Saturday, 29 March 2025

SEE -2081 COMPUTER SCIENCE SOLVED

         SEE SOLVED SET -2081 COMPUTER


Answer the following questions in one sentence                                      6 x 1=6

1. What is telecommunication?

Telecommunication is the transmission of information over a distance using electronic means, such as telephone, radio, television, and the internet.

2. Give any two examples of simplex mode.

Television Broadcasting

Radio Transmission

3. Write two methods of creating a table in MS-Access.

Using Design View .

Using Datasheet View

4. What is the maximum character limit for a field name in MS-Access?

The maximum character limit for a field name in MS-Access is 64 characters.

5. Write the syntax of the KILL statement in QBASIC

KILL "filename.ext"

6. Write two keywords used in C language.

1.     int

2.     return

2.Write appropriate technical term for the following                         2

1. What do we call websites that search documents for keywords?

Search Engines.

2. What is the recording of interaction with the digital world?

Digital Footprint.

3. Write the full forms of the following question              ( 2)

UPS – Uninterruptible Power Supply

VR – Virtual Reality

 

                   Group B

     4. Answer the following questions:                                    (9 x2=18)

1. Define cyber law and list one do’s and don’ts of cyber ethics.

Cyber law refers to the laws that govern activities on the internet, including cybersecurity, privacy, and digital transactions.

Do’s of Cyber Ethics:

Use strong passwords and protect personal information.

Don’ts of Cyber Ethics:

 Do not engage in hacking or cyberbullying.

 

2. Define antivirus software and give two examples.

Antivirus software is a program designed to detect, prevent, and remove malicious software (malware) such as viruses, spyware, ransomware, and trojans. It helps protect computers and networks from security threats.

Examples:

Avast Antivirus

Norton Antivirus

 

3. Why is e-commerce more popular than traditional commerce? (Two reasons)

E –commerce is more popular than traditional commerce Customers can shop online anytime and from anywhere, avoiding physical store visits, making the process time-efficient.

 Businesses can reach a global audience without requiring physical stores, increasing their customer base and revenue potential

 

.4. What is e-governance? Provide two examples of e-governance services in Nepal.

E-governance refers to the use of information and communication technology (ICT) by the government to provide services, information, and facilitate communication with citizens, businesses, and other government agencies. It enhances transparency and efficiency in government operations.

Examples in Nepal:

Online PAN registration – Issued through the Inland Revenue Department (ird.gov.np) for tax purposes.

Driving License Application – Managed by the Department of Transport Management (doit.gov.np) to streamline license issuance.

5. What is a database? Name two data types used in MS-Access.

A database is a structured collection of related data stored electronically to facilitate easy access, management, and retrieval. It helps in organizing large amounts of data systematically.

Data Types in MS-Access:

Text – Stores short alphanumeric data (e.g., names, addresses), allowing up to 255 characters.

Number – Stores numerical values (e.g., age, price, quantity) and supports different number formats.

 

6. What is the difference between Field and Record? (Two differences)

Field

Record

A field is a single column of data representing a specific attribute (e.g., Name, Age).

A record is a complete row of data, containing multiple fields (e.g., John, 25).

It represents a specific type of information within a table.

It represents a single entry in a table, consisting of multiple fields.

7. Define a report. Why is it necessary in DBMS?

A report is a formatted and structured output of database queries, often used for analysis, presentation, and decision-making. It is necessary in DBMS as it summarizes large data for better interpretation and decision-making and it facilitates easy sharing of organized data with stakeholders, improving communication and transparency.

 

 

8. What is a query? Mention different types of action queries.

A query is a request made to a database to retrieve, update, or manipulate specific data based on given conditions. Queries help users filter and manage large datasets efficiently.

Types of Action Queries:

Append Query

Delete Query

Update Query

Make Table Query

 

 

5. Write down the output of the given program show them in dry run table.          2

DECLARE SUB Display (TS)

TS="COMPUTER"

CALL Display (TS)

END

 

SUB Display (TS)

FOR C=1 TO LEN(TS) STEP 2

    DS=MID$(TS,C,1)

    PRINT DS;

NEXT C

END SUB

 

Dry Run Table:

C

D$ =(MID$(TS,C,1))

Output

1

C

C

3

M

M

5

U

U

7

E

E

Final Output:

C M U E

6. Rewrite the given program after correcting the bugs                                          2

REM to add record in an existing file.

OPEN "student.dat" FOR OUT AS #2 

TOP:

INPUT "Enter Name, Class and Roll No.: "; SName$, C, RN 

INPUT#2, SName$, C, RN 

INPUT "More records"; Y$ 

IF UCASE$(Y$) = "Y" THEN GOTO POP 

CLOSE #2 

STOP 

After debugging

 

REM To add record in an existing file

OPEN "student.dat" FOR APPEND AS #2

TOP:

INPUT "Enter Name, Class and Roll No:"; Name$, C, RN

WRITE #2, Name$, C, RN

INPUT "More records"; Y$

IF UCASE$(Y$) = "Y" THEN GOTO TOP

CLOSE #2

END

     Group C

Convert/Calculate as per the instruction:                              4 x 1 = 4

(i)(1503)8=(?)16

(ii) (101000101)2=(?)8

iii) (1010+1101)2−(110)2

iv) (100111)2 ÷(110)2



 

 

9.A Write a program in QBASIC that asks length, breadth, and height of a room and calculate its perimeter and volume.Create a Function procedure to calculate perimeter and Sub procedure to calculate volume [Hint: volume= LXBXH and Perimeter= 2(L+B)                                                4 x 2= 8

DECLARE FUNCTION Perimeter(L, B)

DECLARE SUB Volume(L, B, H)

CLS

INPUT "Enter Length: ", L

INPUT "Enter Breadth: ", B

INPUT "Enter Height: ", H

PRINT "Perimeter = "; Perimeter(L, B)

CALL Volume(L, B, H)

END

FUNCTION Perimeter(L, B)

    Perimeter = 2 * (L + B)

END FUNCTION

 

SUB Volume(L, B, H)

    V = L * B * H

    PRINT "Volume = "; V

    END SUB

B. Write a program to read data from the sequential data file "std.dat" which contains:

Student's name, Roll No.Marks of English, Nepali, Maths, and Computer and display the result with all the information of those students whose marks in Computer are more than 40.                     4

 

OPEN "std.dat" FOR INPUT AS #1

DO WHILE NOT EOF(1)

    INPUT #1, Name$, Roll, Eng, Nep, Maths, Comp

    IF Comp > 40 THEN

        PRINT Name$, Roll, Eng, Nep, Maths, Comp

    END IF

LOOP

CLOSE #1

10 Find the greatest number among any two different input numbers.       4

#include <stdio.h>

int main() {

    int a, b;

    printf("Enter two numbers: ");

    scanf("%d %d", &a, &b);

    if(a > b)

        printf("%d is greater\n", a);

else

 

        printf("%d is greater\n", b);

    return 0;

}

OR

 

(ii) Display the series: 5, 10, 15, 20, ...... up to the 15th term.

 

#include <stdio.h>

 

int main() {

    int i;

 

    for (i = 1; i <= 15; i++) {

        printf("%d ", 5 * i);

    }

 

    return 0;

}

 

 

http://www.milanbaral123.blogspot.com


 





Friday, 28 February 2025

PABSON PRE BOARD EXAM COMPUTER SCIENCE CLASS 10 SOLVED SET





 


OPT.II COMPUTER SCIENCE (3031)

SOLVED SEE PRE BOARD EXAM (PABSON)-2081

 

Time: 2 Hours                                                                       F.M.: 50

 

Group A (10 Marks)

 

1.     Answer the following questions in One sentence         6 × 1 =6

 

a.   a.  Write the different architecture of computer network.

Ans: The different architectures of computer networks are:

       Peer-to-Peer (P2P): All devices have equal capabilities and responsibilities

.     Client-Server: Centralized architecture where clients request services and servers provide them.

 

b.    b.  What is cyber bullying.

Ans: Cyberbullying refers to the use of digital platforms such as social media, emails, and messaging to harass, intimidate, or humiliate individuals.


c.      Write any two services provided by the Internet.

Ans: Two services provided by the Internet are: Email Services (Gmail, Yahoo, etc.)Cloud Storage (Google Drive, OneDrive, etc.)

 d.      Which query is used to make mass changes in the data stored in the database?

Ans: The UPDATE query is used to make mass changes in the data stored in a database.

 e.      What is Primary Key?

Ans: A Primary Key is a unique identifier for each record in a database table, ensuring that no two records have the same value.

 f.       Write any two types of operators used in C language.

