KATHMANDU PABSON QUALIFYING EXAMINATION 2069 [SLC COMPUTER SOLVED]
PABSON
SLC Qualifying Examination - 069
Sub: Computer Science (Opt II) F.M.: 50
Time: 1:30 Hrs P.M.: 20
Candidates are required to give their answers in their own words as far as practicable credit shall be given to creativity not for rote learning.
Group A (Computer Fundamentals - 22 Marks)
1. Answer the following questions. 5 x 2=10
a) What is a network protocol? List some of the popular network protocol.
Ans: Network Protocol is the sets of rules that the computers on the network must follow to make communication possible.
Some of the popular Network Protocol are:
i. TCP/IP
ii. HTTP
iii. FTP
iv. SMTP
b) What is intranet? How is it different than internet?
Intranet is a private computer network that uses the internet protocol to securely share any part of information of an organization.
Internet is worldwide interconnection of all smart communication devices whereas Intranet is a privately owned part of internet.
c) What is software piracy?
Software Piracy is an unauthorized copying, reproduction, use, or manufacture of software products.
d) What is meant by defragmentation?
The Process of rewriting parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval is called defragmentation.
e) List any four characteristics of computer virus?
i. Virus is a self-replicating computer program.
ii. It increases the use of disk spaces and grow in file size.
iii. It slows down the performance of computer system.
iv. It corrupts the system data.
1. a) Perform the following Binary calculations. 2
i) 101011 + (110110 –11101)
3. Match the following. 4 x 0.5=2
a) Antivirus Internet protocol
b) Infrared transmission Network adopter
c) Apple Talk Transmission media
d) NIC McAfee
Disk Killer
Answer:
a) Antivirus McAfee
b) Infrared transmission Transmission media
c) Apple Talk Internet protocol
d) NIC Network adapter
4. Write the technical terms of the following statements. 2
a) Physical layout of network.
Network Topology
b) It can be used to authenticate the identity of the sender or the signer of a document.
Digital Signature
c) It is a protocol which helps in bypassing the phone calls using computer.
VOIP(Voice over Internet Protocol)
d) A set of moral principal that regulate the use of computers.
Protocols
5. Write the full form of 4 x 0.5=2
a) GPRS=General Packet Radio Service
b) IRC= Internet Relay Chat
c) ADSL= Asymmetric Digital Subscriber Line
d) DNS= Domain Name System
6. Choose the appropriate option: 4 x 0.5=2
a) A program originally developed to allow users to view document on the WWW.
i) Telnet ii) website
iii) Web browser iv) web page
Web browser
b) …………..is used to scan your hard disk for errors caused by improper shutdown, viruses, etc.?
i) Password policy ii) defragmentation
iii) Scan disk iv) backup system
Scan disk
c) Cyber Law of Nepal was enacted in Nepal in………………B.S.
i) 2062 ii) 2000
iii) 2061 iv) 2068
2061
d) The computer virus is created using……………
i) Application program ii) Computer language
iii) Utility program iv) None of the above
Computer Language
Group B (MS-Access – 10 Marks)
7. Answer the following question. 3 x 2=6
a) What is database? Name any two DBMS software.
Database is a collection of related and organized information that can be used for different purpose. The two DBMS Software are:
i. Ms- Access
ii. ORACLE
b) What is data sorting? Write the difference between sorting and filtering?
Data sorting means grouping all the records in a table either in ascending or descending order based on a key field of the record.
Sorting Means Grouping the records in ascending or descending order whereas filtering means extracting specific record.
.
c) What is report? Give its importance.
Report is an object of database which displays the output in an effective way to present the data in a printed format.
The importance of report are:
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
8. State whether the given statement are true or false. 4 x 0.5=2
a) A query cannot be the source for a form. False
b) Primary key field may contain the same value in two records. False
c) A field cannot be declared without data type. True
d) The extension of MS-Access database file is .MDB. True
9. Match the following 4 x 0.5=2
Group A Group B
MS-Access Data type
Primary Key Data base
Report DBMS
Hyperlink Unique identification of record
Object of Access
Answers:
Group A Group B
MS-Access DBMS
Primary Key Unique identification of record
Report Object of Access
Hyperlink Data type
Group C (Programming – 18 Marks)
10. Answer the following questions in short. 3
a) What is user defined function?
The function which is defined by the user according to the need is known as user-defined function.
e) What is C language?
C language is a structure programming language that divides a program into many functions.
f) Write down the function of CHDIR and NAME command.
CHDIR=It allows qbasic to change from one directory to another.
NAME=The NAME statement renames a file on a diskette. Only file name changes, data and program
11. Write down the output of the following programs: 2
DECLARE FUNCTION TEST(N)
CLS
FOR J=3 TO 9 STEP 2
X= TEST(J)
PRINT X
NEXT J
END
FUNCTION TEST(N)
TEST= (N^2)+2
END FUNCTION
12. Re-write the given program after correcting the bugs: 2
REM to display a word by extracting characters of even position
CLS
DECLARE SUB NAME$(X$,Y$)
INPUT”ENTER A WORD”;X$
CALL SUB NAME$(X$,Y$)
PRINT Y$
END
SUB WORD$(X$,Y$)
FOR P=1 TO LEN (X$) STEP 2
E$=LEFT$(X$,1,P)
WORD$=E$+WORD$
NEXT P
Y$=WORD$
END SUB
Answer:
REM to display a word by extracting characters of even position
CLS
DECLARE SUB WORD(X$,Y$)
INPUT”ENTER A WORD”;X$
CALL WORD(X$,Y$)
PRINT Y$
END
SUB WORD (X$,Y$)
FOR P=1 TO LEN (X$) STEP 2
E$=MID$(X$,P,1)
W$=E$+W$
NEXT P
Y$=W$
END SUB
13. Read the following program given below and answer the question. 2
DECLARE FUNCTION NUM(N)
CLS
N=14
PRINT NUM(N)
END
FUNCTION NUM(N)
WHILE N<>0
R=N MOD 2
S=S+R*10^P
P=P+1
N=N\2
WEND
NUM=S
END FUNCTION
Questions:
a) List the local variable used in the function procedure.
b) What will be the output if the program?
14. a. Write a program that asks a user to input radius of a sphere and then it calls aSub procedure to display area of the sphere where Area=4πr2 using Sub Procedure.
3
DECLARE SUB AREA(R)
CLS
INPUT ”Enter radius”; R
CALL AREA(R)
END
SUB AREA(R)
A=4*3.14*R^2
PRINT “The area of Sphere”; A
END
b.Write a program to declare a user define function to check whether input String is palindrome or not. 3
DECLARE FUNCTION CHECK$(S$)
CLS
INPUT “Enter any word”; S$
P$=CHECK$(S$)
IF P$=S$ THEN
PRINT ”The string is palindrome”
ELSE
PRINT ”The string is not palindrome”
END
FUNCTION CHECK$(S$)
FOR I = LEN(S$) TO 1 STEP -1
B$=MID$(S$,I,1)
W$=W$+B$
NEXT I
CHECK$=W$
END FUNCTION
c. A data file named “Staff.dat” contains staff name, Department, Post and Salary of some staffs. Write a program to count and display total number of records in a file. 3
OPEN “STAFF.DAT” FOR INPUT AS #1
CLS
WHILE NOT EOF(1)
INPUT #1, N$,D$,P$,S
C=C+1
WEND
PRINT “Total Number of Records=”;C
CLOSE #1
END
Comments