Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Saturday, April 6, 2024

SEE 2080(2024) Computer Science Solutions: Ace Your Exam with Expert Insights

SEE 2080(2024) Computer Science Solutions: Ace Your Exam with Expert Insights

SEE 2080(2024) Computer Science Solutions: Ace Your Exam with Expert Insights


SEE 2080 (2024)

Subject: Opt. II (Computer Science)

Full Marks: 50                                                            Time: 2:00 hrs
Candidates are required to give their answers according to the instructions.

Attempt all the questions.


Group 'A' (10 Marks)

1. Answer the following questions in one sentence: [6×1=6]

a) What is unguided media?

Ans: Unguided media is communication without cables, using things like radio waves and Wi-Fi.

 

b) What is the business done through the mobile?

Ans: The business done though the mobile is m-commerce.

 

c) Which data type is used to store date of birth in MS-Access?

Ans: Date/Time data type is used to store date of birth in MS-Access.

 

d) Write any two elements of database?

Ans: Two elements of database are as follows:

i) Table

ii) Field

 

e) What is modular programming?

Ans: Modular programming is a technique that divides large programs into small independent, interchangeable methods/modules.

 

f) Write any two features of 'C' language.

Ans: Two features of 'C' language are as here under:

i) C is a middle-level language, combining features of both high-level and low-level languages.

ii) It supports a variety of data types and powerful operators for mathematical and logical operations.

 

2. Write appropriate technical term for the following. 2×1=2

a) A secret group of characters used to protect computer system from unauthorized users.

Ans: Password

 

b) An artifical environment created by a computer system that appears real

Ans: Virtual Reality (VR)

 

3. Write the full form of the following: 2×1=2

a. URL: Uniform Resource Locator

b. STP: Shielded Twisted Pair

 

4. Answer the following questions: 9×2=18

a. Define network topology. Sketch a drawing of star topology.

Ans: Network topology is the physical arrangement of elements within a computer network.

 


b. Write any four commandments of computer ethics.

Ans: Following are the four commandments of computer ethics:

i) Do not use computers to harm others.

ii) Respect the privacy of others' information.

iii) Do not use a computer to steal.

iv) Do not copy or use proprietary software for which you have not paid.

 

c. What are the computer security threats? Mention any two measures to protect from security threats.

Ans: Computer security threats include viruses, malware, phishing attacks, ransomware, spyware, and hacking attempts.

Following are the two measures to protect from security threats:

i) Installing and updating antivirus software.

ii) Using strong, unique passwords and regularly changing them.

 

d. What is E-commerce? List any two e-commerce companies in Nepal.

Ans: E-commerce refers to buying and selling goods or services using the Internet.

Following are the two e-commerce companies in Nepal:

i) daraz.com

ii) hamrobazar.com

 

e. Define artificial intelligence with example.

Ans: Artificial intelligence is the ability of machines to perform tasks that typically require human intelligence.

Following are the two examples of AI:

i) Robotics 

ii) Self-driving cars

 

f. What is primary key? Give any two benefits of it.

Ans: A primary key is a unique identifier for each record in a database table.

Following are the two benefits of primary key:

i) Prevents duplicate data.

ii) Improves search and retrieval efficiency.

g. List any four features of MS-Access?

Ans: Following are the four features of MS-Access.

i) We can create a relationship between two or more tables.

ii) MS Access provides a user-friendly interface that allows you to create and manage databases using a drag-and-drop interface.

iii) MS Access includes integrated reporting tools that allow you to create professional-looking reports based on data from one or more tables. 

iv) Implement proper security measures, such as password protection and user permissions, to ensure data confidentiality and integrity.

 

h) Give the difference between the select query and action query.

Ans: Following are the difference between select query and action query.

Select query

Action Query

Used to retrieve data from one or more tables.

Used to modify or move data in a batch operation from one or more tables.

Retrieves and displays data.

Performs operations such as update, delete, append (insert), or make table.

Displays a datasheet view of the results without altering data.

Modifies the data, potentially altering, deleting, or adding records.

Only one type, which is the Select query itself.

Includes Update, Delete, Append, and Make Table queries.

 

 

i) Identify a record and field from the following table structure

Symbol no

Name

Marks

00100202S

Aarambha Shrestha

91

00100203T

Sushisha Rayamajhi

99

 Ans: Field are:

Symbol no

Name

Marks

 Records:

00100202S

Aarambha Shrestha

91

00100203T

Sushisha Rayamajhi

99

 

 5. Write the output of the given program. Show with dry run in table. 2

DECLARE FUNCTION SQN(N)

CLS

S=0

FOR L = 1 TO 3

READ NUM

S=S+SQN(NUM)

NEXT L

PRINT "Sum of square";S

DATA 1,4,5

END

 

FUNCTION SQN(N)

SQN=N^2

END FUNCTION

 

Var. S

L= 1 to 3

Var num

SQN=n^2

S=s+sqn(num)

0

1 TO 3 ? Yes

1

1^2=1

S=0+1=1

 

2 TO 3 ? Yes

4

4^2=16

S=1+16=17

 

3 TO 3 ? Yes

5

5^2=25

S=17+25=42

 

4 TO 3 ? No

Exit from loop

 

 

 

 Final Output:

Sum of square 42

 

6. Re-write the given program after correcting the bugs: 2

DECLARE SUB square (a)

REM to print square of a input number

CLS

GET "Enter a number";n

square(n)

END

 

SUB square (a)

sq=a^4

Display "square of a number is";sq

END SUB

 

Debugged program:

DECLARE SUB square (a)

REM to print square of a input number

CLS

INPUT "Enter a number";n

CALL square(n)

END

 

SUB square (a)

sq=a^2

PRINT "square of a number is";sq

END SUB

 

7. Study the following program and answer the given questions: 2×1=2

DECLARE FUNCTION count(w$)

INPUT "Ente a word";r$

c=count(r$)

PRINT c

END

 

FUNCTION count(w$)

FOR L=1 TO LEN(w$)

ch$=MID$(w$,l,1)

IF UCASE$(ch$)="K" THEN

n=n+1

ENDIF

NEXT l

count = n

END FUNCTION

a. List any two library function used in the above program.

Ans: i) MID$, ii) LEN

b. Write the use of variable 'c' in line 3 [i.e. c=count(r$)] given in the above program.

Ans:  This line is used to calling function and the variable c is used to store the result returned by the count function.

 

8. Convert/Calculate as per the instructions: 4×1=4

i) (ABC)16 into (?)8  

Hexadecimal number:             A         B         C

4 bit of binary:                        1010  1011  1100

Group of 3 bit of binary:         101 010 111 100

Equivalent Octal number:       5    2      7    4

(ABC)16 into (5274)8  

 

ii) (435)10 =(?)2

Division

Quotient

Remainder

(Digit)

435/2

217

1

217/2

108

1

108/2

54

0

54/2

27

0

27/2

13

1

13/2

6

1

6/2

3

0

3/2

1

1

1/2

0

1

 (435)10 =(110110011)2

 

iii) 101×101    

 


101X101=11001

iv)  101101÷101

 


Dividend: 101101

Divisor: 101

Quotient: 1001

Reminder: 0

101101 /101=1001


9.a) Write a program in Qbasic that asks length, breadth, and height of room and calculate its area and volume. Create a user defined function to calculate area and Sub Program to calculate the volume. [Hints: area=l×b and volume=l×b×h]   4

Ans:

DECLARE FUNCTION area(l,b)

DECLARE SUB volume(l,b,h)

CLS

INPUT "Enter length, breadth and height";l,b,h

PRINT area(l,b)

CALL volume(l,b,h)

END

 

FUNCTION area(l,b)

area=l*b

END FUNCTION

 

SUB volume(l,b,h)

v=l*b*h

PRINT "Volume=";v

END SUB

 

 b) Employee's name, address, gender and salary are stored in the "EMP.DAT" sequential data file. Write a QBASIC program that display all information about personal whose salaries exceed 60000         4

Ans:

CLS

OPEN "EMP.DAT" FOR INPUT AS #1

DO WHILE NOT EOF(1)

INPUT #1, name$,add$,g$,s

IF s>60000 THEN PRINT name$,add$,g$,s

LOOP

CLOSE #1

END

 

 10. Write a program in C language to find simple interest where user need to input principal, rate, and time.        4

#include<stdio.h>

int main()

{

            float p,t,r,si;

            printf("Enter principal:");

            scanf("%f",&p);

            printf("Enter time:");

            scanf("%f",&t);

            printf("Enter rate:");

            scanf("%f",&r);

            si=p*t*r/100;

            printf("Simple interest:%f",si);

            return 0;

}

OR

Write a program in 'C' language to display the series with their sum. 1,2,3,4,….up to 10th term.      4

#include<stdio.h>

int main()

{

            int x,sum=0;

            for(x=1;x<=10;x++)

            {

                        printf("%d\n",x);

                        sum=sum+x;

            }

            printf("Sum=%d",sum);

            return 0;

}


You may also Read:

No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages