SEE Computer Science Exam Paper Solved 2070
SEE Computer Science Exam Paper Solved 2070 |
SEE Examination 2070
Computer Science
Group “A”
Computer Fundamental [22 marks]
1. Answer the following questions. (2×5=10)
a. What is network topology? Write any one advantage of star topology.
Ans: A network topology is the arrangement of computers, cable and other components on a network.
One advantage of star topology is:
· Easy to add new computer and remove the existing one. So, it is flexible.
b. Give any two advantages of E-mail over traditional mail.
Ans: Any two advantages of E-mail over traditional mail are listed below:
· It is the cheapest and fastest means of communication.
· Email can be sent at any place and any time.
c. List any two main aims of formulating cyber law in Nepal.
Ans: The two main aims of formulating cyber law in Nepal are:
· To legalize the electronic transactions and online services.
· To control cyber crime by punishing the cyber criminals.
d. Give any two symptoms of virus attack.
Ans: The two symptoms of virus attacks are listed below:
· Computer performance becomes slow.
· Missing of files and folders.
e. Give the importance of UPS to the computer system.
Ans: UPS is a power protection device that provides continuous backup power to computer that helps to run the computer system smoothly even in absence of electricity which helps to save our work and valuable data.
2. a. Convert as instructed. (1x2=2)
i. (BED)16 into binary
Soln:
Hexadecimal: B E D
Equivalent binary: 1011 1111 1101
Therefore: (BED)16 = (101111101101)2
ii. (1010111)2 into octal
Soln:
Group of three bits: 001 010 111
Equivalent octal: 1 2 7
Therefore: (1010111)2 = (127)8
b. Perform the binary calculations. (1x2=2)
i. 1010 *10
Soln:
1 0 1 0
x1 0
0 0 0 0
+1 0 1 0 x
1 0 1 0 0
:. 1010*10 = 10100
ii) 10101 ÷ 11
Soln:
11) 10101 (111
-11
100
– 11
11
-11
00
:. Q = 111 R = 0
3. Match the following. (0.5×4=2)
Group A Group B
a. Combination of several media Guided Media
b. POP Power Protection Device
c. UTP Multimedia
d. UPS Protocol used in e-mail
CD-ROM
Answer
Group A Group B
a. Combination of several media Multimedia
b. POP Protocol used in e-mail
c. UTP Guided Media
d. UPS Power Protection Device
4. Choose the correct answer. (0.5×4=2)
a. Which of the following is an audio output device?
i. Microphone ii. Speaker iii. Monitor iv. Printer
b. Which one is not a type of virus?
i. Message Carrying virus ii. Boot sector virus
iii. System virus iv. Special Purpose Application Infector
c. Which one is bounded media?
i. Fiber optics ii. Microwave iii. Infrared iv. Laser
d. Which one is an operating system software?
i. MS-Word ii. MS-Excel iii. Firefox iv. MS-DOS
5. Give an appropriate technical term for the following. (0.5×4=2)
a. A program that can disinfect a file from virus. Antivirus
b. A person who steals or destroys other’s data, information and program. Hacker
c. A company that provides internet service. ISP (Internet Service Provider)
d. A computer in a network which can provide services to other computer. Server
6. Write the full forms of. (0.5×4=2)
a. TCP/IP Transmission Control Protocol / Internet Protocol
b. LAN Local Area Network
c. UPS Uninterruptible Power Supply
d. FTP File Transfer Protocol
Group B Database (10 marks)
7. Answer the following. (2×3=6)
a. Define data and information.
Ans: Data can be numbers, letters or symbols representing facts and figures which may or may not give any meaning.
Information is an organized collection of related data which gives a complete meaning.
b. What is report? Give its importance.
Ans: Report is an object of MS-Access database which helps to get the formatted data of database for printing.
The importance of report are listed below:
· It displays the information the way we want to view it.
· It presents the information in designed layouts by adding necessary titles, setting font color or font size, etc.
c. Name any four data types that can be defined in MS-Access.
