SEE Grade Promotion Exam 2078(2022)



SEE Grade Promotion Exam 2078(2022)

                                Group A (10 marks)

1. Answer the following questions in one sentence.        6×1=6
a) What is a web browser?
Ans: A web browser is an application program that is used to view the information of documents or web pages.
 b) Mention any two services provided by the internet.
Ans: Following are the services of the internet.
i) E-commerce
ii) E-mail
 c) What is the default extension of Ms-Access?
Ans: Following are the default extension of Ms-Access.
i) Ms-Access 2003 is .mdb
ii) MS-Access 2007 is .accdb
 d) Which object of Ms-Access is used to retrieve data from the table?
Ans: Query is the object of Ms-Access used to retrieve data from the table.
 e) Write any two advantages of modular programming.
Ans: Following are the advantages of modular programming.
i). Easy to write the program.
ii) Easy to find out bugs.
 f) Mention any two basic data types in C language.
Ans: Following are the basic data types in C language.
i) char
ii) int
 2. Write appropriate technical terms for the following.      2×1=2
a) Network of networks.
Ans: Internet
b) Computer program that protects the computer from computer viruses.
Ans: Antivirus
 3. Write the full form of the following.           2×1=2
a) POP: Post Office Protocol
b) AI: Artificial Intelligence
 
                                                  Group B (24 Marks) 
4. Answer the following questions.    9×2=18
a) What is a computer network? List any two importance of it.
Ans: Interconnection of two or more than two computers by using wire or wireless is known as a computer network.
Two importance of computer network are as follows:
i) Hardware and software sharing.
ii) It is fast and cheap means of communication.
 b) What is computer ethics? Write down any two ethics of it.
Ans: Computer ethics are the moral values that stop you from doing anything that isn't legal and that doesn't harm or damage anyone's work.
Following are the two ethical points.
i) Do not use the computer to steal other data.
ii) Do not use pirated software
 c) What is computer security? Write any two hardware security measures.
Ans: Computer security principally is the protection of computer systems and information from detriment, theft, and unauthorized use.
Following are the two hardware security measures.
i) Power protection
ii) Insurance
 d) Give two differences between e-commerce and traditional commerce.
Ans: Following are the difference between e-commerce and traditional commerce.

Traditional commerce

E-commerce

In traditional commerce buy goods and services face to face,

In e-commerce buy goods and services online using digital devices laptops or Smartphones.

Limited time for traditional commerce

E-commerce can work 24 hours.

We can inspect the product before buying.

We are not able to inspect products before buying.

Cash, cheque, or card can be used for payment

A credit card, Debit card, or fund transfer is used for payment

 
e) Write any two symptoms of a computer virus.
Ans:  Following are the symptoms of a computer virus.
i) Slow down the computer system.
ii) Unwanted messages or pictures can be shown on the monitor.
iii) Size of secondary storage will reduce automatically.
iv) Your file will be converted into a shortcut.
 f) What is DBMS? Write any two examples.
Ans: DBMS is a computer program or software which is used to manage data systematically.
Following are the two examples of DBMS:
i) Ms-Access
ii) Foxpro
 g) What is a primary key? List any two advantages of it.
Ans: A primary key is a special relational database table column designated to uniquely identify each table record.
Following are the advantages of the primary key
i) Duplicate data prevented by the primary key.
ii) With the help of primary key relationships can be created between tables.
h) What is data sorting? List any two advantages of it.
Ans: The process of arranging the data in a specific order.
Following are the advantages of sorting.
i) Easy to arrange the data in the table.

ii) Data can be read easily with the help of sorting.


 i) List the field name from the following table structure.


Symbol no

Name

Marks

00100200Q

Mahesh Joshi

85

00100201R

Sujata Gurung

91

       Ans: The field names are: Symbol no, Name, Marks 

  5. Write down the output of the given program. Show with dry run table.   2

DECLARE SUB result(c$)

c$="COMPUTER"

CALL result(c$)

END

SUB result(c$)

FOR c=1 TO LEN(c$) STEP 2

m$=MID$(c$,c,1)

n$=n$+m$

NEXT c

PRINT n$

END SUB

Dry Run:

Variable

C$

Check Loop

Variable m$

Variable n$

Output

COMPUTER

1 to 8?

Yes

C

C

 

COMPUTER

3 to 8?

Yes

M

C+M=CM

 

COMPUTER

5 to 8?

Yes

U

CM+U=CMU

 

COMPUTER

7 to 8?

Yes

E

CMU+E

 

COMPUTER

9 to 8?

No

Exit from loop

 

 

CMUE

 Final Output:

CMUE

  6. Re-write the given program after correcting bugs.                  2

REM to display records from the existing file.

CLS

OPEN "empt.txt" FOR APPEND AS #1

WHILE NOT EOF(#1)

WRITE #1, en$, post$, salary

PRINT en$, post$, salary

CLOSE #1

END

 Debugged Program:

REM to display records from the existing file.

CLS

OPEN "empt.txt" FOR INPUT AS #1

WHILE NOT EOF(1)

INPUT #1, en$, post$, salary

PRINT en$, post$, salary

WEND

CLOSE #1

END


 

 7. Study the following programs and answer the given questions.      2×1=2

DECLARE FUNCTION prod(a,b)

CLS

INPUT "Enter first number";a

INPUT "Enter second number";b

PRINT "The product of the two number=";prod(a,b)

END

 FUNCTION prod(a,b) p=a*b

prod=p

END FUNCTION

a) List the numerical variables used in the program.

Ans: A, B, and P are the numerical variables used in the above program. b) List the local variables used in the above program. Ans: P is the local variable used in the above program.

 Group C (16 Marks)

8. Convert/calculate as per the instruction.                   4×1=4

i)        (214)10 = (?)2

 



ii)     (ABC)16 =(?)2

Hexadecimal number

A

B

C

Equivalent              Binary

Number

1010

1011

1100

(ABC)16 =(101010111100)2

 

 

 

iii)   (1011)2 × (101)2 + (101)2


 

iv)   (101110)2 ÷ (110)2


 

9. a) Write a program to calculate the area of a circle using the function procedure and use the SUB procedure to calculate its circumference in QBASIC. [Hints: (A=πr2) , (C=2πr)]
DECLARE FUNCTION area(r)
DECLARE SUB cirm(r)
CLS
INPUT "Enter radius";r
PRINT area(r)
CALL cirm(r)
END
 FUNCTION area(r)
area=3.14*r2
END FUNCTION
 
 SUB cirm(r)
c=3.14*2*r
PRINT c

END SUB


  b) Student name, class, section, and address are stored in a data file called "student.dat". Write a program to print all the records of students.
OPEN "student,dat" FOR INPUT AS #5
CLS
DO WHILE NOT EOF(5)
INPUT #5, name$,cl,s$,add$
PRINT name$,cl,s$,add$
LOOP
CLOSE #5
END
 10. Write a program in C language to input a number and check whether the number is full divisible by 5 or not.
#include<stdio.h>
#include<conio.h>
main()
{
int num;
printf("Enter any number");
scanf("%d",&num);
if(num%5==0)
printf("Fully divisible by 5);
else
printf("Not fully divisible by 5);
getch();
}
 OR
 Write a program in C language to display the series 2,4,6,8 upto 10th term.
#include<stdio.h>
#include<conio.h>
main()
{
          int x,a=2;
          for(x=1;x<=10;x++)
          {
                   printf("%d\t",a);
                   a=a+2;
          }
return 0;

}

 

 

 

 Sub: Computer Science 2079(Regular)

Class: -10                            
Full Marks: 50                    Time: 1:30hrs
Candidates are required to answer in their own words as far as practicable. Credit will be given to originality, not rote learning.
Group "A" (10 Marks)

1. Answer the following questions in one sentence: 6×1=6
a) What is network protocol?

Ans: A network protocol is a set of rules that governs communication between devices on a computer network.


b) What is e-commerce?
Ans: E-commerce refers to buying and selling goods or services over the Internet.

c) What is the default size of the text field in Ms-Access?
Ans: The default size of the text field in MS Access is 50 characters.

d) Which data type is used to store the photo in MS-Access?
Ans: OLE data type is used to store photos in MS-Access.

e) What is looping?

Ans: Looping is a programming construct that allows a set of instructions to be executed repeatedly until a specific condition is met.


f) List any two data types used in C-programming language.
Ans: Following are the two data types of C.
i) int
ii) float
2. Write the appropriate technical term for the following: 2×1=2
a) A program that can disinfect a file from the virus.
Ans: Antivirus
b) Learning through electronic media.
Ans: e-learning

3. Write the full form of the following: 2×1=2
a) G2G: Government to Government
b) ISP: Internet Service Provider
      Group "B" (24 Marks)
4. Answer the following questions. 9×2=18
a) What is network topology? List any two types of network topology.

Ans: Network topology refers to the physical or logical arrangement of devices on a computer network and how they are interconnected.
Following are the two types of network topology.
i) Bus topology
ii) Star topology

b) What is antivirus software? Name any two popular antivirus software.

Ans: Antivirus software is a program designed to prevent, detect, and remove malicious software from a computer system.

Following are two popular antivirus software:
i) Norton Antivirus
ii) Kaspersky Antivirus

   c) Define cyber law and cybercrime.

Ans: Cyberlaw: Cyberlaw refers to the legal framework that governs the use of the internet, computers, and related technologies.
Cybercrime: Cybercrime refers to illegal activities committed using computers or the internet, such as hacking, identity theft, and cyberstalking.
d) Define virtual reality. Write any two areas where virtual reality is used.

Ans: Virtual reality (VR) refers to a computer-generated simulation of a three-dimensional environment that can be interacted with in a seemingly real or physical way through the use of specialized equipment such as a headset or gloves.
Following are the two areas where virtual reality is used:
i) Entertainment and gaming
ii) Education and training

e) What is a password? Write any two importance of password protection.

Ans: A password is a string of characters that is used to authenticate or verify the identity of a user in order to grant access to a system or device.

Following are some important reasons for password protection:

i) Protecting sensitive information from unauthorized access

ii) Preventing identity theft and fraud

f) What is DBMS? Write four objects of MS-Access.

Ans: DBMS stands for Database Management System. It is software that allows users to create, manage, and manipulate databases.
Four objects of MS-Access are:
i) Table
ii) Query
iii) Form
iv) Report

g) What are validation text and validation rules?

Ans: Validation text: Validation text is the message that is displayed when a user enters invalid data into a form field in a database.

Validation Rules: A validation rule is a criterion that is set to restrict or limit the type of data that can be entered into a form field in a database.

h) What is form? Write two advantages of it.

Ans: A form is a graphical user interface that allows users to enter and view data in a database table.
Two advantages of form are as here under:
i) Simplifies data entry and improves data accuracy
ii) Provides a user-friendly interface for accessing and updating data

i) What is a record? Why is the primary key necessary in the record?

Ans: A record is a collection of related data that is stored as a row in a table. It typically contains information about a specific entity, such as a customer or a product.
Here are some reasons why a primary key is necessary in a database record:
i) Ensures each record is unique

ii) Facilitates efficient searching and sorting of records.

  5. Write down the output of the given program. Show with dry run in the table . 2

DECLARE SUB series(a)
CLS
a=20
CALL series(a)
END

SUB series(a)
FOR k= 1 TO 5
PRINT a;
a=a+10
NEXT k
END SUB
Dry Run:

Variable A

Checking loop (K = 1 TO 5)

Output A

20

1 TO 5? Yes

20

30

2 TO 5? Yes

30

40

3 TO 5? Yes

40

50

4 TO 5? Yes

50

60

5 TO 5? Yes

60

70

6 TO 5? No exit from loop

 

Final output: 20 30 40 50 60

 6. Rewrite the given program after correcting the bugs. 2
REM program t make a word reverse.
DECLARE FUNCTION rev$(n$)
CLS
LNPUT "Enter a word";n$
DISPLAY "Reserved is";rev$(n$)
END
 FUNCTION rev$(n$)
FOR k=LEN$(n$) TO 1 STEP -1
b$=b$+MID$(n$,1,k)
NEXT k
b$=rev$

END FUNCTION

Debugged program:

REM program t make a word reverse.
DECLARE FUNCTION rev$(n$)
CLS
INPUT "Enter a word";n$
PRINT "Reserved is";rev$(n$)
END
FUNCTION rev$(n$)
FOR k=LEN(n$) TO 1 STEP -1
b$=b$+MID$(n$,k,1)
NEXT k
rev$=b$

END FUNCTION

7. Study the following program and answer the given questions: 2

DECLARE FUNCTION sum(n)
CLS
INPUT "Enter any number";n
x=sum(n)
PRINT "The sum of individual digit is ";x
END
FUNCTION sum(n)
WHILE n<>0
r= n MOD 10
s=s+r
n=INT(n/10)
WEND
sum=s
END FUNCTION

Questions:

i) Write the function of INT.
Ans: The function of INT is to return the integer portion of a given number.
ii) How many times does the WHILE ...WEND loop repeat if the value of n is 123?
Ans: If the value of n is 123, 3 (three) times WHILE...WEND loops will repeat.

