Monday, May 30, 2016

SOLUTION BOOST UP EXAMINATION - 2071

Group A
Computer Fundamentals (22 Marks)

1.  Answer the following questions.                            2×5=10

a)      Define network topology. Draw a neat and well labeled diagram of bus topology.
Ans: The arrangement or connection pattern of computers or nodes and other resources of a network is known as network topology.
The diagram of bus topology is shown below:
b)      List any two – two advantages and disadvantages of internet.
Ans: Any two advantages of internet are:
·                              It allows sharing views, thoughts, ideas, etc. among the people throughout the world.
·                              It enables users to send and receive mail messages in short period of time.
Any two disadvantages of internet are:
·                              Information shared in internet are not 100% secure
·                              Pornography is a serious problem related to internet.


c)      What is backup? Why are backups vital to computer security system? Ans: A copy of a file used at the event of original file being corrupted is known as backup.
Backup plays a vital role in computer security to save important files and documents from being lost or damaged due to accidental or intentional harm to the computer system. It secures copy of a file which can be useful when original files are damaged or corrupted

d) List any four ways that viruses spread from one computer to another?
Ans: Any four ways for spreading virus from one computer to another are:
·                              Installation of pirated software, especially computer games.
·                              Interchanging of internal hard disks.
·                              Opening mails which are infected from virus.
·                              Downloading files which contains virus.


e)      What is cyber law? Mention any two ethical issues of computer ethics.
Ans: The law which governs the legal issues in the cyberspace regarding the Internet or WWW for digital data processing and transactions is known as cyber law.
Any two ethical issues for computer ethics are:
·                              Do not use computers to harm others
·                              Do not open software for which you have not paid

2a. Convert as indicated.                                           1×2=2
i)  (615)10 – (    )16             
a.       i. (615)10-(x)16
Solution:                                                                                                
16
615
R
16
38
7
2
6
= (267)10
Hence, (615)10-(267)16





ii) (7015)8 -  (    )2


Solution:
                  (7015)8-(X)2
                  7=111
                  0=000
                  1=001
                  5=101
                  =(111000001101)2
Hence, (7015)8-(111000001101)2


b.  Perform the following binary calculations.          1×2=2
i)  110101 ÷ 110   




ii) 10001 – 1101 + 11






3.  Match the following.                                              0.5×4=2
a)      Fair credit reporting Act                       1974 AD.
b)      Federal Privacy Act                             1992 AD.
c)      Copyright Act                                      1988 AD.
d)      Video Privacy Protection Act               1970 AD.


Answers

a.      Fair credit reporting Act -----------------> 1970 AD
b.      Federal Privacy Act          ------------------> 1974 AD
c.       Copyright Act                   -----------------> 1992 AD
d.      Video Privacy Protection Act -----------> 1988 AD




4.  Select the best answer.                                          0.5×4=2
a) The……………is the Antivirus program.
            i) NAV             ii) CPAV          iii) MSAV        iv) All of them
            All of them

    b) Which of the following includes data diddling?
i) Cyber Crime               iii) Computer Security 
ii) Virus                         iv)  Multimedia
Cyber Crime

     c)  A computerized mail service that answers telephone calls and record
     audio message.
            i)   E mail         ii)   E fax     iii)  Voice mail     iv)   Telnet
            Voice mail

d) The government of Nepal has passed the cyber law on:
i) 15th September 2003                                    ii) 15th September 2004          
iii) 15th September 2005                                  iv) 15th September 2006
15th September 2004

5.  Give one word for the followings.                         0.5×4=2

a)      A card that is used to connect networking cable to computer.
Ans: Network Interface Card(NIC)

b)      A protocol that allows transferring files from one computer to another.
Ans: File Transfer Protocol(FTP)

c)      The process for realigning the position of related file clusters to speed up the overall operation of the drive.
Ans: Defragmentation

d)      A data transmission medium made of tiny of glares which transfer at the speed of light.
Ans: Fiber optics cable

6.  Write down the full forms.                                                0.5×4=2
a) Wi-fi                 
b) UTP                  
c) EBCDIC           
d) DVD-ROM

Answers
a.      Wi-Fi: Wireless Fidelity
b.      UTP: Unshielded Twisted Pair
c.       EBCDIC: Extended Binary Coded Decimal Interchanged Code
d.      DVD-ROM: Digital Versatile Disk- Read Only Memory


Group B
Database (10 Marks)
7. Answer the following questions.                                         2*3=6

a.       What is database? Give two examples of DBMS.
Ans: Database is a collection of related and organized information that are used to store, organize and extract data.
Any two examples of DBMS are:
·                              MS-Access
·                              Oracle

b.      What is a table? Give the importance of form.
Ans: A table is an object of MS-Access that is used to store data in row and column format.
The importance of form is as follows:
·                              It provides better interface for inputting data.
·                              It presents data in better way than datasheet.

c.       What do you mean by sorting? Give any two importance of primary key.
Ans: Sorting is the process of aligning the records either in ascending or in descending order based on key field of a record.
Any two importance of primary key are:
·                              It controls duplication of data
·                              It sets relationship among the different fields in a table or multiple linked tables.



8. Choose the best answer.                                                                                0.54=2
a) Which of the following is not a database object in MS Access?
i) Tables      ii) Query          iii) Report        iv) Relationship
Relationship

b) Which is not a view to display a table in Access?
i) Datasheet View                            ii) Design View                       
iii) Pivot Table & Pivot Chart View iv) None of above
None of above

c) It is an association established between common fields of two tables.
i) line                       ii) relationship              iii) primary key
iv) records
Relationship

d) What are the columns in a Microsoft Access table called?
i) Rows                    ii) Records       iii) Fields          iv) Columns
Records

9. Match the following.                                     0.5*4=2
    Group A                                                            Group B
a)       Currency                                                  4 bytes
b)       OLE Object                                             8 bytes
c)       Hyperlink                                                 up to 2048 characters
d)       AutoNumber                                           up to 1 GB
64000 characters
Answers
a.      Currency       ------------> 8 bytes
b.      OLE Object --------------> up to 1 GB
c.       Hyperlink    --------------> 2048 Characters
d.      Auto number -----------> 4 bytes


Group C
QBasic Programming (18 Marks)

10 a)  Write down any two advantages of modular programming.          1
Ans: Any two advantages of modular programming language are:
         It divides a program into different modules because of which it is easier to test the program
         Same module can be used in different programs which makes user easier to code the program
b.      List any four data types used in C language.            1
Ans: Any four data types used in C language are:
·                              char
·                              int
·                              float
·                              double
c.       Write down the functions of following commands.                1
·                              NAME:
The function of NAME statement is to rename a file or group of files of the diskette.
·                              EOF:
The function of EOF is to detect the End Of File marker reading from the open sequential data file.

11.  Re-write the given program after correcting the bug.   2

REM  TO GET HCF AND LCM OF GIVEN NUMBERS
DECLARE  FUNCTION HCF (M, N)
CLS
INPUT "ENTER TWO POSITIVE NUMBERS"; A, B
C=HCF (M, N)
PRINT"HCF OF GIVEN VALUES=" , HCF
END
FUNCTION HCF (M, N)
AB:
IF M MOD N = 0 THEN
HCF = N
ELSE
M = N
N = M MOD N
GOTO ABC
END FUNCTION

Debugged Program

REM to get HCF and LCM of given numbers
DECLARE FUNCTION HCF(M,N)
CLS
INPUT “Enter two positive numbers”; A,B
C=HCF(A,B)
PRINT “HCF of given number=”; C
END

FUNCTION HCF(M,N)
AB:
IF M MOD N = 0 THEN
HCF=N
ELSE
M=N
N= M MOD N
GOTO AB
END IF
END FUNCTION



12.  Write the output of the following program.                   2
         DECLARE SUB CHECK ( )
CALL CHECK
END
               SUB CHECK
CLS
FOR K = 1 TO 5
FOR I = 5 TO K STEP -1
PRINT I;
NEXT I
PRINT
NEXT K    
END SUB

OUTPUT
5 4 3 2 1
5 4 3 2
5 4 3
5 4
5


13.  Analyze the program given below and answer the questions. 2×1=2
a.       DECLARE SUB TEST(A,B,C)
INPUT ”Enter three different numbers”; X, Y, Z
CALL TEST(X,Y,Z)
END

SUB TEST(A,B,C)
      IF A>B AND A>C THEN
                  T=A+B+C
      ELSEIF B>A AND B>C THEN
                  T=A*B*C
      ELSE
                  T=(B+A)/C
      END IF
PRINT T
END SUB

List the different operators with their types from the above program.
Ans: The different types of operators are:
·                              Arithmetic Operators:  +, *,  /
·                              Logical Operators:  AND
·                              Relational Operators: =, >

b.      List the real parameters used in the program.
Ans: The real parameters used in the program are X, Y, Z.
           
 14 a) WAP to find the volume of cylinder using function procedure.                       3
Ans: DECLARE FUNCTION CYLC(R,H)
CLS
CONST PI=3.14
INPUT “ENTER RADIUS AND HEIGHT”; R, H
PRINT “THE VOLUME OF CYLINDER =”;CALC(R,H)
END

FUNCTION CALC(R,H)
V=PI*R^2 *H
CALC=V
END FUNCTION

b.      WAP to display the series 1,121,12321,1234321,123454321 using SUB procedure.           3
Ans:
DECLARE SUB SERIES ( )
CLS
CALL SERIES
END

SUB SERIES
A#=1
FOR I = 1 TO 5
PRINT A# ^2
A#=A#*10 + 1
NEXT I
END SUB

c) WAP to delete some records from “school.dat” file where computer ask
user to enter the name, which is to be deleted. (Field names are name, address, and telephone number).       3

            OPEN “school.dat” FOR INPUT AS #1
            OPEN “temp.dat” FOR OUTPUT AS #2
            CLS
            INPUT “ENTER NAME TO DELETE DATA”; D$
            WHILE NOT EOF (1)
            INPUT #1, N$, A$, T#
            IF UCASE$(D$) < > UCASE$(N$) THEN
            WRITE #2, N$, A$, T#
            ELSE
            PRINT “DELETED DATA”;N$, A$, T#
END IF
WEND
CLOSE #1, #2
KILL “school.dat”
NAME “temp.dat” AS “school.dat”
END





No comments:

Post a Comment