Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Saturday, February 18, 2023

see model question 2079 computer with answers

see model question 2079 computer with answers

see model question 2079 computer with answers


Class: -10

    Full Marks: 50

Sub: Computer Science

Time: 1:3hrs                                                       


Candidates are required to answer in their own words as far as practicable. Credit will be given to originality, not rote learning.

Attempt ALL the questions.

 

Group –A [10×1=10]


 [Very Short Answer Question: 10×1=10]

 

1. Answer the following questions in one sentence:  (6×1=6)

a) List any two examples of bounded communication media.

Ans: Following are the two examples of bounded communication media/

i) Twisted pair cable.

ii) Optical fiber cable.

 

b) What is cloud computing?

Ans: Cloud computing is the on-demand delivery of computing services over the internet, providing users with access to a wide range of resources without requiring them to own or manage the underlying infrastructure.

 

c) Which view is used to modify a table in Ms-Access?

Ans: Design view is used to modify a table in Ms-Access.

 

d) Which data type of Ms-Access is known as logical data type?

Ans: Yes/No is logical data type in Ms-Access.

 

e) What is module?

Ans: In QBasic, a module is a self-contained program unit that can be used to organize and modularize code, making it easier to manage, reuse, and maintain.

 

f) What is 'C' language?

Ans: C is a high-level programming language used for system programming, embedded systems, and application development, known for its efficiency, simplicity, and low-level access to computer memory.

 

 

2. Write appropriate technical term for the following:      (2×1=2)

a) The fake attempt to obtain sensitive information such as username, password by disguising oneself as a trustworthy entity.

Ans: Phising

 

b) The technology to encode files or messages.

Ans: Encryption

 

3.  Write the full forms of the following:     (2×1=2)

a. HTTPS : Hyper Text Transfer Protocol Secure

b. EDI: Electronic Data Interchange

 

Group- B [Short Answer Question: 12×2=24]

 

4. Answer the following questions:  (9×2=18)

a) What is server computer? List different types of servers.

Ans: A server computer is a type of computer system that provides various services or resources to other computers or devices over a network.

Following are the different types of servers.

i) Print server

ii) Database server

iii) Communication server

iv) Web server

 

b) Define cyber bullying. List any two examples of cyber bullying.

Ans: Cyberbullying is the use of technology to harass, intimidate, or harm another person repeatedly and intentionally.

Following are the two examples of cyberbullying.

i) Sending hurtful or threatening messages via email, social media, or text message.

ii) Posting humiliating or embarrassing photos or videos of someone online without their permission, or altering and sharing their images in a negative way.

 

c) What is hardware security? List any two measures to protect the computer Hardware.

Ans: Hardware security refers to the protection of physical computer equipment and peripherals from unauthorized access, theft, tampering, or damage.

Two measures to protect the computer hardware include:

i) Insurance

ii) Regular maintenance

 

d) List any two benefits and limitations of e-commerce.

Ans: Benefits of e-commerce:

i) Global Reach: E-commerce enables businesses to reach customers anywhere in the world, overcoming geographic limitations.

ii) Convenience: Customers can shop from the comfort of their own home or office, at any time of the day or night.

Limitations of e-commerce:

i) Lack of physical presence: Some customers prefer to see and touch products before purchasing, which is not possible with e-commerce.

ii) Security concerns: Online shopping requires customers to share personal and financial information, which can put them at risk of identity theft or fraud.

 

 

e) What is virtual Reality? List any two-application area of its.

Ans: Virtual Reality (VR) is a computer-generated simulation of a three-dimensional environment that can be interacted with using specialized electronic devices, such as a headset with a screen or gloves with sensors.

Two application areas of VR are:

i) Gaming and Entertainment

ii) Education and Training

 

f) What is database? Write any two advantages of DBMS.

Ans: A database is a structured collection of data that is organized in a way that allows for efficient storage, retrieval, and manipulation of information.

Two advantages of DBMS are:

i) Improved data sharing and accessibility.

ii) Improved data security

 

g) What is primary key? Write any two uses of it.

Ans: In a database, a primary key is a unique identifier that is assigned to each record in a table.

Some of the key uses of a primary key are:

i) A primary key can be used to retrieve specific records from a table quickly and efficiently.

ii) A primary key can also be used to establish relationships between tables.

 

h) What is Query? Give any two examples of action query.

Ans: In a database, a query is a request for specific information from one or more tables or data sources. A query is used to extract, filter, and manipulate data in a database based on certain criteria or conditions.

Following are the examples of action query.

i) Delete query

ii) Append query

 

i) Define Data type? List any two data types used in Ms-Access.

Ans: In a database, a data type defines the type of data that can be stored in a field or column of a table.

Following are the two data types used in Ms-Access.

i) Text

ii) Number

 

5. Write down the output of the given program. Show with dry run in table.    (2)

 

DECLARE SUB result(n$)

          CLS

          n$ = "INFORMATIONS"

          CALL result(n$)

          END

 

          SUB result (n$)

           b = LEN(n$)

           c = 1

          WHILE c <= b

          x$ = x$ + MID$(n$, c, 1)

           c = c + 2

           WEND

           PRINT x$

          END SUB

 

Dry Run


Final Output:

        IFRAIN


6. Re-write the given program after correcting the bugs:   (2)

REM to display records saving salary above 10000

OPEN “record.dat” FOR APPEND AS #2

DO WHILE EOF (2)

INPUT #2, n$, ad$, s, t

IF s<10000 THEN

DISPLAY n$, ad$, s, t

END IF

LOOP

CLOSE #2

END

 

Debugged program

REM to display records saving salary above 10000

OPEN “record.dat” FOR INPUT AS #2

DO WHILE NOT EOF (2)

INPUT #2, n$, ad$, s, t

IF s>10000 THEN

PRINT n$, ad$, s, t

END IF

LOOP

CLOSE #2

END

 

7. Study the following program and answer the given questions: (2×1=2)

DECLARE FUNCTION num(n)

CLS

INPUT no

s = num(no)

PRINT s

END

 

FUNCTION num (n)

x = INT (17 / n)

y = 15 MOD n

num = x * y

END FUNCTION

a. List the arguments and parameter used in above program.

Ans:     Parameter: n

            Arguments: no

b. Write the mathematical function used in above program.

Ans:     INT

 

 

Group –C [Long Answer Questions 4×4=16]

 

8. Convert / Calculate as per the instruction:         

a) Convert the following as instructed. (2×1=2)

i) (28C)16into Binary Number

Hexadecimal number:                         2          8          C

Equivalent Binary number                  0010    1000    1100

Therefore, the binary equivalent of (28C)16 is 001010001100.

  

ii) (546)10 into Octal Number

Dividend (quotient)

Divisor

Remainder

546

8

68

8

2

8

8

4

1

8

0

0

8

1

 

(546)10 = (1042)8

 

b) Perform the following binary calculations.                    (2×1=2)

i) (1101011)2 ÷ (101)2


Dividend=1101011

Divisor= 101

Quotient=10101

Reminder=10


ii) (101011-1110)2 ×(101)2

 =1101001


(101011-1110)2 ×(101)2=1101001


9. Write a program in QBASIC that allows user to enter radius of a circle. Create a user defined function to find area of circle and sub procedure to find volume of a cylinder. Hint: [A=Ï€r2, V=Ï€r2h]  4

Ans:

DECLARE FUNCTION area (r)

DECLARE SUB vol (r, h)

CLS

INPUT "Enter radius and height"; r, h

PRINT area(r)

CALL vol(r, h)

END

 

FUNCTION area (r)

area = 3.14 * r ^ 2

END FUNCTION

 

SUB vol (r, h)

v = 3.14 * r ^ 2 * h

PRINT "Volume"; v

END SUB

 

10. Write a QBASIC program to open a data file named “STUDENT.DAT” and add some data on it. Fields of the data file are “Name”, “Address”, “Telephone”. 4

Ans:

OPEN "STUDENT.DAT" FOR APPEND AS #1

top:

INPUT "Enter name";n$

INPUT "Enter Address";a$

INPUT "Telephone";t$

WRITE #1, n$,a$,t$

INPUT "Do you want to add more records";ch$

IF ch$="Y" or ch$ ="y" THEN GOTO top

CLOSE #1

END

 

11. Write a program in ‘C’ language to test whether input number is perfectly divisible by 5 and 7.   [4 ]

Ans:

#include <stdio.h>

 int main() {

    int num;

    printf("Enter a number: ");

    scanf("%d", &num);

    if (num % 5 == 0 && num % 7 == 0)

         {

        printf("%d is perfectly divisible by 5 and 7.\n", num);

    }

         else

{

        printf("%d is not perfectly divisible by 5 and 7.\n", num);

    }

 

    return 0;

}

OR

Write a program in ‘C’ Language to display first ten even numbers and their sum.

Ans:

#include <stdio.h>

int main() {

    int sum = 0;

    for (int i = 2; i <= 20; i += 2)

{

        printf("%d ", i);

        sum =sum+i;

    }

    printf("\nSum of the first ten even numbers is: %d\n", sum);

    return 0;

}

 

For more questions model Click

No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages