Joint School SEE Preparation Examination- 2082

GROUP 'A'

1. Answer the following questions in one sentence. (6)

a) What is bridge?

ans: A bridge is a network device that connects two different local area networks (LAns) or two segments of the same network

 

b) What is digital divide?

ans: Digital divide is the gap between people who have access to digital technology and those who do not.

 

c) What is data redundancy?

ans: Data redundancy is the unnecessary repetition of data within a database or duplication of data

 

d) Which view is used to modify a table in MS-Access?

ans: Design View is used to modify a table in MS-Access

 

e) What is Modular Programming?

ans Modular Programming  is a technique that breaks down a large, complex program into smaller, manageable, and independent sub-programs called modules.

 

f) Write any two features of C language.

ans: 1. It is a structured programming language.

2. It is high level programming language.

 

2. Write appropriate technical term for the following. (2)

a) Protocol used to receive email from the mail server.

ans: POP/SMTP

 

b) The program that disinfects a file from virus.

ans: antivirus

 

3.Write the full form of the following: (2)

i) ISDN: Integrated Services Digital Network

ii) ETA: Electronic Transactions Act

 

Group 'B'

4) Answer the following questions (9*2=18)

a) Explain about network topology? Mention any two purposes of using a computer network?

ans: The physical or logical arrangement of computers in a network (e.g., Star, Bus).

Purposes:

1. Resource sharing (printers, files).

2. Improved communication (email, chat)

 

b) What is computer ethics? Write any four commandments for using a computer.

ans: A set of moral principles that regulate the use of computers.

Commandments:

a. Do not use computers to harm others

b. Do not steal information

c. Do not copy software illegally

d. Do not access others' data without permission

 

c) What is software security? Write any two measures of hardware security.

ans: Protection of software against unauthorized access or damage is software security

Hardware measures:

1. Using UPS for power stability.

2. Physical locking of server rooms.

3. Use of locks

4. CCTV surveillance

 

d) What is-m-Commerce? Write its two important services.

ans: m-Commerce is buying and selling goods and services through wireless handheld

Two services:

1. Mobile banking

2. Mobile ticket booking

3. shopping

 

e) What are the services of cloud computing? Give two examples of cloud computing.

ans: Cloud computing provides computing resources via the internet.

Services: laaS, PaaS, SaaS

Examples: Google Drive, Dropbox, iCloud.....

 

f) What is query? Mention the different types of Action query.

ans: An object used to retrieve or manipulate specific data from a database.

Action Queries: Append, Delete, Update, and Make-Table queries

 

g) What is primary key? List any two advantages of it.

ans: The primary key is a special field or group of field in the table that has a unique value for each records. It does not accept duplicate value.

Advantages:

·         Prevents duplicate records

·         Improves data integrity

·         Speeds up data searching.

 

h) What is data sorting? List any two advantages of using it.

ans: Data sorting is arranging data in ascending or descending order.

Advantages:

·         Easy data analysis

·         Faster searching

 

i) What types of work is done in MS-Access using Form and query object?

Forms are used to enter and display data, viewing while queries are used to search, filter, and manipulate data.

 

5) Write down the output of the given program. Show with dry run-in table. (2)

DECLARE FUNCTION TEST(A)

CLS

FOR I = 1 TO 5 READ A

S=S+TEST(A)

NEXT I

PRINT "THE RESULT IS ="; S

DATA 1,5,4,3,2

END

FUNCTION TEST(A)

TEST=A^3

END FUNCTION

 

Dry run Table

I

A

TEST(A)=A3

S

1

1

1

1

2

5

125

126

3

4

64

190

4

3

27

217

5

2

8

225

Output:   THE RESULT IS = 225

 

6) Re-write the given program after correcting the bugs: (2)

REM to add record in an existing file

CLS

OPEN "Record. Dat" FOR OUTPUT AS #

A1:

