Thursday, January 5, 2017

SLC Model Questions Set 2 (Solved)

SLC Model Questions Set 2 (Solved)
Group A
Fundamental [22 marks]
1. Answer the following questions: |5x2=10|
a. Distinguish between server and client in network.
Ans: The computer that acts the central authority on a server based network is called the server. Server is the powerful computer having higher processing and larger storage capacity compared to clients.
          The clients are the computers on which users run applications. Clients are less powerful computers in comparison with servers.

b. What do you mean by communication channel? Give an example each of guided and unguided communication media.
Ans: A communication channel is the path through which data and messages transfer from one computer to other computers in the form of electromagnetic wave.
          An example of guided media – Twisted Pair and unguided media – Microwave

c. What is multimedia? Write any two areas where multimedia can be used.
Ans: The technology that uses more than one medium to present information in more attractive, interesting, understandable manner is known as multimedia.
      Any two areas where multimedia can be used are:
                i) Education and training                               ii) Entertainment

d. Write any four symptoms of computer virus attack.
Ans: Any four symptoms of computer virus attack are:
        i)            Computer may not boot properly and hang quickly.
       ii)            Changes in the size of files and executable files.
     iii)            Missing of files or appearing of unexpected files.
     iv)            Program loading and data accessing take long time.

e. What do you mean by computer security? Write any two measures to protect computer hardware.
Ans: The protection of computer data, information, software and hardware from being lost or damaged due to accidental or intentional harm is known as computer security.
Any two measures to protect computer hardware are:
          i) Regular maintenance                       ii) Power protection  device

2.a. Convert as instructed:           |2x1=2|
  i) (675)10 into base 2
       

Hence, (675)10 = (1010100011)2

  ii) (10101101)2 into base 8
 Answer:   Making group of 3 binary bits from the right – 010 101 101
                    Equivalent octal number                                              2      5     5
Hence, (10101101)2 = (255)8

   b. Perform binary calculations:
   i) 1010101 + 1011
  Solution:     1 0 1 0 1 0 1
                        +        1 0 1 1
                       1 1 0 0 0 0 0
   Hence, 1010101 + 1011 = 1100000

   ii) 10101 
                   
Hence, quotient = 111 and remainder = 0

3. Match the following pairs:                                                                                                     |4x0.5=2|
a)      LAN                                                          i) Communication rules
b)      Protocol                                               ii) data security
c)       Backup                                                 iii) sending message
d)      E-mail                                                    iv) BUS topology
 v) Cyber crime
    Answer:
a)      LAN                                                          i) BUS topology
b)      Protocol                                               ii) Communication rules
c)       Backup                                                 iii) data security
d)      E-mail                                                    iv) sending message

4. Select the correct answer from the given options:                      |4x0.5=2|
  a) Which devices is used to connect same type of network protocol?
    i) NIC                 ii) Bridge                              iii) Gateway                        iv) None of the above
Ans: ii) Bridge
  b) Which of the following is a computer virus?
   i) Worms                           ii) Trojan horse                  iii) I love you                       iv) All
Ans: iv) All
  c) A multimedia computer usually includes device like
   i) speaker                         ii) microphone                   iii) CD-ROM                         iv) All of the above
Ans: iv) All of the above
  d) When did the government of Nepal introduced the Cyber law for the first time?
   i) 2058 B.s.                        ii) 2057 B.s.                          iii) 2061 B.s.                         iv) 2059 B.s.
Ans: iii) 2061 B.S.

5. Give the suitable technical terms of the followings: |4x0.5=2|
a)      A card used to connect the cable to the computer network.
Ans: NIC (Network Interface Card)
b)      Physical layout of network.
Ans: LAN Topology
c)       Network of networks.
Ans: Internet
d)      Program or software that detects or removes the computer virus.
Ans: Anti-virus

6. Give the full form of the followings: |4x0.5=2|
   a) WWW– World Wide Web
   b) MAN -  Metropolitan Area Network
   c) NIC -  Network Interface Card
   d) HTTP = HyperText Transfer Protocol
Group B
Database Management System (10 marks)
6. Answer the following questions:                        |3x2=6|
   a) Define data and database with example.
Ans:  Data is the smallest unit to represent information in a table. Data are raw facts, symbols and unprocessed entity that bears no meaning.
A database is a single organized collection of structured data, stored together to serve multiple applications.

   b) What does the field size mean? Name any two data types that can be defined in MS-Access.
Ans: Field size means the data storage capacity of the field. For example size of a text field is 255 characters.
Any two data types that can be defined in MS-Access are:
                i) Text                   ii) Number

   c) What is report? Why is it needed?
Ans: A report is an object of MS-Access that allows a user to prepare a ready-to-print document according to the user specification.
It is needed when data are required to be arranged, edited and need to be printed as hard copy output.


8. Match the following groups:                                                                                        |4x0.5=2|
Group A                                                                               Group B
         i.            DBMS                                                                    a ) column on data sheet
       ii.            Query                                                                   b ) presentation of result
      iii.            Report                                                                  c ) software
     iv.            Record                                                                  d) piece of information
 e ) retrieving information conditionally
Answer:
Group A                                                                               Group B
       v.            DBMS                                                                    a ) software
     vi.            Query                                                                   b ) retrieving information conditionally
    vii.            Report                                                                  c ) presentation of result
  viii.            Record                                                                  d) piece of information

9. State whether the following statements are True or False:                                     |4x0.5=2|
a)      Only one table can be created in MS-Access.
Ans: False
b)      A text data type can store maximum of 155 characters per field record.
Ans: False
c)       Index accelerates the query and sort operations.
Ans: True
d)      Memo data type can store 64,000 characters.
Ans: True

Group C
QBASIC Programming (18 marks)
10.a) Define main module and sub module.                                                                                     |1|
Ans: Main module is the entry point of a modular program and located at the top of other modules. It contains declaration statements, input values or constants, calling statements and a termination.
          Sub module is a small manageable part of modular program and for specific purpose that is controlled by main module.
   
      b) Write any two differences between QBASIC and C Language.                                         |1|
Ans: Any two differences between QBASIC and C Language are:
 
QBASIC
C Language
      1.       It is high level language.
      2.       It supports both sub procedure and                   function procedure.
               1.. .It is a middle level language
        2.       It supports only function procedure.

11. Write down the function of the following statements.                                                          |1|
     i) REM                                              ii) FILES
Ans: The function are as follow:
REM :  To put description about the program.
                FILES : To display the list of the files and directories on the disk.

12. Write the output of the given program.                                                                                         |2|
DECLARE SUB exam (x)
CLS
FOR i = 1 TO 5
READ n
CALL exam(n)
NEXT i
DATA 2,3,4,5,6
END

SUB exam(x)
PRINT x^2;
END SUB

 
Ans: OUTPUT –



13. Rewrite the following programs with correcting the bugs.                                                    |2|
REM Program to store name, age, tel no in sequential file.
OPEN "NHS.DAT" FOR INPUT AS #2
GIVEN n$,a,t
WRITE n$,a,t
CLOSE 2
END

Ans: After debugging the program.
REM Program to store name, age, tel no in sequential file.
OPEN "NHS.DAT" FOR OUTPUT AS #2
INPUTE "Enter name, age and telephone number"; n$, a, t#
WRITE #2 n$, a, t#
CLOSE #2
END

14. Read the following program and answer the following questions:                                    |2|
DECLARE FUNCTION pal$(w$, n$)
CLS
INPUT "enter string"; w$
IF w$ = pal(w$, n$) THEN
PRINT "palindrome"
ELSE
PRINT "not palindrome"
END IF
END

FUNCTION pal$(w$, n$)
FOR x = LEN(W$) TO 1 STEP -1
N$ = n$ + MID$(w$, x, 1)
NEXT x
Pal$ = n$
END FUNCTION
a.       How many parameters are passed through the function?
Ans: 2 parameters are passed through the function.
b.      Count the number of string variables declared in the above program.
Ans: String variables are : w$, n$

15.a. Write a program to input Fahrenheit and convert it into equivalent Celsius using FUNCTION ……….. END FUNCTION statement.  [Hint: Celsius = 5/9*(f-32) ]                                    |3|
DECLARE FUNCTION CEL(F)
CLS
INPUT "Enter temperature in Fahrenheit";f
PRINT "Temperature in Celsius = ";CEL(f)
END

FUNCTION CEL(f)
CEL = 5/9*(f-32)
END FUNCTION

     b. Write a program to display the series of numbers 5, 10, 15 …… till 10th term using SUB …… END SUB statement.                                                                                                         |3|

DECLARE SUB SER()
CLS
CALL SER
END

SUB SER()
S = 1
FOR J = 1 TO 10
PRINT S * 5
NEXT J
END SUB

     c. A sequential data file "STUDENT.DAT" contains name, class, roll no. and marks of three subjects. Write a program to count the no. of passed students. (Assume that pass marks in each subject is 32)                                                                                                                         |3|
OPEN "STUDENT.DAT" FOR INPUT AS #1
WHILE NOT EOF (1)
INPUT #1, N$,C,RN,E,M,S
IF E>=32 AND M>=32 AND S>=32 THEN
COUNT = COUNT +1
END IF
WEND
CLOSE #1
PRINT "Total number of passed students = ";COUNT
END
**********************



No comments:

Post a Comment