0% found this document useful (0 votes)
29 views4 pages

Bhaktapur

Uploaded by

czddj89m4z
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views4 pages

Bhaktapur

Uploaded by

czddj89m4z
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Bhaktapur SEE MODEL SET-1 Ans: The difference between client server architecture and peer to peer

Subject: Opt. II Computer Science architecture are:


Time: 1:30 hrs. Full Marks: Client/ server network Peer-to-Peer network
50 Client/ server network is a type of
Candidates are required to give answers according to the instructions Peer-to-Peer network is a type of
network model where at least one
given. network model where all the
computer is designed as a server and
Group ‘A’ computers have equal responsibilities
other computers on the network
1. Answer the following questions in one sentence: on the network
called clients or workstations.
[6x1=6]
It provides central security It lacks centralized network
a)Define bandwidth.
administration and the network administration, where the network
Ans: The amount of data that can be carried from one point to another in a
administrator is responsible for data administrator needs to manage security on
given time period is called bandwidth.
security and other resources each computer. It provides no reliable
b)What is cyber-crime?
management of the network. security and might put data in higher risks
Ans: Cybercrime refers to criminal activities or illegal actions that are
conducted or facilitated through the use of digital technology or the internet.
b)Write any four commandments of computer ethics.
c)Define AI.
Ans; Any four commandments of computer ethics are :
Ans: Artificial intelligence refers to the simulation of human intelligence in
·Do not use a computer to harm other people.
machines that are programmed to think and act like humans.
·Do not use a computer to publish fake information.
d)What is the storage size of text and currency data type?
·Do not search the file or record of other people.
Ans: The storage size of text data type is 255 and currency data type is 8
·Do not destroy or delete the records of other people
bytes.
c)Define hardware security. Give any two measures of software
e)Define modular programming.
security.
Ans: Modular programming is a technique used to divide program into many
Ans: Hardware security is the protection given to the various hardware tools
small, manageable, logical and functional modules or blocks.
and equipment used in computer system from the accidental or intentional
f)Write any two features of C language.
harm.
Any two features of C language are:
Any two measures of software security are:
It is a high level language with some features of low level language.
Password and Backup
It is mostly used to prepare system software.
d)What is VR? Mention its application areas.
2. Write appropriate technical terms for the following: [2x1=2]
Ans: Virtual reality is an artificial environment created
a)Physical layout of computers in a network. Network Topology
with computer hardware and software and presented to the user in such a
b)A secret group of characters used to protect information systems from
way that it appears and feels like a real environment.
unauthorized users. Password
Any two areas where it is used are:
3. Write the full form of the following:
Gaming- VR Gaming allows players to immerse (dip) themselves in virtual
[2x1=2]
world and interact with
a. STP - Shielded Twisted Pair
environment and characters
b. NIC – Network Interface Card
Education - VR can help students learn by making the content more
Group ‘B’
engaging and memorable.
4. Answer the following questions: [9x2=18]
e)What is mobile computing? Write any four importance of it.
a)Differentiate between client server architecture and peer to peer
Ans: Mobile computing refers to the use of portable computing devices, such
architecture.
as smartphones, tablets, laptops, and wearables, that allow users to access
and transmit data, information, and applications without being tied to a fixed IF I MOD 2 = 1 THEN
physical location. B$= B$+MID$(A$,I,1)
Any four importance of it are: END IF
It allows people to work and communicate from anywhere at any time. NEXT I
It keeps connected to the Internet, allowing to access information all the TEXT$= B$
times. END FUNCTION
It increases the productivity of users reducing time and cost. Dry Run
It is one of the major handheld sources of entertainment for users at present. IF I
I=1 to PRINT
f)Define DBMS with examples. A$ B MOD 2 B$=B$+MID$(A$,I,1) Y$
B Y$
Ans: Ans: DBMS is a software that manages databases, allowing users to =1
store, access, and manipulate data in an organized and secure way. 1 MOD
Examples of DBMS software are : MS-Access, Oracle, Fox pro, dBase etc. TECHNOLOGY 10 1 to 10 2=1 T TCNLG TCNLG
g)Define data redundancy. How can it be reduced? 1=1 yes
Ans: Data redundancy refers to the repetition or duplication of data within a
2 MOD
database.
2 to 10 2=1
It can be reduced by normalizing the database, eliminating duplicate data
0=1 no
and storing it in separate tables, and using foreign keys to establish
relationships between the tables. 3 MOD
h)What is data sorting? Write its two advantages. 3 to 10 2=1 T+C = TC
Ans: Sorting refers to the process of organizing data in a specific order 1=1 yes
(ascending or descending) based on one or more fields in a table, query, or 4 MOD
report. 4 to 10 2=1
Any two advantages of using it are: 0=1 no
Sorting helps to organize data and make it easier to find and retrieve specific 5 MOD
information. 5 to 10 2=1 TC+N=TCN
Sorting can save time and improve efficiency by allowing users to quickly 1=1 yes
access the data they need. 6 MOD
i)Mention any four data types used in MS-Access. 6 to 10 2=1
Any four data types used in MS-Access are text, memo, Yes/No and 0=1 no
Currency.
7 MOD
5. Write down the output of the given program. [2]
7 to 10 2=1 TCN+L=TCNL
DECLARE FUNCTION TEXT$(A$)
1=1 yes
CLS
A$= “TECHNOLOGY” 8 MOD
Y$= TEXT$(A$) 8 to 10 2=1
PRINT Y$ 0=1 no
END 9 MOD
9 to 10 2=1 TCNL+G
FUNCTION TEXT$(A$) 1=1 yes
B= LEN(A$) 10 to 10 TCNLG
FOR I = 1 TO B
MOD SUM=S
10 2=1 END FUNCTION
0=1 no 7. Study the following program and answer the given questions. [2]
11 to DECLARE SUB TEST(A$)
10 CLS
Loop A$= “COMPUTER”
Exit END
The output of the program is
SUB TEST (A$)
TCNLG
L= LEN(A$)
6. Rewrite the following program after correcting the bugs.
FOR I = L TO 1 STEP -2
[2]
PRINT MID$(A$, I, 1)
DECLARE FUNCTION SUM(N)
NEXT I
CLS
END SUB
INPUT “ENTER A NUMBER”; N
a)What statement should be added in the main module to execute the
SU= SUM(N)
program?
PRINT “SUM =”; SUM(N)
Ans: CALL TEST(A$) statement should be added in the main module to
END
execute the program.
b)List out the variables used in the above program with types.
FUNCTION SUM(N)
Ans: the variables used in the above program are:
WHILE N< > 0
A$ - String Variable
R = R MOD 10
L, I – Numeric Variable
S= S + R
Group ‘C’
N = N \ 10
8. Convert/ calculate as per the instruction. [4]
WEND
a)(670)8 = (?)10
S= SUM
b)(FACE)16 = (?)2
END SUB
c)1100 x 110
Debugged Program
d)111011 ÷ 100
DECLARE FUNCTION SUM(N)
9. a) Write a program in QBASIC that asks for the length, breadth and height
CLS
of a box. Create a user defined function to find the volume of the box and
INPUT “ENTER A NUMBER”; N
sub procedure to find the total surface area of the box. [Hint: Vol=l x b x h ;
SU= SUM(N)
Area=2(lb+bh+lh) [4]
PRINT “SUM =”; SU
DECLARE SUB TSAREA (L, B, H)
END
DECLARE FUNCTION VOLUME (L, B, H)
CLS
FUNCTION SUM(N)
INPUT “ENTER LENGTH”; L
WHILE N< > 0
INPUT “ENTER BREADTH”; B
R = N MOD 10
INPUT “ENTER HEIGHT”; H
S= S + R
CALL TSAREA(L, B, H)
N = N \ 10
PRINT “VOLUME OF CUBOID ”; VOLUME(L, B, H)
WEND
END
SUB TSAREA (L, B, H) int a=2,i;
T = 2 * (L * B + B * H + H * L) for(i=1;i<=10;i++)
PRINT “TOTAL SURFACE AREA OF CUBOID ”; T {
END SUB printf("%d ", a);
FUNCTION VOLUME (L, B, H) a=a+2;
VOLUME = L * B * H }
END FUNCTION
b. Write a program to open a data file “Record.dat” which contains student’s return 0;
name, class and address and print only those students’ records whose
name starts from an alphabet “A”. [4] }
OPEN "Record.dat" FOR INPUT AS #1
CLS
WHILE NOT EOF (1)
INPUT #1, N$, C, A$
A$ = UCASE$(LEFT$(N$,1))
IF A$ = “A” THEN PRINT N$, C, A$
WEND
CLOSE #1
END
10. Write a program in C language to enter a number and check if it is odd
or
even. [4]
#include<stdio.h>
#include<conio.h>
int main()
{
int n;
printf("Enter any number: ");
scanf("%d", &n);
if(n % 2= = 0)
printf("%d is even number", n);
else
printf("%d is odd number", n);
return 0;
}
OR
Write a program in C language to display the series:
2, 4, 6, 8, 10, 12……………10th term.
#include <stdio.h>
int main()
{

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy