Saturday, January 3, 2026

6. Cyber Security and Digital Citizenship

 

6. Cyber Security and Digital Citizenship

 DOWNLOAD PDF LINK




6.1 Concepts of Cybersecurity 

 6.2 Concept of Cybercrime 

 6.3 Prevention methods for cyber crime 

 6.4 Safe web browsing techniques 

 6.5 Concept of Digital Citizen 

 6.6 Concept of Netiquette and online behaviors 

 6.7 Concept of digital footprint and privacy in online 



6.1. Concept of cybersecurity

Cybersecurity is the practice of protecting computer systems, networks, and digital information from theft, damage, unauthorized access, and cyberattacks.

Cyberattacks occur every day and can affect individuals, small businesses, and large organizations around the world. These attacks can cause serious data loss and financial damage. To stay protected, people and organizations use various methods such as network security, application security, information security, and operational security. Therefore, cybersecurity is essential to keep digital information safe from cyber threats.

 

Why is cybersecurity essential for individuals and businesses in Nepal?

Cybersecurity is essential in Nepal because the use of the internet, online banking, and digital services is increasing rapidly. It protects individuals’ personal data and finances from cyber crimes such as hacking and phishing. For businesses, it helps secure confidential data, prevent financial loss, and maintain customer trust.

 

How do your online activities impact your privacy and security?

Online activities affect privacy and security because sharing personal information, using weak passwords, or clicking unknown links can expose data to cyber attacks. Unsafe behavior may lead to hacking, data theft, or identity misuse. Safe practices help protect privacy and security.

 

What are the responsibilities of a digital citizen?

A digital citizen should protect personal and others’ data, follow cyber laws, and use the internet ethically. They should avoid cyber crimes, respect privacy, and communicate responsibly online. Practicing safe online behavior is also an important responsibility.

 

6.2. Concept of cybercrime

 

Cybercrime refers to criminal activities carried out using computers or the internet.

When computers are used for illegal purposes, they can harm people’s safety, privacy, and financial security. Cybercrime includes activities such as identity theft, phishing through fake emails, website attacks, data theft, installing malicious software without permission, and hijacking social media accounts.

In Nepal, cybercrime is regulated under the Electronic Transactions Act (ETA), 2063 B.S., which helps control cybercrime and enforce laws related to digital offenses.

 

6.3 Prevention methods from cybercrime

·       Use a strong password.

·       Multi-factor authentication (MFA)

·       Software updates

·       Authentication

·       Use of Firewall

 

Use a strong password.

 

A password is a set of alphanumeric characters used to verify a user’s identity.

Using strong and unique passwords helps protect digital data from cyber threats and unauthorized access. Passwords should be changed regularly and never shared to prevent misuse of personal information.

 

Passwords and usernames together are known as credentials, which are essential for accessing emails, websites, and financial accounts.

Keeping passwords secure helps prevent unauthorized access and misuse of personal information.

 

 

Tips to Ensure Passwords are Secure and Strong

a. Do not use simple sequences such as 1234 or abcd, as they are easy to guess.

b. Use a combination of uppercase and lowercase letters, numbers, and special symbols.

c. Avoid using dictionary words or common terms such as admin or password.

d. Use a longer password. It should be at least six characters, and longer passwords provide better security.

e. Do not reuse the same password for multiple accounts and avoid sharing passwords with others.

 

Multi-Factor Authentication (MFA)

Multi-factor authentication (MFA) is a security method that requires users to provide two or more forms of verification to access an online account or application.

It adds an extra layer of security, so even if a password is stolen, unauthorized users cannot easily access the account.

MFA may require a password along with a mobile phone, fingerprint, face scan, or other verification methods.

 

Types of Multi-Factor Authentication

  1. Something you know
    a. Password
    b. PIN
  2. Something you have
    a. Smartphone
    b. Security badge
  3. Something you are
    a. Biometrics such as fingerprint
    b. Voice recognition
    c. Retina scan

 

Software Updates

Keeping the operating system and applications up to date is very important for cybersecurity.

Regular software updates fix security vulnerabilities and protect systems from cyber attacks.

Enabling automatic updates helps prevent attacks that target outdated software.

 

Authentication

Authentication is the process of identifying a user, usually by using a username and password.

A strong authentication system helps ensure that only authorized users can access a computer system and prevents unauthorized access.

 

Use of Firewall

A firewall is a security tool that monitors and filters network traffic to block unauthorized access to a device or network.

It can be hardware-based, software-based, or built into an operating system such as Windows Firewall.

Using a firewall helps protect systems from unwanted internet traffic, viruses, and cyber attacks.

 

6.4 Safe Web Browsing Techniques

Safe web browsing techniques refer to the practices and methods used to browse the internet securely in order to protect users from cyber threats, malware, data theft, and unauthorized access.

Safe web browsing techniques help reduce cyber risks and protect users from online threats.

 

To prevent such attacks, here are some safe browsing techniques that help minimize cyber threats:

 

Use a Secure Connection

A secure connection is a private and encrypted communication between a user’s device and a server. Encryption prevents unauthorized users from viewing or altering data. A secure connection can be identified by a lock icon or https in the website address bar. Using a trusted Virtual Private Network (VPN) also helps protect user privacy while browsing the internet.

 

Use a Secure Browser

A secure browser helps protect user privacy and security while browsing the internet.

 It provides features such as private browsing, tracking protection, ad-blocking, and password management.

Examples of secure browsers include Mozilla Firefox, Google Chrome, Safari, Microsoft Edge, Opera, and Brave.

 

Use a Secure Search Engine

A secure search engine is a web-based tool that allows users to search for information on the internet while prioritizing privacy and security.

It may also filter harmful or inappropriate websites from search results.

Examples of secure search engines include Google, Bing, and DuckDuckGo.

 

Use Secure Websites

A secure website protects user privacy and data by using security features such as encryption and authentication.

A secure website can be identified by a lock icon or https in the address bar.

Checking the website’s privacy policy and user reviews also helps ensure that proper security measures are in place.

 

6.5 Concept of Digital Citizen

A digital citizen is a person who uses the Internet and digital technologies responsibly, safely, and ethically. A good digital citizen respects others online, protects personal information, avoids cyberbullying, follows laws, and uses technology to learn, communicate, and contribute positively to society.

Example: A student attending online classes, using social media politely, and following cybersecurity rules is a good digital citizen

 

To be a good digital citizen, consider following these guidelines:

  • Think Before You Post anything online to avoid hurting others or sharing harmful content.
  • Use the Internet and social media responsibly and respectfully.
  • Protect personal information such as passwords, addresses, and bank details.
  • Avoid cyberbullying, trolling, or spreading fake news.
  • Follow cyber laws and respect copyrights when using digital content.
  • Use strong passwords and update them regularly for online safety.
  • Report harmful or suspicious online activities to teachers, parents, or authorities.
  • Use digital tools for learning, communication, and positive contribution to society.

 

Digital Citizen

A digital citizen is a person who uses the internet and digital technologies responsibly and ethically. They actively participate in the digital world by creating, sharing, and using digital content in a safe and respectful manner.

 

Guidelines of a Good Digital Citizen

a. Think carefully before posting on social media and consider its impact.
b. Avoid sharing personal information to reduce the risk of identity theft.
c. Use multiple search engines to improve privacy and limit tracking.
d. Change passwords regularly to protect online accounts and data.
e. Report unlawful or inappropriate online activities to the concerned authorities.

 

 

6.6 Concept of Netiquette and Online Behaviors

Netiquette is a combination of the words network and etiquette and refers to the set of rules and guidelines for proper and respectful behavior on the internet.

Online behavior and internet ethics focus on using digital platforms responsibly and ethically in online communities.

Netiquette is important for both personal and professional use of the internet on platforms such as social media, online forums, and messaging apps.

Just like good manners are important in real life, respectful behavior is equally important in the online world. The basic principle of netiquette is to treat others online with respect.

