SOLVED National PABSAN COMPUTER SCIENCE SEE Pre-Board Examination-2081
GROUP 'A'
1. Answer the following questions:
a. What is transmission signal?
A transmission signal is a type of signal (like electrical, light, or radio waves) that carries information from one place to another.
b. What is logical threat in cyber field?
A logical threat in the cyber field refers to a type of threat that targets the software, data, or systems of a computer or network.
c. Which data type is suitable to store of student name in MS-Access?
In MS-Access, the Text data type is suitable for storing a student's name.
d. What is report?
Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing.
e. What is formal parameter?
Formal parameters are variables used in a function or procedure to receive values when the function is called.
f. Write down two header files use in C language.
The two header files use in C language are stdio.h and conio.h
2. Write appropriate technical term for the following:
a. The rule followed by computer in a network for communication. Protocol
b. Learning through internet. E-learning
3. Write the full form of the following:
a. MODEM - Modulator-Demodulator
b. W3C - World Wide Web Consortium
GROUP 'B'
4. Answer the following questions:
a. Write the difference between client/server and peer to peer network.
Client-Server Network | Peer to Peer Network |
In a client-server network, powerful computers called servers provide resources and services, while other computers, known as clients, access these resources and services. | In a peer-to-peer network, all computers have equal roles and can both provide and request resources without a centralized server. |
Security and data management are handled by the server. Network administrator manages and enforces security policies. | Security is managed individually on each peer. Each peer is responsible for its own security and data. |
b. What is computer UPS?
UPS is a battery supported power protection device which controls the electric voltage and supplies clean and continuous power to the computer system even during power failures.
c. What is cryptography?
Cryptography is the practice of using techniques to secure and protect information by converting it into a coded format ensuring that only authorized users can access or understand it.
d. What is e-commerce? Write down advantages of it.
E-commerce, or electronic commerce, refers to the buying and selling of goods and services over the internet.
Advantages of E-commerce
· Faster buying/selling procedure, as well as easy to find products.
· There are no geographical limitations, can deliver service globally.
e. What are the common models of e-commerce?
The common models of e-commerce are:
a) Business to Consumer (B2C):
The most common type of E-Commerce is Business-to-Consumer. B2C establishes the electronic business relationships between a business organization (merchant) and final consumers.
(e.g. We buy a pair of shoes from an online retailer)
Amazon. com is a good example of B2C e-commerce.
b) Business to Business (B2B):
Business-to-Business (B2B) e-commerce is conducted between companies. Individual customer cannot buy from this type of e-commerce. Producers and wholesalers typically operate with this type of electronic commerce.
(e.g. A business sells software-as-a-service for other businesses to use)
Alibaba.com is a good example of B2B e-commerce.
c) Consumer to Consumer (C2C):
Consumer-to-Consumer (C2C) type of e-commerce is conducted between consumers.
These transactions are conducted through a third party, which provides the online platform where the transactions are actually carried out.
(e.g. You sell your old furniture on hamrobazar to another consumer)
Hamrobazaar.com is a good example of C2C website in Nepal.
d) Consumer to Business (C2B):
When a consumer sells their own products or services to a business or organization
(e.g. An influencer offers exposure to their online audience in exchange for a fee, or a photographer licenses their photo for a business to use).
f. Write the difference between update query and select query.
Select Query | Update Query |
- A select query is the most common category which is used to extract specific information from one or more tables in a database. - The Select query is used to select data from a database. | - Update query is a type of action query which makes global changes to a group of records in one or more tables. - The Update query is used to update existing records in a table. |
g. What is sorting? Write down two advantages of it.
The process of arranging all the records in a table either ascending or descending order based on field or fields is known as sorting. Sorted data is easier to handle than unsorted data.
The advantages of sorting are:
· Sorting helps to organize data and make it easier to find and retrieve specific information.
· Sorting can save time and improve efficiency by allowing users to quickly access the data they need.
h. What is table? Which view use to create table?
Tables are the primary building block of database which stores and manages large volume of data into rows and column.
Design view is used to create table.
i. What is data type? Give examples.
Data type is an attribute for a field that determines the type of data that can be stored in that field.
Examples of data type are: text, memo, Date/Time, Yes/No etc.
5. Write down the output of the given program:
DECLARE SUB SERIES ( )
CALL SERIES
END
SUB SERIES
N$ = “*”
FOR 1 TO 5
FOR J=1 TO I
PRINT N$;
NEXT J
PRINT
NEXT I
END SUB
Dry Run Table
N$ | FOR 1 TO 5 | J=1 TO I | PRINT N$ |
* | 1 TO 5 Yes | 1 TO 1 Yes | * |
|
| 2 TO 1 No |
|
| 2 TO 5 Yes | 1 TO 2 Yes | * |
|
| 2 TO 2 Yes | ** |
|
| 3 TO 2 No |
|
| 3 TO 5 Yes | 1 TO 3 Yes | * |
|
| 2 TO 3 Yes | ** |
|
| 3 TO 3 Yes | *** |
|
| 4 TO 3 No |
|
| 4 TO 5 Yes | 1 TO 4 Yes | * |
|
| 2 TO 4 Yes | ** |
|
| 3 TO 4 Yes | *** |
|
| 4 TO 4 Yes | **** |
|
| 5 TO 4 No |
|
| 5 TO 5 Yes | 1 TO 5 Yes | * |
|
| 2 TO 5 Yes | ** |
|
| 3 TO 5 Yes | *** |
|
| 4 TO 5 Yes | **** |
|
| 5 TO 5 Yes | ***** |
|
| 6 TO 5 No |
|
| 6 TO 5 No Loop Exits |
|
|
The output of the Program is:
*
**
***
****
*****
6. Re-write the given program after correcting the bugs:
DECLARE FUNCTION SQ$ (N)
CLS
FOR I=1 TO 10
DISPLAY SQ (N)
NEXT N
END
FUNCTION SQ (N)
SQ=N^2
END FUNNCTION
Debugged Program
DECLARE FUNCTION SQ (N)
CLS
FOR N=1 TO 10
PRINT SQ (N)
NEXT N
END
FUNCTION SQ (N)
SQ=N^2
END FUNCTION
7. Study the following program and answer the given questions: 2x1=2
DIM N (10)
DECLARE SUB MIN (N ( ))
CLS
FOR I=1 TO 10
INPUT "ENTER A NUMBER"; N (I)
NEXT I
CALL MIN (N ( ))
END
SUB MIN (N ())
S=N (1)
FOR 1=2 TO 10
IF SN > N(I) THEN S=N (I)
NEXT I
PRINT "THE SMALLEST NUMBER=”;S
END SUB
a. Which is array variable in above program?
The array variable in above program is N.
b. Which is control statement in above program?
The control statement in the program are:
· FOR...NEXT loop
· IF...THEN statement
Convert/Calculate as per the instruction:
a. (165)10 = (?)2
Divide by the base 2 to get the digits from the remainders:
Division | Quotient | Remainder (Digit) |
(165)/2 | 82 | 1 |
(82)/2 | 41 | 0 |
(41)/2 | 20 | 1 |
(20)/2 | 10 | 0 |
(10)/2 | 5 | 0 |
(5)/2 | 2 | 1 |
(2)/2 | 1 | 0 |
(1)/2 | 0 | 1 |
= (10100101)2
(165)10 = (10100101)2
b. (101111)2=(?)8
Convert every 3 binary digits (from bit0) to octal digit:
101111
5= 101
7 =111
= 5 7
(101111)2=(57)8
с. (101001) x (101)
|
| 1 | 0 | 1 | 0 | 0 | 1 |
|
|
|
| x | 1 | 0 | 1 |
|
| 1 | 0 | 1 | 0 | 0 | 1 |
| 0 | 0 | 0 | 0 | 0 | 0 | x |
1 | 0 | 1 | 0 | 0 | 1 | x | x |
1 | 1 | 0 | 0 | 1 | 1 | 0 | 1 |
(101001) x (101) = (11001101)
d. (1101110) / (1101)
1101) | 1 | 1 | 0 | 1 | 1 | 1 | 0 | (1000 |
| 1 | 1 | 0 | 1 |
|
|
|
|
| 0 | 0 | 0 | 0 | 1 | 1 | 0 |
|
|
|
|
|
|
|
| 0 |
|
|
|
|
|
| 1 | 1 | 0 |
|
|
|
|
|
|
|
|
|
|
Q=1000
R=110
9. Answer the following questions:
a. Write a program in QBASIC that asks length in meter then display length in centimeter by using FUNCTION. END FUNCTION and length in millimeter by using SUB.. END SUB.
[Hint 1 meter = 100 Centimeters 1 meter= 1000 Millimeters]
DECLARE FUNCTION MTC(M)
DECLARE SUB MTM(M)
CLS
INPUT "Enter Length in meter: "; M
PRINT "Length in centimeter: "; MTC(M)
CALL MTM(M)
END
FUNCTION MTC(M)
CM = M * 100
MTC = CM
END FUNCTION
SUB MTM(M)
MM = M * 1000
PRINT "Length in millimeter : "; MM
END SUB
b. Write a program to read records from file name "Rec.dat" and display all the records those post is manager. File contains field names are employees Name, Post, Date of birth, e-mail address and Salary.
OPEN “Rec.dat” FOR INPUT AS #1
CLS
PRINT “Name”, “Post”, “Date of Birth”, “E-Mail”, “Salary”
WHILE NOT EOF(1)
INPUT #1, N$, P$, D$, E$, S
IF UCASE$(P$) = “MANAGER” THEN PRINT N$, P$, D$, E$, S
WEND
CLSOE #1
END
10. Write a program in C-language that ask length, breadth and height then display volume of box. 4
[Hint: volume=LxBxH]
#include <stdio.h>
int main( )
{
float length, breadth, height, volume;
printf("Enter the length of the box: ");
scanf("%f", &length);
printf("Enter the breadth of the box: ");
scanf("%f", &breadth);
printf("Enter the height of the box: ");
scanf("%f", &height);
volume = length * breadth * height;
printf("The volume of the box is: %.2f\n", volume);
return 0;
}
Or
Write a program in C-language to display the series 5, 10, 15, 20, 25 up to 10th term.
#include <stdio.h>
int main( )
{
int i, term;
for (i = 1; i <= 10; i++) {
term = 5 * i;
printf("%d ", term);
}
printf("\n");
return 0;
}
0 Comments:
Post a Comment
Subscribe to Post Comments [Atom]
<< Home