CDC MODEL QUESTION + NEEMA PUBLICATION
2071 + PABSON, NPABSON, SOS, JEC, SEDIPS 2070 + SLC 2065 TO 2070 AND SLC
SUPPLEMENTARY 2065 TO 2069 SOLUTIONS!!!!
CDC Model Question 2065
1. Define computer
network.
Ans: The
interconnection of two or more than two computers by the means of transmission
medium like cables or without cables in order to share data, software,
applications and other resources is known as computer network.
2. What is
internet and email?
Ans: The
interconnection of several thousands of computers of different type belonging
to various networks all over the world is known as internet.
E-mail is one of the most popular services of internet
which helps to transmit data, text files, and digital photos, audio or video
files from one computer to another over the internet.
3. Write down
any four application areas of multimedia.
Ans: The
four application areas of multimedia are:
·
Adding special effects in movies
·
Video games
·
Public Accessing
·
Animated Advertisement
4. List any four measures
to protect computer software.
Ans: The
four measures to protect computer software are:
·
Backup
·
Password
·
Defragmentation
·
Scan disk
5. How can we protect computer from
computer virus?
Ans: We
can protect computer from virus by the following ways:
·
Install a powerful anti-virus program and
update its virus definition file frequently.
·
Do not use pirated software.
·
Do not open suspicious emails and
attachment file sent by unknown persons.
·
Do not use free distributed software.
6. What is a DBMS?
Ans: DBMS
is software that is used to manage data, manipulate them and provide the
information to the user.
7. Make a list of
any four types of data used in MS-Access.
Ans: A
list offour data types of MS-Access are:
·
Text
·
Memo
·
Currency
·
Date/Time
8. Define query.
Ans: Query
is an object of MS-Access that is used to extract information from one or
multiple linked tables.
9. What is
user-defined function?
Ans: The
functions which are defined by the user according to his/her need are known as
user-defined function.
10. Write down the function of:
Ans: The
functions of:
·
KILL:
The function of KILL statement is to delete one or more files from the
diskette.
·
MKDIR:
The function of MKDIR is to create a sub-directory which is used to manage
files.
Neema Publication Set 1
a) List out any four
reasons of using computer network.
Ans: The four reasons of using the computer network are as follows:
·
To share hardware devices like printer,
hard disk, scanner, etc.
·
To share the different software packages.
·
To exchange information rapidly in the
computer network.
·
To access updated data by all computers of
the network.
b) How does virus
spread from one computer to another?
Ans: Virus
spread from one computer to another by following ways:
·
Downloading files or programs from websites
which are not secured.
·
Opening of the virus infected e-mail,
message and attached files.
·
Using pirated software.
·
Sharing of infected external portable disks
like floppy disk, pen drive or CD.
c) List any
four media used in multimedia technology.
Ans: The four media used in multimedia technology are as follows:
i) Audio ii)
Animation iii)
Video iv)
Graphics
d) Define
the term computer security. Also mention the technique to protect data from the
virus.
Ans: Computer
security refers to the security given to the computer for the protection of
data, application, software and hardware from being lost or damaged due to
accidental or intentional harm.
The technique to protect data from viruses is to use
antivirus software.
e) Mention
advantages and disadvantages of e-mail.
Ans: The
advantages of e-mail are as follows:
·
It is fast, economic and instant
communication media.
·
Any form of data like text, pictures, audio
or video can be sent through e-mails.
·
The disadvantages of e-mail are as follows:
·
Minor mistakes in e-mail address may
deliver the mail to a wrong address.
·
Since, it may passes through a vast
electronic network. It may be seized in between.
7. a) Write any four features of DBMS.
Ans: The
four features of DBMS are as follows:
·
It controls data redundancy which means
duplication of data.
·
It maintains accurate database.
·
It allows sharing the existing database by
different programs.
·
It allows updating large volume of data as
the specified conditions.
b) What is
filtering? Write a difference between sorting and filtering.
Ans: Filtering
is an option that selects the required records and displays the result.
The differences
between filtering and sorting are as follows:
Sorting
|
Filtering
|
The arrangement of reords on the basis of a field or
group of fields of a table either in ascending or descending order is known
as sorting.
|
The process of viewing required records of a table
that satisfies the specified criteria is known as filtering records.
|
c) Define
query. Write its importance in database.
Ans: Query
is a database object that creates a datasheet of selected fields and records
from one or more tables.
Its importance in database is as follows:
·
To view records including some fields or
all the fields of a table or multiple linked table.
·
To perform mass update, delete or append
new records to a table.
10. a) Write
any two advantages and disadvantages of modular programming.
Ans: The two advantages of modular programming are as follows:
·
Different programmers can design program
modules independently.
·
It is easy to design code and test the
program modules independently.
The disadvantages
of modular programming are as follows:
- can
lead to problems with variable names
- can
lead to problems when modules are linked because link must thoroughly
tested
b) Give any
two features of C-language.
Ans: The features of C-language are as follows:
i) It is specially used to create
system software.
ii) It supports a rich and powerful set of
operators.
c) Write down
the functions of following statements:
i) KILL: It
is used to delete the specified file from a disk
ii) NAME
AS: It is used to rename the file of a diskette.
Neema Publication Set 2
a. How does
computer network reduces cost of operation?
Ans: Computer network reduces cost of operation because it allows sharing of
resources like hardware ,software and services. For example a printer or one
internet connection can be shared by all users of a network. In this way it
helps to save the cost of buying extra hardware or service. Problems can be
solved by one or few experts from one place. This saves the cost of hiring
experts for all the branches of the office and the cost of travel by the expert
to different branches.
b. Define the
term internet. List out any two services provided by the internet.
Ans: Internet can be defined as the interconnection of several thousands of
computers belonging to various networks all over the world.
any two services
provided by the internet are as follows:
·
e-commerce
·
IRC(internet
relay chat)
c. Define
computer security. List out any two measures to protect computer.
Ans: Computer security can be defined as the security given to the data,
software and the hardware for their protection from being lost or damaged due
to accidental or intentional harm.
two measures to
protect computer are:
·
password
·
insurance
policy
d. What are
the reasons of making computer viruses? Explain
Ans: The reasons of making computer viruses are:
·
to
stop software piracy
·
to
entertain users by displaying interesting messages and pictures
·
to
steal data and information
·
to
expose the programmers ability
·
to
earn money
e. What is
cyber law? List any two subjects included in cyber law.
Ans: The law which governs the legal issues in the cyber space regarding the
internet or www for digital data processing wand transaction is known as cyber
law.
Two subjects
included in cyber law are:
·
Electronic
and digital signature law
·
intellectual
property law
1. Name any
four objects of Access.
Ans: Any four objects of access are:
·
table
·
form
·
report
·
query
2. What is form?
Mention any two methods to create form.
Ans: form is a database object used primarily to display records on screen to
make it easier to enter new records and to make changes to the existing
records.
Its importance is:
·
using
auto form features
·
using
form wizard features
3.
Differentiate between data and information.
Ans: The
differences between data and information are:
Data
|
Information
|
Data
can be letters, numbers, or symbols representing facts and figures, which may
or may not give complete sense.
|
Information
is an organized collection of related data, which gives a complete sense.
|
For
example:- Ram, student, 20,
|
For
example: Ram is a student. He is 20 years old.
|
1. Differentiate
between inbuilt function and user defined function.
Ans: The
differences between inbuilt function and user defined function are:
In-built
function
|
User-defined
function
|
The
functions provided by the QBASIC system which are used by the programmer
according to the requirement are known as in-built function.
|
The
functions written by the programmers to do specific task is known as
user-defined function.
|
For
Example: LEN, LEFT$, MID$ etc
|
For
example|: Function written by using FUNCTION-END FUNCTION OR SUB-END SUB
|
2. Write any two
data types used in C language.
Ans: Any
two data types used in C language are:
·
char
·
int
3. Write down the
function of MKDIR and CLOSE statement.
Ans: The
functions of:
·
MKDIR: The
function of MKDIR is to create a sub-directory which is used to manage files.
·
CLOSE: The
function of CLOSE is to close one or all open file from the diskette.
Model Set 3
1. What is meant by
data communication? Explain with any two examples.
Ans: A
data communication is the collection of hardware, software and other devices in
order to exchange data, information and voice between two or more than two
devices through a bounded or unbounded media.
The two examples of data communication re:
·
E-mail
·
Chat
2. Differentiate
between chat and email clearly.
Ans: The
differences between chat and email are:
Chat
|
e-mail
|
We
can send and receive instant meddase with other in real time.
|
There
is no need to send instant message. The user can read, reply or ignore the
message according to his/her wish.
|
3. Write any
four ways of protecting computer from viruses.
Ans: The
four ways of protecting computer from viruses are:
·
Install a powerful anti-virus program to
protect and update its virus definition file frequently.
·
Do not use the pirated software.
·
Do not open suspicious emails and
attachments files send by the unknown person.
·
Do not use freely distributed software.
4. How
can multimedia help in education field?
Ans: Multimedia
can help in education field in the following ways:
·
It makes presentation of the related
subject matter attractive.
·
It makes teaching-learning easier in
classroom.
·
Presentation can be done in a big screen so
that many students can see it.
·
It makes easy to share views, thoughts and
ideas among students.
5. What is
meant by computer security? List out any four software security measures.
Ans: The
security given to the computer for the protection of computer hardware,
software and other resources from being lost or damaged due to accidental or
intentional harm is known as computer security.
Any four software security measures are:
·
Defragmentation
·
Scan disk
·
Backup
·
Password
6. Differentiate
between text and memo.
Ans: The
differences between text and memo are:
Text
|
Memo
|
It
is used for storing text or combination of text and numbers.
|
It
is used for storing lengthy text and numbers.
|
It
can store up to 255 characters.
|
It
can store up to 65,535/64000 characrers.
|
7. Write
any four advantages of DBMS.
Ans: Any
four advantages of DBMS are:
·
It controls redundancy which means
duplication of data.
·
Large volume of data can be stored and
updates easily.
·
It allows sharing the existing database by
different programs.
·
It provides high security of data and
resources as well as maintains accurate database.
8. What
do you mean by formatting a table?
Ans: The
process of changing column width, row height, hiding columns or changing fonts,
font size, font style of data of a table and table border, etc. is known as
formatting a table.
9. Differentiate
between function and sub procedure.
Ans: The
differences between sub procedure and function procedure are:
Sub
procedure
|
Function
procedure
|
it
doesnot return any value.
|
It
must return a value.
|
It
is enclosed inside SUB……….END SUB.
|
It
is enclosed inside FUNCTION…………END FUNCTION.
|
10. How many
keywords are in C language?
Ans: There
are 32 keywords in C language.
11. Write down the
function of RMDIR and FILES statement.
Ans: The
function of :
·
RMDIR: The
function of RMDIR is to remove empty sub-directory.
·
FILES: The
function of FILES is to display all the files from the diskette.
Model Questions 4
Answer the
following.
a) What is
LAN?List out the types of LAN topologies.
Ans: A LAN is a network of computers that are relatively near to each
other and are connected in a way that enables them to communicate by cable and
a small wireless device.
The types of LAN
topologiesare :
·
Bus Topology
·
Star Topology
·
Ring Topology
b) How does Internet
differ from Intranet? Explain.
Ans: Internet differs from Intranet as Internet is the interconnection
of several thousands of computers of different types belonging to various
networks all over the world whereas Intranet is a private computer network that
uses the internet protocol to securely share any part of information of
organization.
c) What are
the precautions to protect data from viruses?
Ans: The precautions are:
·
Do not download files and programs from the
websites without scanning
·
Use properly working antivirus software
·
Do not exchange internal disk among
computers
·
Scan the mail or unknown files of Internet
before opening in your computer
d) How do you
know that your computer is infected from viruses?
Ans: We can know our computer is infected from viruses when:
·
Programs take a long time to load
·
Unusual increase of the disk
space and grow in file size
·
Corrupting the system’s data takes place
·
Renaming of files with different names
What are the
requirements of multimedia computer system?
Ans: The requirements are:
·
Computer
·
Software (WMP,Adobe Photoshop,etc.)
·
CD-ROM/DVD drive
·
Sound card
·
Microphone
·
Speaker
Group ‘B’
a) What is
primary key? Give its importance.
Primary key
is a field that uniquely identifies the record.
Its importance is:
1) Controls data
redundancy and makes the record unique.
2) It sets
relationship among the tables.
b)
Differentiate between “format” and “input mask”.
The
differences between format and input mask are given below.
Input
mask
|
Format
|
The
input mask field property specifies a pattern for all data to be entered in a
field.
|
The
format field property specifies the layout for a field i.e. appearance of
value when displayed.
|
This
enables to control the manner in which data is entered in a field.
|
This
field property only changes the appearance of the data on the screen but
actually doesn’t change the way how the data is stored in the field.
|
c) Write the
importance of computerized database system in comparison to non-computerized
database system.
Ans: The importance of computerized database in comparison
to non-computerized database is that it can store large volume of data and
information, and is very fast to find specific record. Data can be sorted in
ascending or descending order on multiple criteria and datas can also be kept
secure in this system.
Group C
a) Write the
syntax and example of SUB…END SUB statement.
Ans: Syntax:
SUB {sub program name }(parameter list)
<Statement block>
END SUB
Example:
SUB sum (A, B)
S=A+B
PRINT S
END SUB
b) Write a feature
of C language.
Ans: The features of C language are:
·
It is used to prepare system software.
·
It has rich and powerful set of operators.
c) Write the
function of :
·
OPEN-
It opens a sequential file for one of the three operations i.e. appending, writing,
reading.
·
LINE INPUT# -
It reads the entire line or maximum 255 characters from the keyboard or from
the sequential file up to a carriage return.
Model set 5
1. Answer
the following questions.
a. In
what way does the client server network differ from peer to peer network?
Explain
Ans: The difference between client server and peer to peer network are as
follows:-
Client
Server
|
Peer
to Peer
|
It
consists of at least one or more clients.
|
It
is a group of computers in which each computer act both as client and server.
|
It
provides centralized network administration.
|
It
lacks centralized network administration.
|
It
provides high reliable security of data and resources.
|
It
lack proper security of data and resources.
|
It
is suitable for large organizations.
|
It
is suitable for small office and homes.
|
b. Differentiate
between Email and EFax.
Ans: The difference between E-mail and E-fax are given
below.
E-mail
|
E-fax
|
E-mail
is one of the popular services of Internet which allows exchange of
information and computer files between computers over a network using
Internet.
|
It
is the service of Internet through which user can send and receive faxes
directly from a computer to another.
|
c. What is a backup? Why backups
play a vital role in computer security.
Ans: Backup is the system of copying data and programs into another location
or creating a duplicate copy of a file.
Backups are vital
to computer security because it saves data and programs from being lost or
damaged due to accidental or intentional harm. When data and programs get lost,
we can recover from backup.
d. Why IT policy is
important in our country. Explain.
Ans: IT
policy is important because IT plays a vital role to build up knowledge based
society and boost up the economic condition of any country.
For example we can take importance of IT policy in Nepal. Such as, IT policy is
needed for Nepal to provide the general people access to IT to make knowledge
based society to established knowledge based industry and to change the
economic conditions of people.
e. What do you mean by virtual reality?
Ans: Virtual
reality is an artificial environment created with computer hardware and
software and presented to the user in such a way that it appears real.
7. Answer the following.
a. Define Query.
Mention the method to create query.
Ans: Query
is an object of MS access that selects specific data from a table or multiple
linked tables.
The methods to create query:-
·
Using design view.
·
Using wizard
b. What
is database? Explain with examples.
Ans: Database
is the collection of related and organized information that is used to store,
organize and extract data.
For examples: -dictionary, telephone directory.
c. What is data type? List any four data
types in MS access.
Ans: Data
type is an attribute for a field that determines what type of data it can
contain.
The four data
types are:-
·
Text
·
Memo
·
Currency
·
Date/Time
1. Write down the
syntax of FUNCTION……END FUNCTION.
Ans: The syntax of FUNCTION…….END FUNCTION is:
FUNCTION Function
name (Parameter list)
Function Name=Expression
END FUNCTION
2. What is
identifier in C language?
Ans: An
identifier is a combination of alphanumeric character, the first being the
letter of alphabet or an underline and the remaining being any letter of the
alphabet, any numeric digit, or the underline.
3. Write down the
function of:
·
WRITE#: The function of WRITE# is to
send one or more data items to the specified file.
·
CLOSE#: The function of CLOSE# is to
close one or all open file.
Model Set 6 (PABSON 2070)
1. What is communication
media? List any two advantages of client-server network model.
Ans: A communication media is a channel through which
data/ signals can be transmitted from one point to another.
Any two advantages
of client/server network model are:
·
It provides high level of security, since
only the authorized person gets access to the service of the network.
·
The controlling and managing of workstation
computers are done by powerful centralized server computer. So, administration
work becomes easier.
2. What is internet? List nay
two advantages of email.
Ans: The interconnection of million thousands of
computers of different types belonging to various networks all over the world
is known as internet.
The advantages of
email are:
·
It is fast, economic and instant
communication media.
·
Any form of data like text, image, audio,
or video can be sent through e-mail.
3. List any four advantages of
multimedia.
Ans: The four advantages of multimedia are:
·
It makes easy to share views, ideas and
thoughts among various people around the world.
·
It can store the data and information for a
long period.
·
It is very cheap to get the knowledge about
the related subject matter in a short time through multimedia.
·
It makes the presentation of the related
subject matter attractive.
4. What is the role of UPS in the
computer security?
Ans: The role of UPS is to control the
fluctuation of electric voltage and provide enough backup electric power to the
computer system when there is power failure so important data or files can be
stored and computer can be turned off properly.
5. List any four preventive
measures for protecting computer from computer viruses.
Ans: Any four preventive measures of protecting
computer from computer virus are:
·
Install a powerful anti-virus program to
protect and update its virus definition file frequently.
·
Do not use the pirated software.
·
Do not open suspicious emails and attachments
files send by the unknown person.
·
Do not use freely distributed software.
6. List any four advantages of DBMS.
Ans: Any four advantages of DBMS are:
·
It controls redundancy which means
duplication of data.
·
Large volume of data can be stored and updates
easily.
·
It allows sharing the existing database by
different programs.
·
It provides high security of data and
resources as well as maintains accurate database.
7. What is a field? List any two uses
of primary key.
Ans: A field is a column in a table that
contains a specific piece of information within a record.
The two uses of
primary key are:
·
To stop duplication of the records in a
table.
·
To set relationship between tables.
8. What is a query? List any two
uses of form in MS Access.
Ans: Query is an object of MS-Access that is
used to extract information from a table or multiple linked tables.
The Uses of for in
MS-Access are:
·
It displays one complete record at a time.
SO, using a form, data of a table can be easily edited.
·
It allows designing the layout of fields on
the screen in any arrangement.
9. What is a local
variable?
Ans: Those variables which are not visible to
other modules or function and are declared inside a function is known as local
variable.
10.
List any two similarities of QBASIC and C language.
Ans: The two similarities of QBASIC and C
language are:
·
Both of them use high level language.
·
Both supports local and global variable.
11. Write the function of FILES and
EOF function.
Ans: The functions of:
·
FILES: The function of FILES is to display all the
files from the diskette.
·
EOF(): The function of EOF() is to detect the End
of File marker reading from an open sequential file.
Model Set 7(NPABSON
2070)
1. What is
telecommunication? List any two elements of telecommunication.
Ans: A system of transmission of sounds, images,
text or data in the form of electronic signals is known as telecommunication.
Any two elements of
telecommunication are:
·
A transmitter that takes information and
converts it to signal.
·
A transmission medium that carries the
signal.
2. Write any two advantages of email
service of internet.
Ans: The two advantages of e-mail service of the
internet are as follows:
·
It is fast, economic and instant
communication media.
·
Any form of data like text, image, audio,
or video can be sent through e-mail.
3. What is hardware security? Suggest
any two techniques for securing computer hardware.
Ans: The security given to the computer hardware
tools and equipment’s from being lost or damages due to accidental or
intentional harm is known as hardware security.
The techniques for securing computer hardware
are:
·
Insurance Policy
·
Power Protection Device
·
Protection from Dust and Extreme
Temperature.
·
Regular maintenance
4. What is
multimedia?
Ans: The
integration of several form of media such as text, image, audio, video and
animation in order to present the data and information in more interactive and
attractive way is known as multimedia.
5. What is a
computer virus? Five an objective of developing a computer virus.
Ans: The
type of computer program written by the computer programmer with the intent of
damaging and destroying the data and resources located in the computer memory
are known as computer viruses.
The objectives of developing computer virus are:
·
To stop computer piracy.
·
To entertain user by displaying interesting
messages or pictures.
·
To destroy data, information and files.
·
To expose the programmers ability.
·
To earn money.
6. List any two
functions of DBMS.
Ans: The
two functions of DBMS are:
·
It controls redundancy which means
duplication of data.
·
Large volume of data can be stored and
updates easily.
7. List out any four objects of MS-Access.
Ans: The
four objects of MS-Access are:
·
Table
·
Form
·
Query
·
Report
8. Why is
report created?
Ans: Reports
are created in order to:
·
Present the data and information from
tables or query in a flexible layout.
·
Present data in printed format.
9. What
is user defined function?
Ans: The
function that is defined by the user according to his/her need in order to
fulfill specific task is known as user-defined function.
10. List out
any two numerical data type of C language.
Ans: The
two numeric data types of C language are:
·
int
·
char
11. Write
down the function of KILL and OPEN statement.
Ans: The
function of:
·
KILL: The
function of KILL statement is to delete the file or files from the specified
drive and directory.
·
OPEN: The
function of OPEN statement is to open a sequential file one of the three
possible operations, i.e. INPUT, OUTPUT or APPEND.
Model
Set 8 (JOINT EXAMINATION COMMITTEE 2070)
1. Define
ring topology with figure.
Ans: The
topology in which computers are connected in the shape of circle without any
end points is known as ring topology.
The figure of ring topology is:

2. What
is a browser? Write any one difference between upload and download.
Ans: A
computer program that access web pages and displays them on the user’s screen
is known as web browser.
One difference between upload and download are:
Upload
|
Download
|
Upload
refers to the process of copying files or documents or programs or data from
the user computer to the internet.
|
Download
refers to the process of copying data or programs or files or documents from
the internet to users computer.
|
3. Name
any two media used in multimedia technology. What is digital signature?
Ans: Any
two media used in multimedia are:
·
Text
·
Audio
Digital signature is a security mechanism system in the
cyberspace for digital data processing and transaction.
4. What do you
mean by backup? Write any two ways to protect hardware.
Ans: A
copy of a file that is used in the place of original file being corrupted is
known as backup.
Any two ways to protect computer hardware are:
·
Regular maintenance
·
Insurance Policy
5. How can we
confirm that the computer is virus infected? What measures can be adopted to
protect computer from virus?
Ans: We
can confirm that computer is virus infection by the following ways:
·
Program takes long time to load.
·
The floppy disk or hard disk is suddenly
accessed without a logical reason.
·
Increased use of disk space and growth in
file size.
·
Renaming the files and folders without the
knowledge of the user.
·
The measures that can be adopted to protect
computer from viruses are:
·
Install a powerful anti-virus program to
protect and update its virus definition file frequently.
·
Do not use the pirated software.
·
Do not open suspicious emails and
attachments files send by the unknown person.
·
Do not use freely distributed software.
6. What
is DBMS? Write any two examples of DBMS software.
Ans: DBMS
is a software that is used to manage data, manipulate them and provide the
information.
The two examples of DBMS are:
·
MS-Access
·
Oracle
7. What is
meant by data sorting? What is a record?
Ans: Data
sorting means grouping all the records either in ascending or descending order
based on a key field of the record.
Record is a row in a table that contains information
about a given person, product or event.
8. What is
form? Write any two advantages of using form.
Ans: Form
is an object of MS-Access that provides user friendly interface to enter data
in a table or multiple linked tables.
The two advantages of using form are:
·
It provides a user-friendly platform for
input of data into the database.
·
It helps to display data in more
presentable form than a datasheet.
9. What is mean by
local variable?
Ans: Those
variables which are not visible to other modules or function and are declared
inside a function is known as local variable.
10. Write any
two data types supported by C language.
Ans: The
data types supported by C language are:
·
int
·
char
·
float
·
double
11. Write down the function of Name and
Kill statement.
Ans: The
function of:
·
NAME: The
function of NAME is to rename a file or group of files from the diskette.
·
KILL: The
function of KILL statement is to delete the file or files from the specified
drive and directory.
Model
Set 9 (SEDIPS 2070)
1. What
is network protocol? Give any two examples of protocols belongings to TCP/IP
family.
Ans: A
set of rules that must be followed by sender and receiver to make communication
possible is known as network protocol.
Two examples of protocols belonging to TCP/IP family
are:
·
FTP(File Transfer Protocol)
·
HTTP(Hyper Text Transfer Protocol)
2. Mention any four
symptoms of computer virus.
Ans: Any
four symptoms of computer virus are:
·
Program takes long time to load.
·
The floppy disk or hard disk is suddenly
accessed without a logical reason.
·
Increased use of disk space and growth in
file size.
·
Renaming the files and folders without the
knowledge of the user.
3. What do you mean
by cyber law? When was cyber law of Nepal introduced?
Ans: The
law which governs the legal issue in the cyberspace regarding the Internet or
WWW for digital data processing and transaction is known as cyber law.
Cyber law was introduced in Nepal on 30stBhadra
2061 B.S. (15th September 2004 A.D.)
4. What is
interactive multimedia? List any two interactive multimedia?
Ans: Interactive
multimedia is the integration of several forms of media such as text, audio,
video, graphics and animation that is used to display information in more
attractive and understandable way.
Any two interactive multimedia are:
·
Multimedia in advertisement
·
Special effect in movies
5. What is website? Give any two examples
of website that belongs to Microsoft Corporation.
Ans: Website
is a collection of web pages that can be published by an organization or
individual.
Any two examples of websites that belongs to Microsoft
Corporation are:
·
www.msn.com
·
www.microsoft.com
6. What
is MS-Access? Give any two examples of RDBMS.
Ans: MS-Access
is a relational database management system developed by Microsoft Corporation
which is used to store and manipulates large volume of data in the form of
tables.
Any two examples of RDBMS are:
·
MS-Access
·
FOXPRO
7. Differentiate
between validation rule and validation text.
Ans: The
differences between validation rule and validation text are:
Validation
Rule
|
Validation
Text
|
It
limits the value that can be accepted into a field.
|
It
allows to type text to be displayed if the user input value is prohibited by
the validation text.
|
8. What
do you mean by action query? Mention its types.
Ans: The
query that makes changes to many records in just single operation is known as
action query.
The types of action query are:
·
Update query
·
Append query
·
Delete query
·
Make table query
9. Differentiate
between program file and data file.
Ans: The
difference between program file and data file are:
Data
file
|
Program
file
|
It
is a collection of the related data stored in the hard disk or any other secondary
storage devices separately from the program that used it.
|
A
program file is a file which contains a set of instructions written in a
computer language.
|
10. What is
unary operator? Give any one example.
Ans: A
unary operator is an operator that takes a single operand in an expression or a
statement. Example: ++, --, etc.
11. Give syntax and
an example of OPEN statement.
Ans: The
syntax of OPEN statement is:
OPEN
“filename.ext” FOR <mode> AS #filenumber
Example: OPEN “student.dat” FOR OUTPUT AS #1
Model Set 10 (SOS)
1. “Computer
Network reduces cost”. Give any two points to support this statement.
Ans: Computer
network reduces the cost of operation as it allows sharing of resources like
hardware, software and services- for example: a printer or one internet
connection can be shared by all the users of anetwork. In this way, it helps to
save the cost of a buying extra hardware or services. Problems of the computers
in a network can be solved by one or few experts from one place. This saves the
cost of hiring experts for all the branches of an office and the cost of travel
by the expert to different branches.
2. What
is a backup? Why is backup vital to computer security system?
Ans: A
copy of a file that is used in the place of original file being corrupted is
known as backup.
Backup are vital to the computer system in order to
save the important data from being lost or damaged due to accidental or
intention harm. When data and software are damaged or lost, we can easily
recover it from backup copy.
3. How does virus spread from one computer
to another?
Ans: Backup
spread from one computer to another by the following ways:
·
Sharing of infected portable disk like
floppy disk, pen drive, CDs, etc.
·
Opening a virus infected emails, messages
and attached files.
·
Downloading files and programs from the
websites which are not secure.
·
Exchanging data and information over a
network.
4. What do you mean
by multimedia? Name any four media used in multimedia technology.
Ans: The
integration of several form of media such as text, image, audio, video and
animation in order to present the data and information in more interactive and
attractive way is known as multimedia.
The names of any four media of multimedia are:
·
Text
·
Audio
·
Video
·
Animation
5. What is cyber
law? Write any two ethical values for computer operators.
Ans: The
law which governs the legal issue in the cyberspace regarding the Internet or
WWW for digital data processing and transaction is known as cyber law.
Any two ethical values for computer operators are:
·
You should not spread false and illegal
information.
·
You should not disclose the secrecy of
computer.
6. What
is Database Management System? Give any two example of database management
system software.
Ans: Database
Management System is software that is used to manage data, manipulate them and
provide the information.
Any two examples of database management system are:
·
MS-Access
·
Oracle
7. Differentiate
between select query and action query.
Select
Query
|
Action
Query
|
It
is a type of query that is used for extracting specific information from one
or more tables in a database.
|
It
is a type of query which makes changes to many records in just single
operation.
|
8. Identify a
record, field and value from the following table structure.
Roll
|
Name
|
Marks
|
1
|
Rajani Lama
|
79
|
2
|
Mahesh Pandey
|
75
|
Ans: In
the table:
Records: 1, Rajani Lama,
79, 2, Mahesh Pandey, 75
Field: Roll, Name, Marks
Value: 1,2, Rajani Lama,
Mahesh Pandey, 79, 75
9. How do you
define global and local variable in QBASIC. Give an example.
Ans: Variables
which are declared outside of any function is known as global variable. Their
values is not protected from outside interference and have effect on the
variables outside the procedure.
Example: DIM SHARED A, B, N (10)
COMMON
SHARED X, Y
Here, A, B, N (), X, Y are global variables
The variable which is declared inside the procedure and
is not visible to other modules or function is known as local variable. Its
value is protected from outside interference and has no effect on the variables
outside procedure.
Example: SUB SUM (A, B)
S=A+B
PRINT
S
END
SUB
Here, “S” is the local variable.
10. List
any three data types used in C language.
Ans: The
three data types of C language are:
·
int
·
char
11. Write the function of FILES and NAME
AS.
Ans: The
function of:
·
FILES: The
function of FILES statement is to display files from the diskette.
·
NAME AS: The
function of NAME AS is to rename a file of the diskette.
SLC Examination-2065(2009)
a. Define star
topology with figure.
Ans: The topology
in which all computers or the network devices are connected through a central
device in the shape of star structure is called star topology.
Diagram of star
topology

b. List out
any four services of internet.
Ans: Any four
services of internet are
i) E-mail
(Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
c. Define
computer ethics.
Ans: Computer
ethics is the set of moral principles or code of conducts that should be
followed by computer user.
d. Write down
two measures of each to protect computer hardware and software.
Ans: Any two
hardware security measures are:
ii) Insurance
Policy
ii) Power Regulator Device
ii) Power Regulator Device
Any two software
security measures are:
i) Backup
iv) Password
i) Backup
iv) Password
e. What is
anti-virus? Write down any two examples of anti-virus software.
Ans: Antivirus software is software designed to detect and remove virus from computer system to ensure virus free environment.
Ans: Antivirus software is software designed to detect and remove virus from computer system to ensure virus free environment.
Any two examples of
antivirus software are:
i) Kaspersky ii) NOD32
i) Kaspersky ii) NOD32
7. Answer the
following question:
a) What is database?
a) What is database?
Ans:Database is a
collection of related and organized information that can be used for different
purpose.
b) While
designing table structure which data types are suitable to store information
about teacher’s name, address, salary, and date of birth.
While designing
table structure the data types are suitable to store information about
teacher’s
name = Text
Address = Memo
Salary = currency
Date of birth =
Date / Time
c) Write down
any two advantages of Query.
Any two importance
of query are:
·
It
allows user to make calculations and change data in automated fashion.
·
It
provides option to delete all the unwanted data matching certain criteria.
10. a) Write
down one difference between function and sub procedure.
Ans: One difference
between function and sub procedure are given below:
Sub
Procedure
|
Function
Procedure
|
It
doesn’t not return value.
|
It
does not return any value.
|
b) List any
two data type used in C language.
Ans: Any two data type
used in C language is char and int
c) Write down
the functions of:
i) RMDIR
·
Ans:It
is used to remove or delete only the subdirectories from a disk. It can remove
only empty subdirectories.
o
ii)
NAME
·
Ans:
The NAME statement renames a file on a disk.
SLC Examination-2066(2010)
a) What is
computer network?
Ans: computer
network means two or more computers connected with each other to share data,
hardware, software and other resources.
b) What is internet?
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all over the world.
·
c)
Write any four preventive measures to protect computer system from virus
infection.
Ans: Any four preventive measures to protect computer system from virus infection are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Don’t install pirated software, especially computer games.
Ans: Any four preventive measures to protect computer system from virus infection are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Don’t install pirated software, especially computer games.
d) Write any
two software used for multimedia.
Ans: Any two software used for multimedia are:
Ans: Any two software used for multimedia are:
·
Windows
Media Player
·
VLC
Media Player
e) What is
hardware security?
Ans: The security given to the various hardware tools
or equipment from being lost or damaged due to accidental or intentional harm
is hardware security.
a) What is
DBMS? Write any two examples of DBMS software.
Ans: DBMS is a
software which is used to manage data, manipulate them and provide the
information. Examples of DBMS are MS-Access and Oracle.
b) List any four data types used in MS-Access.
Ans: Any four data types used in Ms-Access are:
b) List any four data types used in MS-Access.
Ans: Any four data types used in Ms-Access are:
·
Text
·
Memo
·
Number
·
Yes/No
c) What is
form? Write any two advantages of using form.
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
Any two
advantages of using form are:
·
It
helps to display data in more presentable form than a datasheet can.
·
It
provides an interactive platform for input of data into the database.
10. a) What is
modular program?
Modular program is a technique used to divide program into many small, manageable, logical and functional modules or blocks.
Modular program is a technique used to divide program into many small, manageable, logical and functional modules or blocks.
b) Write any
two advantages of Structured programming.
Ans: Any two advantages of Structured programming
Ans: Any two advantages of Structured programming
i) It is a high
level language with some features of low level language.
ii) It is mostly used to prepare system software.
ii) It is mostly used to prepare system software.
c) Write the function
of following statement:
i) Files
·
Ans:
The FILES statement displays the files of the current sub directory or
specified sub directory.
·
ii)
KILL
Ans: The KILL statement deletes the file or files from the specified drive and directory.
Ans: The KILL statement deletes the file or files from the specified drive and directory.
SLC Examination-2067(2011)
a. Write any
two examples of data communication.
Ans: Any two
examples of data communication are
·
E-mail
·
Telephone
b. What do you
mean by web browser?
Ans: Web browser is a computer program that access web pages and displays them on the user computer.
Ans: Web browser is a computer program that access web pages and displays them on the user computer.
c. Write any
four advantages of multimedia.
Ans: Any four advantages of multimedia are:
i) It makes teaching / learning easier in classroom.
ii) It makes easy to share views, ideas and thoughts among various people.
iii) It can store data and information for longer period.
iv) It makes presentation of related subject matter attractive.
Ans: Any four advantages of multimedia are:
i) It makes teaching / learning easier in classroom.
ii) It makes easy to share views, ideas and thoughts among various people.
iii) It can store data and information for longer period.
iv) It makes presentation of related subject matter attractive.
d. Mention any
four symptoms of computer virus.
Ans: Any four symptoms of computer virus are:
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
Ans: Any four symptoms of computer virus are:
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
e. What is
computer security?
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
a) Define DBMS
with examples.
Ans: DBMS is a
software which is used to manage data, manipulate them and provide the
information. Examples of DBMS are MS-Access and Oracle.
b) What is primary key?
Ans: Primary key is a field that uniquely identifies the record. It is needed because it neither accepts duplicate values nor null values.
c) Why is
report created?
Ans: Report is
created to print documents according to user’s specifications of the summarized
information through query or table.
10. i) What is procedure?
10. i) What is procedure?
Ans: Procedure is a
block of statement that solves a particular problem.
ii) Write any two characteristics of C language.
Ans: Any two
characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
iii) Write the function of:
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
iii) Write the function of:
·
-INPUT : It reads data from the sequential data file.
·
-MKDIR:
It creates a
subdirectory which is used to manage files.
SLC Examination-2068(2012)
1. Answer the
following questions:
a) Define LAN topology and write any two types of LAN topology.
a) Define LAN topology and write any two types of LAN topology.
Ans: The
arrangement or connection pattern of computers or nodes and other devices of
the network is known as LAN topology.
Any two types of
LAN topology are
i) Bus topology
ii) Star topology
b) Write any
four services of Internet.
Ans: Any four
services of internet are
i) E-mail
(Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
c) Write any
two advantages of multimedia in education field.
Ans: Any two ad
advantages of multimedia in education field are
i) It makes
teaching/learning easier in classroom.
iv) It makes
presentation of related subject matter attractive.
d) Write any
two software security measures.
Ans: Any two
software security measures are:
i) Backup
ii) Password
e) Write any
four symptoms that show, computer is infected by computer virus.
Ans: Any four
symptoms that show, computer is infected by computer virus are :
i) Program takes
long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
a) What is database?
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
a) What is database?
Ans: Database is a
collection of related and organized information that can be used for different
purpose.
b) What is
data sorting?
Ans: Data sorting
means grouping all the records in a table either in ascending or descending
order based on a key field of the record.
c) What is a
form?
Ans: Form is an
object of MS-Access which provides a user friendly interface to enter data in a
table or multiple linked tables.
10. a)
What is loop?
Ans: Loop means
executing a statement or group of statements a certain number of times
depending upon the condition.
b) List any
two data types supported by ‘C’ language.
Ans: Any two data
types supported by ‘C’ language are:
i) char
ii) int
c) State the
function of the following statement:
i) EOF
i) EOF
Ans:
It detects the end of the file marker reading the data from an open sequential
file.
ii) MKDIR
Ans: It creates a subdirectory which is used to manage files.
Ans: It creates a subdirectory which is used to manage files.
SLC Examination-2069
1. Answer the
following questions:
a) Write any
four advantages of computer network.
Ans: Any 4
advantages of computer network are as follows:
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
ii) Information can be exchanged rapidly in computer network.
iii) Computers in a network environment can be updated from any computer.
iv) Software packages can be shared between network connected computers.
b) What is internet? Write the name of any two E-commerce sites.
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
ii) Information can be exchanged rapidly in computer network.
iii) Computers in a network environment can be updated from any computer.
iv) Software packages can be shared between network connected computers.
b) What is internet? Write the name of any two E-commerce sites.
Ans: Internet is an
interconnection of several thousands of computers of different types belonging
to the various networks all over the world.
c) What is
computer ethic?
Ans: Computer
ethics is the set of moral principles or code of conducts that should be
followed by computer user.
d) What is hardware security? Write any two software security measures.
d) What is hardware security? Write any two software security measures.
Ans: The security
given to the various hardware tools or equipment from being lost or damaged due
to accidental or intentional harm is hardware security.
Any two software
security measures are:
i) password
ii) backup
e) What is computer virus?
e) What is computer virus?
Ans: Computer virus
is a program written by the programmer with the intention of destroying and
damaging the data and programs residing in the computer system.
a) What is
database? Give two examples.
Ans: Database is a
collection of related and organized information that can be used for different
purpose.
Two examples of database are:
i) Dictionary
ii) Telephone Directory
Two examples of database are:
i) Dictionary
ii) Telephone Directory
b) Write any
two types of primary key.
Ans: The uses of
Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
c) What is
query?
Ans: Query is an
object of Ms-Access which extracts and arranges information from a
table.
10.a) What is
meant by mode of data file?
Ans: Mode of data
file means opening a sequential file for one of the three modes of operation
like output mode, input mode and append mode.
b) Write any
two characteristics of ‘C’ language.
Ans: The
characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the
function of the following statements:
i) NAME
i) NAME
Ans:
The NAME statement renames a file on a disk.
ii) KILL
Ans: The KILL
statement deletes the file or files from the specified drive and directory.
SLC Examination-2070
a) What is
network topology? Write any one advantage of star topology.
The arrangement or
connection pattern of computer or nodes and other devices of the network are
known as network topology.
Any one advantage
of star topology is:
i) Failure of
single computer or cable doesn’t affect the entire network.
b) Give any
two advantages of E-mail over traditional mail.
Any two advantages
of E-mail over traditional mail are
i) It allows
sending and receiving message across the world at very low cost.
ii) Emails are
usually received fairly quickly, most of the time a couple of seconds after
they are sent.
c) List any
two main aims of formulating cyber law in Nepal.
The two main aims
of formulating cyber law in Nepal are:
i) To legalize the
transaction through electronic media to control various types of electronic
frauds
ii) To punish a
person who does criminal activities through electronic means especially on
computers.
d) Give any
two symptoms of virus attack.
The two symptoms of
virus attacks are:
i) Increased use of
disk space and growth in file size
ii) Program takes
long time to load.
e) Give the
importance of UPS to the computer system.
The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
a) Define data
and information.
Data can be
numbers, letters or symbols representing facts and figures which may or may not
give any sense.
Information is an
organized collection of related data which gives a complete sense.
b) What is
report? Give its importance.
Report is an object
of database which displays the output in an effective way to present the data
in a printed format.
The importance of
report are:
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
c) Name any
four data types that can be defined in MS-Access.
Any four data types
that can be defined in MS-Access are:
·
Text
·
Memo
·
Number
·
Yes/No
10. a) What is
a
variable?
The data item whose
value changes during the execution of a program is called variable.
b) Name any
two data types used in C
language.
Any two data types used in C language are:
Any two data types used in C language are:
i)
char
ii)
int
c) Give the
functions
of:
i) NAME AS
The NAME statement
renames a file on a diskette. Only file name changes, data and program
ii) CLOSE
It
closes one or all open files.
SLC Supplementary
Examination-2065
1. Answer the
following questions:
a) Explain
about network topology. Write any two advantages of computer networking.
Ans: The arrangement or connection pattern of computers
or nodes and other devices of the network is known as network topology.
Any two advantages
of computer networking are :
i. Computer in
network share different software packages.
ii. Communication
made by computer network is very cheap.
b) What is
internet? Write any two advantages of Internet.
Ans: Internet is a collection of millions of computers of different types
belonging to various networks all over the world.
Any two advantages
of internet are as follows:
i. The internet
provides very fast and cheap communication.
ii. It is easy to
access information of different governments and countries.
c) What is
antivirus software? List any two antivirus software.
Ans: Those software which are designed to detect and remove viruses from the
computer system to ensure a virus free environment is known as anti-virus
software.
Any two antivirus
software are:
i. Norton Antivirus
ii. McAfee
d) What is multimedia?
Write any two applications of it.
Ans: The integration of several forms of media like audio, video, animation,
etc. to present information in more interactive and understandable way is known
as multimedia.
Any two
applications of it are as follows:
i. Adding
special effects in movies:
Multimedia is used
in movies to add special effects to make movie more realistic and interesting.
ii. Preparing
presentation:
Multimedia is used
in preparing presentation which helps to convey information in more interesting
and interactive way.
e) What do you
mean by software security? Write any two methods to protect the computer
software.
Ans: The security given to various software or data from being lost or
damaged due to accidental or intentional harm is known as software security.
Any two methods to
protect the computer software are:
i. Defragmentation
ii. Scan
disk
a) Define data
and database.
Ans: Data can be numbers, letters or symbols representing facts and figures
that may or may not give complete sense.
Database is a
collection of related and organized information that is used to store, organize
and extract data.
b) Name any
four data types that can be defined in MS-ACCESS.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii. Text
iii. Memo
iv. Auto number
c) What is a
form? Give its importance.
Ans: Form is an object of MS-Access that provides user friendly interface to
enter data in a table or multiple linked tables.
Importance of form
are as follows:
i. It provides an
interactive platform for input if data into the database.
ii. It helps to
display data in more presentable form than a datasheet can.
10. a) Define
modular programming.
Ans: Modular programming is a technique in which a program is divided into different
small manageable program blocks, which are called modules or sub programs.
b) Name any
two data types used in C language.
Ans: Any two data types of C language are:
· char
· int
c) Give the
functions of NAME and CLOSE statements.
Ans:
NAME: The function of NAME statement is to rename a file
on a diskette
CLOSE: The function of CLOSE statement is to close one or
all open
files.
Supplementary
Examination 2066
a) What is
bandwidth?
Ans: The data handling capacity of a communication system is known as
bandwidth.
b) What is
network topology?
Ans: The arrangement or connection pattern of computers or nodes and other
devices of the network is known as network topology.
c) How can
multimedia help in education?
Ans: Multimedia technology is very much useful in education. It helps to
present the information about various topics in more interesting and
interactive way which makes the learner easy to understand. It helps to give
better ideas and concept to the students with good vocabulary.
d) Write any four
safety measures to protect computer form virus.
Ans: Any four safety measures to protect computer from viruses are:
·
Write-protect
your floppy disk when using them on other computers.
·
Do
not install pirated software, especially computer games.
·
Always
scan files downloaded from the internet or transferred over the network before
executing them.
·
Do
not interchange internal disk among the computers.
e) What is
computer hardware and software security?
Ans: The security given to various hardware tools and equipment from being
lost or damaged due to accidental or intentional harm is known as hardware
security. For e.g: protection from theft, power protection device, etc.
The security given
to various software and data from being lost or damaged due to accidental or
intentional harm is known as software security. For e.g: defragmentation, scan
disk, etc.
a) Define
database.
Ans: Database is a collection of related and organized information that is
used to store, organize and extract data.
b) Write any four data type used in MS-Access.
b) Write any four data type used in MS-Access.
Ans: Any four data types used in MS-Access are as follows:
·
Number
·
Text
·
Memo
·
Auto number
c) What is
query?
Ans: Query is an object of MS-Access which allows selecting specific data
from one or more tables.
10. a) What is user defined function?
10. a) What is user defined function?
Ans: The function which is defined by the user according to the need is known
as user-defined function.
b) List any two data types used in C language.
b) List any two data types used in C language.
Ans: The data types used in C language are:
· Char
· Int
c) Write down
the function of the following statements:
i) KILL ii) FILES
i) KILL ii) FILES
Ans: The function of:
i. KILL:
It deletes the file or files from the specified drive and directory.
ii. FILES:
It displays all the files of the current subdirectory or specified sub
directory.
Supplementary
Examination 2067
a) Define LAN
topology. Draw the Bus topology.
Ans: LAN topology is the arrangement or connection pattern of computers
or nodes and other devices of the network Diagram of Bus topology:

b) What is
multimedia? Name any two fields where multimedia is used.
Ans: The integration of several forms of media such as text, audio, video,
animation, etc. to present the information in more attractive and
understandable way is known as multimedia.
Any two fields
where multimedia is used are as follows:
i. Multimedia
technology in advertisement
ii.Multimedia
technology to learn foreign language
c) Give two
advantages of e-mail over traditional mail.
Ans: The advantages of e-mail over traditional mail are as follows:
i. It is
faster and cheaper.
ii.It allows us to
send and receive messages, documents, sounds, etc. across the world.
d) Write any
two ways of protecting computer software.
Ans: Any two ways of protecting computer softwares are:
i. Defragmentation
ii.Scan disk
e) What is
antivirus? Name any two antivirus software.
Ans: The software designed to detect and remove virus from the computer to ensure a virus free environment is known as anti-virus software.
Ans: The software designed to detect and remove virus from the computer to ensure a virus free environment is known as anti-virus software.
Any two anti-virus
software are as follows:
i. Norton
Antivirus
ii.McAfee
a) What is
database? Name any two database software.
Ans: Database is a collection of related and organized information that is
used to store, organize and extract data.
Any two database
software are as follows:
i. Telephone
directory
ii.Dictionary
b) Name any
four data types that can be define in MS-Access.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii.Text
iii. Auto
number
iv. Memo
c) What is a
report? Give its importance.
Ans: Report is an object of MS-Access that is used to present data in a
printed format using a specific layout.
The importance of
report are as follows:
i. It
presents data and information from table or query in a flexible layout.
ii.It helps to present
data in printed format.
10. a) What is
a loop?
Ans:The
process of repeating a statement or block of statement for a number of times is
known as loop.
b) Name any two data types used in C language.
b) Name any two data types used in C language.
Ans: Any two data types used in C language are:
· int
· char
c) Give the functions of NAME and CLOSE statements.
Ans: The functions of:
i. NAME:
It renames a file on a diskette.
ii. CLOSE:
It closes one or all open files.
Supplementary
Examination 2068
a) Define
Computer network.
Ans: A computer network means two or more than two computers connected to
each other to share data, hardware, software and other resources.
b) What is E-mail? Give an example of valid E-mail I.D.
b) What is E-mail? Give an example of valid E-mail I.D.
Ans: E-mail is one of the most popular service provided by the internet which
is used to send and receive mail through the internet.
An example of valid
E-mail I.D. is shr_ram01@gmail.com
c) Write any two advantages of multimedia in educational field.
c) Write any two advantages of multimedia in educational field.
Ans: Any two advantages of multimedia in educational field are:
· It helps to present the information in more
interactive and understandable way.
· It makes studying much more interesting.
d) What is a
computer hardware security?
Ans: The security given to various hardware tools and equipment from being lost
or damaged due to accidental or intentional harm is known as computer hardware
security. For e.g.: fire detector, protection from theft, etc.
e) What is a computer virus?
e) What is a computer virus?
Ans: A type of computer program which is written by the programmer with the
intent of damaging or destroying the data and programs residing in the computer
system is known as computer virus.
a) What is
database?
Ans: Database is a collection of related and organized information that is
used to store, organize and extract data.
b) What data types are used to store salary and date of the birth?
b) What data types are used to store salary and date of the birth?
Ans: The data types that are used for:
· Salary – Currency
· Date of birth – Date/Time
c) What is
query?
Ans: Query is an object of MS-Access which allows selecting specific data from
one or more tables.
10. a) Mention
the types of procedure.
Ans: The
types of procedures are:
i. Function
Procedure
ii. Sub
Procedure
b) Write any
one difference between Q-Basic and C language.
Ans: The
difference between Q-Basic and C language are as follows:
Qbasic
|
C
Language
|
It
is mostly used to design application software.
|
It
is mostly used to prepare system software.
|
c) Write the
functions of the following:
i) KILL ii) RMDIR
Ans: The function of:
i) KILL ii) RMDIR
Ans: The function of:
i. KILL:
It deletes the file or files from the specified drive or directory.
ii. RMDIR:
It removes or deletes only sub directory from a disk
Supplementary
Exam 2069
a.
What is computer network? Draw the diagram of BUS topology.
A computer
network means two or more than two computers connected to each other to share
data, hardware, software and other resources.
Diagram of bus
topology:

b.
Define Internet and E-mail.
Internet:
A collection of millions of computers of different types belonging to various
networks all over the world is known as internet.
E-mail: E-mail is one of the most popular services provided
by internet which allows sending and receiving mail through the internet.
c.
Write any four advantages of using multimedia.
Any four
advantages of using multimedia are as follows:
i.
It makes easy to share views, ideas and thoughts among various people around
the world.
ii. It
can store data and information for a long period.
iii. It makes the
presentation of related subject matter attractive.
iv. It makes
teaching-learning easier in classroom.
d.
Write any four possible threats to computer security.
Any four
possible threats to computer security are:
·
Extreme
temperature and dust
·
Theft
of hardware components.
·
Voltage
fluctuation
·
Unauthorized
access of data and programs
e.
What is anti-virus program? Give any two examples.
The software
which is designed to detect and remove viruses from computer system to ensure a
virus-free environment is known as anti-virus software.
Any two examples of
anti-virus software are:
i.
Norton Antivirus
ii.
McAfee
a. What
is data? Give any two examples of DBMS software.
Data can be
numbers, letters or symbols representing facts and figures, which may or may
not give any sense.
Any two examples of
DBMS software are:
i. MS-Access
ii. Oracle
b. Write
any two things to be considered after assigning primary key for a field.
Any two
things to be considered after assigning primary key for a field are as follows:
·
Reduce
and control duplication of record in a table
·
Set
the relationship between tables.
c. What
is form?
Form is an
object of MS-Access which provides a user friendly interface to enter data in a
table or multiple linked tables.
a.
Write the difference between SUB procedure and FUNCTION procedure.
The
difference between SUB procedure and FUNCTION procedure are as follows:
SUB
procedure
|
FUNCTION
procedure
|
Sub
procedure does not return a value.
|
FUNCTION
procedure must return a value.
|
SUB
procedure is called by CALL statement.
|
FUNCTION
procedure is called by statement and expression method.
|
SUB-procedure’s name does not accept data type
symbol because it does not need to return a value.
|
FUNCTION-procedure’s name accepts data type symbols
such as $, %, !, #, &, etc. and it depends on the type of value to be
returned. E.g.: FUNCTION REV$ returns string.
|
b.
Write the two basic data types used in “C” language.
The basic
data types used in C language are as follows:
· char
· int
c.
Write the function of the following statements:
i. NAME:
The function of NAME statement is to rename a file on a diskette.
ii. CLOSE:
The function of CLOSE statement is to close one or all open file.
No comments:
Post a Comment