Joint Examination Board
PABSON, Bhaktapur
Pre – Qualifying Examination
2071
Computer Fundamental (22 marks)
1. Answer the following
questions: 2×5=10
a) What is computer network? Write
any two advantages of it.
ANS: computer network means two
or more computers connected with each other to share data, hardware, software
and other resources.
Any two advantages of computer
network are as follows:
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
iii) Computers in a network environment can be updated from any computer.
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
iii) Computers in a network environment can be updated from any computer.
b) Differentiate between email and postal
mail.
The difference between email
and postal mail are as follows:
Email
|
Postal Mail
|
Very fast medium.
|
very slow as compared with
e-mail.
|
Cheaper than postal mail
system.
|
More expensive than E-mail.
|
Same message can be sent to
several recipients at a time.
|
Same message have to be sent
in different envelopes.
|
Recipients can receive
message from anywhere, any time.
|
Recipients can receive
message only at the marked address.
|
c) What is cyber ethics? Write any
two commandments of cyber ethics.
Ans: Computer ethics is the set
of moral principles or code of conducts that should be followed by computer
user.
Any two commandments of
computer ethics are:
i) Not to use computer to harm other people.
ii) Not to search the files or records of other people.
i) Not to use computer to harm other people.
ii) Not to search the files or records of other people.
d) How does computer virus
spread from one computer to another computer?
Ans: A virus spreads from one
computer to another by:
i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
iii) Downloading files and programs form the websites which are not secure
iv) Exchanging data and information over a network
i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
iii) Downloading files and programs form the websites which are not secure
iv) Exchanging data and information over a network
d) What
is computer security? Write its ways.
Ans: The security given to the computer for the protection of hardware, software and data is known as computer security.
Ans: The security given to the computer for the protection of hardware, software and data is known as computer security.
Its ways are hardware security
and software security.
2. a) Convert as
instructed:
i) (FEA)16 into
octal
Converting
Hexadecimal to Binary equivalent value
F
= 1111
E
= 1110
A
= 1010
=
(111111101010)2
Now,
Again converting Binary to octal
111
= 7
111
= 7
101
= 5
010
= 2
=(7752)8
(FEA)16 =(7752)8
ii) (1234)10 into
binary
b) Perform the binary
calculations
i) (10101×11) ÷
10
1 0 1 0 1
×1
1
1 0 1 0 1
1 0 1 0 1
1 1 1 1 1 1
10)111111 (11111
-10
11
-
10
11
- 10
11
- 10
1
Quotient = 11111
Remainder = 1
ii) 11001100 + 101010
11001100
+ 101010
11110110
11001100 + 101010 = 11110110
3. Match the following 0.5×4=2
Group
A Group
B
i)
Star a)
Transmission Media
ii)
ISP b) Arranging the scattered data
iii) Defragmentation c) Company that provides internet service
iv)
Trojan d)
Topology
e) Malicious program acts as a useful program
Answers
i) Star a)
Topology
ii) ISP b)
Company that provides internet service
iii)
Defragmentation c)
Arranging the scattered data
iv)
Trojan d) Malicious program acts as a useful
program
4. Choose the correct
answer 0.5×4=2
a) Fraud that involves copying
another person’s intellectual property and presenting it as if it is your own.
i)
Plagiarism ii)
Hacking iii) Information theft
iv) All of them
Plagiarism
b) Viruses attach themselves to
documents such as word and excel
i) Polymorphic
virus ii)
File virus
iii)Multipartite
virus iv)
Macro virus
Macro virus
c) A hardware or software which
connects two dissimilar networks.
i)
Gateway ii)
Bridge
iii)
Router iv)
Repeater
Gateway
d) Which of the following is
search engine?
i)
bing.com ii) hotmail.com iii)
facebook.com
iv) all of the above
bing.com
5. Give an appropriate
technical term for the following. 0.5×4=2
a) The legal issues adopted by
the government to minimize the computer crime.
Cyber Law
b) The artificial environment
created by the computer technology to entertain user.
Virtual
Reality
c) The process of transforming
an encrypted message into its original plain text.
Decryption
d) A business through internet.
E-commerce
6. Write the full forms
of: 0.5×4=2
a)
CAVE = Computer Aided Virtual Environment
b)
MBR = Master Boot Record
c)
ISDN = Integrated Services
Digital Network
d)
WWW = World Wide Web
Group B Database (10 marks)
7. Answer the following:
a) What is database?
Ans: Database is a collection
of related and organized information that can be used for different purpose.
b) What is action query? Write
the different types of action query.
Ans: It is a type of query
which makes changes to many records in just one operation.
The different types of action
query are update query, append query, delete query and make-table query.
c) What is report?
Ans: Report is an object of
MS-Access which is used to present data in a printed format using a specific
layout.
8. Choose the best answer
a) Memory space used by a auto
number data type is..........
i) 1
Byte ii) 2
Bytes iii) 4
Bytes iv) 8 Bytes
4 Bytes
b) Record of the table is also
known as
i)
Tuple ii)
Attributes iii)
Text iv)
Relation
Tuple
c) .......... accelerates the
query and sort operations.
i)
Sort ii)
Number iii)
Index iv) Filter
Index
d) A descriptive name for the
field in MS-ACCESS is.......
i)
Format ii)
Caption iii) Field
Name iv) Properties
Caption
9. Match the following
Group
A Group
B
i)
Query a)
Pattern of data in a field
ii) Input
Mask b)
DBMS
iii)
dBASE c)
Search and Select
iv) Primary
key d)
Lookup wizard
e)
Contain distinct value
Answers
Group
A Group
B
i)
Query a)
Search and Select
ii) Input
Mask b) Pattern of data in a field
iii)
dBASE c) DBMS
iv) Primary
key d) Contain distinct
value
Group C Programming (18 marks)
10. a) What is parameter?
Parameters are variables that
will receive data (arguments value) sent to the procedures (SUB program and
FUNCTION).
b) Write the difference between
QBASIC and C programming.
The difference between QBASIC and C programming are as follows:
The difference between QBASIC and C programming are as follows:
QBASIC
|
C programming
|
It is a high level language
without feature of low level language.
|
It is a high level language
with some features of low level language.
|
It is mostly used to design
application software.
|
It is mostly used to prepare
system software.
|
c) Give the functions of:
i) KILL
The KILL statement deletes the
file or files from the specified drive and directory.
ii) COMMON SHARED
It
defines global variables that can be shared throughout a program or between
chained programs.
11. Rewrite the following program
after correcting the bugs:
DECLARE FUNCTION TEST (A$)
CLS
INPUT "ENTER A
STRING"; N$
CALL TEST$(N$)
PRINT "Reverse of Supplied
string"; D$
END
FUNCTION TEST$ (M$)
FOR I = 1 TO LEN$(M$)
B$ = MID$(M$, I, 1) + B
NEXT I
B$ = TEST$
END FUNCTION
Debugged Program
DECLARE FUNCTION TEST$
(M$)
CLS
INPUT "ENTER A
STRING"; N$
D$ = TEST$(N$)
PRINT "Reverse of Supplied
string"; D$
END
FUNCTION TEST$ (M$)
FOR I = 1 TO LEN(M$)
B$ = MID$(M$, I, 1) + B$
NEXT I
TEST$ = B$
END FUNCTION
12. Write the output of the
following program.
DECLARE SUB SERIES ()
CLS
CALL SERIES
END
SUB SERIES
X = 11111
FOR I = 1 TO 5
PRINT X ^ 2
X = (X - 1) / 10
NEXT I
END SUB
OUTPUT
123454321
1234321
12321
121
1
13. Study the following program
and answer the questions:
CLS
OPEN “REC.DAT” FOR INPUT AS #1
OPEN “TEMP.DAT” FOR OUTPUT AS
#2
WHILE NOT EOF(1)
INPUT #1, NM$, POST$, SAL
NSAL=SAL+SAL*0.1
WRITE #2, NM$, POST$, NSAL
WEND
CLOSE #1, #2
KILL “REC.DAT”
NAME “TEMP.DAT” AS “REC.DAT”
END
a) What is the main purpose of
the above program?
Ans: The main purpose of the
above program is to increase the salary by 10% and store in the data file.
b) What is the function of EOF?
Ans: The function of EOF is to
test for the end of a file and EOF returns true (nonzero) if the end of file
has been reached.
14. a) Write a program using
SUB......END SUB to find the sum, product and difference of two numbers.
DECLARE
SUB SUM (A, B)
DECLARE SUB DIFF (A, B)
DECLARE SUB PROD (A, B)
CLS
INPUT “ENTER FIRST NUMBER”; A
INPUT “ENTER SECOND NUMBER”; B
CALL SUM(A, B)
CALL DIFF(A, B)
CALL PROD(A, B)
END
SUB SUM (A, B)
S = A + B
PRINT “SUM OF TWO NUMBERS”; S
END SUB
SUB DIFF (A, B)
D = A - B
PRINT “DIFFERENCE OF TWO
NUMBERS”; D
END SUB
SUB PROD (A, B)
P = A * B
PRINT “PRODUCT OF TWO NUMBERS”;
P
END SUB
b) Write a program using
FUNCTION.....END FUNCTION to find the sum of a digit of a number.
DECLARE FUNCTION SUM (N)
CLS
INPUT "ENTER ANY
DIGIT"; N
SU = SUM (N)
PRINT "SUM OF DIGIT OF A
NUMBER="; SU
END
FUNCTION SUM (N)
S = 0
WHILE N < > 0
R = N MOD 10
S = S + R
N = N \ 10
WEND
SUM = S
END FUNCTION
c) Write a program to create a
sequential data file called “rec.dat” to store Name, Address and Phone
number of the users as long as users wishes.
OPEN “rec.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter Address”; A$
INPUT “Enter Phone number”; P#
WRITE #1, N$, A$, P#
INPUT” Do you want to add more
records(Y/N)”;CH$
LOOP WHILE UCASE$(CH$) = “Y”
CLOSE #1
END
No comments:
Post a Comment