Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Thursday, March 9, 2023

SEE Computer Science New Model Questions 2079(2023) With Answer

 SEE Computer Science New Model Questions 2079(2023) With Answer

 
SEE Computer Science New Model Questions 2079(2023) With Answer


Introduction:

The Secondary Education Examination (SEE) is a crucial exam for students in Nepal. It is a gateway to higher education and a bright future. Every year, the National Examination Board (NEB) releases new model questions for SEE students to prepare for the exam. In this article, we will discuss the SEE Computer Science New Model Question 2079 (2023) and provide answers to help students prepare for the exam.

Class: -10

Full Marks: 50

Sub: Computer Science

Time: :3hrs                                                       

 


Candidates are required to answer in their own words as far as practicable. Credit will be given to originality, not rote learning.
 
Group “A”
(Very Short Questions 10 Marks)

1) Answer the following questions.

a) Define bandwidth.
Ans: Bandwidth refers to the range of frequencies or data transfer rates that a communication channel or system can handle.

b) What is digital citizenship?
Ans: Digital citizenship refers to the responsible use of technology, online communication, and social media, with an emphasis on creating a safe and respectful online community.

c) Name any two mode of electronic payment.
Ans: Following are the two modes of electronic payment.
i) E-wallet
ii) Debit card

d) Define relationship.
Ans: Relationship is the association between two or more tables that are linked based on a common field, allowing for the efficient organization and retrieval of data.

e) What do you mean by modular programming?
Ans: Modular programming is a software design technique that emphasizes breaking down a program into independent, self-contained modules that can be developed and tested separately, and then combined to create the final program.

f) Write any two data types used in C language.
Ans: Following are the two data types of C language.
i) char
ii) int

2) Give the appropriate technical terms of the following.

a) Hacking done with permission from the client.
Ans: Ethical hacking

b) The process of identifying an individual usually based on a username and password.
Ans: Authentication

3) Write the full forms for the following.
a) SMTP: Simple Mail Transfer Protocol
b) VRML: Virtual Reality Modeling Language.
 
Group “B”
(Short Questions – 24)

4) Answer the following questions.

a) Define data communication. Write its components.
Ans: Data communication refers to the process of transmitting digital data between two or more devices or systems through a communication channel or medium.
The components of data communication include:
i) Sender
ii) Receiver
iii) Medium
iv) Protocol

b) Write any two opportunities and threats in social media.
Ans: Following are the opportunities and threats of social media.
Opportunities:
i) Social media allows businesses to engage with customers directly, providing an opportunity to build brand awareness, increase customer loyalty, and gather valuable feedback and insights.
ii) Social media enables individuals and organizations to share information and ideas quickly and easily with a large audience, helping to spread important messages and spark social change.
Threats:
i) Social media can be a breeding ground for cyberbullying, harassment, and hate speech, which can have a negative impact on mental health and well-being.
ii) The spread of misinformation and fake news on social media can cause harm to individuals, organizations, and even society as a whole, leading to confusion, mistrust, and social unrest.
 
c) What is software security? List any two security mechanism of computer hardware security.
Ans: Software security refers to the measures taken to protect software and data from unauthorized access, use, disclosure, modification, or destruction.
Following are the two hardware security measures.
i) Protection from fire
ii) Insurance

d) Define M-Commerce. Write any four examples of M-Commerce.
Ans: M-Commerce, or mobile commerce, refers to the buying and selling of goods and services using mobile devices such as smartphones or tablets.
Four examples of M-commerce are as here under.
i) Mobile banking
ii) Mobile ticketing
iii) Mobile payment
iv) Mobile shopping

e) What do you mean by IoT? List any two advantages.
Ans: IoT, or Internet of Things, refers to the network of physical devices, vehicles, home appliances, and other items that are embedded with sensors, software, and connectivity, allowing them to exchange data and connect to the internet.
Following are the two advantages of IoT.
i) Increased efficiency and productivity.
ii) Improved safety and security

f) What is DBMS? Write any two advantages of DBMS.
Ans: DBMS, or Database Management System, is software that manages the storage, retrieval, and updating of data in a database.
Following are the two advantages of DBMS.
i) DBMS can reduce data redundancy and improve data consistency by storing data in a centralized and normalized format.
ii) DBMS can provide mechanisms for data backup and recovery in case of disasters or failures.

g) Define term validation rule and validation text.
Ans: Validation rule: validation rule is a rule or condition that is applied to a field or record in order to ensure that the data entered into the database meets certain requirements or criteria.
Validation text: Validation text is the message that is displayed to the user when a validation rule is violated.

h) Differentiate between select query and update query.
Ans: Differentiate between select query and update query are as follows.

Select query

Update query

Retrieves data from one or more tables and displays it in a result set.

Updates existing data in one or more tables.

Returns a read-only result set that displays the data matching the specified criteria

Modifies the existing data in the database according to the specified criteria.

SELECT queries do not modify the data in the database.

UPDATE queries are used to modify data in the database, typically to reflect changes in the real world.

One or more tables are involved.

Only one table is involved.

 
i) Define data types. List any four names of of Ms-Access data types.
Ans: data type refers to the characteristic of a field that determines what type of data can be stored in the field
Following are the four data types of Ms-Access.
i) Text
ii) Memor
iii) Date/Time
iv) OLE
 
5) find the output of the form along with dry run.  2
DECLARE SUB series ()
CLS
CALL series
END
 
SUB series
a$ = "NEPAL"
b = 1
FOR I = 1 TO LEN(a$) STEP 2
IF b <> 3 THEN
PRINT MID$(a$, b, I)
ELSE
PRINT MID$(a$, 1, I)
END IF
b = b + 1
NEXT I
END SUB

Dry Run

Variable a$

Variable b

Check loop

I = 1 to 5 STEP 2

Check condition

 

Result/output

NEPAL

1

1 to 5 ? yes

IS 1<>3 Yes

N

NEPAL

2

3 to 5? Yes

IS 2<>3 Yes

EPA

NEPAL

3

5 to 5? Yes

IS 3<>3 NO

NEPAL

NEPAL

4

7 to 5? No

Exit from loop

 

 

 
Final Output:

N
EPA
NEPAL
 
6. Re-write the following program with correcting the bugs.  2
DECLARE FUNCTION vowel(s$)
W$=we love our country
V=vowel(w$)
PRINT “The total no of vowel:”;v
END
 
FUNCTION vowel$(s$)
C=0
FOR k= 1 to length(s$)
B$=MID$(s$,k,1)
B$=LCASE$(b$)
SELECT CASE b$
CASE “a”, “e”,”I”,”o”,”u”
C=c+1
END SELECT
NEXT k
C=vowel
END FUNCTION
 
Debugged program
DECLARE FUNCTION vowel(s$)
W$=”we love our country”
V=vowel(w$)
PRINT “The total no of vowel:”;v
END
 
FUNCTION vowel(s$)
C=0
FOR k= 1 to LEN(s$)
B$=MID$(s$,k,1)
B$=LCASE$(b$)
SELECT CASE b$
CASE “a”, “e”,”I”,”o”,”u”
C=c+1
END SELECT
NEXT k
Vowel=c
END FUNCTION
 
7. Analyze the following program and answer the given questions: [2]
OPEN “MARKINFO.TXT” FOR INPUT AS #1
OPEN “TEMP.TXT” FOR OUTPUT AS #2
CLS
DO UNTIL EOF(1)
INPUT #1, registrationnumber, studentsname$,English,nepali,mathematics
IF mathematics<20 THEN
Mathematics=mathematics+10
ENDIF
WRITE#1, registrationnumber, studentsname$,English,nepali,mathematics
LOOP
CLOSE #1
CLOSE #2
KILL “MARKINFO.TXT”
NAME “TEMP.TXT” AS “MARKINFO.TXT”
END

a) What is the main objective of the program given above?
Ans: The main objective of the program is to read a file named "MARKINFO.TXT", modify the marks of the students in the Mathematics subject by adding 10 to it if it is less than 20, and write the modified data to a temporary file named "TEMP.TXT". Then it deletes the original file "MARKINFO.TXT" and renames the temporary file as "MARKINFO.TXT".

b) Do you get any problem in the above program if the “KILL” statement is removed. Give reason.
Ans: Yes, if the "KILL" statement is removed from the program, it will result in an error. This is because the "KILL" statement is used to delete the original file "MARKINFO.TXT" before renaming the temporary file as "MARKINFO.TXT". If the "KILL" statement is not used, the program will not be able to delete the original file and the renaming process will fail, resulting in an error.

8) Calculate/Convert as per the instructions:    4

a) (101010)2 ×(101011)2 – (100101)2
 


b)(1001011)2÷(10101)2



 
c) 
(DEF42)16 =(?)8

Hexadecimal number:             D         E          F          4          2
4 bit of Binary equivalent:      1101 1110 1111  0100  0010
Group of 3 bit of binary digit: 011 011 110  111  101  000  010
Equivalent Octal no:               3     3       6      7     5     0          2

(DEF42)16 =(3367502)8
 
d) (986)10=(?)2

(986)10=(?)2

9.a) Write a QBASIC program that ask length, breadth, height and calculate volume of cuboid and total surface area. Create a user defined function to calculate volume of cuboid and sub program to calculate total surface of area.    4
Ans:
DECLARE FUNCTION volume (l, b, h)
DECLARE SUB tsa (l, b, h)
CLS
INPUT "Enter length, breadth and height"; l, b, h
v = volume(l, b, h)
PRINT "Volume of cuboid: "; v
CALL tsa(l, b, h)
END
 
SUB tsa (l, b, h)
a = 2 * (l * b + b * h + l * h)
PRINT "Total surface area of cuboid: "; a
END SUB
 
FUNCTION volume (l, b, h)
volume = l * b * h
END FUNCTION
 
b) A sequential data file “records.dat” contains s.no, name, address, telephone no and email address. Write a program to count and display those records whose email address ends in “yahoo.com” domain. Your display should be in tabular format having the fields name, address and email address only.    4
OPEN “records.dat” FOR INPUT AS #1
CLS
DO WHILE NOT EOF(1)
INPUT #1, sno, name$, add$, tel, email$
IF LCASE$(RIGHT$(email$,9))=”yahoo.com” THEN PRINT name$,add$,email$
T=t+1
LOOP
PRINT “Total no of people having Yahoo.com email address are: “;t
CLOSE #1
END
 
10) Write a program in C language that asks a number check whether number is positive negative or zero.    4
#include <stdio.h>
int main()
{
    int num;
        printf("Enter a number: ");
    scanf("%d", &num);
   
    if (num > 0)
 {
        printf("%d is positive\n", num);
    }
    else if (num < 0)
{
        printf("%d is negative\n", num);
    }
    else
{
        printf("The number is zero\n");
    }
        return 0;
}

Or

Write a program in C language to display the series with their sum 7  10  13  16  …….upt 10th term.
#include <stdio.h>
int main() {
int i, sum = 0, num = 7;
printf("The series is: ");
for (i = 1; i <= 10; i++)
{
printf("%d ", num);
sum =sum+num;
num =num+3;
}
printf("\nThe sum of the series is: %d", sum);
return 0;
}
 

Conclusion:

In conclusion, the SEE Computer Science New Model Question 2079 (2023) is designed to test the knowledge and understanding of students in various areas of Computer Science. These questions cover a wide range of the SEE Syllabus. By practicing these questions, students can improve their understanding of Computer Science and increase their chances of performing well in the SEE exam. It is important for students to study and practice these questions thoroughly to achieve success in the exam and pave the way for a bright future in the field of Computer Science.

Also Read:

 

No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages