     Activity Trackers - Helps you to capture heart rate pattern, calorie expenditure, activity levels, and skin temperature on your wrist.

Advantage of IOT

a)     Accessing information is easy; you can control a device that is miles apart in real time.

b)     Communication between the connected devices becomes more transparent and easier.

c)     Transferring data packets over a network reduces both time and money.

d)     Automation is the need of the hour; IOT reduces human intervention and efficiency of services

Disadvantage of IOT

a)     There is a huge risk of leakage of confidential data, when sent over a network.

b)     Due to its complex network, a single loophole can put the entire system down, affecting everyone.

c)     With automation, the need of human labor reduces drastically.

d)     Today’s lifestyle is technology driven, we depend on the technology for the tiniest of tasks.

 

E-learning

E-learning is a new concept of delivering digital contents in learner oriented environment using information and communication technology (ICT). Delivery of the digital content is the main characteristic of e-learning.

 

Advantages of e-learning:

a)     It is easy for customization.

b)     There is no any geographical limitation for learning.

c)     It is quite favorable for learner as it can happen at any time and anywhere.

d)     It reduces or eliminates travel costs to attend learning events.

e)     It reduces or eliminates need for classroom/instructor infrastructure.

 

Disadvantages of e-learning:

a)     Learners with low motivation or bad study habits may fall behind

b)     Students may feel isolated from the instructor and classmates

c)     Instructor may not always be available when students are studying or need help

d)     Slow Internet connections or older computers may make accessing course materials frustrating

e)     Managing computer files and online learning software can sometimes seem complex for students with beginner-level computer skills

 

 

 

E-Banking

  to conduct financial transactions via the Internet.

  funds transfer, payment of bills, opening bank accounts online, and much more.

  consumers aren't required to visit a bank branch in order to complete most of their basic banking transactions.

  A customer needs a device, an Internet connection, and a bank card to register. Once registered, the consumer sets up a password to begin using the service.

Features of E-Banking

a)     Faster Transactions - People don’t need to wait in queue to transfer their funds or pay off their bills; they can easily do it through their device. It saves the time of customers as they can easily access their account with the help of their device.

b)     Lowers Transaction Cost - Whole transactions are done online over the internet. It has reduced the manpower requirements as workload is reduced. It has also reduced the paperwork in organizations as all transactions are recorded digitally.

c)      Provides 24×7 Service - Customers can easily access their account anytime & from anywhere with no limitations. It provides convenience to the customers as they can perform transactions as per their wish. 

d)     Reduces The Chances of Error - E-banking system works fully automated over the internet. All transactions are recorded & stored digitally. There is no need to manually maintain each & every record in books of account. So, the chances of human error are minimized.

e)     Develops Loyalty in Customers - Customers are able to get a user-friendly interface from the banking website. They are able to avail services any time even from their home comfort. This develops a sense of loyalty among customers when they are happy with the services of their banks.

Internet Banking

  a facility offered by banks and financial institutions that allow customers to use banking services over the internet.

  Customers need not visit their bank’s branch office to avail each and every small service. 

  Use PC or laptop and internet connection to use this facility.

  Kumari Bank was the initiator of internet banking in Nepal. It started its e-banking services in 2002. 

Features of Internet Banking

a)     The customer can view account statements.

b)     The customer can check the history of the transactions for a given period by the concerned bank.

c)     Bank, statements, various types of forms, applications can be downloaded.

d)     The customer can transfer funds, pay any kind of bill, recharge mobiles, DTH connections, etc.

e)     The customer can buy and sell on e-commerce platforms.

Advantages of Internet Banking

a)     The customers get permanent access to his/her bank anytime and anywhere.

b)     Transactions are safe and highly secure.

c)     Immediate funds transfer helps the user in time of urgent need.

d)     It saves valuable time of the users.

Disadvantages of Internet Banking

a)     Internet Requirement - An uninterrupted internet connection is a foremost requirement to use internet banking services. If you do not have access to the internet, you cannot make use of any facilities offered online.

b)     Transaction Security: No matter how much precautions banks take to provide a secure network, online banking transactions are still susceptible to hackers. 

c)     Difficult for Beginners: if there is nobody who can explain them on how internet banking works and the process flow of how to go about it. It will be very difficult for inexperienced beginners to figure it out for themselves.

d)     Securing Password: If the password is revealed to others, they may utilise the information to devise some fraud. Also, the chosen password must comply with the rules stated by the banks. Individuals must change the password frequently to avoid password theft which can be a hassle to remember by the account holder himself.

Mobile Banking

a)     Mobile banking is the act of making financial transactions on a mobile device (cell phone, tablet, etc.).

b)     Download Mobile App or SMS system

c)     Inquiry based transactions such as balance inquiry, transaction history, and transaction alert.

d)     Request for banking services such as cheque book request, statement request, cheque stop request

e)     Other transactions such as fund transfer, utility payment, merchant payment, third party payment

 

***