230 Essential Very Short Q&As in Computer Science for SEE and 10th Grade Students
Group "A"
1. Answer the following questions in one sentence. 6×1=6
Networking and Telecommunication
1) What is Communication?
Ans: Communication is the exchange of
information, ideas, or thoughts between individuals or groups using various
methods such as speech, writing, gestures, or technology.
2) What do you mean by Data Communication?
Ans: Data communication refers to the process of
transmitting and receiving data or information between two or more devices or
systems. Example: E-mail, Internet, E-fax etc..
3) What is Communication media?
Ans: A communication media is a
channel through which data or signal can be transmitted from one point to
another.
4) What is computer Network? (SLC
supp. 2068, 2069, SEE 2074)
Ans: A computer network is a logical or physical
interconnection between two or more computers such that they could communicate
with each other.
5) What is data transmission mode?
Ans: Data transmission mode refers to the
direction of information flow between two communication devices via a
communication channel.
6) What do you mean by Networking architecture/model?
Ans: It is
a physical and logical design of the software, hardware, protocols, and media
of the transmission of data.
7) Define network topology.
Ans: Network topology refers to the physical or
logical layout of a network.
8) What is a modem?
Ans: It is a
device that converts analog data to digital and vice versa.
9) What is
Network Protocol (SEE 2079)
Ans: Protocols are commonly agreed rules followed for
interconnection and communication between computers in a network.
10) What is a communication
channel? (SLCSupp.2070)
Ans: A
communication channel is a medium through which messages are transmitted from
one person to another. Some examples of communication channels include
face-to-face conversation, email, phone calls, text messages, social media
11) What is Bandwidth? (SLC–2066(Supplementary))
Ans: Bandwidth
is the maximum rate of data transfer across a given path. It is measured in
bits per second (bps), kilobits per second (kbps), megabits per second (Mbps),
or gigabits per second (Gbps).
12) What is Modulation?
Ans: Modulation
is the process of modifying a carrier signal by varying one or more of its
properties, such as amplitude, frequency, or phase, to carry information.
13) What is internet?
Ans: The Internet is a global network of billions of
computers and other electronic devices.
14) Define intranet.
Ans: An
intranet is a private network that can only be accessed by authorized users.
15) What is extranet?
Ans: Extranet is
a local network accessible to specific outside users or businesses, but still
inaccessible to the general public.
16) Define guided communication media.
Ans: Guided media are cable line through which
data flow in a specified path.
17) What is un-guided communication media?
Ans: Unguided
communication media are the data signal flow through the air.
18) Define Network Operating System (NOS)
Ans: NOS is
the software that allows multiple computers to communicate, share files and
hardware devices with one another.
19) Who is Network Administrator?
Ans: A
network administrator is a person who implements, manages and troubleshoots a
organizations networks.
20) What is telent?
Ans:
A program that allows the user to log
into a remote computer on the internet as a user on that system is called
telnet.
21) Define Data.
Ans:
A raw fact about anything which does not
give any complete meaning is called data.
22) What is Information?
Ans:
The processed data which gives some or
complete meaning is called information.
23) What is search engine?
(Specification Grid 2077)
Ans: A
search engine is a computer program or software that helps people to search the
information they are looking for online by phrases or keywords. Examples: Bing,
Google etc.
24) Write the name of any two search engines. (SEE 2078)
Ans: Two search engines are: i) Google ii) Bing
25) What
is a web browser? (SEE Grade Promotion Exam 2078)
Ans: A web browser is an application program
that is used to view the information of documents or web pages.
26) What is simplex mode?
Ans Simplex mode is the transmission of data and information that
takes place in only one direction.
Examples: Radio, Newspaper, Television, etc.
27) Define Duplex mode.
Ans: Duplex mode of data
transmission in which data and information flow in both directions.
28) Write example of Half
duplex and full duplex.
Ans: Half duplex: Walky-talky and wireless handset
Full duplex: Mobile and landline phones.
29) Write the components of data communication.
Ans: i) Data ii) sender iii) medium
iv) receiver and v) protocol are the components of data communication.
30) What is connector?
Ans: Connector is a device that facilitates the connection of computers
and other devices to a network.
31) List the different connectors used in computer network.
Ans: BNC used with coaxial cable, RJ 45 is used with UTP cable, and ST
used with fiber optic cable.
32) What is switch in computer network?
Ans: Switch is a network connectivity device which joins multiple
computer together to share information among them.
33) Define Bridge in computer network.
Ans: Bridge is a network connectivity device that interconnects two
computer networks having similar protocol.
34) What is router?
Ans: Router is a network connectivity device that joins multiple wired or
wireless network together.
35) What is repeater?
Ans: Repeater is a network connectivity device that accepts weak signals
and regenerates them and after that sends the message on their way.
36) What is device driver?
Ans: Device driver is a program that controls the functionality of the
hardware device.
37) Define server.
Ans: A server is the main computer in network that provides services,
data and other resources to the other computer in network.
38) Define workstation.
Ans: A computer on a network that uses resources of the network is called
workstation.
39) What is node?
Ans: Computer or devices of network is called node.
40) What is ISP?
Ans: An Internet Service Provider(ISP) is an organization that provides
services for accessing and using the internet.
41) What is e-mail?
Ans: E-mail (Electronic mail) is one of the most popular service
provided by the internet sends and receives messages electronically through the
internet.
42) What is FTP?
Ans: File Transfer Protocol(FTP) helps to transfer (download or upload)
files from one computer to another computer.
43) What is uploading?
Ans: Uploading refers to copying files or document, programs or data from
user's computer to the internet server.
44) Define downloading.
Ans: Downloading refers to the copying files or document or program or
data from the internet server to the users computer.
Ethical and Social Issues in ICT
45) What is ICT?
Ans: ICT
refers to technologies that provide access to information through
telecommunications.
46) Define ethics.
Ans: Ethics
are moral standards that helps guide behaviors, actions and choices.
47) What do you mean by computer ethics?
Ans: Computer
ethics is set of moral principles that regulate the use of computers.
48) Who is hacker?
Ans: A Hacker is
a person who finds and exploits the weakness in computer systems and/or
networks to gain access.
49) What is cracker?
Ans: A cracker is
an individual who can decipher codes and passwords being able to break security
systems for illegal reasons.
50) What do you mean by cybercrime?
Ans: Cybercrime
is criminal activity done using computers and the Internet.
51) What do you mean by cyber bullying?
Ans: It is the
use of digital-communication tools (such as the Internet and cell phones) to
make another person feel angry, sad, or scared, usually again and again.
52) Define digital footprint.
Ans: A digital
footprint is a trail of data you create while using the Internet.
53) What is the vision of IT Policy 2072?
Ans: To
transform Nepal into an information and knowledge-based society and economy.
54) Who is the chairperson of National Information and Communication
Technology Policy?
Ans: Hon. Minister, Ministry of Information and Communication
Technology.
55) What is electronic transaction?
Ans: Transactions of electronic records, data by using any types of electronic
means.
56) Define Social media. (SEE 2078)
Ans: Social media is a collection of Internet-based communities that
allow users to interact with each other online.
57) When was the first time IT policy introduced
in Nepal?
Ans: In 2057 BS first time IT policy was introduced in Nepal.
58) What is digital citizenship?
Ans: Digital citizenship refers to the responsible use of technology by
anyone who uses computers, the Internet, and digital devices to engage with
society on any level.
59) When was electronic transaction act was
commenced?
Ans: Electronic Transaction Act
shall be deemed to have been commenced from 24 Bhadra 2063 ( Sep.2,
2006).
60) What do you mean by digital divide?
Ans: Gap between rich and poor in terms of information technology is
called digital divide.
61) List any two examples of digital citizenship.
Ans: Following are the examples of digital citizenship.
i)
Communicating with respect.
ii)
Supporting others by offering useful feedback.
62) What is cyber bullying?
Ans: Cyber bullying is a kind of harassment using mobiles or computers.
63) What is cyber law?
Ans: The law which governs the legal issues in the cyber space regarding
the internet or WWW for digital data processing and transaction is called cyber
law.
64) What is digital signature?
Ans: Digital signature is a security mechanism system used on the
internet for data and information transaction by attaching a code at the end of
the electronic message that attests the authenticity of send message.
65) What is encryption?
Ans: Encryption is a way to protect data by making it unreadable to
unauthorized users.
66) What is decryption?
Ans: Decryption is the process of converting encrypted data back to its
original form.
67) What is software piracy?
Ans: Software piracy is the illegal copying, distribution, or use of
software.
68) What is cyberspace?
Ans: Cyberspace is a global computer network where information can be
shared and accessed.
Computer Security
69) What is computer security?
Ans: Computer
security basically is the protection of computer systems and information
from harm, theft, and unauthorized use.
70) Define information security?
Ans: Information
security is a set of practices intended to keep data secure from unauthorized
access or alterations.
71) What do you mean by hardware security?
Ans: The
process the protecting the physical parts of the computer is known as hardware
security.
72) What are security mechanisms?
Ans: Security
mechanisms are technical tools and techniques that are used to implement
security services.
73) What is Biometrics?
Ans: Biometrics
is the measurement and statistical analysis of people's unique physical and
behavioral characteristics.
74) Define Encryption.
Ans: Encryption
is the process of converting data to an unrecognizable or "encrypted" form.
75) What is Decryption?
Ans: Decryption
is the process of transforming data that has been rendered unreadable through
encryption back to its unencrypted form.
76) What is antivirus software?
Ans: The
software which scan and eliminate the computer virus is known as antivirus
software.
77) What do you mean by backup?
Ans: A
backup is a copy of one or more files created as an alternate in case the original data is lost or
becomes unusable
78) What is cryptography?
Ans: Cryptography
is a method of protecting information and communications through the use of
codes.
79) Define password.
Ans: A
password is a string of characters used to verify the identity of a user during
the authentication process.
80) What is malicious code?
Ans: Malicious
code is the term used to describe any code in any part of
a software system or script that is intended to cause undesired effects,
security breaches or damage to a system.
81) Define computer virus.
Ans: A
computer virus is malicious software which self-replicates and attaches itself
to other files/programs.
82) How passwords secure the data? (SEE
2075 Regular)
Ans: Password
secures the data by giving access to the authorized person only.
83) What is malware?
Ans: Malware
is a kind of harmful computer code or web script that is planned to cause
undesired effects to damage a system.
84) What is authentication system?
Ans: Authentication
is the process of verifying the identity of a person or device.
85) What is firewall?
Ans: A
firewall is the network security systems that monitors and controls the traffic
flow between the internet and private network or private computers the basis of
a set of user defined rules.
86) Define cryptography.
Ans: Cryptography
is the study of secure communications techniques that allow only the sender and
intended recipient of a message to view its contents.
19) What is computer virus?
Ans: Computer
virus is a type of computer programs which is written by the programmer with
the intent of destroying or damaging the data and program residing in the
computer.
87) Give any two examples of power protection
device.
Ans: UPS,
Volt guard, spike guard are the examples of power protection device.
88) Why power protection device needed?
Ans: To
protect computer system from damage, expensive data loss and unnecessary down
time.
89) What is UPS?
Ans: UPS
is a battery supported power protection device which controls the electric
voltage and supplies clean and continuous power to the computer system even
during power failures.
E-Commerce
90) What is e-commerce? (SEE 2079)
Ans: Buying
and selling goods and services using internet is known as e-commerce.
91) What do you mean by Business to Consumer
(B2C)?
Ans: B2C
are transactions that sell directly to final users.
92) What is Consumer to Government (C2G)?
Ans: C2G
transactions occur when individual people pay the government.
93) Give any two examples of B2C.
Ans: Daraz
and Amazon are two examples of B2C.
94) What is M-Commerce?
Ans: Mobile
commerce refers to business or purchases conducted over mobile devices like
cellphones or tablets.
95) What do you mean by online payment?
Ans: An
online payment system is a way of making transactions or paying for goods and
services through an electronic medium and internet, without the use of checks
or cash.
96) Write any two payments of credit payment
system.
Ans Credit
card and e-wallet are the examples of credit payment system.
97) What is biometric payment?
Ans: Biometric payment is a point of sale (POS) technology that uses biometric authentication to identify the user and authorize the deduction of funds from a
bank account.
98) Define smart card.
Ans: A
plastic card with a microprocessor that can be loaded with funds to make
transactions; also known as a chip card.
99) What is Electronic Fund Transfer (EFT)?
Ans: EFT
is an electronic system used to transfer money from one bank account to another
without any cash exchange by hand.
100) What is the business
done through the internet? (Specification Grid 2077)
Ans: E-commerce is the
business done through the internet.
101) Write the examples of e-payment or online
payment service in Nepal.
Ans: Khalti,
Esewa, IME pay, ePay, Pay Way, iPay etc.
are the services of online payment in Nepal.
Contemporary Technology
102) What do you mean by Contemporary Technology?
Ans: Modern
or emerging technology available in the world in known as contemporary
technology.
103) What is cloud computing?
Ans: Cloud
computing is the delivery of computing services including servers, storage,
databases, networking, software, analytics, and intelligence over the Internet.
104) What is Artificial Intelligence (AI)?
Ans: A
branch of computer science dealing with the simulation of intelligent behavior
in computers.
105) Define Virtual Reality.
Ans: An
artificial environment created with computer hardware and software and
presented to the user in such a way that it appears and feels like a real
environment.
