Wednesday, March 15, 2023

SEE Solved Computer Science Model Question Paper SET - 2

 

SEE Solved Computer Science Model Question Paper

 


 

SET 2

Candidates are required to write their answer according to the instructions.

Attempt all questions

 

 

Group A

1. Answer the following questions in one sentence.

a) Where does intranet has been used?

Ans: Intranet has been used to share internal information and resources within an organization.

 b) Write any two benefits of cloud computing.

Ans: Any two benefits of cloud computing are:

 i) Reduce cost

ii) Enhanced data security

 c) Which data type is used to store date of birth of an employee in MS-Access?

Ans: Date/Time data type is used to store date of birth of an employee in MS-Access.

 d) Write any two data type used in MS-Access database?

Ans: Any two data types used in MS-Access database are text and number.

 e) What are procedure in QBASIC?

Ans: The procedure used in QBASIC are SUB procedure and FUNCTION procedure.

 f) Write any two features in 'C' language.

Ans: Any two features in 'C' language are:

  i) It is mostly used to prepare system software.

  ii) it occupies less memory space.

 

2. Write appropriate technical term for the following. [2x1=2]

a) The protocol that makes the network communication possible.

Ans: TCP/IP

b) Digital marks created while using Internet.

Ans: Digital Footprint

 

3. Write the full form of the following. [2x1=2]

(a) ISDN – Integrated Services Digital Network

b) TCP/IP – Transmission Control Protocol / Internet Protocol

 

Group B

Answer the following question in short. 9x2=18

 

a) Differentiate between peer to peer and client-server network with figure.

Ans:

Client – Server Network

Peer to Peer Network

Client/server network is a type of network model where at least one computer is designed as a server and other computers on the network called clients or workstations.

 

The client request for service and server respond with the service.

  


Peer-to-Peer network is a type of network model where all the computer have equal responsibilities on the network.

 

Each node can request for services and can also provide the services.

 


 

b) What is cyber ethics? Give any two example of it.

Ans: Cyber ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users.

Any two examples of computer ethics are:

i) Do not use a computer harm other people.

ii) Do not use a computer to publish fake information.

 

(c) What is software security? Write any two measures of software security.

Ans: The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security.

Any two measures of software security are:

i) Keep the backup copy of important data or software.

ii) Use antivirus software and update frequently.

 

(d) Define E-Commerce ? Write its importance.

Ans: E-commerce refers to the buying and selling of goods or services using the internet.

The importance of e-commerce is it make buying/selling possible 24/7. It makes buying selling procedure faster, as well as easy to find products. There are no geographical boundaries for e-business. Anyone can order anything from anywhere at any time.

 e) Why mobile computing is necessary in present time? Write any two importance of it.

Ans: Mobile computing is important now because it lets people use their phones or tablets to get things done from anywhere, anytime, making life easier and more efficient.

Any two importance of mobile computing are:

i) We can stay connected to all sources at all times.

ii) We can interact with a variety of users via the Internet.

 f) Differentiate between Primary key and Foreign key with example.

Ans:

S.No

Primary Key

Foreign key

1

A primary key uniquely identifies a record in the relational database table.

A foreign key refers to the field in a table which is the primary key of another table.

2

The primary key doesn’t allow null values.

Foreign key accepts multiple null values.

3

A table can contain only one primary key.

A table can contain more than one foreign key.

4

E.g. ID number in Employee table.

E.g. In table of orders, Customer ID might be linking in customer information table.

  g) What is query? List any two advantages of it.

Ans: Query is an object of MS-Access which extracts and arranges information from a table in a manner that is specified.

Any two advantages of query are:

i) We can filter, perform calculations and summarize data.

ii) To perform mass update, delete or append new records to a table.

 

h) What is data sorting? List any two advantages of using it.

Ans: Data sorting is the process of arranging the record in ascending or descending order according to a given field or fields. Sorted data is easier to handle than unsorted data.

The advantages of sorting are:

i) It helps to find specific information quickly.

ii) Sorted data is easier to handle than unsorted data.

 

i) Define form. Write its importance

Ans: Form is an object of MS-Access which provide graphical interface to enter data into the tables or multiple linked tables.

The importance of form are:

a) It provides an interactive platform for input of data into the database.

b) It helps to display data in more presentable form than a datasheet.

 

 

5. Write down the output of the given program. Show with dry run in table.

DECLARE SUB SERIES ()

CLS

CALL SERIES

END

SUB SERIES ()

X=1

Y=2

FOR P 1 TO 10

PRINT X:

X=X+Y

Y=Y+1

NEXT P

END SUB

 

Dry run

Variable

Variable

Variable

Loop check

Output

X

Y

P

1 to 10

 

1

2

1

1 to 10 Yes

1

3

3

2

2 to 10 Yes

3

6

4

3

3 to 10 Yes

6

10

5

4

4

10

15

6

5

5

15

21

7

6

6

21

28

8

7

7

28

36

9

8

8

36

45

10

9

9

45

55

11

10

10

55

66

12

11

11 to 10 No

Loop exits

 

 

Output

   1 3 6 10 15 21 28 36 45 55

 

6. Re-write the given program after correcting the bugs: [2]

REM to store record in data file

CLS

OPEN "employee.dat" FOR INPUT AS #1

DO

INPUT "Enter Name, address and gender": NS, A. G

INPUT #1, NS, A. G

INPUT "Do you want to continue "; Y$

WHILE UCASE$(Y$) = "Y"

CLOSE "employee.dat"

END

 

Debugged Program

REM to store record in data file

CLS

OPEN "employee.dat" FOR OUTPUT AS #1

DO

INPUT "Enter Name, address and gender": NS, A$, G$

WRITE #1, NS, A. G

INPUT "Do you want to continue "; Y$

LOOP WHILE UCASE$(Y$) = "Y"

CLOSE #1

END

 

 

7. Study the following program and answer the given questions: [2]

DECLARE FUNCTION text$(N$)

CLS

INPUT "Enter any string"; X$

PRINT text$(X$)

END

FUNCTION text$(N$)

FOR i= LEN (N$) TO 1 STEP-1 W$=W$+MID$(N$,i,1)

NEXT i

text$ = WS

NEXT Q

END FUNCTION

Questions:

a) What is the main objective of above program?

Ans: The main objective of above program is to reverse the string.

 

b) List all the parameters used in above program.

Ans: The parameters used in above program are X$ and N$

 

Group C

8. Convert/ Calculate as per the instruction.

a) (10111101)2 = (?)10

Solution:

            = 1x27 + 0x26 + 1x25 + 1x24 + 1x23 + 1x22 + 0x21 + 1x20

            = 1x128 + 0x64 + 1x32 + 1x16 + 1x8 + 1x4 + 0x2 + 1x1

            = 128 + 0 + 32 + 16 + 8 + 4 + 0 + 1

            = 189

            \ (10111101)2 = (189)10

 

c) (10101)2 X (111)2

Solution:

            1 0 1 0 1

             X   1 1 1

            1 0 1 0 1

          1 0 1 0 1 x

  +   1 0 1 0 1 x x 

   1 0 0 1 0 0 1 1

            \ (10101)2 X (111)2 = (10010011)2

 

b) (645)10 = (?)16

Solution:

        

16

645

5

16

40

8

16

2

2

 

0

 

\ (645)10 = (285)16

 

d) (111110) / (110)

Solution:

                                          \ Q = 1010

                                                R = 10

 

 

9. a) Write a program in QBASIC to input length and breadth of room and calculate its area using function and perimeter using sub procedure. [Hint: Area = lxb. Perimeter = 2(1+b)]

Ans:

DECLARE FUNCTION AREA (L,B)

DECLARE SUB PERIMETER(L,B)

CLS

INPUT "ENTER LENGTH"; L

INPUT "ENTER BREADTH"; B

PRINT "Area of room = "; AREA(L,B)

CALL PERIMETER(L,B)

END

 

FUNCTION AREA(L,B)

A= L*B

AREA = A

END FUNCTION

 

SUB PERIMETER(L,B)

P = 2*(L+B)

PRINT "Perimeter of room = " ; P

END SUB

 

 

b) A sequential data file called "Records.dat" has stored data under the field heading Roll No., Name, Gender, English, Nepali, Maths and Computer. Write a program to display all the records of students whose marks in computer is more than 90.

Ans:

OPEN "Records.dat" FOR INPUT AS #1

  WHILE NOT EOF(1)

  INPUT #1, RN,N$,G$,E,N,M,C

    IF C>90 THEN

      PRINT RN, N$, G$, E, N, M, C

    END IF

  WEND

CLOSE #1

END

 

10. Write a program in C to sum of odd number from 80 to 90.

Ans:

#include<stdio.h>

#include<conio.h>

void main()

{

int i, s=0;

for (i = 80; i <= 90; i++)

{

if (i % 2 ==1)

s = s + I;

}

printf ("Sum of odd numbers from 80 to 90 = %d", s);

getch();

}

OR

Write a program in 'C' language to input three number and find greatest number among three numbers.

Ans:

#include<stdio.h>

#include<conio.h>

void main()

{

int a, b, c;

printf ("Enter any three numbers");

scanf("%d %d %d", &a, &b, &c);

if (a>b && a>c)

printf ("%d is the greatest number", a);

else if(b>c)

printf ("%d is the greatest number", b);

else

printf ("%d is the greatest number"; c);

getch ();

}

 

 

* The End *

No comments:

Post a Comment