Sunday, December 14, 2014

SLC COMPUTER 2064 QUESTION PAPER




SLC COMPUTER 2064 QUESTION PAPER

SLC Question-2064
Group A
Computer Fundamentals (20 marks)
1.  Answer the following questions: [10]
a) Define LAN topology. Draw star topology.
b) What is multimedia? Name any two field where multimedia is used.
c) Give the importance of modem in the computer network.
d) Write any two ways of protecting computer hardware.
e) What is virus? Name any two types of computer virus.

2.  Fill in the blanks: [2]
a) _________ means two-way communication system.
b) ____ is the process of transferring data files from a network location to the user’s computer.
c) Government of Nepal introduced the cyber law in the year _______ B.S.
d) _________ are used to detect and remove computer virus from infected file or memory.

3.  Select the best possible alternative: [2]
a) Which refers to the communication media?
i. UTP cable        ii. Fiber optic cable       iii. Radio wave  iv. All
b) Which is Network operating system(NOS)?
i. Linux                ii. Windows XP            iii. MS-DOS                 iv. All
c) Which is the internet service?
i. Telnet               ii. POP                         iii. Both             iv. None
d) Which is not a virus?
i. Worm              ii. Logic bomb              iii. Trojan Horse            iv. Win-zip

4.  Write the full form of the following: [2]
a) WAN      b) Bits              c) NIC             d) CD-ROM   

5.  Give the appropriate technical term for the following: [2]
a) Secret word that gives a user access to a particular program or system
b) A device used at end user’s computer in a network which converts digital signal into analog and vice-versa
c) The law that governs the legal issue of cyberspace
d)  A character (such as asterisk or question mark) that stands for any other character, or series of any character

6.  Match the following. [2]
Group A                             Group B
a)      Radio Wave                    Device to connect network having different technology
b)      Cyber ethics                    power protection device
c)      Spike guard                     internet
d)      Gateway             professionally guided principles
                                             Wireless media


Group B
Database (10 marks)
7.  Answer the following questions: [6]
a)      Define data and database.
b)      Name any four data types that can be defined in MS-ACCESS.
c)      What is a form? Give its importance.

8.  Choose the correct answer: [2]
a) The logical data type of MS-ACCESS is
i. Yes/ NO       ii. On/Off                      iii. True/False                            iv. All
b)  Which is the example of database?
i. dBASE          ii. MS-ACESS             iii. Telephone directory  iv. All
c) Primary key does not accept
i. Text               ii. Number                    iii. Null value     iv. None
d)  Which component of MS-ACCESS does not allow entering data?
i. Table             ii. Query           iii. Form                        iv. None of them

9. State whether true or false. [2]
a)      MODEMS are not needed in wireless network communication.
b)      HUB provides power backup in the event of power cut on the network system.
c)      System infectors usually enter to the system as a device driver and get loaded into memory.
d)      Sound card captures movies or pictures from the external devices.

Group C
QBasic Programming (20 marks)
10.  a) Define procedure in modular programming. [1]
 b) Differentiate SUB procedure and FUNCTION procedure. [1]
 c) Write the function of NAME and FILES in Q-BASIC. [1]

11. Rewrite the given program correcting the bugs: [2]
DECLARE SUB Series()
CLS
EXECUTE Series
END
SUB Series()
REM program to generate  3 3 4 9 15 upto 20th terms.
            A=3
            B=3
            FOR ctr= 10 to 1
            DISPLAY A;B;
            A=A+B
            B=A+B
NEXT ctr
END Series()

12. Write the output of the following program. [2]
DECLARE FUNCTION AREA (A,B)
CLS
LET A = 30
LET B=40
LET D= AREA(A,B)
PRINT D
END
FUNCTION AREA(A,B)
            PRINT A,B
            AREA=A*B
END FUNCTION

13. Study the following program and answer the given questions. [2]
DECLARE FUNCTION CELLS$(W$)
W$=”CYBER”
PRINT CELL$(W$)
END
FUNCTION CELL$(W$)
K=LEN(W$)
FOR I = K TO 1 STEP -2
            M$=M$+MID$(W$,I,1)
NEXT I
CELLS$=M$
END FUNCTION
a)      Why is $(dollar) sign followed in the function name?
b)      What will be the output of the program when it is executed?
c)      What will be the output of the program when FOR loop is changed as FOR I= 1 TO K STEP 2?
d)      What is the name of sign “+” used in the program and what operation does it perform?

14. a) Write a program in QBASIC to find the area of four wall of a room using FUNCTION…..END FUNCTION. [3]

b) Write a program in QBASIC to display the following series using SUB…. END SUB or FUNCTION….END FUNCTION. 5 55 555 ….. up to 6th terms [3]

c)      Write a program in QBASIC to open a sequential data file “EMP.DAT”, which contains employees records: Name, address and phone number and display all the records as well as total number of records stored in the file. [3]