SEE 2080(2024) Computer Science Solutions: Ace Your Exam with Expert Insights
Full Marks:
50
Time: 2:00 hrs
Candidates are required to give their answers according to the instructions.
Attempt all the
questions.
Group 'A' (10 Marks)
1. Answer the following
questions in one sentence: [6×1=6]
a) What is unguided
media?
Ans: Unguided media is communication without cables, using things
like radio waves and Wi-Fi.
b) What is the business
done through the mobile?
Ans: The business done though the
mobile is m-commerce.
c) Which data type is
used to store date of birth in MS-Access?
Ans: Date/Time data type
is used to store date of birth in MS-Access.
d) Write any two
elements of database?
Ans: Two elements of database are
as follows:
i)
Table
ii)
Field
e) What is modular
programming?
Ans: Modular programming is a technique that divides large
programs into small independent, interchangeable methods/modules.
f) Write any two
features of 'C' language.
Ans: Two features of 'C' language
are as here under:
i) C is a middle-level language, combining
features of both high-level and low-level languages.
ii) It supports a variety of data types and
powerful operators for mathematical and logical operations.
2. Write appropriate technical
term for the following. 2×1=2
a) A secret group of
characters used to protect computer system from unauthorized users.
Ans: Password
b) An artifical
environment created by a computer system that appears real
Ans: Virtual Reality
(VR)
3. Write the full form of the following: 2×1=2
a. URL: Uniform Resource Locator
b. STP: Shielded
Twisted Pair
4. Answer the following
questions: 9×2=18
a. Define network
topology. Sketch a drawing of star topology.
Ans: Network topology is the physical arrangement of elements
within a computer network.
b. Write any four
commandments of computer ethics.
Ans: Following are the four
commandments of computer ethics:
i) Do not use computers to harm others.
ii) Respect the privacy of others' information.
iii) Do not use a computer to steal.
iv) Do not copy or use proprietary software for
which you have not paid.
c. What are the computer
security threats? Mention any two measures to protect from security threats.
Ans: Computer security threats include viruses, malware, phishing
attacks, ransomware, spyware, and hacking attempts.
Following are the two measures to protect from
security threats:
i) Installing and updating antivirus software.
ii) Using strong, unique passwords and regularly changing them.
d. What is E-commerce? List
any two e-commerce companies in Nepal.
Ans: E-commerce refers
to buying and selling goods or services using the Internet.
Following are the two
e-commerce companies in Nepal:
i) daraz.com
ii) hamrobazar.com
e. Define artificial
intelligence with example.
Ans: Artificial intelligence is the ability of machines to perform
tasks that typically require human intelligence.
Following are the two examples of AI:
i) Robotics
ii) Self-driving cars
f. What is primary key?
Give any two benefits of it.
Ans: A primary key is a unique identifier for each record in a
database table.
Following are the two
benefits of primary key:
i) Prevents duplicate data.
ii) Improves search and retrieval efficiency.
g. List
any four features of MS-Access?
Ans: Following
are the four features of MS-Access.
i) We
can create a relationship between two or more tables.
ii) MS Access provides a user-friendly interface that allows you
to create and manage databases using a drag-and-drop interface.
iii) MS Access includes integrated reporting
tools that allow you to create professional-looking reports based on data from
one or more tables.
iv) Implement
proper security measures, such as password protection and user permissions, to
ensure data confidentiality and integrity.
h) Give
the difference between the select query and action query.
Ans: Following are the difference
between select query and action query.
