New specification grid 2077
Solved question model
Subject: Computer
Science
Full marks: 50 |
Time:
1:30 hrs |
Group “A” (10 Marks)
Very short
questions
1. Answer the
following questions in one sentence. (6×1=6)
a) What is search
engine?
Ans: A search
engine is a computer program or software that helps people to search the
information they are looking for online by phrases or keywords. Examples: Bing,
Google etc.
b) What is the
business done through the internet?
Ans: E-commerce is
the business done through the internet.
c) Which data type
is used to store numeric characters or special symbols in Ms-Access?
Ans: Text data type
is used to store numeric characters or special symbols in Ms-Access.
d) Which view is
used to modify a table in Ms-Access?
Ans: To modify a table Design view is used in Ms-Access.
e) What do you mean by modular
programming?
Ans: Modular
programming is the process of dividing the large computer program into separate
sub-programs.
f) Write any two
features of ‘C’ language.
Ans: Following are
the features of ‘C’ language.
i) Machine Independent or
Portable.
ii) It is case sensitive language.
2. Write appropriate technical term for the
following statements.
a) Law that governs the legal issue of
cyberspace.
Ans: Cyber law
b) The smallest unit of represent information
on quantum computer.
Ans: Quantum Bit (Qubit)
3. Write the full forms of the following:
(2×1=2)
i) STP: Shielded Twisted Pair
ii)WAP: Wireless Application Protocol
Group “A” (24 Marks)
4. Answer the
following questions. (9×2=18)
a) What is computer
network? Enlist any two advantages of it.
Ans: Computer networking is a interconnected of different computing devices that can exchange data and
share resources with each other.
Advantages of computer network are as here under.
i) Sharing computer resources. (Hardware and software)
ii)
Fast means of communication.
iii) Centralized
administration
iv) Large storage
capacity
b) What is computer
ethics? Write any two of them.
Ans: Computer ethics is the application of moral principles
or characteristics to the use of internet, computer and cyber space.
Following
are the ethical points:
i) Do not use a
computer to harm other people.
ii) Do not use or
copy software for which you have not paid.
c) What is software
security? Mention any two measures of hardware security.
Ans: The process of
protecting the computer program, data and application is known as computer
software security.
Following are the
different hardware security measures:
i) Never keep the hardware in the contact with fire and
water.
ii)
Use surveillance cameras.
iii)
Regular maintenance
iv)
Insurance policy
d) What is
m-Commerce? Write its two important services.
Ans: M-commerce (mobile commerce) is use of wireless handheld
devices like cell phones, tablets, and PDA to perform different online
transactions.
Services
of m-commerce are as here under:
i)
Mobile banking
ii) Online games
iii) Online marking
iv) Mobile shopping
e) What is IoT? Write any two importance of it.
Ans: Internet of
Things (IOT) is a recent technology that creates a global network of machines
and devices that are capable of communicating and exchanging data with each
other through the Internet.
Importance of IOT:
i) Ability to track
and monitor things
ii) Increases
efficiency by saving money and resources
iii) It makes
analytics decisions faster and accurately
f) What is database? Give any two
examples.
Ans: The process of
keeping your data, information in a systemic way is known as database.
Examples: Dictionary, phone diary, financial ledger
etc.
g) What is primary
key? Write any two advantages of it.
Ans: A primary key is the column or columns that
contain values that uniquely identify each row in a table.
Following
are the advantages of primary key:
i)
It reduces duplicate data.
ii)
It avoids null value.
iii)
it is used to make a relationship between different tables.
iv)
Database operations like searching for records are faster
h) What is data
sorting? List any two advantages.
Ans: The process of
arranging the data in a specific order either ascending or descending to make
reported data more usable is known as sorting.
Advantages of
sorting:
i) It can arrange
all the data in the table.
ii) Data searching is much faster.
i) What types of
work is done in MS-Access using Form and query object?
Ans: Form is the
object of Ms-Access which is used to enter the data.
Query is the object
of Ms-Access which is used to display the data by giving specific criteria and
condition.
5. Write down the
output of the given program. Show with dry run in table. [2]
DECLARE SUB show (a)
CLS
n = 87
CALL show(n)
END
SUB show (a)
DO
b = a MOD 6 + 3
IF b MOD 4 = 0 THEN GOTO aa
PRINT b;
aa:
a = a - 10
LOOP WHILE a >= 50
END SUB
Dry Run Table |
|||||
Variable
n |
Variable
a |
B= A
MOD 6+3 |
Condition Is B
MOD 4=0 |
Result |
Loop Is
a>=50? |
87 |
87 |
B=87 MOD 6+3 B=3+3=6 |
Is 6 MOD 4=0? False |
6 |
Is 77>=50? Yes |
87 |
77 |
B=77 MOD 6+3 B=5+3=8 |
Is 8 MOD 4=0? True |
- |
Is 67>=50? Yes |
87 |
67 |
B=67 MOD 6+3 B= 1+3=4 |
Is 4 MOD 4=0? True |
- |
Is 57>=50? Yes |
87 |
57 |
B=57 MOD 6+3 B=3+3=6 |
Is 6 MOD 4=0? True |
6 |
Is 47>=50? No Exit from loop |
Final output:
6 6
REM to add record
in an existing file
CLS
OPEN “Record.Dat”
FOR OUTPUT AS #1
AA:
INPUT “Enter Name,
Class and Roll No. “; Nm$, Cl, Rn
INPUT #2, Nm$, Cl,
Rn
INPUT “Do you need more records “; Yes$
IF UCASE$(Yes$) = “Y”
THEN
GOTO xy
CLOSE “Record.dat”
END
Debugged program:
REM to add record
in an existing file
CLS
OPEN “Record.Dat”
FOR APPEND AS #1
AA:
INPUT “Enter Name,
Class and Roll No. “; Nm$, Cl, Rn
WRITE #2, Nm$, Cl, Rn
INPUT “More records
“; Y$
IF UCASE$(Y$) = “Y”
THEN
GOTO aa
ENDIF
CLOSE #1
END
7. Analyze the
following program and answer the given questions: [2]
OPEN “Detail.dat”
FOR INPUT AS #1
OPEN “Temp.dat” FOR
OUTPUT AS #2
INPUT “Enter name
of the students “; Sn$
FOR I = 1 TO 10
INPUT #1, Nm$, Cl,
A
IF Sn$ < >
Nm$ THEN
WRITE #2, Nm$, Cl,
A
END IF
NEXT I
CLOSE #1, #2
KILL “Detail.dat”
NAME “Temp.dat” AS
“Detail.dat”
END
i) What is the main
objective of the above program?
Ans: Above program
is used to delete the unwanted records.
ii) Do you get any
problem in the above program if “Kill” statement is removed? Give reason.
Ans: Yes/ If we remove
KILL statement from above program we are not able to remove unwanted records
because all the unwanted records are there in the file called “detail.dat” which
we use KILL statement.
Group 'C' (16 Marks)
8. Convert / calculate
as per the instruction: [4×1=4]
i) (11001101)2 =
(?)16
ii) (524)10 =
(?)2
iii) (1010)2 x
(110)2 – (1011)2 = (?)2
iv) (10110)2 ÷
(101)2
9. a. Write a
program in QBASIC that asks length, breadth and height of room and calculates
its area and volume. Create a user-defined function to calculate area and
sub-program to calculate volume. Hint: [A =LxB], [V=LxBxH] [4]
DECLARE FUNCTION area (l, b)
DECLARE SUB vol (l, b, h)
CLS
INPUT "Enter length, breadth and
height"; l, b, h
PRINT "Area="; area(l, b)
CALL vol(l, b, h)
END
FUNCTION area (l, b)
area = l * b
END FUNCTION
SUB vol (l, b, h)
v = l * b * h
PRINT "volume"; v
END SUB
b. A sequential data file called “Record.txt”
has stored data under the field heading Roll No., Name, Gender, English,
Nepali, Maths and Computer. Write a program to display all the information of
those students whose gender is ‘F' and obtained marks in computer is more than
90. [4]
CLS
OPEN “record.dat” FOR INPUT AS #1
DO WHILE NOT EOF(1)
INPUT #1,rn,n$,g$,e,n,m,c
IF UCASE$(g$)= “Y” AND c>90 THEN PRINT
rn,n$,g$,e,n,m,c
LOOP
CLOSE #1
END
10. WAP in C language that
input a number and check whether it is odd or even. [4]
#include<stdio.h>
#include<conio.h>
main()
{
int
n,r;
printf("enter
any no\n");
scanf("%d",&n);
r=n%2;
if(r==0)
printf("even
no");
else
printf("odd
no");
getch();
}
OR
WAP in ‘C' language to print the series with their sum. 1,2,3,4,….., up to 10th terms.
#include<stdio.h>
#include<conio.h>
main()
{
int
x,sum=0;
for(x=1;x<=10;x++)
{
printf("%d\n",x);
sum=sum+x;
}
printf("sum=%d",sum);
getch();
}
No comments:
Post a Comment