SET
- I
Ve
Candidates are
required to write their answer according to the instructions.
Attempt all
questions
Group “A”
Very short answer questions. (10×1=10)
1. Give answer in one sentence for the
following questions. (6×1=6)
a) Write any two examples of full
duplex modes of data transmission.
Ans: Any two examples of full duplex
modes of data transmission are telephone and mobile.
b) List any two software security
measures.
Ans: Any two software security
measures are :
i) Password
ii) Backup
c) Which data type is also known as
logical data type in MS-Access?
Ans: Yes/No data type is also known as
logical dta type in MS-Access.
d) Which query is used to view the
data stored in database?
Ans: Select query is used to view the
data stored in database.
e) What will be the value of x in
given 'C' expression x=55 % 10?
Ans: The value of x will be 5.
f) What is looping?
Ans: Looping is a programming
construct that repeatedly executes a block of code until a specified condition
is met.
2. Write appropriate technical terms
for the following. (2×1=2)
a) Digital
marks created while using internet.
Ans: Digital Footprint
b) The process of repeatedly executing some
code until condition satisfies.
Ans: Looping
3. Write the full forms of the
following. (2×1=2)
a) bps : bits
per second
b) VOIP : Voice
Over Internet Protocol
Group “B” (12×2=24)
Short
answer questions
4. Answer the following questions.
(9×2=18)
a) Define computer network. List two demerits
of computer network.
Ans: Computer network is a group of two or
more computers and devices connected to each other through wired or wireless
media to exchange data and information and share hardware, software and other
resources.
Any two demerits of computer network are:
i)
Computer network can be route for computer virus and malware transmission.
ii) Skilled manpower is required to manage and
operate computer network.
b) Give any two advantages of E-mail over
traditional mail.
Ans: Any two advantages of E-mail over
traditional mail.
i) Emails can be sent and received almost
instantly, allowing for quick communication and faster decision making.
Traditional mail, on the other hand can take several days to arrive.
ii) Emails can be sent from anywhere with an
internet connection, and they can be easily organized and stored for future
reference. Traditional mail requires physical transportation, which can be inconvenient and time-consuming.
c) Define computer security. How antivirus
helps to secure computer software?
Ans: Computer security refers to the measures
taken to protect computer system and networks from unauthorized access, theft,
damage and disruption.
An antivirus helps to secure computer software
by detecting and removing malicious software, such as viruses, spyware and
Trojans that can harm the computer or steal sensitive information.
d) Define E-commerce? Write the name of any
two E-commerce site.
Ans: E-commerce refers to the buying and
selling of goods or services using the internet.
The name of any two E-commerce sites are
Sastodeal.com and Daraz.com.
e) What is Cryptography? How encryption helps
in data protection.
Ans: Cryptography is the practice of securing
communication and data by converting it into a code to prevent unauthorized
access or manipulation.
Encryption
helps in data protection by providing a secure way to store and transmit
sensitive information.
f) What is database? List two advantages of
DBMS.
Ans: A database is an organized collection of
related information that can be used for different purpose so that it can
easily be accessed, managed and updated.
Any
two advantages of DBMS are:
i)
It controls data redundancy which means duplication of data.
ii)
It allows sharing the existing data by different programs.
g) What is data redundancy? How can it be
reduced in database?
Ans: Data redundancy refers to the repetition
of data in a database, where the same data is stored in multiple places.
Data
redundancy can be reduced in a database by using normalization techniques.
Normalization is the process of organizing data in a database to minimize
redundancy and improve data integrity.
h)Define primary key. Write any two use of it.
Ans: A key that uniquely identifies each
record in a database is primary key.
Any two uses of it are:
i)
To reduce and control duplication of record in a table.
ii)
To set the relationship between tables.
i) Differentiate between fields and records
with an examples.
Ans:
Record |
Field |
Record is complete set of
information. Record is a collection of multiple related fields in a row which gives compete information about a person or thing. |
Field is a small unit of
information. |
5. Write down the output of the given
program and show them in dry run table. (2)
DECLARE FUNCTION
EXAM$(W$)
W$ =
"COMPUTER"
PRINT EXAM$(W$)
FUNCTION
EXAM$(W$)
FOR P = 1 TO
LEN(W$)
K$ = MID$(W$, P,
1)
IF P MOD 2 = 0
THEN
K$ = LCASE$(K$)
ELSE
K$ = UCASE$(K$)
END IF
S$ = S$ + K$
NEXT P
EXAM$ = S$
END FUNCTION
DRY RUN:
Variable |
Variable |
Loop check |
Variable |
Variable |
Output |
W$ |
P |
1 to 8 |
K$ |
S$ |
|
COMPUTER |
1 |
1 to 8 Yes |
C |
C |
|
|
2 |
2 to 8 Yes |
o |
Co |
|
|
3 |
3 to 8 Yes |
M |
CoM |
|
|
4 |
4 to 8 Yes |
p |
CoMp |
|
|
5 |
5 to 8 Yes |
U |
CoMpU |
|
|
6 |
6 to 8 Yes |
t |
CoMpUt |
|
|
7 |
7 to 8 Yes |
E |
CoMpUtE |
|
|
8 |
8 to 8 Yes |
R |
CoMpUtEr |
|
|
9 |
9 to 8 No Loop exits |
|
|
CoMpUtEr |
OUTPUT:
CoMpUtEr
6. Re-write the following program
after correcting bugs. (2)
REM PROGRAM
DISPLAY RECORDS
OPEN INFO.DAT FOR
INPUT AS #1
CLS
WHILE NOTEOF(2)
INPUT #1,
NAME$,AGE, SALARY
DISPLAY NAME$,
AGE, SALARY
LOOP WEND
CLOSE #1
END
Debugged Program
REM PROGRAM
DISPLAY RECORDS
OPEN "INFO.DAT"
FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1,
NAME$,AGE, SALARY
PRINT NAME$, AGE, SALARY
WEND
CLOSE #1
END
7. Study the given program and answer
the given questions. (2)
DECLARE FUNCTIONI
ABC$ (N$)
CLS
INPUT "
ENTER ANY WORD"; W$
PRINT "THE
RESULT STRING IS"; ABC(W$)
END
FUNCTION ABC$(N$)
FOR I = 1 TO
LEN(N$)
P$ = MID$(N$, I,
1)
R$ = P$ + R$
NEXT I
SHARED R$
ABC$=R$
END FUNCTION
a) List the arguments and parameters
used in above program.
Ans: The argument used in the above
program is W$ and parameter is N$.
b) What is the use of SHARED in above
program?
Ans: The SHARED keyword in QBASIC is
used to declare variables that can be shared among different subroutines in a
program.
Group “C” (4×4=16)
Long
Answer Questions
8. Convert/calculate as per the
instructions. (4×1=4)
a) (10111)2 = (?)10
Soln.
1x24
+ 0x23 + 1x22 + 1x21 + 1x20
1x16
+ 0x8 + 1x4 + 1x2 + 1x1
16
+ 0 + 4 + 2 + 1
23
\
(10111)2 = (23)10
b) (CCA)16 = (?)2
Soln.
Hexadecmal
digits: C C A
Binary
equivalent : 1100 1100 1010
Grouping
together: 110011001010
\ (CCA)16 = (110011001010)2
c) (1110+1110)2 x ( 11)2
Soln.
1
1 1 0
+ 1 1 1
0
1 1 1 0 0
x 1 1
1 1 1 0 0
+ 1
1 1 0 0 x
1 0 1 0 1 0 0
\ (1110 + 1110)2 x (11)2
d) (111001)2 ¸
(101)2
Soln.
\ Q = 1011
R =
10
9. Write a program in QBASIC that asks principal,
time and rate of interest and calculate simple interest and amount. Create a
user-defined function to calculate simple interest and sub-program to calculate
amount. [Hint : SI = P*T*R/100, A= P +
SI]
DECLARE FUNCTION INTEREST(P,T,R)
DECLARE SUB
AMOUNT (P,I)
CLS
INPUT "ENTER
PRINCIPAL";P
INPUT "ENTER
TIME";T
INPUT "ENTER
RATE";R
PRINT
"SIMPLE INTEREST = Rs."; INTEREST(P,T,R)
CALL AMOUNT(P,I)
END
FUNCTION
INTEREST(P,T,R)
SHARED I
I = P*T*R/100
INTEREST = I
END FUNCTION
SUB AMOUNT (P,I)
A = P + I
PRINT
"AMOUNT = Rs. "; A
END SUB
10. Write a
sequential data file called "abc.dat" has stored data under the field
heading Roll No., Name, English, Nepali, and Computer. Write a program to
display all the information of those students whose marks in computer is more
than 45.
OPEN
"abc.dat" FOR INPUT AS #1
PRINT "ROLL
NO.","NAME","ENGLISH","NEPALI","COMPUTER"
WHILE NOT EOF (1)
INPUT #1, RN,
N$,E, N, C
IF C>45 THEN
PRINT RN, N$, E,
N, C
END IF
WEND
CLOSE #1
END
11. Write a C
program to accept any three numbers and display their average.
#include<stdio.h>
#include<conio.h>
void main()
{
float num1, num2,
num3, sum, avg;
printf ("Enter
any three numbers");
scanf("%f %f
%f",&num1, &num2, &num3);
sum = num1 + num2
+ num3;
avg = sum / 3;
printf("Average
of three numbers is %f ", avg);
getch();
}
OR
Write a program
in 'C' language to find out the given number is even or odd.
#include<stdio.h>
#include<conio.h>
void main()
{
int num;
printf("Enter
a number");
scanf("%d",
&num);
if (num % 2 == 0)
printf("%d
is even number",num);
else
printf("%d is odd number",
num);
getch();
}
*****
No comments:
Post a Comment