Friday, March 19, 2021

Solved Computer Science SLC Examination-2066(2010)

 


Solved Computer Science SLC Examination-2066(2010)
            Computer Fundamental (22 marks)
1. Answer the following question:
a) What is computer network?
Ans: computer network means two or more computers connected with each other to share data, hardware, software and other resources.
b) What is internet?Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all over the world.

c) Write any four preventive measures to protect computer system from virus infection.Ans: Any four preventive measures to protect computer system from virus infection are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Don’t install pirated software, especially computer games.

d) Write any two software used for multimedia.Ans: Any two software used for multimedia are:
i) Windows Media Player
ii) VLC Media Player

e) What is hardware security?

 Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is hardware security.









 














3. Match the following:
Group A                                  Group B
a) T-connector             i)Network
b) Bridge                      ii) Power protection
c) CD-ROM                 iii) Coaxial  cable
d) Spike Guard                        iv)Multimedia component
                                    v)Virus scanning

Answers

Group A                      Group B
a) T-connector             Coaxial  cable
b) Bridge                      Networkc) CD-ROM                 Multimedia componentd) Spike Guard                        Power protection                                    

4. Select the best answer:
a) Which one is not a network topology?
i) Star               ii) Ring             iii) Client / Server                     iv) Bus
Client/Server

b) When was cyber law introduced in Nepal?
i) 2061 B.S.     ii) 2062 B.S.    iii) 2007 B.S.   iv) 2016 B.S.
2061 B.S.

c) Multimedia technology is used in ………
i) Education     ii) Business      iii) Health care iv) All of the above
All of the above

d) Boot sector virus infects ……..
i) System file   ii) Master boot record  iii) Application software          iv) Document file
            Master boot record

5. Give appropriate technical terms:
a) Rules and format to accept and transfer data in the computer network.
Protocol
b) Moral rules to be followed by computer and other professionals.
Computer ethics
c)  Making an extra copy of data and software.
Backup
d) A virus that corrupts system files of operating system.
File Infector virus
6. Write the full forms:
a)WWW           =          World Wide Web
b)MAN                        =          Metropolitan Area Network
c)OS                =          Operating System
d)NIC              =          Network Interface Card
            Group B-Database (10 marks)
7. Answer the following question:

a) What is DBMS? Write any two examples of DBMS software.
Ans: DBMS is a software which is used to manage data, manipulate them and provide the information. Examples of DBMS are MS-Access and Oracle.
b) List any four data types used in MS-Access.Ans: Any four data types used in Ms-Access are:
            i) Text
            ii) Memo
            iii) Number
            iv) Yes/No

c) What is form? Write any two advantages of using form.Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
Any two advantages of using form are:
                    i.            It helps to display data in more presentable form than a datasheet can.
                  ii.            It provides an interactive platform for input of data into the database.

8. Select the best answer:
a) Date/Time occupies ……….  bytes of memory.
i) 4                   ii) 2                  iii) 8                 iv) 16
            8

b) The extension of database file in MS-Access is……….
i) DBF  ii) DBM           iii) MDB          iv)DMB
            MDB

c) The object of MS-Access that is used to generate hard copy of records.
i) Query           ii) Table           iii) Form           iv) Report
            Report

d) A ………….. Key uniquely identifies a record.
i) Primary         ii) Foreign        iii) Composite  iv) None          
            Primary

9. Match the following:
Group A                      Group B
a) Default value                       i) 255 Characters
b) Fox Pro                    ii) Column Name
c) Text                         iii) DBMS
d) Field                                    iv)Field Properties
                                    v) Search fast

Answers

Group A                      Group B
a) Default value                       Field Properties
b) Fox Pro                    DBMSc) Text                         255 Characters
d) Field                                    Column Name                                   
            Group C-Programming
10. a) What is modular program?Modular program is a technique used to divide program into many small, manageable, logical and functional modules or blocks.
b) Write any two advantages of Structured programming.Ans: Any two advantages of Structured programming
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the function of following statement:
i) Files                        
Ans: The FILES statement displays the files of the current sub directory or specified sub directory.

ii) KILL
Ans: The KILL statement deletes the file or files from the specified drive and directory.
11. Debug the given program:
DECLARE SUB Fibonic()
REM *Fibonic series*
CALL SUB Fibonic
END

SUB Fibonic
a=1
b=1
FOR x=1 to 10
DISPLAY a;
a=a+b
b=a+b
END Fibonic


Debugged  program

DECLARE SUB Fibonic( )
REM *Fibonic series*
CALL  FibonicEND

SUB Fibonic
a=1
b=1
FOR x=1 to 10
PRINT a;
a=a+b
b=a+b
NEXT x
END SUB

12. Write the output of the following program.
DECLARE SUB Series()
CALL Series
END                                                                

SUB Series
X=1
Y=1
FOR Z=1 TO 4
PRINT X;
Y=Y+1
X=X*10+Y
NEXT Z
END SUB


 











13. Read the given program and answer the following questions:
DECLARE FUNCTION Num(N)
INPUT N
S=Num(N)
PRINT S
END

FUNCTION Num(N)
X=Int(17/N)
Y=15 MOD N
Num=X +Y
END FUNCTION
i) Write the name of the function used in the above program.
Ans: The name of the function used in the above program is Num.
ii) List out the mathematical function (Library function) used in the above program.
Ans: The mathematical function (Library function) used in the above program is INT ( ).

14. i) Write a program using Function Module to calculate and print the volume of a box.
            DECLARE FUNCTION VOLUME(L, B, H)
            CLS
            INPUT “ENTER LENGTH, BREADTH AND HEIGHT”; L, B, H
            PRINT “VOLUME OF BOX”; VOLUME(L, B, H)
            END

            FUNCTION VOLUME (L, B, H)
            VOLUME = L*B*H
            END FUNCTION


ii) Write a program to declare SUB procedure to print only the vowels from a given word.
DECLARE SUB DISPV (S$)
CLS
INPUT "ENTER ANY WORD"; S$
CALL DISPV(S$)
END

SUB DISPV(S$)
FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1)
C$ = UCASE$(B$)
IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ = "U" THEN
PRINT B$
END IF
NEXT I
END SUB


iii) Write a program to create a sequential data file “Employee.Dat” to store employees’ name, address, age, gender and salary.

OPEN “Employee.dat” FOR OUTPUT AS #1
            DO
CLS
INPUT “ENTER EMPLOYEE’S NAME”; N$
INPUT “ENTER ADDRESS”; A$
INPUT “ENTER AGE”; A
INPUT “ENTER GENDER”; G$
INPUT”ENTER SALARY”; S
WRITE #1, N$, A$, A, G$, S
INPUT “DO YOU WANT TO CONTINUE”; CH$
LOOP WHILE UCASE$(CH$) = “Y”
CLOSE #1
END


***

Solved Computer Science Supplementary Examination 2067

 


Solved Computer Science Supplementary Examination 2067
Group A
Computer Fundamental (22 marks)
1. Answer the following questions:a) Define LAN topology. Draw the Bus topology.
Ans: LAN topology is the arrangement or connection pattern of computers or nodes and other devices of the network Diagram of Bus topology:

















b) What is multimedia? Name any two fields where multimedia is used.
Ans: The integration of several forms of media such as text, audio, video, animation, etc. to present the information in more attractive and understandable way is known as multimedia.
Any two fields where multimedia is used are as follows:
i.  Multimedia technology in advertisement
ii.Multimedia technology to learn foreign language

c) Give two advantages of e-mail over traditional mail.
Ans: The advantages of e-mail over traditional mail are as follows:
i.  It is faster and cheaper.
ii.It allows us to send and receive messages, documents, sounds, etc. across the world.

d) Write any two ways of protecting computer software.
Ans: Any two ways of protecting computer softwares are:
i.  Defragmentation
ii.Scan disk

e) What is antivirus? Name any two antivirus software.
Ans: The software designed to detect and remove virus from the computer to ensure a virus free environment is known as anti-virus software.
Any two anti-virus software are as follows:
i.  Norton Antivirus
ii.McAfee















 










3. Match the following:Group A                      Group B
a) Pictures in motions  i) Guided media
b) TCP/IP                     ii) animation
c) UTP                         iii) Random Access Memory
d) Volatile memory      iv) CD-ROM
                                    v) Protocol used in Internet
Ans:
Group A                                  Group B
a) Pictures in motions  -           animation
b) TCP/IP                     -           Protocol used in Internet
c) UTP                         -           Guided media
d) Volatile memory      -           Random Access Memory


4. Choose the best answer:a) E-commerce is ………….
i) a type of business     ii) a type of virus                     iii) both (i) &(ii)                       iv) None of the above
Ans: a type of business
b) E-mail is a/an ……………
i) organization which controls internet ii) protocol to access internet   iii) service of Internet  iv) none of the above
Ans: service of internet
c) Which one is not a type of virus?
i) message carrying virus                     ii) boot sector virus      iii) system infector       iv) special purpose application infector
Ans: special purpose application infector
d) Which one is an example of bounded media?
i) Fiber optics   ii) Microwave transmission      iii)Laser transmission   iv) infrared transmission
Ans:Fiber optics
5. Give an appropriate technical terms of the following:a) Network of networks
Ans: Internet
b) A device which can convert analog signal to digital codes and vice versa.
Ans: MODEM
c) A company that provides the internet facility.
Ans: ISP (Internet Service Provide)
d) An electronic device that supply electronic current when electricity is cut off.
Ans: UPS (Uninterruptible Power Supply)

