SEE 2081
(Group 'A')
1. Answer the following questions in one sentence: 6×1=6
a) What is telecommunication?
Ans: The transmission of data and information
from one place to another for the purpose of communication is known as
telecommunication.
b) Give any two examples of simplex mode.
Ans: Any two examples of simplex mode are radio and newspaper.
c) Write any two methods of creating table in MS-Access.
Ans: Any two methods of creating table in MS-Access are design view and datasheet view.
d) What is the maximum character you can use for creating a field name in MS-Access?
Ans: The maximum character you can use for creating a field
name in MS-Access is 64 characters.
e) Write the syntax of KILL statement.
Ans: The syntax of KILL statement is KILL
"filename".
f) Write any two keywords used in C-language.
Ans: Any two keywords used in C language are
char and float.
2. Write appropriate technical term for the
following: 2×1=2
a) The websites that search documents for
specified keywords in WWW.
Ans: Search engine
b) The recording of interaction with the digital world.
Ans: Digital Footprint
3. Write the full form of the following: 2×1=2
a) UPS: Uninterruptible Power Supply
b) VR: Virtual Reality
4. Answer the following questions: 9x2=18
a) Differentiate between guided and unguided
media.
|
Guided Media |
Unguided Media |
|
The
media which uses cable or wire to transfer data and information among
computers are called guided communication media. |
Unguided
communication is a |
|
It
has a physical path. |
It
does not have physical path. |
|
It
is more secure than unguided media |
It
is less secure (signals can be intercepted) |
|
Examples
of guided media are Twisted Pair Cable, Co-Axial Cable and Fiber Optic Cable. |
Examples
of unguided media are Radio Wave, Microwave and Satellite Communication. |
b) Define cyber law. List any one-one do's and
don'ts of cyber ethics.
Ans: The law which governs the legal issues in
the cyber space regarding the internet or WWW for digital data processing and
transaction is called cyber law.
One do's of cyber ethics is: Ask permission
before sharing or using someone else's data or information.
One don't's of cyber ethics is: Do not use a computer to publish fake information.
c) Define Antivirus software with two examples.
Ans: Antivirus software is a program that scans,
detects, and removes malicious software from a computer or device to protect it
from security threats.
E.g. Norton Antivirus, McAfee Antivirus
d) Why is e-commerce more popular than traditional commerce nowadays? Give any two reasons. Ans: E-commerce is more popular than traditional commerce nowadays because:
-People can shop or do business online anytime, from anywhere, without visiting physical stores. -Online payments and order processes are quick and efficient.
e) What is e-governance? Provide any two examples of e-governance services that exist in Nepal. Ans: E-Governance is a set of services provided by the government to public via electronic media especially using Internet.
Any two examples of e-governance services that
exist in Nepal:
-Businesses and individuals can pay their taxes
online using the Government of Nepal's tax payment portal.
-People can apply for PAN cards online through
Nagarik app.
f) What is database? Name any two data types used in MS-Access.
Ans: A collection of systematically organized
inter-related data which store, organize and retrieve data is called a
database.
Any two data types used in MS-Access are:
currency and text.
Ans:Record: A record is a row in a table which contains information about single items in a database.
Record
is complete set of information.
Field:
A field is a column in a table which contains information about a certain type
for all records.
Field
is a smallest unit of information.
h)
Define a report. Why is it necessary to create a report in DBMS?
Ans:
Report is one of the MS-Access database objects used to present information in
an effective and organized format that is ready for printing.
It
is necessary to create report because reports provide a formatted presentation
of data that is easy to read and understand. It enables users to summarize,
analyze, and visualize data in meaningful ways.
i)
What is query? Mention the different types of Action query.
Ans:
Query is an object of database that is used to view, retrieve, change and
analyze records from a table or multiple linked tables based on specified
condition.
The
different types of Action query are:
- Append Query, Update Query, Delete Query and Make Table Query
5.
Write down the output of the given program and show them in dry run table.
