SEE BOARD EXAM-2073 [PABSON, KATHMANDU]
Subject: Opt. II – Computer science Max. Marks: 50
Time: 1 Hr. 30 mins.
Group
– A
[Fundamental
– 22 Marks]
1. Answer the following questions: [5x2=10]
a. Differentiate
between bounded and unbounded media.
Ans: Differences between bounded and
unbounded media are:
Bounded Media |
Unbounded Media |
1.
A cabling structure to transfer or exchange data or
information between devices. |
1.
A non-cabling structure to transfer or exchange data
or information between devices. |
2.
The best application of it can be in LAN |
2. The best application of it can be in WAN or WLAN |
3.
It is cheaper than unbounded media |
3.
It is expensive than bounded media |
4. Examples: UTP, STP, Optical Fiber, etc. |
4.
Radio Wave, Micro Wave, Bluetooth, etc. |
b. What
are search engines and what is its purpose?
Ans: A search engine is a software system that is designed to carry out web searches (Internet searches), which means to search the World Wide Web in a systematic way for particular information specified in a textual web search query.
The use of search engine is to allow users to search the internet for contents on the basis of keywords.
c. Why
and where are people using the multimedia?
Ans: People are using multimedia
to communicate their ideas and views in effective and interesting manner in
order to enhance the retention of information and ideas of different fields.
Like in education: to enhance the interest and retention among the students,
Medical field: to enhance the understanding of different dieses and their
perhaps cures, etc.
d. Write
down any two security measures to protect computer equipment.
Ans: The protection of
all the hardware parts used in the computer system is the hardware security.
Any two-security measure to protect computer equipment are:
i.
Regular Maintenance
ii.
Use of power protection devices (UPS, Volt
Guard, etc.)
e. What
is antivirus software? List some of the task performed by antivirus software.
Ans: Antivirus software
is a type of system software that is design to detect and remove the malicious
programs. The tasks performed by an antivirus software are:
i.
Detect and remove malicious software
from computer system.
ii.
Protect the data and information from
the virus infections.
iii. Analysis the system in order to keep it in smooth running of system, etc.
2. a. Perform the following binary
calculations: [2x1=2]
i.
(10101 – 1110) x (11)
à 0111 x 11
à 10101
ii.
(11100+10110) / 110
à 110010 / 110
à Quotient: 1000,
reminder: 10
b.
Convert the following as indicated: [2x1=2]
i. (C27)16 into binary
Given HN |
C |
2 |
7 |
Eqv. BN |
1100 |
0010 |
0111 |
(C27)16
= (110000100111)2
ii.
(253)10 into octal
|
|
R |
8 |
253 |
5 |
8 |
31 |
7 |
|
3 |
|
#
Count the reminders bottom to top
(253)10
= (375)8
3.
Match the followings: [4x0.5=2]
Group – A |
Group - B |
TV Advertisement |
Internet Service |
Telephone |
Software Security |
Antivirus |
Simplex |
WWW |
Multimedia |
|
Duplex |
Ans:
Group – A |
Group - B |
TV Advertisement
---------------------------- |
Multimedia |
Telephone
-------------------------------------- |
Duplex |
Antivirus
--------------------------------------- |
Software Security |
WWW ------------------------------------------ |
Internet Service |
|
Simplex |
4. Replace the following definitions with the technical terms: [4x0.5=2]
a. A
web service which contains answers to the questions commonly asked by many
users.
Ans: FAQ
b. A
program that destroys the other programs.
Ans: Computer Virus
c. A
computer circuit board or card that is installed in a computer so that it can
be connected to a network.
Ans: NIC
d. A
port to connect external devices
Ans: USB Port
5.
Write the full forms: [4x0.5=2]
a. AVI:
Audio
Video Interleaved
b. NSFNET:
National
Science Foundation Network
c. MUK:
Multimedia
Upgrade Kit
d. WLAN:
Wireless
Local Area Network
6.
Choose the best answer: [4x0.5=2]
a. Device
used to connect same type of network protocol.
i.
NIC
ii.
Protocol
iii.
Gateway
iv.
None of the above
Ans:
iii.
Gateway
b. An
online interactive communication mechanism that lets people to make a real time
discussion with one or more people.
i.
E-mail
ii.
Web Chat
iii.
Video Conferencing
iv.
News Group
Ans:
iii.
Video Conferencing
c. A
network topology in which network nodes are connected in a continues circle.
i.
Bus
ii.
Ring
iii.
Star
iv.
None of the above
Ans:
ii.
Ring
d. Bandwidth
is measured in:
i.
kbps
ii.
kps
iii.
bps
iv.
None of the above
Ans:
iii.
bps
Group – B
[DBMS – 10
Marks]
7.
Answer the following questions: [3x2=6]
a. List
any two advantages of electronic database.
Ans: there are several
advantages of electronic database, some of are as follows:
n It
makes easier to query, search, filter and retrieve required data.
n it
allows centralized use of information amongst many users over a network and
therefore reduce data duplication.
n It
simplifies the calculation.
n It
reduces the cost of data storage.
b. What
is sorting and filtering?
Ans: sorting is the
process of arranging the data and information either in ascending or descending
order and filtering is the process of showing the required data or information
by hiding others.
c. List
any two major differences between forms and reports.
Ans: differences
between forms and reports are:
Forms |
Reports |
1.
Form is an interface that is used for entering data
to a table of database. |
1.
Report is specially designed to be printed and
shared with other people. |
2.
It facilitates to make modification, addition the
data directly into the table |
2.
It is formatted collections of data. |
3.
It helps user to view the table in a user defined
manner. |
3.
It is organized data as per the specifications for
summarizing the data. |
4.
It is the entry point of the data for table of
database. |
4.
It is the final output of the data stored in the
table of database. |
8.
Select the best alternatives for the
followings: [4x0.5=2]
a. Record
of the table is also known as ……... .
i.
Field
ii.
Tuple
iii.
Attribute
iv.
None of the above
Ans:
ii.
Tuple
b. Space
used by a currency data type is ………. .
i.
1 byte
ii.
2 bytes
iii.
4 bytes
iv.
8 bytes
Ans:
iv.
8 bytes
c. Field
name can be up to ………………... characters long.
i.
64
ii.
16
iii.
128
iv.
40
Ans:
i.
64
d. MS-Access
is used to develop ………… .
i.
DBMS
ii.
Software
iii.
Database
iv.
Word
Ans:
iii.
Database
9.
Match the following: [4x0.5=2]
Group - A |
Group - B |
Primary key |
Picture |
OLE |
Data type |
Memo |
Easy to search |
Sort |
Unique identification |
|
Query |
Ans:
Group - A |
Group - B |
Primary key |
Unique identification |
OLE |
Picture |
Memo |
Data type |
Sort |
Query |
|
Easy to search |
Group – C
[Programming – 18 Marks]
10.
Answer the following questions: [3x1=3]
a. Differentiate
between local and global variables.
Ans: Differences
between local and global variables are:
Local Variable |
Global Variable |
1.
Local variables are declared inside a function or
program. |
1.
Global variables are declared outside of a function
or program. |
2.
Local variables can be accessible and used by only
that function or program where it is declared. |
2.
Global variables can be accessible and used by any
function or program. |
b. Write
any two characteristics of C language.
Ans: any two
characteristics of C language are:
i.
It is small in size
ii.
It is a structured language
c. Write
down the function of:
i.
MKDIR
Ans: The function of
MKDIR is to create a new directory/folder in a specified location.
ii.
KILL
Ans: The function of KILL
is to delete a specified file.
11.
Write the output of the following
program: [2]
DECLARE
SUB result(N$)
N$
= “KATHMANDU”
CALL
result(N$)
END
---------------
SUB
result(N$)
B
= LEN(N$)
COUNT
= 1
WHILE
COUNT <=B
X$
= X$+MID$(N$, COUNT, 1)
COUNT
= COUNT + 2
WEND
PRINT
X$
END
SUB
Note: You have to draw a Dry Run Table for this
Ans:
KTMNU
12.
Re-write the following program after
correcting the bugs: [2]
OPEN
exam.dat
FOR OUTPUT AS #2
CLS
PRINT
“Name”, “Faculty”, “Post”, “Salary”
WHILE
NOT EOF (1)
INPUT 1, N$, F$, P$, S
PRINT
N$, F$, P$, S$
LOOP
END
Ans:
OPEN
“exam.dat” FOR INPUT AS #1
CLS
PRINT
“Name”, “Faculty”, “Post”, “Salary”
DO WHILE
NOT EOF (1)
INPUT #1,
N$, F$, P$, S
PRINT
N$, F$, P$, S
LOOP
CLOSE #1
END
13.
Read the following program and answer
the questions: [2x1=2]
DECLARE
FUNCTION CAL(N)
FOR
J = 1 TO 4
READ
N
S
= S + CAL(N)
NEXT
J
PRINT
“SUM IS:”, S
DATA
2, 5, 4, 0
END
----------
FUNCTION
CODE (N$)
CAL
= N^3
END
FUNCTION
a. Debug
the above program segment.
Ans: CODE(N$) = CAL(N)
b. What
will be the output of the above program?
Ans: The output will be
197
14.
Write down the following programs: [3x3=9]
a. To
calculate the volume of a cylinder using FUNCTION …… END FUNCTION.
Ans:
DECLARE
FUNCTION vol (r, h)
CLS
INPUT "Enter the radius:
", r
INPUT "Enter the height:
", h
PRINT "The volume of cylinder
is =", vol (r, h)
END
------------------
FUNCTION
vol (r, h)
vol
= 3.14 * (r ^ 2) * h
END FUNCTION
b. To
count the number of consonants in a word supplied by user using SUB …… END SUB.
Ans:
DECLARE
SUB conso (w$)
CLS
INPUT
"Enter a word: ", w$
CALL
conso(w$)
END
----------------------
SUB
conso (w$)
FOR
i = 1 TO LEN(w$)
b$
= UCASE$(MID$(w$, i, 1))
SELECT CASE b$
CASE "A", "E",
"I", "O", "U"
CASE
ELSE
c
= c + 1
END
SELECT
NEXT
i
PRINT
"The number of consonants in the word you supplied is =", c
END SUB
c. A
data file ‘salary.doc’ has 100 records that contain employee’s name, address,
post and salary. Print the number of records where salary >= 2000.
Ans:
OPEN
"salary.doc" FOR INPUT AS #1
CLS
PRINT
"Name", "Address", "Post", "Salary"
DO
WHILE NOT EOF (1)
INPUT #1, n$, a$, p$, s
IF
s >= 2000 THEN PRINT n$, a$, p$, s
LOOP
CLOSE
#1
END
***
THE END ***
Comments
Post a Comment