 

Examples of Good Netiquette and Online Behavior

  1. Communicate respectfully with others online.
  2. Avoid using offensive or harmful language.
  3. Respect privacy and do not share personal information without permission.
  4. Avoid spamming or flooding messages.
  5. Give proper credit when sharing others’ work.
  6. Think carefully before posting or commenting online.
  7. Report abusive or inappropriate behavior.
  8. Be open to constructive criticism.
  9. Maintain a positive and responsible online presence.

 

6.7 Concept of Digital Footprint and Privacy Online

A digital footprint is the information record created by an individual’s online activities. These activities include web searches, social media usage, online shopping, emails, phone calls, and app usage.

A digital footprint is also known as a digital shadow or electronic footprint.

All online activities create digital data that can be used to track a person’s behavior and devices, which makes privacy an important concern in the digital world.

 

Types of Digital Footprints

I. Active Digital Footprint

An active digital footprint consists of information that a user knowingly and intentionally shares online. Since the user provides this information willingly, they are aware of the footprint being created.
Examples: social media posts, emails, comments, and phone calls.

 

II. Passive Digital Footprint

A passive digital footprint consists of information that is collected without the user’s direct knowledge. These footprints are harder to control and manage because they are often gathered automatically.
Examples: web searches, online shopping history, location data, website cookies, and fitness tracker data.

 

Online privacy refers to the protection of an individual’s personal information and communications on the internet. It involves safeguarding data from unauthorized access and misuse. Although digital technology offers many benefits, it also increases the risk of privacy breaches due to digital footprints.

 

Advantages of Digital Footprints

 

a. Health Monitoring
Smartwatches and health applications use digital footprints to track and analyze fitness and health data, helping in better health management.

b. Social Connections
Digital footprints help people connect and communicate with others through social networking platforms.

c. Targeted Advertising
Companies use browsing behavior to show relevant advertisements, which can improve customer engagement and sales.

d. Law Enforcement Support
Law enforcement agencies use digital footprints to assist in investigations, prevent crimes, and ensure public safety.

 

Disadvantages of Digital Footprints

 

a. Security Vulnerabilities
Digital footprints can expose users to security risks, leading to privacy breaches and identity theft.

b. Legal and Ethical Concerns
The use of digital footprints raises legal and ethical issues related to privacy rights and data protection.

c. Exploitative Business Practices
Some businesses misuse or sell user data without proper consent, raising concerns about fairness and ethics.

d. Cybercriminal Exploitation
Hackers can use digital footprint data to commit fraud and other cyber crimes.

e. Spying and Online Abuse
Digital footprints can be misused for spying, cyber harassment, and online abuse.

 

Steps to Protect Yourself from Digital Footprint Risks

 

a. Know Security Rules
Understand how websites and online services collect and use your personal information.

b. Update Privacy Settings
Adjust privacy settings on social media and apps to control who can see your data.

c. Secure Devices
Use strong and unique passwords for each account and enable multi-factor authentication.

d. Remove Old Accounts
Delete unused or inactive online accounts to reduce exposure of personal information.

e. Update Software
Keep devices and applications updated to fix security vulnerabilities.

f. Disable Location Tracking
Turn off location services when not required to prevent unnecessary tracking.

 

ii. Explain Cyber Law by relating it with the constitution.

Cyber law refers to the laws that regulate the use of computers, the internet, and digital activities. Like the constitution protects citizens’ rights and responsibilities, cyber law protects users’ digital rights, privacy, and security while controlling cyber crimes.

 

iii. What is a Firewall? Why is it different from antivirus software?

A firewall is a security system that monitors and controls incoming and outgoing network traffic to block unauthorized access. It is different from antivirus software because a firewall prevents unauthorized access, while antivirus software detects and removes viruses and malware from a system.

 

iv. You use digital devices on a daily basis. What do you know about digital society?

A digital society is a community where people use digital devices and the internet for communication, education, business, and social interaction. It relies on technology to share information and provide services efficiently.

 

 

 

a. Define malware and describe its types.

Malware (malicious software) refers to any software intentionally designed to damage computer systems, steal data, or disrupt normal operations without the user’s permission.

 

Types of Malware

  1. Virus
    A virus attaches itself to files or programs and spreads when the infected file is executed, causing damage to data and systems.
  2. Worm
    A worm spreads automatically through networks without user action and consumes system resources.
  3. Trojan Horse
    A trojan disguises itself as a legitimate program but secretly performs harmful actions such as stealing data.
  4. Spyware
    Spyware secretly monitors user activities and collects personal information without consent.
  5. Ransomware
    Ransomware locks files or systems and demands payment to restore access.

 

c. Explain the safe browsing techniques.

Safe browsing techniques are practices used to reduce cyber risks while using the internet.

  1. Use Secure Connections
    Always browse websites with https and a lock icon to ensure encrypted communication.
  2. Use Secure Browsers and Search Engines
    Secure browsers and search engines provide privacy protection and reduce tracking.
  3. Use Strong Passwords and Authentication
    Strong passwords and multi-factor authentication protect online accounts.
  4. Avoid Suspicious Links and Downloads
    Do not click unknown links or download files from untrusted sources.
  5. Keep Software Updated
    Regular updates fix security vulnerabilities and protect against attacks.

 

 


 

35 Higher-Ability MCQs (Section-wise, Tick the Answer)

1. Cybersecurity mainly focuses on protecting:

a. Hardware only        b. Software only         c. Systems, networks, and digital data    d. Internet speed

 

2. Which situation best represents cybersecurity?

a. Playing online games                                                          b. Using social media
c.
Preventing unauthorized access to data                     d. Downloading videos

 

3. Why is cybersecurity important for businesses?

a. For entertainment                           b. To protect customer data and trust
c. To increase advertising                   d. To reduce staff

 

4. Which is NOT a type of cybersecurity?

a. Network security    b. Application security    c. Information security   d. Hardware manufacturing

 

5. Cybersecurity failures mostly result in:

a. Faster internet                     b. Data loss and financial damage
c. More storage                       d. Software upgrades

 

6. Cybercrime is best defined as:

a. Online communication                                                       b. Software error
c.
Illegal activities using computers or internet             d. Internet addiction

 

7. Which is a cybercrime?

a. Software update      b. File backup             c. Identity theft     d. Online learning

 

8. Phishing mainly aims to:

a. Improve security                 b. Steal personal information
c. Block websites                    d. Speed up internet

 

9. Cybercrime in Nepal is controlled by:

a. Criminal Code                                                         b. Civil Code
c.
Electronic Transactions Act, 2063                   d. Copyright Act

 

10. Hijacking social media accounts is an example of:

a. Ethical hacking                   b. Cybercrime
c. Cybersecurity                     d. Authentication

 

11. The strongest password is:

a. ram123        b. password     c. 123456        d. R@9#Lm2

 

12. Multi-Factor Authentication improves security by:

a. Removing passwords                      b. Adding extra verification layers
c. Increasing speed                             d. Blocking websites

 

13. Which is “something you are” in MFA?

a. PIN              b. Smartphone            c. Fingerprint                    d. Password

 

14. Why are software updates important?

a. Add features                        b. Fix security vulnerabilities
c. Delete files                          d. Improve graphics

 

15. A firewall mainly helps to:

a. Remove malware                b. Block unauthorized network access
c. Store passwords                  d. Encrypt emails

 

16. A secure website can be identified by:

a. www            b. .com            c. https and lock icon                    d. Ads

 

17. VPN is mainly used to:

a. Increase download speed                b. Protect privacy and encrypt data
c. Remove viruses                              d. Store files

 

18. Which browser feature improves privacy?

a. Auto-play                b. Private browsing mode
c. Zoom                       d. Screenshot

 

19. Which search engine focuses more on privacy?

a. Google                                b. Bing
c.
DuckDuckGo                 d. Yahoo

 

20. Clicking unknown links may result in:

a. Faster browsing                  b. Malware infection
c. Software updates                d. Backup

 

21. A digital citizen is someone who:

a. Uses internet freely             b. Uses technology responsibly and ethically
c. Avoids technology              d. Breaks cyber laws

 

22. Which shows good digital citizenship?

a. Sharing fake news               b. Respecting others’ privacy
c. Cyberbullying                     d. Using weak passwords

 

23. Which action harms digital society?

a. Reporting abuse                  b. Spreading misinformation
c. Learning online                   d. Using secure passwords

 

24. A good digital citizen should:

a. Ignore cyber laws               b. Follow laws and ethical behavior
c. Share passwords                 d. Troll others

 

25. Digital society mainly depends on:

a. Paper records                      b. Digital devices and internet
c. Manual systems                  d. Postal services

 

26. Netiquette refers to:

a. Hardware rules                   b. Online behavior guidelines
c. Software design                  d. Network speed

 

27. Which is good netiquette?

a. Spamming                           b. Giving credit to others’ work
c. Offensive language             d. Sharing private data

 

28. Why is netiquette important?

a. For entertainment               b. To maintain respectful online communication
c. To increase followers                      d. To hack accounts

 

29. Which violates netiquette?

a. Respectful comments                     b. Cyberbullying
c. Reporting abuse                  d. Constructive feedback

 

30. The basic principle of netiquette is:

a. Be popular                          b. Treat others with respect
c. Post frequently                    d. Share opinions aggressively

 

31. Digital footprint means:

a. Internet speed                      b. Record of online activities
c. Computer virus                   d. Software license

 

32. Posting on social media creates:

a. Passive footprint                 b. Active digital footprint
c. No footprint                         d. Malware

 

33. Location tracking without knowledge is:

a. Active footprint                  b. Passive digital footprint
c. Cyber law                            d. Authentication

 

34. Which is an advantage of digital footprints?

a. Identity theft                       b. Health monitoring
c. Cyber fraud                         d. Privacy loss

 

35. Best way to reduce digital footprint risk is to:

a. Share more data                  b. Update privacy settings and use strong passwords
c. Ignore security                    d. Disable antivirus

 

1.     Define cybersecurity and explain its importance.

2.     Why is cybersecurity essential for individuals and businesses in Nepal?

3.     Define cybercrime and Explain the major types of cybercrime with examples.

4.     Explain various methods to prevent cybercrime.

5.     What is a strong password? Explain the tips to create secure passwords.

6.     Explain multi-factor authentication (MFA) and its importance.

7.     Why are software updates important for preventing cybercrime?

8.     Explain the role of authentication and firewall in cybersecurity.

9.     What are safe web browsing techniques? Explain with examples.

10.  What is a secure website? How can you identify it?

11.  What risks are involved in unsafe web browsing?

12.  Who is a digital citizen? Explain the qualities of a good digital citizen.

13.  Explain the responsibilities of a digital citizen.

14.  What is digital society? Explain its features.

15.  How can students become responsible digital citizens?

16.  Why is digital citizenship important in today’s society?

17.  Define netiquette and explain its importance.

18.  Explain the guidelines for good netiquette and online behavior.

19.  Why is respectful communication important in online platforms?

20.  What are the consequences of poor netiquette?

21.  How does netiquette help create a positive digital environment?

22.  Define digital footprint and explain its types.

23.  Explain the concept of online privacy.

24.  Write the advantages and disadvantages of digital footprints.

25.  Explain the steps to protect oneself from digital footprint risks.

 

 

Friday, January 2, 2026

SOLVED PABSON COMPUTER SCIENCE E PRE QUALIFYING EXAMINATION 2082

 

 

SOLVED PABSON SEE PRE QUALIFYING EXAMINATION 2082







 (Group ‘A' 10×1=10)

 

1.     Answer the following questions in one sentence:        (6×1=6)

 

a) Define network protocol.

A set of rules followed for interconnection and communication between computers in a network is called a protocol.

