We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
Bhaktapur SEE MODEL SET-1 Ans: The difference between client server architecture and peer to peer
Subject: Opt. II Computer Science architecture are:
Time: 1:30 hrs. Full Marks: Client/ server network Peer-to-Peer network 50 Client/ server network is a type of Candidates are required to give answers according to the instructions Peer-to-Peer network is a type of network model where at least one given. network model where all the computer is designed as a server and Group ‘A’ computers have equal responsibilities other computers on the network 1. Answer the following questions in one sentence: on the network called clients or workstations. [6x1=6] It provides central security It lacks centralized network a)Define bandwidth. administration and the network administration, where the network Ans: The amount of data that can be carried from one point to another in a administrator is responsible for data administrator needs to manage security on given time period is called bandwidth. security and other resources each computer. It provides no reliable b)What is cyber-crime? management of the network. security and might put data in higher risks Ans: Cybercrime refers to criminal activities or illegal actions that are conducted or facilitated through the use of digital technology or the internet. b)Write any four commandments of computer ethics. c)Define AI. Ans; Any four commandments of computer ethics are : Ans: Artificial intelligence refers to the simulation of human intelligence in ·Do not use a computer to harm other people. machines that are programmed to think and act like humans. ·Do not use a computer to publish fake information. d)What is the storage size of text and currency data type? ·Do not search the file or record of other people. Ans: The storage size of text data type is 255 and currency data type is 8 ·Do not destroy or delete the records of other people bytes. c)Define hardware security. Give any two measures of software e)Define modular programming. security. Ans: Modular programming is a technique used to divide program into many Ans: Hardware security is the protection given to the various hardware tools small, manageable, logical and functional modules or blocks. and equipment used in computer system from the accidental or intentional f)Write any two features of C language. harm. Any two features of C language are: Any two measures of software security are: It is a high level language with some features of low level language. Password and Backup It is mostly used to prepare system software. d)What is VR? Mention its application areas. 2. Write appropriate technical terms for the following: [2x1=2] Ans: Virtual reality is an artificial environment created a)Physical layout of computers in a network. Network Topology with computer hardware and software and presented to the user in such a b)A secret group of characters used to protect information systems from way that it appears and feels like a real environment. unauthorized users. Password Any two areas where it is used are: 3. Write the full form of the following: Gaming- VR Gaming allows players to immerse (dip) themselves in virtual [2x1=2] world and interact with a. STP - Shielded Twisted Pair environment and characters b. NIC – Network Interface Card Education - VR can help students learn by making the content more Group ‘B’ engaging and memorable. 4. Answer the following questions: [9x2=18] e)What is mobile computing? Write any four importance of it. a)Differentiate between client server architecture and peer to peer Ans: Mobile computing refers to the use of portable computing devices, such architecture. as smartphones, tablets, laptops, and wearables, that allow users to access and transmit data, information, and applications without being tied to a fixed IF I MOD 2 = 1 THEN physical location. B$= B$+MID$(A$,I,1) Any four importance of it are: END IF It allows people to work and communicate from anywhere at any time. NEXT I It keeps connected to the Internet, allowing to access information all the TEXT$= B$ times. END FUNCTION It increases the productivity of users reducing time and cost. Dry Run It is one of the major handheld sources of entertainment for users at present. IF I I=1 to PRINT f)Define DBMS with examples. A$ B MOD 2 B$=B$+MID$(A$,I,1) Y$ B Y$ Ans: Ans: DBMS is a software that manages databases, allowing users to =1 store, access, and manipulate data in an organized and secure way. 1 MOD Examples of DBMS software are : MS-Access, Oracle, Fox pro, dBase etc. TECHNOLOGY 10 1 to 10 2=1 T TCNLG TCNLG g)Define data redundancy. How can it be reduced? 1=1 yes Ans: Data redundancy refers to the repetition or duplication of data within a 2 MOD database. 2 to 10 2=1 It can be reduced by normalizing the database, eliminating duplicate data 0=1 no and storing it in separate tables, and using foreign keys to establish relationships between the tables. 3 MOD h)What is data sorting? Write its two advantages. 3 to 10 2=1 T+C = TC Ans: Sorting refers to the process of organizing data in a specific order 1=1 yes (ascending or descending) based on one or more fields in a table, query, or 4 MOD report. 4 to 10 2=1 Any two advantages of using it are: 0=1 no Sorting helps to organize data and make it easier to find and retrieve specific 5 MOD information. 5 to 10 2=1 TC+N=TCN Sorting can save time and improve efficiency by allowing users to quickly 1=1 yes access the data they need. 6 MOD i)Mention any four data types used in MS-Access. 6 to 10 2=1 Any four data types used in MS-Access are text, memo, Yes/No and 0=1 no Currency. 7 MOD 5. Write down the output of the given program. [2] 7 to 10 2=1 TCN+L=TCNL DECLARE FUNCTION TEXT$(A$) 1=1 yes CLS A$= “TECHNOLOGY” 8 MOD Y$= TEXT$(A$) 8 to 10 2=1 PRINT Y$ 0=1 no END 9 MOD 9 to 10 2=1 TCNL+G FUNCTION TEXT$(A$) 1=1 yes B= LEN(A$) 10 to 10 TCNLG FOR I = 1 TO B MOD SUM=S 10 2=1 END FUNCTION 0=1 no 7. Study the following program and answer the given questions. [2] 11 to DECLARE SUB TEST(A$) 10 CLS Loop A$= “COMPUTER” Exit END The output of the program is SUB TEST (A$) TCNLG L= LEN(A$) 6. Rewrite the following program after correcting the bugs. FOR I = L TO 1 STEP -2 [2] PRINT MID$(A$, I, 1) DECLARE FUNCTION SUM(N) NEXT I CLS END SUB INPUT “ENTER A NUMBER”; N a)What statement should be added in the main module to execute the SU= SUM(N) program? PRINT “SUM =”; SUM(N) Ans: CALL TEST(A$) statement should be added in the main module to END execute the program. b)List out the variables used in the above program with types. FUNCTION SUM(N) Ans: the variables used in the above program are: WHILE N< > 0 A$ - String Variable R = R MOD 10 L, I – Numeric Variable S= S + R Group ‘C’ N = N \ 10 8. Convert/ calculate as per the instruction. [4] WEND a)(670)8 = (?)10 S= SUM b)(FACE)16 = (?)2 END SUB c)1100 x 110 Debugged Program d)111011 ÷ 100 DECLARE FUNCTION SUM(N) 9. a) Write a program in QBASIC that asks for the length, breadth and height CLS of a box. Create a user defined function to find the volume of the box and INPUT “ENTER A NUMBER”; N sub procedure to find the total surface area of the box. [Hint: Vol=l x b x h ; SU= SUM(N) Area=2(lb+bh+lh) [4] PRINT “SUM =”; SU DECLARE SUB TSAREA (L, B, H) END DECLARE FUNCTION VOLUME (L, B, H) CLS FUNCTION SUM(N) INPUT “ENTER LENGTH”; L WHILE N< > 0 INPUT “ENTER BREADTH”; B R = N MOD 10 INPUT “ENTER HEIGHT”; H S= S + R CALL TSAREA(L, B, H) N = N \ 10 PRINT “VOLUME OF CUBOID ”; VOLUME(L, B, H) WEND END SUB TSAREA (L, B, H) int a=2,i; T = 2 * (L * B + B * H + H * L) for(i=1;i<=10;i++) PRINT “TOTAL SURFACE AREA OF CUBOID ”; T { END SUB printf("%d ", a); FUNCTION VOLUME (L, B, H) a=a+2; VOLUME = L * B * H } END FUNCTION b. Write a program to open a data file “Record.dat” which contains student’s return 0; name, class and address and print only those students’ records whose name starts from an alphabet “A”. [4] } OPEN "Record.dat" FOR INPUT AS #1 CLS WHILE NOT EOF (1) INPUT #1, N$, C, A$ A$ = UCASE$(LEFT$(N$,1)) IF A$ = “A” THEN PRINT N$, C, A$ WEND CLOSE #1 END 10. Write a program in C language to enter a number and check if it is odd or even. [4] #include<stdio.h> #include<conio.h> int main() { int n; printf("Enter any number: "); scanf("%d", &n); if(n % 2= = 0) printf("%d is even number", n); else printf("%d is odd number", n); return 0; } OR Write a program in C language to display the series: 2, 4, 6, 8, 10, 12……………10th term. #include <stdio.h> int main() {