Ans: The four data types that can be defined in MS-Access are listed below:
· Text
· Memo
· Number
· Date/time
8.Choose the best answer. (0.5×4=2)
a. The columns in database tables are called:
i Record ii. Field iii. Report iv. Memo
b. Which is suitable data type to store video?
i. Text ii. Number iii. Hyperlink iv. OLE object
c. Text data type can store maximum of ___characters
i. 250 ii. 350 iii. 255 iv. 355
d. Which of the following is database application?
i. MS-Word ii. MS-Access iii. MS-Excel iv. QBASIC
9. Match the following. (0.5×4=2)
Group A Group B
a. Indexing Data Size up to 1 GB
b. Form Column of datasheet
c. Field Row on a datasheet
d. OLE object Searching fast
Graphical interface for data entry
Answer
Group A Group B
a. Indexing Data Searching Fast
b. Form Graphical interface for data entry
c. Field Column of datasheet
d. OLE object Size up to 1 GB
Group C Programming (18 marks)
a. What is a variable? (1x3=3)
Ans: A variable is a symbol, character or group of character that stores program data by allocating memory space.
b. Name any two data types used in C language.
Ans: The two data types used in C language are:
· int
· float
c. Give the functions of:
i NAME AS: The NAME statement renames a file on a disk.
ii. CLOSE: The CLOSE statement is used to close one or all open files.
11. Rewrite the following program after correcting the bugs. (0.5x4=2)
DECLARE SUB Series ()
DLS
EXECUTE Series
END
SUB Series
REM to generate 2 2 4 6 10…. up to 10th term
P=2
Q=2
FOR Ctr=1 TO 5
DISPALY P, Q,
P=P+Q
Q=P+Q
NEXT Ctr
END Series ()
Debugged Program
DECLARE SUB Series ()
CLS
CALL Series
END
SUB Series
REM to generate 2 2 4 6 10…. Up to 10th term
P=2
Q=2
FOR Ctr=1 TO 5
PRINT P, Q,
P=P+Q
Q=P+Q
NEXT Ctr
END SUB
12. Write the output of the following program. (2)
DECLARE FUNCTION AREA (L, B)
LET L=10
LET B=5
PRINT “The area =”; AREA (L, B)
END
FUNCTION AREA (L, B)
A=L*B
AREA=A
END FUNCTION
OUTPUT: The area = 50
13. Study the following program and answer the questions. (1×2=2)
DECLARE FUNCTION Sum (A, B)
INPUT “Enter first number:”; A
INPUT “Enter second number:”; B
PRINT “The sum of the two number=”; Sum (A, B)
END
FUNCTION SUM (A, B)
S=A+B
Sum=S
END FUNCTION
a. List the numerical variables used in the above program.
Ans: The numerical variables used in the above program are A, B and S.
b. Will the program run if the first line (i.e. DECLARE….) is deleted?
Ans: Yes, the program will run even if the first line (i.e. DECLARE…) is deleted.
14. a. Write a program using Function…..End Function to get the temperature in Celsius from the user and then print the temperature in Fahrenheit. (hint: F=9/5*c+ 32). (3)
DECLARE FUNCTION TEMP (C)
CLS
INPUT “ENTER TEMPERATURE IN CELCIUS”; C
PRINT “TEMPERATURE IN FAHRENHEIT=”; TEMP (C)
END
FUNCTION TEMP (C)
F = (9/5) * C + 32
TEMP = F
END FUNCTION
b. Write a program using Sub….End Sub to get a word from the user and then print it in reverse order. (3)
DECLARE SUB REVERSE (W$)
CLS
INPUT “Enter any word”; W$
CALL REVERSE(N$)
END
SUB REVERSE (W$)
FOR I = LEN(W$)
C$ = MID$(W$, I, 1)
R$=R$+C$
NEXT I
PRINT “The word in reverse order is “; R$
END SUB
c. A sequential data file called “Marks.dat” contains Name, English, Nepali, Math’s and Science Fields. Write a program to display all the contents of that data file. (3)
OPEN “Marks.dat” FOR INPUT AS #1
CLS
PRINT “NAME”, “ENGLISH”, “NEPALI”, “MATHS”, “SCIENCE”
DO WHILE NOT EOF (1)
INPUT #1, N$, E, N, M, S
PRINT N$, E, N, M, S
LOOP
CLOSE #1
END
Comments
Post a Comment