SEE Computer Science Exam Paper Solved 2072
![]() |
| SEE Computer Science Exam Paper Solved 2072 |
SEE Examination 2072
Computer Science
Group “A”
Computer Fundamental [22 marks]
1. Answer the following questions. (2x5=10)
a. Define LAN topology. Draw star topology.
Ans: The arrangement or connection pattern of nodes or computers and other devices of the LAN network is called LAN topology.
b. Give any two symptoms of virus attacks.
Ans: The symptoms of virus attacks are listed below:
· Computer becomes slow and hang.
· Sudden shut down of computer occurs.
c. Write one advantage and one disadvantage of multimedia.
Ans: The advantage of multimedia is:
· One can present ideas, information to others in effective ways.
The disadvantage of multimedia is:
· It is very expensive system.
d. Write any two ways of protecting computer software.
Ans: The two ways of protecting computer software are listed below:
· Using antivirus Software
· Backup System
e. Write any two services of internet.
Ans: The two services of internet are:
· WWW (World Wide Web)
· E-mail
ii. (104)8 into decimal
Soln:
= 1x82 + 0x81 + 4x80
= 1x64 + 0x8 +4x1
= 64 + 0 + 4
= 68
:. (104)8 = (68)10
b) Perform the binary calculations. (1x2=2)
i. 1011+1101
Soln:
1011
+ 1101
11000
:. 1011+1101=11000
ii. 110*11
Soln:
110
*11
110
+ 110x
10010
:. 110*11=10010
3.Match the following. (0.5x2=4)
Group A Group B
a. Microwave Power protection device
b. UTP Protocol
c. UPS unguided media
d. SMTP Internet
Guided media
Answer
Group A Group B
a. Microwave Unguided media
b. UTP Guided media
c. UPS Power protection device
d. SMTP Protocol
4. State whether the following statements are true or false. (0.5x2=4)
a. Walky-talky is an example of full duplex mode. False
b. Data transfer rate is higher in optical fiber cable than in co-axial cable. True
c. The computer security refers to hardware security only. False
d. Sound Card is one of the components of multimedia. True
5. Write the appropriate technical terms of the following. (0.5x2=4)
a. A program that can disinfect a file from virus. Antivirus software
b. A person who steals or destroys other’s data, information, files and program. Hacker
c. A company which provides the internet facilities. ISP
d. A computer which provides services to other computers in a network. Server Computer
6. Write the full forms of. (0.5x2=4)
a. URL Uniform Resource Locator
b. HTTP Hypertext Transfer Protocol
c. LAN Local Area Network
d. MODEM Modulator-Demodulator
Group B Database (10 Marks)
7. Answer the following questions. (1x3=3)
a. Write any four data types used in MS-ACCESS.
Ans: The four data types used in MS-ACCESS are listed below:
· Text
· Number
· Currency
· Date/Time
b. Define database with example.
Ans: The systematic collection of organized and related information that can be used for different purposes is called database. For example: dictionary and telephone directory.
c. What is query?
Ans: A query is one of the objects of MS-Access that allows us to retrieve the desired information from a table or multiple linked tables.
8. State whether the following statements are true or false. (0.5x2=4)
a. A query is used to select fields and records from only one table. False
b. MS-ACCESS is DBMS software. True
c. Index decreases the speed of query and sort operations. False
d. Data in primary key has to be unique and not null. True
9. Match the following. (0.5x2=4)
Group A Group B
a. OLE Data entry
b. Validation Rule Stores data
c. Form Limits the value
d. Indexing Data type
Easy to search
Answer
Group A Group B
a. OLE Data type
b. Validation Rule Limits the value
c. Form Data Entry
d. Indexing Easy to search
Group C Programming (18 Marks)
10. Answer the following questions. (1x3=3)
a. What is procedure?
Ans: The block of codes in a program that can perform task when called or executed is called procedure.
b. Write any two data types used in ‘c’ language.
Ans: The two data types used in the ‘c’ language are listed below:
· Integer
· float
c. Write down the functions of the following statements:
i. OPEN: It opens a sequential file for one of the three possible operations i.e. reading, writing or appending.
ii. MKDIR: It makes or creates a new directory on the specified disk.
11.Re-write the following program after correcting the bugs. (0.5x2=4)
FUNCTION SUM (m, n)
Rem to print sum of two numbers
a=6
b=7
DISPLAY SUM (a, b)
END
FUNCTION SUM (m, n)
S= m+n
S=SUM
END SUM
Debugged program:
DECLARE FUNCTION SUM (m, n)
Rem to print sum of two numbers
a=6
b=7
PRINT SUM (a, b)
END
FUNCTION SUM (m, n)
S=m+n
SUM=S
END FUNCTION
12.Write the output of the following program. (2)
DECLARE FUNCTION Interest (p, t, r)
CLS
LET p=100
LET t=2
LET r=5
LET d=Interest (p, t, r)
PRINT “The simple interest=”; d
END
FUNCTION Interest (p, t, r)
Interest = (p* t* r)/100
END FUNCTION
OUTPUT: 10
13. Study the following program and answer the following questions. (1x2=2)
DECLARE FUNCTION Prod(N)
INPUT “Any number”; N
X=Prod(N)
PRINT X
END
FUNCTION Prod(N)
F=1
FOR K=1 TO N
F=F*K
NEXT K
Prod=F
END FUNCTION
a. Write the name of the user defined function used in the above program.
iii. The name of the user defined function used in the above program is Prod.
b. Name the loop in the above program.
iv. The loop in the above program is FOR…NEXT.
14. a. Write a program using SUB… END SUB to display reverse of input-string. (3)
DECLARE SUB Reverse(S$)
CLS
INPUT “ENTER ANY STRING”; S$
CALL Reverse(S$)
END
SUB Reverse(S$)
FOR I= LEN(S$) TO 1 STEP -1
B$=MID$(A$, I, 1)
R$= R$ + B$
NEXT I
PRINT “REVERSED STRING=”; R$
END SUB
b. Write a program using FUNCTION…END FUNCTION to find the area of the triangle. (3)
DECLARE FUNCTION AREA (B, H)
CLS
INPUT “ENTER BASE”; B
INPUT “ENTER HEIGHT”; H
PRINT “AREA OF TRIANGLE”; AREA (B, H)
END
FUNCTION AREA (B, H)
AREA = (1/2) * B * H
END FUNCTION
c. A sequential data file called “Marks.dat” contains NAME, AGE, CITY, and TELEPHONE fields. Write a program to display all the contents of the data file. (3)
OPEN “Marks.dat” FOR INPUT AS #1
CLS
DO WHILE NOT EOF (1)
INPUT #1, N$, A, C$, T$
PRINT N$, A, C$, T$
LOOP
CLOSE #1
END



Comments
Post a Comment