KATHMANDU PABSON QUALIFYING EXAMINATION 2070 [SLC COMPUTER SOLVED]
PABSON, Kathmandu
S.L.C Qualifying Examination 2070
Subject: Opt II Computer Science F.M.: 50
Time: 1.30hrs P.M.: 20
Candidates are required to answer in their own words as far as practicable credit shall be given to creativity not for rote learning.
Group A (Fundamental – 22 Marks)
1. Answer the following questions: 2 × 5 = 10
a) Mention the differences between client-server network model and peer-to-peer network/model.
Ans: The difference between client - server network model and peer to peer network model are as follows:
Client/Server network
|
Peer to peer network
|
It consists of at least one server and one or more workstations.
|
It is a group of computer which function both as clients or workstations.
|
It provides the high security for the data.
|
It provides no reliable security and keep data under risk.
|
b) What is internet? How is it different than intranet?
Ans: Intranet is a private computer network that uses the internet protocol to securely share any part of information of an organization.
Internet is worldwide interconnection of all smart communication devices whereas Intranet is a privately owned part of internet.
c) Multimedia technology makes classroom presentation more interactive. Explain.
Ans: Multimedia technology is very much useful in classroom. It helps to present the information about various topics in more interesting and interactive way which makes the learner easy to understand. It helps to give better ideas and concept to the students with good vocabulary.
d) What do you mean by computer security? List its types.
Ans: The security given to the computer for the protection of hardware, software and other resources from being lost or damaged due to accidental or intentional harm is known as computer security.
Its types are:
1) Hardware security.
2) Software security.
e) List any four reasons for creating computer viruses.
Four reasons for creating computer viruses are:
1. To destroy or infect the boot sector of the disk.
2. To destroy application programs.
3. To destroy program files or boot records.
4. To infect the software document or template created using word processing or spreadsheet software.
2. Match the following. 4 × 0.5 = 2
a) UPS Multimedia
b) TCP/IP Responsible for sending the mails
c) SMTP Responsible for downloading the mails
d) Speaker Compulsory protocol for computer
Hardware security
Answers
a) UPS Hardware security
b) TCP/IP Compulsory protocol for computer
c) SMTP Responsible for sending the mails
d) Speaker Multimedia
a) A network of computer formed by using cables.
Local Area Network
b) Small program that can replicate itself without knowledge of user.
Computer Virus.
c) One of the cheapest services provided by the internet.
E-mail.
d) The process of restoring encrypted data to its original form.
Backup.
5. Write the full forms of: 4 × 0.5 = 2
a. MPEG: Moving Picture Experts Group.
b. PSTN: Public Switched Telephone Network.
c. NIC: Network Interface Card.
d. RJ – 45: Registered Jack - 45
6. Choose the best answer. 4 × 0.5 = 2
a. A real time communication service provided by internet is ………….
i. E-mail ii. Chat
iii. FTP iv. Website
Chat
b. The communication mode where receiver cannot respond immediately.
i. Half duplex ii. Full duplex
iii. Simplex iv. None of the above
Half Duplex
c. Cyber law of Nepal was enacted in Nepal in ………….. B.S.
i. 2062 ii. 2060
iii. 2061 iv. 2068
2061
d. A virus that infects the application program.
i. Boot sector virus ii. Program virus
iii. Multipartite iv. Stealth virus
Program virus
Group B (DBMS – 10 Marks)
7. Answer the following questions: 2 × 3= 6
a. List any four advantages of DBMS.
Any four advantages of DBMS are as follows:
i. It is possible to control data redundancy.
ii. It allows sharing the existing database.
iii. It maintains accurate database.
iv. It provide better interacting environment to the user.
b. What is an update query? List any two features of primary key.
Update query is a type of action query which makes global change in data of a table or more linked table.
Two features of primary key are as follows:
i. It sets the relationship between tables.
ii. Reduces and controls duplication of record in a table.
c. List any two differences between Form and Report.
Two difference between Form and Report are :
Report
|
Form
|
It is used for viewing and printing data.
|
It is used to accept data for data entry to a query.
|
It allows output of data.
|
It allows to input a data.
|
8. State whether the given statements are true or false. 4 × 0.5 = 2
a. A field name can have maximum of 64 characters. True.
b. The Date/ Time field data type occupies 4 bytes of memory. False.
c. A field cannot be declared without data type. True.
d. A row of a table is known as field in MS-Access. False.
9. Match the following. 4 × 0.5 = 2
a. Hyperlink stores unique sequential number
b. Yes/No Stores numbers
c. Auto number stores email address
d. Number stores images
Stores logical data
Answers
a. Hyperlink stores email address
b. Yes/No Stores logical data
c. Auto number stores unique sequential number
d. Number Stores numbers
Group C (Programming – 18 Marks)
10. Answer the following questions: 3
a. List a difference between Argument and Parameter?
A difference between Argument and parameter is:
Argument
|
Parameter
|
Arguments are values that are sent to the procedure.
|
These are variables that will receive data sent to the procedure.
|
b. Why C language is called middle level language?
C is called middle level language because it combines elements of high level language with some features of assembler.
c. Write down the function of FILES statements and PRINT #command.
Function of file statement is to display the files of the current sub directory or specified sub directory. The function of PRINT# command is to send one or more data items to the specified file
11. Write the output of the following program. 2
DECLARE SUB DISPLAY(X)
CLS
FOR N = 1 TO 10 STEP 3
CALL DISPLAY (N)
NEXT N
END
SUB DISPLAY (X)
IF X MOD 2 =1 THEN PRINT X;
END SUB
12. Rewrite the following program correcting the bugs. 2
REM to display a word by extracting characters of even position.
CLS
DECLARE SUB POS$(X$, Y$)
INPUT “ENTER A WORD:”; X$
CALL SUB POS$ (X$, Y$)
END
SUB WORD$(X$, Y$)
FOR P = 1 TO LEN (X$) STEP 2
E$ = LEFT$ (X$, 1, P)
WORD$ = E$ + WORD$
NEXT P
Y$ = WORD$
END SUB
Debugged Program
REM to display a word by extracting characters of even position.
DECLARE SUB WORD (X$, Y$)
CLS
INPUT "ENTER A WORD:"; X$
CALL WORD(X$, Y$)
PRINT Y$
END
SUB WORD(X$, Y$)
FOR P = 1 TO LEN(X$) STEP 2
E$ = MID$(X$, P, 1)
W$ = E$ + W$
NEXT P
Y$ = W$
END SUB
13. Read the following program and answer the questions:2
DECLARE SUB TEST (W$)
CLS
INPUT “ENTER A WORD”;A$
CALL TEST (A$)
END
SUB TEST (W$)
FOR K = 1 TO LEN (W$)
U$ = MID$ (W$, K, 1) +U$
NEXT K
PRINT U$
END SUB
Questions:
a. List the arguments and parameters used in the above program.
Ans: The arguments and parameters used in the above program are
Parameter : W$
Argument: A$
b. List the library functions used in the above program.
Ans: The library functions used in the above program are
LEN, MID$
14. a. WAP using function procedure that displays area of a circle. The program allows a user to input radius in the main module. 3
DECLARE FUNCTION AREA(R)
CLS
INPUT "PLEASE ENTER THE RADIUS OF THE CIRCLE"; R
CALL AREA(R)
END
SUB AREA (R)
A = 3.14 * R ^ 2
PRINT "THE AREA OF THE CIRCLE WITH RADIUS";R;"IS";A
END SUB
b. WAP to declare a function procedure that checks whether a enter number is prime or composite. 3
DECLARE FUNCTION CHECK(N)
CLS
INPUT “Enter any number”; N
P=CHECK(N)
IF P=2 THEN
PRINT P;”is prime number”
ELSE
PRINT P;”is composite number”
END IF
END
FUNCTION CHECK(N)
C=0
FOR I=1 TO N
IF N MOD I = 0 THEN C=C+1
NEXT I
CHECK = C
END FUNCTION
c. A sequential data file named “Nabil.txt” contains record of clients of a bank including depositor’s name, deposited amount, time and rate of interest. WAP to display detail of all depositors including simple interest.3
OEN "Nabil.txt" FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, D$, A, T, R
S=(A*T*R)/100
PRINT D$, A, T, R, S
WEND
CLOSE #1
END
By: Sanukaji Ale Magar
Comments