SLC COMPUTER 2064 SOLVED
SLC Question-2064
Group A
Computer Fundamentals (20 marks)
Group A
Computer Fundamentals (20 marks)
1. Answer the following questions: [10]
a) Define LAN topology. Draw star topology.Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as LAN topology.
Figure of star topology:
b) What is multimedia? Name any two field where multimedia is used.
Ans: Multimedia is the integration of multiple forms of media, which presents information in more interesting and understandable way.
Any two field where multimedia is used are:
i) Movies
ii) Advertisement
c) Give the importance of modem in the computer network.
Ans: The importance of MODEM in the computer network is that it performs the modulation and demodulation function. Modulation is the process of converting computer generated digital data into analog signals so that they can be transmitted through telephone lines. Demodulation is the process of converting analog signal from telephone lines into digital data so that the computer can do further processing. It connects a computer with network through telephone lines.
d) Write any two ways of protecting computer hardware.
Ans: Some of the hardware security measures are:
i) Insurance Policy
ii) Power Regulator Device
e) What is virus? Name any two types of computer virus.
i) Insurance Policy
ii) Power Regulator Device
e) What is virus? Name any two types of computer virus.
Ans: Computer virus is a program written by the programmer with the intention of destroying and damaging the data and programs residing in the computer system.
The types of viruses are:
i) Boot sector virus
ii) File infector virus
The types of viruses are:
i) Boot sector virus
ii) File infector virus
2. Fill in the blanks: [2]
a) _________ means two-way communication system.
Full Duplex mode
b) ____ is the process of transferring data files from a network location to the user’s computer.
Downloading
c) Government of Nepal introduced the cyber law in the year _______ B.S.
2061 B.S.
d) _________ are used to detect and remove computer virus from infected file or memory.
Anti virus Software
3. Select the best possible alternative: [2]
a) Which refers to the communication media?
i. UTP cable ii. Fiber optic cable iii. Radio wave iv. All
i. UTP cable ii. Fiber optic cable iii. Radio wave iv. All
All of above
b) Which is Network operating system(NOS)?
i. Linux ii. Windows XP iii. MS-DOS iv. All
Linux
c) Which is the internet service?
i. Telnet ii. POP iii. Both iv. None
i. Telnet ii. POP iii. Both iv. None
Telnet
d) Which is not a virus?
i. Worm ii. Logic bomb iii. Trojan Horse iv. Win-zip
Win-zip
4. Write the full form of the following: [2]
a) WAN = Wide Area Network
b) Bits = Binary Digits
c) NIC = Network Interface Card
d) CD-ROM = Compact Disk – Read Only Memory
5. Give the appropriate technical term for the following: [2]
a) Secret word that gives a user access to a particular program or system
Password
b) A device used at end user’s computer in a network which converts digital signal into analog and vice-versa
MODEM
c) The law that governs the legal issue of cyberspace
Cyber Law
d) A character (such as asterisk or question mark) that stands for any other character, or series of any character
Wild card characters
6. Match the following. [2]
Group A Group B
a) Radio Wave Device to connect network having different technology
b) Cyber ethics power protection device
c) Spike guard internet
d) Gateway professionally guided principles
Wireless media
Answers
Group A Group B
a) Radio Wave Wireless media
b) Cyber ethics professionally guided principles
c) Spike guard power protection device
d) Gateway Device to connect network having different technology
Group B
Database (10 marks)
7. Answer the following questions: [6]
a) Define data and database.
Ans: Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense. Database is a collection of related and organized information that can be used for different purpose.
b) Name any four data types that can be defined in MS-ACCESS.
Ans: Any four data types of MS-Access are:
i)Text
ii)Number
iii)Memo
iv)Currency
i)Text
ii)Number
iii)Memo
iv)Currency
c) What is a form? Give its importance.
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
The importance of form are as follows:
a. It helps to display data in more presentable form than a datasheet can.
b. It provides an interactive platform for input of data into the database.
8. Choose the correct answer: [2]
a) The logical data type of MS-ACCESS is
i. Yes/ NO ii. On/Off iii. True/False iv. All
Yes/No
b) Which is the example of database?
i. dBASE ii. MS-ACESS iii. Telephone directory iv. All
Telephone directory
c) Primary key does not accept
i. Text ii. Number iii. Null value iv. None
Null value
d) Which component of MS-ACCESS does not allow entering data?
i. Table ii. Query iii. Form iv. None of them
Query
9. State whether true or false. [2]
a) MODEMS are not needed in wireless network communication.
False
b) HUB provides power backup in the event of power cut on the network system.
False
c) System infectors usually enter to the system as a device driver and get loaded into memory.
True
d) Sound card captures movies or pictures from the external devices.
False
Group C
QBasic Programming (20 marks)
10. a) Define procedure in modular programming. [1]
Ans: Procedure is a block of statement that solves a particular problem
b) Differentiate SUB procedure and FUNCTION procedure. [1]
Ans: The difference between SUB procedure and FUNCTION procedure is
SUB-procedure
|
FUNCTION-procedure
|
SUB-procedure does not return value.
|
FUNCTION-procedure must return a value.
|
c) Write the function of NAME and FILES in Q-BASIC. [1]
Ans: The NAME statement renames a file on a diskette.
The FILES statement displays the files of the current sub directory or specified sub directory.
11. Rewrite the given program correcting the bugs: [2]
DECLARE SUB Series()
CLS
EXECUTE Series
END
SUB Series()
REM program to generate 3 3 4 9 15 upto 20th terms.
A=3
B=3
FOR ctr= 10 to 1
DISPLAY A;B;
A=A+B
B=A+B
NEXT ctr
END Series()
Debugged Program
DECLARE SUB Series ( )
CLS
CALL Series
END
SUB Series ( )
REM program to generate 3 3 4 9 15 upto 20th terms.
A=3
B=3
FOR ctr= 10 to 1 step-1
PRINT A;B;
A=A+B
B=A+B
NEXT ctr
END SUB
12. Write the output of the following program. [2]
DECLARE FUNCTION AREA (A,B)
CLS
LET A = 30
LET B=40
LET D= AREA(A,B)
PRIND D
END
FUNCTION AREA(A,B)
PRINT A,B
AREA=A*B
END FUNCTION
13. Study the following program and answer the given questions. [2]
DECLARE FUNCTION CELLS$(W$)
W$=”CYBER”
PRINT CELL$(W$)
END
FUNCTION CELL$(W$)
K=LEN(W$)
FOR I = K TO 1 STEP -2
M$=M$+MID$(W$,I,1)
NEXT I
CELLS$=M$
END FUNCTION
a) Why is $(dollar) sign followed in the function name?
Ans: $(dollar) sign is followed in the function name because the function returns string value.
b) What will be the output of the program when it is executed?
Ans: The output of the program when it is executed will be
c) What will be the output of the program when FOR loop is changed as FOR I= 1 TO K STEP 2?
Ans: The output of the program when FOR loop is changed as FOR I= 1 TO K STEP 2 will be
Ans: The name of sign “+” used in the program is string operator. It is used to concatenate the strings.
12. a) Write a program in QBASIC to find the area of four wall of a room using FUNCTION…..END FUNCTION. [3]
DECLARE FUNCTION AREA (L, B, H)
CLS
INPUT “ENTER LENGTH”; L
INPUT “ENTER BREADTH”; B
INPUT “ENTER HEIGHT”; H
PRINT “AREA OF FOUR WALLS”; AREA (L, B, H)
END
FUNCTION AREA(L, B, H)
A = 2 * H * (L + B)
AREA = A
END FUNCTION
b) Write a program in QBASIC to display the following series using SUB…. END SUB or FUNCTION….END FUNCTION. 5 55 555 ….. up to 6th terms [3]
DECLARE SUB SERIES ( )
CLS
CALL SERIES
END
SUB SERIES ( )
A = 5
FOR I = 1 TO 6
PRINT A;
A=A*10+5
NEXT I
END SUB
d) Write a program in QBASIC to open a sequential data file “EMP.DAT”, which contains employees records: Name, address and phone number and display all the records as well as total number of records stored in the file. [3]
OPEN “EMP.DAT” FOR INPUT AS #1
CLS
PRINT “NAME”, “ADDRESS”, “PHONE NUMBER”
C=0
WHILE NOT EOF(1)
INPUT #1, N$, A$, P#
PRINT N$, A$, P#
C=C+1
WEND
PRINT “TOTAL NUMBER OF RECORDS”; C
CLOSE #1
END
Comments