Monday, May 23, 2016

SLC PREPARATION EXAMINATION 2072 [PABSON KATHMANDU]

GROUP ‘A’
1.      Answer the following questions:
a.       Why most of the people prefer to use star topology? Write down any two demerits of star topology?
Most of the people prefer to use star topology because of its following advantages:
·         Failure of single computer does not affect entire network.
·         It is easy to detect errors in star topology.
Two demerits of star topology are:
·         It requires more cable so it is costlier.
·         Failure of central device may break down entire system.

b.      What is password policy? How can password help in security?
A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy.
Password can help in security as it is a secret word or phase that gives user access to a particular program or file.It protects the data, file, program, folder or even computer system from being used by an unauthorized person.

c.       What is virtual reality? Write its two advantages.
Virtual reality is an artificial environment created using computer hardware and software and presented to the user in such a way that it appears real.
Its two advantages are:
·         It is used in hospital to provide training to doctors.
·         It is also used in military purposes.

d.      Write down any four of the security measures to protect computer equipment and supplies.
Four security measures to protect computer equipment and supplies are:
·         Insurance policy
·         Regular maintenance
·         Fire detector
·         Power regulator device

e.       Why are viruses developed and how it works?
Viruses are developed because of the following reasons:
·         To stop software piracy.
·         To expose the programming capability of programmer.
A virus is a type of destructive program developed by programmer.Some virus activate while other    spread out.But when viruses activate they do various things including corrupting systems data,renaming all files with different names,taking longer time to load program,etc.
     
2.      Perform the following binary calculation:
                    i.            (10110+1101)-(11101)
Adding
  10110
  + 1101
 100011

Subtracting,
100010
 -11101
       110
(10110+1101)-(11101)=110


                  ii.            (1011 X11)/101
Multiplying,
 1011
   X11
  1011
1011X
100001

Dividing,
101
100001
 -101
110

    110
- 101


11
        -  0


11


Q=110
R=11

b)      Convert the following as indicated:
                    i.            (1001011)8=(?)2
Converting octal to binary
001=1
001=1
011=3
(1001011)8=(113)2

                  ii.            (9AB)16=(?)10
Converting hexadecimal to decimal
=9*162+10*161+11*160
=2304+160+11
=2475
(9AB)16=(2475)10


3.      Match the following:
a)      Intellectual property                            Copy right
b)      Self-replicating                                    virus
c)      Radio wave                                         Unbounded
d)     SPX/IPX                                             Protocol

4.      Write appropriate technical term:
a)      Technique of providing governance information and services through the internet.
Ans: E-governance
b)      Message sent electronically through computer network.
Ans: E-mail
c)      Software that obtains information from user’s computer without the user’s knowledge or consent.
Ans: Computer virus
d)     Two ways mode of communication
Ans: Full duplex mode

5.      Write full forms of the following:
DARPA-Defence advanced research projects agency
VSAT- Very Small Aperture Terminal
URL- Uniform Resource Locator
VHF-Very High Frequency

6.      Choose the correct answer:
a)      Opera and firefox is a/an………..
                    i.            Chat program
                  ii.            Web browser
                iii.            Search engine
                iv.            None of the above

Ans: Web browser

b)      ……………..is the generic term used to refer all the legal and regulatory aspects of internet.
                    i.            Cyber ethics
                  ii.            Cyber law
                iii.            Cyber space
                iv.            Both i and ii

Ans: Cyber Law


c)      Main component of multimedia is:
                    i.            Floppy disk
                  ii.            Magnetic disk
                iii.            Sound card
                iv.            All of above

Ans: Sound card


d)     Stoned and Michelangelo are the example of
                    i.            Boot sector virus
                  ii.            File infection virus
                iii.            Polymorphic virus
                iv.            Script virus
Ans: Boot sector virus


GROUP ‘B’
7.      Answer the following questions:
a)      Write down different objects of MS-Access?
The different objects of MS-Access are:
·         Table
·         Form
·         Report
·         Query

b)      Why is table called primary object of database?Write any two components of table.
Table is called primary object of database because table is the combination of rows and columns which contains the collection of data about an entity and is used for grouping and storing the relevant data.
The two components of table are row and column.

c)      Write down two advantages of query?
Two advantages of query are:
·         It can filter,perform calculation and summarize data.
·         Large volume of records can be updated and deleted at the same time.

