SEE Grade Promotion Exam 2079(2023)
Optional II (Computer Science)
Time:
1:30 Hrs
Full
Marks: 50
Group A (10 marks)
1. Answer the following questions in one sentence. 6×1=6
a) What is a web browser?
Ans: A web browser is a software application
that allows you to view websites on the internet.
b) Mention any two services provided by the Internet.
Ans: E-mail and e-commerce are two services provided by the Internet.
c) What is the maximum length of field name
in Ms-Access?
Ans: The maximum length of a field name in
Microsoft Access is 64 characters.
d) Which is the logical data type of Ms-Access?
Ans: The
logical data type in Microsoft Access is Yes/No.
e) Write any one advantage
of modular programming.
Ans: Modular programming
makes code easier to read, test, and maintain.
f) Mention any two basic
data types of C language.
Ans: Two basic data types of
C language are int and char
2. Write the appropriate technical term for the following: 2×1=2
a) Network of Network.
Ans: Internet
b) Computer program that
protects the computer from computer virus
Ans: Antivirus
3. Write full form of the following. 2×1=2
a) POP: Post Office Protocol
b) IoT: Internet of Things
Group "B"
4. Answer the following questions. 9×2=18
a) What is computer network?
List any two importance of it.
Ans: A computer network is a
collection of interconnected devices, such as computers and servers that can
communicate and share resources with each other.
Following are the
importance of computer network.
i) Computer networks allow
users to share resources, such as data, printers, and internet access.
ii) Computer networks can
help to improve security by providing a central location for data storage and
management.
b) What is computer ethics?
Write down any two ethics of it.
Ans: Computer ethics
refers to the moral principles and guidelines that govern the use of computers
and technology.
Two computer ethics are as
here under.
i) Computer users should
respect the privacy and property of others.
ii) Practicing respectful
behavior and responsible sharing on social media platforms to maintain a
positive online environment.
c) What is computer
security? Write any two hardware security measures.
Ans: Computer security
refers to the protection of computer systems and data from unauthorized access,
attacks, and damage.
Following are the two
hardware security measures.
i) Use power protection
devices.
ii) Use Biometric authentication.
d) Give two differences between e-commerce
and traditional commerce.
Ans: Following are the difference between
e-commerce and traditional commerce.
E-commerce |
Traditional
Commerce |
The buying and selling of goods and
services over the internet. |
The buying and selling of goods and
services in a physical store. |
Online communication, such as email, chat,
and social media are used |
Face-to-face communication. |
Payment methods like Credit cards, debit
cards, wire transfers, and online payment systems used. |
Payment methods like Cash, checks, credit
cards, and debit cards used. |
Available 24/7, anywhere in the world. |
Limited to the hours that the store is open
and the physical location of the store. |
e) Define artificial intelligence
(AI). Write any two uses of AI.
Ans: AI is the ability of machines to perform tasks that
are typically associated with human intelligence.
Following are the uses of AI.
i) AI is being used to develop new drugs
and treatments, diagnose diseases, and provide personalized care.
ii) AI technology empowers
self-driving cars to navigate and make decisions without human intervention.
f) Define DBMS with any
two examples.
Ans: A database management system (DBMS) is a
software system that allows users to create, access, and manage data in a
database.
Two examples of DBMS are:
i) Ms-Access
ii) Oracle
g) What is the report in Ms-Access? Mention
the importance of the report in the database.
Ans: A report is a object of MS
Access which presents data from a database in a formatted and organized way.
Following are the importance
of Ms-Access.
i) Reports help present data
in a more structured and readable format, making it easier for users to
understand and analyze information.
ii) Reports can include
charts, graphs, and visual elements that facilitate data analysis and
decision-making.
h) Define the primary key.
Write its features.
Ans: A primary key is a
unique and identifying field within a database table that serves as a unique
identifier for each record or row.
The following are the features of the primary key:
i) Identify each row in the table uniquely.
ii) Establish relationships between
tables.
i) List the field name and records used in
the following structure.
