Friday, December 22, 2023

SOLVED PABSON KTM SEE PRE QUALIFYING EXAMINATION 2080 - COMPUTER SCIENCE

 



PABSON, Kathmandu

SEE PRE-QUALIFYING EXAMINATION-2080

Subject: Opt. II Computer Science

Class: 10

Full Marks: 50

Time: 2 hrs.

Candidates are required to write their answers according to the instructions given.

 

Attempt all questions.

 

(Group 'A' 10×1=10)

 

1. Answer the following questions in one sentence: (6x1=6)

 

a) Give reason in short that "Computer network reduces the cost of operation."

Ans: Computer network reduces the cost of operation by sharing hardware and software.

 

b) List some areas where Al can help us.

Ans: Robotics and Education

 

c) Write opportunities and threats in social media.

Ans: Opportunities of social media is It creates awareness and innovate the way people live and Threats of social media is personal data and privacy can be easily hacked and shared on the internet.

 

d) What is primary key?

Ans: A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used to establish relationships between tables and enforce data integrity.

 

e) What is local and global variable in QBASIC?

Ans: Variables which are declared inside the procedure and its value is protected from outside interference is called local variables. Variables which are declared outside the procedure and its values can be accessed from any procedure or module.

is called global variables. 

 

f) Write any two format specifier used in C language.

Ans: int - %d, and float - %f

 

2. Write appropriate technical term for the following: (2x1=2)

 

a) Device used to connect a PC with a telephone line. MODEM

b) Law that governs the legal issues of cyberspace. Cyber Law

 

3. Write the full form of the following: (2x1=2)

 

a) GPS:  Global Positioning System

b) TCP/IP : Transmission Control Protocol / Internet Protocol

 

 

 

 

(Group 'B')

 

4. Answer the following questions: (9x2=18)

 

a) Write advantages and disadvantages of bus topology.

Advantages of bus topology

-It is the easiest network topology for connecting peripherals or computers in a linear fashion.

-The length of cable required is less than a star topology

Disadvantages of bus topology:

- Troubleshooting individual device issues is very hard.

-If the main cable is damaged, the whole network fails or splits into two.

 

b) What are the elements of digital citizenship?

Ans The elements of digital citizenship are:

- Digital access

-Digital commerce

- Digital communication

- Digital literacy

- Digital etiquette

- Digital law

-Digital rights and responsibilities

-Digital health and wellness

 

c) Differentiate between traditional commerce and e-commerce.

Traditional commerce refers to the commercial transactions or exchange of information, buying or selling product/services from person to person without use of internet which is a older method of business style and comes under traditional business. Now a days people are not preferring this as it is time taking and needs physical way of doing business. Example includes physical market/bazaar.

E-commerce refers to the commercial transactions or exchange of information, buying or selling product/services electronically with the help of internet which is a newer concept of business style and comes under e-business. Now a days people are preferring this as it is less time taking and does not need physical way of doing business everything can be done with laptop or smartphone and internet. Example includes online shopping sites.

 

d) Define cloud computing? Name any two services of it.

Cloud Computing refers to storing and accessing data and programs over the internet instead of storing on secondary storage devices.

Any two servicecs of it are

Infrastructure as a Service (IaaS): Customer can use processing, storage, networking, and other computing resources from cloud service providers to run their software system.

Software as a Service (SaaS): Customer subscribes the software services from a vendor for an annual subscription fee or sometimes free and use it over Internet.Services like Gmail, Google Drive, Office 365 are some of the examples of SaaS.

 

e) What is power protection device? Write its role in computer security.

Ans: Power protection device is device that control the voltage fluctuation and supply required amount of power to the respective device. Its role in computer security is to keep data and programs safe.

 

f) Differentiate between data and information.

Ans: Data are raw facts that is meaning less whereas information are meaningful and gives us clear meaning.

 

g ) What are field properties? Name any four of them.

Ans: Field Properties sets boundaries on what/how data is entered into table fields. Field size, caption, input mask, validation rule etc are the examples of field properties.

 

h) What are validation text and validation rules?

Ans: A validation rule is one way to restrict input in a table field or a control (such as a text box) on a form. Validation text lets you provide a message to help users who input data that is not valid.

 

i) List any two major differences between forms and reports.

Ans: Forms can be used for both input and output. Reports, on the other hand, are used for output, i.e., to convey information on a collection of items. Typically, forms contain data from only one record, or are at least based on one record such as data about one student, one customer, etc.