106) What is E-Governance?
Ans: Electronic
Governance is the integration of Information and Communication Technology
(ICT) in all the processes, with the aim of enhancing
government ability to address the needs of the general public.
107) What do you
mean by mobile computing?
Ans: Mobile Computing
is a technology that allows transmission of data, voice and video via a
computer or any other wireless enabled device without having to be connected to
a fixed physical link.
108) What do you mean by Internet of Things (IoT)?
Ans: The
internet of things (IoT) is a computing concept that describes the idea of
everyday physical objects being connected to the internet and being able to
identify themselves to other devices.
109) Define e-learning.
Ans: E-learning,
also referred to as online learning or electronic learning, is the acquisition
of knowledge which takes place through electronic technologies and media.
110) What is virtual reality?
Ans: An
artificial environment created with computer hardware and software and
presented to the user in such a way that it appears and feels like a real
environment.
111) What is internet banking?
Ans: A
facility offered by banks and financial institutions that allow customers to
use banking services over the internet.
112) What is cloud computing?
Ans: Cloud
computing is the practice of accessing and using remote computing resources,
such as servers, storage, and software applications, over the internet.
113) What is mobile banking?
Ans: Mobile
banking is the act of making financial transactions on a mobile device (smart
phones, tablet) and internet.
DBMS
114) Define Data
(SEE 2073)
Ans: Data is the collection of facts.
115) What is information? (SLC 2070)
Ans: Information is organized or classified data,
which has some meaningful values for the receiver.
116) What do you mean by Database? (SEE 2073.
2074)
Ans: A database is the collection of information
in an organized form.
117) What is a Database Management System
(DBMS)?
Ans: DBMS is a software package designed to
define, manipulate, retrieve, and manage data in a database.
118) What is cell?
Ans: A cell is an intersection of rows and
columns.
119) Define field?
Ans: A field is an element in which one piece of
information is stored
120) What is a tuple?
Ans: A single entry in a table is called a Tuple
121) What do you mean by record?
Ans: A record is a collection of multiple
related fields.
122) What is table?
Ans: A table is a collection of rows having one
or more columns.
1123) What is the purpose of a table?
Ans: A table is used to store the data and
information.
124) Which data type is used to store
alphanumeric characters or special symbols in MS Access?
Ans: Text data type is used to store
alphanumeric characters or special symbols in MS Access.
125) Which view is used to modify a table in
MS Access?
Ans: The design view is used to modify a table
in MS Access.
126) What is a relationship in a database?
Ans: A relationship is a link between two or
more tables.
127) What is the Primary key? (SEE 2073)
Ans: A primary key is a field that uniquely
identifies each record in a table.
128) Which objects of Ms-Access is used to
enter the data?
Ans: Form and Table are used to enter the data.
129) In which object of Ms-Access we can
display the data by giving criteria and conditions.
Ans: Query is the object of Ms-Access where we
can display the data by giving criteria and conditions.
130) Which object of Ms-Access is used to
display the data in printed format?
Ans: Report is the object of Ms-Access which is
used to display the data in printed format.
131) Which data type of Ms-Access is used to
store graphics, pictures, and sound?
Ans: OLE is the object of Ms-Access which is
used to store graphics, pictures and sound.
132) Which field property of Ms-Access is
used to limit the value to be entered in the field.
Ans: The validation rule is used to limit the
value to be entered in the field.
133) What is the program that enables you to
create access and manage a database called?
Ans: A Database Management System is a program
used to create access and manage a database.
134) Which data type is used to store numeric
characters or special symbols in Ms-Access? (Specification Grid 2077)
Ans: Text data type is used to store numeric
characters or special symbols in Ms-Access.
135) Which view is used to modify a table in
Ms-Access? (Specification Grid 2077)
Ans: To modify a table Design view is used in
Ms-Access.
136) Which data type is suitable for storing
photographs of students in MS- Access? (SEE 2078)
Ans: The OLE data type is suitable for storing
photographs of students in MS Access.
137) Which view is used to modify table
structure in MS Access? (SEE 2078)
Ans: In MS Access Design view is used to modify
the table structure.
138) What is the default extension of
Ms-Access? (SEE Grade Promotion Exam 2078)
Ans: The following are the default extensions of
Ms-Access.
Ms-Access 2003 is .mdb
MS-Access 2007 is
.accdb
139) Which object of Ms-Access is used to
retrieve data from the table? (SEE Grade Promotion Exam 2078)
Ans: Query is the object of Ms-Access used to
retrieve data from the table.
140) What is the default size of the text
field in Ms-Access? (SEE 2079)
Ans: The default size of the text field in MS
Access is 50 characters.
141) Which data type is used to store the
photo in MS Access?
Ans: OLE data type is used to store photos in MS
Access.
142) List any four examples of databases.
Ans: Dictionary, phone diary, marks ledge, and
salary sheet are examples of databases.
143) Write any four examples of DBMS.
Ans: MS-Access, My SQL, Oracle, FoxPro, etc are
examples of DBMS.
144) Write any two examples of RDBMS.
Ans: SQL and Oracle are the examples of RDBMS.
145) What is the storage size of the
attachment data type in Ms-Access?
Ans: 2 GB is the storage size of the attachment
data type in Ms-Access.
146) Which is the default data type in MS
Access?
Ans: Text is the default data type in MS Access?
147) What is the maximum length of a field
name in MS Access?
Ans: The maximum
length of field name in Ms-Access is 64 characters.
148) What is a form in Access?
Ans: A form in Access is a database object that
you can use to create a user interface for a database application.
149) What is a query in Access?
Ans: A query is a tool that allows you to retrieve
and filter data from one or more tables.
150) What is a report in Access?
Ans: A report is a database object in Access
that is used to format, calculate, print, and summarize selected data.
151) What is a relationship in Access?
Ans: A relationship in Access is a connection
between two tables that is based on one or more fields that are common to both
tables.
152) What is an AutoNumber field?
Ans: An AutoNumber field automatically generates
a unique number for each record.
153) How do you store text data in Access
that exceeds 255 characters?
Ans: Use the Memo (in Access 2010 and earlier)
or Long Text (in Access 2013 and later) data type.
154) What data type allows you to store
binary large objects like images and documents in Access?
Ans: Use the OLE Object data type for Access
2010 and earlier, or the Attachment data type for Access 2013 and later.
155) Which data type in Access is best for
storing website URLs?
Ans: Use the Hyperlink data type.
156) What field property must be set to make
a field in Access act as a unique identifier that cannot contain duplicates?
Ans: Set the Indexed field property to "Yes (No Duplicates)".
157) Which data type should be used in Access
to store a logical value (True/False)?
Ans: Use the Yes/No data type.
158) What data type in Access is used for
storing numeric data that requires decimal places?
Ans: Use the Number data type and set the Field
Size property to Double or Single.
159) What is the validation rule?
Ans: A criteria set for data entry in a field is
known as a validation rule.
160) What is validation text?
Ans: A custom error message is shown when data
doesn't meet the validation rule.
161) What is a query?
Ans: A tool to retrieve specific data from one
or more tables.
162) What are the different types of queries?
Ans: Select, update, delete, append, and
make-table are the different types of queries.
163) What is the function of input mask field
property in MS-Access?
Ans: A pattern defining how data should be
entered into a field, ensuring consistency and accuracy.
Modular Programming in QBASIC
164) What is user defined function? (Specification Grid 2065, SLC supplementary
2066)
Ans: Function which are defined by the
user according to their need are called user defined function.
165) Write down the difference between function and
sub procedure. (SLC supplementary 2065)
Ans: The difference between function and
sub procedure are as follows:
Function |
Sub
procedure |
a) Function return a single value |
a) Sub procedure does not return a value |
b) It can be called by expression or PRINT
statement or expression method. eg. b = abc (n) |
b) It is called by CALL statement. |
c) Function name can be used in an expression |
c) Sub procedure name can't be used as an
expression |
166) What is procedure? List its types. (SLC 2067, SEE 2072)
Ans: A small, logical and
manageable functional part of the program is known as procedure. OR,
It is a collection of code to perform
an action which does not return a value. Its types are:
i) Sub
procedure
ii) Function
procedure. (SLC 2071)
167) What is subroutine?
Ans: Subroutine is a set
of program statements that can be called from different places of the main
program.
168) Write the features of subroutine
Ans: The features of
subroutine are as follows:
·
It
is called by CALL keyword.
·
It
does not return any value.
·
It
does not consider data type.
·
It
can be recursive.
169) Write the
importance of subroutine.
Ans: When our program becomes bigger, its
code become more and more difficult to understand and difficult to find out the
bugs, then with the help of subroutine we can mare program more simple and
easier.
170) What do you mean
by recursion?
Ans: A sub program or module that can call
itself is called recursion.
171) What is variable?
Ans: The entity of number or string whose
value are changeable during the program execution time is called variable.
172) Write the
difference between local and global variable.
