Monday, December 25, 2023

SOLVED Gauri Shankar Secondary School - Nisdi-4, Mityal,Palpa PRE SEE EXAM 2080


 Pre-SEE  Exam - 2080

Gauri Shankar Secondary School

Nisdi-4, Mityal,Palpa

Subject:- Computer Science

Grade:- 10 (SEE)                                                                                                      FM :-50

Time:- 1.5 Hrs.

Attempt all questions

 

( Very Short Questions-10 Marks)

Group-A

 

1. Answer the following questions  in  one  sentence:       6x1=6

 

a)     What is internet?

Ans: The Internet is a global network of interconnected computers that allows people to share information and communicate from anywhere in the world.

 

b)    Define cloud computing.

Ans: Cloud Computing refers to storing and accessing data and programs over the internet instead of storing on secondary storage devices.

 

c)     What is meant by primary key in MS-Access?

Ans: A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used to establish relationships between tables and enforce data integrity.

 

d)    Which data type is suitable to store salary of an employee in MS-Access?

Ans: Currency data type is suitable to store salary of an employee in MS-Access.

 

e)     Write any two advantages of modular programming.

Ans: Any two advantages of modular programming are:

i) Different programmers can design different program modules independently, which is required in a large and complex program.
ii) It is easy to design, code and test the program modules independently.

 

f)      Write any two differences between Q-Basic and C-language.

Ans: Any two differences between Q-Basic and C-language

QBASIC

C

It is a high level language without feature of low level language.

It is a high level language with some features of low level language.

It is mostly used to design application software.

It is mostly used to prepare system software.

 

2. Write appropriate technical term of the following:

a)     The smallest unit of represent in format on quantum computer. quantum bit (qubit)

b)     Laws made to prevent criminal activities through the internet.  Cyber Law

 

3. Write the full forms of the following:

a) VPN - Virtual Private Network

b) DNS - Domain Name System

 

 

 

 

 

 

 

Group-B

 

Short Questions -24 Marks

 

 

4) Answer the following questions in short.           9x2=18

 

a)     What is network topology? List any two types of network topology.

Ans: Network topology is the cabling structure of interconnected computers in LAN.

Any two types of network topology are bus topology and star topology.

 

b)    What is antivirus software? Name any two popular antivirus software.

Ans: Antivirus software is software designed to detect and remove virus from computer system and ensures virus free environment.  

Any two popular antivirus software are Kaspersky and McAfee

 

c)     What is virtual reality? Write any two areas where it is used.

Ans: Virtual reality is an artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment.

Any two areas where it is used are:

Gaming-  VR Gaming allows players to immerse (dip) themselves in virtual world and interact with

environment and characters

Education - VR can help students learn by making the content more engaging and memorable.

 

d)    What is E-commerce? List any two advantages of it.

Ans: E-commerce refers to the buying and selling of goods or services using the internet.

Any two advantages of it are:

It makes buying/selling possible 24/7.

It makes buying selling procedure faster, as well as easy to find products.

 

e)     What is E-Learning? Write some examples of it.

Ans: E-learning is a new concept of delivering digital contents in learner oriented environment using information and communication technology (ICT).

Examples are Virtual Classrooms from Zoom and Google Meet, Online textbooks and eBooks, Video based learning platforms like YouTube etc.

 

f)      What is data processing? Distinguish data & information.

Ans: Data processing is the method of collecting raw data and translating it into usable information.

Difference between data and information are:

Data

Information

·       Data are raw, unorganized facts that need to be processed which have no meaning. 

·       Data measured in bits and bytes.

·       Data never depends on information.

·       E.g.: Ram, student, 20, etc.

·       Information is processed or organized data that has meaning and context for its users.

·       Information is measured in meaningful units like time, quantity, etc.

·       Information is dependent on data.

·       E.g. “Ram is a student. He is 20 years old.”, is information that gives a complete sense.

 

g)     What is DBMS? Write any four software of DBMS.

Ans: DBMS is a software that manages databases, allowing users to store, access, and manipulate data in an organized and secure way.

Any four software of DBMS are : MS-Access, Oracle, Fox pro, dBase etc.

 

h)    What is data sorting? List any two advantages of using it.

Ans: Sorting refers to the process of organizing data in a specific order (ascending or descending) based on one or more fields in a table, query, or report.

Any two advantages of using it are:

Sorting helps to organize data and make it easier to find and retrieve specific information.

Sorting can save time and improve efficiency by allowing users to quickly access the data they need

 

i)      What is Form? Write down the importance of form.

Ans: Form is a database object that provides a graphical interface for users to view, enter, and edit data from one or more tables, queries, or other data sources.

The importance of forms are:

Forms provide an easy-to-use interface for data entry and manipulation, improving data accuracy and completeness.

Forms enable users to customize the look and feel of data input screens

 

Write down the output of the given program :

DECLARE SUB result ( )

CALL result

 END

 

SUB result

FOR i = l TO 9 STEP 2

sum=sum+i^2

NEXT i

PRINT  sum

END SUB

 

Dry Run

i

sum=sum+i^2

Print sum

1

0+1^2=1

165

3

1+3^2=10

 

5

10+5^2=35

 

7

35+7^2=84

 

9

84+9^2=165

 

 

Output of the program is:

165

 

6. Re-write the given program after correcting the bugs:                        2

DECLARE SUB VOLUME (l,b,h)

CLS

INPUT "ENTER length, breadth & height";l, b, h

EXECUTE VOLUME

SUB VOLUME(l,b,h)

V=lxbxh

PRINT "The volumeis";V

END FUNCTION

 

Debugged Program

DECLARE SUB VOLUME (l,b,h)

CLS

INPUT "ENTER length, breadth & height";l, b, h

CALL VOLUME (l, b, h)

END

 

SUB VOLUME(l,b,h)

V=l*b*h

PRINT "The volume is";V

END SUB

 

7) Study  the following program  and  answer  the following questions: (2x 1=2)

DECLARE  FUNCTION NUM(N)

INPUT N

S = NUM(N)

PRINT S

END

FUNCTION NUM(N)

X = INT(17/N)

Y =15 MOD N

NUM = X + Y

END FUNCTON       

 

i. What is the name of function used in above program?

Ans: The name of function used in above program is NUM ( ).

 

ii. List the mathematical function used in above program.

Ans: The mathematical function used in above program is INT ( ).

 

 

Group-C

 

(Long Questions-16 Marks)

 

8. Convert or Calculate as per the instructions:   (4x1=4)

i)  (1010101)2=  (?)10                         ii) (AE7)16=(?)2

iii) (1111)2 × (101)2 – (1000)2          iv) (1111)  ¸ (11)

 

9. a . Write a program in Q-BASIC that asks length, breadth & height of cuboid & calculate its TSA & Volume. Create a Sub procedure to calculate TSA and function procedure to calculate volume.) [ Hint:- TSA =2pr (r + h) & V= pr2h]

 

DECLARE SUB TSA (R, H)

DECLARE FUNCTION VOL(R, H)

CLS

INPUT “Enter Radius”; R

INPUT “Enter Height”; H

CALL TSA(R, H)

PRINT “Volume of cuboid=”; VOL(R, H)

END

SUB TSA(R, H)

T=2*3.14*R*(R+H)

PRINT “Total Surface Area of Cuboid=”; T

END SUB

 

FUNCTION VOL(R, H)

VOL=3.14*R^2*H

END FUNCTION

 

b) A sequential datafile called 'STUDENT.DAT' contains NAME, CLASS,SECTION & ADDRESS fields. Write a program to display all the contents of that datafile.

 

OPEN “STUDENT.DAT” FOR INPUT AS #1

CLS

PRINT “NAME”, “CLASS”, “SECTION”, “ADDRESS”

WHILE NOT EOF(1)

INPUT #1, N$, C, S$, A$

PRINT N$, C, S$, A$

WEND

CLOSE #1

END

 

10. Write a program in C-Language to find the area of four walls.        4

{Hint:- A = 2h(l+b)}

 

#include<stdio.h>

#include<conio.h>

int main()

{

int l,b,h,a;

printf("Enter length: ");

scanf("%d", &l);

printf("Enter breadth: ");

scanf("%d", &b);

printf("Enter height: ");

scanf("%d", &h);

a=2*h*(l+b);

printf("Area of four walls= %d", a);

return 0;

}

 

 

(OR)

Write a program in C-Language that asks a number and check whether it is even or odd.

 

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n%2==0)

printf("%d is even number", n);

else

printf("%d is odd number", n);

return 0;

}

 

 

 

BEST OF LUCK

Friday, December 22, 2023

SOLVED PABSON KTM SEE PRE QUALIFYING EXAMINATION 2080 - COMPUTER SCIENCE

 



PABSON, Kathmandu

SEE PRE-QUALIFYING EXAMINATION-2080

Subject: Opt. II Computer Science

Class: 10

Full Marks: 50

Time: 2 hrs.

Candidates are required to write their answers according to the instructions given.

 

Attempt all questions.

 

(Group 'A' 10×1=10)

 

1. Answer the following questions in one sentence: (6x1=6)

 

a) Give reason in short that "Computer network reduces the cost of operation."

Ans: Computer network reduces the cost of operation by sharing hardware and software.

 

b) List some areas where Al can help us.

Ans: Robotics and Education

 

c) Write opportunities and threats in social media.

Ans: Opportunities of social media is It creates awareness and innovate the way people live and Threats of social media is personal data and privacy can be easily hacked and shared on the internet.

 

d) What is primary key?

Ans: A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used to establish relationships between tables and enforce data integrity.

 

e) What is local and global variable in QBASIC?

Ans: Variables which are declared inside the procedure and its value is protected from outside interference is called local variables. Variables which are declared outside the procedure and its values can be accessed from any procedure or module.

is called global variables. 

 

f) Write any two format specifier used in C language.

Ans: int - %d, and float - %f

 

2. Write appropriate technical term for the following: (2x1=2)

 

a) Device used to connect a PC with a telephone line. MODEM

b) Law that governs the legal issues of cyberspace. Cyber Law

 

3. Write the full form of the following: (2x1=2)

 

a) GPS:  Global Positioning System

b) TCP/IP : Transmission Control Protocol / Internet Protocol

 

 

 

 

(Group 'B')

 

4. Answer the following questions: (9x2=18)

 

a) Write advantages and disadvantages of bus topology.

Advantages of bus topology

-It is the easiest network topology for connecting peripherals or computers in a linear fashion.

-The length of cable required is less than a star topology

Disadvantages of bus topology:

- Troubleshooting individual device issues is very hard.

-If the main cable is damaged, the whole network fails or splits into two.

 

b) What are the elements of digital citizenship?

Ans The elements of digital citizenship are:

- Digital access

-Digital commerce

- Digital communication

- Digital literacy

- Digital etiquette

- Digital law

-Digital rights and responsibilities

-Digital health and wellness

 

c) Differentiate between traditional commerce and e-commerce.

Traditional commerce refers to the commercial transactions or exchange of information, buying or selling product/services from person to person without use of internet which is a older method of business style and comes under traditional business. Now a days people are not preferring this as it is time taking and needs physical way of doing business. Example includes physical market/bazaar.

E-commerce refers to the commercial transactions or exchange of information, buying or selling product/services electronically with the help of internet which is a newer concept of business style and comes under e-business. Now a days people are preferring this as it is less time taking and does not need physical way of doing business everything can be done with laptop or smartphone and internet. Example includes online shopping sites.

 

d) Define cloud computing? Name any two services of it.

Cloud Computing refers to storing and accessing data and programs over the internet instead of storing on secondary storage devices.

Any two servicecs of it are

Infrastructure as a Service (IaaS): Customer can use processing, storage, networking, and other computing resources from cloud service providers to run their software system.

Software as a Service (SaaS): Customer subscribes the software services from a vendor for an annual subscription fee or sometimes free and use it over Internet.Services like Gmail, Google Drive, Office 365 are some of the examples of SaaS.

 

e) What is power protection device? Write its role in computer security.

Ans: Power protection device is device that control the voltage fluctuation and supply required amount of power to the respective device. Its role in computer security is to keep data and programs safe.

 

f) Differentiate between data and information.

Ans: Data are raw facts that is meaning less whereas information are meaningful and gives us clear meaning.

 

g ) What are field properties? Name any four of them.

Ans: Field Properties sets boundaries on what/how data is entered into table fields. Field size, caption, input mask, validation rule etc are the examples of field properties.

 

h) What are validation text and validation rules?

Ans: A validation rule is one way to restrict input in a table field or a control (such as a text box) on a form. Validation text lets you provide a message to help users who input data that is not valid.

 

i) List any two major differences between forms and reports.

Ans: Forms can be used for both input and output. Reports, on the other hand, are used for output, i.e., to convey information on a collection of items. Typically, forms contain data from only one record, or are at least based on one record such as data about one student, one customer, etc.

 

5. Write down the output of the given program.                           (2)

 

Show with dry run in table.

