Group A – Computer Fundamental – 22 marks
1) Answer the following question in one sentence: [5×2=10]
a. What is computer network?
Ans: A computer network is a collection of interconnected devices that communicate and share resources.
b. What is Internet?
Ans: The Internet is a global network of interconnected computer networks that use standardized communication protocols to exchange data.
c. Write any four preventive measures to protect computer system from virus infection.
Ans: Four preventive measures to protect computer system from virus infection are:
- Install and regularly update antivirus software.
- Use a firewall to block unauthorized access.
- Avoid opening email attachments or links from unknown sources.
- Keep operating systems and software up to date with the latest patches.
d. Write any two software used in multimedia.
Ans: Two software used in multimedia are:
- Adobe Photoshop
- VLC Media Player
e. What is hardware security?
Ans: Hardware security involves protecting physical devices from theft, damage, and unauthorized access to ensure the safety and integrity of the data and systems they support.
2) a. Convert as instructed [2×1=2]
- (101)10 into Binary
Ans: (101)10 = (1100101)2
- (75)8 into Decimal
Ans: (75)8 = (61)10
b. Perform the binary calculation [2×1=2]
- (10101)2-(1011)2
10101
- 01011
-------
01010 => (1010)2
- (111)2 x(11)2
111
x 011
------
111 (111 x 1)
1110 (111 x 1, shift left)
------
10101 => (11011)2
3) Match the following [4×0.5=2]
T-connector Network
Bridge Power protection
CD-ROM Co-axial cable
Spike guard Multimedia component
Virus scanning
Ans:
Item | Match |
---|---|
T-connector | Co-axial cable |
Bridge | Network |
CD-ROM | Multimedia component |
Spike guard | Power protection |
4) Choose the correct answer [4×0.5=2]
a. Which is not a network topology?
- Star
- Ring
- Client server
- Bus
Ans: Client server
b. When was cyber law introduced in Nepal?
- 2061 BS
- 2062 BS
- 2007 BS
- 2016 BS
Ans: 2061 BS
c. Multimedia technology is used in …..
- Education
- Business
- HealthCare’s
- All of the above
Ans: All of the above
d. Boot sector virus infects …….
- System files
- Master bott record
- Application software
- Document file
Ans: Master bott record
5) Give appropriate technical terms of the following [4×0.5=2]
- Rules and format to accept and transfer data in computer network.
Ans: protocol
- Moral rules to be followed by computer and other professionals.
Ans: ethics
- Making extra copy of data and software.
Ans: backup
- A virus that corrupts system files of operating system.
Ans: boot sector virus
6) Write full form [4×0.5=2]
- WWW: World Wide Web
- MAN: Metropolitan Area Network
- OS: Operating System
- NIC: Network Interface Card
Group B – DBMS – 10 marks
7) Answer the following questions. [3×2=6]
1. What is DBMS? Write any two examples of DBMS software.
Ans: A Database Management System (DBMS) is software that allows for the creation, retrieval, update, and management of data in databases. Two examples of DBMS software are MySQL and Microsoft SQL Server.
2. List any four data types used in MS-access.
Ans: Four data types used in MS-Access are Text, Number, Date/Time, and Currency.
3. What is form? Write any two advantages of using form.
Ans: A form in a database context is a user-friendly interface for data entry and data modification.
Two advantages of using forms :
- They help ensure data accuracy
- Simplify data entry processes for users.
8) Select the correct answer [4×0.5=2]
a. Date/Time occupies …. Bytes of memory.
- 4
- 2
- 8
- 16
Ans: 8
b. The extension of database file in MS-Access is
- DBF
- DBM
- MDB
- DMB
Ans: MDB
c. The object of MS-access that is used to generate hard copy of records
- Query
- Table
- Form
- Report
Ans: Report
d. A ……. Key uniquely identifies a records.
- Primary
- Foreign
- Composite
- None
Ans: primary
9) Match the following [4×0.5=2]
Default value 255 character
Fox pro Column name
Text DBMS
Field Field properties
Ans:
Default value → Field properties
Fox pro → DBMS
Text → 255 character
Field → Column name
Search fast
Group C – QBASIC programming – 18 marks
10) Answer the following. [3×1=3]
1. What is modular programming?
Ans: Modular programming is a software design technique that emphasizes separating a program into distinct, independent modules that each handle a specific functionality.
2. Write any two advantages of structured programming?
Ans: Two advantages of structured programming are:
- It enhances code readability and maintainability by using clear, logical structures,
- It reduces complexity through the use of functions or procedures, making debugging and testing easier.
3. Write the function of following statements. FILES, KILL
Ans: The FILES statement is used to display a list of files in a directory, while the KILL statement is used to delete one or more files from a directory.
11) Debug the given program. [2]
Declare
REM *fibonacci series*
CALL SUB fibonacci
END
SUB fibonacci
a=1
b=1
FOR x=1 to 10
DISPLAY a;
a=a+b
b=a+b
END fibonacci
Ans:
DECLARE
REM *fibonacci series*
CALL SUB fibonacci
END
SUB fibonacci
a=1
b=1
FOR x=1 TO 10
DISPLAY a;
temp = a + b
a = b
b = temp
NEXT x
END SUB
12) Write the output of the following program. [2]
DECLARE SUB series ( )
CALL series
END
SUB series
X=1
Y=1
FOR z=1 to 4
PRINT x;
Y=Y+1
X=X*10+Y
NEXT z
END SUB
Ans: The output of the program will be:
1
12
123
1234
13) Read the given program and answer the given question. [2]
DECLARE FUNCTION num (n)
INPUT n
S = num (n)
PRINT s
END
FUNCTION num (n)
x=INT(17/n)
y=15 MOD n
Num = x+y
END FUNCTION
a. Write the names of the function used in the above program.
Ans: The program defines and uses a single user-defined function.
- The name of this function is
num
.
b. List out the mathematical function (library) used in the above program.
Ans: The program uses the following mathematical functions from the standard library:
INT
function: This function is used to get the integer part of a division.MOD
operator: This operator is used to get the remainder of a division.
14) a) Write a program using FUNCTION module to calculate and print the volume of cylinder.[v=pir2h] [3]
Ans:
#include <stdio.h>
float calculateVolume(float radius, float height) {
const float pi = 3.14159;
return pi * radius * radius * height;
}
int main() {
float radius, height, volume;
printf("Enter the radius of the cylinder: ");
scanf("%f", &radius);
printf("Enter the height of the cylinder: ");
scanf("%f", &height);
volume = calculateVolume(radius, height);
printf("Volume of the cylinder: %.2f\n", volume);
return 0;
}
b) Write a program to declare SUB module to calculate and print the volume of a box. [3]
Ans: Here’s a QBASIC program to calculate and print the volume of a box using a sub-module:
DECLARE SUB calculateVolume(length!, width!, height!)
CLS
INPUT "Enter length of the box: ", length
INPUT "Enter width of the box: ", width
INPUT "Enter height of the box: ", height
CALL calculateVolume(length, width, height)
SUB calculateVolume(length, width, height)
volume = length * width * height
PRINT "Volume of the box: "; volume
END SUB
c) Write a program to create a sequential data file “Employee.dat” to store employees name, address, age, gender and salary. [3]
Ans: Here’s a QBASIC program to create a sequential data file “Employee.dat” to store employees’ information:
OPEN "Employee.dat" FOR OUTPUT AS #1
CLS
DO
INPUT "Enter employee name (or type 'exit' to stop): ", name$
IF UCASE$(name$) <> "EXIT" THEN
INPUT "Enter employee address: ", address$
INPUT "Enter employee age: ", age
INPUT "Enter employee gender: ", gender$
INPUT "Enter employee salary: ", salary
WRITE #1, name$, address$, age, gender$, salary
END IF
LOOP UNTIL UCASE$(name$) = "EXIT"
CLOSE #1