Group "C" (16 Marks)
8. Convert as per instructions. 4×1=4

a) (110111)2 into (?)16

b)(410)10 into (?)2

c)(1001+110)-(1000)


d)10110 ÷ 101


9. i. Write a program in QBasic that ask the radius of a circle to calculate its area and circumference. Create a user-defined function to calculate area and a sub-program to calculate circumference. [Hints: a=πr2, C=2πr] 4Ans:

DECLARE FUNCTION area (r)
DECLARE SUB cir (r)
CLS
INPUT "Enter radius: "; r
PRINT "Area: "; area(r)
CALL cir(r)
END
FUNCTION area (r)
area = 3.14 * r ^ 2
END FUNCTION
SUB cir (r)
c = 2 * 3.14 * r
PRINT "Circumference: "; c

END SUB


 
ii. A sequential data file called "record.dat" has stored data under the field heading:  Roll no, name, gender, English, Nepali, Maths, and Computer. Write a program to display all the information of those students whose marks in English is more than 40.  4
Ans:
OPEN "record.dat" FOR INPUT AS #1
DO WHILE NOT EOF(1)
INPUT #1, rn, n$, g$, eng, nep, math, comp
IF eng > 40 THEN PRINT rn, n$, g$, eng, nep, math, comp
LOOP
CLOSE #1
END
10. Write a program in C-language that asks any two numbers and displays the greatest among them.
 
#include<stdio.h>
int main()
{
            int a,b;
            printf("Enter any two numbers: ");
            scanf("%d%d",&a,&b);
            if(a>b)
            printf("greatest no: %d",a);
            else
            printf("Greaest no: %d",b);
            return 0;
}
OR

Write a program in C-language to display the series with their sum.
1,2,3,4,.....up to 10th term.
Ans:
#include<stdio.h>
int main()
{
            int x, sum=0;
            for(x=1;x<=10;x++)
            {
                        printf("%d\t",x);
                        sum=sum+x;
            }
            printf("\nsum=%d",sum);

}


  SEE 2080 (2024)

Subject: Opt. II (Computer Science)

Full Marks: 50                                                            Time: 2:00 hrs
Candidates are required to give their answers according to the instructions.

Attempt all the questions.

Group 'A' (10 Marks)

 1. Answer the following questions in one sentence: [6×1=6]

a) Unguided media के हो? What is unguided media?

उत्तर: Unguided media भनेको तार/केबल बिना, जस्तै रेडियो वेभ, माइक्रोवेभ वा Wi-Fi प्रयोग गरी गरिने सञ्चार हो। (Unguided media is communication without cables using radio waves, microwaves, or Wi-Fi.)

b) मोबाइलबाट गरिने व्यापार के हो? What is the business done through the mobile?

उत्तर: मोबाइलमार्फत गरिने अनलाइन व्यापारलाई m-commerce भनिन्छ। (The business done through mobile is called m-commerce.)

c) MS-Access मा जन्म मिति राख्न कुन डेटा टाइप प्रयोग हुन्छ? Which data type is used to store date of birth in MS-Access?

उत्तर: MS-Access मा जन्म मिति राख्न Date/Time डेटा टाइप प्रयोग हुन्छ। (Date/Time data type is used to store date of birth in MS-Access.)

d) Database का कुनै दुई elements लेख्नुहोस्। Write any two elements of database.

उत्तर:

i) Table

ii) Field

(i) Table, (ii) Field)

e) Modular programming के हो? What is modular programming?

उत्तर: Modular programming भनेको ठूलो प्रोग्रामलाई साना-साना स्वतन्त्र मोड्युलहरूमा विभाजन गर्ने प्रविधि हो। (Modular programming is dividing a large program into small independent modules.)

f) ‘C’ भाषा का दुई विशेषता लेख्नुहोस्। Write any two features of C language.

उत्तर:

i) C एक middle-level programming language हो।

ii) यसले धेरै प्रकारका data types powerful operators समर्थन गर्छ।

(i) C is a middle-level programming language.

(ii) It supports various data types and powerful operators.)

2. Write appropriate technical term for the following: [2×1=2]

a) अनधिकृत प्रयोगकर्ताबाट कम्प्युटर प्रणाली जोगाउन प्रयोग हुने गोप्य क्यारेक्टरहरूको समूह। (A secret group of characters used to protect computer system from unauthorized users.)

उत्तर: Password (Password)

b) कम्प्युटरले सिर्जना गरेको, वास्तविकजस्तै देखिने कृत्रिम वातावरण।

उत्तर: Virtual Reality (VR) (Virtual Reality)

3. Write the full form of the following: [2×1=2]

a) URL

उत्तर: Uniform Resource Locator (Uniform Resource Locator)

b) STP

उत्तर: Shielded Twisted Pair (Shielded Twisted Pair)


Post a Comment

Post a Comment (0)

Previous Post Next Post