 

DECLARE SUB SERU ( )

CLS

CALL SERU

END

SUB SERU ()

X=2

C=1

WHILE C<=10

S=X^C

PRINT S;

C-C+1

WEND

END SUB

 

Dry Run

X

C

WHILE C<=10

S=X^C

PRINT S

2

1

1

2^1=2

2

 

2

2

2^2=4

4

 

3

3

2^3=4

8

 

4

4

2^4=4

16

 

5

5

2^5=4

32

 

6

6

2^6=4

64

 

7

7

2^7=4

128

 

8

8

2^8=4

256

 

9

9

2^9=4

512

 

10

10

2^10=4

1024

 

 

Output of the program is

2  4  8   16   32   64   128   256    512    1024

 

 

6. Re-write the given program after correcting the bugs: (2)

 

REM to store Name, post and salary

OPEN EMP.DOC FOR OUT AS #1

INPUT "Enter name"; N

INPUT "Enter post"; PS

INPUT "Enter salary"; S

INPUT #2, NS, P$, S

CLOSE #1

STOP

 

Debugged Program

REM to store Name, post and salary

OPEN "EMP.DOC" FOR OUTPUT AS #1

INPUT "Enter name"; N$

INPUT "Enter post "; P$

INPUT "Enter salary"; S

WRITE #1, N$, P$, S

CLOSE #1

END

 

7. Study the following program and answer the given questions: (2×1=2)

 

DECLARE FUNCTION COUNT (NS)

INPUT "Enter a word"; RS

C=COUNT(RS)

PRINT C

END

 

FUNCTION COUNT(NS)

FOR K=1 TO LEN(NS)

XS=MIDS(NS,K,1)

IF UCASES(XS)="A" THEN

X=X+1

END IF

NEXT K

COUNT=X

END FUNCTION

 

Questions:

 

a) List any two library functions used in above program.

Ans: Two library functions used in above program are UCASE$( ) and MID$( )

 

b) Write the use of variable "C" in line 3 [i.e. C=COUNT(RS)] given in the above program.

Ans: The use of variable "C" in line 3 [i.e. C=COUNT(RS)] is to store the value returned by

COUNT(RS) function.

 

(Group 'C’)

 

8. Convert/calculate as per the instruction:                                   (4x1=4)

 

i) (101101 + 1101) - (11011)

ii) (10111 × 11)  ¸ (110)

iii) (329) into octal

iv) (DA3)16 into binary

 

9. a) Write a program in QBASIC that allow user to enter radius of a circle. Create user define FUNCTION...END FUNCTION to find area of circle and SUB...END SUB to find volume of a cylinder. (4)

 

DECLARE FUNCTION AREA(R)

DECLARE SUB VOLUME(R, H)

CLS

INPUT "Enter the value of radius"; R

INPUT "Enter the value of height"; H


PRINT “Area of Circle”; AREA(R)

CALL VOULME(R, H)

END

 

FUNCTION AREA(R)

AREA = 22/7 * R ^ 2

END FUNCTION

 

SUB VOLUME(R, H)

V =  22/7 * R ^2 * H

Print "Volume of a cylinder is";V

END SUB

 

b) A sequential data file called "record'txt" has stored data under the field heading Roll No., Name, Gender, English, Nepali, Maths and Computer. WAP to display all the information of those students whose gender is ‘F’ and obtain mark in computer is more than 90. (4)

 

OPEN "record.txt" FOR INPUT AS #1

WHILE NOT EOF (1)

INPUT #1, roll, N$, G$, E, N, М, С

IF UCASES(G$) = "F" and C>90 THEN

PRINT roll, N$, GS, E, N, M. C

END IF

WEND

CLOSE #1

END

 

10. Write a program in 'C' language to check whether the supplied number is divisible by 5 or not.

 

 

#include<stdio.h>

#include<conio.h>

void main( )

{

int a;

printf(“Enter any number”);

scanf("%d", &a);

if (a % 5 = = 0)

{

printf("It is Divisible by 5");

}

else

{

printf("It is not Divisible by 5");

}

getch( );

}

 

 

or

 

Write a program C } language to display the series with their sum. 2,4,6,8......, up to 10th terms

 

#include<stdio.h>

#include<conio.h>

void main()

{

int a=2,i;

for (i=1;i<=10;i++)

{

Printf(“%d \t”, a);

s=s+a;

a=a+2;

}

printf("sum = %d",s);

getch( );

}