KATHMANDU PABSON QUALIFYING EXAMINATION 2069 [SLC COMPUTER SOLVED]



PABSON
SLC Qualifying Examination - 069
Sub: Computer Science (Opt II)                                                 F.M.: 50
Time: 1:30 Hrs                                                                          P.M.: 20
Candidates are required to give their answers in their own words as far as practicable credit shall be given to creativity not for rote learning.
Group A (Computer Fundamentals - 22  Marks)
1.      Answer the following questions.                                5 x 2=10

a)      What is a network protocol? List some of the popular network protocol.
Ans: Network Protocol is the sets of rules that the computers on the network must follow to make communication possible.
Some of the popular Network Protocol are:
                                 i.            TCP/IP
                               ii.            HTTP
                              iii.            FTP
                             iv.            SMTP

b)      What is intranet? How is it different than internet?
Intranet is a private computer network that uses the internet protocol to securely share any part of information of an organization.
Internet is worldwide interconnection of all smart communication devices whereas Intranet is a privately owned part of internet.

c)      What is software piracy?
Software Piracy is an unauthorized copying, reproduction, use, or manufacture of software products.

d)      What is meant by defragmentation?
The Process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval is called defragmentation.

e)      List any four characteristics of computer virus?
                                             i.            Virus is a self-replicating computer program.
                                           ii.            It increases the use of disk spaces and grow in file size.
                                          iii.            It slows down the performance of computer system.
                                         iv.            It corrupts the system data.




1.      a) Perform the following Binary calculations.                                    2
i)                    101011 + (110110 –11101)





           
3.      Match the following.                                                               4 x 0.5=2
a)      Antivirus                             Internet protocol
b)      Infrared transmission           Network adopter
c)      Apple Talk                          Transmission media
d)      NIC                                    McAfee
Disk Killer

Answer:

a)      Antivirus                             McAfee
b)      Infrared transmission           Transmission media
c)      Apple Talk                          Internet protocol
d)      NIC                                    Network adapter


4.      Write the technical terms of the following statements.                     2
a)      Physical layout of network.
Network Topology

b)      It can be used to authenticate the identity of the sender or the signer of a document.
Digital Signature

c)      It is a protocol which helps in bypassing the phone calls using computer.
VOIP(Voice over Internet Protocol)

d)      A set of moral principal that regulate the use of computers.
Protocols

5.      Write the full form of                                                              4 x 0.5=2
a)      GPRS=General Packet Radio Service                      
b)      IRC= Internet Relay Chat               
c)      ADSL= Asymmetric Digital Subscriber Line
d)       DNS= Domain Name System

6.      Choose the appropriate option:                                             4 x 0.5=2
a)      A program originally developed to allow users to view document on the WWW.
i) Telnet                                                      ii) website
iii) Web browser                                          iv) web page
Web browser       

b)      …………..is used to scan your hard disk for errors caused by improper shutdown, viruses, etc.?
i) Password policy                           ii) defragmentation
iii) Scan disk                                                iv) backup system
Scan disk

c)      Cyber Law of Nepal was enacted in Nepal in………………B.S.
i) 2062                                                        ii) 2000
iii) 2061                                                       iv) 2068
2061

d)      The computer virus is created using……………
i) Application program                                 ii) Computer language
iii) Utility program                            iv) None of the above
Computer Language

Group B (MS-Access – 10 Marks)
7.      Answer the following question.                                              3 x 2=6
a)      What is database? Name any two DBMS software.
Database is a collection of related and organized information that can be used for different purpose. The two DBMS Software are:
                                             i.            Ms- Access
                                           ii.            ORACLE

b)      What is data sorting? Write the difference between sorting and filtering?
Data sorting means grouping all the records in a table either in ascending or descending order based on a key field of the record.
Sorting Means Grouping the records in ascending or descending order whereas filtering means extracting specific record.
.
c)      What is report? Give its importance.
Report is an object of database which displays the output in an effective way to present the data in a printed format.
The importance of report are:
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.

8.      State whether the given statement are true or false.                        4 x 0.5=2
a)      A query cannot be the source for a form. False
b)      Primary key field may contain the same value in two records. False
c)      A field cannot be declared without data type. True
d)      The extension of MS-Access database file is .MDB. True

9.      Match the following                                                                4 x 0.5=2
Group A                                         Group B
MS-Access             Data type
Primary Key           Data base
Report                    DBMS
Hyperlink                Unique identification of record
Object of Access
Answers:
Group A                                         Group B
MS-Access             DBMS
Primary Key           Unique identification of record
Report                    Object of Access
Hyperlink                Data type



Group C (Programming – 18 Marks)
10.   Answer the following questions in short.                              3
a)      What is user defined function?    
The function which is defined by the user according to the need is known as user-defined function.
                                         
e)      What is C language?
C language is a structure programming language that divides a program into many functions.
                                                     
f)        Write down the function of CHDIR and NAME command.       

CHDIR=It allows qbasic to change from one directory to another.
NAME=The NAME statement renames a file on a diskette. Only file name changes, data and program         

11.  Write down the output of the following programs:                2
DECLARE FUNCTION TEST(N)
CLS
FOR J=3 TO 9 STEP 2
X= TEST(J)
PRINT X
NEXT J
END

FUNCTION TEST(N)
TEST= (N^2)+2
END FUNCTION







                                  












12.  Re-write the given program after correcting the bugs:        2
REM to display a word by extracting characters of even position
CLS
DECLARE SUB NAME$(X$,Y$)
INPUT”ENTER A WORD”;X$
CALL SUB NAME$(X$,Y$)
PRINT Y$
END

SUB WORD$(X$,Y$)
FOR P=1 TO LEN (X$) STEP 2
E$=LEFT$(X$,1,P)
WORD$=E$+WORD$
NEXT P
Y$=WORD$
END SUB

Answer:

REM to display a word by extracting characters of even position
CLS
DECLARE SUB WORD(X$,Y$)
INPUT”ENTER A WORD”;X$
CALL WORD(X$,Y$)
PRINT Y$
END

SUB WORD (X$,Y$)
FOR P=1 TO LEN (X$) STEP 2
E$=MID$(X$,P,1)
W$=E$+W$
NEXT P
Y$=W$
END SUB

13.  Read the following program given below and answer the question. 2
DECLARE FUNCTION NUM(N)
CLS
N=14
PRINT NUM(N)
END
FUNCTION NUM(N)
WHILE N<>0
R=N MOD 2
S=S+R*10^P
P=P+1
N=N\2
WEND
NUM=S
END FUNCTION
Questions:
a)      List the local variable used in the function procedure.
The local variable used in the function procedure is: R,S,P.

b)      What will be the output if the program?







14.   a. Write a program that asks a user to input radius of a sphere and then it calls aSub procedure to display area of the sphere where Area=4πr2 using Sub        Procedure.
                                                                        3
DECLARE SUB AREA(R)
CLS
INPUT ”Enter radius”; R
CALL AREA(R)
END

SUB AREA(R)
A=4*3.14*R^2
PRINT “The area of Sphere”; A
END

b.Write a program to declare a user define function to check whether input     String is palindrome or not.            3

DECLARE FUNCTION CHECK$(S$)
CLS
INPUT “Enter any word”; S$
P$=CHECK$(S$)
IF P$=S$ THEN
PRINT ”The string is palindrome”
ELSE
PRINT ”The string is not  palindrome”

END

FUNCTION CHECK$(S$)
FOR I = LEN(S$) TO 1 STEP -1
B$=MID$(S$,I,1)
W$=W$+B$
NEXT I
CHECK$=W$
END FUNCTION
                                   
c. A data file named “Staff.dat” contains staff name, Department, Post and Salary of some staffs. Write a program to count and display total number of records    in a file.                                                                 3

OPEN “STAFF.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$,D$,P$,S
C=C+1
WEND
PRINT “Total Number of Records=”;C
CLOSE #1
END

Comments

Popular posts from this blog

PROGRAM TO FIND SQUARE, CUBE, SQUARE ROOT AND CUBE ROOT OF GIVEN NUMBER

PROGRAM TO DISPLAY SUM, PRODUCT, DIFFERENCE AND PRODUCT OF TWO / THREE NUMBERS

PALINDROME AND ARMSTRONG PROGRAMS