Group A
Computer
Fundamentals (22 Marks)
1. Answer
the following
questions. 2×5=10
a) Define
network topology. Draw a neat and well labeled diagram of bus topology.
Ans:
The arrangement or connection pattern of computers or nodes and other resources
of a network is known as network topology.
The diagram of bus topology is shown below:
The diagram of bus topology is shown below:
b) List
any two – two advantages and disadvantages of internet.
Ans:
Any two advantages of internet are:
·
It
allows sharing views, thoughts, ideas, etc. among the people throughout the
world.
·
It
enables users to send and receive mail messages in short period of time.
Any
two disadvantages of internet are:
·
Information
shared in internet are not 100% secure
·
Pornography
is a serious problem related to internet.
c) What
is backup? Why are backups vital to computer security system? Ans: A
copy of a file used at the event of original file being corrupted is known as
backup.
Backup
plays a vital role in computer security to save important files and documents
from being lost or damaged due to accidental or intentional harm to the
computer system. It secures copy of a file which can be useful when original
files are damaged or corrupted
d)
List any four ways that viruses spread from one computer to another?
Ans:
Any four ways for spreading virus from one computer to another are:
·
Installation
of pirated software, especially computer games.
·
Interchanging
of internal hard disks.
·
Opening
mails which are infected from virus.
·
Downloading
files which contains virus.
e) What
is cyber law? Mention any two ethical issues of computer ethics.
Ans:
The law which governs the legal issues in the cyberspace regarding the Internet
or WWW for digital data processing and transactions is known as cyber law.
Any
two ethical issues for computer ethics are:
·
Do
not use computers to harm others
·
Do
not open software for which you have not paid
2a.
Convert as
indicated. 1×2=2
i) (615)10 –
( )16
a. i.
(615)10-(x)16
Solution:
16
|
615
|
R
|
16
|
38
|
7
|
2
|
6
|
=
(267)10
Hence,
(615)10-(267)16
ii)
(7015)8 - ( )2
Solution:
(7015)8-(X)2
7=111
0=000
1=001
5=101
=(111000001101)2
Hence,
(7015)8-(111000001101)2
b. Perform
the following binary
calculations. 1×2=2
i) 110101
÷ 110
ii)
10001 – 1101 + 11
3. Match
the
following. 0.5×4=2
a) Fair
credit reporting
Act 1974
AD.
b) Federal
Privacy
Act 1992
AD.
c) Copyright
Act 1988
AD.
d) Video
Privacy Protection
Act 1970
AD.
Answers
a. Fair credit reporting Act
-----------------> 1970 AD
b. Federal Privacy
Act ------------------>
1974 AD
c. Copyright
Act ----------------->
1992 AD
d. Video Privacy Protection Act ----------->
1988 AD
4. Select
the best answer. 0.5×4=2
a)
The……………is the Antivirus program.
i)
NAV ii)
CPAV iii)
MSAV iv) All of them
All
of them
b)
Which of the following includes data diddling?
i) Cyber
Crime iii)
Computer Security
ii) Virus iv) Multimedia
Cyber
Crime
c) A
computerized mail service that answers telephone calls and record
audio
message.
i) E
mail ii) E
fax iii) Voice
mail iv) Telnet
Voice
mail
d)
The government of Nepal has passed the cyber law on:
i)
15th September
2003 ii)
15th September
2004
iii)
15th September
2005 iv)
15th September 2006
15th September
2004
5. Give
one word for the
followings. 0.5×4=2
a) A
card that is used to connect networking cable to computer.
Ans:
Network Interface Card(NIC)
b) A
protocol that allows transferring files from one computer to another.
Ans:
File Transfer Protocol(FTP)
c) The
process for realigning the position of related file clusters to speed up the
overall operation of the drive.
Ans:
Defragmentation
d) A
data transmission medium made of tiny of glares which transfer at the speed of
light.
Ans:
Fiber optics cable
6. Write
down the full
forms. 0.5×4=2
a)
Wi-fi
b)
UTP
c)
EBCDIC
d)
DVD-ROM
Answers
a. Wi-Fi:
Wireless Fidelity
b. UTP:
Unshielded Twisted Pair
c. EBCDIC:
Extended Binary Coded Decimal Interchanged Code
d. DVD-ROM:
Digital Versatile Disk- Read Only Memory
Group B
Database (10 Marks)
7.
Answer the following questions. 2*3=6
a. What
is database? Give two examples of DBMS.
Ans: Database is a collection of related and organized information that are used to store, organize and extract data.
Any two examples of DBMS are:
Ans: Database is a collection of related and organized information that are used to store, organize and extract data.
Any two examples of DBMS are:
·
MS-Access
·
Oracle
b. What
is a table? Give the importance of form.
Ans:
A table is an object of MS-Access that is used to store data in row and column
format.
The
importance of form is as follows:
·
It
provides better interface for inputting data.
·
It
presents data in better way than datasheet.
c. What
do you mean by sorting? Give any two importance of primary key.
Ans:
Sorting is the process of aligning the records either in ascending or in
descending order based on key field of a record.
Any
two importance of primary key are:
·
It
controls duplication of data
·
It
sets relationship among the different fields in a table or multiple linked
tables.
8.
Choose the best
answer. 0.54=2
a)
Which of the following is not a database object in MS Access?
i)
Tables ii)
Query iii)
Report iv) Relationship
Relationship
b)
Which is not a view to display a table in Access?
i)
Datasheet View ii)
Design View
iii)
Pivot Table & Pivot Chart View iv) None of above
None
of above
c)
It is an association established between common fields of two tables.
i)
line ii)
relationship iii)
primary key
iv)
records
Relationship
d)
What are the columns in a Microsoft Access table called?
i)
Rows ii)
Records iii)
Fields iv) Columns
Records
9.
Match the following. 0.5*4=2
Group
A Group
B
a) Currency 4
bytes
b) OLE
Object 8
bytes
c) Hyperlink up
to 2048 characters
d) AutoNumber up
to 1 GB
64000 characters
Answers
a. Currency ------------>
8 bytes
b. OLE Object --------------> up to 1 GB
c. Hyperlink -------------->
2048 Characters
d. Auto number -----------> 4 bytes
Group C
QBasic Programming
(18 Marks)
10
a) Write down any two advantages of modular programming. 1
Ans:
Any two advantages of modular programming language are:
It
divides a program into different modules because of which it is easier to test
the program
Same
module can be used in different programs which makes user easier to code the
program
b. List
any four data types used in C language. 1
Ans:
Any four data types used in C language are:
·
char
·
int
·
float
·
double
c. Write
down the functions of following commands. 1
·
NAME:
The function of NAME statement is to rename a file or group of files of the diskette.
The function of NAME statement is to rename a file or group of files of the diskette.
·
EOF:
The function of EOF is to detect the End Of File marker reading from the open sequential data file.
The function of EOF is to detect the End Of File marker reading from the open sequential data file.
11. Re-write
the given program after correcting the bug. 2
REM TO
GET HCF AND LCM OF GIVEN NUMBERS
DECLARE FUNCTION
HCF (M, N)
CLS
INPUT
"ENTER TWO POSITIVE NUMBERS"; A, B
C=HCF
(M, N)
PRINT"HCF
OF GIVEN VALUES=" , HCF
END
FUNCTION
HCF (M, N)
AB:
IF
M MOD N = 0 THEN
HCF
= N
ELSE
M
= N
N
= M MOD N
GOTO
ABC
END
FUNCTION
Debugged
Program
REM
to get HCF and LCM of given numbers
DECLARE
FUNCTION HCF(M,N)
CLS
INPUT
“Enter two positive numbers”; A,B
C=HCF(A,B)
PRINT
“HCF of given number=”; C
END
FUNCTION
HCF(M,N)
AB:
IF
M MOD N = 0 THEN
HCF=N
ELSE
M=N
N=
M MOD N
GOTO
AB
END
IF
END
FUNCTION
12. Write
the output of the following
program. 2
DECLARE
SUB CHECK ( )
CALL
CHECK
END
SUB
CHECK
CLS
FOR
K = 1 TO 5
FOR
I = 5 TO K STEP -1
PRINT
I;
NEXT
I
PRINT
NEXT
K
END
SUB
OUTPUT
5
4 3 2 1
5
4 3 2
5
4 3
5
4
5
13. Analyze
the program given below and answer the questions. 2×1=2
a. DECLARE
SUB TEST(A,B,C)
INPUT ”Enter three different numbers”; X, Y, Z
CALL TEST(X,Y,Z)
END
SUB TEST(A,B,C)
IF A>B AND A>C THEN
T=A+B+C
ELSEIF B>A AND B>C THEN
T=A*B*C
ELSE
T=(B+A)/C
END IF
PRINT T
END SUB
INPUT ”Enter three different numbers”; X, Y, Z
CALL TEST(X,Y,Z)
END
SUB TEST(A,B,C)
IF A>B AND A>C THEN
T=A+B+C
ELSEIF B>A AND B>C THEN
T=A*B*C
ELSE
T=(B+A)/C
END IF
PRINT T
END SUB
List the different operators with their types from the above program.
Ans:
The different types of operators are:
·
Arithmetic
Operators: +, *, /
·
Logical
Operators: AND
·
Relational
Operators: =, >
b. List
the real parameters used in the program.
Ans:
The real parameters used in the program are X, Y, Z.
14
a) WAP to find the volume of cylinder using function
procedure. 3
Ans:
DECLARE FUNCTION CYLC(R,H)
CLS
CONST
PI=3.14
INPUT
“ENTER RADIUS AND HEIGHT”; R, H
PRINT
“THE VOLUME OF CYLINDER =”;CALC(R,H)
END
FUNCTION
CALC(R,H)
V=PI*R^2
*H
CALC=V
END
FUNCTION
b. WAP
to display the series 1,121,12321,1234321,123454321 using SUB
procedure. 3
Ans:
DECLARE
SUB SERIES ( )
CLS
CALL
SERIES
END
SUB
SERIES
A#=1
FOR
I = 1 TO 5
PRINT
A# ^2
A#=A#*10
+ 1
NEXT
I
END
SUB
c) WAP to delete
some records from “school.dat” file where computer ask
user
to enter the name, which is to be deleted. (Field names are name, address, and
telephone number). 3
OPEN
“school.dat” FOR INPUT AS #1
OPEN
“temp.dat” FOR OUTPUT AS #2
CLS
INPUT
“ENTER NAME TO DELETE DATA”; D$
WHILE
NOT EOF (1)
INPUT
#1, N$, A$, T#
IF
UCASE$(D$) < > UCASE$(N$) THEN
WRITE
#2, N$, A$, T#
ELSE
PRINT
“DELETED DATA”;N$, A$, T#
END
IF
WEND
CLOSE
#1, #2
KILL
“school.dat”
NAME
“temp.dat” AS “school.dat”
END
No comments:
Post a Comment