Group A (10 marks)
1. Answer the following questions in one sentence. 6×1=6
a) What is a web browser?
Ans: A web browser is an application program that is used to view the information of documents or web pages.
b) Mention any two services provided by the internet.
Ans: Following are the services of the internet.
i) E-commerce
ii) E-mail
c) What is the default extension of Ms-Access?
Ans: Following are the default extension of Ms-Access.
i) Ms-Access 2003 is .mdb
ii) MS-Access 2007 is .accdb
d) Which object of Ms-Access is used to retrieve data from the table?
Ans: Query is the object of Ms-Access used to retrieve data from the table.
e) Write any two advantages of modular programming.
Ans: Following are the advantages of modular programming.
i). Easy to write the program.
ii) Easy to find out bugs.
f) Mention any two basic data types in C language.
Ans: Following are the basic data types in C language.
i) char
ii) int
2. Write appropriate technical terms for the following. 2×1=2
a) Network of networks.
Ans: Internet
b) Computer program that protects the computer from computer viruses.
Ans: Antivirus
3. Write the full form of the following. 2×1=2
a) POP: Post Office Protocol
b) AI: Artificial Intelligence
Group B (24 Marks)
4. Answer the following questions. 9×2=18
a) What is a computer network? List any two importance of it.
Ans: Interconnection of two or more than two computers by using wire or wireless is known as a computer network.
Two importance of computer network are as follows:
i) Hardware and software sharing.
ii) It is fast and cheap means of communication.
b) What is computer ethics? Write down any two ethics of it.
Ans: Computer ethics are the moral values that stop you from doing anything that isn't legal and that doesn't harm or damage anyone's work.
Following are the two ethical points.
i) Do not use the computer to steal other data.
ii) Do not use pirated software
c) What is computer security? Write any two hardware security measures.
Ans: Computer security principally is the protection of computer systems and information from detriment, theft, and unauthorized use.
Following are the two hardware security measures.
i) Power protection
ii) Insurance
d) Give two differences between e-commerce and traditional commerce.
Ans: Following are the difference between e-commerce and traditional commerce.
Traditional commerce
E-commerce
In traditional commerce buy goods and services face to face,
In e-commerce buy goods and services online using digital devices laptops or Smartphones.
Limited time for traditional commerce
E-commerce can work 24 hours.
We can inspect the product before buying.
We are not able to inspect products before buying.
Cash, cheque, or card can be used for payment
A credit card, Debit card, or fund transfer is used for payment
e) Write any two symptoms of a computer virus.
Ans: Following are the symptoms of a computer virus.
i) Slow down the computer system.
ii) Unwanted messages or pictures can be shown on the monitor.
iii) Size of secondary storage will reduce automatically.
iv) Your file will be converted into a shortcut.
f) What is DBMS? Write any two examples.
Ans: DBMS is a computer program or software which is used to manage data systematically.
Following are the two examples of DBMS:
i) Ms-Access
ii) Foxpro
g) What is a primary key? List any two advantages of it.
Ans: A primary key is a special relational database table column designated to uniquely identify each table record.
Following are the advantages of the primary key
i) Duplicate data prevented by the primary key.
ii) With the help of primary key relationships can be created between tables.
h) What is data sorting? List any two advantages of it.
Ans: The process of arranging the data in a specific order.
Following are the advantages of sorting.
i) Easy to arrange the data in the table.ii) Data can be read easily with the help of sorting.
i) List the field name from the
following table structure.
|
|
Name |
Marks |
|
00100200Q |
Mahesh Joshi |
85 |
|
00100201R |
Sujata Gurung |
91 |
5. Write down the output of the given program. Show with dry run table. 2
DECLARE SUB result(c$)
c$="COMPUTER"
CALL result(c$)
END
SUB result(c$)
FOR c=1 TO LEN(c$) STEP 2
m$=MID$(c$,c,1)
n$=n$+m$
NEXT c
PRINT n$
END SUB
Dry Run:
|
Variable C$ |
Check Loop |
Variable m$ |
Variable n$ |
Output |
|
COMPUTER |
1 to 8? Yes |
C |
C |
|
|
COMPUTER |
3 to 8? Yes |
M |
C+M=CM |
|
|
COMPUTER |
5 to 8? Yes |
U |
CM+U=CMU |
|
|
COMPUTER |
7 to 8? Yes |
E |
CMU+E |
|
|
COMPUTER |
9 to 8? No Exit from loop |
|
|
CMUE |
Final Output:
CMUE
6. Re-write the given program after correcting bugs. 2
REM to display records from the existing
file.
