Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Sunday, May 1, 2022

SEE solved question paper of computer science 2078(2022)

 

SEE solved question paper of computer science 2078(2022)

Optional II Computer Science

Time: 1:30 Hrs

Full marks: 50

Group “A”

1. Answer the following questions in one sentence.   6×1=6

a) Write the name of any two search engine.

Ans: Google and Bing is the two search engine.


b) What is social media?

Ans: The term social media refers to computer technology that facilitates the sharing of thoughts, ideas, and information through virtual networks and communities.


c) Which data type is suitable to store photograph of student in MS- Access?

Ans: OLE data type is suitable to store photograph of student in MS-Access.


d) Which view is used to modify table structure in MS-Access?

Ans: In MS-Access Design view is used to modify the table structure.


e) Which statement is used to call sub-procedure?

Ans: To call the sub procedure CALL statement is used.


f) Write any two data types used in C language?

Ans: int and float is two data types used in C language.

 

2. Write appropriate technical term for the following: 2×1=2

a) A system of copying data and information residing in computer into another location.

Ans: Backup.

b) A company which provides services of Internet.

Ans: ISP

 

3. Write the full form of the following:          2×1=2

a) FTP: File Transfer Protocol

b) MAN: Metropolitan Area Network

 

Group “B”

4. Answer the following questions. 9×2=18

a) What is computer network? Write any two advantages of it.

Ans: Interconnection of two or more than two computer with the help of wire or wireless is known as computer network.

Advantages of computer network:

i) Easy to share hardware and software.

ii) Data backup and security is possible.

 

b) Define software security. Write any two protection measures for it.

Ans: The process of protecting computer program and data is known as software security.

Following are the two protection measures for it.

i) Install antivirus and regular update it.

ii) Backup your data regularly.

 

c) What is search engine? Write any two popular search engines.

Ans: A search engine is software or a program that allows Internet users to search information or content through the World Wide Web (WWW).

Two popular search engines are:

i) Google

ii) Bing

 

d) Define e-commerce? Write any two benefits of it.

Ans: Selling and buying goods through internet is known as e-commerce.

Following are the benefits of e-commerce.

i) Product and price can be comparing with other product.

ii) It reduces infrastructure cost.

 

e) Write any two advantages and disadvantages of social media.

Ans: Following are the advantages and disadvantages of social media.

Advantages:

i) We have the opportunity to connect with others and share information through social media.

ii) You can build a relationship with your customer that makes them more likely to use your services.

Disadvantages:

i) Social media can spread false or unreliable information quickly.

ii)  Chance of cyber bulling.

 

f) What is DBMS?  Write any two advantages of it.

Ans: Database Management System (DBMS) is a computer program of software which is used to keep your record systematically.

Advantages of DBMS are as here under:

i) It reduces data redundancy.

ii) Data security and backup is possible.

 

g) What is primary key? Write any two features of it.

Ans: A primary key is unique key in the database table which identifies each record in database table.

Following are the two features of primary key:

i) Duplicate data are not allowed in primary key field.

ii) It does not accept null value.

 

h) Define field and record.

Ans: Field: The term field can be defined as the column of the table of database which stores a particular category of data.

Record: The term record can be defined as the row of a table of database which consists of the related data of a person or thing.

 

i) Define form. Write any two uses of it.

Ans:  A form is the object of MS-Access which is used to create a user interfere for a database application.

Following are the uses of it.

i) It is used to control access the data.

ii) It is used to display and edit the data.

 

5. Write the output of the given program. (workout with a dry run)     2

DECLARE SUB abca)

CLS

a=2

CALL abc(a)

END

 

SUB abdc(a)

            FOR j= 1 TO 5

                        PRINT a;

                        a=a+3

            NEXT j

END SUB

Ans:



6. Re-write the given program after correcting bugs:             2

DECLARE SUB series()

CLS

EXECUTE series

END

 

SUB series

REM program to generate 1  1   2   3  5  ….up to the 20th term.       

A=1

B=1

FOR ctr 10 TO 1

DISPLAY A: B:

A=A+B

B=A+B

NEXT ctr

END series()

 

Debugged program:

DECLARE SUB series()

CLS

CALL series

END

 

SUB series

REM program to generate 1  1   2   3  5  ….up to the 20th term.       

A=1

B=1

FOR ctr 10 TO 1 STEP -1

PRINT A;B;

A=A+B

B=A+B

NEXT ctr

END SUB

 

7. Study the following program and answer the given questions. 2×1=2

DECLARE FUNCTION TEST(X)

X=100

Z=TEST(X)

PRINT Z

END

 

FUNCTION TEST (X)

FOR R=1 TO X

S=S+1

NEXT R

TEXT =S

END FUNCTION

a) How many parameters are used in the above program?

Ans: one

b) How many times does the statement S=S+1execute in the above program?

Ans: 100 times

Group “C”

8. Convert/Calculate as per the instructions.                      4×1=4

i) (11111101)2=(?)16

 


ii) (245)10 = (?)2

 


iii) (1010)2 ×(101)2

 


iv) (101110)2 ÷(110)2



9. a) Write a program in QBASIC that asks length, breadth of a room and calculates its area and perimeter. Create a user define function to calculate area and sub program to calculate perimeter. [Hint: [Area=L×B], P=2(L+B)]]     4

Ans:

DECLARE FUNCTION area(l,b)

DECLARE SUB perimeter(l,b)

CLS

INPUT “Enter length and breadth”;l,b

PRINT area(l,b)

CALL perimeter(l,b)

END

 

FUNCTION area(l,b)

Area=l*b

END FUNCTION

 

SUB perimeter(l,b)

P=2*(l+b)

PRINT p

END SUB

 

b) Write a program to create a sequential data file “salary.dat” to store programmer’s name, salary and post according to the need of the user.      4

Ans:

OPEN “salary.dat” FOR OUTPUT AS #1

top:

INPUT “Enter programmers name”;n$

INPUT “Enter salary”;s

INPUT “Enter post”;p$

INPUT “Do you need more records”;ch$

IF UCASE$(ch$)=”Y” then GOTO top

CLOSE #1

END

10. Write a ‘C’ program that asks a number and check whether it is negative, positive or zero.   4

#include<stdio.h>

#include<conio.h>

main()

{

clrscr();

int n;

printf(“enter any number”);

scanf(“%d”,&n);

if(n>0)

printf(“positive”);

if(n<0)

printf(“negative”);

if(n==0)

printf(“Zero”);

getch();

}

 

OR

 

Write a C language to display first 10 odd numbers.     4

#include<stdio.h>

#include<conio.h>

main()

{

clrscr();

int x,a=1;

for(x=1; x<=10; x++)

{

printf(“%d\t”,a);

a=a+2;

}

getch();

}

 

 You may also read:

SEE computer question paper 2079 (2023) solved.

 

 

 

 

 

 

 

 

 

           

No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages