Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Sunday, March 17, 2024

230 Essential Very Short Q&As in Computer Science for SEE and 10th Grade Students

230 Essential Very Short Q&As in Computer Science for SEE and 10th Grade Students

230 Essential Very Short Q&As in Computer Science for SEE and 10th Grade Students


Group "A"

1. Answer the following questions in one sentence.  6×1=6

Networking and Telecommunication

1)      What is Communication?

Ans:  Communication is the exchange of information, ideas, or thoughts between individuals or groups using various methods such as speech, writing, gestures, or technology.

2)      What do you mean by Data Communication?

Ans:  Data communication refers to the process of transmitting and receiving data or information between two or more devices or systems. Example: E-mail, Internet, E-fax etc..

 

3)      What is Communication media?

Ans:  A communication media is a channel through which data or signal can be transmitted from one point to another.

 

4)      What is computer Network? (SLC supp. 2068, 2069, SEE 2074)

Ans:  A computer network is a logical or physical interconnection between two or more computers such that they could communicate with each other.

 

5)      What is data transmission mode?

Ans:  Data transmission mode refers to the direction of information flow between two communication devices via a communication channel.

 

6)      What do you mean by Networking architecture/model?

Ans:  It is a physical and logical design of the software, hardware, protocols, and media of the transmission of data.

 

7)      Define network topology.

Ans:  Network topology refers to the physical or logical layout of a network.

 

8)      What is a modem?

Ans:  It is a device that converts analog data to digital and vice versa.

 

9)      What is Network Protocol (SEE 2079)

Ans:  Protocols are commonly agreed rules followed for interconnection and communication between computers in a network.

 

10)    What is a communication channel?    (SLCSupp.2070)

Ans:  A communication channel is a medium through which messages are transmitted from one person to another. Some examples of communication channels include face-to-face conversation, email, phone calls, text messages, social media

 

 11)    What is Bandwidth?  (SLC–2066(Supplementary))

Ans:  Bandwidth is the maximum rate of data transfer across a given path. It is measured in bits per second (bps), kilobits per second (kbps), megabits per second (Mbps), or gigabits per second (Gbps).

 

12)    What is Modulation?

Ans:  Modulation is the process of modifying a carrier signal by varying one or more of its properties, such as amplitude, frequency, or phase, to carry information.

 

13)    What is internet?

Ans:  The Internet is a global network of billions of computers and other electronic devices.

 14)    Define intranet.

Ans:  An intranet is a private network that can only be accessed by authorized users.

 

15)    What is extranet?

Ans:  Extranet is a local network accessible to specific outside users or businesses, but still inaccessible to the general public.

 

16)    Define guided communication media.

Ans:  Guided media are cable line through which data flow in a specified path.

 

17)    What is un-guided communication media?

Ans:  Unguided communication media are the data signal flow through the air.

 

18)    Define  Network Operating System (NOS)

Ans:  NOS is the software that allows multiple computers to communicate, share files and hardware devices with one another. 

 

19)    Who is Network Administrator?

Ans:  A network administrator is a person who implements, manages and troubleshoots a organizations networks.

 

20)    What is telent?

Ans: A program that allows the user to log into a remote computer on the internet as a user on that system is called telnet.

 

21)    Define Data.

Ans: A raw fact about anything which does not give any complete meaning is called data.

 

22)    What is Information?

Ans: The processed data which gives some or complete meaning is called information.

 

23)       What is search engine? (Specification Grid 2077)

Ans:     A search engine is a computer program or software that helps people to search the information they are looking for online by phrases or keywords. Examples: Bing, Google etc.

 

24)    Write the name of any two search engines. (SEE 2078)

Ans:  Two search engines are: i) Google ii) Bing

 

25)       What is a web browser? (SEE Grade Promotion Exam 2078)

Ans: A web browser is an application program that is used to view the information of documents or web pages.

 

26)    What is simplex mode?

Ans   Simplex mode is the transmission of data and information that takes place in only one direction.

          Examples: Radio, Newspaper, Television, etc.

 

27) Define Duplex mode.

Ans: Duplex mode of data transmission in which data and information flow in both directions.

 

28) Write example of Half duplex and full duplex.

Ans:  Half duplex: Walky-talky and wireless handset          

          Full duplex: Mobile and landline phones.

 

29)    Write the components of data communication.

Ans:  i) Data  ii) sender  iii) medium   iv) receiver and v) protocol are the components of data communication.

 

30)    What is connector?

Ans:  Connector is a device that facilitates the connection of computers and other devices to a network.

 

31)    List the different connectors used in computer network.

Ans:  BNC used with coaxial cable, RJ 45 is used with UTP cable, and ST used with fiber optic cable.

 

32)    What is switch in computer network?

Ans:  Switch is a network connectivity device which joins multiple computer together to share information among them.

 

33)    Define Bridge in computer network.

Ans:  Bridge is a network connectivity device that interconnects two computer networks having similar protocol.

 

34)    What is router?

Ans: Router is a network connectivity device that joins multiple wired or wireless network together.

 

35) What is repeater?

Ans:  Repeater is a network connectivity device that accepts weak signals and regenerates them and after that sends the message on their way.

 

36)    What is device driver?

Ans:  Device driver is a program that controls the functionality of the hardware device.

 

37)    Define server.

Ans:  A server is the main computer in network that provides services, data and other resources to the other computer in network.

 

38)    Define workstation.

Ans:  A computer on a network that uses resources of the network is called workstation.

 

39)    What is node?

Ans:  Computer or devices of network is called node.

 

40)    What is ISP?

Ans: An Internet Service Provider(ISP) is an organization that provides services for accessing and using the internet.

 

41)    What is e-mail?

Ans:  E-mail (Electronic mail) is one of the most popular service provided by the internet sends and receives messages electronically through the internet.

 

42)    What is FTP?

Ans:  File Transfer Protocol(FTP) helps to transfer (download or upload) files from one computer to another computer.

 

43)    What is uploading?

Ans: Uploading refers to copying files or document, programs or data from user's computer to the internet server.

 

44)    Define downloading.

Ans: Downloading refers to the copying files or document or program or data from the internet server to the users computer.

 

Ethical and Social Issues in ICT           

45)    What is ICT?

Ans:  ICT refers to technologies that provide access to information through telecommunications.

 

46)    Define ethics.

Ans:  Ethics are moral standards that helps guide behaviors, actions and choices.

 

47)    What do you mean by computer ethics?

Ans:  Computer ethics is set of moral principles that regulate the use of computers.

 

48)    Who is hacker?

Ans:  A Hacker is a person who finds and exploits the weakness in computer systems and/or networks to gain access.

 

49)    What is cracker?

Ans:  A cracker is an individual who can decipher codes and passwords being able to break security systems for illegal reasons.

 

50)    What do you mean by cybercrime?

Ans:  Cybercrime is criminal activity done using computers and the Internet.

 

51)    What do you mean by cyber bullying?

Ans: It is the use of digital-communication tools (such as the Internet and cell phones) to make another person feel angry, sad, or scared, usually again and again.

 

52)    Define digital footprint.

Ans:  A digital footprint is a trail of data you create while using the Internet.

 

53)    What is the vision of IT Policy 2072?

Ans:  To transform Nepal into an information and knowledge-based society and economy.

 

54)    Who is the chairperson of National Information and Communication Technology Policy?

Ans:  Hon. Minister, Ministry of Information and Communication Technology.

 

55)    What is electronic transaction?

Ans:  Transactions of electronic records, data by using any types of electronic means.

 

56)    Define Social media. (SEE 2078)

Ans:  Social media is a collection of Internet-based communities that allow users to interact with each other online.

 

57)    When was the first time IT policy introduced in Nepal?

Ans:  In 2057 BS first time IT policy was introduced in Nepal.

 

58)    What is digital citizenship?

Ans:  Digital citizenship refers to the responsible use of technology by anyone who uses computers, the Internet, and digital devices to engage with society on any level. 

 

59)    When was electronic transaction act was commenced?

Ans:  Electronic Transaction Act  shall be deemed to have been commenced from 24 Bhadra 2063 ( Sep.2, 2006).

 

60)    What do you mean by digital divide?

Ans: Gap between rich and poor in terms of information technology is called digital divide.

 

61)    List any two examples of digital citizenship.

Ans:  Following are the examples of digital citizenship.

          i) Communicating with respect.

          ii) Supporting others by offering useful feedback.

 

62)    What is cyber bullying?

Ans:  Cyber bullying is a kind of harassment using mobiles or computers.

 

63)    What is cyber law?

Ans:  The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data processing and transaction is called cyber law.

 

64)    What is digital signature?

Ans:  Digital signature is a security mechanism system used on the internet for data and information transaction by attaching a code at the end of the electronic message that attests the authenticity of send message.

 

65)    What is encryption?

Ans:  Encryption is a way to protect data by making it unreadable to unauthorized users.

 

66)    What is decryption?

Ans:  Decryption is the process of converting encrypted data back to its original form.

 

67)    What is software piracy?

Ans:  Software piracy is the illegal copying, distribution, or use of software.

 

68)    What is cyberspace?

Ans:  Cyberspace is a global computer network where information can be shared and accessed.

 

Computer Security

69)    What is computer security?

Ans:  Computer security basically is the protection of computer systems and information from harm, theft, and unauthorized use.

 

70)    Define information security?

Ans:  Information security is a set of practices intended to keep data secure from unauthorized access or alterations.

 

71)    What do you mean by hardware security?

Ans:  The process the protecting the physical parts of the computer is known as hardware security.

 

72)    What are security mechanisms?

Ans:  Security mechanisms are technical tools and techniques that are used to implement security services.

 

73)    What is Biometrics?

Ans:  Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

 

74)    Define Encryption.

Ans:  Encryption is the process of converting data to an unrecognizable or "encrypted" form.

 

75)    What is Decryption?

Ans:  Decryption is the process of transforming data that has been rendered unreadable through encryption back to its unencrypted form.

 

76)    What is antivirus software?

Ans:  The software which scan and eliminate the computer virus is known as antivirus software.

 

77)    What do you mean by backup?

Ans:  A backup is a copy of one or more files created as an alternate in case the original data is lost or becomes unusable

 

78)    What is cryptography?

Ans:  Cryptography is a method of protecting information and communications through the use of codes.

 

79)    Define password.

Ans:  A password is a string of characters used to verify the identity of a user during the authentication process.

 

80)    What is malicious code?

Ans:  Malicious code is the term used to describe any code in any part of a software system or script that is intended to cause undesired effects, security breaches or damage to a system.

 

81)    Define computer virus.

Ans:  A computer virus is malicious software which self-replicates and attaches itself to other files/programs.

 

82)    How passwords secure the data? (SEE 2075 Regular)

Ans:  Password secures the data by giving access to the authorized person only.

 

83)    What is malware?

Ans:  Malware is a kind of harmful computer code or web script that is planned to cause undesired effects to damage a system.

 

84)    What is authentication system?

Ans: Authentication is the process of verifying the identity of a person or device.

 

85)    What is firewall?

Ans:  A firewall is the network security systems that monitors and controls the traffic flow between the internet and private network or private computers the basis of a set of user defined rules.

 

86)    Define cryptography.

Ans:  Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents.

 

19)    What is computer virus?

Ans:  Computer virus is a type of computer programs which is written by the programmer with the intent of destroying or damaging the data and program residing in the computer.

 

87)    Give any two examples of power protection device.

Ans:  UPS, Volt guard, spike guard are the examples of power protection device.

 

88)    Why power protection device needed?

Ans:  To protect computer system from damage, expensive data loss and unnecessary down time.

 

89)    What is UPS?

Ans:  UPS is a battery supported power protection device which controls the electric voltage and supplies clean and continuous power to the computer system even during power failures.

 

E-Commerce

90)    What is e-commerce? (SEE 2079)

Ans:  Buying and selling goods and services using internet is known as e-commerce.

 

91)    What do you mean by Business to Consumer (B2C)?

Ans:  B2C are transactions that sell directly to final users.

 

92)    What is Consumer to Government (C2G)?

Ans:  C2G transactions occur when individual people pay the government.

 

93)    Give any two examples of B2C.

Ans:  Daraz and  Amazon are two examples of B2C.

 

94)    What is M-Commerce?

Ans:  Mobile commerce refers to business or purchases conducted over mobile devices like cellphones or tablets.

 

95)    What do you mean by online payment?

Ans:  An online payment system is a way of making transactions or paying for goods and services through an electronic medium and internet, without the use of checks or cash.

 

96)    Write any two payments of credit payment system.

Ans   Credit card and e-wallet are the examples of credit payment system.

 

97)    What is biometric payment?

Ans:  Biometric payment is a point of sale (POS) technology that uses biometric authentication to identify the user and authorize the deduction of funds from a bank account.

 

98)    Define smart card.

Ans:  A plastic card with a microprocessor that can be loaded with funds to make transactions; also known as a chip card.

 

99)    What is Electronic Fund Transfer (EFT)?

Ans:  EFT is an electronic system used to transfer money from one bank account to another without         any cash exchange by hand.

 

100)     What is the business done through the internet? (Specification Grid 2077)

Ans:   E-commerce is the business done through the internet.

 

101) Write the examples of e-payment or online payment service in Nepal.

Ans:  Khalti, Esewa, IME pay,  ePay, Pay Way, iPay etc. are the services of online payment in Nepal.

 

Contemporary Technology

102)  What do you mean by Contemporary Technology?

Ans:  Modern or emerging technology available in the world in known as contemporary technology.

 

103)  What is cloud computing?

Ans:  Cloud computing is the delivery of computing services including servers, storage, databases, networking, software, analytics, and intelligence over the Internet.

