Monday, October 23, 2017

SLC Examination 2073




1 Q/Ans

a)
-> The advantage of bus topology:-

  • It is easy to set up computers and other devices 
  • It requires power cable media, so it is cheaper than other topology.


b)
-> The security given to the computer for the protection of hardware, software and data from being lost or damage due to accidental or intentional harm is known as computer security.

c)
-> The preventive measures from computer virus are:-

  • Install antivirus software 
  • Avoid using pirated software.
d)
-> Multimedia is the integration of multiple form of media which present information in more interesting and understandable way.

e)
->FTP is a protocol  used in internet to send and receive file from one computer to another. It is also used for uploading and downloading files in internet.


2a) Perform the conversion as per the direction.

i) (BAD)16 into binary
Hexadecimal value= BAD
Binary equivalent=1011 1010 1101
(BAD)16 = (101110101101)2


b) Perform the binary calculation.

   i) 11*10+11
-> 11
   *10
     00
   11X
   110
   +11
  1001


    ii) 110/10                                                           
        ->                 
              10)110  (11
                  -10 ↓
                   10
                  -10                                                                 
                     X


3). Match the following
a)Malicious software       →Virus
b)Primary storage device →RAM
c)Power protection device→UPS
d)Intellectual property law→Copyright



4 State true or false
a) Computer network reduces the cost.(true)
b) WWW is an organization which controls internet.(false)
c) Microwave transmission is an example of bounded media.(false)
d) The part of the computer which can be seen and touched is called hardware.(true)


5) Give appropriate technical term

a) A type of network in which every computer works as both client and server.
=> Peer-to-peer network

b) Protocol used to receive e-mail from the mail server.
=> POP

c) The moving graphic image
=> Animation

d) The law that controls cyber crime.
=> Cyber Law

6) Write the full form
LAN= Local Area Network
ROM= Read Only Memory
SMPT= Simple Mail Transfer Protocol
NOS= Network Operating System

7) Answer the following question

a)
-> Data are the raw pieces of content which may or may not make any sense.
-> Database is a collection of related  information on a subject which is used for various useful propose.

b)
-> Primary Key is a field that uniquely identifies the record. It is important to reduce data redurdancy and blank value.

c)
-> the data types used in MS-Access are:-

  • text
  • number
  • MEMO
  • currency
8) Select the correct answer.

a) The columns in a database table are called
-> field

b) Which is the suitable data types to store video.
-> Report

d) Which is not a type of query.
-> Search


9) Match the following.

Query→ extracts selected records for view
Form →Allows view, edit, input, data
table→Stores data
Report →Printed format


11)

-> DECLARE SUB SUM(N)
INPUT" ANY NUMBER"; N
CALL SUM(N)
END

SUB SUM(N)
S=0
WHILE N<> O
R= MOD 10
S= S+R
N= N\10
WEND
PRINT " SUM OF DIGITS"; S
END SUB

12) write the output of the following program

DECLARE FUNCTION ARE(L,B)
CLS
LET L=50
LET B= 10
LET ANS= AREA(L,B)
PRINT" THE AREA="; ANS
END

FUNCTION AREA(L,B)
AR= L*B
AREA= AR
END FUNCTION

13) Study the following program ad answer the given question.
-> DECLARE FUNCTION DIFF(A,B)
CLS
INPUT" ENTER FIRST NUMBER"; A
INPUT" ENTER SECOND NUMBER";B
PRINT" THE DIFFERENCE"; DIFF(A,B)
END
FUNCTION DIFF(A,B)
DIFFERENCE= A-B
DIFF= DIFFERNCE
END FUNCTION


14a)
-> DECLARE SUB AREA(H,L,B)
CLS
INPUT"ENTER HEIGHT"; H
INPUT" ENTER BREADTH"; B
INPUT" ENTER LENGTH"; L
CALL AREA (H,L,B)
END

SUB AREA(H,L,B)
A= 2*H* (L+B)
PRINT" THE AREA OF FOUR WALLS=";A
END SUB


b)


-> DECLARE FUNCTION COUNT(A$)
CLS
INPUT" ENTER STRING"; A$
PRINT " TOTAL VOWELS LETTER="; COUNT(A$)
END

FUNCTION COUNT(A$)
FOR I = 1 TO LEN(A$)
B$= UCASE$(MID$(A$,I,1))
IF B$<>"A"OR B$<>"E"OR B$<>"I"OR B$<>"O"OR B$<>"U" THEN C=C+1
NEXT I
COUNT=C
\END FUNCTION

C)
-> OPEN " RECORD. DAT" FOR OUTPUT AS#1
CLS
TOP
INPUT" ENTER NAME"; N$
INPUT" ENTER ADDRESS"; A$
INPUT" ENTER POST"; P$
INPUT" ENTER  GENDER"; G$
INPUT" ENTER SALARY"; S
WRITE #1, A$, B$, P$, G$,S
INPUT" DO YOU WANT TO CONTINUE?(Y?N)"; CH$
IF UCASE(CH$) ="Y" THEN GOTO TOP
CLOSE#1
END

Saturday, October 21, 2017

SLC Examination 2071

Dashain homework on computer

1) Answer the following question

a) Give two- two differentiate between peer-to-peer and client server network architecture
->
   *   Peer-to-peer network :-

  •              It is a group of computer which function both as server and workstation to store data, information and resources of the network
  • it locks centralized network administration
* Client server network:-

  • It consists at least one server and one more client or workstation where users do their work
  • it provides central security administaration
b) What is the function of file transfer protocol?
-> FTP is a tool of internet that allows the users transfer the file from one computer to another.
it helps to upload and download the files.

c)What is cyber crime? Give any two example?
-> Criminal activities carried out by the means of computers or the internet. Any two example of it are:-

  1. Cyber extortion
  2. Cyber terrorism
d)Write any four preventive measures for computer hardware security?
-> Any four preventive measure for computer security are:-

  1. Power protection device.
  2. Insurance
  3. Suitable environment

e) Write any two medium for transmission of computer virus.
-> 
  • Floppy disks
  • downloading internet files
2a) Converting as instructed

i) (108)10 into binary 
->   
  2/108    R
2/54        0
2/27        0
2/13        1
2/6          1
2/3          0
    1         1
(108)10=(1101100)2


ii) (765)8 into decimal
-> =7* 64+6*8+5*1
=448+48+5
=(501)

b)Perform the binary calculation
i) 111*11              ii) 1101/11
-> 111                   ->                                       
     *11                     11)1101  ( 100
     111                         -11↓
   111X                           X0
  10101                             0
                                          X               Q=100, R=1


5) Give an appropriate technical terms.

a) The data carrying capacity of communication channel
-> Bandwidth

b) The moral principal that controls cyber crime.
-> Cyber ethics

c) Buying and selling products and services online.
-> E-commerece

d) An integration of text, audio, graphics and video.
-> Multimedia

6) Write full form of

a) LAN= Local Area Network
b) VOIP= Voice Over Internet Protocol
c) Gbps= Gigabytes per second
d) DVD= Digital Versatile Disk

7) question and answer

a) Write any two advantage of computerized database?
->Any two advantages of computerized database are:-

  • It provides flexible way to enter, edit and operate on data.
  • Sorting can be done in many different ways.
b) Name any four objects of MS-access database?
-> Object of MS-Access are:-

  • Form
  • Query
  • Table
  • Report

c) What is data sorting?
->Data sorting refers to the arrangement of data according to the desired property. It allows users to easily manage the data


8) State whether the following statement are true or false.

a) Graphics can also be stored in MS-Access database. (True)
b) Maximum field sizes of memo fields is 256 characters. (False)
c) A form is a object of MS-Access used for entering data.(True)  
d) An action query makes changes in table.(True)


9) Match the following

Indexing data→ Searching fast
Report           →final output
Yes/ No         →Data type
Select query →View data


11) Rewrite the given program after correcting the bug.
-> DECLARE SUB     CUBE(No)
CLS
FOR I= 1 TO 5
READ No 
CALL CUBE (No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(No)
DISPLAY N^3
END SUB

12)Write the output of the following program.

DECLARE FUNCTION AVGE(A, B, C)
X=10
Y=5
Z=12
PRINT" AVERAGE OF THREE NUMBER";AV
END
FUNCTION AVGE(A,B,C)
S=A+B+C
AVGE=S/3
END FUNCTION

O/P
-> AVERAGE OF THREE NUMBER 10


Study the following program
DECLARE SUB STDE(N$U)
FOR Loop = 1 TO 5
READ NM$ (loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL STDE(NM$U)
END
SUB STDE(N$U)
Print"Name starting from P"
FOR J = 1 TO 5
C$= MID$(N$,(J), 1,,1)
IF C$="P" THEN
PRINT N$(J)
END IF
NEXT J
END SUB

a) list the library function used on the above program.
->MID$ is used in the program as library function.

b) List the conditional statement used in the above program.
-> if condition is used in the above program as conditional statement.

14a)

DECLARE FUNCTION CON(A$)
CLS
INPUT" ENTER STRING"; A$
PRINT" TOTAL NUMBER OF CONSONANTS"; CON(A$)
END

FUNCTION CON(A$)
FOR I = 1 TO LEN(A$)
B$= UCASE$(MID$(A$,I,1))
IF B$<>"A"AND B$<>"E"AND B$<>"I"AND B$<>"O"AND B$<>"U" THEN CON=CON+1
NEXT I
END FUNCTION

b)
->DECLARE SUB AREA(R)
CLS
INPUT "ENTER RADIUS"; R
CALL AREA(R)
END
SUB AREA(R)
A=22/7*R^2
PRINT" AREA OF CIRCLE=";A
END SUB


c)

-> OPEN " Salary. Dat" FOR INPUT AS #1
CLS
PRINT"NAME", "POST";"SALARY"
 INPUT #1,N$,P$,S
IF S> 15000 AND S<4000 THEN PRINT N$,P$,S
WEND
CLOSE #1
END


Tuesday, October 17, 2017

SLC examination 2070

Dashain homework on computer


Answer the following

a) What is network topology? Write any one advantage of star topology.
-> The arrangement or connection pattern of computer or modes and other devices of the network is called network topology.
The advantage is
       *it is easy to detect errors in star topology.

b) Give any two example of email over traditional mail.
-> Any two example of email over traditional mail are.
        * It is very fast compare to traditional mail.
        * It is allows to send and receive message across the world

c) List any two main aims of formulating cyber law in Nepal
-> * Provides punishment who conducts cyber crime.
   * Provide legal status for various baning transaction through electronic media, which will be instrumental in boasting economic activities throughout the world via Internet.

d) Give any two symptoms of virus attacks.
-> Two symptoms of virus attacks are;-
      * Programs takes long time to load.
      * Increased use of disk space and growth in the file size.

e) Give the important of UPS to the computer system.
-> Important of UPS in computer system are:-
     * It controls fluctuation of electric voltage.
     * Provides enough backup electric power to the computer system when there is power failure

2A) convert as instructed

 i)(BED)16 INTO BINARY
-> HEXADECIMAL VALUE= BED
   SEPARATED HEXADECIMAL= B     E     D   
   BINARY EQUIVALENT VALUE=1011  1110  1101
      or;(BED)16 = (101111101101)2

ii)(1010111)2 INTO OCTAL
-> BINARY VALUE= 101011
    SEPARATED BINARY VALUE= 001   010     111
    OCTAL VALUE=                              1        2        7
       or;(1010111)2=(127)8

B) Perform binary calculatiion

i) 10101 x 10
->     1 0 1 0
              x10
         0 0 0 0
      1 0 1  0  X
      1 0 1 0 0

ii) 1 0 1 0 1 / 1 1
 ->                          
       1 1   )  1 0 1 0 1 ( 1 1 1
                      1 1 ⇣
                       1 0 0
                           1 1⇣
                         0  1 1
                              1 1
                                X

3. Match the following

Combination media→ Multimedia         
POP                        → Protocol used in e-mail
UTP                        → Guided media
UPS                         →Power protection device


4) Choose the correct answer
 
a) Which of the following is an audio output device?
->Speaker

b)Which one is not a type virus
->

c)Which one is the bounded media
->

d which one is the operating system software?
->


5) Give  an appropriate technical term for the following

a) A program that can disinfect a file from virus
-> Antivirus program

b) A person who steals or destroys other's data, information and program .
-> Hacker

c) A company that provides internet service
-> ISP

d) A computer in a network which can provides services to other computer
-> Server

6) Write the full form of :-

i) TCP / IP = Transmission Control Protocol / Internet Protocol
ii) LAN= Local Area Network
iii) UPS= Ultra Power Supply
iv) FTP=  File Transfer Protocol


7) Answer the following question

a) Define data and information
-> Data can be number, letter or symbols representing facts and figures which may or may not give any sense.

-> Information is an organized collection of related data which gives a complete sense.

b) What is report? Give its importance ?
-> Reports is an object of MS- Access which display the output in an effective way to present the data in a printed format. Its important are:-

  i) It display the information the way we want to view
  ii) It present the information retrieved through queries or tables.

c) Name any four data types that can be defined in MS-Access
 ->

  • Text
  • Memo
  • Number
  • Currency


8) Choose the best answer

a) the column in a database table are called
-> Field

b) Which is the suitable data types to store videos
-> OLE

c) Text data types can store maximum of characters
-> 255

d) Which of the following is a database application.
-> MS-Access


9)Match the following

Indexing data→ Searching fast
Form             →Graphical interface for data entry
Field              →column on database
OLE object    →Size up to 1 GB

11) Rewrite the program after correcting the bug.
DECLARE SUB Series()                                         
CLS                                                                             
EXECUTIVE Series                                                     
END                                                                             
SUB Series
REM to generated 2 2 4 6 10 up to the 10th term
P=2
Q=2
For                        Ctr= 1 to 5
DISPLAY P,Q
P=P+Q
Q=P+Q
WEND
END Series( )

->DECLARE SUB Series( )
 CLS
CALL Series
END

SUB Series
REM to generated 2 2 4 6 10 up to the 10th term
P=2
Q=2
FOR                        Ctr= 1 to 5
PRINT P,Q
P=P+Q
Q=P+Q
NEXT  Ctr
END SUB

12) Write the output of the following program
-> DECLARE FUNCTION Area(L, B)
LET L= 10
LET B=5
PRINT "THE AREA="; Area(L, B)
A= L* B
Area = A
END FUNCTION

=> O/P
      THE AREA=50

13) Study the following program and answer the given question
 DECLARE FUNCTION SUM(A,B)
INPUT" ENTER FIRST NUMBER";A
INPUT" ENTER SECOND NUMBER";B
PRINT " THE SUM OF THE TWO NUMBER="; SUM(A,B)
END
FUNCTION SUM(A,B)
\S=A+B
SUM=S
END FUNCTION

a) List the numerical variable used in the above program.
-> A, B and S are the numerical used in above program.

b) Will the program run if the first line (i.e Declare) is deleted?
-> Yes the program would run even if (i.e Declare) is deleted.


13 a)WAP using function end function to get temperature in Celsius from the user and then print the temperature in Fahrenheit.
-> DECLARE FUNCTION TEMP( C)
CLS
INPUT" ENTER CELSIUS VALUE";C
PRINT " FAHRENHEIT VALUE="; TEMP(C)
END
FUNCTION TEMP(C)
TEMP =9*C/5+32
END FUNCTION

b) WAP using SUB.. EN DSUB  to get a word from the user and then print its revers order.
->
  DECLARE SUB REV(A$)
CLS
INPUT" ENTER STRING"; A$
CALL REV(A$)\
END

END REV(A$)
FOR I LEN(A$) TO 1 STEP -1
B$= MID$(A$, I, 1)
R$= R$+ B$
NEXT I
PRINT" Reverse  string";R$
END SUB

c)A sequential data file called "Marks.dat" contain Name, English, Nepali, maths and Science fields. WAP  to display all the contents of that data file.
-> OPEN" Marks.dat" FOR INPUT AS #1
CLS
PRINT" NAME", " ENGLISH", "NEPALI", " MATH", "SCIENCE"
WHILE NOT EOF(1)
INPUT #1, N$, E, N, M, S
WEND
CLOSE #1
END






SLC Examination 2073

1 Q/Ans a) -> The advantage of bus topology:- It is easy to set up computers and other devices  It requires power cable media, ...