Symbol_no |
Name |
Marks |
001009010 |
Hari Thapa |
85 |
00100901Q |
Binu Sharma |
91 |
Ans:
Fields name: symbol_no, Name and Marks
Records: 001009010, Hari Thapa, 85 and 00100901Q,
Binu Sharma 91
5. Write down the output of the given program. Show in dry run table. (2)
DECLARE
SUB result(c$)
c$="COMPUTER"
CALL
result(c$)
END
SUB
result(c$)
FOR
c= 1 TO LEN(c$) STEP 2
m$=MID$(c$,c,1)
n$=n$+m$
NEXT
c
PRINT
n$
END
SUB
Dry
Run:
C$ |
Check
loop C=1
TO LEN(c$) STEP 2 |
Variable M$ |
Variable
N$ |
Output |
COMPUTER |
FOR
C= 1 TO 8 STEP 2 ? Yes
|
C |
N$=N$+C C |
|
|
FOR
C= 3 TO 8 STEP 2 ? Yes
|
M |
n$=C+M CM |
|
|
FOR
C= 5 TO 8 STEP 2 ? Yes
|
U |
N$=CM+U CMU |
|
|
FOR
C= 7 TO 8 STEP 2 ? Yes
|
E |
N$=CMU+U CMUE |
|
|
FOR
C=9 TO 8 STEP 2 ? No Exit
from loop
|
|
|
CMUE |
Final
Output:
CMUE
6. Rewrite the given program after correcting the bugs. (2)
REM
to display records from existing file.
OPEN
"emp.text" FOR APPEND AS #1
WHILE
NOT EOF(#1)
WRITE
#1, en$, post,salary$
PRINT
en$,post$,salary
NEXT
CLOSE
#1
END
Debugged
Program
REM to display records from existing file.
OPEN
"emp.txt" FOR APPEND AS #1
WHILE
NOT EOF(1)
INPUT
#1,
en$, post,salary$
PRINT
en$,post$,salary
WEND
CLOSE
#1
END
7. Study the following program and answer the given questions.(2)
DECLARE
FUNCTION prod (A,B)
CLS
INPUT
"Enter first number";a
INPUT
"Enter second number";b
PRINT
"The product of the two numbers=";prod(a,b)
END
FUNCTION
prod(a,b)
p=a*b
prod=p
END
FUNCTION
i)
List all the numerical variable used in the program above.
Ans:
A,B, and P are the numerical variables used in the above program.
ii)
List the local variable used in the above program.
Ans:
P is the local variable used in the above program.
8. Convert/Calculate as per the instruction. (4×1=4)
i)
(214)10 = (?)2
ii)
(ABC)16 =(?)2
iii)
(1011)2 × (101)2
iv)
(10101)2 divided by (11)2
9. Answer the following. (4×2=8)
a)
Write a program in QBASIC that asks length and breadth of a room and calculate
its area and perimeter. Create a user-define FUNCTION to calculate area and SUB
program to calculate perimeter. [Hint: A=L × B, P=(L+B)]
DECLARE
FUNCTION area(L,B)
DECLARE
SUB peri(L,B)
CLS
INPUT
"Enter length:";l
INPUT
"Enter breadth:";b
a=area(L,B)
PRINT
"Area of a room:";a
END
FUNCTION
area(L,B)
area=l*b
END
FUNCTION
SUB
area(L,B)
p=2*(l+b)
PRINT
"Perimeter of rectangle:";p
END
SUB
b)
Student name, class, section and address are stored in a data file called
"student.dat". Write a program to print all the records of students.
OPEN
"student.dat" FOR INPUT AS #1
CLS
DO
WHILE NOT EOF(1)
INPUT
#1, n$,c,s$,a$
PRINT
n$,c,s$,a$
LOOP
CLOSE
#1
END
10. Write a C program to find average of any two numbers. (4)
Ans:
#include<stdio.h>
int
main()
{
int a,b;
float av;
printf("Enter first
number\n");
scanf("%d",&a);
printf("Enter second
number\n");
scanf("%d",&b);
av=(a+b)/2;
printf("Average of two
numbers:%f",av);
return 0;
}
OR
Write
a program in C language to display the series 2, 4, 6, 8 upto 10th term.
#include<stdio.h>
int
main()
{
int x,a=2;
for(x=1;x<=10;x++)
{
printf("%d\t",a);
a=a+2;
}
return 0;
}
No comments:
Post a Comment