SEE Pre-Qualifying Exam 2078
PABSON , Kathmandu
Sub:
Computer Science |
Full marks: 50 |
Time:
1:30 hrs |
|
Group ‘A’
Very Short Answer: [10×1]
Q1.
Answer the following questions in one sentence: [6×1=6]
(a)
What is internet?
Ans:
The Internet is a world wide area network that connects computer systems across the
world. It is also known as network of networks.
(b)
What is cloud computing?
Ans:
Cloud computing is the delivery of different services through the Internet.
These services include storage, databases, networking, server and software.
(c)
Which data type is used to store salary of an employee in MS Access?
Ans:
Currency data type is used to sore salary of an employee in MS-Access.
(d)
What is an extension of MS Access database?
Ans:
.MDB is an extension of MS-Access database.
(e)
What are modules in QBASIC?
Ans:
SUB….END SUB and FUNCTION….END FUNCTION are the modules in QBASIC.
(f)
Write any two data type used in C language?
Ans:
int and float are two data types used in C language.
Q2.
Write appropriate technical terms for the following: [2×1=2]
(a)
The rate at which data are transferred in a given medium
Ans:
Bandwidth
(b)
The use of computer technology to create a simulated environment.
Ans:
Virtual Reality
(a)
SMTP: Simple Mail Transfer Protocol
(b) CDMA: Code Division Multiple Access
Group ‘B’
Short Answer : [12×2=24]
Q4.
Write the following questions. [9×2=18]
(a)
Differentiate between bus and star topology with figure.
Star topology |
Bus topology |
All the
devices connected with central connecting device called hub |
All the
devices are connected with single backbone cable. |
If hub fails
whole network will disturb. |
If backbone
cable fail whole network will disturb |
It required
more cables. |
It required
less cable than star topology. |
Data transfer
rate is high |
Data transfer
rate is low |
(b)
What is computer crime? Give any four examples of it.
Ans:
Criminal activities which can be done by using computer, internet and network
devices.
Following
are the examples of computer crime.
i)
Hacking
ii)
Cracking
iii)
Cyber bullying
iv)
Phishing
(c) What is hardware security? Write any two
measures of software security.
Ans:
The process of protecting the physical parts of computer system is known as
computer hardware security.
Following
are the two measures of software security.
i)
Use antivirus and firewall
ii)
Regular backup your software and data.
(d)
What is e-commerce? Write its importance.
Ans:
Electronic commerce (E-commerce) is the process of buying and selling goods and
services through online.
Following
are the importance of e-commerce.
i)
To increase the sales of business.
ii)
It helps to promote your business worldwide.
iii)
Easily receive feedbacks which improve your business.
iv)
It helps you make business strategy and expansion.
(e) What is mobile computing? Write any two
importance of it.
Ans:
Mobile Computing is a technology
that allows the user transmission of data, with the help of wireless devices
without having to be connected to a fixed physical link.
Following are the importance of mobile computing.
i) It is used for entertainment purpose.
ii) It increases productivity.
iii) It support cloud computing.
iv) Easy to use because of its portability.
Database |
DBMS |
Database
is a systematic method of collection of records. |
DBMS
is a database program of software which keeps the records in a systematic way |
It
stores data |
It
operate and manipulates data |
It
has less data security |
It
is more data security |
Example:
Dictionary, Salary sheet, Marks ledger, etc. |
Examples:
MS-Access, Oracle, SQL etc. |
(g)
What is primary key? List any two advantages of it.
Ans:
A key which is uniquely identifies each record in the table is known as primary
key.
Following
are the advantages of primary key:
i)
It avoids the duplicate data.
ii)
It does not accept null value.
(h) What is data sorting? List any two
advantages of using it.
Ans:
The process of arranging the data in specific order either in ascending (A-Z)
or descending order (Z-A) is known as sorting.
Advantages
of sorting are as here under:
i)
Simpler to read and understand
than unsorted data.
ii) Easy to analyze the data.
(i)
Define query? Write its importance.
Ans:
Query is one of the important objects of of MS-Access which request for data results, and for action on data.
The
main importance is query is to display the data on the basis of specific
criteria and conditions.
Q5.
