Friday, February 14, 2020

Solved Computer Science [Pabson Kaski 2076]


SEE Preparation Examination 2076
PABSON Examination Committee, Kaski
Subject : Computer Science

Questions

a)     Write the advantages of client/server over peer to peer network.
Advantages of client/server over peer to peer network :
It provides central security administration.
The network administrator is responsible for data security and other resources management of the network.
b)     Write any four advantages of E-mail over the traditional postal mailing system.
Any four advantages of E-mail over traditional postal mailing system:
                           i.          It allows to send and receive the message across the world at very low cost.
                         ii.          E-mail is faster, cheaper, more reliable than traditional mail.
                        iii.          The image, sound, video, and documents can be attached to e-mail messages.
                        iv.          Email can be accessed from anywhere in the world.

c)      Write the role of UPS and Spike guard in terms of power protection.
The role of UPS in a computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
The role of spike guard is that it protects against spikes which can occur from time to time.

d)     Write the differences between linear and non-linear multimedia contents.
The difference between Linear and Non-Linear Multimedia: The difference is in the interactivity. If the user can control the access and the order of the content then it is a non-linear structure. Note that the difference between linear and non linear is blurring as time goes by. Watching a movie used to be an example of a linear media experience, but now the DVD format allows you to have a non-linear experience by choosing scenes and going forward and backward.


e)      What is a self replicating program? Name any two destructive activities of such program.
Self replicating program is a type of computer program which is written by the programmer with the intent of destroying or damaging the data and programs residing in the computer system
Any two destructive activities of such program.
Degrade the overall performance of computer system.
Change in size of file by adding or removing text accordingly.


(235)8 into decimal

=2×82+3×81+5×80
=2×64+3×8+5×1
=128+24+5
=157
(235)8 =(157)10





(BA5)16 into binary
Converting each hexadecimal digit to 4 binary digit
B = 1011
A = 1010
5 = 0101
Combine the binary groups
(BA5)16 =(101110100101)2



11111 – 1101
1  1  1  1  1
   -1  1  0  1
 1  0  0  1  0
11111 – 1101 = 10010

101101 / 111

1
1
1
)
1
0
1
1
0
1
(
110




-
1
1
1









1
0
0
0








-
1
1
1









0
0
1
1










-
0










1
1



Quotient – 110
Remainder – 11





Match the following
Group A                                                            Group B
a)      Power DVD player            d)  -Offline service
b)     www. psc.gov.np                              -online service
c)      USENET                             a)- multimedia software
d)     Intranet                               b)-website
              c)- Internet service
Select the best answer
a)      The types of media used in multimedia includes:
Text                      sound                   graphics                              All
b)     Defragmentation is a process of:
Formatting a disk
Storing files into the smallest number of contiguous regions
Scanning and fixing the disk
None
c)      Which is not the networking operating device?
MS-DOS              UNIX                    LINUX                 Windows NT
d)     Which of the following is not a virus?
Stealth                  Worm                   Winzip                 Trojan

Technical Terms
a)      A computer which is used to control the entire networks/clients. Server
b)     A company that provides internet facility to the users with paying certain charge. ISP
c)       The simulation of movement created by displaying a series of pictures or frames.  Animation
d)     A virus that damages documents created in MS-Word and Ms-Excel  Macro virus

Full Forms
a)      PDF – Portable Document Format
b)     IMEI-International Mobile Equipment Identity
c)      MAC-Media Access Control
d)     MPEG-Moving Picture Experts Group

Questions
a)     Write the advantages of computerized database over manual database.
The advantages of computerized database over manual database:
                 i.          It can store large volume of data. It is very fast to find a specific record.
               ii.          Data can be sorted into ascending or descending order on multiple criteria.
              iii.          The database can be kept secure by use of passwords.
              iv.          We can search data very easily.

b)     While designing table structure which data types are suitable to store information about teacher’s name, address, salary and date of birth.
Teacher’s name - Text
Address – Text
Salary – Currency
Date of birth – Date/Time

c)      What is report? Why is it created?
Report is an object of Ms-Access which displays the output in an effective way to present the data in a printed format.
Report is created to print documents according to user’s specifications of the summarized information through query or table.

