Wednesday, January 11, 2017

SLC Model Questions Set 4 (Solved)

SLC Model Questions Set 4 (Solved)
Group A
Fundamental [22 marks]
1. Answer the following questions: |5x2=10|
a. What do you mean by communication media? Write any two examples of guided media.
Ans: `Communication media is an electronic path used to transmit data from one device to another device. Any two examples of guided media are twisted pair and coaxial cable.

b. Define e-mail. List out any two importance of e-mail.
Ans: E-mail is an electronic method of sending and receiving message. Any two importance of email are:
          i) It is cheaper, faster and free of cost.
          ii) An e-mail can be send to number of person to any part of the world any time.

c. Write any two positive and any two negative impact of computer in our society.
Ans: Any two positive impact of computer in our society are:
      i) Computer is extensively used in education field to teach students in an efficient way.
      ii) Communication is cheaper, faster and reliable

      Any two negative impact of computer in our society are:
      i) Cyber crime increasing day by day, because people using computer for criminal activity.
      ii) Unemployment increasing, because computer can do work of many people.

d. What is computer virus? Give any two symptoms of computer virus.
Ans: Virus is a destructive computer program that can make lot of damages to computer hardware and software if succeed to infect computer system. Any two symptoms of computer virus are:
      i) Computer take longer time to boot.
      ii) Appearance of unknown file and messages.

e. What is Backup? Write the importance of backup system.
Ans: Backup is a method of making duplicate copy of file which can be used in the event of data loss or corrupt due to intentional or accidental reason. The importance of backup system is to use extra copy in case if original file is lost or damaged.

2.a. Convert as instructed:           |2x1=2|
  i) (450)10 into Binary
Answer:  


                Hence, (450)10 = (111000010)2

  ii) (111101)2 into Octal
 Answer:   Binary digits in 3 bits group –    111    101
                    Equivalent octal digits –                 7         5             
Hence, (111101)2 = (75)8

   b. Perform binary calculations:
   i) 10111 x 110
  Solution:     10111
                          x110
                        00000
                      10111
                    10111    .
                  10001010
Hence, 10111 x 110 = 10001010

   ii) 101101 ¸ 101
  Solution:            
                        Hence, Quotient = 1001 and Remainder = 0

               
3. Match the following pairs:                                                                                                     |4x0.5=2|
       a)      Cyber ethics                                         i) graphics, text, sound
      b)      Virus                                                    ii) main computer
      c)       Server                                                 iii) moral principle
      d)      Multimedia                                         iv) damage data
       v) Internet
    Answer:
      a)      Cyber ethics                                          i) moral principle
      b)      Virus                                                    ii) damage data
      c)       Server                                                 iii) main computer
      d)      Multimedia                                         iv) graphics, text, sound

4. State whether the following statements are True or False:                                     |4x0.5=2|
a)      MAN connects two or more LAN together.
Ans: True
b)      Dialup connection is the easiest way to connect a computer to the internet.
Ans: False
c)       Cyber space is a virtual space used in ICT.
Ans: True
d)      I Love You is a kind of antivirus used in ICT.
Ans: False

5. Give the suitable technical terms of the followings: |4x0.5=2|
a)      Doing business through online.
Ans: E-commerce
b)      The secret word, phrase that gives user access to a particular program.
Ans: Password
c)       The computer that acts the central authority on a network.
Ans: Server Computer
d)      Intentionally, gaining unauthorized access to an information system.
Ans: Hacking

6. Give the full form of the followings: |4x0.5=2|
   a) FTP– File Transfer Protocol
   b) Wi-Fi -  Wireless Fidelity
   c) CPAV-  Central Point Antivirus
   d) ISP= Internet Service Provider
Group B
Database Management System (10 marks)
6. Answer the following questions:                        |3x2=6|
   a) Define field and record with example.
Ans:   Field is a column in a table that store data item for a record. Example : Name, Address, Salary etc.
            Record is a set of related field of information about an entity. Example: Name- Ram, Address – Nijgadh-7, Salary-7000 etc

   b) What is table? Write its importance in database creation.
Ans: Table is an important object in database that contains data in the form of rows and column,
          The importance of table in database is that it is basic building block for database from which information can be retrieved using appropriate program.

   c) What is primary key? Write the use of primary key.
Ans: Primary key is a set of attributes that uniquely identify the records in the table.
          The use of primary key is that it doesn't allow null or duplicate value in the field as used in creating relationship between multiple tables.

8. State whether the following statements are True or False:                                     |4x0.5=2|
e)      The extension of MS-Access is .dbf.
Ans: False
f)       In query calculation also can be done.
Ans: True
g)      We cannot insert picture in database.
Ans: False
h)      With the help of wizard also we can create a form.
Ans: True

9. Match the following groups:                                                                                                 |4x0.5=2|
Group A                                                            Group B
                     i.            Currency field                                                      a ) 1 GB
                   ii.            YES/No field                                                       b ) 255 characters
                  iii.            OLE field                                                            c ) 1 bit
                 iv.            Text field                                                             d) 1 MB
           e ) 8 bytes
Answer:
Group A                                                                               Group B
                     i.            Currency field                                                    a ) 8 bytes
                   ii.            YES/No field                                                      b ) 1 bit
                  iii.            OLE field                                                              c ) 1 GB
                 iv.            Text field                                                             d) 255 characters

Group C
QBASIC Programming (18 marks)
10.a) Define user defined function                                                                                         |1|
Ans: User define function is a block of statement declared by the user to perform a specific type of task.
   
      b) Why is C called middle level language?                                                                     |1|
Ans: C is called middle level language because programmer can write the program in both low level language and high level language.
         
11. Write down the function of INPUT and PRINT statements.                                   |1|
  Ans: The function are as follow:
INPUT :  To accept value from the users.
                PRINT : To display final output on the screen.

12. Debug the following program.                                                                           |2|
REM to input any five no and display the sum of entered no.
CLS
                DECLARE FUNCTION sum(n())
DIM n(5)
FOR x = 1 to 5
ENTER "Input no = ";n(x)
NEXT x
su = sum(n())
print "Sum=";sum
END

FUNCTION sum(n())
s = 0
FOR x = 1 to 5
s = s + n(x)
NEXT x
s = sum
END FUNCTION

Ans: After debugging the program.
REM to input any five no and display the sum of entered no.
CLS
                DECLARE FUNCTION sum(n())
DIM n(5)
FOR x = 1 to 5
INPUT "Input no = ";n(x)
NEXT x
su = sum(n())
PRINT "Sum=";su
END

FUNCTION sum(n())
s = 0
FOR x = 1 to 5
s = s + n(x)
NEXT x
sum = s
END FUNCTION

13. Write the output of the given program.                                                                                         |2|
DECLARE SUB res(st$)
CLS
DATA 4, 6, 11, 1, 3, 7, 5, 13
CALL res(st$)
END
SUB res(st$)
st$ = "BOOKREADKEYED"
FOR x = 1 to 8
READ n
PRINT MID$(st$, n, 1)
NEXT x
END SUB

Ans: OUTPUT –

14. Read the following program and answer the following questions:                                    |2|
DECLARE SUB res(a$)
CLS
a$ = "KATHMANDU"
CALL res(a$)
END

SUB res(a$)
L = LEN(a$)
FOR x = L to 1 STEP -2
PRINT MID$(a$, x, 1);
NEXT x
END SUB

a.       What will be the value of L in the second loop if a$ = "POKHARA"?
Ans: The value of L in the second loop will be 5.

b.      What happen if we remove the statement line "CALL res(a$)" ?
Ans: If we remove the statement line "CALL res(a$)" then the program cannot invoke sub module and generate error message.

15.a. Write a program to check whether entered number is perfect cube or not using SUB …… END SUB statement.|3|
            DECLARE SUB pcube(N)
            CLS
            INPUT "ENTER ANY NUMBER";N
            CALL pcube(N)
END

SUB pcube(N)
P = N^(1/3)
IF P = INT(P) THEN
PRINT "NUMBER IS PERFECT CUBE"
ELSE
PRINT "NUMBER IS NOT PERFECT CUBE"
END IF
END SUB

     b. Using FUNCTION …… END FUNCTION. Write a program to convert given Nepali currency into US dollar. [Hints 1US$ = 98 NC]                                                                                                       |3|
            DECLARE FUNCTION convert(NC)
CLS
            INPUT "ENTER NEPALI CURRENCY";NC
            PRINT "EQUIVALENT US DOLLAR = "; convert(NC)
            END        

            FUNCTION convert(NC)
            USD = NC / 98
            convert = USD
            END FUNCTION

     c. A sequential data file named "STUDENT.DAT" contains name, class, roll no and address of the students. Write a program to display all the students' records whose name starts from the alphabet "B" or "b".                                              |3|
          OPEN "STUDENT.DAT" FOR INPUT AS#1
          PRINT "NAME", "CLASS", "ROLL NO.", "ADDRESS"
          DO WHILE NOT EOF(1)
          INPUT #1, N$, C, R, ADD$
          IF UCASE$(LEFT$(N$,1))="B" THEN
          PRINT N$, C, R, ADD$
END IF
LOOP
CLOSE #1
END


**********************



Monday, January 9, 2017

4G launched in Nepal

4G in Nepal
It is a great announcement for the NTC user in Nepal. NTC service user can now enjoy the 4G service in their phone. NTC has just announced this service on selected locations of two valleys, Kathmandu and Pokhara, and afterwards will continue to the countrywide. This service provide extensive fast and higher quality data service to its subscribers.
Currently this service is only accessible by the PostPaid sim users, and they may have to change their sim to 4G sim, for now this service as a trial period, but afterwards they will charge extra for this service and tariff amount is also not disclosed right now.
What is 4G?
4G stands for fourth generation, 4G LTE (Long Term Evolution) is to offer users faster and more reliable data service. It is said that 4G is around 5 times faster than 3G network. User can access the speed of upto 30 mbps.
How to activate in your mobile?

This is a very easy to activate 4G service, first of all dial *444# , your mobile will be activated and you will see the 4G icon on the top of the screen. Remember NTC will charge NRs. 50 added to your regular bill for this service.

Sunday, January 8, 2017

SLC Model Questions Set 3 (Solved)

SLC Model Questions Set 3 (Solved)
Group A
Fundamental [22 marks]
1. Answer the following questions: |5x2=10|
a. What is computer network? Write any two services provided by computer network.
Ans: The interconnection of computers through wire or without wire in order to share software, hardware and resources is called computer network.
          Any two services provided by computer network are:
          i) Sharing of software and hardware that reduces the cost of operation.
          ii) Cheap means of communication, that allow to send or receive information at very fast speed.

b. Define Internet. Write any two advantages of internet in the society.
Ans: Internet is an interconnection of millions of computers all over the world for communication.
          Any two advantages of internet in the society are:
          i) Global communication facilities.
          ii) Online business possible.

c. What is multimedia? Write any two hardware required to make PC multimedia capable.
Ans: Multimedia is the combination of the different media such as text, graphics, audio, video and animation to make presentation more attractive and effective. Any two hardware required to make PC multimedia capable are:
      i) Speaker                      ii) CD-ROM

d. What is antivirus software? Give any two examples of antivirus software.
Ans: The program that is used to detect and disinfect the virus from the computer system is called as antivirus. Any two examples of antivirus software are:
      i) Kaspersky antivirus                               ii) AVG antivirus

e. Write any four methods to maintain hardware security.
Ans: Any four measures to protect computer hardware are:
          i) Regular maintenance                       ii) Power protection  device
          iii) Insurance                                            iv) Protection from theft

2.a. Convert as instructed:           |2x1=2|
  i) (CAB)16 into Decimal
Answer:  
                = C x 162 + A x 161 + B x 160
                = 12 x 256 + 10 x 16 + 11 x 1
                = 3072 + 160 + 11
                =3243

  ii) (534)8 into Binary
 Answer:   Octal number –                                5      3       4
                    Equivalent octal binary digits – 101  011  100
Hence, (534)8 = (101011100)2

   b. Perform binary calculations:
   i) Divide 111 by 10
  Solution:  
Hence, Quotient = 11 and Remainder = 1

   ii) 1011 + 1010 - 101
  Solution:            1011
                             +1010
                                10101
- 101
10000   
               
3. Match the following pairs:                                                                                                     |4x0.5=2|
      a)      Modem                                           i) Internet account provider
      b)      ATM                                              ii) Internet language
      c)       ISP                                                iii) Internet component
      d)      LAN                                              iv) Online banking
 v) Bus topology
    Answer:
      a)      Modem                                         i) Internet component
      b)      ATM                                            ii) Online banking
      c)       ISP                                              iii) Internet account provider
      d)      LAN                                            iv) Bus topology

4. Select the correct answer from the given options:                      |4x0.5=2|
  a) The unique address of web page or file on the internet is called ………….
    i) URL                                                ii) browser                          iii) protocol                         iv) HTTP
Ans: i) URL
  b) Which of the following is cyber crime?
   i) piracy                             ii) hacking                            iii) data didling                   iv) All
Ans: iv) All
  c) Multimedia is used in …………….
   i) education                     ii) entertainment             iii) virtual reality                iv) All of the above
Ans: iv) All of the above
  d) Which virus infects the various parts of operating system?
   i) boot sector                  ii) worms                             iii) macro                              iv) system infector
Ans: i) boot sector

5. Give the suitable technical terms of the followings: |4x0.5=2|
a)      Online postal service.
Ans: E-mail
b)      A network which extended beyond 100 km.
Ans: WAN (Wide Area Network)
c)       The policies, procedures, tool and techniques designed to protect computer assets.
Ans: Cyber law
d)      The scattering of the part of the same disk file over different location.
Ans: Fragmentation

6. Give the full form of the followings: |4x0.5=2|
   a) TCP/IP– Transmission Control Protocol/Internet Protocol
   b) ADSL -  Asymmetric Digital Subscriber Line
   c) WAN -  Wide Area Network
   d) CVT = Constant Voltage Transformer
Group B
Database Management System (10 marks)
6. Answer the following questions:                        |3x2=6|
   a) What is database? Write any two importance of database.
Ans:  A database is a single organized collection of structured data, stored together to serve multiple applications.
            Any two importance of database are:
            i) Database allows to store related data in electronic form about a particular organization or   company.
            ii) Database allows to share data among different users in the network.

   b) What is form? Write the advantages of form over table.
Ans: A form is a MS-Access object used to enter new record and to edit existing record from the table.
          The advantages of form over table are:      
                            i)            Forms are easier to enter data and perform calculation.
                          ii)            Forms allow editing of data using macros or visual base procedures.

   c) Define data type. Write any two data type that can be used to store string data.
Ans: Data type is an attribute that determine how much data can be stored in a particular field. Any two data type that can be used to store string data are:
          i) Text                         ii) Memo

8. State whether the following statements are True or False:                                     |4x0.5=2|
a)      MS-Excel is DBMS program.
Ans: False
b)      Logical field has the size 1 bit.
Ans: True
c)       Query is the source of table.
Ans: False
d)      With the help of wizard also we can create a form.
Ans: True

9. Match the following groups:                                                                                     |4x0.5=2|
Group A                                                                               Group B
                           i.            MS-Access                                                 a) data type
                         ii.            Primary key                                                b) data base
                       iii.            Report                                                        c) DBMS
                       iv.            Hyperlink                                                   d) unique identification of record
     e) object of MS-Access
Answer:
Group A                                                                               Group B
                             i.            MS-Access                                                         a ) DBMS
                          ii.            Primary key                                                        b ) unique identification of record
                        iii.            Report                                                                 c ) object of MS-Access
                         iv.            Hyperlink                                                            d) data type

Group C
QBASIC Programming (18 marks)
10.a) What is nested loop.                                                                                                          |1|
Ans: A loop within another loop is called nested loop.
   
      b) Write any two data types of C language.                                                                   |1|
Ans: Any two data types of C language are:
          i) int                             ii) float

11. Write down the function of the following statements.                                                          |1|
     i) SHELL                                           ii) RMDIR
Ans: The function are as follow:
SHELL :  To open DOS prompt temporarily.
                RMDIR : To remove an empty sub directory from a disk.

12. Rewrite the following programs with correcting the bugs.                                                    |2|
REM Program to input any number from the user and display its factors.
DECLARE SUB fact(n)
                CLS
INPUT "Enter number="; n
DEMAND fact(n)
END

SUB fact(n)
CLS
PRINT "Factors of"; n; "are=";
FOR x = 1 to n
R = n MODE x
If r = 0 then PRINT r;
NEXT x
SUB END
END

Ans: After debugging the program.
REM Program to input any number from the user and display its factors.
DECLARE SUB fact(n)
                CLS
INPUT "Enter number="; n
CALL fact(n)
END

SUB fact(n)
CLS
PRINT "Factors of"; n; "are=";
FOR x = 1 to n
r = n MOD x
If r = 0 then PRINT x;
NEXT x
END SUB

13. Write the output of the given program.                                                                               |2|
DECLARE FUNCTION num (a)
s = 0
FOR x = 1 to 5
READ n
s = s + num(n)
NEXT x
PRINT s
DATA 1, 2, 3, 4, 5
END

FUNCTION num(a)
Num = a^2
END FUNCTION


                                                Ans: OUTPUT –



14. Read the following program and answer the following questions:                                    |2|
DECLARE SUB ser(x,y)
CLS
CALL ser (4,4)
END

SUB ser(x,y)
CLS
c = 0
FOR a = 1 to 5
PRINT x;
c = x + y
x = y
y = c
NEXT a
END SUB

a.       List the argument used in sub procedure.
Ans: The arguments used in sub procedure are: (4,4)

b.      What will be value of variable "C" when loop completes fourth time?
Ans: The value of variable "C" when loop completes fourth time is 32.

15.a. Write a program to display the series using SUB procedure 8, 18, 32, 50 …. Upto 10th term.|3|
DECLARE SUB ser()
CLS
CALL ser
END

SUB ser()
s = 2
FOR I = 1 to 10
PRINT (s^2)*2
s = s + 1
NEXT I
END SUB

     b. Write a program to display the total no. of characters available in input string using FUNCTION procedure.                                                                                                                                  |3|
DECLARE FUNCTION COUNT(n$)
CLS
INPUT "Enter string"; n$
PRINT "The total no. of characters are = "; COUNT(n$)
END

FUNCTION COUNT(n$)
FOR I = 1 to LEN(n$)
c = c + 1
NEXT I
COUNT = c
END FUNCTION

     c. Write a program to create a data file named "Record.inf" to store name, roll no, class and address of students. Make option for further continue or not.                                            |3|
OPEN "STUDENT.DAT" FOR OUTPUT AS #1
DO
INPUT "Enter Name"; N$
INPUT "Enter Roll no."; RN
INPUT "Enter Class"; C
INPUT "Enter Address"; A$
WRITE #1, N$, RN, C, A$
INPUT "Do you want to add more records (Y|N)"; CH$
LOOP WHILE UCASE$(CH$)="Y"
CLOSE #1
END

**********************