SEE Model Question Computer Science 2076

SEE Model Question Computer Science 2076

SEE

SEE Model Question Computer Science 2076

SEE Model Question Computer Science is the collection of all the important questions for upcoming SEE exam 2076. The questions are selected by the experienced teachers in order to give you the best questions which are important for you.

SEE Model Question Computer Science 2076

Time: 1 hr. 30 min.                                                                 F.M.: 50                                                      P.M.: 16

Group A
Computer Fundamental (30 Marks)

1. Answers the following questions: (5×2=10)

a.What is computer network? Write its types on the basis of geographical area.

b.Write any four differences between client server and peer to peer network model.

c.Define cyber crime with examples.

d.What is antivirus program? Write any two examples.

e.Write advantages of multimedia in education sector.

 

2.a. Convert the following as indicated:  (2×2= 4)

i. (110100)2 into Decimal                                ii. (2A5)16 into Octal

b. Perform the following binary operations. (2×2=4)

i. (1110-1101)*101                                           ii. 100111÷111

3.Match the following: (4×0.5=2)

Group A Group B
Hub Connect different types of networks having same protocol
Router Twisted Pair cable
BNC terminator Transmission channel for WLAN
RJ 45 Connecting device within a network
Coaxial cable

 

4.Select the correct option for the following: (4×0.5=2)

a.Which of the following is the basic internet protocol?
i.HTTP                      ii.  POP
iii.TCP/IP                  iv. None of the above

b.Which of the following computer program is harmful?
i. Antivirus           ii. Virus iii. Word processor          iv. All of the above

c.A unique address to identify the computers on the network is :
i.Primary key           ii. Host name      iii. Domain name     iv. IP Address

d.Which of the following is not cyber crime?
i.Should not use computer to harm people
ii.Should not use computer to steal data and information.
iii.Should destroy data of other people.
iv.All of the above

5.Write appropriate technical term for the following:(4×1=4)

a.Real time visual communication service of internet.

b.A hardware device that converts digital signal to analog and vice versa.

c.A type of harmful computer program that infects the master boot record (MBR) of a disk.

d.A system program installed in server for managing resources and clients.

 

6. Give the full form. (4×1=4)

i. VOIP                      ii. FTP                    iii. PSTN                iv. USB

Group B Database (10 marks)

7. Answer the following questions. (3×2=6)

a. What is a database and DBMS?

b. What is data type? List any four types of data used in Microsoft Access?

c. Define Query. List any two uses of form.

8. Select the correct answer: (4×0.5=2)

(a) In MS Access we enter data using ……….
(i) Form                                (ii) Report                    (iii) Table         (iv) Both (i) &(iii)

(b) The extension of database file in Access is ……..
(i) .dbf                                   (ii) .accdb                    (iii) .accbd                   (iv) .dbm

(c) ……… uniquely identifies any field.
(i) Indexing                         (ii) Memo Field            (iii) Primary Key          (iv) Query

(d) The objects of Access that stores the data is known as ………
(i) Query                            (ii) Table                      (iii) Form                    (iv) Report

 

9. Match the following:(4×0.5=2)

Group A Group B
a.       MySql iOS
b.      Indexing data To store picture and video
c.       OLE Object RDBMS
d.      Caption Searching fast
2048 characters

Group B
QBASIC Programming (20 Marks)

10. Answers the following questions: (3×2= 6)

a Define modular programming two methods to create modules in modular programming.

b.What is array? Why array is used in programming?

c.Write any two differences between SUB and FUNCTION module.

 

11. Write output of the following program. (2)


DECLARE SUB NUM(X)
X=1011
CALL NUM(X)
END

FUNCTION NUM(X)
WHILE X<>0
R= X MOD 10
S= R*2^q+S
X= X\10
q=q+1
WEND
PRINT S
END FUNCTION

12. Rewrite the following program correcting the bugs. (2)

DECLATE SUB SER (A, B)
X=2
Y=3
CALL SER(X, Y)
END

SUB SER (A, B)
FOR I= 1 TO 5
PRINT A; B;
A=A+B
B=A+B
NEXT I
END SUB

13.Study the given program and answer the questions. (2)

DECLATE SUB SER (A, B)
X=2
Y=3
CALL SER(X, Y)
END

SUB SER (A, B)
FOR I= 1 TO 5
PRINT A; B;
A=A+B
B=A+B
NEXT I
END SUB

a. How many arguments are used in this program.

b.What is the output of this program?

14 a. Write a program to calcuate and print volume of a cylinder using using SUB procedure. (V=πr2h) (2)

b. Write a program to input a sentence count and print total number of vowels and consonants using SUB procedure. (3)

c. Write a program to input 5 numbers and print them in descending order using ARRAY. (3)

Leave a Reply

Your email address will not be published. Required fields are marked *