Friday, March 10, 2023

SEE Solved Computer Science Model Question - SET 1

 

Solved Computer Science Model Question


SET - I

Ve

 

Candidates are required to write their answer according to the instructions.

Attempt all questions

 

Group “A”
Very short answer questions. (10×1=10)

1. Give answer in one sentence for the following questions. (6×1=6)

a) Write any two examples of full duplex modes of data transmission.

Ans: Any two examples of full duplex modes of data transmission are telephone and mobile.

 

b) List any two software security measures.

Ans: Any two software security measures are :

i) Password

ii) Backup

 

c) Which data type is also known as logical data type in MS-Access?

Ans: Yes/No data type is also known as logical dta type in MS-Access.

 

d) Which query is used to view the data stored in database?

Ans: Select query is used to view the data stored in database.

 

e) What will be the value of x in given 'C' expression x=55 % 10?

Ans: The value of x will be 5.

 

f) What is looping?

Ans: Looping is a programming construct that repeatedly executes a block of code until a specified condition is met.

 

2. Write appropriate technical terms for the following. (2×1=2)

a)  Digital marks created while using internet.

Ans: Digital Footprint

 

b) The process of repeatedly executing some code until condition satisfies.

Ans: Looping

 

3. Write the full forms of the following. (2×1=2)

    a) bps : bits per second

    b) VOIP : Voice Over Internet Protocol

 

Group “B” (12×2=24)

Short answer questions

4. Answer the following questions. (9×2=18)

a) Define computer network. List two demerits of computer network.

Ans: Computer network is a group of two or more computers and devices connected to each other through wired or wireless media to exchange data and information and share hardware, software and other resources.

Any two demerits of computer network are:

 i) Computer network can be route for computer virus and malware transmission.

ii) Skilled manpower is required to manage and operate computer network.

 

b) Give any two advantages of E-mail over traditional mail.

Ans: Any two advantages of E-mail over traditional mail.

i) Emails can be sent and received almost instantly, allowing for quick communication and faster decision making. Traditional mail, on the other hand can take several days to arrive.

ii) Emails can be sent from anywhere with an internet connection, and they can be easily organized and stored for future reference. Traditional mail requires physical transportation, which  can be inconvenient and time-consuming.

 

c) Define computer security. How antivirus helps to secure computer software?

Ans: Computer security refers to the measures taken to protect computer system and networks from unauthorized access, theft, damage and disruption.

An antivirus helps to secure computer software by detecting and removing malicious software, such as viruses, spyware and Trojans that can harm the computer or steal sensitive information.

 

d) Define E-commerce? Write the name of any two E-commerce site.

Ans: E-commerce refers to the buying and selling of goods or services using the internet.

The name of any two E-commerce sites are Sastodeal.com and Daraz.com.

 

e) What is Cryptography? How encryption helps in data protection.

Ans: Cryptography is the practice of securing communication and data by converting it into a code to prevent unauthorized access or manipulation.

      Encryption helps in data protection by providing a secure way to store and transmit sensitive information.

 

f) What is database? List two advantages of DBMS.

Ans: A database is an organized collection of related information that can be used for different purpose so that it can easily be accessed, managed and updated.

      Any two advantages of DBMS are:

      i) It controls data redundancy which means duplication of data.

      ii) It allows sharing the existing data by different programs.

 

g) What is data redundancy? How can it be reduced in database?

Ans: Data redundancy refers to the repetition of data in a database, where the same data is stored in multiple places.

      Data redundancy can be reduced in a database by using normalization techniques. Normalization is the process of organizing data in a database to minimize redundancy and improve data integrity.

 

h)Define primary key. Write any two use of it.

Ans: A key that uniquely identifies each record in a database is primary key.

Any two uses of it are:

      i) To reduce and control duplication of record in a table.

      ii) To set the relationship between tables.

 

i) Differentiate between fields and records with an examples.

Ans:

Record

Field

Record is complete set of information.

Record is a collection of multiple related fields in a row which gives compete information about a person or thing.

 E.g.: Kapil  Nijgadh  44401

Field is a small unit of information.

 A column in a table is called field, and it contains a specific piece of information within a record.

 E.g. : Name, Address, Zip code

 

 

5. Write down the output of the given program and show them in dry run table. (2)

DECLARE FUNCTION EXAM$(W$)

W$ = "COMPUTER"

PRINT EXAM$(W$)

FUNCTION EXAM$(W$)

FOR P = 1 TO LEN(W$)

K$ = MID$(W$, P, 1)

IF P MOD 2 = 0 THEN

K$ = LCASE$(K$)

ELSE

K$ = UCASE$(K$)

END IF

S$ = S$ + K$

NEXT P

EXAM$ = S$

END FUNCTION

 

DRY RUN:

Variable

Variable

Loop check

Variable

Variable

Output

W$

P

1 to 8

K$

S$

 

COMPUTER

1

1 to 8 Yes

C

C

 

 

2

2 to 8 Yes

o

Co

 

 

3

3 to 8 Yes

M

CoM

 

 

4

4 to 8 Yes

p

CoMp

 

 

5

5 to 8 Yes

U

CoMpU

 

 

6

6 to 8 Yes

t

CoMpUt

 

 

7

7 to 8 Yes

E

CoMpUtE

 

 

8

8 to 8 Yes

R

CoMpUtEr

 

 

9

9 to 8 No

Loop exits

 

 

CoMpUtEr

 

OUTPUT:

CoMpUtEr

 

6. Re-write the following program after correcting bugs. (2)

REM PROGRAM DISPLAY RECORDS   

OPEN INFO.DAT FOR INPUT AS #1

CLS

WHILE NOTEOF(2)

INPUT #1, NAME$,AGE, SALARY

DISPLAY NAME$, AGE, SALARY

LOOP WEND

CLOSE #1

END

 

Debugged Program

REM PROGRAM DISPLAY RECORDS   

OPEN "INFO.DAT" FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

INPUT #1, NAME$,AGE, SALARY

PRINT NAME$, AGE, SALARY

WEND

CLOSE #1

END

 

 

7. Study the given program and answer the given questions. (2)

DECLARE FUNCTIONI ABC$ (N$)

CLS

INPUT " ENTER ANY WORD"; W$

PRINT "THE RESULT STRING IS"; ABC(W$)

END

        FUNCTION ABC$(N$)

FOR I = 1 TO LEN(N$)

P$ = MID$(N$, I, 1)

R$ = P$ + R$

NEXT I

SHARED R$

ABC$=R$

END FUNCTION

a) List the arguments and parameters used in above program.

Ans: The argument used in the above program is W$ and parameter is N$.

 

b) What is the use of SHARED in above program?

Ans: The SHARED keyword in QBASIC is used to declare variables that can be shared among different subroutines in a program.

 

Group “C” (4×4=16)

Long Answer Questions

8. Convert/calculate as per the instructions. (4×1=4)

a) (10111)2  = (?)10

                Soln.

                                1x24 + 0x23 + 1x22 + 1x21 + 1x20

                                1x16 + 0x8 + 1x4 + 1x2 + 1x1

                                16 + 0 + 4 + 2 + 1

                                23

                                 \ (10111)2 = (23)10                        

b) (CCA)16 = (?)2

                Soln.

                Hexadecmal digits:          C             C             A

                Binary equivalent :          1100       1100       1010

                Grouping together:         110011001010

                \ (CCA)16 = (110011001010)2                                                                     

c) (1110+1110)2  x ( 11)2

                Soln.

                                1 1 1 0

                          +   1 1 1 0

                          1 1 1 0 0     

                                    x 1 1

                            1 1 1 0 0                   

                    +  1 1 1 0 0 x                   

                      1 0 1 0 1 0 0

 

                \ (1110 + 1110)2 x (11)2

d) (111001)2  ¸ (101)2

                Soln.

                Description: C:\Users\fusion tech\Pictures\9.png

                \ Q = 1011

                     R = 10

 

9.    Write a program in QBASIC that asks principal, time and rate of interest and calculate simple interest and amount. Create a user-defined function to calculate simple interest and sub-program to calculate amount. [Hint : SI = P*T*R/100,   A= P + SI]

DECLARE FUNCTION INTEREST(P,T,R)

DECLARE SUB AMOUNT (P,I)

CLS

INPUT "ENTER PRINCIPAL";P

INPUT "ENTER TIME";T

INPUT "ENTER RATE";R

PRINT "SIMPLE INTEREST = Rs."; INTEREST(P,T,R)

CALL AMOUNT(P,I)

END

FUNCTION INTEREST(P,T,R)

SHARED I

I = P*T*R/100

INTEREST = I

END FUNCTION

SUB AMOUNT (P,I)

A = P + I

PRINT "AMOUNT = Rs. "; A

END SUB

10. Write a sequential data file called "abc.dat" has stored data under the field heading Roll No., Name, English, Nepali, and Computer. Write a program to display all the information of those students whose marks in computer is more than 45.

OPEN "abc.dat" FOR INPUT AS #1

PRINT "ROLL NO.","NAME","ENGLISH","NEPALI","COMPUTER"

WHILE NOT EOF (1)

INPUT #1, RN, N$,E, N, C

IF C>45 THEN

PRINT RN, N$, E, N, C

END IF

WEND

CLOSE #1

END

 

11. Write a C program to accept any three numbers and display their average.

#include<stdio.h>

#include<conio.h>

void main()

{

float num1, num2, num3, sum, avg;

printf ("Enter any three numbers");

scanf("%f %f %f",&num1, &num2, &num3);

sum = num1 + num2 + num3;

avg = sum / 3;

printf("Average of three numbers is %f ", avg);

getch();

}

OR

Write a program in 'C' language to find out the given number is even or odd.

#include<stdio.h>

#include<conio.h>

void main()

{

int num;

printf("Enter a number");

scanf("%d", &num);

   if (num % 2 == 0)

printf("%d is even number",num);

      else

                    printf("%d is odd number", num);

getch();

}

 

*****

No comments:

Post a Comment