 

104)  What is Artificial Intelligence (AI)?

Ans:  A branch of computer science dealing with the simulation of intelligent behavior in computers.

 

105)  Define Virtual Reality.

Ans:  An artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment.

 

106)  What is E-Governance?

Ans:  Electronic Governance  is the integration of Information and Communication Technology (ICT) in all the processes, with the aim of enhancing government ability to address the needs of the general public.

 

107)   What do you mean by mobile computing?

Ans:  Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.

 

108)  What do you mean by Internet of Things (IoT)?

Ans:  The internet of things (IoT) is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices.

 

109)  Define e-learning.

Ans:  E-learning, also referred to as online learning or electronic learning, is the acquisition of knowledge which takes place through electronic technologies and media.

 

 110)  What is virtual reality?

Ans:  An artificial environment created with computer hardware and software and presented to the user in such a way that it appears and feels like a real environment.

 

111)  What is internet banking?

Ans:  A facility offered by banks and financial institutions that allow customers to use banking services over the internet.

 

112)  What is cloud computing?

Ans:  Cloud computing is the practice of accessing and using remote computing resources, such as servers, storage, and software applications, over the internet.

 

113)  What is mobile banking?

Ans:  Mobile banking is the act of making financial transactions on a mobile device (smart phones, tablet) and internet.

 

DBMS

114) Define Data (SEE 2073)
Ans: Data is the collection of facts.

115) What is information? (SLC 2070)
Ans: Information is organized or classified data, which has some meaningful values for the receiver.

116) What do you mean by Database? (SEE 2073. 2074)
Ans: A database is the collection of information in an organized form.

117) What is a Database Management System (DBMS)?
Ans: DBMS is a software package designed to define, manipulate, retrieve, and manage data in a database.

118) What is cell?
Ans: A cell is an intersection of rows and columns.

119) Define field?
Ans: A field is an element in which one piece of information is stored

120) What is a tuple?
Ans: A single entry in a table is called a Tuple

121) What do you mean by record?
Ans: A record is a collection of multiple related fields.


122) What is table?
Ans: A table is a collection of rows having one or more columns.

1123) What is the purpose of a table?
Ans: A table is used to store the data and information.

124) Which data type is used to store alphanumeric characters or special symbols in MS Access?
Ans: Text data type is used to store alphanumeric characters or special symbols in MS Access.

125) Which view is used to modify a table in MS Access?
Ans: The design view is used to modify a table in MS Access.

126) What is a relationship in a database?
Ans: A relationship is a link between two or more tables.

127) What is the Primary key? (SEE 2073)
Ans: A primary key is a field that uniquely identifies each record in a table.

128) Which objects of Ms-Access is used to enter the data?
Ans: Form and Table are used to enter the data.

129) In which object of Ms-Access we can display the data by giving criteria and conditions.
Ans: Query is the object of Ms-Access where we can display the data by giving criteria and conditions.

130) Which object of Ms-Access is used to display the data in printed format?
Ans: Report is the object of Ms-Access which is used to display the data in printed format.

131) Which data type of Ms-Access is used to store graphics, pictures, and sound?
Ans: OLE is the object of Ms-Access which is used to store graphics, pictures and sound.

132) Which field property of Ms-Access is used to limit the value to be entered in the field.
Ans: The validation rule is used to limit the value to be entered in the field.

133) What is the program that enables you to create access and manage a database called?
Ans: A Database Management System is a program used to create access and manage a database.

134) Which data type is used to store numeric characters or special symbols in Ms-Access? (Specification Grid 2077)
Ans: Text data type is used to store numeric characters or special symbols in Ms-Access.

135) Which view is used to modify a table in Ms-Access? (Specification Grid 2077)
Ans: To modify a table Design view is used in Ms-Access.

136) Which data type is suitable for storing photographs of students in MS- Access? (SEE 2078)
Ans: The OLE data type is suitable for storing photographs of students in MS Access.

137) Which view is used to modify table structure in MS Access? (SEE 2078)
Ans: In MS Access Design view is used to modify the table structure.

138) What is the default extension of Ms-Access? (SEE Grade Promotion Exam 2078)
Ans: The following are the default extensions of Ms-Access.
Ms-Access 2003 is .mdb

MS-Access 2007 is .accdb

139) Which object of Ms-Access is used to retrieve data from the table? (SEE Grade Promotion Exam 2078)
Ans: Query is the object of Ms-Access used to retrieve data from the table.

140) What is the default size of the text field in Ms-Access? (SEE 2079)
Ans: The default size of the text field in MS Access is 50 characters.

141) Which data type is used to store the photo in MS Access?
Ans: OLE data type is used to store photos in MS Access.

142) List any four examples of databases.
Ans: Dictionary, phone diary, marks ledge, and salary sheet are examples of databases.

143) Write any four examples of DBMS.
Ans: MS-Access, My SQL, Oracle, FoxPro, etc are examples of DBMS.

144) Write any two examples of RDBMS.
Ans: SQL and Oracle are the examples of RDBMS.

145) What is the storage size of the attachment data type in Ms-Access?
Ans: 2 GB is the storage size of the attachment data type in Ms-Access.

146) Which is the default data type in MS Access?
Ans: Text is the default data type in MS Access?

147) What is the maximum length of a field name in MS Access?

Ans: The maximum length of field name in Ms-Access is 64 characters.

148) What is a form in Access?
Ans: A form in Access is a database object that you can use to create a user interface for a database application.

149) What is a query in Access?
Ans: A query is a tool that allows you to retrieve and filter data from one or more tables.

150) What is a report in Access?
Ans: A report is a database object in Access that is used to format, calculate, print, and summarize selected data.

151) What is a relationship in Access?
Ans: A relationship in Access is a connection between two tables that is based on one or more fields that are common to both tables.

152) What is an AutoNumber field?

Ans: An AutoNumber field automatically generates a unique number for each record.

153) How do you store text data in Access that exceeds 255 characters?
Ans: Use the Memo (in Access 2010 and earlier) or Long Text (in Access 2013 and later) data type.

154) What data type allows you to store binary large objects like images and documents in Access?
Ans: Use the OLE Object data type for Access 2010 and earlier, or the Attachment data type for Access 2013 and later.

155) Which data type in Access is best for storing website URLs?
Ans: Use the Hyperlink data type.

156) What field property must be set to make a field in Access act as a unique identifier that cannot contain duplicates?

Ans: Set the Indexed field property to "Yes (No Duplicates)".

157) Which data type should be used in Access to store a logical value (True/False)?
Ans: Use the Yes/No data type.

158) What data type in Access is used for storing numeric data that requires decimal places?
Ans: Use the Number data type and set the Field Size property to Double or Single.

159) What is the validation rule?
Ans: A criteria set for data entry in a field is known as a validation rule.

160) What is validation text?
Ans: A custom error message is shown when data doesn't meet the validation rule.

161) What is a query?
Ans: A tool to retrieve specific data from one or more tables.

162) What are the different types of queries?
Ans: Select, update, delete, append, and make-table are the different types of queries.

163) What is the function of input mask field property in MS-Access?
Ans: A pattern defining how data should be entered into a field, ensuring consistency and accuracy.

Modular Programming in QBASIC

164) What is user defined function? (Specification Grid 2065, SLC supplementary 2066)

Ans:  Function which are defined by the user according to their need are called user defined function.

 

165) Write down the difference between function and sub procedure.  (SLC supplementary 2065)

Ans:  The difference between function and sub procedure are as follows:

Function

Sub procedure

a) Function return a single value

a) Sub procedure does not return a value

b) It can be called by expression or PRINT statement or expression method. eg. b = abc (n)

b)  It is called by CALL statement.

c)  Function name can be used in an expression

c)  Sub procedure name can't be used as an expression

 

166) What is procedure?  List its types.  (SLC 2067, SEE 2072)

Ans:  A small, logical and manageable functional part of the program is known as procedure. OR,

          It is a collection of code to perform an action which does not return a value. Its types are:

          i)       Sub procedure

          ii)      Function procedure.         (SLC 2071)

 

167) What is subroutine?

Ans:  Subroutine is a set of program statements that can be called from different places of the main program.

 

168) Write the features of subroutine

Ans:  The features of subroutine are as follows:

·         It is called by CALL keyword.

·         It does not return any value.

·         It does not consider data type.

·         It can be recursive.

 

169)  Write the importance of subroutine.

Ans:  When our program becomes bigger, its code become more and more difficult to understand and difficult to find out the bugs, then with the help of subroutine we can mare program more simple and easier.

 

170)  What do you mean by recursion?

Ans:  A sub program or module that can call itself is called recursion.

 

171)  What is variable?

Ans:  The entity of number or string whose value are changeable during the program execution time is called variable.

 

172)  Write the difference between local and global variable.

Local variable

Global variable

i.   The variable which declared inside the procedures are called local variable.

ii.  It is not accessible by other functions.

i.   The variable, which can be accessed from any procedure or module is called global variable.

ii.  It is accessible by all the other functions.

 

173)  What is a declare statement?

Ans:  It declares function or sub procedure and invokes arguments data type checking.

 

174)  Distinguish between shared and common shared.

Shared

Common shared

i.   It gives procedures access to module level variable

i.   It defines global variable that can be shared through out a program or between chained program.

 

175)  Define Function….End function.

Ans:  It is a non executable statement that declares the name, the parameters and the code that form the body of a function procedure.

 

176)  Write the types of function.

Ans:  There are two types of functions. They are as follows.

          i)       Library or built - in – function

                   These function are provided by Qbasic software. eg. sqr( ), int( ), left$( ), len( ), mid$( ), date$( ) etc..

          ii)      User defined functions

                   Functions, which are defined by the user according to the need are called user defined function.

 

177)  Write the advantages of function.

·         There is no chance of duplication.

·         It can be developed, tasted, debugged, compiled independently.

·         Each function is reusable.

·         Program can be developed in short period of time.

·         Large numbers of programmer can be involved.

 

178)  In how many ways we can pass the arguments in function and procedure?

Ans:  We can pass the arguments in function and procedure as follows:

          i)       By reference

          ii)      By value

          iii)     By enter array into the function

 

179)  What do you mean by parameter?

Ans:  Parameters are variable that will receive data sent to the procedure.

          (Sub procedure and function)              

OR

          Parameters are the pre-defined variable that indicate the input given to the sub-procedure.

 

180)  Define arguments.

Ans:  Arguments are the actual values, we pass to the sub-procedure.

 

181)  Difference between actual parameters and formal parameters. (SEE 2074)

Ans:  The difference between actual parameters and formal parameters are as here under:

Actual parameter

Formal parameter

i.   The parameter listed in a function call are called the actual parameters.

i.   The parameters included in function declarations are called formal parameters.

 

182)  What is loop?                                                   (SLC 2068, Supp 2070, SEE 2073)

Ans:  Repetition of statements for number of times on the basis of given condition is known as loop.

 

183)  What is meant by mode of data file?                                                   (SLC 2069)

Ans:  Mode of data file means the file to be opened in specific access mode such as reading and writing (Output, Append and Output)

 

184)  What is a variable?                                                                                (SLC 2070)

Ans:  Variable is a location in the memory, contents of which can be changed during the execution of program.

 

185)  What is a constant?

Ans:  The entity (data or value) which cannot be changed during the program execution is called constant.

 

186)  What is an operator?

Ans:  An operator is a symbol or sign used to indicate a specific operation between the operands in a program.

 

187)  What is a statement?

AnsA statement is a set of instructions written using keywords or commands of programming language.

 

188)  Write the difference between Argument and parameter.

Ans:

Argument

Parameter

i.   Arguments are values that are sent to the procedure.

i.   These are variables that will receive data sent to the procedure.

 

 

189)  Write down the function of DECLARE statement.

Ans:  The function of DECLARE statement is to declare procedure such as FUNCTION or SUB in modular programming.

 

190)  Define logical operators. (SEE 2075)

Ans:  Logical operators are symbols, which are used to combine two or more logical or relational expressions and return a single ‘true’ or ‘false’   value.

 

191) Write the difference between library functions and user define functions

Ans: 

Library Functions

User defined functions

i. Library functions are built it or predefined function of QBASIC

i. User defined functions are defined or declared by the user.

ii. These types of functions are common for all the users.

ii. These types of function are declared by individual user on the basis of requirement.

iii.Example:  LEN, LEFT$, DATE$

iii. FUNCTION cube(a)

 

192) What do you mean by modular programming? (Specification Grid 2077)

Ans: Modular programming is the process of dividing the large computer program into separate sub-programs.

 

193) Which statement is used to call sub-procedure? (SEE 2078)

Ans: To call the sub procedure CALL statement is used.

 

194) Write any two advantages of modular programming. (SEE Grade Promotion 2078)

Ans: Following are the advantages of modular programming.

i). Easy to write the program.

ii) Easy to find out bugs.

 

195) What is looping? (SEE 2079)

Ans: Looping is a programming construct that allows a set of instructions to be executed repeatedly until a specific condition is met.

 

File Handling in QBASIC

196)  What is file handling? List its types.

Ans:  It is a process to create a data file, write data to the date file and read data from it.

 

197)  Write the difference between program file and data file.

Ans:

Program file

Data file

     Programs files are associated with providing access and execution of an actual program that is stored and installed in the computer system.

     Data file contains data and information needed for program to perform execution successfully. Data files are linked with a program file during run time.

 

198)  How many types of file modes are available in file handling?

Ans:  File modes available in file handling are as follows:

          i)            Input (I)   ii)    Output (O)      iii)        Append (A)    

 

199)     Write the operations of different modes of sequential file handling.

Ans:  a)      Output Mode: It is used to create a new data file and write data in it. If the file already         exists   its current contents will be destroyed.

          b)      Input Mode: It is used to retrieve records or contents of existing data file.

          c)       Append Mode: It is used to add more records in existing file. If the specified file does not   exist APPEND mode creates it.

 

200)  Write the function of the following with syntax.

          a)      Opening file (create a file): (OUTPUT):

                    To open a file first creates a file using OPEN statement.

                    Syntax: OPEN "File name" for MODE as # [Channel no]

                    e.g.        OPEN "avn.dat" for OUTPUT as # 2

          b)      Writing a file (WRITE):

                    It writes data to the sequential file. It writes values to a file in a form that can be read by the INPUT statement.

                    Syntax: WRITE #[Channel no], [expression list]

                    e.g         WRITE #2, n$,a,b$

          c)       Reading from a file(INPUT):

                    Reading data from a file that has been previously opened as INPUT is accomplished using the input statement.

                    Syntax: INPUT #<Channle no>, [expression list]

                    e.g :       INPUT #2, a$,a,c

          d)      Appending a file: (APPEND):

                    It is the process of adding records to the end of a file that previously exists on disk.

                    Syntax: OPEN "file name" for MODE as # <channel no>

                    eg.         OPEN "avn.dat" for APPEND as #2

          f)       Closing a file (CLOSE) (SEE 2073)

                    Close statement is responsible for Transferring the data currently in primary memory to secondary memory.

                    Syntax: Close #<channel no>

                    e.g:        CLOSE #2

 

201)  Write the function and syntax of file system commands. (Immediate mode commands)

          a)      CHDIR:

                    Function: This command is used to change the current directory

                    Syntax:     CHDIR <path>

                    e.g:           CHDIR "C:\program\qbasic"

          b)      MKDIR:

                    Function: This command creates a specified sub-directory inside the current directory.

                    Syntax:     MKDIR <directory name>

                    e.g:           MKDIR "A:\qbasic"

          c)       RMDIR:

                    Function: This command is used to remove or delete only sub-directory from a disk. It can remove only empty sub-directory.

                    Syntax:     RMDIR <path>

                    e.g.:          RMDIR "C"\program\qb"

          d)      FILES:

                    Function: This command display the files on the disk. The directory and sub-directory also displayed on the screen.

                    Syntax:     FILES <file specification>

                    e.g:           FILES "C:\qbasic\*.dat"

          e)       NAME: (SEE 2073)

                    Function: This command is used to change the name of a disk file or directory.

                    Syntax:     NAME <old file name> as <new file name>

                    e.g:           NAME "avn.bas" as "aishwarya.bas"

          f)       SHELL:

                    Function: This command is used to enter the DOS prompt temporarily.

                    Syntax:     SHELL <command string>

                    e.g.           SHELL

          Note: To return back in q-basic screen, type EXIT and press enter key.

 

202)  Write the function of the following:

          a)      Line Input:

                    It is used to read an entire line of input from the keyboard and store in one string variable.

          b)      INPUT #:

                    This statement is used to retrieve data items or fields from a sequential file record and store them into a list of variable.

          c)       Line Input #:

                    This statement is used to retrieve an entire record from a sequential file and store it into one string variable.

          d)      LOC:

                    It returns the current position within a file.

                    Syntax: :LOC (file number)

          e)       LOF:

                    It returns the length of a file in bytes.

                    Syntax: LOF (file number)

          f)       Print # and Print # using:

                    Print# writes data to the file and Print# using writes formatted to the file.

 

'C' Programming

203)  List any two types of data types used in C language. (Specification Grid 2077, SEE Grade promotion exam 2078, SEE 2079) (Spec. grid 2065, SLC 2065, supp. 2065, 2066, SLC 2068, 2070, supp. 2070, SEE 2072, 2074)

Ans:  Data types used in C language are:

Integer (int)

String (chr)

Float (float)

Long integer (double)

 

204)  Write any two advantages of structured programming.                    (SLC 2066)

Ans:  Following are the two advantages of structured programming:

·         Easy to understand

·         Easy to debug.

·         More reliable

·         It is program oriented.

·         Modules can be re-used.

 

205)  Write any two characteristics/features of C language. (SLC 2067, 2069, 2071, SEE 2073 Supp, Specification Grid 2077)

OR

          Write any two advantages of structure programming.                      (SEE 2075)

Ans:  The characteristics of C language are as follows:

·         It is a small programming language which occupies less memory space.

·         It has enough numbers of in-built functions and operators.

·         It has verity of data types to represent different kind of data.

·         It is a bridge between high level and low-level language.

·         It is machine independent

 

206)  What is C?

Ans:  C is a structure programming language that divides program into many functions.

 

 

207)  Write the difference between QBASIC and C language.

Ans:  The difference between QBASIC and C language are as follows:

QBASIC

C

a)    It is high level programming language.

a)    It is a high level programming language with the features of low level programming language.

b)    It is general programming language

b)    It is a system programming language.

c)    It supports limited data type.

c)    It supports wide range of data type.

d)    It supports both sub procedure and function procedure.

d)    It supports only function procedure.

 

208)  What is character set?

Ans:  The character set consists of alphabet digit or special symbol used to represent information.

         

209)  What is keyword? List the different keyword of C.

Ans:  Keywords are words whose meaning has already been explained to the compiler or the computer.

 

210) List any four keywords used in 'C' Programming.

Ans: double, int, for, break are the four keywords used in 'c' programming.

 

211)  What is header file?

Ans:  A header file is a standard file that contains definitions of variables and functions which are necessary for the functioning of a program.

 

212)  What is identifiers?

Ans:  Identifiers can be defined as the name of the variables, functions, array, structure created by the programmer.

 

213)  What is operator in C?

Ans:  Operators are the special symbol that perform certain action on one and more than one value or variable and generate the output.

 

214) List the different types of operators available in C.

Ans: Following are the operators supported by C.

·         Arithmetic operators

·         Relational operators

·         Logical operators

·         Unary operator or Increment and decrement operators

 

 

215)  What is variable? (SEE 2073)

Ans:  The data item whose value changes during the execution of a program is called variable.

 

216)  What is structure programming? Give examples

Ans:  Structured programming (sometimes known as modular programming) is a programming paradigm that facilitates the creation of programs with readable code and reusable components. Examples: Pascal and 'C'.

 

217)  Why 'C' is called a structure programming?

Ans:  C is called a structured programming language because to solve a large problem, C programming language divides the problem into smaller structural blocks each of which handles a particular responsibility

 

218) Write any four header files used in 'c' programming

Ans:  Following are the header files used in 'C' programming.

          <stdio.h>, <conio.h>. <string.h>, <math.h>

 

219)  What is Data type?

Ans:  Data types refer to the type of data or variable which is to be stored and used in the program.

 

220)  What is format specifier?

Ans:  Format specifiers can be defined as the operators which are used in association with printf() function for printing the data that is referred by any object or any variable.

 

221)  List any four format specifier used in 'C' programming.

Ans: Following are the format specifier used in 'C' programming.

          int=%d

          float= %f

          char =%c or %s

 

222)  What is control statement? List its examples.

Ans:  Control statements enable us to specify the flow of program control; ie, the order in which the instructions in a program must be executed.

          Following are the types of control statements.

·         Selection / decision  statements (if, switch)

·         Ieration/looping statement. (for, while)

·         Jumping statement. (break, continue, return)

 

223)  What is decision statement?

Ans:  Decision-making statements are the statements that are used to verify a given condition and decide whether a block of statements gets executed or not based on the condition result.

 

224) What is switch statement in 'c'?

Ans:  A switch statement allows a variable to be tested for equality against a list of values. Each value is called a case, and the variable being switched on is checked for each switch case.

 

225)  What do you mean by looping? List examples of looping in 'C'

Ans:  A loop statement allows us to execute a statement or group of statements multiple times.

          Examples: for lop, while loop, do.....while loop

 

226)  What is unary operator?

Ans:  Unary operators are those operators which need only one operand to perform an operation. These operators are usually written on left of variables or objects but sometimes can be written on right as well. Example: ++,  --

 

227)  What are arithmetic operators? Give examples.

Ans:  The Arithmetic operators are some of the C Programming Operator, which are used to perform arithmetic operations includes operators like Addition, Subtraction, Multiplication, Division and Modulus. Examples: +, -, *, /, %

 

228) What is relational operator? Give examples.

Ans:  The symbols which are used to check the relationship between two variables is known as relational operators.

          Example: >, <, ==, <=, >=, !=  

 

229)  What do you mean by logical operators? Give example.

Ans:  Logical Operators are used to combine two or more conditions/constraints or to complement the evaluation of the original condition in consideration. 

          Examples: &&, ||, !

 

230)  Write the advantages of structure programming.

Ans:  Following are the advantages of structure programming.

·         It is easy to design code and test the program modules independently.

·         It is possible to use a single module in different places which reduces program codes.

 

231) What is counter?

Ans: Counter is a variable which controls the loop statement and provides the track to run the loop statement in certain number times.

 

You may also read:

SEE Class 10 Computer Science Model Set (Solved)


 

No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages