Friday, March 19, 2021

SEE 2073 Computer Science Question Solved

 



SEE 2073 Computer Science Question Solved
SEE 2073
Computer Science

1. Answer the following questions.

a) Write any two advantages of BUS topology.
AnsThe advantages of bus topology are:
It is easy to set up computers and other devices in bus topology, because all the devices are connected through a single wire.
It requires fewer cable media, so it is cheaper than other topologies.

b) Define computer security.
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.

c) Write any two preventive measures to protect computer system from computer virus.
Ans: Any two preventive measures are:
i) Do not install pirated software, especially computer games
ii) Scan the mail or unknown files of internet before opening in your computers.

d) What is multimedia?
Ans: Multimedia is the integration of multiple forms of media, which presents information in more interesting and understandable way.

e) Write the use/function of File Transfer Protocol.
Ans: The use of File Transfer Protocol is to transfer the file from one computer to another computer. It helps to upload and download the files.

2. a) Perform the conversion as per the direction:
            i) (BAD)16 into binary
            Soln:
            Converting Hexadecimal to Binary
            B = 1011
            A = 1010
            D = 1101
            (BAD)16 = (101110101101)2

ii) (1111001)2 into octal
Soln:
Converting Binary to octal
001 = 1
111 = 7
001 = 1
(1111001)2 = (171)8
           
b) Perform the binary calculations:
            i) 11 × 10 + 11

1
1
×
1
0

0
0
1
1
×
1
1
0
Now, Adding with 11

           
1
0

+
1
1
1
0
0
1
                       
 11 × 10 + 11 = 1001
                       
            ii) 110  ¸ 10
10)
 110 (
11

-10


   10


   10


   00


            Quotient = 11
            Remainder = 00

3. Match the following:
a) Malicious software                        i) UPS
b) Primary storage device                  ii) virus
c) Power protection Device                iii) copyright
d) Intellectual property law                iv) RAM
                                                            v) CD-ROM

Answer
a) Malicious software            virus
b) Primary storage device      RAM
c) Power protection Device    UPS
d) Intellectual property law    copyright

4. State whether the following statements are true or false:
a) Computer Network reduces the cost. True
b) WWW is an organization which controls Internet. False
c) Microwave transmission is an example of bound media. False
d) The parts of the computer which can be seen and touched are called hardware. True

5. Write the appropriate technical terms of the following:
a) A type of network in which every computer works as both client and server.
Ans: Peer-to-peer network
b) Protocol used to receive email from the mail server.
Ans: POP( post office protocol)
c) The moving graphics images.
Ans: Animation
d) The law that controls cyber crimes.
Ans: Cyber Law

6. Write the full forms:
a) LAN: Local Area Network.
b)ROM: Read Only Memory.
c) SMTP: Simple Mail Transfer Protocol.
d)NOS: Network Operating System.

7. Answer the following questions.

a) Define data and database.
Ans: Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense. Database is a collection of related and organized information that can be used for different purpose.

b) What is primary key? Write its importance.
Ans: Primary key is a field that uniquely identifies the record. It is needed because it neither accepts duplicate values nor  permit null values.
The importance of Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.

c) Name any four data types used in MS-Access.
Ans: Any four data types of MS-Access are:
i) Text
ii) Number
iii) Memo
iv) Currency

8. Select the correct answer:
a) The columns in a database table are called………………………
Ans: Field
b) Which is the suitable data type to store video?
Ans: OLE object
c) …………… object of MS-Access is used to print formatted data.
Ans: Report
d) Which is not a type of query?
Ans: Search

9. Match the following:
a) Query                     i) Printed format
b) Form                       ii) Stores data
c) Table                       iii) Allows view, edit, input data
d) Report                    iv) Extracts selected record for view
                                    v) DBMS

Answer
a) Query                     Extracts selected record for view
b) Form                       Allows view, edit, input data
c) Table                       Stores data
d) Report                    Printed format


10.
a) What is a loop?
Ans: Loop can de defined as repeating the statement of statement blocks for a number of times.
b) Write the functions of  NAME and CLOSE statements.
Ans: The function of NAME statement is to  renames a file on a diskette.  The function of CLOSE statement is to close one or all open files.
c) What is variable?
Ans: The data item whose value changes during the execution of a program is called variable.



11. Re-write the given program after correcting the bugs:
DECLARE SUB SUM(N)
INPUT “Any Number”; N
PRINT SUM(N)
END
SUB SUM (N)
S=0
WHILE N=0
R= R MOD 10
S=S+R
N=N/10
WEND
PRINT “Sum of digits”;S
END

Debugged Program

DECLARE SUB SUM(N)
INPUT “Any Number”; N
CALL SUM(N)
END
SUB SUM (N)
S=0
WHILE N< >0
R= N MOD 10
S=S + R
N=N 10
WEND
PRINT “Sum of digits”;S
END

12. Write the output of the following program.
DECLARE FUNCTION AREA (L, B)
CLS
LET L = 50
LET B = 10
LET ans = “; ans
PRINT “The area=”; ans
END

FUNCTION AREA (L, B)
Ar=L*B
AREA=ar
END FUNCTION

Output
The area = 500


13. State the following program and answer the given questions:
DECLARE FUNCTION Diff(A, B)
CLS
INPUT “Enter first number”; A
INPUT “Enter second number”; B
PRINT “The difference”; Diff(A, B)
END

FUNCTION Diff(A, B)
Difference= A – B
Diff = difference
END FUNCTION

List all the numeric variables used in the above program.
Ans: The numeric variables used in the above program are A, B and Difference

List the local variables used in the above program.
Ans: The local variables used in the above program is difference

14
a) Write a program to calculate the area of four walls using Sub….End Sub. [Hint: Area=2H(L+B)
DECLARE SUB AREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
CALL AREA (L, B, H)
END

SUB AREA (L, B, H)
A = 2 * H * (L + B)
PRINT “AREA OF FOUR WALLS”; A
END SUB
b) Write a program to input a word in the main module and count the total number of vowel characters present in the word using FUNCTION…END FUNCTION.
DECLARE FUNCTION COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF VOWELS= "; COUNT(S$)
END

FUNCTION COUNT (S$)
VC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
COUNT = VC
END FUNCTION
c) Create a data file to store the records of few employees having Name, Address, Post, Gender and Salary fields.

            OPEN “std.rec” FOR OUTPUT AS #1
            DO
CLS
            INPUT “Enter Name”; N$
            INPUT “Enter Address”; A$
            INPUT “Enter Post”; P$
            INPUT “Enter gender”; G$
            INPUT “Enter Salary”; S
            WRITE #1, N$, A$, P$, G$, S
            INPUT “Do you want to continue”; CH$
            LOOP WHILE UCASE$(CH$)=”Y”
            CLOSE #1
            END

#ThankYou Reshu Acharya For Solving

Solved SEE 2074 [Computer Science]

 Solved SEE 2074 [Computer Science]

Group A
Computer Fundamentals (22 Marks)
1. Answer the following questions: [5×2=10]
    a.  Define computer network.
        Ans: Computer network can be defined as a connection between computers and other
                 electronic devices to share the resources and information.
    b. Define Internet.
      Ans: A global computer network providing a variety of information and communication
               facilities is called internet.
    c. Write the importance of power protection device to protect computer system.
      Ans: The importance of power protection device to protect computer system are:
                i) To protect the hardware against damage from unexpected power failures.
                ii) To protect files and programs being corrupted due to sudden power failure.
    d. What is computer virus? Mention any two symptoms that can be seen when a computer is                     infected by computer virus.
          Ans: A computer program which is capable of copying itself and typically has a detrimental
                   effect, such as corrupting the system or destroying data. Or any other suitable answer.
                   Two symptoms of computer virus in a computer are:
                    i) Unexpected computer behavior
                    ii) Computer becomes slower
   e. What is cyber crime? Give any two examples.
        Ans: The criminal activities involving the information technology with the help of computer is
                 known as cyber crime.
                 Any two examples of cyber crimes are: software piracy and hacking

2.a) Perform the conversion as per the direction: [2×1=2]


  b) Perform the binary calculations: [2×1=2]


3. Match the following: [4×0.5=2]
     Group 'A'                       Group 'B'
   a) RJ 45 connector          i) Duplicate copy
   b) Backup                        ii) Multimedia
   c) Microphone                 iii) Twisted pair  cable
   d) Hub / switch                iv) Ring Topology
                                            v) Star Topology
Answers:

  Group 'A'                       Group 'B'
   a) RJ 45 connector          i) Twisted pair  cable
   b) Backup                        ii) Duplicate copy
   c) Microphone                 iii) Multimedia
   d) Hub / switch                iv) Star Topology
                                         
4. Select the best answer of the following: [4×0.5=2]
    a) Which of the following is not a network protocol?
         i) POP          ii) FTP         iii) TCP/IP        iv) NOS
         Ans: NOS
    b) Which of these software is used for photo editing?
         i) Ms-Excel          ii) Photoshop         iii) Power-Point       iv) MS-Word
         Ans: Photoshop
    c) Which device is used to connect multiple networks that use the same protocol
         i) Bridge          ii) NIC        iii) Switch       iv) Gateway
         Ans: Bridge
    d) Process of arranging the scattered files into a contiguous manner.
         i) Scandisk          ii) Backup         iii) Defragmentation        iv) Debugging
         Ans: Defragmentation

5. Write the appropriate technical terms of the following: [4×0.5=2]
   a) The physical layout of local area network.
       Ans: Topology
   b) The business conducted through internet.
       Ans: E-commerce
   c) The law which controls the crime which is done with the help of computer and Internet.
       Ans: Cyber law
   d) A computer or device which provides different services to other computers connected to the     
         network.
       Ans: Server

6. Write the full form: [4×0.5=2]
    a) SMTP: Simple Mail Transfer Protocol
    b) WAN : Wide Area Network
    c) URL : Uniform Resource Locator
    d) VOIP : Voice Over Internet Protocol

Group B
Database (10 Marks)

7. Answer the following questions: [3×2=6]
   a) Define database.
      Ans: Database can be defined as an organized collection of data which can be easily accessed,                     managed and updated.
   b) What is data redundancy? How can it be reduced in database?
       Ans: The repetition of same piece of data in a database in more than one location is called data                    redundancy. Data redundancy can be minimized by normalization of database.
   c) Mention any four data types that can be used in Ms-Access.
      Ans: Any four data types that can be used in Ms-Access are
               i) Text
               ii) Memo
               iii) Currency
               iv) Number

8. Select the correct answer: [4×0.5=2]
    a) Which if the following is not accepted by primary key?
         i) Number         ii) Text         iii) Null value        iv) None
         Ans: Null value
    b) Which is called rows in database table?
         i) Field          ii) Record         iii) Form       iv) None
         Ans: Record
    c) Which data type consumes the least storage space?
         i) Text          ii) Yes/No          iii) OLE object       iv) Memo
         Ans: Yes/No
    d) Which is the default data type of Ms-Access?
         i) Memo         ii) Number       iii) Text          iv) Auto number
         Ans: Text

9. Match the following: [4×0.5=2]
     Group 'A'                       Group 'B'
   a) Data                            i) Input, view, edit data
   b) Form                           ii) Formatted output
   c) Report                         iii) Collection of raw facts
   d) Table                          iv) Questions to the database
                                            v) Stores data in database

Answers:

Group 'A'                       Group 'B'
   a) Data                            i) Collection of raw facts
   b) Form                           ii) Input, view, edit data
   c) Report                         iii) Formatted output
   d) Table                          iv) Stores data in database

Group C
Programming (18 Marks)
                                       
10. a) What is formal parameter? [1]
      Ans: The variable which is used in the function definition is called formal parameter.
      b) List any two data types used in C programming language. [1]
      Ans: Any two data types used in C programming language are
               i) char
               ii) int
      c) Write the function of KILL and CLOSE statements. [1]
        Ans:   The function of KILL is to delete the file
                   The function  of CLOSE is to close any opened file

11. Re-write the given program after correcting the bugs: [4×0.5=2]

   REM TO find the factorial of a given number.
   DECLARE FUNCTION FACTO (N$)
   CLS
   INPUT "Enter a number"; X
   PRINT "The Factorial is: ", FACTO (N)
   END

   FUNCTION FACTO (N)
   F = 1
        WHILE N = 0
              F = F * N
              N = N - 1
        WEND
   F = FACTO
   END FUNCTION

Debugged Program:

REM To find the factorial of a given number
DECLARE FUNCTION FACTO (N)
CLS
INPUT "Enter a number", X
PRINT "The Factorial is :", FACTO (X)
END
FUNCTION FACTO (N)
F = 1
WHILE N > 0
F = F * N
N = N – 1
WEND
FACTO = F
END FUNCTION

12. Write the output of the following program: [2]

DECLARE SUB Display (T$)
CLS
T$ = "COMPUTER"
CALL Display (T$)
END

SUB Display (T$)
FOR C = 1 to LEN (T$) STEP 2
    D$ = MID$(T$, C, 1)
    PRINT D$;
NEXT C
END SUB

Output:
CMUE

13. Study the following program and answer the given questions: [2×1=2]

DECLARE FUNCTION SUM (N)
CLS
INPUT "Enter any number"; N
S = SUM (N)
PRINT "The Sum of individual digit is"; S
END

FUNCTION SUM (N)
   WHILE N > 0
       R = N MOD 10
       T = T + R
       N = N \ 10
   WEND
 SUM = T
END FUNCTION

a) State the purpose of suing variable S in line 4 in above program.
   Ans: Variable S is used to store the value returned by the function Sum.
b) Write the use of MOD in the above program.
    Ans: MOD is used to get the remainder of the division.

14. a) Write a program to calculate area of a circle using Sub......End Sub. [3]

            DECLARE SUB Area (r)
            CLS
            INPUT "Enter radius of circle", r
            CALL Area (r)
            END
         
           SUB Area (r)
             A = 3.14*r*r
             PRINT "Area of circle :" ; A
              END SUB

      b) Write a program using FUNCTION.....END FUNCTION to count the number of words in a                 sentence. [3]
       
           DECLARE FUNCTION WCount (S$)
           CLS
           INPUT "Enter a sentence", S$
           C = WCount (S$)
           PRINT "The number of words is :" ; C
           END

          FUNCTION WCount (S$)
          W = 1
          FOR I = 1 To LEN (S$)
          C$ = MID $ (S$, I,1)
           IF C$ = " " THEN W = W + 1
           NEXT I
          WCount = W
          END FUNCTION

      c) Write a program to store Roll no., Name, Class and Address of any five students. [3]

            OPEN "Student.dat" FOR OUTPUT AS #1
            FOR I = 1 TO 5
            INPUT "Enter Roll No.", r
            INPUT "Enter Name", n$
            INPUT "Enter Class", c
            INPUT "Enter Address", a$
            WRITE #1, r, n$, c, a$
             NEXT I
             CLOSE #1
             END
***

Answer Source of all SEE Questions 2074 : Click here
You can also download the SEE Questions 2074 by Clicking here