Write the output of the given program. Show with dry run in table. [2]
DECLARE
SUB SHOW (A,B)
CLS
X=1:Y=2
CALL
SHOW (X,Y)
END
SUB
SHOW
(A,B)
I
= 1
DO
PRINT
A;
A
= A + B
B
= A + B
I
= I + 1
LOOP
WHILE I<=5
END
SUB
Dry
Run:
Variable
I |
Output
(A) |
Variable
A |
Variable
B |
Variable
I |
Loop Is
I<=5 |
1 |
1 |
A=1+2=3 |
B=3+2=5 |
I=1+1=2 |
Is
2<=5? Yes |
2 |
3 |
A=3+5=8 |
B=8+5=13 |
I=2+1=3 |
Is
3<=5? Yes |
3 |
8 |
A=8+13=21 |
B=21+13=34 |
I=3+1=4 |
Is
4<=5? Yes |
4 |
21 |
A=21+34=55 |
B=55+34=94 |
I=4+1=5 |
Is
5<=5? Yes |
5 |
55 |
A=55+94=149 |
B=149+94=243 |
I=5+1=6 |
Is
6<=5? No Exit
from loop |
Final
Output :
1
3 8 21 55
Q6.
Re-Write the given program after correcting the bugs. [2]
REM
to store record in data file
CLS
OPEN
"info.dat" FOR INPUT AS #1
DO
INPUT
“Enter Name, Address and Class ”;N$,A,C
INPUT
#1,N$,A,C
INPUT
"Do you want to continue " ; Y$
WHILE
UCASE$(Y$)= "Y"
CLOSE
"info.dat"
END
Debugged
program:
REM
to store record in data file
CLS
OPEN "info.dat" FOR OUTPUT
AS #1
DO
INPUT
“Enter Name, Address and Class ”;N$,A$,C
WRITE
#1,N$,A$,C
INPUT
"Do you want to continue " ; Y$
LOOP WHILE UCASE$(Y$)= "Y"
CLOSE #1
END
Q7.
Study the following program and answer the given questions. [2×1=2]
DECLARE
FUNCTION test$(N$)
CLS
INPUT
"Enter any string "; X$
PRINT
test$(X$)
END
FUNCTION
test$(N$)
FOR
I = LEN(N$) TO 1 STEP-1
W$=W$+MID$(N$,I,1)
NEXT
I
test$=W$
END
FUNCTION
(a)
What is the main objective of the program given above?
Ans:
The above program will display the input string in reverse order.
(b)
List all the parameters used in above program.
Ans:
Formal parameter= N$
Actual/Real
parameter is : X$
Group
"C"
Long Answer Questions: [4×4=16]
Q8.
Convert / calculate as per the instruction: [4×1=4]
(a)
(1110001110)2 = (?)8
(b)
(111)10=(?)2
(c)
(1000)2 - (111)2 =(?)2
(d)
(111111)2 ÷ (111)2
Q9.
A) Write a program in QBASIC to input radius of circle and calculate its area
using function and circumference using sub procedure. [Area=pie×r2 and
Circumference=2pie r] [4]
DECLARE
FUNCTION area (r)
DECLARE
SUB cir (r)
CLS
INPUT
"enter radius"; r
PRINT
"area"; area(r)
CALL
cir(r)
END
FUNCTION
area (r)
area
= 22 / 7 * r * r
END
FUNCTION
SUB
cir (r)
c
= 2 * 22 / 7 * r
PRINT
"Circumference"; c
END
SUB
Q10.
A sequential data file called "Record.txt" has stored data under the
field heading Roll No., Name, Gender, English, Nepali and Math’s and Computer.
Write a program to display all the information of female students who pass in
all subjects. [Note: Pass mark in all subjects is 40].[4]
CLS
OPEN
“record.dat” FOR INPUT AS #1
DO
WHILE NOT EOF(1)
INPUT
#1, rn,n$,g$,e,n,m,c
IF
g$= “female” AND e>=40 AND n>=40 AND m>=40 AND c>=40 THEN
PRINT
rn, n$, g$, e,n,m,c
ENDIF
LOOP
CLOSE
#1
END
Also Read: SEE theory and practical evaluation of computer science
Q11.
Write a program in C language to display the first 10 odd numbers. [4]
#include<stdio.h>
#include<conio.h>
main()
{
int x,a=1;
for(x=1;x<=10;x++)
{
printf("%d\t",a);
a=a+2;
}
}
OR
Write
a program in ‘C’ language to input two numbers and find greatest among two numbers.
#include<stdio.h>
#include<conio.h>
main()
{
int a,b,g=0;
printf("enter any two
no\n");
scanf("%d%d",&a,&b);
if(a>b)
g=a;
else
g=b;
printf("Greatest
no=%d",g);
getch();
}
You can also read:
New Question Model of Grade 10 / SEE
Thank you
ReplyDelete