Select query |
Action Query |
Used
to retrieve data from one or more tables. |
Used
to modify or move data in a batch operation from one or more tables. |
Retrieves
and displays data. |
Performs
operations such as update, delete, append (insert), or make table. |
Displays
a datasheet view of the results without altering data. |
Modifies
the data, potentially altering, deleting, or adding records. |
Only
one type, which is the Select query itself. |
Includes
Update, Delete, Append, and Make Table queries. |
i) Identify
a record and field from the following table structure
Symbol
no |
Name |
Marks |
00100202S |
Aarambha
Shrestha |
91 |
00100203T |
Sushisha
Rayamajhi |
99 |
Symbol
no |
Name |
Marks |
00100202S |
Aarambha
Shrestha |
91 |
00100203T |
Sushisha
Rayamajhi |
99 |
5. Write the output of the given program. Show with dry run in table. 2
DECLARE FUNCTION SQN(N)
CLS
S=0
FOR L = 1 TO 3
READ NUM
S=S+SQN(NUM)
NEXT L
PRINT "Sum of
square";S
DATA 1,4,5
END
FUNCTION SQN(N)
SQN=N^2
END FUNCTION
Var. S |
L= 1 to 3 |
Var num |
SQN=n^2 |
S=s+sqn(num) |
0 |
1 TO 3 ? Yes |
1 |
1^2=1 |
S=0+1=1 |
|
2 TO 3 ? Yes |
4 |
4^2=16 |
S=1+16=17 |
|
3 TO 3 ? Yes |
5 |
5^2=25 |
S=17+25=42 |
|
4 TO 3 ? No Exit from loop |
|
|
|
Final Output:
Sum of square 42
6. Re-write the given
program after correcting the bugs: 2
DECLARE SUB square (a)
REM to print square of a
input number
CLS
GET "Enter a
number";n
square(n)
END
SUB square (a)
sq=a^4
Display "square of
a number is";sq
END SUB
Debugged program:
DECLARE SUB square (a)
REM to print square of a
input number
CLS
INPUT "Enter a
number";n
CALL square(n)
END
SUB square (a)
sq=a^2
PRINT "square of a
number is";sq
END SUB
7. Study the following
program and answer the given questions: 2×1=2
DECLARE FUNCTION count(w$)
INPUT "Ente a
word";r$
c=count(r$)
PRINT c
END
FUNCTION count(w$)
FOR L=1 TO LEN(w$)
ch$=MID$(w$,l,1)
IF
UCASE$(ch$)="K" THEN
n=n+1
ENDIF
NEXT l
count = n
END FUNCTION
a. List any two library
function used in the above program.
Ans: i) MID$, ii) LEN
b. Write the use of
variable 'c' in line 3 [i.e. c=count(r$)] given in the above program.
Ans: This line is
used to calling function and the variable
c
is used to store the result returned by the count
function.
8. Convert/Calculate as
per the instructions: 4×1=4
i) (ABC)16
into (?)8
Hexadecimal number: A B C
4 bit of binary: 1010 1011 1100
Group of 3 bit of
binary: 101
010 111 100
Equivalent Octal number:
5
2 7 4
(ABC)16 into
(5274)8
ii) (435)10 =(?)2
Division |
Quotient |
Remainder (Digit) |
435/2 |
217 |
1 |
217/2 |
108 |
1 |
108/2 |
54 |
0 |
54/2 |
27 |
0 |
27/2 |
13 |
1 |
13/2 |
6 |
1 |
6/2 |
3 |
0 |
3/2 |
1 |
1 |
1/2 |
0 |
1 |
(435)10 =(110110011)2
iii) 101×101
iv) 101101÷101
Dividend: 101101
Divisor: 101
Quotient: 1001
Reminder: 0
101101 /101=1001
9.a) Write a program in Qbasic that asks length, breadth, and height of
room and calculate its area and volume. Create a user defined function to
calculate area and Sub Program to calculate the volume. [Hints: area=l×b and
volume=l×b×h] 4
Ans:
DECLARE
FUNCTION area(l,b)
DECLARE
SUB volume(l,b,h)
CLS
INPUT "Enter
length, breadth and height";l,b,h
PRINT area(l,b)
CALL volume(l,b,h)
END
FUNCTION area(l,b)
area=l*b
END FUNCTION
SUB volume(l,b,h)
v=l*b*h
PRINT
"Volume=";v
END SUB
b) Employee's name, address, gender and salary are stored in the "EMP.DAT" sequential data file. Write a QBASIC program that display all information about personal whose salaries exceed 60000 4
Ans:
CLS
OPEN
"EMP.DAT" FOR INPUT AS #1
DO
WHILE NOT EOF(1)
INPUT
#1, name$,add$,g$,s
IF s>60000
THEN PRINT name$,add$,g$,s
LOOP
CLOSE
#1
END
10.
Write a program in C language to find simple interest where user need to input
principal, rate, and time. 4
#include<stdio.h>
int
main()
{
float p,t,r,si;
printf("Enter
principal:");
scanf("%f",&p);
printf("Enter time:");
scanf("%f",&t);
printf("Enter rate:");
scanf("%f",&r);
si=p*t*r/100;
printf("Simple
interest:%f",si);
return 0;
}
OR
Write a
program in 'C' language to display the series with their sum. 1,2,3,4,….up to
10th term. 4
#include<stdio.h>
int
main()
{
int x,sum=0;
for(x=1;x<=10;x++)
{
printf("%d\n",x);
sum=sum+x;
}
printf("Sum=%d",sum);
return 0;
}
No comments:
Post a Comment