Ans: Arithmetic Operators: +, -, *, /, MOD   b. Relational Operators: =, <>, >, <, >=, <=

 

2.      Write appropriate technical terms for the following: (2 x 1 = 2)

(a) The law that determines cybercrime policies in a country.

Ans: Cyber Law

 (b) A website used to search for specific words on the Internet.

Ans: Search Engine (e.g., Google, Bing, Yahoo)

 

3. Write the full form of the following: (2 x 1 = 2)

(a) POP - Post Office Protocol
(b) ISP - Internet Service Provider

                              Group B (24 Marks)

 

4.     Answer the following questions:                               9 × 2=18

a.      Differentiate between LAN and MAN.

LAN (Local Area Network): A LAN is a network that connects computers and devices in a limited geographical area such as a home, school, or office building.

MAN (Metropolitan Area Network): A MAN is a network that spans a city or a large campus. It is larger than a LAN but smaller than a WAN (Wide Area Network).

It is typically used for sharing resources like files, printers, and internet connections.

MANs are used to connect multiple LANs within a city.

 

 

 

 

A.    What is network topology? Explain about star topology with suitable diagram.

Ans: Network topology refers to the arrangement of different elements (links, nodes, etc.) in a computer network. It defines how devices are interconnected and how data flows within the network.

 Star Topology: In a star topology, al devices are connected to a central hub or switch. Each device has a dedicated connection to the hub. If one device fails, it does not affect the rest of the network. However, if the central hub fails, the entire network goes down.

 

.


 B.      Write any four opportunities and threats of social media.

Ans:      Opportunities:

1.      Networking: Social media allows individuals and businesses to connect with others globally.

2.      Marketing: Businesses can reach a large audience through targeted advertising.

3.      Information Sharing: Users can share and access information quickly.

4.      Community Building: Social media helps in building communities around shared interests.

              Threats:

1.      Privacy Issues: Personal information can be misused.

2.      Cyberbullying: Users can be harassed or bullied online.

3.      Misinformation: False information can spread rapidly.

4.      Addiction: Excessive use can lead to addiction and mental health issues.

 

C.    What is meant by Online Payment? Write the different forms of e-payment in Nepal.

Ans: It refers to the process of transferring money electronically over the internet. It allows users to make transactions without the need for physical cash.

 Forms of e-payment in Nepal:

Mobile Banking: Services like eSewa, Khalti, and IME Pay.

Internet Banking: Services provided by banks for online transactions.

Credit/Debit Cards: Payments made using card details.

Digital Wallets: Prepaid accounts that store money for online transactions.

 D.    What is cloud computing? What are the services provided by cloud computing.

Ans: Cloud computing is the delivery of computing services (servers, storage, databases, networking, software, etc.) over the internet ("the cloud").

Services Provided:

Infrastructure as a Service (IaaS): Provides virtualized computing resources over the internet.

Platform as a Service (PaaS): Provides a platform allowing customers to develop, run, and manage applications.

Software as a Service (SaaS): Delivers software applications over the internet, on a subscription basis.

E.     Define Data and Information.

Ans: It is raw, unorganized facts and figures that need to be processed. It can be in the form of numbers, text, or symbols.Information is processed data that is organized, structured, and meaningful. It provides context and helps in decision-making.

F.      What is MS-Access? Write any features of MS-Access.

MS-Access is a database management system from Microsoft that combines the relational Microsoft Jet Database Engine with a graphical user interface and software-development tools.

Features:

User-Friendly Interface: Easy to use with a graphical interface.

Data Storage: Can store large amounts of data.

Querying: Allows users to create queries to retrieve data.

Forms and Reports: Enables the creation of forms for data entry and reports for data presentation.

G.    Define action query.

It is a type of query in a database that performs operations on the data, such as updating, deleting, or appending records. It changes the data in the database.

H.    What is table? Write the basic components of table.

 A table is a collection of related data held in a structured format within a database. It consists of rows and columns.

Basic Components:

Rows (Records): Each row represents a single record in the table.

Columns (Fields): Each column represents a specific attribute of the data.

Primary Key: A unique identifier for each record in the table.

Foreign Key: A field that links to the primary key of another table. 

5.     5. Write down the output of the following along with dry run table.  2

DECLARE SUB TEST(A$)

 

CLS 

iteration

i

B$ = MID$(A$, i, 1)

C$ = C$ + B$

Updated C$

1

1

B$ = "P"

C$ = "" + "P"

"P"

2

2

B$ = "A"

C$ = "P" + "A"

"PA"

3

3

B$ = "B"

C$ = "PA" + "B"

"PAB"

4

4

B$ = "S"

C$ = "PAB" + "S"

"PABS"

5

5

B$ = "O"

C$ = "PABS" + "O"

"PABSO"

6

6

B$ = "N"

C$ = "PABSO" + "N"

"PABSON"

 A$="PABSON" 

CALL TEST(A$) 

 

END 

 

SUB TEST(A$) 

FOR i=1 TO LEN(A$) 

BS=MIDS(A$,i,1) 

CS=C$+BS 

NEXT 

PRINT C$

END SUB 

 

The output of the program is : PABSON

                                                                            

6.    6,  Re-Write the given program after correcting the bug:    2

REM to display the data from sequential data file "marks.dat" having marks in English more than 35.

CLS 

OPEN "marks.dat" FOR OUTPUT AS #1 

WHILE NOT EOF(2) 

INPUT #1, NS, ENG, NEP, SCI 

ENG + NEP + SCI = TOT

IF TOT > 35 THEN PRINT NS, ENG, NEP, SCI 

NEXT

CLOSE #1 

        END 

    Debugged Program

CLS 

OPEN "marks.dat" FOR OUTPUT AS #1 

WHILE NOT EOF (1) 

INPUT #1, NS, ENG, NEP, SCI 

TOT= ENG + NEP + SCI

IF ENG > 35 THEN PRINT N$, ENG, NEP, SCI 

END IF

WEND

CLOSE #1 

END

 

7. Study the following program and answer the given questions:           2

DECLARE FUNCTION GRADE (A) 

CLS 

INPUT "ENTER A NUMBER"; B 

C=GRADE(B) 

PRINT C 

END 

 

FUNCTION GRADE(X) 

WHILE X<>0 

R=X MOD 10 

Z=Z+R 

X=INT(X/10) 

WEND 

GRADE=Z 

END SUB 

a.     How many parameters are used in the above program?

 One parameter (A or X) is used in the program.

b.      List the different library functions used in the program.

The program uses the following library function

MOD: Modulus operation.

 

 

GROUP C (16 Marks)

 

8. Convert/Calculate as per the instruction:                      4 × 1 =4




 

9.      A.  Answer the following                                                                    4 × 2 =8

           Write a program in QBasic that asks to enter three different numbers then to find Product and Average of the numbers. Create a user defined function PROD () to calculate product and sub procedure AVG() to calculate average.

DECLARE FUNCTION PROD (A, B, C)

DECLARE SUB AVG (A, B, C)

 

CLS

INPUT "Enter first number: ", A

INPUT "Enter second number: ", B

INPUT "Enter third number: ", C

 

PRINT "Product: ", PROD(A, B, C)

CALL AVG(A, B, C)

 

END

 

FUNCTION PROD (A, B, C)

PROD = A * B * C

END FUNCTION

 

SUB AVG (A, B, C)

AVG = (A + B + C) / 3

PRINT "Average: ", AVG

END SUB

9.B   A sequential data file called "data.dat" has stored the data under the field name, product name, quantity and rate. WAP to display all the records calculating the total amount.

CLS

OPEN "data.dat" FOR INPUT AS #1

WHILE NOT EOF(1)

INPUT #1, ProductName, Quantity, Rate

TotalAmount = Quantity * Rate

PRINT ProductName, Quantity, Rate, TotalAmount

WEND

CLOSE #1

END

10.  Write a program in C language to input a number and test whether it is odd or even.        4

 

#include<stdio.h>

#include<conio.h>

int main()

{

int n;

printf("Enter any number: ");

scanf("%d", &n);

if(n % 2= =0)

printf("%d is even number", n);

else

printf("%d is odd number", n);

return 0;

}

OR,

Write a program in "C" language to display the series with their sum. 1,4,9, up to 10th terms.

#include <stdio.h>

 

int main() {

    int i = 1;

 

    printf("Series: ");

    while (i <= 10) {

        printf("%d ", i * i);

        i++;

    }

 

    return 0;

}

 

 www.milanabaral123.blogspot.com 

 





 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SEE IMP QUESTIONS C LANGUAGE

  Write a C program to calculate simple interest . The program should accept the principal amount , rate of interest , and time period as ...