Local
variable |
Global
variable |
i. The variable
which declared inside the procedures are called local variable. ii. It is not
accessible by other functions. |
i. The variable, which can be accessed from any
procedure or module is called
global variable. ii. It is accessible
by all the other functions. |
173) What is a declare
statement?
Ans: It declares function or sub procedure
and invokes arguments data type checking.
174) Distinguish
between shared and common shared.
Shared |
Common
shared |
i. It gives
procedures access to module level variable |
i. It defines global
variable that can be shared through out a program or between chained program. |
175) Define
Function….End function.
Ans: It is a non
executable statement that declares the name, the parameters and the code that
form the body of a function procedure.
176) Write the types of function.
Ans: There are two types of functions. They are as
follows.
i) Library or built - in – function
These function are provided
by Qbasic software. eg. sqr( ), int( ), left$( ), len( ), mid$( ), date$( )
etc..
ii) User defined functions
Functions, which are defined
by the user according to the need are called user defined function.
177) Write the advantages of function.
·
There
is no chance of duplication.
·
It
can be developed, tasted, debugged, compiled independently.
·
Each
function is reusable.
·
Program
can be developed in short period of time.
·
Large
numbers of programmer can be involved.
178) In how many ways we can pass the arguments in
function and procedure?
Ans: We can pass the arguments in function
and procedure as follows:
i) By
reference
ii) By
value
iii) By
enter array into the function
179) What do you mean by parameter?
Ans: Parameters are variable that will
receive data sent to the procedure.
(Sub procedure and function)
OR
Parameters are the pre-defined
variable that indicate the input given to the sub-procedure.
180) Define arguments.
Ans: Arguments are the actual values, we
pass to the sub-procedure.
181) Difference between actual parameters and
formal parameters. (SEE 2074)
Ans: The difference between actual
parameters and formal parameters are as here under:
Actual parameter |
Formal parameter |
i. The parameter listed in a function call are
called the actual parameters. |
i. The parameters included in function
declarations are called formal parameters. |
182) What is loop? (SLC
2068, Supp 2070, SEE 2073)
Ans: Repetition of statements for number of times on the basis of
given condition is known as loop.
183) What is meant by mode of data file? (SLC
2069)
Ans: Mode of data file means the file to be opened in specific
access mode such as reading and writing (Output, Append and Output)
184) What is a variable? (SLC
2070)
Ans: Variable is a location
in the memory, contents of which can be changed during the execution of
program.
185) What is a constant?
Ans: The entity (data or
value) which cannot be changed during the program execution is called constant.
186) What is an operator?
Ans: An operator is a
symbol or sign used to indicate a specific operation between the operands in a
program.
187) What is a statement?
Ans: A statement is a set of instructions written using
keywords or commands of programming language.
188) Write the difference between Argument and
parameter.
Ans:
Argument |
Parameter |
i. Arguments
are values that are sent to the procedure. |
i. These are
variables that will receive data sent to the procedure. |
189) Write down the function of DECLARE statement.
Ans: The function of DECLARE statement is
to declare procedure such as FUNCTION or SUB in modular programming.
190) Define logical operators. (SEE 2075)
Ans: Logical operators are symbols, which are used to combine two
or more logical or relational expressions and return a single ‘true’ or ‘false’ value.
191) Write the difference between library functions
and user define functions
Ans:
Library
Functions |
User
defined functions |
i. Library functions are built it
or predefined function of QBASIC |
i. User defined functions are
defined or declared by the user. |
ii. These types of functions are
common for all the users. |
ii. These types of function are
declared by individual user on the basis of requirement. |
iii.Example: LEN, LEFT$, DATE$ |
iii. FUNCTION cube(a) |
192)
What do you mean by modular programming?
(Specification Grid 2077)
Ans: Modular programming is the process of dividing the large
computer program into separate sub-programs.
193)
Which statement is used to call
sub-procedure? (SEE 2078)
Ans: To call the sub procedure CALL statement
is used.
194) Write any two advantages of modular
programming. (SEE Grade Promotion 2078)
Ans: Following are the advantages of modular
programming.
i). Easy to write the program.
ii) Easy to find out bugs.
195) What is looping? (SEE 2079)
Ans: Looping is a programming construct that
allows a set of instructions to be executed repeatedly until a specific
condition is met.
File Handling in QBASIC
196) What is file handling? List its types.
Ans: It is a process to create a data file, write data to the date file and
read data from it.
197) Write the difference between program file and
data file.
Ans:
Program
file |
Data
file |
Programs files are associated with
providing access and execution of an actual program that is stored and
installed in the computer system. |
Data file contains data and information
needed for program to perform execution successfully. Data files are linked
with a program file during run time. |
198) How many types of file modes are available in
file handling?
Ans: File modes available in file handling
are as follows:
i) Input (I) ii) Output
(O) iii) Append (A)
199) Write
the operations of different modes of sequential file handling.
Ans: a) Output
Mode: It is used to create a new data file and write data in it. If the
file already exists its current contents will be destroyed.
b) Input Mode: It is used to retrieve
records or contents of existing data file.
c) Append Mode: It is used to add more
records in existing file. If the specified file does not exist APPEND mode creates it.
200) Write the function of the following with
syntax.
a) Opening file (create a file): (OUTPUT):
To open a file first creates a file
using OPEN statement.
Syntax: OPEN "File name" for MODE
as # [Channel no]
e.g. OPEN
"avn.dat" for OUTPUT as # 2
b) Writing a file (WRITE):
It writes data to the sequential file.
It writes values to a file in a form that can be read by the INPUT statement.
Syntax: WRITE #[Channel no], [expression
list]
e.g WRITE
#2, n$,a,b$
c) Reading from a file(INPUT):
Reading data from a file that has been
previously opened as INPUT is accomplished using the input statement.
Syntax: INPUT #<Channle no>,
[expression list]
e.g : INPUT
#2, a$,a,c
d) Appending a file: (APPEND):
It is the process of adding records to
the end of a file that previously exists on disk.
Syntax: OPEN "file name" for MODE
as # <channel no>
eg. OPEN
"avn.dat" for APPEND as #2
f) Closing a file (CLOSE) (SEE 2073)
Close statement is responsible for
Transferring the data currently in primary memory to secondary memory.
Syntax: Close #<channel no>
e.g: CLOSE
#2
201) Write the function
and syntax of file system commands. (Immediate mode commands)
a) CHDIR:
Function: This command is used to
change the current directory
Syntax: CHDIR <path>
e.g: CHDIR
"C:\program\qbasic"
b) MKDIR:
Function: This command creates a
specified sub-directory inside the current directory.
Syntax: MKDIR <directory name>
e.g: MKDIR
"A:\qbasic"
c) RMDIR:
Function: This command is used to
remove or delete only sub-directory from a disk. It can remove only empty
sub-directory.
Syntax: RMDIR <path>
e.g.: RMDIR
"C"\program\qb"
d) FILES:
Function: This command display the
files on the disk. The directory and sub-directory also displayed on the
screen.
Syntax: FILES <file specification>
e.g: FILES
"C:\qbasic\*.dat"
e) NAME: (SEE 2073)
Function: This command is used to
change the name of a disk file or directory.
Syntax: NAME <old file name> as <new file name>
e.g: NAME
"avn.bas" as "aishwarya.bas"
f) SHELL:
Function: This command is used to
enter the DOS prompt temporarily.
Syntax: SHELL <command string>
e.g. SHELL
Note: To
return back in q-basic screen, type EXIT and press enter key.
202) Write the function
of the following:
a) Line Input:
It is used to read an entire line of
input from the keyboard and store in one string variable.
b) INPUT #:
This statement is used to retrieve
data items or fields from a sequential file record and store them into a list
of variable.
c) Line Input #:
This statement is used to retrieve an
entire record from a sequential file and store it into one string variable.
d) LOC:
It returns the current position within
a file.
Syntax: :LOC (file number)
e) LOF:
It returns the length of a file in
bytes.
Syntax: LOF (file number)
f) Print # and Print # using:
Print# writes data to the file and
Print# using writes formatted to the file.
'C' Programming
203) List any two types of data types used in C
language. (Specification Grid 2077, SEE Grade promotion exam 2078, SEE 2079) (Spec. grid 2065, SLC 2065, supp. 2065, 2066,
SLC 2068, 2070, supp. 2070, SEE 2072, 2074)
Ans: Data types used in C
language are:
Integer (int)
String (chr)
Float (float)
Long integer
(double)
204) Write any two advantages of structured
programming. (SLC 2066)
Ans: Following are the two
advantages of structured programming:
·
Easy
to understand
·
Easy
to debug.
·
More
reliable
·
It
is program oriented.
·
Modules
can be re-used.
205) Write any two characteristics/features of C
language. (SLC 2067, 2069, 2071, SEE 2073
Supp, Specification Grid 2077)
OR
Write any two advantages of structure
programming. (SEE
2075)
Ans: The characteristics of C language are
as follows:
·
It
is a small programming language which occupies less memory space.
·
It
has enough numbers of in-built functions and operators.
·
It
has verity of data types to represent different kind of data.