DECLARE SUB Display (T$)
T$="COMPUTER"
CALL
Display (T$)
END
SUB
Display (T$)
FOR
C 1 TO LEN (T$) STEP 2
D$
MID
PRINT
D$;
(T,C,1)
NEXT
C
END
SUB
|
T$ |
C |
D$ |
OUTPUT |
|
COMPUTER |
1 |
C |
C |
|
|
3 |
M |
CM |
|
|
5 |
U |
CMU |
|
|
7 |
E |
CMUE |
|
|
9(NO) |
|
|
6. Rewrite the given program after correcting the bugs:
REM to add record in an existing file.
OPEN "student.dat" FOR OUT AS #2
TOP:
INPUT "Enter Name, Class and Roll No.";
Name$, C, RN
INPUT#2, Name$, C, RN
INPUT "More records"; Y$
IF UCASE$ (Y$)="Y" THEN GOTO POP:
CLOSE #2
STOP
Debugged Program
REM to add record in an existing file.
OPEN "student.dat" FOR APPEND AS #2
TOP:
INPUT "Enter Name, Class and Roll No."; Name$,
C, RN
WRITE #2, Name$, C, RN
INPUT "More records"; Y$
IF UCASE$ (Y$)="Y" THEN GOTO TOP
CLOSE #2
END
7. Study the following program and answer the given
questions:
DECLARE FUNCTION COUNT (A$)
CLS
INPUT "Enter any word"; A$
END
FUNCTION COUNT (A$)
B = LEN (A$)
C = 0
FOR I=1 TO B
E$=Ucase$(E$)
E$=MID$ (A$,I,1)
IF E$="A" OR E$="E" OR
E$="I" E$="O" OR E$ ="U" THEN
C=C+1
END IF
NEXT I
COUNT=C
END FUNCTION
a. Write down the missing statement in the main module to
execute the program.
PRINT
COUNT(A$) is missing statement in the main module to execute the program.
b. List any two string functions used in the above program.
MID$() and LEN() are two string functions used in
the above program.
8. Convert/Calculate as per the instruction:
4x1=4
note:Show all the process
i)
(1503)8 = (?)16
= (343)16
ii) (101000101)2 = (?)8
= (505)8
iii) (1010 + 1101)2- (110)2
= (10001)2
iv) (100111)2/(110)2
Q=110, R = 11
9. Answer the following questions:
a) Write a program in QBASIC that asks length,
breadth and height of room and calculate its perimeter and volume. Create a
Function procedure to calculate perimeter and Sub procedure to calculate the
volume.
[HINT: Volume LxBxH and perimeter = 2(L+B)] 4
DECLARE FUNCTION Perimeter (L, B)
DECLARE SUB Volume (L, B, H)
CLS
INPUT "Enter the Length of the room: ";
L
INPUT "Enter the Breadth of the room:
"; B
INPUT "Enter the Height of the room:
"; H
CALL Volume (L, B, H)
P=Perimeter (L, B)
PRINT "The Perimeter of the room is: ";
P
END
FUNCTION Perimeter (L, B)
Perimeter = 2* (L + B)
END FUNCTION
SUB Volume (L, B, H)
V=L*B*H
PRINT "The Volume of the room is:",V
END SUB
b) Write a program to read data from the
sequential data file name "std.dat" which contains student's name,
roll no, and marks of English, Nepali, Maths, and Computer of few students.
Display the result with all the information of those students whose marks in
computer is more than 40
OPEN "std.dat" FOR INPUT AS #1
CLS
DO WHILE NOT EOF(1)
INPUT #1, NS, RN, ENG, NEP, MATH, COMP
IF COMP>=40 THEN
PRINT N$, RN, ENG, NEP, MATH, COMP
END IF
LOOP
CLOSE #1
END
10. Write a program in C-language to find the
greatest number among any two different input numbers.
#include<stdio.h>
int main()
{
int a,b;
printf("Enter two numbers");
scanf("%d%d",&a,&b);
if(a>b)
{
printf("%d is greater than %d",a,b);
}
else
{
printf("%d is greater than %d",b,a);
}
return 0;
}
5,10,15……UPTO 10TH TERM
#include<stdio.h>
int main()
{
int a=5,i;
for(i=1;i<=10;i++)
{
printf("%d",a);
a=a+5;
}
return 0;
}