Wednesday, January 24, 2024

SOLVED Bhaktapur Municipality SEE Preparation Exam 2080

 Bhaktapur Municipality SEE Preparation Exam 2080






Class: 10

F.M.: 50

Subject: Opt. Computer Science

Time: 1hrs 30min

(Group 'A')

Answer the following questions in one sentence:

 

What is an intranet?

An intranet is a private computer network that uses the internet protocol to securely share any part of information of an organization

 

What is cyber bullying?

Cyberbullying refers to harassment or bullying that takes place through electronic devices and digital platforms, such as the internet, social media, or messaging apps.

 

While designing table structure which data types are suitable to store information about student's name and date of birth?

Student’s Name uses text data type and date of birth uses Date/Time data type

 

What is the field size of Yes/No field?

The field size of Yes/No field is 1 bit.

 

What is local variable?

A variable which is defined in a module and is not accessible to any other modules and its value is destroyed when execution of module is over known as local variable

 

Write the format specifier of basic data types of C language.

The format specifier of basic data types of C language are int (%d), char(%c), float(%f) and double (%fd)

 

 

Write appropriate technical term for the following:

 

The ability to understand natural language and is capable of thinking and learning itself. Artificial Intelligence

Buying and selling of goods through internet. E-commerce

Write the full form of the following:

G2G – Government to Government

LIFI – Light Fidelity

 

(Group 'B')

Answer to the following questions:

 

Mention differences between client/server architecture and peer-to-peer architecture of the network.

Client/server network

Peer-to-peer network

There is a specific server and specific clients connected to the server

Clients and server are not distinguished; each node act as client and server

The client request for service and server respond with the service

Each node can request for services and can also provide the services

The data is stored in a centralized server

Each peer has its own data.

The client-server are expensive to implement.

Peer-to-peer are less expensive to implement.

 

What is password policy? Write any two important criteria for creating a strong password.

A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy.

Any two important criteria for creating a strong password are:

Mix characters, numbers and symbols. Also, mix small and capital letters.

Don't use a sequence like abcd or 1234 which are, again, easily guessable

 

What is a backup? Why is backup vital to computer security systems?

Backup is the system of copying data and programs into another location or creating a duplicate copy of it in a secured place.

Backup is vital to computer security system in order to recover the data from being lost or damaged due to accidental or intentional harm.

 

What is Online Payment? Write the different forms of e-payment in Nepal.

Online payment refers to the payment for buying goods or services through the Internet using different online payment gateway.

E.g. eSewa Nepal, iPay, Khalti, e-banking

Define antivirus software with two examples.

Antivirus software is software designed to detect and remove virus from computer system and ensures virus free environment.

E.g. Kaspersky, NAV, MSAV, McAfee, NOD 32 etc

 

Differentiate between database and DBMS with example.

Database

DBMS

A collection of systematically organized inter-related data is called a database. The purpose of data base is to store, organize and retrieve data.

DBMS is a computerized system that stores data, processes them and provides information in an organized form.

E.g. Dictionary, Marks Ledger, Telephone Directory, Attendance Register etc

E.g. MS-Access, Oracle,  MySQL, Fox Pro etc

 

What is data sorting? Write the advantages of the sorted data.

The process of arranging all the records in a table either ascending or descending order based on field or fields is known as sorting.

The advantages of the sorted data are:

Sorting helps to organize data and make it easier to find and retrieve specific information.

Sorting can save time and improve efficiency by allowing users to quickly access the data they need

 

Write two differences between Select query and Action query.

Select query

Action query

A select query is the most common category and is used for extracting specific information from one or more tables in a database. It cannot make changes in tables

Action query is a query which makes changes to many records in just one operation

We use select query to group records and perform calculations on field values in the groups such as sum, count, average, minimum and maximum

We use action query to delete records, add records, and update records

 

List any two major differences between forms and reports.

Form

Report

Form is one of the MS-Access database objects which provides graphical interface to view, modify and add data in a table or multiple linked tables

Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing

Forms provide an easy-to-use interface for data entry and manipulation, improving data accuracy and completeness

Reports provide a formatted presentation of data that is easy to read and understand

 

Write the output of the given program: (Workout with a dry run)

 

DECLARE SUB SERIES ( )

CALL SERIES

END

 

SUB SERIES

X=1

FOR I=1 TO 4 STEP 1

PRINT X;

X=X+1

NEXT I

END SUB

 

Dry Run

X

I=1 TO 4

PRINT X;

X=X+1

1

1 to 4 yes

1

1+1=2

2

2 to 4 yes

2

2+1=3

3

3 to 4 yes

3

3+1=4

4

4 to 4 yes

4

4+1=5

 

5 to 4 No

Loop Exits

 

 

 

The output of a program is

1  2  3  4

Debug

Re- write the given program after correcting the bugs:

REM program to read data from the data file.

OPEN "STAFF.DAT" FOR OUTPUT AS #1

CLS

WHILE NOT EOF(#1)

WRITE #1, A$, B, C, D

PRINT A$, B, C, D

WEND

CLOSE "STAFF.DAT"

 

END

 

Debugged Program

REM program to read data from the data file.

OPEN "STAFF.DAT" FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

INPUT #1, A$, B, C, D

PRINT A$, B, C, D

WEND

CLOSE #1

END

 

Study the following program and answer the given questions.

 

DECLARE FUNCTION TEXT$(A$)

CLS

INPUT "Enter any word"; T$

PRINT TEXT$(T$)

END

 

FUNCTION TEXTS(A$)

FOR I = LEN(A$) TO I STEP -1

B$=B$ + MID$(A$, I, 1)

NEXT I

TEXT$ = B$

END FUNCTION

List all the parameters used in the program given above.

Formal parameter is A$ and Actual Parameter is T$

 

List the variable used in the above program.

A$, T$, B$ and I are the variable used in the above program.

 

 

(Group 'C')

 

Convert/ Calculate as per the instruction:

 

i) (10111101), into Octal

 

Soln:

Converting Binary to octal

Binary value in four bits

010

111

101

Octal number

2

7

5

 

(10111101)2 = (275)16

 

ii) (4E6)16 = (?)8

Soln:

Converting hexadecimal to binary

4 = 0100

E = 1110

6 = 0110

=(010011100110)2

Now, Converting Binary to octal

Binary value in four bits

010

011

100

110

Octal number

2

3

4

6

 

(4E6)16 = (2346)8

iii) ((10101-1110)2 × (10)2

 

1

0

1

0

1

 

-

1

1

1

0

 

 

 

1

1

1

 

 

 

×

1

0

 

 

 

0

0

0

 

+

1

1

1

×

 

 

1

1

1

0

 

((10101-1110)2 × (10)2 = (1110)2

 

iv) (101110)2(1110)2 = (?)2

 

1110)

1

0

1

1

1

0

(11

 

-

1

1

1

0

 

 

 

 

1

0

0

1

 0

 

 

 

-

1

1

1

 0

 

 

 

 

 

1

0

 0

 

 

Quotient = 11

Remainder = 100

 

Write a program in QBASIC that asks radius, and height of a cylinder and calculate its surface area and volume. Create a user- defined function to calculate surface area and sub program to calculate volume. [Hint: [V=pr2h, SA-2pr (h+r)]

 DECLARE FUNCTION AREA(R, H)

DECLARE SUB VOL(R,H)

CLS

INPUT "Enter radius"; R

INPUT "Enter height"; H

PRINT AREA(R, H)

CALL VOL(R, H)

END

 FUNCTION AREA (R, H)

    AREA = 2 * 3.14 * R * (R + H)

END FUNCTION

 SUB VOL (R, H)

    V = 3.14 * R ^ 2 * H

    PRINT "Volume of cylinder"; V

END SUB

A sequential data file "Salary.dat" contains the information, employee-code, employee-name, post and basic salary. Write a program to display those records whose basic salary is greater than or equal to 15000 and post is "Officer". (४)

OPEN "Salary.dat " FOR INPUT AS #1

CLS

WHILE NOT EOF (1)

  INPUT #1, E, N$, P$, S

    IF UCASE$(P$) = “OFFICER” AND S>= 15000 THEN PRINT E, N$, P$, S

WEND

CLOSE #1

END

 

Write a program in C language to check whether the supplied number is divisible by 7 or not.

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n%7==0)

printf("%d is divisible by 7",n);

else

printf("%d is not divisible by 7",n);

return 0;

}

 

(or)

 

Write a program in C language to display the series with their sum 7, 10, 13, 16........ up to 10.

#include <stdio.h>

int main()

{

    int  j, sum = 0, a=7;

    printf("The first 10 natural number is :\n");

     for (j = 1; j <= 10; j++)

    {

        sum = sum + a;

        printf("%d ",a);

        a=a+3;

    }

    printf("\nThe Sum is : %d\n", sum);

}

Tuesday, January 23, 2024

SOLVED LALITPUR COMPUTER SCIENCE SEND UP EXAM-2080

 LALITPUR COMPUTER SCIENCE SEND UP EXAM-2080





Class: 10

Opt. Il Computer Science

Time: 2 hours.

Full Marks: 50

Group A [10 Marks]

1. Answer the following questions in one sentence:                              (6x1-6)

 

a) Name two bounded transmission media.

Ans: Any two bounded transmission media are Twisted Pair Cable and Fiber Optic Cable.

 

b) Give an example of cyber bullying.

Ans: An example of cyber bullying is sending rude emails, texts or instant messages online or on the phone

 

c) What is IoT?

Ans: IoT is a system of interrelated computing device to exchange information over a network without human-to-human or human to computer interaction

 

d) What type table do you create in MS Access to modify table structure?

Ans: We create table in design view in MS Access to modify table structure.

 

e) What is file mode?

Ans: File mode means opening a sequential file for one of the three modes of operation like output mode, input mode and append mode

 

f) Write any two numeric data type of C language.

Ans: Any two numeric data type of C language are int and double

 

2. Write the technical term for the following statements: (2x1=2)

a) A program in client computer to access internet. Web browser

b) A program that disinfects other programs. Antivirus software

 

3. Write the full forms of the following:

a) UTP – Unshielded Twisted Pair

b) ISDN – Integrated Services Digital Network

 

Group B (24 Marks]

 

4. Answer the following questions:                              (2×1=2)

 

a) What is ring topology? Mention its two advantages.

Ans: The type of topology in which each computer is connected to another computer with the last one connected to the first is called ring topology.

Any two advantages of ring topology are:

l In this topology all computers, in close loop, act as a client or server to transfer the information.

l Transmitting network is not affected by high traffic or by adding more nodes.

 

b) What is cyber law? What is the cyber law of Nepal called?

Ans: The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

The cyber law of Nepal is called The Electronic Transaction and Digital Signature Act-Ordinance.

 

c) Mention any four software security measures.

Any four software security measures are:

a)   Backup         

b)   Scandisk               

c)   Password

d)   Antivirus

 

e)   What is m-commerce? Write its two limitation.

M-Commerce refers to the process of buying and selling of goods and services through wireless handheld devices such as smartphones, tablets or personal digital assistants (PDAs).

Any two limitations are:

Mobile payment options are not available in every geographic location.

Without accessing the internet connections user will not be able to receive any data to purchase.

 

d) What is e-governance? List the types of e-governance.

E-Governance is a set of services provided by the government to public via electronic media especially using Internet.

The types of e-commerce are:

•       Government-to-Citizen(G2C)

•       Government-to-business (G2B)

•       Government-to-Government (G2G)

•       Government-to-Employee (G2E)

 

 

f) What is database? Write any two advantages of electronic data base.

A collection of systematically organized inter-related data is called a database. The purpose of data base is to store, organize and retrieve data.

Any two advantages of electronic data base are:

a)   It reduces data redundancy which means duplication of data.

b)   It allows multiple users to access the same data simultaneously.

 

g) What is field type? List any four field type supported by MS- Access.

Field type is an attribute for a field that determines the type of data that can be stored in that field.

Any four field type supported by MS- Access are:

Text, memo, Currency and Yes/No

 

h) Write two differences between filtering and querying.

Filtering

Querying

A filtering can be used to display all the data of a single table based on a specified condition

A querying can be used to display selected data from one or more tables based on a specified condition or no condition at all.

Altering the data displayed changes the original data of the table.

Manipulating the data of a saved query does not affect the original data.

 

i) What is report? Why is it prepared? What are the different parts of a report?

Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing.

Report is created to print documents according to user’s specifications of the summarized information through query or table.

The different parts of report are: Report Header, Report Footer, Page Header, Page Footer etc.

 

 

5. Write the output of the given program showing the dry run table.

 

 

DECLARE SUB TTT(N)

CLS

X=2

CALL TTT(X^2)

END

 

SUB TTT(N)

T=2

WHILE T<=4

PRINT T*N

T=T+2

WEND

END SUB

 

X

N=X^2

T

WHILE 2<=4

PRINT T*N

T=T+2

2

2^2=4

2

2<=4 Yes

2*4=8

2+2=4

 

 

4

4<=4 Yes

4*4=16

4+2=6

 

 

6

6<=4 No

Loop Exits

 

 

 

The output of a program is:

8

16

 

 

6. Debug the following program:

Rem to print 5 records from data file HOSPITAL.TXT

OPEN "HOSPITAL.TXT" FOR APPEND AS #5

FOR REP = 1 TO 5

INPUT #3, PN$,AD$,G$,A

DISPLAY PN$,AD$,A, G$

NEXT REP

FINISH #5

END

 

Debugged Program

 

Rem to print 5 records from data file HOSPITAL.TXT

OPEN "HOSPITAL.TXT" FOR INPUT AS #5

FOR REP = 1 TO 5

INPUT #5, PN$,AD$,G$, A

PRINT PN$,AD$, G$, A

NEXT REP

CLOSE #5

END

 

7. Read the following program and answer the given questions. (2)

 

DECLARE SUB AA (N$)

 

CLS

W$= "CYBERCRIME"

CALL AA(W$)

END

 

SUB AA (N$)

R= LEN(N$)\2

E$=RIGHT$(NS,R) + LEFT$(N$,R)

PRINT E$

END SUB

 

Questions:

 

a) List all string variables from the program.

Ans: N$, W$ and E$ are the string variables used in the above program.

 

b) What type of operator is '+' in above program?

Ans: ‘+’ is an string operator which is used to concatenate strings.

 

 

 

 

Group C [16 Marks]

 

8. Convert/Calculate as per the instruction:

 

a) (111000001)2=(?)16

b) (521) (?) 10

c) (111) X (11)

d) (100110)2 (110)2





9. a. Write a program in QBASIC to define a function procedure to display the cube root of an integer supplied by the user. Use sub procedure module to calculate and print the difference between cube root and square root the same integer. [4]

 

DECLARE FUNCTION CUBE(N)

DECLARE SUB SQ(N)

CLS

COMMON SHARED C

INPUT "Enter any number"; N

PRINT "Cube root of a given number="; CUBE(N)

CALL SQ(N)

END

 

FUNCTION CUBE (N)

    C = N ^ (1 / 3)

    CUBE = C

END FUNCTION

 

SUB SQ (N)

    S = N ^ (1 / 2)

    D = C - S

    PRINT "difference between cube root and square root="; D

END SUB

b. A sequential data file 'STUDENT.DAT contains the information regarding name, class, section and gender of 50 students. Write a program to add five more records in the same file. [4]

OPEN “STUDENT.DAT” FOR APPEND AS #1

CLS
FOR I = 1 TO 5

INPUT “Enter Name”; N$

INPUT “Enter Class”; C

INPUT “Enter Section”; S$

INPUT “Enter Gender”;G$

WRITE #1, N$, C, S$, G$

NEXT I

CLOSE #1

END

 Write a program using C language to print the first 25 odd numbers between 50 to 100.

 

#include <stdio.h>

int main() {

  

    int count = 0;

    printf("The first 25 odd numbers between 50 to 100\n");

    for (int i = 50; i <= 100; i++)

    {

        if (i % 2 != 0)

        {

            printf("%d ", i);

            count++;

            if (count == 25)

                break;

        }

    }

      return 0;

}

10. Write a program using C language to input an integer then check whether the integer is negative or positive or zero.

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n>0)

printf("%d is positive number",n);

else if(n<0)

printf("%d is negative number",n);

else

printf("%d is zero number",n);

return 0;

}