INPUT "Enter Name, Class and Roll No. "; Name$, Class, Rn

INPUT #2, Nm$, Class, Rn

INPUT "More records "; Y$

IF UCASE$(Y$) = "Y" THEN GOTO A2

CLOSE "Rrecord.dat"

END

 

Correct answer:

CLS

OPEN "Record. Dat" FOR APPEND AS #1

A2:

INPUT "Enter Name, Class and Roll No. "; Name$, Class, Rn

WRITE #1, Name$, Class, Rn

INPUT "More records "; Y$

IF UCASE$(Y$) = "Y" THEN GOTO A2

CLOSE #1

END

 

7) Study the following program and answer the given questions (2)

OPEN "Detail.dat" FOR INPUT AS #1

OPEN "Temp.dat" FOR OUTPUT AS #2

INPUT "Enter name of the students "; Sn$

FOR I = 1 TO 10

INPUT #1, Nm$, CI, A

IF Sn$ < > Nm$ THEN

WRITE #2, Nm$, CI, A

END IF

NEXT I

CLOSE #1, #2

KILL "Detail.dat"

NAME "Temp.dat" AS "Detail.dat"

END

 

a) What is the main objective of the program given above?

ans: The main objective of the program given above is to delete a specific student record from the file.

 

b) Do you get any problem in the above program if "Kill" statement is removed? Give reason.

ans: Yes, the old file will not be deleted, so duplicate files will exist and changes will not be updated.

 

GROUP 'C'

 

8)Convert/calculate as per the instruction: (4)

i) (7642)8 = (?)16 ANS: (FA2)16

ii) (524) 10 (?) 2 ANS: (1000001100)2

iii) (1010) 2 x (110) 2-(1011) 2 = (?) 2 ANS: (100001)2

iv) (10110) 2÷ (101) 2 ANS: (100)2

 

9) a) Write a program in QBASIC using function procedure to test whether the given number is completely divisible by 13 or not. (4)

DECLARE FUNCTION CHECK$(N)

INPUT "Enter a number: ", NUM

PRINT CHECK$(NUM)

END

 

FUNCTION CHECK$(N)

IF N MOD 13 = 0 THEN

CHECK$ = "Divisible by 13"

ELSE

CHECK$ = "Not divisible by 13"

END IF

END FUNCTION

 

OR

 

DECLARE FUNCTION DIV(N)

CLS

INPUT "Enter a number "; N

IF DIV(N) = 1 THEN

PRINT "Completely divisible by 13"

ELSE

PRINT "Not divisible by 13"

END IF

END

 

FUNCTION DIV(N)

IF N MOD 13 = 0 THEN

DIV = 1

ELSE

DIV=0

END IF

END FUNCTION

 

c) A sequential data file called "Record.txt" has stored data under the field heading Roll No., Name, Gender, English, Nepali, Maths and Computer. Write a program to display all the information of those students whose gender is 'F' and obtained marks in computer is more than 90(4)

OPEN "Record.txt" FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

INPUT #1, Rn, Nm$, GS, Eng, Nep, Math, Comp

B$=UCASE$(LEFT$(G$,1))

IF BS="F" AND Comp > 90 THEN

PRINT Rn, Nm$, GS, Eng, Nep, Math, Comp

END IF

Wend

CLOSE #1

END

 

10)Write a program in C language that asks a number and check whether it is odd or even.

#include <stdio.h>

int main()

{

int n;

printf("Enter a number: ");

scanf("%d", &n);

if (n % 2 == 0)

{

printf("Even number");

            }

else

{

 printf("Odd number");

}

return 0;

}

 

OR

 

Write a program in 'C' language to display the series with their sum. 1,2,3,4,....., up to 10th terms(4)

#include <stdio.h>

int main()

{

int i, sum = 0;

for(i = 1; i <= 10; i++)

{

 printf("%d ", i);

sum += i;

}

 printf("\nSum = %d", sum);

return 0;

}

  

Popular posts from this blog

Computer

Sequential Programs