Friday, October 4, 2019

Solved SEE Supplementary-Upgrade 2075 (2019) - Computer Science


Solved SEE Supplementary-Upgrade 2075 (2019) - Computer Science

Full Marks: 50
Time: 1:30 hrs

Group A [Fundamentals – 22 Marks]

1. Answer the following questions.   [5×2=10]

a)     What is network topology? Name any of two
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is called network topology.
Any two topologies are:
Bus Topology
Star Topology

b)     Define web browser with examples.
Ans: Web browser is a computer program that access web pages and displays them on the user computer. Examples of web browsers are Mozilla Firefox, Google chrome, internet explorer, opera etc.

c)     What is computer ethic?
Ans: Computer ethic refers to follow the rules and regulation of computer technology and not to harm other computer users knowingly or unknowingly.

d)     Write the importance of backup in data and software security.
Ans: The importance of backup in data and software security is to recover the important data and programs from accidental and intentional harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.

e)     Write any two precautions to protect computer from virus.
Ans: Any two precautions to protect computer from virus are
i) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
ii) Do not install pirated software, especially computer games.

2.a)  Perform as indicated:   [2×1=2]
            i) (546)8 into decimal
            Soln:
            =5 × 82 + 4 × 81 + 6 × 80
            =5 × 64 + 4 × 8 + 6 × 1
            =320 + 32 + 6
            =358
            (546)8 = (358)10




ii) (1011100111)2 into Hexadecimal.
Soln:
Converting binary to hexadecimal
10   1110   0111
0010 = 2
1110 = E
0111 = 7
(1011100111)2 = (2E7)16

b) Perform the following binary operations:           [2×1=2]
     i) 1011 × 101



1
0
1
1



×
1
0
1



1
0
1
1


0
0
0
0
×
+
1
0
1
1
×
×

1
1
0
1
1
1

         1011 × 101 = 110111

c) 100101 ¸ 110

110
100101
110

-110


    110


   -110


      001


       -0


         1


Q = 110
R = 1






3. Match the following:         [4×0.5=2]

a)     Microwave                  Protocol
b)     UTP                             Power protection device
c)     UPS                             Unguided media
d)     SMTP                          Internet
Guided media



Answers:
a)     Microwave                  Unguided media
b)     UTP                             Guided media
c)     UPS                             Power protection device
d)     SMTP                          Protocol


4. Select the correct answer.            [4×0.5=2]

a)     When was cyber law introduced in Nepal?
i) 2057                       ii) 2055            iii) 2061                     iv) 2069
Ans: 2061

b)     Which is not communication media?
i) NOS                         ii) Satellite                  iii) Infrared                 iv) STP
Ans: NOS
c)     Software used in multimedia system.
i) Animator                             ii) Flash player           iii) Power point          iv) All of them
Ans: All of them
d)     A program that is used to detect and remove virus.
i) C- Brain                              ii) Worm                     iii) Trojan Horse         iv) Kaspersky
Ans: Kaspersky
 
5. Give the appropriate technical terms of the following.  [4×0.5=2]

a)     A type of network architecture in which every computer works as a both client and server.
Ans: Peer to Peer Network
b)     Company provides Internet services.
Ans: ISP (Internet Service Provider)
c)     The moving images.
Ans: Animation
d)     The law that control cyber crimes.
Ans: Cyber Law

6. Write the full form of the following:        [4×0.5=2]

a)     PDF: Portable Document Format
b)     WLAN: Wireless Local Area Network
c)     HTTP: Hyper Text Transfer Protocol
d)     JPEG: Joint Photographic Experts Group

Group ‘B’ [Database Management System  - 10 Marks]

7. Answer the following questions.   [3×2=6]

a)     Define DBMS with any two examples.
Ans: DBMS is software which is used to manage data, manipulate them and provide the information in an organized way. Any two examples are MS-Access and Oracle.

b)     What is query?
Ans: Query is an object of Ms-Access which extracts and arranges information from a table in a manner that is specified.

c)     Why is report created?
Ans: Report is created to print documents according to user’s specifications of the summarized information through query or table.

8. State whether the following statements are True or False.       [4×0.5=2]
a)     Column is also called field. True
b)     Primary key field can accept duplicate values. False
c)     Text is and object of MS-Access. False
d)     Auto Number Data consumed 2 bytes of memory space. Flase

9. Match the following.          [4×0.5=2]
a)     Caption                       Logical data type
b)     OLE                            Error message
c)     Data Redundancy       Picture
d)     Yes/No                        Label for field  
Duplication of data


Answers
a)     Caption                       Label for field
b)     OLE                            Picture
c)     Data Redundancy       Duplication of data
d)     Yes/No                        Logical data type


10 a) What is modular programming?          [1]
Modular programming is a technique which divides program into many small, manageable, logical and functional modules or blocks.

b) Write any two characteristics of ‘C’ Language. [1]
Ans: The characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.


c) Write the function of the following statements   [2×0.5=1]
   MKDIR  -  It creates a subdirectory which is used to manage files.
    INPUT # – It reads data from the sequential data file.

