SEE Solved Computer Science Model Question Paper
SET 2
Candidates are required to write their answer according
to the instructions.
Attempt all questions
Group A
1. Answer the following questions in
one sentence.
a) Where does intranet has been used?
Ans: Intranet has been used to share
internal information and resources within an organization.
Ans: Any two benefits of cloud
computing are:
i) Reduce cost
ii) Enhanced data security
Ans: Date/Time data type is used to
store date of birth of an employee in MS-Access.
Ans: Any two data types used in
MS-Access database are text and number.
Ans: The procedure used in QBASIC are
SUB procedure and FUNCTION procedure.
Ans: Any two features in 'C' language
are:
i) It is mostly used to prepare
system software.
ii) it occupies less memory space.
2. Write appropriate technical term
for the following. [2x1=2]
a) The protocol that makes the
network communication possible.
Ans: TCP/IP
b) Digital marks created while using
Internet.
Ans: Digital Footprint
3. Write the full form of the
following. [2x1=2]
(a) ISDN – Integrated Services
Digital Network
b) TCP/IP – Transmission Control
Protocol / Internet Protocol
Group B
Answer the following question in
short. 9x2=18
a) Differentiate between peer to peer
and client-server network with figure.
Ans:
Client
– Server Network |
Peer
to Peer Network |
Client/server network is a type of
network model where at least one computer is designed as a server and other
computers on the network called clients or workstations. The client request for service and
server respond with the service. |
Peer-to-Peer network is a type of
network model where all the computer have equal responsibilities on the
network. Each node can request for services and
can also provide the services. |
b) What is cyber ethics? Give any two
example of it.
Ans: Cyber ethics is a set of moral
principles or code of conducts that regulate the use of computers
systematically without making harm to other users.
Any two examples of computer ethics
are:
i) Do not use a computer harm other
people.
ii) Do not use a computer to publish
fake information.
(c) What is software security? Write
any two measures of software security.
Ans: The security given to the
software and data from being lost or damaged due to accidental or intentional
harm is called software security.
Any two measures of software security
are:
i) Keep the backup copy of important
data or software.
ii) Use antivirus software and update
frequently.
(d) Define E-Commerce ? Write its
importance.
Ans: E-commerce refers to the buying
and selling of goods or services using the internet.
The importance of e-commerce is it
make buying/selling possible 24/7. It makes buying selling procedure faster, as
well as easy to find products. There are no geographical boundaries for
e-business. Anyone can order anything from anywhere at any time.
Ans: Mobile computing is important
now because it lets people use their phones or tablets to get things done from
anywhere, anytime, making life easier and more efficient.
Any two importance of mobile
computing are:
i) We can stay connected to all
sources at all times.
ii) We can interact with a variety of
users via the Internet.
Ans:
S.No |
Primary
Key |
Foreign
key |
1 |
A primary key uniquely identifies a
record in the relational database table. |
A foreign key refers to the field in a
table which is the primary key of another table. |
2 |
The primary key doesn’t allow null values. |
Foreign key accepts multiple null
values. |
3 |
A table can contain only one primary key. |
A table can contain more than one
foreign key. |
4 |
E.g. ID number in Employee
table. |
E.g. In table of orders, Customer ID
might be linking in customer information table. |
Ans: Query is an object of MS-Access
which extracts and arranges information from a table in a manner that is
specified.
Any two advantages of query are:
i) We can filter, perform
calculations and summarize data.
ii) To perform mass update, delete or
append new records to a table.
h) What is data sorting? List any two
advantages of using it.
Ans: Data sorting is the process of
arranging the record in ascending or descending order according to a given
field or fields. Sorted data is easier to handle than unsorted data.
The advantages of sorting are:
i) It helps to find specific
information quickly.
ii) Sorted data is easier to handle
than unsorted data.
i) Define form. Write its importance
Ans: Form is an object of MS-Access
which provide graphical interface to enter data into the tables or multiple
linked tables.
The importance of form are:
a) It provides an interactive
platform for input of data into the database.
b) It helps to display data in more
presentable form than a datasheet.
5. Write down the output of the given
program. Show with dry run in table.
DECLARE SUB SERIES ()
CLS
CALL SERIES
END
SUB SERIES ()
X=1
Y=2
FOR P 1 TO 10
PRINT X:
X=X+Y
Y=Y+1
NEXT P
END SUB
Dry run
Variable |
Variable |
Variable |
Loop check |
Output |
X |
Y |
P |
1 to 10 |
|
1 |
2 |
1 |
1 to 10 Yes |
1 |
3 |
3 |
2 |
2 to 10 Yes |
3 |
6 |
4 |
3 |
3 to 10 Yes |
6 |
10 |
5 |
4 |
4 |
10 |
15 |
6 |
5 |
5 |
15 |
21 |
7 |
6 |
6 |
21 |
28 |
8 |
7 |
7 |
28 |
36 |
9 |
8 |
8 |
36 |
45 |
10 |
9 |
9 |
45 |
55 |
11 |
10 |
10 |
55 |
66 |
12 |
11 |
11 to 10 No Loop exits |
|
Output
1 3 6 10 15 21 28 36 45 55
6. Re-write the given program after
correcting the bugs: [2]
REM to store record in data file
CLS
OPEN "employee.dat" FOR
INPUT AS #1
DO
INPUT "Enter Name, address and
gender": NS, A. G
INPUT #1, NS, A. G
INPUT "Do you want to continue
"; Y$
WHILE UCASE$(Y$) = "Y"
CLOSE "employee.dat"
END
Debugged Program
REM to store record in data file
CLS
OPEN "employee.dat" FOR OUTPUT
AS #1
DO
INPUT "Enter Name, address and
gender": NS, A$, G$
WRITE #1, NS, A. G
INPUT "Do you want to continue
"; Y$
LOOP WHILE UCASE$(Y$) = "Y"
CLOSE #1
END
7. Study the following program and
answer the given questions: [2]
DECLARE FUNCTION text$(N$)
CLS
INPUT "Enter any string"; X$
PRINT text$(X$)
END
FUNCTION text$(N$)
FOR i= LEN (N$) TO 1 STEP-1
W$=W$+MID$(N$,i,1)
NEXT i
text$ = WS
NEXT Q
END FUNCTION
Questions:
a) What is the main objective of
above program?
Ans: The main objective of above
program is to reverse the string.
b) List all the parameters used in
above program.
Ans: The parameters used in above
program are X$ and N$
Group C
8. Convert/ Calculate as per the
instruction.
a) (10111101)2 = (?)10
Solution:
=
1x27 + 0x26 + 1x25 + 1x24 + 1x23
+ 1x22 + 0x21 + 1x20
=
1x128 + 0x64 + 1x32 + 1x16 + 1x8 + 1x4 + 0x2 + 1x1
=
128 + 0 + 32 + 16 + 8 + 4 + 0 + 1
=
189
\ (10111101)2 = (189)10
c) (10101)2 X (111)2
Solution:
1
0 1 0 1
X 1 1
1
1
0 1 0 1
1 0 1 0 1 x
+ 1 0 1 0 1 x x
1 0 0 1 0 0 1 1
\ (10101)2 X (111)2 =
(10010011)2
b) (645)10 = (?)16
Solution:
16 |
645 |
|
16 |
40 |
8 |
16 |
2 |
2 |
|
0 |
|
\ (645)10 = (285)16
d) (111110) / (110)
Solution:
R
= 10
9. a) Write a program in QBASIC to
input length and breadth of room and calculate its area using function and
perimeter using sub procedure. [Hint: Area = lxb. Perimeter = 2(1+b)]
Ans:
DECLARE FUNCTION AREA (L,B)
DECLARE SUB PERIMETER(L,B)
CLS
INPUT "ENTER LENGTH"; L
INPUT "ENTER BREADTH"; B
PRINT "Area of room = ";
AREA(L,B)
CALL PERIMETER(L,B)
END
FUNCTION AREA(L,B)
A= L*B
AREA = A
END FUNCTION
SUB PERIMETER(L,B)
P = 2*(L+B)
PRINT "Perimeter of room =
" ; P
END SUB
b) A sequential data file called "Records.dat"
has stored data under the field heading Roll No., Name, Gender, English,
Nepali, Maths and Computer. Write a program to display all the records of
students whose marks in computer is more than 90.
Ans:
OPEN "Records.dat" FOR
INPUT AS #1
WHILE NOT EOF(1)
INPUT #1, RN,N$,G$,E,N,M,C
IF C>90 THEN
PRINT RN, N$, G$, E, N, M, C
END IF
WEND
CLOSE #1
END
10. Write a program in C to sum of
odd number from 80 to 90.
Ans:
#include<stdio.h>
#include<conio.h>
void main()
{
int i, s=0;
for (i = 80; i <= 90; i++)
{
if (i % 2 ==1)
s = s + I;
}
printf ("Sum of odd numbers from
80 to 90 = %d", s);
getch();
}
OR
Write a program in 'C' language to
input three number and find greatest number among three numbers.
Ans:
#include<stdio.h>
#include<conio.h>
void main()
{
int a, b, c;
printf ("Enter any three
numbers");
scanf("%d %d %d", &a,
&b, &c);
if (a>b && a>c)
printf ("%d is the greatest
number", a);
else if(b>c)
printf ("%d is the greatest
number", b);
else
printf ("%d is the greatest
number"; c);
getch ();
}
* The End *
No comments:
Post a Comment