6. Write the full forms of:a) NIC- Network Interface Card         
b) WAN- Wide Area Network            
c) WWW- World Wide Web   
d) FTP-File Transfer Protocol
Group B
Database (10 marks)
7. Answer the following questions:a) What is database? Name any two database software.
Ans: Database is a collection of related and organized information that is used to store, organize and extract data.
Any two database software are as follows:
i.  Telephone directory
ii.Dictionary

b) Name any four data types that can be define in MS-Access.
Ans: Any four data types that can be defined in MS-Access are as follows:
i.  Number
ii.Text
iii.    Auto number
iv.    Memo

c) What is a report? Give its importance.
Ans: Report is an object of MS-Access that is used to present data in a printed format using a specific layout.
The importance of report are as follows:
i.  It presents data and information from table or query in a flexible layout.
ii.It helps to present data in printed format.
8. Match the following: 
Group A         Group B
a) MS-Access   i) Data entry and editing interface
b) Query          ii) Electronic Spreadsheet software

c) Record         iii) Tool to retrieve data from one or more than one   tables
d)Form             iv) Data base management software
                        v) Collection of related fields
Ans:
Group A                      Group B
a) MS-Access   -           Database management software
b) Query          -           
Tool to retrieve data from one or more than one   tables
c) Record         -           collection of related fields
d)Form             -           Data entry and editing interface

9. State whether the following statements are true or false:a) A query is used to select fields and records from many tables.True
b) MS-Access is not spread sheet software.True
c) Index increases the speed of the query and sort operations.True
d) The primary key field can also be left empty.False
Group C
Programming (18 marks)
10. a) What is a loop?
Ans:The process of repeating a statement or block of statement for a number of times is known as loop.
b) Name any two data types used in C language.
Ans: Any two data types used in C language are:
·         int
·         char

c) Give the functions of NAME and CLOSE statements.
Ans: The functions of:
i. NAME: It renames a file on a diskette.
ii.    CLOSE: It closes one or all open files.
11. Rewrite the following program after correcting the bugs:
DECLARE SUB Series()
CLS
EXECUTE Series
END

SUB Series()
            REM program to generate 1 1 2 3 5…. Up to 20th terms
            A=1
            B=1
            FOR ctr= 10 TO 1
                        DISPLAY A;B;
                        A=A+B
                        B=A+B
            EXT ctr
END Series()
Ans:
DECLARE SUB Series ( )
CLS
CALL Series
END

SUB Series()
            REM program to generate 1 1 2 3 5…. Up to 20th terms
            A=1
            B=1
            FOR ctr= 1 TO 10
                        PRINT A;B;
                        A=A+B
                        B=A+B
            NEXTctr
END Series()


12. Write the output of the following program:
DECLARE FUNCTION AREA(L,B)
CLS
LET L =100
LET B = 20
LET ans=AREA(L,B)
PRINT “The area=”,ans
END
FUNCTION AREA(L,B)
            ar=L*B
            AREA=ar
END FUNCTION







13. Analyse the program given  below and answer the questions.
DECLARE FUNCTION Prod(A,B)
CLS
INPUT “Enter first number:”;A
INPUT “Enter second number:”;B
PRINT “the product of two number=”;Prod(A,B)
END
FUNCTION Prod(A,B)
            P=A*B
            Prod=P
END FUNCTION
a)      List all the numerical variables used in the program.
Ans: The numerical variables used in the program are: A, B, P.
b)      List all the local variables used in the program.
Ans: The local variables used in the program is P.


14.a) Write a program using FUNCTION….END FUNCTION to get a word from the user and then print the word in reverse order
Ans:
DECLARE FUNCTION REV$(S$)
CLS
INPUT “Enter any word”; S$
PRINT “The reverse word is”; REV$(S$)
END

FUNCTION REV$(S$)
FOR I = LEN(S$) TO 1 STEP -1
B$=MID$(S$,I,1)
W$=W$+B$
NEXT I
REV$=W$
END FUNCTION

b) Write a program using SUB….END SUB to get radius of circle and then print its circumference.
Ans:
DECLARE SUB CIRC(R)
CLS
CONST PI=3.1416
INPUT ”Enter radius”; R
CALL CIRC(R)
END

SUB CIRC(R)
C=2*PI*R
PRINT “The circumference of circle=”;C
END SUB

c) A sequential data file called ‘MARKS.DAT’ contains ROLL NO, NAME, English, Nepali and Maths fields. Write a program to display all the contents of the data file.
Ans:
OPEN “MARKS.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, RN, N$, E, N, M
PRINT RN, N$, E, N, M
WEND
CLOSE #1
END
***