11. Rewrite the given program after correcting the bugs. [2]




REM program to read data from the data file.
OPEN “STD.DAT” FOR OUTPUT AS #1
CLS
WHILE NOT EOF(#1)
WRITE#1, N$, R, C, P
PRINT N$, R, C, P
WEND
CLOSE “STD.DAT”
END 

Debugged Program
REM program to read data from the data file.
OPEN “STD.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$, R, C, P
PRINT N$, R, C, P
WEND
CLOSE #1
END 

12. Write the output of the following program.       [2]

DECLARE FUNCTION SUM ( a )
CLS
a = 9
PRINT SUM ( a )
END

FUNCTION SUM ( a )
FOR K = 1 to a
IF K MOD 2 = 0 THEN
S = S + K
END IF
NEXT K
SUM = S
END FUNCTION

Output:
20

13. Study the following program and answer the given questions. [2×1=2]

DECLARE SUB TEST (N$ )
INPUT N$
CALL TEST ( N$ )
END

SUB TEST (N$ )
FOR P = 1 TO LEN ( N$ )
B$ = MID$ (N$, P, 1)
IF LCASE$ (B$) = “a” THEN
C = C + 1
END IF
NEXT P
PRINT C
END SUB

a)     Write the name of the sub procedure used in the above program.
Ans: The name of the sub procedure used in the above program is TEST

b)     Write any two library functions used in the above program.
Ans: Any two library functions used in the above program are MID$( ) and LEN( )

14
a)     Write a program to calculate the area of four walls of a room using Sub…..End Sub. [3]

DECLARE SUB AREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
CALL AREA (L, B, H)
END

SUB AREA (L, B, H)
A = 2 * H * (L + B)
PRINT “AREA OF FOUR WALLS”; A
END SUB



b)     Using Functions……End Functions Write a program to find odd or even.            [3]

DECLARE FUNCTION CHECK$ (N)
CLS
INPUT “ENTER ANY NUMBER”; N
PRINT “The given number is “ CHECK$(N)
END

FUNCTION CHECK$ (N)
IF N MOD 2 = 0 THEN
CHECK$ = “Even Number”
ELSE
CHECK$ = “Odd Number”
END IF
END FUNCTION




c)     Write a program to create a data file ‘emp.dat’ to store employees name, post, address and salary according to the need of the user.        [3]

OPEN “record.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter Post”; P$
INPUT “Enter Address”; A$
INPUT “Enter Salary”; S
WRITE #1, N$, P$, A$, S
INPUT “Do you want to continue (Y / N)”; CH$
LOOP WHILE UCASE$ (CH$) = “Y”
CLOSE #1
END


Wednesday, October 2, 2019

Qbasic Program to Erase vowel from input string. (using Function procedure)

Qbasic Program to Erase vowel from input string. (using Function procedure)

DECLARE FUNCTION DISPC$ (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT " AFTER EARISNG VOWELS = "; DISPC$(S$)
END

FUNCTION DISPC$ (S$)
FOR I = 1 TO LEN(S$)
    B$ = MID$(S$, I, 1)
    C$ = UCASE$(B$)
    IF C$ <> "A" AND C$ <> "E" AND C$ <> "I" AND C$ <> "O" AND C$ <> "U" THEN
        D$ = D$ + B$
    END IF
NEXT I
DISPC$ = D$
END FUNCTION

Qbasic Program to Check input character is capital or small. (using Function procedure)


Qbasic Program to check input character is capital or small. (using Function procedure)


DECLARE FUNCTION CHECK$(A$)
CLS
INPUT "ENTER ANY CHARACTER"; A$
PRINT "THE ENTERED CHARACTER IS "; CHECK$(A$)
END
FUNCTION CHECK$ (A$)
C = ASC(A$)
IF C >= 65 AND C <= 91 THEN
    CHECK$ = "UPPERCASE"
ELSEIF C >= 97 AND C <= 122 THEN
    CHECK$ = "LOWERCASE"
END IF
END FUNCTION


Monday, September 30, 2019

Write a Qbasic Program to find the sum of square of odd digits using function procedure.

Ashoj 13 - Program 05
Write a Qbasic Program to find the sum of square of odd digits using function procedure.


DECLARE FUNCTION SUMODD (N)
CLS
INPUT "ENTER ANY NUMBER"; N
SU = SUMODD (N)
PRINT "SUM OF SQUARE OF ODD DIGITS"; SU
END
FUNCTION SUMODD (N)
S = 0
WHILE N < > 0
R = N MOD 10
IF R MOD 2 = 1 THEN S = S + R ^ 2
N = N \ 10
WEND


SUMODD = S
END FUNCTION