 

b) List some areas where AI can help us.

Some areas where AI can help us are:

v Healthcare - Medical diagnosis and treatment planning

v Finance - Fraud detection and prevention

 

c) What is the size of YES/NO field in MS-Access?

The size of YES/NO field in MS-Access is 1 bit.

 

d) Write any two examples database management system?

Any two examples database management system are MS Access and Oracle.

 

e) What is the use of EOF( ) function?

The use of EOF( ) function to check whether the record pointer reaches at end of file or not.

 

f) Write any two format specifier used in C language.

Any two format specifier used in C language are :

%d (int) and %f (float)

 

 

 

2. Write appropriate technical term for the following:    (2×1=2)

a) A device that connects two dissimilar networks. Gateway

b) Delivery of different services through the internet. Cloud Computing

 

3. Write the full form of the following:                               (2×1=2)

a) G2B=Government to Business         

b) TCP/IP =Transmission Control Protocol/Internet Protocol

 

(Group ‘B' 12×2=24)

 

4. Answer the following questions:                                     (9×2=18)

 

a) Differentiate between LAN and WAN (any two points).

 

The difference between LAN and WAN are:

LAN

WAN

A LAN (Local Area Network) is a network that connects computers and devices within a small area, like a home, office, or school.

Wide Area Network is a network that is extended to a large area i.e. world in which computers are connected through wireless technology or media as satellite communication.

Computer lab networking and cyber networking are examples of LAN.

nternet, 4G Mobile Broadband Systems and satellite communication are the best examples of WAN.

 

 

b) What is cybercrime? Write two examples of cybercrime.

Cybercrime refers to illegal activities carried out using computers, networks, or the internet, such as hacking, identity theft, online fraud, and spreading malicious software.

Any two examples of cybercrime are: phishing and hacking.

 

c) What is firewall? Why is it important in network security?

A firewall is a security system that monitors and controls incoming and outgoing network traffic to protect systems from unauthorized access and cyber threats. 

It is important in network security because

v Prevents unauthorized users from accessing a network or computer system.

v Controls and filters incoming and outgoing network traffic based on security rules.

 

d) Mention any two benefits and any two limitations of e-commerce.

Any two benefits of E-commerce

·       E-commerce allows to shop 24/7 from anywhere with an internet connection.

·       Quickly compare products, prices, and reviews before buying.

Any two limitations of E-commerce

·       Lack of personal touch. We cannot touch the goods physically.

·       We cannot do any transaction without Internet access device. So, it is heavily dependent on Internet technologies

 

e) What is virtual reality? List any two advantages of it.

Virtual reality (VR) is a technology that creates a simulated environment, allowing users to immerse themselves in a three-dimensional (3D) world that they can interact with.

Any two advantages of Virtual Reality: 

v VR makes playing games and exploring places more exciting because it feels real.

v VR helps students learn by letting them explore virtual ancient cities or cells.

 

f) What are field properties? Name any four of them.

Field properties are settings or attributes that allow users to control various aspects of data entry, validation, formatting, and behavior within the database.

Any four field properties are:

Validation rule, Validation text, Caption, Format

 

g) What are validation text and validation rules?

Validation Rule is a field property which is used to limit the values that can be entered into a field.

Validation Text is a field property which displays an error message that appears if the data entered is invalid according to the specified validation rule.

 

h) What is query? List the different type of query.

Query is an object of database that is used to view, retrieve, change and analyze records from a table or multiple linked tables based on specified condition.

Its types are select query and action query.

Select query

Action query - Append Query, Update Query, Delete Query, - Make Table Query

 

 

i)      What is the importance of forms and reports in MS-Access.

The importance of form is to provide graphical interface to view, modify and add data in a table or multiple linked tables.

The importance of report is    to present information in an effective and organized format that is ready for printing.

 

 

 

5.   Write down the output of the given program.\Show with dry run in table.                                           (2)

DECLARE SUB Show (ABC$)

CLS

ABC$=”MAZNEGBT”

CALL Show (ABC$)

END

SUB Show (ABC$)

Y=48

FOR I=1 TO 4

N=Y MOD 7

PRINT MID$(ABC$, N, 1)

Y = Y – 1

NEXT I

END SUB

ABC$                 Y=48            I          N         OUTPUT

MAZNEGBT      47                1          6              G

                            46                2          5              E

                            45                3          4              N

                            44                4          3              Z

                         

 

 

 

 

 

 

 


The output of the program is

      G

      E

      N

      Z

 

6. Re-write the given program after correcting the bugs:            (2)

REM to count total no. of passed student

WHILE NOT EOF( )

OPEN “pab.txt” FOR OUTPUT AS#1

INPUT#2,ID,M1,M2,M3

IF M1>=32, M2>=32, M3>=32 THEN

X=X+1

END IF

WEND

PRINT "TOTAL RECORD";X

END

 

      Debugged Program

REM to count total no. of passed student

OPEN “pab.txt” FOR INPUT AS#1

WHILE NOT EOF(1)

INPUT#1,ID,M1,M2,M3

IF M1>=32 AND M2>=32 AND M3>=32 THEN

X=X+1

END IF

WEND

PRINT "TOTAL RECORD";X

CLOSE #1

END

 

 

 

 

7. Study the following program and answer the given questions:

                                                                                                (2×1=2)

DECLARE FUNCTION TOT(N$)

INPUT "Enter a word"; R$

X=TOT(R$)

PRINT X

END

 

FUNCTION TOT(N$)

FOR K=1 TO LEN(N$)

Y$=MID$(N$,K,1)

IF UCASE$(Y$)="A" THEN

X=X+1

ENDIF

NEXT K

TOT=X

END FUNCTION

Questions:

a) List any two library functions used in above program.

Two library functions used in above program are UCASE$( ) and MID$( ).

 

b) Write the use of variable "X" in line 3 [i.e. X=TOT(R$)]

      The use of variable "X" in line 3 [i.e. X=TOT(R$)] is to store the value (occurrence of character “A” returned by TOT(R$) function.

 

(Group ‘C 4×4=16)

 

8.  Convert / calculate as per the instruction:

i) (101011 + 1101 ) - ( 10011 )    

ii) ( 11011 × 11 )  (101)

iii) ( 235 )10  into octal                 

iv) ( 9A5 )16 into binary

 

Ans: i) 100101                  ii) 10000 R-1

iii) 353  in octal                 iv) 1001 1010 0101 in binary

 

 

 9. a)    Write a program in QBASIC that asks two numbers to find sum of squares of two numbers using SUB….END SUB program and average of two numbers using FUNCTION…END FUNCTION

 

              DECLARE SUB SSQ (A, B)

DECLARE FUNCTION AVERAGE (A, B)

CLS

 INPUT “ENTER FIRST NUMBER”; A

 INPUT “ENTER SECOND NUMBER”; B

PRINT “AVERAGE OF TWO NUMBERS”; AVERAGE (A, B)

CALL SSQ(A,B)

END

 

FUNCTION AVERAGE (A, B)

AVERAGE = (A + B) / 2

END FUNCTION

 

SUB SSQ (A, B)

SUM=A^2+B^2

PRINT "SUM OF SQUARE OF TWO NUMBERS ARE:"SUM

END SUB

 

 

      b) Write a program to open data file detail.dat which may contain name, address, gender and salary. The program should allow user to add few records on it.

 

 

OPEN " detail.dat "  FOR APPEND AS#1

TOP:

INPUT “Enter name”; N$

INPUT “Enter Address”; Ad$

INPUT “Enter gender”; G$

INPUT “Enter salary”; S

WRITE #1, N$, Ad$, G$, S

INPUT "DO YOU WANT TO ADD RECORDS";Y$

IF UCASE$(Y$)="Y" THEN GOTO TOP

CLOSE #1

END   

 

10. Write a program in 'C' to check whether a number is odd or even.

 

      #include<stdio.h>

      #include<conio.h>

      int main( )

      {

      int a;

      printf(“Enter any number”);

      scanf(“%d”, &a);

      if (a %2==0)

      printf("It is EVEN");

      else

      printf("It is ODD");

      getch();

      }

Or

 

Write a program in ‘C' language to display the series with their sum. 2,4,6,8,….., up to 10th terms.

 

#include<stdio.h>

#include<conio.h>

int main( )

{

int a=2, s=0, i;

for ( i=1;i<=10;i++)

{

printf("%d",a);

s=s+a;

a=a+2;

}

printf("%d",s);

getch();

}

Thursday, January 1, 2026

100+ Python Program Collections for Grade IX SEE COMPUTER SCIENCE GRADE IX 2082

 100+ Python Program Collections for Grade IX SEE COMPUTER SCIENCE GRADE IX 2082



DOWNLOAD PDF


 6.

Practise these practical questions.

Input/Output

a) Write a program to ask input as “name” from the user and greet the user as he/she provides their name.

b) Write a program to input 3 sides of triangle and print area 

c) Write a program to input a radius and find the area of circumference of circle

d) Write a program to input 3 digits as integers and calculate their sum and average.

e) Write a program to input a diameter and print area of circle and circumference of circle

Constant value and Operators

a) Write a program to input a radius and find the area of circumference of the circle

b) Write a program to show the use of arithmetic operators. (Perform add, subtract, multiply, divide, square and modulus between two numbers)

c) Write a program to show the use of a comparison operator between two variables. (Use the following operators. ==, <=, >=, !=)

If…..else Statement

a) Write a program using the if statement to check whether the given number is positive.

b) Write a program that takes people’s age as input and checks whether they are eligible to vote. (Voting age is 18 and above)

c) Write a program to check whether the given number is even or odd using

an if-else statement.

d) Write a program to input two numbers and find the smallest number.

e) Write a program that takes students’ marks as an input and checks whether the student passed or failed. (40 or greater is pass marks)

f)

Write a program that takes 3 numbers as inputs and displays the smallest number.

g) Make a program like a traffic light using an if-elif-else statement. Ask input from the user on providing color. (green=go, red=stop and orange=be ready, any other color=invalid color)

h) Write a program to input practical and theory marks of Computer and check pass or fail. You can also validate whether a user has entered valid marks or not. (valid marks should be checked for both theory and practical)

For loop

a) Write a program to print numbers from 1-15.

b) Write a program to print an input name 20 times.

c) Write a program to print the squares of numbers from 1 to 5 using a for loop. 

d) Write a program to print first 20 odd numbers

e) Write a program that takes an integer as input and prints the multiplication table for that number.

While loop

a)

Write a program to print numbers from 1-20.

b) Write a program to print first 30 even numbers.

c)Write a program to calculate the factorial of a given number.

d) Write a program to print the sum of the first 20 odd numbers.

e)Write a program to input multi digits numbers and display the sum of the digits.


Write a Python program to create a list of 5 integers and print the list.

Write a Python program to print the second and fourth elements of a list.

Write a Python program to append a new element to the end of a list and print the updated list.

Write a Python program to print the first three elements of a list using slicing.

Write a Python program to print the length of a list.

Write a Python program to iterate through a list and print each element.

Write a Python program to create a list of squares of numbers from 1 to 10 using list comprehension.

Write a Python program to remove the third element from a list and print the updated list.

Dictionaries

Write a Python program to create a dictionary with 3 key-value pairs and print the dictionary.

Write a Python program to print the value associated with a specific key in a dictionary.

Write a Python program to add a new key-value pair to a dictionary and print the updated dictionary.

Write a Python program to remove a key-value pair from a dictionary using the del statement and print the updated dictionary.

Write a Python program to iterate through a dictionary and print all the keys.

Write a Python program to create a dictionary where the keys are numbers

from 1 to 5 and the values are their squares using dictionary comprehension.

Write a Python program to check if a specific key exists in a dictionary.

Write a Python program to merge two dictionaries and print the resulting dictionary