SEE Grade Promotion Exam 2078(2022)
Group A (10 marks)
1. Answer the following questions in one sentence. 6×1=6
a) What is a web browser?
Ans: A web browser is an application program
that is used to view the information of documents or web pages.
b) Mention any two services provided by the internet.
Ans: Following are the services of the internet.
i) E-commerce
ii) E-mail
c) What is the default extension of Ms-Access?
Ans: Following are the default extension of
Ms-Access.
Ms-Access 2003 is .mdb
MS-Access 2007 is .accdb
d) Which object of Ms-Access is used to
retrieve data from the table?
Ans: Query is the object of Ms-Access used
to retrieve data from the table.
e) Write any two advantages of modular
programming.
Ans: Following are the advantages of modular programming.
i). Easy to write the program.
ii) Easy to find out bugs.
f) Mention any two basic data types in C
language.
Ans: Following are the basic data types in C
language.
i) char
ii) int
2. Write appropriate technical terms for the following. 2×1=2
a) Network of networks.
Ans: Internet
b) Computer program that protects the computer
from computer viruses.
Ans: Antivirus
3. Write the full form of the following. 2×1=2
a) POP:
Post Office Protocol
b) AI: Artificial Intelligence
Group B (24 Marks)
4. Answer the following questions. 9×2=18
a) What is a computer network? List any two
importance of it.
Ans: Interconnection of two or more than two
computers by using wire or wireless is known as a computer network.
Two importance of computer network are as
follows:
i) Hardware and software sharing.
ii) It is fast and cheap means of
communication.
b) What is computer ethics? Write down any
two ethics of it.
Ans: Computer ethics
are the moral values that stop you from doing anything that isn't legal and that
doesn't harm or damage anyone's work.
Following are the two
ethical points.
i) Do not use the computer to
steal other data.
ii) Do not use pirated
software
c) What is computer security? Write any two
hardware security measures.
Ans: Computer security principally is the protection of computer systems and information from detriment, theft, and
unauthorized use.
Following are the two
hardware security measures.
i) Power protection
ii) Insurance
d) Give two differences between e-commerce
and traditional commerce.
Ans: Following are the difference between
e-commerce and traditional commerce.
Traditional commerce |
E-commerce |
In traditional commerce buy goods and
services face to face, |
In e-commerce buy goods and services online
using digital devices laptops or Smartphones. |
Limited time for traditional commerce |
E-commerce can work 24 hours. |
We can inspect the product before buying. |
We are not able to inspect products before
buying. |
Cash, cheque, or card can be used for
payment |
A credit card, Debit card, or fund transfer is
used for payment |
e) Write any two symptoms of a computer virus.
Ans: Following are the symptoms of a computer virus.
i) Slow down the computer system.
ii) Unwanted messages or pictures can be shown
on the monitor.
iii) Size of secondary storage will reduce
automatically.
iv) Your file will be converted into a shortcut.
f) What is DBMS? Write any two examples.
Ans: DBMS is a computer program or software
which is used to manage data systematically.
Following are the two examples of DBMS:
i) Ms-Access
ii) Foxpro
g) What is a primary key? List any two
advantages of it.
Ans: A primary key is a special relational database table column designated to
uniquely identify each table record.
Following are the advantages of the primary key
i) Duplicate data prevented by the primary key.
ii) With the help of primary key relationships
can be created between tables.
h) What is data sorting? List any two
advantages of it.
Ans: The process of arranging the data in a
specific order.
Following are the advantages of sorting.
i) Easy to arrange the data in the table.
ii) Data can be read easily with the help of
sorting.
i) List the field name from the following
table structure.
Symbol no |
Name |
Marks |
00100200Q |
Mahesh Joshi |
85 |
00100201R |
Sujata Gurung |
91 |
Ans: The field names are:
Symbol no, Name, Marks
5. Write down the output of the given
program. Show with dry run table. 2
DECLARE SUB result(c$)
c$="COMPUTER"
CALL result(c$)
END
SUB result(c$)
FOR c=1 TO LEN(c$) STEP 2
m$=MID$(c$,c,1)
n$=n$+m$
NEXT c
PRINT n$
END SUB
Dry Run:
Variable C$ |
Check Loop |
Variable m$ |
Variable n$ |
Output |
COMPUTER |
1 to 8? Yes |
C |
C |
|
COMPUTER |
3 to 8? Yes |
M |
C+M=CM |
|
COMPUTER |
5 to 8? Yes |
U |
CM+U=CMU |
|
COMPUTER |
7 to 8? Yes |
E |
CMU+E |
|
COMPUTER |
9 to 8? No Exit from loop |
|
|
CMUE |
Final Output:
CMUE
6. Re-write the given program after correcting
bugs. 2
REM to display records from the existing file.
CLS
OPEN "empt.txt" FOR APPEND AS #1
WHILE NOT EOF(#1)
WRITE #1, en$, post$, salary
PRINT en$, post$, salary
CLOSE #1
END
Debugged Program:
REM to display records from the existing file.
CLS
OPEN "empt.txt" FOR INPUT AS #1
WHILE NOT EOF(1)
INPUT #1, en$,
post$, salary
PRINT en$, post$, salary
WEND
CLOSE #1
END
7. Study the following programs and answer the given questions. 2×1=2
DECLARE FUNCTION prod(a,b)
CLS
INPUT "Enter first number";a
INPUT "Enter second number";b
PRINT "The product of the two
number=";prod(a,b)
END
FUNCTION prod(a,b)
p=a*b
prod=p
END FUNCTION
a) List the numerical variables used in the
program.
Ans: A, B, and P are the numerical variables
used in the above program.
b) List the local variables used in the above
program.
Ans: P is the local variable used in the above
program.
Group C (16 Marks)
8. Convert/calculate as per the instruction. 4×1=4
i) (214)10 = (?)2
ii) (ABC)16 =(?)2
Hexadecimal number |
A |
B |
C |
Equivalent Binary Number |
1010 |
1011 |
1100 |
(ABC)16 =(101010111100)2
iii) (1011)2 × (101)2 +
(101)2
iv) (101110)2 ÷ (110)2
9. a) Write a program to calculate the area of a circle using the function procedure and use the SUB procedure to calculate its
circumference in QBASIC. [Hints: (A=Ï€r2) , (C=2Ï€r)]
DECLARE FUNCTION area(r)
DECLARE SUB cirm(r)
CLS
INPUT "Enter radius";r
PRINT area(r)
CALL cirm(r)
END
FUNCTION area(r)
area=3.14*r2
END FUNCTION
SUB cirm(r)
c=3.14*2*r
PRINT c
END SUB
b) Student name, class, section, and address
are stored in a data file called "student.dat". Write a program to
print all the records of students.
OPEN "student,dat" FOR INPUT AS #5
CLS
DO WHILE NOT EOF(5)
INPUT #5, name$,cl,s$,add$
PRINT name$,cl,s$,add$
LOOP
CLOSE #5
END
You may also Read:
CDC new question model of computer
10. Write a program in C language to input a
number and check whether the number is full divisible by 5 or not.
#include<stdio.h>
#include<conio.h>
main()
{
int num;
printf("Enter any number");
scanf("%d",&num);
if(num%5==0)
printf("Fully divisible by 5);
else
printf("Not fully divisible by 5);
getch();
}
OR
Write a program in C language to display the series 2,4,6,8 upto 10th term.
#include<stdio.h>
#include<conio.h>
main()
{
int
x,a=2;
for(x=1;x<=10;x++)
{
printf("%d\t",a);
a=a+2;
}
}
No comments:
Post a Comment