 

5. Write down the output of the given program.                           (2)

 

Show with dry run in table.

 

DECLARE SUB SERU ( )

CLS

CALL SERU

END

SUB SERU ()

X=2

C=1

WHILE C<=10

S=X^C

PRINT S;

C-C+1

WEND

END SUB

 

Dry Run

X

C

WHILE C<=10

S=X^C

PRINT S

2

1

1

2^1=2

2

 

2

2

2^2=4

4

 

3

3

2^3=4

8

 

4

4

2^4=4

16

 

5

5

2^5=4

32

 

6

6

2^6=4

64

 

7

7

2^7=4

128

 

8

8

2^8=4

256

 

9

9

2^9=4

512

 

10

10

2^10=4

1024

 

 

Output of the program is

2  4  8   16   32   64   128   256    512    1024

 

 

6. Re-write the given program after correcting the bugs: (2)

 

REM to store Name, post and salary

OPEN EMP.DOC FOR OUT AS #1

INPUT "Enter name"; N

INPUT "Enter post"; PS

INPUT "Enter salary"; S

INPUT #2, NS, P$, S

CLOSE #1

STOP

 

Debugged Program

REM to store Name, post and salary

OPEN "EMP.DOC" FOR OUTPUT AS #1

INPUT "Enter name"; N$

INPUT "Enter post "; P$

INPUT "Enter salary"; S

WRITE #1, N$, P$, S

CLOSE #1

END

 

7. Study the following program and answer the given questions: (2×1=2)

 

DECLARE FUNCTION COUNT (NS)

INPUT "Enter a word"; RS

C=COUNT(RS)

PRINT C

END

 

FUNCTION COUNT(NS)

FOR K=1 TO LEN(NS)

XS=MIDS(NS,K,1)

IF UCASES(XS)="A" THEN

X=X+1

END IF

NEXT K

COUNT=X

END FUNCTION

 

Questions:

 

a) List any two library functions used in above program.

Ans: Two library functions used in above program are UCASE$( ) and MID$( )

 

b) Write the use of variable "C" in line 3 [i.e. C=COUNT(RS)] given in the above program.

Ans: The use of variable "C" in line 3 [i.e. C=COUNT(RS)] is to store the value returned by

COUNT(RS) function.

 

(Group 'C’)

 

8. Convert/calculate as per the instruction:                                   (4x1=4)

 

i) (101101 + 1101) - (11011)

ii) (10111 × 11)  ¸ (110)

iii) (329) into octal

iv) (DA3)16 into binary

 

9. a) Write a program in QBASIC that allow user to enter radius of a circle. Create user define FUNCTION...END FUNCTION to find area of circle and SUB...END SUB to find volume of a cylinder. (4)

 

DECLARE FUNCTION AREA(R)

DECLARE SUB VOLUME(R, H)

CLS

INPUT "Enter the value of radius"; R

INPUT "Enter the value of height"; H


PRINT “Area of Circle”; AREA(R)

CALL VOULME(R, H)

END

 

FUNCTION AREA(R)

AREA = 22/7 * R ^ 2

END FUNCTION

 

SUB VOLUME(R, H)

V =  22/7 * R ^2 * H

Print "Volume of a cylinder is";V

END SUB

 

b) A sequential data file called "record'txt" has stored data under the field heading Roll No., Name, Gender, English, Nepali, Maths and Computer. WAP to display all the information of those students whose gender is ‘F’ and obtain mark in computer is more than 90. (4)

 

OPEN "record.txt" FOR INPUT AS #1

WHILE NOT EOF (1)

INPUT #1, roll, N$, G$, E, N, М, С

IF UCASES(G$) = "F" and C>90 THEN

PRINT roll, N$, GS, E, N, M. C

END IF

WEND

CLOSE #1

END

 

10. Write a program in 'C' language to check whether the supplied number is divisible by 5 or not.

 

 

#include<stdio.h>

#include<conio.h>

void main( )

{

int a;

printf(“Enter any number”);

scanf("%d", &a);

if (a % 5 = = 0)

{

printf("It is Divisible by 5");

}

else

{

printf("It is not Divisible by 5");

}

getch( );

}

 

 

or

 

Write a program C } language to display the series with their sum. 2,4,6,8......, up to 10th terms

 

#include<stdio.h>

#include<conio.h>

void main()

{

int a=2,i;

for (i=1;i<=10;i++)

{

Printf(“%d \t”, a);

s=s+a;

a=a+2;

}

printf("sum = %d",s);

getch( );

}

 

Tuesday, September 5, 2023

Contemporary Technology | SEE COMPUTER SCIENCE

 Contemporary Technology | SEE COMPUTER SCIENCE

E-Learning

E-learning refers to a learning system that we can obtain through the internet using on electronic device.

 

E-banking

E-banking refers to da digital banking system that enables customers to conduct financial transactions and manage their accounts online through the internet or mobile apps, without the need for physical visit to a hank branch.

 

Cloud computing

Cloud computing refers to storing and accessing data and programs over the internet instead of storing data and on secondary storage devices.

 

Advantages of Cloud Computing

1.     It allows us to quickly and easily access store information anywhere, anytime in the whole world, using an internet connection.

2.     Once the data is stored in the cloud, it is easier to get back-up and restore that data using the cloud.

3.     It reduces both hardware and software maintenance costs for organizations.

4.     Data security is one of the biggest advantages of cloud computing. Data is securely stored and handled.

 

Disadvantages of Cloud Computing

1.     Storing sensitive data on remote servers raises privacy issues.

2.     Uploading and downloading large volumes of data can be time-consuming.

3.     Cloud computing companies fail to provide proper support to the customers.

4.     Cloud services can experience outages, leading to disruptions in business operations.

 

Examples

Netflix: Netflix uses the cloud to store and stream its movies and TV shows. 

Spotify: Spotify uses the cloud to store and stream its music.

Amazon: Amazon uses the cloud to power its e-commerce platform.

Facebook: Facebook uses the cloud to store and process its users' data. 

Google: Google uses the cloud to power its search engine, Gmail, and other services.

 

Mobile Computing

Mobile computing refers to a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link

 

Advantages of Mobile Computing

1.     It allows people to work and communicate from anywhere at any time.

2.     It keeps connected to the Internet, allowing to access information all the times.

3.     It increases the productivity of users reducing time and cost.

4.     It is one of the major handheld sources of entertainment for users at present.

 

Disadvantages of Mobile Computing

1.     Mobile devices have limited battery life, requiring frequent recharging.

2.     Mobile devices can be vulnerable (weak) to cyberattacks and data theft.

3.     It can be expensive, with high costs for devices, data plans, and accessories.

4.     Mobile devices may have limited storage space, which can be insufficient for storing large files and media.

 

IOT (Internet of Things)

IOT refers to the a network of interconnected physical objects, devices and sensors that can collect and exchange data over the internet, enabling them to communicate and perform tasks without direct human intervention.

 

Advantages of Internet of Things (IoT)

1.     It reduces the human effort, so it saves a lot of time.

2.     Information is easily accessible from any place at any time on any device.

3.     It enhances security and offers personal protection.

4.     It enables convenient control of home appliances.

 

Disadvantages of Internet of Things (IoT)

1.     Hackers may gain access to the system and steal personal information. 

2.     IoT systems require a stable internet connection to function.

3.     Setting up IoT infrastructure can be expensive.

4.     The setup and management of IoT devices can be challenging for non-technical users.

 

Application areas of IoT

1.     Smart homes: IoT devices can be used to automate and control home appliances, security systems, and lighting which make homes more comfortable, efficient, and secure.

2.     Health care: Wearable devices, such as smartwatches and fitness trackers, can collect data about our health and activity levels which track our progress, improve our health, and even diagnose diseases.

3.     Smart City : IoT can be used to make cities more efficient and sustainable by improving traffic flow, optimize energy use, and reduce waste.

4.     Smart Agriculture : IoT helps farmers monitor and manage crops, cattle, and equipment through sensors, drones, and data analytics.

 

Components of IoT

a)     Sensors/Devices - Sensors/Devices collect data from their environment. e.g. Our phone is a device that has multiple sensors like GPS, camera, Motion etc. where data is being collected based on surroundings

b)     Connectivity to Cloud - The sensors/devices can be connected to the cloud and store, through a variety of methods including: Bluetooth, WiFi, Cellular etc.

c)     Data Processing  - Software perform data processing on cloud data to get a analyzed or computed data. e.g Computing the temperature within an acceptable range.

d)     User Interface - The analyzed or computed data is made useful to the end user via and alert(email, text, notification). e.g a alert message when temperature is beyond the acceptable range.

 

E-Governance

E-Governance refers to use of digital technology by government to enhance the delivery of public services and engage with citizens more effectively.

 

Advantages of E-governance

1.     Citizens can access government services and information conveniently from anywhere.

2.     It reduces paperwork and manual tasks, which can lead to faster decision-making and service delivery.

3.     E-governance systems promote transparency by making government actions and decisions visible to the public.

4.     Cheaper, more effective, and speedy communications.

 

Disadvantages of E-governance

1.     Collecting and storing citizen data online can raise privacy and security issues.

2.     Not all citizens may have the necessary technology skills to explore e-governance platforms.

3.     E-governance may exclude individuals without access to the internet or digital devices.

4.     In rural and remote areas, the internet may not work well, so people there can't easily use e-government services.

 

Models of E-Governance

a)     Government-to-Citizen(G2C)

b)     Government-to-business (G2B)

c)     Government-to-Government (G2G)

d)     Government-to-Employee (G2E)

 

Government-to-Citizen(G2C)

a)     G2C-is transaction between the government to citizens.

b)     It helps the ordinary people to reduce the time and cost to conduct a transaction.

c)     A citizen can have access to the services anytime from anywhere.

d)     It includes online registration of birth/ death/marriage certificates, filling of income taxes, electricity bills, license renewals etc.

 

Government-to-business (G2B)

a)     G2B it is the transaction between government to business.

b)     It is efficient for both government and business organizations.

c)     It enhances the efficiency and quality of communication and transparency of government projects.

d)     It includes online application forms, renewing licenses, registration etc.

 

Government-to-Government (G2G)

a)     G2G it is the transaction between government to government.

b)     Government agencies can share the same database using online communication.

c)     It can communicate with global government and local government as well.

d)     It provides safe and secure inter-relationship between domestic or foreign government.

 

Government-to-Employee (G2E)

a)     G2E it is the transaction between government to employee.

b)     G2E aims to bring employees together and improvise knowledge sharing.

c)     G2E provides online facilities to the employees like applying for leave, reviewing salary payment record and checking the balance of holiday.

d)     G2E is also the relationship between employees, government institutions, and their management.

 

Virtual Reality

Virtual Reality refers to an artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment.

 

Advantages of Virtual Reality:

1.     Virtual reality creates a realistic world.

2.     It enables user to explore places.

3.     Through Virtual Reality user can experiment with an artificial environment.

4.     Virtual Reality make the education more easily and comfort.

 

Disadvantages of Virtual Reality

1.     The equipment used in virtual reality are very expensive.

2.     It consists of complex technology.

3.     In virtual reality environment we can’t move by our own like in the real world.

4.     Some individuals may become addicted to VR experiences.

 

Application areas of VR

1.     Gaming: VR gaming allows players to immerse (dip) themselves in virtual worlds and interact with the environment and characters.

2.     Education : VR can help students learn by making the content more engaging and memorable.

3.     Health Care :  VR can help people to learn how to manage their anxiety and stress.

4.     Architecture and Design  : VR can be used to create 3D models of buildings and products.

 

 

Artificial Intelligence

Artificial Intelligence refers to the simulation of human intelligence in machines that are programmed to think and act like humans.

 

Advantages of AI:

1.     AI reduces labor and operational costs by automating tasks.

2.     AI processes and analyzes data faster than humans, leading to quicker decision-making.

3.     AI can automate repetitive tasks, saving time and reducing errors.

4.     AI is used in medical diagnosis software to help doctors identify diseases.

 

 

Disadvantages of AI:

1.     Automation by AI can lead to job losses in certain industries.

2.     Developing and maintaining AI systems can be costly for businesses.

3.     AI can analyze and collect personal data, raising privacy concerns.

4.     Understanding and managing AI systems can be complex and require specialized knowledge.

 

 

Application areas of AI

1.     Robotics - AI is used in robotics to control robots and make them perform tasks autonomously.

Eg.  Erica and Sophia has been developed which can talk and behave like humans.

2.     Gaming - The AI machines can play strategic games like chess, where the machine needs to think of a large number of possible places.

3.     Education - AI chatbot can communicate with students as a teaching assistant.

4.     Security - AI is used in facial recognition, threat detection, and cybersecurity.

 

Examples

Siri, Alexa, and Google Assistant are all examples of virtual assistants that use AI to understand our spoken requests and respond accordingly.