True/False
1.      Primary key field must not be blank. True
2.      The extension of database file created by MS-Access if .DBF. False
3.      Memo field accepts 32757 characters. False
4.      With the help of wizard also we can create a form. True

Match the following
a)      Currency field                                  c) 1 GB
b)     YES/NO field                                    d) 255 characters
c)      OLE field                                           b) 1 BIT
d)     Text field                                           1 MB
                                                                           a) 8 Bytes
Questions
Write any two advantages of modular programming.
Advantages of modular programming
i) Different programmers can design different program modules independently, which is required in a large and complex program.
ii) It is easy to design code and test the program modules independently.
Write any two features of C programming language.
Features of C- language
i) Simple and easy to use
ii) Occupies less memory

Write function of DIM SHARED and FILES
The FILES statement displays the files of the current sub directory or specified sub directory.
DIM SHARED specifies that variables are shared with all SUB or FUNCTION procedures in the module.


Debug
DECLARE FUNCTION CHK$(A)
CLS
INPUT “Enter any number”; R
PRINT CHK$(A)
END
FUNCTION CHK$(A)
M=A
WHILE A>0
R=A MOD 10
S = S + R^3
A = INTEGER (A/10)
LOOP
IF S = M THEN
CHK$=”Armstrong”
ELSE
CHK$= “Not Armstrong”

END FUNCTION

Debugged program
DECLARE FUNCTION CHK$(A)
CLS
INPUT “Enter any number”; A
PRINT CHK$(A)
END
FUNCTION CHK$(A)
M=A
WHILE A>0
R=A MOD 10
S = S + R^3
A = INT (A/10)
WEND
IF S = M THEN
CHK$=”Armstrong”
ELSE
CHK$= “Not Armstrong”
ENDIF
END FUNCTION

OUTPUT
DECLARE SUB Find( )
CLS
CALL Find
END
SUB Find
S=25
FOR N = 1 TO 11 STEP 2
S = S + N
NEXT N
PRINT “Calculated value=”; S
END SUB

OUTPUT
Calculated value=61

Analytical Questions
DECLARE SUB sum(N)
CLS
INPUT “Any number”; N
CALL sum(N)
END
SUB sum(N)
WHILE N<>0
R=N MOD 10
S = S + R
N = INT(N/10)
WEND
PRINT “Sum=”; S
END SUB
a)      What will be the result if input value is 123? 
The result is
Sum=6
b)     What happens if we change WHILE N<>0 into WHILE N=0?  
The program will displays error output
Sum=0

Write a program using function procedure to count total number of vowels in an entered word.
DECLARE FUNCTION COUNT (S$)
CLS
INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF VOWELS= "; COUNT(S$)
END

FUNCTION COUNT (S$)
VC = 0
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ = "U" THEN
VC = VC + 1
END IF
NEXT I
COUNT = VC
END FUNCTION
Write a program to check whether an entered number is palindrome or not using SUB.
DECLARE SUB PALIN (N)
CLS
INPUT "ENTER ANY NUMBER"; N
CALL PALIN (N)
END
SUB PALIN (N)
A = N
S = 0
WHILE N < > 0
R = N MOD 10
S = S * 10 + R
N = N \ 10
WEND
IF A = S THEN
PRINT "NUMBER IS PALINDROME"
ELSE
PRINT "NUMBER IS NOT PALINDROME"
END IF
END SUB

A data file “SEARCH.INF” contains numerous data under the fields NAME, AGE, ADDRESS and PHONE NUMBER of employees. Write a program in QBASIC to scan all the data then search and display only the employee’s data according to entered name.
OPEN “SEARCH.INF” FOR INPUT AS #1
CLS
INPUT “ENTER NAME TO SEARCH DATA”; S$
WHILE NOT EOF(1)
INPUT #1, N$, A, AD$, P
IF UCASE$(S$)=UCASE$(N$) THEN
PRINT N$,A,AD$,P
END IF
WEND
CLOSE #1
END




