Soluction of 10 sets

Group A

1. Answer the following questions in one sentence: [6 x 1 = 6]

a. What is search engine?

Search Engine is a web-based software (website) designed to search information from server.

b. What is the business done through the Internet?

The business done through the Internet is known as online business and e-commerce

c. Which data type is used to store numeric characters or special symbols in MS-Access?

Number data type is used to store numeric characters or special symbols in MS-Access.

d. Which view is used to modify a table in MS-Access?

Design view is used to modify a table in MS-Access.

e. What is Modular Programming?

Modular programming is the process of subdividing a computer program into separate sub-programs.

f. Write any two features of C language.

Two features of C language are:
  i. Simple, Portable and easy to learn
  ii. Dynamic Memory Management
  iii. Modularity With Structured Language
  iv. Mid-Level Programming Language
  v. Case-sensitive etc.

2. Write appropriate technical term for the following: [1 + 1 = 2]

a. Law that governs the legal issues of cyberspace.

Cyber Law

b. The smallest unit to represent information on quantum computer.

Quantum bit (qubit)

3. Write the full form of the following: [1 + 1 = 2]

(i) STP: Spanning Tree Protocol

(ii) WAP: Wireless Application Protocol

Group B

4. Answer the following questions: [9 x 2 = 18]

(a) What is computer network? Enlist any two advantages of it.

Computer Network is the connection of different computing devices for sharing resources (hardware, software, information).
Advantages of computer network are:
  (i) Saves our time and money
  (ii) Makes communication faster, cheaper and reliable.

(b) What is computer ethics? Write any two of them.

Computer ethics are a set of moral principles, procedures, values and practices that regulate the use of computers.
Some Commandments off computer ethics are;
  (i) We should not use computer to harm other people
  (ii) We should not use computer to steal information and to bear false witness

(c) What is software security? Write any two measures of hardware security.

Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software function correctly under such potential risks.
Protecting physical assets from outside threats is known as hardware security.
Two measures of hardware security are:
  (i) never keep the hardware in the contact with fire and water.
  (ii) cover the hardware to protect from dust
  (iii) plugged off the system during thunder storm
  (iv) properly switch off the system after use etc.

(d) What is m-Commerce? Write its two important services.

M-commerce (mobile commerce) is the buying and selling of goods and services through wireless handheld devices such as smartphones and tablets.
Two important services of m-commerce:
  (i) Finance and payments
  (ii) Marketing
  (iii) Entertainment and games
  (iv) Healthcare

(e) What is IoT? Write any two importance of it.

The Internet of things (IoT) refers to physical objects with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks.
Importance of IoT are;
  (i) Connectivity
  (ii) Scalability and Security
  (iii) Dynamic nature
  (iv) Artificial intelligence etc.

(f) What is Database? Give any two examples.

A database is a systematic collection of data or a data structure that stores data organized information. They are: MySQL, Microsoft Access, Server, Filemaker, Oracle, RDBMS,

(g) What is primary key? List any two advantages of it.

A primary key (keyword) is a column or a set of columns in a table (relational database) whose values uniquely identify a row in the table.
Advantages of Primary key are:
  (i) It uniquely identifies each row of a table and avoid duplication.
  (ii) It gets a unique index for faster access of data.

(h) What is data sorting? List any two advantages of using it.

Data sorting is the process of arranging data in ascending or descending order.
Advantages of Data sorting are:
  it helps arrange all records in order.
  it helps to handle huge list of items for better visualization, ease of analysis, save time.

(i) What types of work is done in MS-Access using Form and Query objects?

Form is an object in a database designed primarily for interface to input or display data or for control of application execution.
Query is an object that provides a custom view of data and set for searching, compiling and calculating data from one or more tables.

5. Write down the output of the given program. Show with dry run-in table. [2]

DECLARE SUB SHOW(A)
CLS
N=87
CALL SHOW(N)
END
SUB SHOW(A)
DO B= A MOD 6 + 3
IF B MOD 4 =0 THEN GOTO AA
PRINT B;
AA:
A = A - 10
LOOP WHILE A>=50
END SUB

6. Re-write the given program after correcting the bugs. [2]

REM to add record in an existing file

CLS
OPEN “Record.Dat” FOR OUTPUT AS #1
AA:
INPUT “Enter Name, Class and Roll”; Nm$, Cl, Rn
INPUT #2, Nm$, Cl, Rn
INPUT “More record Press y”, y$
IF UCASE$(y$) = “Y” THEN GOTO AA:
CLOSE “Record.Dat”
END

Corrected Program:

CLS
OPEN “Record.Dat” FOR APPEND AS #1
AA:
INPUT “Enter Name, Class and Roll”; Nm$, Cl, Rn
WRITE #1, Nm$, Cl, Rn
INPUT “More record Press y”, y$
IF UCASE$(y$) = “Y” THEN GOTO AA:
CLOSE #1
END

7. Study the following program and answer the given questions: [1+1]


OPEN "Detail.dat" FOR INPUT AS #1
OPEN "Temp.dat” FOR OUTPUT AS #2
INPUT "Enter name of the students "; Sn$
FOR I = 1 TO 10
INPUT #1, Nm$, Cl, A
IF Sn$ <> Nm$ THEN
WRITE #2, Nm$, CI, A
END IF
NEXT I
CLOSE #1, #2
KILL "Detail.dat"
NAME "Temp.dat” AS "Detail.dat"
END

(a) What is the main objective of the program given above?
The main objective of the program is to delete the record of user supplied name.

(b) Do you get any problem in the above program if “KILL” statement is removed? Give reason.
Yes, we get problem in renaming the “Temp.dat” file as “Detail.dat” file because existing file.

Group C

8. Convert / Calculate as per the instruction: [4 x 1 = 4]

9. (a) Write a program in QBASIC that asks length, breadth and height of room and calculates its area and volume. Create a user-defined function to calculate area and sub-program to calculate volume. [4]

REM program to calculate area and volume of a room.
DECLARE FUNCTION AREA(L,B)
DECLARE SUB VOLUME(L,B,H)
CLS
INPUT "Enter length, breadth and height of a room", L, B, H
PRINT "The area of a room is", AREA(L, B)
CALL VOLUME(L, B, H)
END
FUNCTION AREA (L, B)
   A = L * B
   AREA = A
END FUNCTION
SUB VOLUME (L, B, H)
  V = L * B * H
  PRINT "The volume of a room is", V
END SUB

9. (b) A sequential data file called “Record.txt” has stored data under the field heading Roll No., Name, Gender, English, Nepali, Maths and Computer. Write a program to display all the information of those students whose gender is ‘F’ and obtained marks in computer is more than 90.

REM “program to display all the information of those students whose gender is ‘F’ and obtained marks in computer is more than 90.”

OPEN "Record.txt" FOR INPUT AS #1
WHILE NOT EOF(1)
INPUT #1, RollNo, Name$, Gender$, English, Nepali, Maths, Computer
G$=MID$(Gender$,1,1)
IF UCASE$(G$) = "F" AND Computer > 90 THEN
 PRINT "Roll No.: "; RollNo
 PRINT "Name: "; Name$
 PRINT "Gender: "; Gender$
 PRINT "English: "; English
 PRINT "Nepali: "; Nepali
 PRINT "Maths: "; Maths
 PRINT "Computer: "; Computer
END IF
WEND
CLOSE #1

10. Write a program in C Language that asks a number and check whether it is odd or even.[4]

/* C Program that asks a number and check whether it is odd or even*/
#include <stdio.h>
int main()
{
  int num;
  printf("Enter a number: ");
  scanf("%d", &num);
  if (num % 2 == 0)
    {
     printf("The number is even.\n");
    }
  else
   {
    printf("The number is odd.\n");
   }
  return 0;
}

10. OR Write a program in ‘C’ language to display the series with their sum , 1,2,3,4,………,up to 10Th terms.

/* C program to display the series with their sum , 1,2,3,4,………,up to 10Th terms */
#include <stdio.h>
int main()
{
  int b;
  int sum = 0;
  for (b = 1; b <= 10; b++)
  {
   printf("%d \t", b);
   sum +=b;
 }
  printf("\n Sum: %d\n", sum);
  return 0;
}

Group A

1. Answer the following questions in one sentence: [6 x 1 = 6]

a. Write the name of two search engines.

Search Engine are: google.com, bing.com, yahoo.com etc.

b. What is Social medial?

Social media is an internet-based form of communication or platform that allows users to have conversations, share information, ideas, interests and create web content.

c. Which data type is suitable to store photographs of students in MS-Access?

OLE Object data type is used to store photographs of students in MS-Access.

d. Which view is used to modify a table in MS-Access?

Design view is used to modify a table in MS-Access.

e. Which statement is used to call sub-procedure?

CALL statement is used to call sub-procedure in QBASIC.

f. Write any two data types used in C language.

Two data types used in C language are: ii)
  i. Integer data int a;
  ii. float data float a;

2. Write appropriate technical term for the following: [1 + 1 = 2]

a. A system of copying data and information residing in computer into another location.

Back up

b. A company which provides services of Internet.

ISP (Internet Service Provider)

3. Write the full form of the following: [1 + 1 = 2]

(i) FTP: File Transfer Protocol

(ii) MAN: Metropolitan Area Network

Group B

4. Answer the following questions: [9 x 2 = 18]

(a) What is computer network? Write any two advantages of it.

Computer Network is the connection of different computing devices for sharing resources (hardware, software, information).
Advantages of computer network are:
  (i) Saves our time and money
  (ii) Makes communication faster, cheaper and reliable.

(b) What is computer ethics? Write any two of them.

Computer ethics are a set of moral principles, procedures, values and practices that regulate the use of computers.
Some Commandments off computer ethics are;
  (i) We should not use computer to harm other people
  (ii) We should not use computer to steal information and to bear false witness

(c) What is software security? Write any two measures of hardware security.

Software security is an idea implemented to protect software against malicious attack and other hacker risks so that the software function correctly under such potential risks.
Protecting physical assets from outside threats is known as hardware security.
Two measures of hardware security are:
  (i) never keep the hardware in the contact with fire and water.
  (ii) cover the hardware to protect from dust
  (iii) plugged off the system during thunder storm
  (iv) properly switch off the system after use etc.

(d) What is search engine? Write any two popular search engines.

Search Engine is a web-based software (website) designed to search information from server. The two popular search engines are: google.com, bing.com etc.

(e) What is e-Commerce? Write two benefits of it.

E-commerce (electronic commerce) is the buying and selling of goods and services, or the transmitting of funds or data, over an electronic network and the internet.
Two benefits of e-commerce:
  (i) Faster buying process.
  (ii) Affordable advertising and marketing

(f) Write any two advantages and disadvantages of social media.

Advantages of social media are:
  (i) Good Source of Up-to-Date Information.
  (ii) Use of Social Media for Promotion and Advertising
Disadvantages of social media are:
 (i) Fake News.
 (ii) Hacking and Cyberbullying on Social Media

(g) What is DBMS? Write any two advantages of it.

Database Management System (DBMS) is software to create and manage databases, allowing users to create, read, update and delete data in a database.
Two advantages of DBMS are:
  i. Improved data sharing and data security.
  ii. Effective data integration.
  iii. Increased productivity.
  iv. Better decision-making

(h) What is primary key? Write any two features of it.

A primary key (keyword) is a column or a set of columns in a table (relational database) whose values uniquely identify a row in the table.
Features of Primary key are:
  i. A primary key column cannot accept null values.
  ii. A primary key uniquely identifies each field.

(i) Defines Field and Record.

Field: is the heading of the column on the table of database which stores a particular category of data. Each field gives particular type of data of data of an entity. Record: refers to the row on a table of database which consists of the related data of a person or thing.

(j) Define Form. Write any two uses of form in MS-Access.

Form is an object in a database designed for interface to input, display, edit, data or for control of application execution.
Two uses of form in MS-Access are:
  (a) Form is used to create a user interface for database.
  (b) Form is used for data entry and select report.

5. Write down the output of the given program. Show with dry run-in table. [2]

DECLARE SUB ABC(A)
 CLS
 A = 2
 CALL ABC(A)
END
SUB ABC(A)
 FOR J = A TO 5
   PRINT A;
   A = A + 3
 NEXT J
END SUB

6. Re-write the given program after correcting the bugs. [2]

REM to add record in an existing file

DECLARE SUB Series()
 CLS
 EXECUTE Series
END
SUB Series()
REM program to generate 1 1 2 3 5 …… up to 20th terms.
 A=1
 B=1
 FOR ctr = 10 TO 1
  DISPLAY A;B;
  A= A+B
  B= A+B
 NEXT ctr
END Series()

Corrected Program:

DECLARE SUB Series()
 CLS
 CALL Series
END
SUB Series()
REM program to generate 1 1 2 3 5 …… up to 20th terms.
 A=1
 B=1
 FOR ctr = 1 TO 10
   PRINT A;B;
   A= A+B
   B= A+B
 NEXT ctr
END SUB

7. Study the following program and answer the given questions: [1+1]


DECLARE FUNCTION TEST(X)
  X = 100
  Z= TEST(X)
  PRINT Z
END
FUNCTION TEST(X)
 FOR R = 1 TO X
  S=S+1
 NEXT R
 TEST = S
END FUNCTION

(a) How many parameters are used in the above program?
Here, only one parameter is used as both first as Formal and again as Actual parameter that is X.

(b) How many times does the statement S=S+1 execute in the above program?
The statement S=S+1 executes 100 times in the above program.

Group C

8. Convert / Calculate as per the instruction: [4 x 1 = 4]

9. (a) Write a program in QBASIC that asks length and breadth of a room and calculates its area and perimeter. Create a user-defined function to calculate area and sub-program to calculate perimeter.[4]

REM program to calculate area and perimeter of a room.
DECLARE FUNCTION AREA(L,B)
DECLARE SUB PERIMETER(L,B,H)
CLS
INPUT "Enter length and breadth of a room", L, B
PRINT "The area of a room is", AREA(L, B)
CALL PERIMETER(L, B)
END
FUNCTION AREA (L, B)
   A = L * B
   AREA = A
END FUNCTION
SUB PERIMETER (L, B)
  P=2 * (L + B)
  PRINT "The volume of a room is", P
END SUB

9. (b) Write a QB program to create a sequential data file “Salary.dat” to store programmer’s name, salary and post according to the need of user.

REM “QB program to create a sequential data file “Salary.dat” to store programmer’s name, salary and post according to the need of user.”

OPEN "Salary.dat" FOR OUTPUT AS #1
 TOP:
 INPUT "Enter Programmer's Name, Salary, Post",N$,Sal,p$
 WRITE #1, N$,Sal,p$
 INPUT"For next record press (Y)",y$
 IF UCASE$(y$)="Y" THEN GOTO TOP
CLOSE #1

10. Write a program in C Language that asks a number and check whether it is negative, positive or zero.[4]

/* C program that asks a number and check whether it is negative, positive or zero.*/
 #include <stdio.h>
 int main() {
  int num;
  printf("Enter a number: ");
  scanf("%d", &num);
  // Check the sign of the number
  if (num < 0)
  {
    printf("The number is negative.\n");
  }
  else if (num > 0)
  {
   printf("The number is positive.\n");
  }
   else
  {
   printf("The number is zero.\n");
  }
  return 0;
 }

10. OR Write a program in ‘C’ language to display first 10 odd numbers.

/* C program to display first 10 odd numbers.*/
#include <stdio.h>
int main()
{
  int b,odd=1;
  for (b = 1; b <= 10; b++)
  {
   printf("%d \t", odd);
   odd=odd + 2;
 }
}

PABSON BORAD EXAMINATION 2078 SET A

Group A

1. Answer the following questions in one sentence: [6 x 1 = 6]

a. Define Bandwidth.

Bandwidth is the measure of the amount of data that can be transmitted over a network connection in a given amount of time.

b. What is cyber bullying?

Cyberbullying is the use of digital technologies, such as the internet, social media, and mobile phones, to intentionally and repeatedly harm or harass others.

c. What is AI?

Artificial intelligence (AI) is the ability of a computer or machine to perform tasks that normally require human intelligence, such as learning, problem-solving, and decision-making.

d. What is the storage size of memo and text data type in MS-Access?

In Microsoft Access, the Memo data type is used to store large amounts of text or binary data, up to approximately 2 GB. The Text data type is similar to the Memo data type, but it is limited to 255 characters or approximately 510KB of storage space.

e. What is local variable?

A local variable is a variable that is defined and used within a specific block of code, such as a function or a loop.

f. What is an operator in C language?

An operator in the C is a special symbol that represents a specific operation on one or more values (operands). E.g. + - / * etc.

2. Write appropriate technical term for the following: [1 + 1 = 2]

(a) Secret group of characters which helps to protect file from unauthorized person.

PASSWORD

(b) A type of network in which every computer works as both client and server.

PEER-TO-PEER NETWORK

3. Write the full form of the following: [1 + 1 = 2]

(i) ADSL: Asymmetric Digital Subscriber Line

(ii) TCP/IP: Transmission Control Protocol/Internet Protocol

Group B

4. Answer the following questions: [9 x 2 = 18]

(a) Differentiate between LAN and WAN.

LAN (Local Area Network) is a network within a small geographic area. It is faster and secure than WAN.
WAN (Wide Area Network) is a network connected over a larger geographic area. It is slower and less secure than LAN.

(b) Write any four commandments of computer ethics.

Four commandments of computer ethics
  i. We should not use a computer to harm other people.
  ii. We should not interfere with other people's computer work.
  iii. We should not snoop around in other people's computer files.
  iv. We should not use a computer to steal.

(c) What is E-commerce? List any two E-commerce companies in Nepal.

E-commerce, or electronic commerce, is the buying and selling of goods and services over the internet. Daraz and Sastodeal are two e-commerce companies in Nepal.

(d) What are the advantages of cloud computing?

The advantages of cloud computing:
  i. Cost saving
  ii. Shareable
  iii. Flexibility
  iv. Security

(e) What is VR? Mention its application areas.

Virtual reality (VR) is a technology that allows users to interact with and experience simulated environments and scenarios in a way that feels real.
There are several application areas for VR, including:
  i. Entertainment
  ii. Education
  iii. Architecture and design
  iv. Healthcare etc.

(f) What is DBMS? Give any two examples.

A database management system (DBMS) is a software application that is used to create, manage, and interact with databases. Examples: MS-Access, MySQL etc.

(g) What is Primary key? List any two advantages.

(h) A primary key is a field in a database table that is used to uniquely identify each record and cannot contain null values in the table.
Advantages of Primary key are:
  i. Data integrity
  ii. Data relationships
  iii. Data organization etc.

(h) What is query?

A query is a request for information or data from a database. It is an essential tool for accessing and manipulating data in a database.

(i) What is data sorting? Write its two advantages.

Data sorting is the process of organizing data in a specific order based on one or more criteria.
Advantages of data sorting are:
  i. Easy to organize data
  ii. Easy to analyze data
  iii. Data cleaning etc.

5. Write down the output of the given program. Show with dry run-in table. [2]

DECLARE SUB DISPLAY(A)
 CLS
 A=3
 CALL DISPLAY(A)
END
SUB DISPLAY(A)
  FOR X = 1 TO 6
   PRINT A;
   IF A MOD 2 =0 THEN
    A = A / 2
   ELSE
    A = (A*3)+1
   END IF
  NEXT X
END SUB

6. Re-write the given program after correcting the bugs. [2]

REM to add more data in a sequential data file
OPEN “EMP.DAT” FOR INPUT AS #2
 DO
    INPUT “ENTER NAME”; N$
    INPUT “ENTER ADDRESS”; A$
    INPUT “ENTER SALARY”; S$
    WRITE #1, N$, A$, S
    INPUT “Do you want to add more record”; M$
 LOOP WHILE UCASE(M$)= “Y”
END

Corrected Program:

OPEN "EMP.DAT" FOR APPEND AS #2
DO
  INPUT "ENTER NAME"; N$
  INPUT "ENTER ADDRESS"; A$
  INPUT "ENTER SALARY"; S
  WRITE #2, N$, A$, S
  INPUT "DO YOU WANT TO ADD MORE RECORD"; M$
LOOP WHILE UCASE$(M$) = "Y"
END

7. Study the following program and answer the given questions: [1+1]

DECLARE FUNCTION text$(A$)
 CLS
 INPUT “ENTER ANY WORD”; T$
 PRINT text$(T$)
END
FUNCTION text$(A$)
 FOR M = LEN(A$) TO 1 STEP -1
  C$=C$+MID$(A$,M,1)
 NEXT M
 text$ = C$
END FUNCTION

(a) List the formal and actual parameters used in the program given above.
Formal parameters: A$
Actual parameters:T$

(b) List the library function used in the above program.
The library function used are: LEN(), MID$() and FOR LOOP functions.

Group C

8. Convert / Calculate as per the instruction: [4 x 1 = 4]

9. (a) Write a program in QBASIC that asks length, breadth and height of room and calculates its area and volume. Create a user-defined function to calculate area and sub-program to calculate volume. [4]

REM program to calculate area of a circle and volume of a cylinder.
DECLARE FUNCTION AREA()
DECLARE SUB VOLUME()
  CLS
  AR= AREA
  PRINT "The area of a Cylinder is", AR
  CALL VOLUME
END
FUNCTION AREA ()
  Input "enter radius of a circle", R
  A = 22 / 7 * R * R
  AREA = A
END FUNCTION
SUB VOLUME ()
  Input "Enter radius and height of a cylinder", R, H
  V = 22 / 7 * R * R * H
  PRINT "The volume of a room is", V
END SUB

10. A sequential data file “EMP.dat” contains employee’s name, address, gender and salary. WAP to display all the information of employees whose salary is more than Rs 20,000.

REM “program to display all the information of employees whose salary is more than Rs 20,000”
OPEN "Record.txt" FOR INPUT AS #1
WHILE NOT EOF(1)
  INPUT #1, Name$, Address$, Gender$, Salary
  IF Salary > 20000 THEN
   PRINT "Name: "; Name$
   PRINT "Address: "; Address$
   PRINT "Gender: "; Gender$
   PRINT "Salary: "; Salary
  END IF
WEND
CLOSE #1

11. Write a program in C Language to input any two numbers and find greater number.

/* C program to input any two numbers and find greater number */
  #include <stdio.h>
  int main()
   {
    int a, b;
    printf(“Enter any two number”);
    scanf(“%d, %d”, &a, &b);
    if( a > b) {
      printf(“ %d is the greater number”, a);
    }
    else {
      printf(“ %d is the greater number”, b);
    }
   }

11. OR Write a program in C Language that asks a number and check whether it is odd or even.

/* C Program that asks a number and check whether it is odd or even*/
  #include <stdio.h>
  int main()
   {
    int num;
    printf("Enter a number: ");
    scanf("%d", &num);
    if (num % 2 == 0)
    {
      printf("The number is even.\n");
    }
    else
    {
      printf("The number is odd.\n");
    }
    return 0;
   }

PABSON BORAD EXAMINATION 2078 SET B

Group A

1. Answer the following questions in one sentence: [6 x 1 = 6]

(a) What is an e-mail?

An email (electronic mail) is a type of electronic communication tool that allows individuals to send and receive messages, documents, and other types of digital content over the internet.

(b) What is cyber law?

Cyber law is a term used to describe the laws, regulations, and legal principles that apply to the use of the internet, computers, and other digital technologies. OR Cyber law encompasses a wide range of legal issues related to online activities, including issues related to privacy, intellectual property, online contracts, e-commerce, and cybercrime.

(c) What is the field size of Yes/No field?

In most database management systems, the field size of a Yes/No field is typically 1 byte, which is equivalent to 8 bits.

(d) Write any objects of MS-Access.

The objects of MS-Access are: Table, Forms, Queries, Study.

(e) What is module?

In the context of programming, a module is a self-contained piece of code that performs a specific function or set of functions. It can be thought of as a small, standalone program that performs a specific task and can be used in a larger program.

(f) Write any two data types of C language.

Two data types of C language are:
  i) Integer: int
  ii) Float: float

2. Write appropriate technical term for the following: [1 + 1 = 2]

(a) Business through Internet.

E-BUSINESS/ ONLINE BUSINESS/ (E-COMMERCE)

(b) A type of network in which every computer works as both client and server.

PEER-TO-PEER NETWORK

(c) A collective online communications channels dedicated to community-based input, interaction, content-sharing and collaboration.

SOCIAL MEDIA, SOCIAL NETWORKING SITE

(d) The smallest unit to represent information on quantum computer.

QUANTUM BIT

3. Write the full form of the following: [1 + 1 = 2]

(i) B2B: Business to Business

(ii) C2C: Consumer to Consumer

(ii) G2G: Government to Government

(ii) FTP: File Transfer Protocol

(ii) ICT: Information and Communication Technology

Group B

4. Answer the following questions: [9 x 2 = 18]

(a) Write any two advantages and disadvantages of computer network.

Advantages of computer networks:
  i) Increase productivity
  ii) Saves time and money
  iii) Sharing resources
  iv) Faster, cheaper and reliable communication etc.

Disadvantages of computer networks:
  i) Security risks
  ii) Cost
  iii) Complexity etc.

(b) What is digital footprint? Write any two tips to maintain digital reputation.

A digital footprint is the trail of information that is left behind when a person uses the internet or other digital technologies.
Here are two tips for maintaining a positive digital reputation:
  i) Protect your personal information
  ii) Be mindful of what you post online

(c) (c) What is password policy? Write any two important criteria for creating strong password.

A password policy is a set of rules and guidelines that outline how passwords should be created, used, and managed in an organization.
The two important criteria for creating strong passwords are:
  1. Length or ideally longer:
  2. Complexity:

(d) What is e-commerce? Write any two advantages of e-commerce.

E-commerce (electronic commerce) refers to the buying and selling of goods and services over the internet.
The two advantages of e-commerce:
  i) Saves Time and money
  ii) Convenience etc.

(e) What is IoT? Write any two advantages of it.

The Internet of Things (IoT) refers to the network of physical devices, vehicles, buildings, and other objects that are equipped with sensors, software, and other technologies to enable to connect and exchange data systems over the internet.
The two advantages of IoT are:
  i) Improve efficiency
  ii) Increase convenience

(f) What is DBMS? Give any two examples.

A database management system (DBMS) is a software application that is used to create, manage, and interact with databases. Examples: MS-Access, MySQL etc.

(g) What is MS-Access? Write any two advantages of it.

Microsoft Access is a database management system (DBMS) that is designed to create and manage databases, to create forms, reports, and other types of documents based on the data stored in the databases.
The two advantages of Microsoft Access:
 i) Easy to use
 ii) Flexibility to create database, queries, manipulation etc.

(h) What is query? Write its type.

A query is a request for information or data from a database based on certain criteria or conditions.
There are several types of queries that can be used to retrieve and manipulate data in a database including:
  i) Select queries
  ii) Action queries
  iii) Append queries
  iv) Parameter queries
  v) Crosstab queries
  vi) Union queries etc.

(i) What is data type? Write some data types of MS-Access.

A data type is a classification of data based on the type of values it can hold and the operations that can be performed on it.
In Microsoft Access, the following data types are available:
  i) Text
  ii) Number
  iii) Date /Time
  iv) Yes/No
  v) Memo
  vi) OLE Object etc.

Most Important and Probable SET

Group A

1. Answer the following questions in one sentence: [6 x 1 = 6]

(a) Write down any two Network Communication Protocols.

The two Network Communication Protocols are:
1. TCP (Transmission Control Protocol)
2. UDP (User Datagram Protocol)

(b) How is virus removed from computer system?

Some methods for removing viruses from a computer system are:
1. Use antivirus software
2. Use a malware removal tool

(c) Name any two examples of M-Commerce.

Two examples of m-commerce (mobile commerce) are:
1. Mobile banking/ Mobile payment:
2. Online shopping

(d) What is the storage size of memo and text data type in MS-Access?

In Microsoft Access, the storage size of the Memo data type is up to 1 gigabyte (GB) per field where text data type has up to 255 characters.

(e) What do you mean by local variable?

A local variable is a variable that is declared and used within a specific block of code, such as within a function or loop and accessible from outside of that block.

(f) What is an operator in C language?

In the C programming language, an operator is special symbol that performs a specific operation on one or more operands.

2. Write appropriate technical term for the following: [1 + 1 = 2]

(a) Business through Internet

E-COMMERCE

(b) The smallest unit to represent information on quantum computer

QUANTUM BIT, OR QUBIT

3. Write the full form of the following: [1 + 1 = 2]

(i) G2G : Government to Government

(ii) FTP : File Transfer Protocol

Group B

4. Answer the following questions: [9 x 2 = 18]

(a) Define Network. And write down its any two disadvantages.

A computer network is a group of computers and other devices that are connected together to share resources and exchange information.
Disadvantages of computer networks:
i) Security risks
ii) Cost
iii) Complexity etc.

(b) What does Security threat mean? Write its any four types.

A security threat is a potential danger or vulnerability that could compromise the security of a system or network.
Four common types of security threats are:
1. Phishing
2. Ransomware
3. Malware
4. Denial of serve (DoS) attacks

(c) Define Artificial Intelligence with examples.

Artificial intelligence (AI) refers to the development and use of computer systems that are able to perform tasks that normally require human intelligence, such as learning, problem-solving, decision-making, and communication. Examples: Image and Facial recognition, Voice recognition, Natural language processing etc.

(d) Differentiate between Server and Workstation.

A server is a computer that is designed to provide services to other computers or devices on a network. Servers are typically more powerful than workstations.
A workstation is a computer that is designed for use by a single user and is typically used for tasks such as data analysis, video editing, or scientific simulations.

(e) What is Power Protection Device? What role does it play in the Computer Security?

A power protection device is a device that is used to protect electronic equipment, such as computers, from power surges, voltage spikes, and other power-related issues. E.g. surge protectors or uninterruptible power supplies (UPS).

(f) Define DBMS. Write any two examples of DBMS.

A database management system (DBMS) is a software application that is used to create, manage, and interact with databases. Examples: MS-Access, MySQL etc.

(g) What does MS-Access refer? Write down its any two advantages.

Microsoft Access (Access) is a database management system (DBMS) that is used to store, manage, and retrieve data in a database.
Two advantages:
i) it is easy to use and handle data
ii) Customizability

(h) Write down any two major differences between form and reports.

Forms are used to input, edit, and view data in a database, while reports are used to present and analyze data. Forms are often used to create a user-friendly interface for working with data, while reports are used to summarize and present data in a specific format, such as for printing or sharing with others.

(i) What is meant by field property? Write any two names of field property.

In a database management system, a field property is a characteristic or attribute of a field, which is a unit of data within a database.
Some field properties are:
1. Data type
2. Required

5. Write down the output of the given program. Show with dry run-in table. [2]

DECLARE SUB SERIES(N) CLS FOR I = 1 TO 5 READ N CALL SERIES (N) NEXT I DATA 125, 1000, 216, 8, 27 END SUB SERIES(N) PRINT N^1/3 + 1 END SUB

6. Re-write the given program after correcting the bugs. [2]

REM to check input string is Palindrome string or not.
DECLARE SUB CHECK(S$)
INPUT “Enter a string:::”, S$
CALL CHECK(W$)
END
SUB CHECK(S$)
FOR K = 1 TO LEN(S$)
A$ = MID$(N$, 1, K)
W$ = W$ + A$
NEXT K
IF UCASE$(W$) = UCASE$(S$)THEN
PRINT “Not Palindrome”
ELSE
PRINT “Palindrome”
END IF
SUB END

Corrected Program:

DECLARE SUB CHECK(S$)
INPUT “Enter a string:::”, S$
CALL CHECK(S$)
END
SUB CHECK(S$)
FOR K = 1 TO LEN(S$)
A$ = MID$(S$, K,1)
W$ = A$ + W$
NEXT K
IF UCASE$(W$) = UCASE$(S$) THEN
PRINT “Palindrome”
ELSE
PRINT “Not Palindrome”
END IF
SUB END

7. Study the following program and answer the given questions: [1+1]

DECLARE SUB result(m$)
m$ = “KATHMANDU”
END
SUB result(m$)
C = LEN(m$)
B = 1
WHILE B <= C
PRINT MID$(m$, B, 1)
B = B + 2
WEND
END SUB

What is missing in the above program?
CALL statement is missing in the above program.

(b) List out the numeric and string variable in the program above.

Numeric variables: B, C
String variables: m$

Group C

8. Convert / Calculate as per the instruction: [4 x 1 = 4]

9. (a) 9. Write a program in QBASIC that asks radius and height and calculate Volume of Cylinder and Volume of Cone. Create a USER DEFINED FUNCTION to calculate Volume of Cylinder and SUB-PROGRAM to calculate Volume of Cone. [hint: VOC=pi R2 and VOCN= 1/3piR2H] [4]

REM program to calculate VOLUME of a cylinder and volume of a cone.
DECLARE FUNCTION VOC()
DECLARE SUB VOCN()
CLS
V= VOC
PRINT "The VOLUME of a Cylinder is", V
CALL VOCN
END

FUNCTION VOC ()
Input "enter radius and height of a Cylinder", R,H
A = 22 / 7 * R * R *H
VOC = A
END FUNCTION

SUB VOCN ()
Input "Enter radius and height of a Cone", R, H
V = 1 / 3 * 22 / 7 * R * R * H
PRINT "The volume of a Cone is", V
END SUB

10. A10. A sequential data file “Record.txt” contains information such as Name, Address, gender and Date of Birth of some students. WAP to display all the information of students whose Age is above 10 and Address is “KATHMANDU”.

REM “program to display all the information of students whose age is more than Rs 10 and Address is “kathmandu”
OPEN "Record.txt" FOR INPUT AS #1
DO WHILE NOT EOF(1)
INPUT #1, name$, address$, gender$, dob$
age = 2022 - VAL(RIGHT$(dob$, 4))
IF age > 10 AND address$ = "KATHMANDU" THEN
PRINT "Name: "; name$
PRINT "Address: "; address$
PRINT "Gender: "; gender$
PRINT "Date of Birth: "; dob$
PRINT "Age: "; age
PRINT
END IF
LOOP
CLOSE #1

11. Write a program in C Language to display the series with their sum 3, 6, 9, 12 upto 10th terms.

/* C program to input any two numbers and find greater number */
  #include <stdio.h>
  int main()
   {
    int a=1, b=3;
  for(a=1;a<=10;a++){
    printf(“%d \t”, b);
    b = b + 3;
    }
   }

11. OR Write a program in C Language that asks a number and check whether it is odd or even.

/* C Program that asks a number and check whether it is odd or even*/
  #include <stdio.h>
  int main()
   {
    int num;
    printf("Enter a number: ");
    scanf("%d", &num);
    if (num % 2 == 0)
    {
      printf("The number is even.\n");
    }
    else
    {
      printf("The number is odd.\n");
    }
    return 0;
   }

Group A

1. Answer the following questions in one sentence: [6 x 1 = 6]

(a) What do you mean by bandwidth?

Bandwidth refers to the amount of data that can be transmitted over a communication channel in a given amount of time, typically measured in bits per second (bps).

(b) When was Cyber Law established in Nepal?

Cyber Law was established in Nepal with the passing of the Electronic Transactions Act (ETA) in December 2004 and implemented from 2005 AD.

(c) What is the storage size of Date and Time in MS-Access?

In MS-Access, the storage size for the Date/Time data type is 8 bytes.

(d) What is Primary key? List any two advantages.

A primary key is a field in a database table that is used to uniquely identify each record and cannot contain null values in the table.

(e) What is modular programming?

Modular programming is a software design technique that involves breaking a computer program down into smaller, self-contained modules or units.

(f) List out two data type used in C language.

The two data types used in C language are: integer and float.

Group B

4. Answer the following questions: [9 x 2 = 18]

(a) What do you mean by network topology? Write different types of network topology.

Network topology refers to the physical and logical layout (architecture) of a network. here are several different types of network topologies:
  i. Bus topology:
  ii. Star topology:
  iii. Ring topology:
  iv. Mesh topology:
  v. Hybrid Topology.

(b) What is digital citizenship? Write with example.

Digital citizenship refers to the responsible and appropriate use of technology and the internet. For example, a digital citizen would be aware of online safety risks, and take steps to protect themselves and their personal information. It includes online safety and security, responsible social media use, digital etiquette, and online privacy.

(c) What is computer security? What are the means of hardware security?

Computer security refers to the protection of computer systems, information and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. Means of hardware security includes Physical security measures such as locks, security cameras, access controls, BIOS (Basic Input/Output System) password, using firewalls, intrusion detection and prevention systems to protect against network-based attacks.

(d) What is E-Commerce? What are the types of e-commerce?

E-commerce (electronic commerce) refers to the buying and selling of products or services over the internet. The types of e-commerce are:
  i. Business-to-Consumer (B2C)
  ii. Consumer-to-Consumer (C2C)
  iii. Business-to-Business (B2B)
  iv. Consumer-to-Business (C2B)
  v. Mobile commerce (m-commerce)
  vi. Social commerce etc.

(e) What is e-governance? How does it help to the citizens?

E-governance refers to the use of information and communication technology (ICT) to improve the efficiency, transparency, and accountability of government services and processes. E-governance can help citizens by providing easy and quick access to government services and delivery, improving transparency and accountability, increasing participation etc.

(f) Define Database Management System with example.

A database management system (DBMS) is a software application that is used to create, manage, and interact with databases. Examples: MS-Access, MySQL etc.

(g) What is data sorting? How does it differ from filtering?

Data sorting is the process of arranging data in a specific order such as ascending or descending order. Sorting is mainly used to arrange the data in a particular order, while filtering is mainly used to extract a particular set of data based on some conditions.

(h) Name any four objects used in MS-Access.

MS-Access is a relational database management system that uses several objects to create and manage databases. The four main objects used in MS-Access are: Table, Queries, Forms, Reports.

(i) What is query? Write any two advantages of forms.

A query is a tool used to retrieve specific data from one or more tables in a database. It is used to filter, sort, and join data from multiple tables.
Two advantages of forms in MS-Access are:
  i. Makes data entry easy
  ii. Provides data validation etc

9. (a) Write a program in QBASIC that asks length, breadth and height. Create a user-defined function to calculate surface area of four walls and write sub-program to calculate surface area of a box.
[Hint: surface area of four walls:2H(L+B) and surface area of box = LH+BH+LB]

REM program to calculate surface area of four walls using FUNCTION and surface area of a box using SUB.
DECLARE FUNCTION sawalls(L,B,H)
DECLARE SUB sabox(L,B,H)
CLS
CALL sabox
SA= sawalls
PRINT "The surface area of four walls is", SA
END

FUNCTION sawalls ()
INPUT "Enter length, breadth and height of four walls a room", L, B, H
A = 2 * H * (L + B)
sawalls = A
END FUNCTION

SUB VOLUME (L, B, H)
INPUT "Enter length, breadth and height of a box", L, B, H
V = L * B + B * H + L * B
PRINT "The surface area of a box is", V
END SUB

9. b. A data file “Staff.dat” has stored records of few employees with EmpID, name, address, post and salary. Write a program to display all the records of the employee whose address is Butwal and salary is more than 40000.

REM “program to display all the records of the employee whose address is Butwal and salary is more than 40000”
OPEN "Staff.dat" FOR INPUT AS #1

WHILE NOT EOF(1)
INPUT #1, EmpId,name$, address$, post$, salary
IF UCASE$(address$) = "BUTWAL" AND salary>40000 THEN
PRINT "Name: "; name$
PRINT "Name: "; name$
PRINT "Address: "; address$
PRINT "Post: "; post$
PRINT "Salary: "; salary
PRINT
END IF
WEND

CLOSE #1

10. Write a program to print the numbers from 1 to 100 using while loop in C language.

/* C program to print the numbers from 1 to 100 using while loop */
#include
  int main()
  {
   int a;
   printf(“The numbers from 1 to 100”);
   a=1;
   while(a<=100)
  {
   printf(“%d\t”,a);
   a=a+1;
 }

10. OR Write a program in C language to input two integers and display the largest integer.

/* C Program that asks a number and display the largest integer*/
  #include <stdio.h>
  int main()
   {
    int a,b;
    printf("Enter any two numbers: ");
    scanf("%d, %d", &a, &b);
    if (a>b)
    {
      printf("%d is the greater number\n",a);
    }
    else
    {
      printf("%d is the greater number\n",b);
    }
    return 0;
   }

9. (a) Write a QBASIC program that asks radius and calculate area of a circle and circumference of circle. Create a USER DEFINED FUNCTION to calculate circumference of a circle and SUB-PROGRAM to calculate area of circle.

REM program to calculate area and circumference of a circle.
DECLARE FUNCTION Cir(R)
DECLARE SUB Area(R)
 CLS
 INPUT "enter radius of a circle", R
 PRINT "The circumference of a circle is", Cir(R)
 CALL Area(R)
END

FUNCTION Cir(R)
 A = 2*22 / 7 * R
 Cir(R) = A
END FUNCTION

SUB Area(R)
 AoC=22/7*R*R
 PRINT "The Area of a circle is",AoC
END SUB

9. b. A sequential data file “Person.txt” contains information such as Name, Address, and Date of Birth of 20 People. WAP to display only those records whose Age is below 18 and Address is “Lalitpur”.

REM “program to display all the information of students whose age is more than Rs 10 and Address is “Kathmandu”
OPEN "Person.txt" FOR INPUT AS #1

WHILE NOT EOF(1)
  INPUT #1, name$, address$, dob$
  age = 2023 - VAL(RIGHT$(dob$, 4))
  IF age <= 18 AND UCASE$(address$) = "LALITPUR" THEN
   PRINT "Name: "; name$
   PRINT "Address: "; address$
   PRINT "Date of Birth: "; dob$
   PRINT "Age: "; age
   PRINT
  END IF
WEND

CLOSE #1

10. Write a program in C language that asks a number check whether number is divisible by 5 and 7 or not.

/* C program to check whether input number is divisible by 5 and 7 or not.*/
#include
  int main()
  {
   int a, b;
   printf(“Enter a number”);
   scanf(“%d”, &a);
   if( a %5==0 && a%7==0) {
    printf(“ %d is divisible by 5 and 7”, a);
   }
   else if( a %5==0 && a%7!=0) {
    printf(“ %d is divisible by 5 not by 7”, a);
   }
   else if( a %5!=0 && a%7==0) {
    printf(“ %d is divisible by 7 not by 5”, a);
   }
   else {
    printf(“ %d is not divisible by 5 and 7”, a);
   }
 
  }

10. OR Write a program in C language to display the series with their sum 100, 95, 90, 85 ……. up to 10th term.

/* C program to display the series with their sum 100, 95, 90, 85 ……. up to 10th term */
#include
int main()
{
 int a=1, num=100;
 printf(“The number series are:\n”);
 for (a=1;a<=10;a++)
 {
  printf(“%d\t”,num);
  num=num – 5;
 }
}

Achievements

!

500+

Courses

25+

Awards

50,000+

Students