Monday, May 30, 2016

SOLUTION SLC PRE QUALIFYING PABSON BHAKTAPUR 2071


Joint Examination Board
PABSON, Bhaktapur
Pre – Qualifying Examination 2071

Computer Fundamental (22 marks)

1. Answer the following questions:                                      2×5=10

a)      What is computer network? Write any two advantages of it.
ANS: computer network means two or more computers connected with each other to share data, hardware, software and other resources.
Any two advantages of computer network are as follows:
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
iii) Computers in a network environment can be updated from any computer.

b)     Differentiate between email and postal mail.
The difference between email and postal mail are as follows:
Email
Postal Mail
Very fast medium.
very slow as compared with e-mail.
Cheaper than postal mail system.
More expensive than E-mail.
Same message can be sent to several recipients at a time.
Same message have to be sent in different envelopes.
Recipients can receive message from anywhere, any time.
Recipients can receive message only at the marked address.


c)      What is cyber ethics? Write any two commandments of cyber ethics.
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.
Any two commandments of computer ethics are:
i) Not to use computer to harm other people.
ii) Not to search the files or records of other people.

d) How does computer virus spread from one computer to another computer?
Ans: A virus spreads from one computer to another by:
i) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
ii) Opening a virus infected email, messages and attached files
iii) Downloading files and programs form the websites which are not secure
iv) Exchanging data and information over a network

d)      What is computer security? Write its ways.
Ans: The security given to the computer for the protection of hardware, software and data is known as computer security.
Its ways are hardware security and software security.

2. a) Convert as instructed:                                                  

i) (FEA)16 into octal                 
            Converting Hexadecimal to Binary equivalent value
            F = 1111
            E = 1110
            A = 1010
            = (111111101010)2
            Now, Again converting Binary to octal
            111 = 7
            111 = 7
            101 = 5
            010 = 2
            =(7752)8
            (FEA)16 =(7752)8

ii) (1234)10 into binary
           



b) Perform the binary calculations                          
i) (10101×11)  ÷ 10                
1 0 1 0 1
       ×1 1
1 0 1 0 1
  1 0 1 0 1
  1 1 1 1 1 1


10)111111 (11111
     -10
        11
      - 10
          11
      -   10
            11
       -    10
              1
           
Quotient = 11111
Remainder = 1

ii) 11001100 + 101010
11001100
+  101010
11110110

11001100 + 101010 = 11110110

3.  Match the following                                             0.5×4=2
    Group A                              Group B
i) Star                                  a) Transmission Media
ii) ISP                                         b) Arranging the scattered data
iii) Defragmentation             c) Company that provides internet service
iv) Trojan                            d) Topology
e) Malicious program acts as a useful program
Answers
i) Star                                a) Topology
ii) ISP                                b) Company that provides internet service
iii) Defragmentation          c) Arranging the scattered data
iv) Trojan                   d) Malicious program acts as a useful program

                                                       
4. Choose the correct answer                                   0.5×4=2

a) Fraud that involves copying another person’s intellectual property and presenting it as if it is your own.
i) Plagiarism                ii) Hacking      iii) Information theft
iv) All of them
Plagiarism

b) Viruses attach themselves to documents such as word and excel
i) Polymorphic virus                ii) File virus    
iii)Multipartite virus                iv) Macro virus
Macro virus

c) A hardware or software which connects two dissimilar networks.
i) Gateway                  ii) Bridge                    
iii) Router                    iv) Repeater
Gateway

d) Which of the following is search engine?
i) bing.com      ii) hotmail.com            iii) facebook.com       
iv) all of the above
bing.com

5. Give an appropriate technical term for the following.  0.5×4=2
           
a) The legal issues adopted by the government to minimize the computer crime.
Cyber Law

b) The artificial environment created by the computer technology to entertain user.
        Virtual Reality

c) The process of transforming an encrypted message into its original plain text.
        Decryption

d) A business through internet.
        E-commerce

6. Write the full forms of:                                                     0.5×4=2

a) CAVE    = Computer Aided Virtual Environment

b) MBR      = Master Boot Record
       
c) ISDN      = Integrated Services Digital Network

d) WWW    = World Wide Web

Group B Database (10 marks)
7. Answer the following:

a) What is database?
Ans: Database is a collection of related and organized information that can be used for different purpose.

b) What is action query? Write the different types of action query.
Ans: It is a type of query which makes changes to many records in just one operation.
The different types of action query are update query, append query, delete query and make-table query.

c) What is report?
Ans: Report is an object of MS-Access which is used to present data in a printed format using a specific layout.

8. Choose the best answer
a) Memory space used by a auto number data type is..........
i) 1 Byte          ii) 2 Bytes        iii) 4 Bytes       iv) 8 Bytes
4 Bytes

b) Record of the table is also known as
i) Tuple            ii) Attributes    iii) Text            iv) Relation
Tuple

c) .......... accelerates the query and sort operations.
i) Sort              ii) Number       iii) Index         iv) Filter
Index

d) A descriptive name for the field in MS-ACCESS is.......
i) Format         ii) Caption       iii) Field Name   iv) Properties
Caption

9. Match the following
    Group A                                          Group B
i) Query                                            a) Pattern of data in a field
ii) Input Mask                                  b) DBMS
iii) dBASE                                       c) Search and Select
iv) Primary key                                 d) Lookup wizard
                                                            e) Contain distinct value

Answers
    Group A                              Group B
i) Query                                a) Search and Select
ii) Input Mask                       b) Pattern of data in a field
iii) dBASE                            c) DBMS
iv) Primary key                             d) Contain distinct value
                                              
                                                           
Group C Programming (18 marks)

10. a) What is parameter?
Parameters are variables that will receive data (arguments value) sent to the procedures (SUB program and FUNCTION).

b) Write the difference between QBASIC and C programming.
      The difference between QBASIC and C programming are as follows:
QBASIC
C programming
It is a high level language without feature of low level language.
It is a high level language with some features of low level language.
It is mostly used to design application software.
It is mostly used to prepare system software.


c) Give the functions of:
i) KILL
The KILL statement deletes the file or files from the specified drive and directory.

ii) COMMON SHARED
            It defines global variables that can be shared throughout a program or between chained programs.
11. Rewrite the following program after correcting the bugs:
DECLARE FUNCTION TEST (A$)
CLS
INPUT "ENTER A STRING"; N$
CALL TEST$(N$)
PRINT "Reverse of Supplied string"; D$
END



FUNCTION TEST$ (M$)
FOR I = 1 TO LEN$(M$)
B$ = MID$(M$, I, 1) + B
NEXT I
B$ = TEST$

END FUNCTION

Debugged Program

DECLARE FUNCTION TEST$ (M$)
CLS
INPUT "ENTER A STRING"; N$
D$ = TEST$(N$)
PRINT "Reverse of Supplied string"; D$
END



FUNCTION TEST$ (M$)
FOR I = 1 TO LEN(M$)
B$ = MID$(M$, I, 1) + B$
NEXT I
TEST$ = B$

END FUNCTION


12. Write the output of the following program.
DECLARE SUB SERIES ()
CLS
CALL SERIES
END

SUB SERIES
X = 11111
FOR I = 1 TO 5
PRINT X ^ 2
X = (X - 1) / 10
NEXT I


END SUB


OUTPUT
123454321
1234321
12321
121
1


13. Study the following program and answer the questions:
CLS
OPEN “REC.DAT” FOR INPUT AS #1
OPEN “TEMP.DAT” FOR OUTPUT AS #2
WHILE NOT EOF(1)
INPUT #1, NM$, POST$, SAL
NSAL=SAL+SAL*0.1
WRITE #2, NM$, POST$, NSAL
WEND
CLOSE #1, #2
KILL “REC.DAT”
NAME “TEMP.DAT” AS “REC.DAT”
END
a) What is the main purpose of the above program?
Ans: The main purpose of the above program is to increase the salary by 10% and store in the data file.

b) What is the function of EOF?
Ans: The function of EOF is to test for the end of a file and EOF returns true (nonzero) if the end of file has been reached.

14. a) Write a program using SUB......END SUB to find the sum, product and difference of two numbers.

            DECLARE SUB SUM (A, B)
DECLARE SUB DIFF (A, B)
DECLARE SUB PROD (A, B)
CLS
INPUT “ENTER FIRST NUMBER”; A
INPUT “ENTER SECOND NUMBER”; B
CALL SUM(A, B)
CALL DIFF(A, B)
CALL PROD(A, B)
END

SUB SUM (A, B)
S = A + B
PRINT “SUM OF TWO NUMBERS”; S
END SUB

SUB DIFF (A, B)
D = A - B
PRINT “DIFFERENCE OF TWO NUMBERS”; D
END SUB

SUB PROD (A, B)
P = A * B
PRINT “PRODUCT OF TWO NUMBERS”; P
END SUB


b) Write a program using FUNCTION.....END FUNCTION to find the sum of a digit of a number.

DECLARE FUNCTION SUM (N)
CLS
INPUT "ENTER ANY DIGIT"; N
SU = SUM (N)
PRINT "SUM OF DIGIT OF A NUMBER="; SU
END
FUNCTION SUM (N)
S = 0
WHILE N < > 0
R = N MOD 10
S = S + R
N = N \ 10
WEND
SUM = S
END FUNCTION



c) Write a program to create a sequential data file called “rec.dat” to store Name, Address and Phone number of the users as long as users wishes.

OPEN “rec.dat” FOR OUTPUT AS #1
DO
CLS
INPUT “Enter Name”; N$
INPUT “Enter Address”; A$
INPUT “Enter Phone number”; P#
WRITE #1, N$, A$, P#
INPUT” Do you want to add more records(Y/N)”;CH$
LOOP WHILE UCASE$(CH$) = “Y”
CLOSE #1
END



No comments:

Post a Comment