Thursday, February 6, 2020

120 Full Forms [SEE Computer Science 2076]

120 Full Forms [SEE Computer Science 2076]
3G- Third Generation 
AC-- Alternating Current
ADSL- Asymmetric Digital Subscriber Line
AM-- Amplitude Modulation
ANSI-- American National Standards Institute
ARP-- Address Resolution Protocol
ARPA-- Advanced Research Projects Agency
ARPANET-- Advanced Research Projects Agency Network
ASCII-- American Standard Code for Information Interchange
ATM-- Automated Teller Machine
AVI-- Audio Video Interleave
BBS-- Bulletin Board System
bits-- binary digit
BMP-- Bitmap
BNC-- British Naval Connector
bps-- bits per second
CAD-- Computer Aided Design
CAI-- Computer Assisted Instruction
CAL-- Computer Aided Learning 
CAVE-- Cave Automatic Virtual Environment
CBT-- Computer Based Training 
CCTV-- Closed Circuit Television
CDMA-- Code Division Multiple Access
CD-ROM-- Compact Disk Read-Only Memory
CMOS-- Complementary Metal–Oxide Semiconductor
COBOL-- Common Business Oriented Language
CRBT--  Caller Ring Back Tone
CSMA/CD-- Carrier Sense Multiple Access/Collision Detection
CSU/DSU-- Channel Service Unit/Data Service Unit
CVT-- Constant Voltage Transformer
DARPA-- Defense Advanced Research Projects Agency
DDoS--  Distributed Denial of Service
DHCP-- Defense Advanced Research Projects Agency
DNS-- Domain Name System
DOS-- Disk Operating System
DTH-- Direct To Home
DVD--  Digital Versatile Disk
DVD-RW-- Digital Versatile Disk Rewritable
EBCDIC-- Extended Binary Coded Decimal Interchange Code
EDI-- Electronic Data Interchange
EMI-- Electromagnetic Interference
ETDSA-- Electronic Transaction and Digital Signature Act
FAQ-- Frequently Asked Questions
FAT-- File Allocation Table 
FM-- Frequency Modulation
FTP-- File Transfer Protocol
FTTH-- Fiber to the home
GBps-- GigaBytes per Second
Gbps-- Gigabits per second
GIF-- Graphics Interchange Format
GPL-- General Public License
GPRS-- General Packet Radio Service
HDD-- Hard Disk Drive
HTTP-- Hyper Text Transfer protocol
IAB-- Internet Architecture Board
ICT-- Information and communications technology
IEEE-- Institute of Electrical and Electronics Engineers
IETF-- Internet Engineering Task Force
IP-- Internet Protocol
IPX-- Internetwork Packet Exchange
IPX/SPX-- Internetwork Packet Exchange/Sequenced Packet Exchange
IRC-- Internet Relay Chat
ISDN-- Integrated Services Digital Network
ISOC-- Internet Society
ISP-- Internet Service Provider
IT-- Information Technology
JPEG-- Joint Photographic Experts Group
Kbps-- Kilobits Per Second
LAN-- Local Area Network
LCD-- Liquid Crystal Display
LED-- Light Emitting Diode
MAC-- Media Access Control
MBR-- Master Boot Record
MIDI-- Musical Instrument Digital Interface
MODEM-- Modulator Demodulator
MPEG-- Moving Picture Experts Group
MSAV-- Microsoft Antivirus
MUK-- Multimedia Upgrade Kits
NAT-- Network Address Translation
NAV-- Norton Antivirus
NETBIOS-- Network Basic Input/Output System
NIC-- Network Interface Card
NITC--- National Information Technology Centre
NITCC-- National Information Technology Co-ordination Committee
NITDC-- National Information Technology Development Committee
NOS-- Network Operating System
NSFNET-- National Science Foundation Network
OS-- Operating System
PAT-- Port Address Translation
PDF-- Portable Document Format
POP-- Post Office Protocol
PSTN-- Public Switched Telephone Network
PUK-- Personal Unblocking Key
RAM-- Random Access Memory
RDBMS-- Relational Database Management System
RJ-45-- Registered Jack - 45
ROM-- Read Only Memory
ROMBIOS-- Read Only Memory Basic Input Output System
SIM-- Subscriber Identity Module
SMA-- Screw Mounted Adapter
SMTP-- Simple Mail Transfer Protocol 
STP-- Shielded Twisted Pair
TCP-- Transmission Control Protocol
TCP/IP-- Transmission Control Protocol/Internet Protocol
UNCITRAL-- United Nations Commission on International Trade Law
UPS Uninterruptible Power Supply
URL-- Uniform Resource Locator
USB-- Universal Serial Bus
UTP-- Unshielded Twisted Pair
VOIP-- Voice over Internet Protocol
VR-- Virtual Reality
VRML-- Virtual Reality Modeling Language
VSAT-- Very Small Aperture Terminal
W3C-- World Wide Web Consortium
WAN-- Wide Area Network
Wifi-- Wireless Fidelity
WiMax-- Worldwide Interoperability for Microwave Access
WLAN-- Wireless Local Area Network
WWW-- World Wide Web
XGA-- Extended Graphics Array