8.      State true or false:
a)      Maximum field size of memo field is 255 characters.False
b)      A customizable database object that is used to enter,edit and view data is called report.False
c)      Combination of one or more primary key is composite key.True
d)     Sorting is arrangement of data.True

9.      Match the following:
a)      Sorting                              grouping records
b)      Input mask                                    field property 
c)      Number                             double
d)     Look up wizard                 data type
Group ‘C

10.  Answer the following questions:
a)      What do you mean by local and global variable?
The variables which are declared inside procedure and is not affected by outer interference is called local variable.
The variables which are declared outside procedure and is affected by outer interference is called global variable.

b)      List any two similarities of QBASIC and c language?
Two similarities of QBASIC and c language are:
·         Both are structured programming language.
·         Both support both local and global variable.
c)      Write down the functions of FlLES and EOF.
FILES-It displays the contents of files of the disk.
EOF-It marks the end of a sequential file.

11.  Write the output of the following program.
DECLARE SUB PRO (A)
N=62
CALL PRO (N)
PRINT “End of the game”
END
SUB PRO (A)
X=A
DO
R = X MOD 8
B$=STR$(R) +B$
X=(X-R)/8
LOOP UNTIL X=0
PRINT B$
END SUB

OUTPUT
76
End of the game

12.  Rewrite the following program correcting bugs:

REM to display the contents of a data file
OPEN “marks.dat” FOR INPUT AS#1
CLS
WHILE NOT EOF (1)
INPUT #1, NAME$, AGE, ADD$
PRINT NAME$, AGE, ADD$
WEND
CLOSE#1
END

13.  Read the following program and answer the following  questions:
DECLARE SUB SERIES(X,Z)
CLS
INPUT”ENTER FIRST TERM”; X
INPUT”NUMBER OF TERMS TO BE GENERATED:” Z
CALL SERIES(X, Z)
END
SUB SERIES(X, Z)
FOR I= 1 TO X
PRINT Z
Z=Z*I
NEXT
END SUB

QUESTIONS:
a)      What will be the output if user input 3 and 4 for variables X and Z respectively?
If user input 3 and 4 for variables X and Respectively then output will be
4
4
8


b)      How many parameters are there in above program?
Two parameters are used in above program.

14.   A) WAP using SUB …END SUB to find the total surface area of box.
Declare sub area (l, b, h)
Cls
Input “enter length, breadth, height”; l, b, h
Call area(l,b,h)
End

Sub area (l, b, h)
A=2*(l*b+b*h+l*h)
Print “total surface area of box=”;A
End

b)WAP to print longest word among three different input words using FUNCTION…END FUNCTION.
DECLARE FUNCTION LONG$(A$,B$,C$)
CLS
INPUT”ENTER THREE WORDS”;A$,B$,C$
PRINT”LONGEST WORD=”;LONG$(A$,B$,C$)
END

FUNCTION LONG$(A$,B$,C$)
A=LEN(A$)
B=LEN(B$)
C=LEN(C$)
IF A>B AND A>C THEN
LONG$=A$
ELSEIF B>A AND B>C THEN
LONG$=B$
ELSE
LONG$=C$
END IF
END FUNCTION

C)Write a program to create data file”address.inf” where field name are serial no,name ,address and telephone number.The program should terminate according to the user choice.

OPEN”ADDRESS.INF” FOR OUTPUT AS#1
DO
CLS
INPUT”ENTER SERIAL NUMBER”;R
INPUT”ENTER NAME”;N$
INPUT”ENTER ADDRESS”;A$
INPUT”ENTER TELEPHONE NUMBER”;T#
WRITE #1,N$,R,A$,T#
INPUT”DO YOU WANT TO CONTINUE(Y/N)”;CH$
LOOP WHILE UCASE$(CH$)=”Y”
CLOSE #1
END

1 comment:

  1. Ok contact me I need study techniques for 4GPA in SEE 2075
    My fb Acc: Purushottam Shukla

    ReplyDelete