Saturday, October 21, 2017

SLC Examination 2071

Dashain homework on computer

1) Answer the following question

a) Give two- two differentiate between peer-to-peer and client server network architecture
->
   *   Peer-to-peer network :-

  •              It is a group of computer which function both as server and workstation to store data, information and resources of the network
  • it locks centralized network administration
* Client server network:-

  • It consists at least one server and one more client or workstation where users do their work
  • it provides central security administaration
b) What is the function of file transfer protocol?
-> FTP is a tool of internet that allows the users transfer the file from one computer to another.
it helps to upload and download the files.

c)What is cyber crime? Give any two example?
-> Criminal activities carried out by the means of computers or the internet. Any two example of it are:-

  1. Cyber extortion
  2. Cyber terrorism
d)Write any four preventive measures for computer hardware security?
-> Any four preventive measure for computer security are:-

  1. Power protection device.
  2. Insurance
  3. Suitable environment

e) Write any two medium for transmission of computer virus.
-> 
  • Floppy disks
  • downloading internet files
2a) Converting as instructed

i) (108)10 into binary 
->   
  2/108    R
2/54        0
2/27        0
2/13        1
2/6          1
2/3          0
    1         1
(108)10=(1101100)2


ii) (765)8 into decimal
-> =7* 64+6*8+5*1
=448+48+5
=(501)

b)Perform the binary calculation
i) 111*11              ii) 1101/11
-> 111                   ->                                       
     *11                     11)1101  ( 100
     111                         -11↓
   111X                           X0
  10101                             0
                                          X               Q=100, R=1


5) Give an appropriate technical terms.

a) The data carrying capacity of communication channel
-> Bandwidth

b) The moral principal that controls cyber crime.
-> Cyber ethics

c) Buying and selling products and services online.
-> E-commerece

d) An integration of text, audio, graphics and video.
-> Multimedia

6) Write full form of

a) LAN= Local Area Network
b) VOIP= Voice Over Internet Protocol
c) Gbps= Gigabytes per second
d) DVD= Digital Versatile Disk

7) question and answer

a) Write any two advantage of computerized database?
->Any two advantages of computerized database are:-

  • It provides flexible way to enter, edit and operate on data.
  • Sorting can be done in many different ways.
b) Name any four objects of MS-access database?
-> Object of MS-Access are:-

  • Form
  • Query
  • Table
  • Report

c) What is data sorting?
->Data sorting refers to the arrangement of data according to the desired property. It allows users to easily manage the data


8) State whether the following statement are true or false.

a) Graphics can also be stored in MS-Access database. (True)
b) Maximum field sizes of memo fields is 256 characters. (False)
c) A form is a object of MS-Access used for entering data.(True)  
d) An action query makes changes in table.(True)


9) Match the following

Indexing data→ Searching fast
Report           →final output
Yes/ No         →Data type
Select query →View data


11) Rewrite the given program after correcting the bug.
-> DECLARE SUB     CUBE(No)
CLS
FOR I= 1 TO 5
READ No 
CALL CUBE (No)
NEXT I
DATA 3, 5, 2, 6, 4
END
SUB CUBE(No)
DISPLAY N^3
END SUB

12)Write the output of the following program.

DECLARE FUNCTION AVGE(A, B, C)
X=10
Y=5
Z=12
PRINT" AVERAGE OF THREE NUMBER";AV
END
FUNCTION AVGE(A,B,C)
S=A+B+C
AVGE=S/3
END FUNCTION

O/P
-> AVERAGE OF THREE NUMBER 10


Study the following program
DECLARE SUB STDE(N$U)
FOR Loop = 1 TO 5
READ NM$ (loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL STDE(NM$U)
END
SUB STDE(N$U)
Print"Name starting from P"
FOR J = 1 TO 5
C$= MID$(N$,(J), 1,,1)
IF C$="P" THEN
PRINT N$(J)
END IF
NEXT J
END SUB

a) list the library function used on the above program.
->MID$ is used in the program as library function.

b) List the conditional statement used in the above program.
-> if condition is used in the above program as conditional statement.

14a)

DECLARE FUNCTION CON(A$)
CLS
INPUT" ENTER STRING"; A$
PRINT" TOTAL NUMBER OF CONSONANTS"; CON(A$)
END

FUNCTION CON(A$)
FOR I = 1 TO LEN(A$)
B$= UCASE$(MID$(A$,I,1))
IF B$<>"A"AND B$<>"E"AND B$<>"I"AND B$<>"O"AND B$<>"U" THEN CON=CON+1
NEXT I
END FUNCTION

b)
->DECLARE SUB AREA(R)
CLS
INPUT "ENTER RADIUS"; R
CALL AREA(R)
END
SUB AREA(R)
A=22/7*R^2
PRINT" AREA OF CIRCLE=";A
END SUB


c)

-> OPEN " Salary. Dat" FOR INPUT AS #1
CLS
PRINT"NAME", "POST";"SALARY"
 INPUT #1,N$,P$,S
IF S> 15000 AND S<4000 THEN PRINT N$,P$,S
WEND
CLOSE #1
END


No comments:

Post a Comment

SLC Examination 2073

1 Q/Ans a) -> The advantage of bus topology:- It is easy to set up computers and other devices  It requires power cable media, ...