CLS
OPEN "empt.txt" FOR APPEND AS #1
WHILE NOT EOF(#1)
WRITE #1, en$, post$, salary
PRINT en$, post$, salary
CLOSE #1
END
Debugged Program:
REM to display records from the existing
file.
CLS
OPEN "empt.txt" FOR INPUT AS
#1
WHILE NOT EOF(1)
INPUT #1,
en$, post$, salary
PRINT en$, post$, salary
WEND
CLOSE #1
END
7. Study the following programs and answer the given questions. 2×1=2
DECLARE FUNCTION prod(a,b)
CLS
INPUT "Enter first
number";a
INPUT "Enter second
number";b
PRINT "The product of the
two number=";prod(a,b)
END
FUNCTION prod(a,b) p=a*b
prod=p
END FUNCTION
a) List the numerical variables used in the program.
Ans: A, B, and P are the numerical variables used in the above program. b) List the local variables used in the above program. Ans: P is the local variable used in the above program.
Group C (16 Marks)
8.
Convert/calculate as per the instruction. 4×1=4
i)
(214)10 = (?)2
ii)
(ABC)16 =(?)2
|
Hexadecimal
number |
A |
B |
C |
|
Equivalent Binary Number |
1010 |
1011 |
1100 |
|
(ABC)16 =(101010111100)2 |
|
|
|
iii)
(1011)2 × (101)2 + (101)2
iv) (101110)2
÷ (110)2
DECLARE FUNCTION area(r)
DECLARE SUB cirm(r)
CLS
INPUT "Enter radius";r
PRINT area(r)
CALL cirm(r)
END
FUNCTION area(r)
area=3.14*r2
END FUNCTION
SUB cirm(r)
c=3.14*2*r
PRINT c
END SUB
OPEN "student,dat" FOR INPUT AS #5
CLS
DO WHILE NOT EOF(5)
INPUT #5, name$,cl,s$,add$
PRINT name$,cl,s$,add$
LOOP
CLOSE #5
END
10. Write a program in C language to input a number and check whether the number is full divisible by 5 or not.
#include<stdio.h>
#include<conio.h>
main()
{
int num;
printf("Enter any number");
scanf("%d",&num);
if(num%5==0)
printf("Fully divisible by 5);
else
printf("Not fully divisible by 5);
getch();
}
OR
Write a program in C language to display the series 2,4,6,8 upto 10th term.
#include<stdio.h>
#include<conio.h>
main()
{
int x,a=2;
for(x=1;x<=10;x++)
{
printf("%d\t",a);
a=a+2;
}
}
Class: -10
Full Marks: 50
Time: 1:30hrs
Candidates are required to answer in their own words as far as practicable.
Credit will be given to originality, not rote learning.
Group "A" (10 Marks)
1. Answer the following questions in one
sentence: 6×1=6
a) What is network protocol?
Ans: A network protocol is a set of rules
that governs communication between devices on a computer network.
b) What is e-commerce?
Ans: E-commerce refers to buying and selling goods or services over the
Internet.
c) What is the default size of the text field in Ms-Access?
Ans: The default size of the text field in MS Access is 50 characters.
d) Which data type is used to store the photo in MS-Access?
Ans: OLE data type is used to store photos in MS-Access.
e) What is looping?
Ans: Looping is a programming construct that
allows a set of instructions to be executed repeatedly until a specific
condition is met.
f) List any two data types used in C-programming language.
Ans: Following are the two data types of C.
i) int
ii) float
2. Write the appropriate technical term for the following: 2×1=2
a) A program that can disinfect a file from the virus.
Ans: Antivirus
b) Learning through electronic media.
Ans: e-learning
3. Write the full form of the following: 2×1=2
a) G2G: Government to Government
b) ISP: Internet Service Provider
Group "B" (24 Marks)
4. Answer the following questions. 9×2=18
a) What is network topology? List any two types of network topology.
Ans: Network topology refers to the physical or logical
arrangement of devices on a computer network and how they are interconnected.
Following are the two types of network topology.
i) Bus topology
ii) Star topology
b) What is antivirus software? Name any two
popular antivirus software.
Ans: Antivirus software is a program designed to prevent,
detect, and remove malicious software from a computer system.
Following are two popular antivirus software:
i) Norton Antivirus
ii) Kaspersky Antivirus
c) Define cyber law and cybercrime.
Ans: Cyberlaw: Cyberlaw refers to the
legal framework that governs the use of the internet, computers, and related
technologies.
Cybercrime: Cybercrime refers to illegal activities committed using
computers or the internet, such as hacking, identity theft, and cyberstalking.
d) Define virtual reality. Write any two areas where virtual reality is
used.
Ans: Virtual reality (VR) refers to a computer-generated
simulation of a three-dimensional environment that can be interacted with in a
seemingly real or physical way through the use of specialized equipment such as
a headset or gloves.
Following are the two areas where virtual reality is used:
i) Entertainment and gaming
ii) Education and training
e) What is a password? Write any two
importance of password protection.
Ans: A password is a string of characters
that is used to authenticate or verify the identity of a user in order to grant
access to a system or device.
Following are some important reasons for
password protection:
i) Protecting sensitive information from
unauthorized access
ii) Preventing identity theft and fraud
f) What is DBMS? Write four
objects of MS-Access.
Ans: DBMS stands for Database Management System. It is
software that allows users to create, manage, and manipulate databases.
Four objects of MS-Access are:
i) Table
ii) Query
iii) Form
iv) Report
g) What are validation text and validation
rules?
Ans: Validation text: Validation
text is the message that is displayed when a user enters invalid data into a
form field in a database.
Validation Rules: A
validation rule is a criterion that is set to restrict or limit the type of
data that can be entered into a form field in a database.
h) What is form? Write two advantages of it.
Ans: A form is a graphical user interface that allows
users to enter and view data in a database table.
Two advantages of form are as here under:
i) Simplifies data entry and improves data accuracy
ii) Provides a user-friendly interface for accessing and updating data
i) What is a record? Why is the primary key
necessary in the record?
Ans: A record is a collection of related data that is
stored as a row in a table. It typically contains information about a specific
entity, such as a customer or a product.
Here are some reasons why a primary key is necessary in a database record:
i) Ensures each record is unique
ii) Facilitates efficient searching and sorting of
records.
5. Write down the output of the given program. Show with dry run in the table . 2
CLS
a=20
CALL series(a)
END
SUB series(a)
FOR k= 1 TO 5
PRINT a;
a=a+10
NEXT k
|
Variable A |
Checking
loop (K = 1 TO 5) |
Output A |
|
20 |
1 TO 5? Yes |
20 |
|
30 |
2 TO 5? Yes |
30 |
|
40 |
3 TO 5? Yes |
40 |
|
50 |
4 TO 5? Yes |
50 |
|
60 |
5 TO 5? Yes |
60 |
|
70 |
6 TO 5? No exit from loop |
— |
REM program t make a word reverse.
DECLARE FUNCTION rev$(n$)
CLS
LNPUT "Enter a word";n$
DISPLAY "Reserved is";rev$(n$)
END
FUNCTION rev$(n$)
FOR k=LEN$(n$) TO 1 STEP -1
b$=b$+MID$(n$,1,k)
NEXT k
b$=rev$
END FUNCTION
Debugged program:
DECLARE FUNCTION rev$(n$)
CLS
INPUT "Enter a word";n$
PRINT "Reserved is";rev$(n$)
END
FUNCTION rev$(n$)
FOR k=LEN(n$) TO 1 STEP -1
b$=b$+MID$(n$,k,1)
NEXT k
rev$=b$
END FUNCTION
7. Study the following program and answer the
given questions: 2
CLS
INPUT "Enter any number";n
x=sum(n)
PRINT "The sum of individual digit is ";x
END
FUNCTION sum(n)
WHILE n<>0
r= n MOD 10
s=s+r
n=INT(n/10)
WEND
sum=s
END FUNCTION
Questions:
i) Write the function of INT.
Ans: The function of INT is to return the integer portion of a given number.
ii) How many times does the WHILE ...WEND loop repeat if the value of n is
123?
Ans: If the value of n is 123, 3 (three) times WHILE...WEND loops will repeat.
a) (110111)2 into (?)16
b)(410)10 into (?)2
c)(1001+110)-(1000)
d)10110 ÷ 101
9. i. Write a program in
QBasic that ask the radius of a circle to calculate its area and circumference.
Create a user-defined function to calculate area and a sub-program to calculate
circumference. [Hints: a=πr2, C=2πr] 4Ans:
DECLARE SUB cir (r)
CLS
INPUT "Enter radius: "; r
PRINT "Area: "; area(r)
CALL cir(r)
END
FUNCTION area (r)
area = 3.14 * r ^ 2
END FUNCTION
SUB cir (r)
c = 2 * 3.14 * r
PRINT "Circumference: "; c
END SUB
ii. A sequential data file called "record.dat" has stored data under the field heading: Roll no, name, gender, English, Nepali, Maths, and Computer. Write a program to display all the information of those students whose marks in English is more than 40. 4
Ans:
OPEN "record.dat" FOR INPUT AS #1
DO WHILE NOT EOF(1)
INPUT #1, rn, n$, g$, eng, nep, math, comp
IF eng > 40 THEN PRINT rn, n$, g$, eng, nep, math, comp
LOOP
CLOSE #1
END
10. Write a program in C-language that asks any two numbers and displays the greatest among them.
#include<stdio.h>
int main()
{
int a,b;
printf("Enter any two numbers: ");
scanf("%d%d",&a,&b);
if(a>b)
printf("greatest no: %d",a);
else
printf("Greaest no: %d",b);
return 0;
}
OR
Write a program in C-language to display the series with their sum.
1,2,3,4,.....up to 10th term.
Ans:
#include<stdio.h>
int main()
{
int x, sum=0;
for(x=1;x<=10;x++)
{
printf("%d\t",x);
sum=sum+x;
}
printf("\nsum=%d",sum);
}
Subject: Opt. II (Computer
Science)
Full Marks: 50
Time: 2:00 hrs
Candidates are required to give their answers according to the instructions.
Group 'A' (10 Marks)
a) Unguided media के हो? What is unguided media?
उत्तर: Unguided media
भनेको तार/केबल बिना, जस्तै रेडियो वेभ, माइक्रोवेभ वा Wi-Fi प्रयोग गरी
गरिने सञ्चार हो। (Unguided media is communication without cables using radio waves,
microwaves, or Wi-Fi.)
b) मोबाइलबाट गरिने व्यापार के हो? What is the
business done through the mobile?
उत्तर: मोबाइलमार्फत गरिने अनलाइन व्यापारलाई m-commerce
भनिन्छ। (The business done through mobile is called m-commerce.)
c) MS-Access मा जन्म मिति राख्न कुन डेटा टाइप प्रयोग हुन्छ? Which data
type is used to store date of birth in MS-Access?
उत्तर: MS-Access मा जन्म मिति राख्न Date/Time डेटा टाइप प्रयोग हुन्छ। (Date/Time
data type is used to store date of birth in MS-Access.)
d) Database का कुनै दुई elements लेख्नुहोस्। Write any
two elements of database.
उत्तर:
i) Table
ii) Field
(i) Table, (ii) Field)
e) Modular programming के हो? What is modular programming?
उत्तर: Modular
programming भनेको ठूलो प्रोग्रामलाई साना-साना स्वतन्त्र मोड्युलहरूमा विभाजन गर्ने प्रविधि हो। (Modular programming is dividing a large program into small
independent modules.)
f) ‘C’ भाषा का दुई विशेषता लेख्नुहोस्। Write any
two features of C language.
उत्तर:
i) C एक middle-level programming language हो।
ii) यसले धेरै प्रकारका data types र powerful operators समर्थन गर्छ।
(i) C is a middle-level programming language.
(ii) It supports various data types and powerful operators.)
2. Write appropriate technical term for the following: [2×1=2]
a) अनधिकृत प्रयोगकर्ताबाट कम्प्युटर प्रणाली जोगाउन प्रयोग हुने गोप्य क्यारेक्टरहरूको समूह। (A secret group of characters used to protect computer
system from unauthorized users.)
उत्तर: Password
(Password)
b) कम्प्युटरले सिर्जना गरेको, वास्तविकजस्तै देखिने कृत्रिम वातावरण।
उत्तर: Virtual
Reality (VR) (Virtual Reality)
3. Write the full form of the following: [2×1=2]
a) URL
उत्तर: Uniform
Resource Locator (Uniform Resource Locator)
b) STP
उत्तर: Shielded
Twisted Pair (Shielded Twisted Pair)
Post a Comment