Monday, May 30, 2016

SLC COMPUTER FUNDAMENTALS MSACCESS PROGRAMMING THEORY SOLVED



CDC MODEL QUESTION + NEEMA PUBLICATION 2071 + PABSON, NPABSON, SOS, JEC, SEDIPS 2070 + SLC 2065 TO 2070 AND SLC SUPPLEMENTARY 2065 TO 2069 SOLUTIONS!!!!




CDC Model Question 2065

1.  Define computer network.
AnsThe interconnection of two or more than two computers by the means of transmission medium like cables or without cables in order to share data, software, applications and other resources is known as computer network.
2.  What is internet and email?
Ans The interconnection of several thousands of computers of different type belonging to various networks all over the world is known as internet.
E-mail is one of the most popular services of internet which helps to transmit data, text files, and digital photos, audio or video files from one computer to another over the internet.
3.  Write down any four application areas of multimedia.
AnsThe four application areas of multimedia are:
·                  Adding special effects in movies
·                  Video games
·                  Public Accessing
·                  Animated Advertisement
4. List any four measures to protect computer software.
AnsThe four measures to protect computer software are:
·                     Backup
·                     Password
·                     Defragmentation
·                     Scan disk
5. How can we protect computer from computer virus?
AnsWe can protect computer from virus by the following ways:
·                     Install a powerful anti-virus program and update its virus definition file frequently.
·                     Do not use pirated software.
·                     Do not open suspicious emails and attachment file sent by unknown persons.
·                     Do not use free distributed software.
6. What is a DBMS?
AnsDBMS is software that is used to manage data, manipulate them and provide the information to the user.
7. Make a list of any four types of data used in MS-Access.
AnsA list offour data types of MS-Access are:
·                     Text
·                     Memo
·                     Currency
·                     Date/Time
8.  Define query.
Ans Query is an object of MS-Access that is used to extract information from one or multiple linked tables.
9. What is user-defined function?
AnsThe functions which are defined by the user according to his/her need are known as user-defined function.
10. Write down the function of:
AnsThe functions of:
·         KILL: The function of KILL statement is to delete one or more files from the diskette.
·         MKDIR: The function of MKDIR is to create a sub-directory which is used to manage files.
Neema Publication Set 1
a) List out any four reasons of using computer network.
AnsThe four reasons of using the computer network are as follows:
·         To share hardware devices like printer, hard disk, scanner, etc.
·         To share the different software packages.
·         To exchange information rapidly in the computer network.
·         To access updated data by all computers of the network.
b) How does virus spread from one computer to another?
AnsVirus spread from one computer to another by following ways:
·         Downloading files or programs from websites which are not secured.
·         Opening of the virus infected e-mail, message and attached files.
·         Using pirated software.
·         Sharing of infected external portable disks like floppy disk, pen drive or CD.
c)  List any four media used in multimedia technology.
AnsThe four media used in multimedia technology are as follows:
i)   Audio        ii) Animation               iii) Video                     iv) Graphics
d)   Define the term computer security. Also mention the technique to protect data from the virus.
AnsComputer security refers to the security given to the computer for the protection of data, application, software and hardware from being lost or damaged due to accidental or intentional harm.
The technique to protect data from viruses is to use antivirus software.
e) Mention advantages and disadvantages of e-mail.
AnsThe advantages of e-mail are as follows:
·         It is fast, economic and instant communication media.
·         Any form of data like text, pictures, audio or video can be sent through e-mails.
·         The disadvantages of e-mail are as follows:
·         Minor mistakes in e-mail address may deliver the mail to a wrong address.
·         Since, it may passes through a vast electronic network. It may be seized in between.
7. a) Write any four features of DBMS.
AnsThe four features of DBMS are as follows:
·         It controls data redundancy which means duplication of data.
·         It maintains accurate database.
·         It allows sharing the existing database by different programs.
·         It allows updating large volume of data as the specified conditions.
b) What is filtering? Write a difference between sorting and filtering.
AnsFiltering is an option that selects the required records and displays the result.
The differences between filtering and sorting are as follows:
Sorting
Filtering
The arrangement of reords on the basis of a field or group of fields of a table either in ascending or descending order is known as sorting.
The process of viewing required records of a table that satisfies the specified criteria is known as filtering records.

c) Define query. Write its importance in database.
AnsQuery is a database object that creates a datasheet of selected fields and records from one or more tables.
Its importance in database is as follows:
·         To view records including some fields or all the fields of a table or multiple linked table.
·         To perform mass update, delete or append new records to a table.
10. a) Write any two advantages and disadvantages of modular programming.
AnsThe two advantages of modular programming are as follows:
·         Different programmers can design program modules independently.
·         It is easy to design code and test the program modules independently.
The disadvantages of modular programming are as follows:
  • can lead to problems with variable names
  • can lead to problems when modules are linked because link must thoroughly tested
b) Give any two features of C-language.
AnsThe features of C-language are as follows:
i)   It is specially used to create system software.       
ii) It supports a rich and powerful set of operators.
c) Write down the functions of following statements:
i) KILL:  It is used to delete the specified file from a disk
ii) NAME AS: It is used to rename the file of a diskette.

Neema Publication Set 2

a. How does computer network reduces cost of operation?
AnsComputer network reduces cost of operation because it allows sharing of resources like hardware ,software and services. For example a printer or one internet connection can be shared by all users of a network. In this way it helps to save the cost of buying extra hardware or service. Problems can be solved by one or few experts from one place. This saves the cost of hiring experts for all the branches of the office and the cost of travel by the expert to different branches.
b. Define the term internet. List out any two services provided by the internet.
AnsInternet can be defined as the interconnection of several thousands of computers belonging to various networks  all over the world.
any two services provided by the internet are as follows:
·         e-commerce
·         IRC(internet relay chat)
c. Define computer security. List out any two measures to protect computer.
AnsComputer security can be defined as the security given to the data, software and the hardware for their protection from being lost or damaged due to accidental or intentional harm.
two measures to protect computer are:
·         password
·         insurance policy
d. What are the reasons of making computer viruses? Explain
AnsThe reasons of making computer viruses are:
·         to stop software piracy
·         to entertain users by displaying interesting messages and pictures
·         to steal data and information
·         to expose the programmers ability
·         to earn money
e. What is cyber law? List any two subjects included in cyber law.
AnsThe law which governs the legal issues in the cyber space regarding the internet or www for digital data processing wand transaction is known as cyber law.
Two subjects included in cyber law are:
·         Electronic and digital signature law
·         intellectual property law
1. Name any four objects of Access.
AnsAny four objects of access are:
·         table
·         form
·         report
·         query
2. What is form? Mention any two methods to create form.
Ansform is a database object used primarily to display records on screen to make it easier to enter new records and to make changes to the existing records.
Its importance is:
·         using auto form features
·         using form wizard features
3. Differentiate between data and information.
AnsThe differences between data and information are:
Data
Information
Data can be letters, numbers, or symbols representing facts and figures, which may or may not give complete sense.
Information is an organized collection of related data, which gives a complete sense.
For example:- Ram, student, 20,
For example: Ram is a student. He is 20 years old.

1.              Differentiate between inbuilt function and user defined function.
AnsThe differences between inbuilt function and user defined function are:
In-built function
User-defined function
The functions provided by the QBASIC system which are used by the programmer according to the requirement are known as in-built function.
The functions written by the programmers to do specific task is known as user-defined function.
For Example: LEN, LEFT$, MID$ etc
For example|: Function written by using FUNCTION-END FUNCTION OR SUB-END SUB

2.  Write any two data types used in C language.
AnsAny two data types used in C language are:
·         char
·         int
3.  Write down the function of MKDIR and CLOSE statement.
AnsThe functions of:
·         MKDIRThe function of MKDIR is to create a sub-directory which is used to manage files.
·         CLOSEThe function of CLOSE is to close one or all open file from the diskette.
Model Set 3

1.  What is meant by data communication? Explain with any two examples.
AnsA data communication is the collection of hardware, software and other devices in order to exchange data, information and voice between two or more than two devices through a bounded or unbounded media.
The two examples of data communication re:
·         E-mail
·         Chat
2.  Differentiate between chat and email clearly.
AnsThe differences between chat and email are:
Chat
e-mail
We can send and receive instant meddase with other in real time.
There is no need to send instant message. The user can read, reply or ignore the message according to his/her wish.

3.   Write any four ways of protecting computer from viruses.
AnsThe four ways of protecting computer from viruses are:
·         Install a powerful anti-virus program to protect and update its virus definition file frequently.
·         Do not use the pirated software.
·         Do not open suspicious emails and attachments files send by the unknown person.
·         Do not use freely distributed software.
4.   How can multimedia help in education field?
AnsMultimedia can help in education field in the following ways:
·         It makes presentation of the related subject matter attractive.
·         It makes teaching-learning easier in classroom.
·         Presentation can be done in a big screen so that many students can see it.
·         It makes easy to share views, thoughts and ideas among students.
5.  What is meant by computer security? List out any four software security measures.
AnsThe security given to the computer for the protection of computer hardware, software and other resources from being lost or damaged due to accidental or intentional harm is known as computer security.
Any four software security measures are:
·         Defragmentation
·         Scan disk
·         Backup
·         Password
6.   Differentiate between text and memo.
AnsThe differences between text and memo are:
Text
Memo
It is used for storing text or combination of text and numbers.
It is used for storing lengthy text and numbers.
It can store up to 255 characters.
It can store up to 65,535/64000 characrers.

7.    Write any four advantages of DBMS.
AnsAny four advantages of DBMS are:
·         It controls redundancy which means duplication of data.
·         Large volume of data can be stored and updates easily.
·         It allows sharing the existing database by different programs.
·         It provides high security of data and resources as well as maintains accurate database.
8.     What do you mean by formatting a table?
AnsThe process of changing column width, row height, hiding columns or changing fonts, font size, font style of data of a table and table border, etc. is known as formatting a table.
9.   Differentiate between function and sub procedure.
AnsThe differences between sub procedure and function procedure are:
Sub procedure
Function procedure
it doesnot return any value.
It must return a value.
It is enclosed inside SUB……….END SUB.
It is enclosed inside FUNCTION…………END FUNCTION.

10.   How many keywords are in C language?
AnsThere are 32 keywords in C language.
11.  Write down the function of RMDIR and FILES statement.
AnsThe function of :
·         RMDIRThe function of RMDIR is to remove empty sub-directory.
·         FILESThe function of FILES is to display all the files from the diskette.
Model Questions 4

Answer the following.
a) What is LAN?List out the types of LAN topologies.
Ans A LAN is a network of computers that are relatively near to each other and are connected in a way that enables them to communicate by cable and a small wireless device.
The types of LAN topologiesare :
·         Bus Topology
·         Star Topology
·         Ring Topology
b) How does Internet differ from Intranet? Explain.
Ans Internet differs from Intranet as Internet is the interconnection of several thousands of computers of different types belonging to various networks all over the world whereas Intranet is a private computer network that uses the internet protocol to securely share any part of information of organization.
c) What are the precautions to protect data from viruses?
Ans  The precautions are:
·         Do not download files and programs from the websites without scanning
·         Use properly working antivirus software
·         Do not exchange internal disk among computers
·         Scan the mail or unknown files of Internet before opening in your computer
d) How do you know that your computer is infected from viruses?
Ans We can know our computer is infected from viruses when:
·         Programs take a long time to load
·         Unusual increase  of the disk space and grow in file size
·         Corrupting the system’s data takes place
·         Renaming of files with different names
What are the requirements of multimedia computer system?
Ans The requirements are:
·         Computer
·         Software (WMP,Adobe Photoshop,etc.)
·         CD-ROM/DVD drive
·         Sound card
·         Microphone
·         Speaker
Group ‘B’
a) What is primary key? Give its importance.
 Primary key is a field that uniquely identifies the record.
Its importance is:
1) Controls data redundancy and makes the record unique.
2) It sets relationship among the tables.
b) Differentiate between “format” and “input mask”.
 The differences between format and input mask are given below.
Input mask
Format
The input mask field property specifies a pattern for all data to be entered in a field.
The format field property specifies the layout for a field i.e. appearance of value when displayed.
This enables to control the manner in which data is entered in a field.
This field property only changes the appearance of the data on the screen but actually doesn’t change the way how the data is stored in the field.

c) Write the importance of computerized database system in comparison to non-computerized database system.
Ans: The importance of computerized database in comparison to non-computerized database is that it can store large volume of data and information, and is very fast to find specific record. Data can be sorted in ascending or descending order on multiple criteria and datas can also be kept secure in this system.
Group C
a) Write the syntax and example of SUB…END SUB statement.
Ans: Syntax:

SUB  {sub program name }(parameter list)
<Statement block>
END SUB

Example:
SUB sum (A, B)
S=A+B
PRINT S
END SUB

b) Write a feature of C language.
AnsThe features of C language are:
·         It is used to prepare system software.
·         It has rich and powerful set of operators.
c) Write the function of :
·         OPEN- It opens a sequential file for one of the three operations i.e. appending, writing,  reading.
·         LINE INPUT# - It reads the entire line or maximum 255 characters from the keyboard or from the sequential file up to a carriage return.
Model set 5
1.              Answer the following questions.
a.    In what way does the client server network differ from peer to peer network? Explain
AnsThe difference between client server and peer to peer network are as follows:-
Client Server
Peer to Peer
It consists of at least one or more clients.
It is a group of computers in which each computer act both as client and server.
It provides centralized network administration.
It lacks centralized network administration.
It provides high reliable security of data and resources.
It lack proper security of data and resources.
It is suitable for large organizations.
It is suitable for small office and homes.

b.   Differentiate between Email and EFax.
Ans: The difference between E-mail and E-fax are given below.
E-mail
E-fax
E-mail is one of the popular services of Internet which allows exchange of information and computer files between computers over a network using Internet.
It is the service of Internet through which user can send and receive faxes directly from a computer to another.

c. What is a backup? Why backups play a vital role in computer security.
AnsBackup is the system of copying data and programs into another location or creating a duplicate copy of a file.
Backups are vital to computer security because it saves data and programs from being lost or damaged due to accidental or intentional harm. When data and programs get lost, we can recover from backup.

d. Why IT policy is important in our country. Explain.
Ans:  IT policy is important because IT plays a vital role to build up knowledge based society   and boost up the economic condition of any country. For example we can take importance of IT policy in Nepal. Such as, IT policy is needed for Nepal to provide the general people access to IT to make knowledge based society to established knowledge based industry and to change the economic conditions of people.
e. What do you mean by virtual reality?
AnsVirtual reality is an artificial environment created with computer hardware and software and presented to the user in such a way that it appears real.
7. Answer the following.
a. Define Query. Mention the method to create query.
AnsQuery is an object of MS access that selects specific data from a table or multiple linked tables.
The methods to create query:-
·         Using design view.
·         Using wizard
b.   What is database? Explain with examples.
AnsDatabase is the collection of related and organized information that is used to store, organize and extract data.
For examples: -dictionary, telephone directory.
c. What is data type? List any four data types in MS access.
AnsData type is an attribute for a field that determines what type of data it can contain.
 The four data types are:-
·         Text
·         Memo
·         Currency
·         Date/Time

1.      Write down the syntax of FUNCTION……END FUNCTION.
AnsThe syntax of FUNCTION…….END FUNCTION is:
FUNCTION Function name (Parameter list)
[Statements of function]
Function Name=Expression
END FUNCTION
2.      What is identifier in C language?
AnsAn identifier is a combination of alphanumeric character, the first being the letter of alphabet or an underline and the remaining being any letter of the alphabet, any numeric digit, or the underline.
3.      Write down the function of:
·         WRITE#: The function of WRITE# is to send one or more data items to the specified file.
·         CLOSE#: The function of CLOSE# is to close one or all open file.

Model Set 6 (PABSON 2070)

1.   What is communication media? List any two advantages of client-server network model.
AnsA communication media is a channel through which data/ signals can be transmitted from one point to another.
Any two advantages of client/server network model are:
·         It provides high level of security, since only the authorized person gets access to the service of the network.
·         The controlling and managing of workstation computers are done by powerful centralized server computer. So, administration work becomes easier.
2.  What is internet? List nay two advantages of email.
AnsThe interconnection of million thousands of computers of different types belonging to various networks all over the world is known as internet.
The advantages of email are:
·         It is fast, economic and instant communication media.
·         Any form of data like text, image, audio, or video can be sent through e-mail.
3.  List any four advantages of multimedia.
AnsThe four advantages of multimedia are:
·         It makes easy to share views, ideas and thoughts among various people around the world.
·         It can store the data and information for a long period.
·         It is very cheap to get the knowledge about the related subject matter in a short time through multimedia.
·         It makes the presentation of the related subject matter attractive.
4. What is the role of UPS in the computer security?
AnsThe role of UPS is to control the fluctuation of electric voltage and provide enough backup electric power to the computer system when there is power failure so important data or files can be stored and computer can be turned off properly.
5.  List any four preventive measures for protecting computer from computer viruses.
AnsAny four preventive measures of protecting computer from computer virus are:
·         Install a powerful anti-virus program to protect and update its virus definition file frequently.
·         Do not use the pirated software.
·         Do not open suspicious emails and attachments files send by the unknown person.
·         Do not use freely distributed software.
6.  List any four advantages of DBMS.
AnsAny four advantages of DBMS are:
·         It controls redundancy which means duplication of data.
·         Large volume of data can be stored and updates easily.
·         It allows sharing the existing database by different programs.
·         It provides high security of data and resources as well as maintains accurate database.
7. What is a field? List any two uses of primary key.
AnsA field is a column in a table that contains a specific piece of information within a record.
The two uses of primary key are:
·         To stop duplication of the records in a table.
·         To set relationship between tables.
8.  What is a query? List any two uses of form in MS Access.
AnsQuery is an object of MS-Access that is used to extract information from a table or multiple linked tables.
The Uses of for in MS-Access are:
·         It displays one complete record at a time. SO, using a form, data of a table can be easily edited.
·         It allows designing the layout of fields on the screen in any arrangement.
9.   What is a local variable?
AnsThose variables which are not visible to other modules or function and are declared inside a function is known as local variable.
10. List any two similarities of QBASIC and C language.
AnsThe two similarities of QBASIC and C language are:
·         Both of them use high level language.
·         Both supports local and global variable.
11.  Write the function of FILES and EOF function.
AnsThe functions of:
·         FILESThe function of FILES is to display all the files from the diskette.
·         EOF()The function of EOF() is to detect the End of File marker reading from an open sequential file.
Model Set 7(NPABSON 2070)
1.   What is telecommunication? List any two elements of telecommunication.
AnsA system of transmission of sounds, images, text or data in the form of electronic signals is known as telecommunication.
Any two elements of telecommunication are:
·         A transmitter that takes information and converts it to signal.
·         A transmission medium that carries the signal.
2. Write any two advantages of email service of internet.
AnsThe two advantages of e-mail service of the internet are as follows:
·         It is fast, economic and instant communication media.
·         Any form of data like text, image, audio, or video can be sent through e-mail.
3. What is hardware security? Suggest any two techniques for securing computer hardware.
AnsThe security given to the computer hardware tools and equipment’s from being lost or damages due to accidental or intentional harm is known as hardware security.
 The techniques for securing computer hardware are:
·         Insurance Policy
·         Power Protection Device
·         Protection from Dust and Extreme Temperature.
·         Regular maintenance
4. What is multimedia?
AnsThe integration of several form of media such as text, image, audio, video and animation in order to present the data and information in more interactive and attractive way is known as multimedia.
5. What is a computer virus? Five an objective of developing a computer virus.
AnsThe type of computer program written by the computer programmer with the intent of damaging and destroying the data and resources located in the computer memory are known as computer viruses.
The objectives of developing computer virus are:
·         To stop computer piracy.
·         To entertain user by displaying interesting messages or pictures.
·         To destroy data, information and files.
·         To expose the programmers ability.
·         To earn money.
6.  List any two functions of DBMS.
AnsThe two functions of DBMS are:
·         It controls redundancy which means duplication of data.
·         Large volume of data can be stored and updates easily.
7. List out any four objects of MS-Access.
AnsThe four objects of MS-Access are:
·         Table
·         Form
·         Query
·         Report
8.  Why is report created?
AnsReports are created in order to:
·         Present the data and information from tables or query in a flexible layout.
·         Present data in printed format.
9.    What is user defined function?
AnsThe function that is defined by the user according to his/her need in order to fulfill specific task is known as user-defined function.
10.   List out any two numerical data type of C language.
AnsThe two numeric data types of C language are:
·         int
·         char
11.          Write down the function of KILL and OPEN statement.
AnsThe function of:
·         KILLThe function of KILL statement is to delete the file or files from the specified drive and directory.
·         OPENThe function of OPEN statement is to open a sequential file one of the three possible operations, i.e. INPUT, OUTPUT or APPEND.

Model Set 8 (JOINT EXAMINATION COMMITTEE 2070)

1.    Define ring topology with figure.
AnsThe topology in which computers are connected in the shape of circle without any end points is known as ring topology.
The figure of ring topology is:
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg68d-C1WClNWeJl5PGprYg-tF_0aSvT03olX2DoVtQ8IHLkmc_LM21rzanJ-7jc1aF6Ha5YK-P83FCeSmHnawxGWptD5RB_DF9qRMoYWShOe87fKE3EK6w45X81tdnkrUbR4PZpw_ZRWU/s1600/RING.png
2.              What is a browser? Write any one difference between upload and download.
AnsA computer program that access web pages and displays them on the user’s screen is known as web browser.
One difference between upload and download are:
Upload
Download
Upload refers to the process of copying files or documents or programs or data from the user computer to the internet.
Download refers to the process of copying data or programs or files or documents from the internet to users computer.

3.   Name any two media used in multimedia technology. What is digital signature?
AnsAny two media used in multimedia are:
·         Text
·         Audio
Digital signature is a security mechanism system in the cyberspace for digital data processing and transaction.
4.  What do you mean by backup? Write any two ways to protect hardware.
AnsA copy of a file that is used in the place of original file being corrupted is known as backup.
Any two ways to protect computer hardware are:
·         Regular maintenance
·         Insurance Policy
5.  How can we confirm that the computer is virus infected? What measures can be adopted to protect computer from virus?
Ans We can confirm that computer is virus infection by the following ways:
·         Program takes long time to load.
·         The floppy disk or hard disk is suddenly accessed without a logical reason.
·         Increased use of disk space and growth in file size.
·         Renaming the files and folders without the knowledge of the user.
·         The measures that can be adopted to protect computer from viruses are:
·         Install a powerful anti-virus program to protect and update its virus definition file frequently.
·         Do not use the pirated software.
·         Do not open suspicious emails and attachments files send by the unknown person.
·         Do not use freely distributed software.
6.    What is DBMS? Write any two examples of DBMS software.
Ans: DBMS is a software that is used to manage data, manipulate them and provide the information.
The two examples of DBMS are:
·         MS-Access
·         Oracle
7.  What is meant by data sorting? What is a record?
AnsData sorting means grouping all the records either in ascending or descending order based on a key field of the record.
Record is a row in a table that contains information about a given person, product or event.
8.  What is form? Write any two advantages of using form.
AnsForm is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
The two advantages of using form are:
·         It provides a user-friendly platform for input of data into the database.
·         It helps to display data in more presentable form than a datasheet.
9. What is mean by local variable?
AnsThose variables which are not visible to other modules or function and are declared inside a function is known as local variable.
10.  Write any two data types supported by C language.
AnsThe data types supported by C language are:
·         int
·         char
·         float
·         double
11. Write down the function of Name and Kill statement.
AnsThe function of:
·         NAMEThe function of NAME is to rename a file or group of files from the diskette.
·         KILLThe function of KILL statement is to delete the file or files from the specified drive and directory.
Model Set 9 (SEDIPS 2070)
1.   What is network protocol? Give any two examples of protocols belongings to TCP/IP family.
AnsA set of rules that must be followed by sender and receiver to make communication possible is known as network protocol.
Two examples of protocols belonging to TCP/IP family are:
·         FTP(File Transfer Protocol)
·         HTTP(Hyper Text Transfer Protocol)
2.  Mention any four symptoms of computer virus.
AnsAny four symptoms of computer virus are:
·         Program takes long time to load.
·         The floppy disk or hard disk is suddenly accessed without a logical reason.
·         Increased use of disk space and growth in file size.
·         Renaming the files and folders without the knowledge of the user.
3.  What do you mean by cyber law? When was cyber law of Nepal introduced?
Ans The law which governs the legal issue in the cyberspace regarding the Internet or WWW for digital data processing and transaction is known as cyber law.
Cyber law was introduced in Nepal on 30stBhadra 2061 B.S. (15th September 2004 A.D.)
4.  What is interactive multimedia? List any two interactive multimedia?
AnsInteractive multimedia is the integration of several forms of media such as text, audio, video, graphics and animation that is used to display information in more attractive and understandable way.
Any two interactive multimedia are:
·         Multimedia in advertisement
·         Special effect in movies
5. What is website? Give any two examples of website that belongs to Microsoft Corporation.
AnsWebsite is a collection of web pages that can be published by an organization or individual.
Any two examples of websites that belongs to Microsoft Corporation are:
·         www.msn.com
·         www.microsoft.com
6.   What is MS-Access? Give any two examples of RDBMS.
AnsMS-Access is a relational database management system developed by Microsoft Corporation which is used to store and manipulates large volume of data in the form of tables.
Any two examples of RDBMS are:
·         MS-Access
·         FOXPRO
7.              Differentiate between validation rule and validation text.
AnsThe differences between validation rule and validation text are:
Validation Rule
Validation Text
It limits the value that can be accepted into a field.
It allows to type text to be displayed if the user input value is prohibited by the validation text.

8.    What do you mean by action query? Mention its types.
AnsThe query that makes changes to many records in just single operation is known as action query.
The types of action query are:
·         Update query
·         Append query
·         Delete query
·         Make table query
9.  Differentiate between program file and data file.
AnsThe difference between program file and data file are:
Data file
Program file
It is a collection of the related data stored in the hard disk or any other secondary storage devices separately from the program that used it.
A program file is a file which contains a set of instructions written in a computer language.

10.  What is unary operator? Give any one example.
AnsA unary operator is an operator that takes a single operand in an expression or a statement. Example: ++, --, etc.
11.  Give syntax and an example of OPEN statement.
AnsThe syntax of OPEN statement is:
OPEN “filename.ext” FOR <mode> AS #filenumber
Example: OPEN “student.dat” FOR OUTPUT AS #1
Model Set 10 (SOS)
1.   “Computer Network reduces cost”. Give any two points to support this statement.
AnsComputer network reduces the cost of operation as it allows sharing of resources like hardware, software and services- for example: a printer or one internet connection can be shared by all the users of anetwork. In this way, it helps to save the cost of a buying extra hardware or services. Problems of the computers in a network can be solved by one or few experts from one place. This saves the cost of hiring experts for all the branches of an office and the cost of travel by the expert to different branches.
2.   What is a backup? Why is backup vital to computer security system?
AnsA copy of a file that is used in the place of original file being corrupted is known as backup.
Backup are vital to the computer system in order to save the important data from being lost or damaged due to accidental or intention harm. When data and software are damaged or lost, we can easily recover it from backup copy.
3. How does virus spread from one computer to another?
AnsBackup spread from one computer to another by the following ways:
·         Sharing of infected portable disk like floppy disk, pen drive, CDs, etc.
·         Opening a virus infected emails, messages and attached files.
·         Downloading files and programs from the websites which are not secure.
·         Exchanging data and information over a network.
4. What do you mean by multimedia? Name any four media used in multimedia technology.
AnsThe integration of several form of media such as text, image, audio, video and animation in order to present the data and information in more interactive and attractive way is known as multimedia.
The names of any four media of multimedia are:
·         Text
·         Audio
·         Video
·         Animation
5. What is cyber law? Write any two ethical values for computer operators.
AnsThe law which governs the legal issue in the cyberspace regarding the Internet or WWW for digital data processing and transaction is known as cyber law.
Any two ethical values for computer operators are:
·         You should not spread false and illegal information.
·         You should not disclose the secrecy of computer.
6.   What is Database Management System? Give any two example of database management system software.
AnsDatabase Management System is software that is used to manage data, manipulate them and provide the information.
Any two examples of database management system are:
·         MS-Access
·         Oracle
7.   Differentiate between select query and action query.
Select Query
Action Query
It is a type of query that is used for extracting specific information from one or more tables in a database.
It is a type of query which makes changes to many records in just single operation.

8.  Identify a record, field and value from the following table structure.
Roll
Name
Marks
1
Rajani Lama
79
2
Mahesh Pandey
75
AnsIn the table:
Records: 1, Rajani Lama, 79, 2, Mahesh Pandey, 75
Field: Roll, Name, Marks
Value: 1,2, Rajani Lama, Mahesh Pandey, 79, 75
9.  How do you define global and local variable in QBASIC. Give an example.
AnsVariables which are declared outside of any function is known as global variable. Their values is not protected from outside interference and have effect on the variables outside the procedure.
Example: DIM SHARED A, B, N (10)
          COMMON SHARED X, Y
Here, A, B, N (), X, Y are global variables
The variable which is declared inside the procedure and is not visible to other modules or function is known as local variable. Its value is protected from outside interference and has no effect on the variables outside procedure.
Example: SUB SUM (A, B)
          S=A+B
          PRINT S
          END SUB
Here, “S” is the local variable.
10.          List any three data types used in C language.
AnsThe three data types of C language are:
·         int
·         char
11. Write the function of FILES and NAME AS.
AnsThe function of:
·         FILESThe function of FILES statement is to display files from the diskette.
·         NAME AS The function of NAME AS is to rename a file of the diskette.

SLC Examination-2065(2009)

a. Define star topology with figure.
Ans: The topology in which all computers or the network devices are connected through a central device in the shape of star structure is called star topology.
Diagram of star topology


https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh81M7EKRxoXmX06HUTf76bHXqWdZ4dPl_RegPY_szEK72rT4DRJxYb0op_gpLN7cqpAxAa2_2z-2whcVMwuIy0TkoOkyuS1r2MJU_ziy5iRPt7563oSO5pqiIvvhoxlny3KQURpfkV5qQ/s1600/STAR.png



b. List out any four services of internet.
Ans: Any four services of internet are
i) E-mail (Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
c. Define computer ethics.
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.
d. Write down two measures of each to protect computer hardware and software.
Ans: Any two hardware security measures are:
ii) Insurance Policy
ii) Power Regulator Device
Any two software security measures are:
          i) Backup
          iv) Password
e. What is anti-virus? Write down any two examples of anti-virus software.
Ans: Antivirus software is software designed to detect and remove virus from computer system to ensure virus free environment.
Any two examples of antivirus software are:
          i) Kaspersky    ii) NOD32
7. Answer the following question:
a) What is database?
Ans:Database is a collection of related and organized information that can be used for different purpose.
b) While designing table structure which data types are suitable to store information about teacher’s name, address, salary, and date of birth.
While designing table structure the data types are suitable to store information about
teacher’s name          = Text
Address = Memo
Salary = currency
Date of birth = Date / Time
c) Write down any two advantages of Query.
Any two importance of query are:
·         It allows user to make calculations and change data in automated fashion.
·         It provides option to delete all the unwanted data matching certain criteria.
10. a) Write down one difference between function and sub procedure.
Ans: One difference between function and sub procedure are given below:
Sub Procedure
Function Procedure
It doesn’t not return value.
It does not return any value.

b) List any two data type used in C language.
Ans: Any two data type used in C language is char and int
c) Write down the functions of:

          i) RMDIR       
·         Ans:It is used to remove or delete only the subdirectories from a disk. It can remove only empty subdirectories.
o   ii) NAME
·         Ans: The NAME statement renames a file on a disk.

SLC Examination-2066(2010)
a) What is computer network?
Ans: computer network means two or more computers connected with each other to share data, hardware, software and other resources.

b) What is internet?
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all over the world.
·         c) Write any four preventive measures to protect computer system from virus infection.
Ans: Any four preventive measures to protect computer system from virus infection are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Don’t install pirated software, especially computer games.

d) Write any two software used for multimedia.
Ans: Any two software used for multimedia are:
·         Windows Media Player
·         VLC Media Player
e) What is hardware security?
 Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is hardware security.
a) What is DBMS? Write any two examples of DBMS software.
Ans: DBMS is a software which is used to manage data, manipulate them and provide the information. Examples of DBMS are MS-Access and Oracle.
b) List any four data types used in MS-Access.
Ans: Any four data types used in Ms-Access are:
·         Text
·         Memo
·         Number
·         Yes/No
c) What is form? Write any two advantages of using form.
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
Any two advantages of using form are:
·         It helps to display data in more presentable form than a datasheet can.
·         It provides an interactive platform for input of data into the database.
10. a) What is modular program?
Modular program is a technique used to divide program into many small, manageable, logical and functional modules or blocks.
b) Write any two advantages of Structured programming.
Ans: Any two advantages of Structured programming
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the function of following statement:

i) Files                      
·         Ans: The FILES statement displays the files of the current sub directory or specified sub directory.
·         ii) KILL
Ans: The KILL statement deletes the file or files from the specified drive and directory.
SLC Examination-2067(2011)
a. Write any two examples of data communication.
Ans: Any two examples of data communication are
·         E-mail
·         Telephone
b. What do you mean by web browser?
Ans: Web browser is a computer program that access web pages and displays them on the user computer.
c. Write any four advantages of multimedia.
Ans: Any four advantages of multimedia are:
i) It makes teaching / learning easier in classroom.
ii) It makes easy to share views, ideas and thoughts among various people.
iii) It can store data and information for longer period.
iv) It makes presentation of related subject matter attractive.
d. Mention any four symptoms of computer virus.
Ans: Any four symptoms of computer virus are:
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
e. What is computer security?
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
a) Define DBMS with examples.
Ans: DBMS is a software which is used to manage data, manipulate them and provide the information. Examples of DBMS are MS-Access and Oracle.

b) What is primary key?
Ans: Primary key is a field that uniquely identifies the record. It is needed because it neither accepts duplicate values nor null values.
c) Why is report created?
Ans: Report is created to print documents according to user’s specifications of the summarized information through query or table.
10. i) What is procedure?
Ans: Procedure is a block of statement that solves a particular problem.

ii) Write any two characteristics of C language.
Ans: Any two characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
iii) Write the function of:
·         -INPUT : It reads data from the sequential data file.
·         -MKDIR: It creates a subdirectory which is used to manage files.
SLC Examination-2068(2012)
1. Answer the following questions:
    a) Define LAN topology and write any two types of LAN topology.
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as LAN topology.
Any two types of LAN topology are
i) Bus topology
ii) Star topology
b) Write any four services of Internet.
Ans: Any four services of internet are
i) E-mail (Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
c) Write any two advantages of multimedia in education field.
Ans: Any two ad advantages of multimedia in education field are
i) It makes teaching/learning easier in classroom.
iv) It makes presentation of related subject matter attractive.
d) Write any two software security measures.
Ans: Any two software security measures are:
i) Backup
ii) Password
e) Write any four symptoms that show, computer is infected by computer virus.
Ans: Any four symptoms that show, computer is infected by computer virus are :
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
a) What is database?
Ans: Database is a collection of related and organized information that can be used for different purpose.
b) What is data sorting?
Ans: Data sorting means grouping all the records in a table either in ascending or descending order based on a key field of the record.

c) What is a form?
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
10.  a) What is loop?
Ans: Loop means executing a statement or group of statements a certain number of times depending upon the condition.
b) List any two data types supported by ‘C’ language.
Ans: Any two data types supported by ‘C’ language are:
i) char
ii) int
c) State the function of the following statement:
           i) EOF                       
          Ans: It detects the end of the file marker reading the data from an open sequential file.
ii) MKDIR
Ans: It creates a subdirectory which is used to manage files.
SLC Examination-2069
1. Answer the following questions:
a) Write any four advantages of computer network.
Ans: Any 4 advantages of computer network are as follows:
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
ii) Information can be exchanged rapidly in computer network.
iii) Computers in a network environment can be updated from any computer.
iv) Software packages can be shared between network connected computers.
b) What is internet? Write the name of any two E-commerce sites.
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all over the world.
c) What is computer ethic?
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.
d) What is hardware security? Write any two software security measures.
Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is hardware security.
Any two software security measures are:
i) password
ii) backup
e) What is computer virus?
Ans: Computer virus is a program written by the programmer with the intention of destroying and damaging the data and programs residing in the computer system.
a) What is database? Give two examples.
Ans: Database is a collection of related and organized information that can be used for different purpose.
Two examples of database are:
i) Dictionary
ii) Telephone Directory
b) Write any two types of primary key.
Ans: The uses of Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
c) What is query?
Ans: Query is an object of  Ms-Access which extracts and arranges information from a table.
10.a) What is meant by mode of data file?
Ans: Mode of data file means opening a sequential file for one of the three modes of operation like output mode, input mode and append mode.


b) Write any two characteristics of ‘C’ language.
Ans: The characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the function of the following statements:
          i) NAME         
          Ans: The NAME statement renames a file on a disk.
ii) KILL
Ans: The KILL statement deletes the file or files from the specified drive and directory.
SLC Examination-2070
a) What is network topology? Write any one advantage of star topology.
The arrangement or connection pattern of computer or nodes and other devices of the network are known as network topology.
Any one advantage of star topology is:
i) Failure of single computer or cable doesn’t affect the entire network.
b) Give any two advantages of E-mail over traditional mail.
Any two advantages of E-mail over traditional mail are
i) It allows sending and receiving message across the world at very low cost.
ii) Emails are usually received fairly quickly, most of the time a couple of seconds after they are sent.
c) List any two main aims of formulating cyber law in Nepal.
The two main aims of formulating cyber law in Nepal are:
i) To legalize the transaction through electronic media to control various types of electronic frauds
ii) To punish a person who does criminal activities through electronic means especially on computers.
d) Give any two symptoms of virus attack.
The two symptoms of virus attacks are:
i) Increased use of disk space and growth in file size
ii) Program takes long time to load.
e) Give the importance of UPS to the computer system.
The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.
a) Define data and information.
Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense.
Information is an organized collection of related data which gives a complete sense.
b) What is report? Give its importance.
Report is an object of database which displays the output in an effective way to present the data in a printed format.
The importance of report are:
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
c) Name any four data types that can be defined in MS-Access.
Any four data types that can be defined in MS-Access are:
·         Text
·         Memo
·         Number
·         Yes/No
10. a) What is a variable?                                                    
The data item whose value changes during the execution of a program is called variable.
b) Name any two data types used in C language.             
          Any two data types used in C language are:
          i) char
          ii) int
c) Give the functions of:                                                       
i) NAME AS
The NAME statement renames a file on a diskette. Only file name changes, data and program
ii) CLOSE
          It closes one or all open files.
SLC Supplementary Examination-2065
1. Answer the following questions:
a) Explain about network topology. Write any two advantages of computer networking.
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as network topology.
Any two advantages of computer networking are :
i. Computer in network share different software packages.
ii. Communication made by computer network is very cheap.
b) What is internet? Write any two advantages of Internet.
AnsInternet is a collection of millions of computers of different types belonging to various networks all over the world.
Any two advantages of internet are as follows:
i. The internet provides very fast and cheap communication.
ii. It is easy to access information of different governments and countries.
c) What is antivirus software?  List any two antivirus software.
AnsThose software which are designed to detect and remove viruses from the computer system to ensure a virus free environment is known as anti-virus software.
Any two antivirus software are:
i. Norton Antivirus
ii. McAfee
d) What is multimedia? Write any two applications of it.
AnsThe integration of several forms of media like audio, video, animation, etc. to present information in more interactive and understandable way is known as multimedia.
Any two applications of it are as follows:
i. Adding special effects in movies:
Multimedia is used in movies to add special effects to make movie more realistic and interesting.
ii. Preparing presentation:
Multimedia is used in preparing presentation which helps to convey information in more interesting and interactive way.
e) What do you mean by software security? Write any two methods to protect the computer software.
AnsThe security given to various software or data from being lost or damaged due to accidental or intentional harm is known as software security.
Any two methods to protect the computer software are:
i. Defragmentation
ii. Scan disk           
a) Define data and database.
AnsData can be numbers, letters or symbols representing facts and figures that may or may not give complete sense.
Database is a collection of related and organized information that is used to store, organize and extract data.
b) Name any four data types that can be defined in MS-ACCESS.
AnsAny four data types that can be defined in MS-Access are as follows:
i. Number
ii. Text
iii. Memo
iv. Auto number
c) What is a form? Give its importance.
AnsForm is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
Importance of form are as follows:
i. It provides an interactive platform for input if data into the database.
ii. It helps to display data in more presentable form than a datasheet can.
10. a) Define modular programming.
AnsModular programming is a technique in which a program is divided into different small manageable program blocks, which are called modules or sub programs.
b) Name any two data types used in C language.
AnsAny two data types of C language are:
        · char
        · int
c) Give the functions of NAME and CLOSE statements.
Ans:
NAME: The function of NAME statement is to rename a file on a diskette
CLOSE: The function of CLOSE statement is to close one or all open files.               
Supplementary Examination 2066
a) What is bandwidth?
AnsThe data handling capacity of a communication system is known as bandwidth.
b) What is network topology?
AnsThe arrangement or connection pattern of computers or nodes and other devices of the network is known as network topology.
c) How can multimedia help in education?
AnsMultimedia technology is very much useful in education. It helps to present the information about various topics in more interesting and interactive way which makes the learner easy to understand. It helps to give better ideas and concept to the students with good vocabulary.
d) Write any four safety measures to protect computer form virus.
AnsAny four safety measures to protect computer from viruses are:
·         Write-protect your floppy disk when using them on other computers.
·         Do not install pirated software, especially computer games.
·         Always scan files downloaded from the internet or transferred over the network before executing them.
·         Do not interchange internal disk among the computers.
e) What is computer hardware and software security?
AnsThe security given to various hardware tools and equipment from being lost or damaged due to accidental or intentional harm is known as hardware security. For e.g: protection from theft, power protection device, etc.
The security given to various software and data from being lost or damaged due to accidental or intentional harm is known as software security. For e.g: defragmentation, scan disk, etc.
a) Define database.
AnsDatabase is a collection of related and organized information that is used to store, organize and extract data.
b) Write any four data type used in MS-Access.
AnsAny four data types used in MS-Access are as follows:
·         Number
·         Text
·         Memo
·         Auto number
c) What is query?
AnsQuery is an object of MS-Access which allows selecting specific data from one or more tables.
10. a) What is user defined function?
AnsThe function which is defined by the user according to the need is known as user-defined function.
b) List any two data types used in C language.
AnsThe data types used in C language are:
        · Char
        · Int
c) Write down the function of the following statements:
i) KILL                      ii) FILES
AnsThe function of:
i.  KILL: It deletes the file or files from the specified drive and directory.
ii.   FILES: It displays all the files of the current subdirectory or specified sub directory.
Supplementary Examination 2067
a) Define LAN topology. Draw the Bus topology.
AnsLAN topology is the arrangement or connection pattern of computers or nodes and other devices of the network Diagram of Bus topology:

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkt3Yn2cNWfAwZASNcy6if-vJjx57kiCQb8kQqVf-6T2ETo0Bi4zuCbyRCddf0FnnYu6_3pWEA-WMV4TyDwWFC_ApDSvTvghZT2iTdJXDdfauW2HXrEmcX2ygkNwwDC5_tnyjmHUaCIC8/s1600/BUS.png


b) What is multimedia? Name any two fields where multimedia is used.
AnsThe integration of several forms of media such as text, audio, video, animation, etc. to present the information in more attractive and understandable way is known as multimedia.
Any two fields where multimedia is used are as follows:
i.  Multimedia technology in advertisement
ii.Multimedia technology to learn foreign language
c) Give two advantages of e-mail over traditional mail.
AnsThe advantages of e-mail over traditional mail are as follows:
i.  It is faster and cheaper.
ii.It allows us to send and receive messages, documents, sounds, etc. across the world.
d) Write any two ways of protecting computer software.
AnsAny two ways of protecting computer softwares are:
i.  Defragmentation
ii.Scan disk
e) What is antivirus? Name any two antivirus software.
AnsThe software designed to detect and remove virus from the computer to ensure a virus free environment is known as anti-virus software.
Any two anti-virus software are as follows:
i.  Norton Antivirus
ii.McAfee
a) What is database? Name any two database software.
AnsDatabase is a collection of related and organized information that is used to store, organize and extract data.
Any two database software are as follows:
i.  Telephone directory
ii.Dictionary
b) Name any four data types that can be define in MS-Access.
AnsAny four data types that can be defined in MS-Access are as follows:
i.  Number
ii.Text
iii.    Auto number
iv.    Memo
c) What is a report? Give its importance.
AnsReport is an object of MS-Access that is used to present data in a printed format using a specific layout.
The importance of report are as follows:
i.  It presents data and information from table or query in a flexible layout.
ii.It helps to present data in printed format.
10. a) What is a loop?
Ans:The process of repeating a statement or block of statement for a number of times is known as loop.
b) Name any two data types used in C language.
AnsAny two data types used in C language are:
        · int
        · char
c) Give the functions of NAME and CLOSE statements.
AnsThe functions of:
i. NAME: It renames a file on a diskette.
ii.    CLOSE: It closes one or all open files.

Supplementary Examination 2068
a) Define Computer network.
AnsA computer network means two or more than two computers connected to each other to share data, hardware, software and other resources.
b) What is E-mail? Give an example of valid E-mail I.D.
AnsE-mail is one of the most popular service provided by the internet which is used to send and receive mail through the internet.
An example of valid E-mail I.D. is shr_ram01@gmail.com
c) Write any two advantages of multimedia in educational field.
AnsAny two advantages of multimedia in educational field are:
        · It helps to present the information in more interactive and understandable way.
        · It makes studying much more interesting.
d) What is a computer hardware security?
AnsThe security given to various hardware tools and equipment from being lost or damaged due to accidental or intentional harm is known as computer hardware security. For e.g.: fire detector, protection from theft, etc.
e) What is a computer virus?
AnsA type of computer program which is written by the programmer with the intent of damaging or destroying the data and programs residing in the computer system is known as computer virus.
a) What is database?
AnsDatabase is a collection of related and organized information that is used to store, organize and extract data.
b) What data types are used to store salary and date of the birth?
AnsThe data types that are used for:
        · Salary – Currency
        · Date of birth – Date/Time
c) What is query?
AnsQuery is an object of MS-Access which allows selecting specific data from one or more tables.
10. a) Mention the types of procedure.
Ans: The types of procedures are:
        i.            Function Procedure
      ii.            Sub Procedure
b) Write any one difference between Q-Basic and C language.
Ans: The difference between Q-Basic and C language are as follows:
Qbasic
C Language
It is mostly used to design application software.
It is mostly used to prepare system software.

c) Write the functions of the following:
i) KILL                      ii) RMDIR
Ans: The function of:
        i.            KILL: It deletes the file or files from the specified drive or directory.
      ii.            RMDIR: It removes or deletes only sub directory from a disk

Supplementary Exam 2069
a.       What is computer network? Draw the diagram of BUS topology.
 A computer network means two or more than two computers connected to each other to share data, hardware, software and other resources.
Diagram of bus topology:

https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkt3Yn2cNWfAwZASNcy6if-vJjx57kiCQb8kQqVf-6T2ETo0Bi4zuCbyRCddf0FnnYu6_3pWEA-WMV4TyDwWFC_ApDSvTvghZT2iTdJXDdfauW2HXrEmcX2ygkNwwDC5_tnyjmHUaCIC8/s1600/BUS.png



b.       Define Internet and E-mail.
 Internet: A collection of millions of computers of different types belonging to various networks all over the world is known as internet.
E-mail: E-mail is one of the most popular services provided by internet which allows sending and receiving mail through the internet.
c.        Write any four advantages of using multimedia.
 Any four advantages of using multimedia are as follows:
i.     It makes easy to share views, ideas and thoughts among various people around the world.
ii.   It can store data and information for a long period.
iii. It makes the presentation of related subject matter attractive.
iv. It makes teaching-learning easier in classroom.
d.       Write any four possible threats to computer security.
 Any four possible threats to computer security are:
·         Extreme temperature and dust
·         Theft of hardware components.
·         Voltage fluctuation
·         Unauthorized access of data and programs
e.        What is anti-virus program? Give any two examples.
 The software which is designed to detect and remove viruses from computer system to ensure a virus-free environment is known as anti-virus software.
Any two examples of anti-virus software are:
i.     Norton Antivirus
ii.   McAfee
a.       What is data? Give any two examples of DBMS software.
 Data can be numbers, letters or symbols representing facts and figures, which may or may not give any sense.
Any two examples of DBMS software are:
i.     MS-Access
ii.   Oracle
b.      Write any two things to be considered after assigning primary key for a field.
  Any two things to be considered after assigning primary key for a field are as follows:
·         Reduce and control duplication of record in a table
·         Set the relationship between tables.

c.  What is form?
 Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.

a.       Write the difference between SUB procedure and FUNCTION procedure.
  The difference between SUB procedure and FUNCTION procedure are as follows:
SUB procedure
FUNCTION procedure
Sub procedure does not return a value.
FUNCTION procedure must return a value.
SUB procedure is called by CALL statement.
FUNCTION procedure is called by statement and expression method.
SUB-procedure’s name does not accept data type symbol because it does not need to return a value.
FUNCTION-procedure’s name accepts data type symbols such as $, %, !, #, &, etc. and it depends on the type of value to be returned. E.g.: FUNCTION REV$ returns string.

b.      Write the two basic data types used in “C” language.
 The basic data types used in C language are as follows:
        · char
        · int
c.       Write the function of the following statements:
i.      NAME: The function of NAME statement is to rename a file on a diskette.
ii.    CLOSE: The function of CLOSE statement is to close one or all open file.



No comments:

Post a Comment