·
It
is a bridge between high level and low-level language.
·
It
is machine independent
206) What is C?
Ans: C is a structure programming language
that divides program into many functions.
207) Write the difference between QBASIC and C
language.
Ans: The difference between QBASIC and C
language are as follows:
QBASIC |
C |
a) It is high level programming language. |
a) It is a
high level programming language with the features of low level programming
language. |
b) It is general programming language |
b) It is a system programming language. |
c) It supports limited data type. |
c) It supports wide range of data type. |
d) It supports both sub procedure and
function procedure. |
d) It supports only function procedure. |
208) What is character set?
Ans: The character set consists of
alphabet digit or special symbol used to represent information.
209) What is keyword? List the different keyword of
C.
Ans: Keywords are words whose meaning has
already been explained to the compiler or the computer.
210) List
any four keywords used in 'C' Programming.
Ans: double,
int, for, break are the four keywords used in 'c' programming.
211) What is header file?
Ans: A header file is a standard file that
contains definitions of variables and functions which are necessary for the
functioning of a program.
212) What is identifiers?
Ans: Identifiers can be defined as the
name of the variables, functions, array, structure created by the programmer.
213) What is operator in C?
Ans: Operators are the special symbol that
perform certain action on one and more than one value or variable and generate
the output.
214) List the
different types of operators available in C.
Ans: Following
are the operators supported by C.
·
Arithmetic
operators
·
Relational
operators
·
Logical
operators
·
Unary
operator or Increment and decrement operators
215) What is variable? (SEE 2073)
Ans: The data item whose value changes during the execution of a program is called variable.
216) What is structure programming? Give examples
Ans: Structured programming (sometimes known
as modular programming) is a programming paradigm that facilitates
the creation of programs with readable code and reusable components. Examples:
Pascal and 'C'.
217) Why 'C' is called a structure programming?
Ans: C is called a structured programming language
because to solve a large problem, C programming language divides the problem
into smaller structural blocks each of which handles a particular
responsibility
218) Write any four header files used in 'c'
programming
Ans: Following are the header files used in 'C'
programming.
<stdio.h>, <conio.h>.
<string.h>, <math.h>
219) What is Data type?
Ans: Data types refer to the type of data or
variable which is to be stored and used in the program.
220) What is format specifier?
Ans: Format specifiers can be defined as the
operators which are used in association with printf() function for printing the
data that is referred by any object or any variable.
221) List any four format specifier used in 'C'
programming.
Ans: Following
are the format specifier used in 'C' programming.
int=%d
float= %f
char =%c or %s
222) What is control statement? List its examples.
Ans: Control statements enable us to specify
the flow of program control; ie, the order in which the instructions in a
program must be executed.
Following are the types of control
statements.
·
Selection
/ decision statements (if, switch)
·
Ieration/looping
statement. (for, while)
·
Jumping
statement. (break, continue, return)
223) What is decision statement?
Ans: Decision-making statements are the statements that
are used to verify a given condition and decide whether a block of statements
gets executed or not based on the condition result.
224) What is switch statement in 'c'?
Ans: A switch statement allows a variable
to be tested for equality against a list of values. Each value is called a
case, and the variable being switched on is checked for each switch case.
225) What do you mean by looping? List examples of
looping in 'C'
Ans: A loop statement allows us to execute a
statement or group of statements multiple times.
Examples: for lop, while loop,
do.....while loop
226) What is unary operator?
Ans: Unary operators are those operators which need
only one operand to perform an operation. These operators are usually written
on left of variables or objects but sometimes can be written on right as well. Example: ++,
--
227) What are arithmetic operators? Give examples.
Ans: The Arithmetic operators are some of the C Programming
Operator, which are used to perform arithmetic operations includes operators
like Addition, Subtraction, Multiplication, Division and Modulus. Examples: +,
-, *, /, %
228) What is relational operator? Give examples.
Ans: The symbols which are used to check the
relationship between two variables is known as relational operators.
Example: >, <, ==, <=, >=,
!=
229) What do you mean by logical operators? Give
example.
Ans: Logical
Operators are used to combine two or more conditions/constraints or to
complement the evaluation of the original condition in consideration.
Examples: &&, ||,
!
230) Write the advantages of structure programming.
Ans: Following are the advantages of structure
programming.
·
It
is easy to design code and test the program modules independently.
·
It
is possible to use a single module in different places which reduces program
codes.
231) What
is counter?
Ans: Counter
is a variable which controls the loop statement and provides the track to run
the loop statement in certain number times.
No comments:
Post a Comment