SEE Solved Question Paper Of Optional II Computer Science | 2075 [2019] | RE-334
solution of computer science question paper 2075-2019 re-334 see
DR Gurung
Also Check:
You can find SEE Solved Question Paper of Optional II Computer Science 2075-2019 RE-334.
1. Answer the following questions): [5x2=10]
a. Write any two features of Guided Media.
Answer: The two features of Guided Media are as follows:
i. Data transmit through the physical cable or fixed path.
ii. Data transmission rate is higher.
b. Write any four advantages of Internet.
Answer: The four advantages of Internet are as follows:
i. It makes easy learning.
ii. It makes communication.
iii. It makes easy to search information.
iv. It makes easy to transfer the file or information.
c. What is multimedia?
Answer: Multimedia is integration of text, sound, graphics, animation and video. It can be stored, transmitted and processed digitally.
d. How Password secure the data?
Answer: Password helps to protect the data from unauthorized access. Only the person who knows the system password can access the system which helps to secure the data.
e. Write any two preventive measures to protect computer from computer virus.
Answer: The two preventive measures to protect computer from computer virus are as follows:
i. Install antivirus software and scan regularly.
ii. Do not use any pirated software.
2.
a. Perform the conversion as per the direction: [2x1=2]
(i) (217)10 into Binary
Answer: 110011001 [Process should be compulsory]
(ii) (39C)16 into Decimal.
Answer: 924 [Process should be compulsory]
b. Perform the binary calculation): [2x1=2]
(i) 1011 x 11
Answer: 100001 [Process should be compulsory]
(ii) 110111 − 11001
Answer:
4. Select the best answer of the following: [4x0.5=2]
Choose the best answer of the following:
a. The physical structure of Computer Network.
(i) protocol (ii) Topology (iii) MAN (iv) cabaling
Answer: Topology
b. Which is not an Internet service .
(i) E-commerce (ii) NIC (iii) www (iv) E-mail
b. The volume of bits that can be transferred per second through the communication media.
7. Answer the following questions): [3x2=6]
a. Write any two advantages of Database Management system.
Answer: The two advantages of Database Management System are:
b. What is primary key?
Answer: A primary key is the field that uniquely identifies record so that there will not be repetition of data.
c. Write any two functions of Form.
Answer: The two functions of Forms are:-
c. Indexing is the process of arranging the records in ascending or descending order.
Answer: False
d. Select query is used to retrieve and display records from the selected table.
Answer: True
9. (Match the following): [4x0.5=2]
Answer:
a. Define logical operators. [1]
Answer: Operators used for logical operation is called logical operator.
Or, Logical operators are symbol which are used are used to compare two or more than two conditions and give the result either in Yes or No form.
b. Write any two advantages of structure programming. [1]
Answer: The two advantages of structure programming are:
i) Easy to learn and understanding the program.
ii) More than one programmer can work in the system.
c. Write the function of the following command /statements: [1]
(i) FILES (ii) WRITE
Answer:
i) FILES - To display the list of files. Or, the FILES statement displays the files of the current sub directory or specified sub directory.
ii) WRITE - To write data into the file. Or, It sends one or more data items to the specified file.
11. Re-write the given program after correcting the bugs: [4x0.5=2]
DECLARE FUNCTION reverse$ (N$)
INPUT "Any String"; N$
X$ = reverse$(N$)
PRINT N$
END
FUNCTION reverse (N$)
L = LEN$(N$)
FOR X = L To 1 STEP - 1
A$ = MID$ (N$,X,1)
B$ = B$+A$
NEXT X
B$ = reverse$ (N$)
END FUNCTION
Answer:
DECLARE FUNCTION reverse$ (N$)
INPUT "Any String"; N$
X$ = reverse$(N$)
PRINT X$
END
FUNCTION reverse$ (N$)
L = LEN (N$)
FOR X = L To, 1 STEP - 1
A$ = MID$ (N$,X,1)
B$ = B$+A$
NEXT X
reverse$ =B$
END FUNCTION
12. Write the output of the following program: [2]
DECLARE SUB series ( )
CALL series
END
SUB series
X = 1
FOR K = 1 TO 4
PRINT X;
X = X + K
NEXT K
END SUB
Answer:
OUTPUT
1 2 5 9
13. Study the following program and answer the given questions: [2x1=2]
DECLARE SUB SUM (N)
N = 5
CALL SUM (N)
END
SUB SUM (N)
FOR X = 1 TO N
S = S + X
NEXT X
PRINT S
END SUB
a) In the above program how many times does the FOR ........ NEXT loop executes ?
Answer: The FOR ........ NEXT loop executes 5 times.
b) Write the name of the procedure used in the above program.
Answer: The name of the procedure used in the above program is SUM.
14.
a. Write a program to calculate the average of three numbers using FUNCTION procedure. [3]
Answer:
DECLARE FUNCTION Average (A, B, C)
INPUT "First number" ; A
INPUT "Second number" ; B
INPUT "Third number" ; C
Avg = Average (A, B, C)
PRINT "Average of three number" ; Avg
END
FUNCTION Average (A, B, C)
X = (A + B + C)/3
Average = X
END FUNCTION
(Or any satisfactory answer)
b. Write a program to print the total number of vowels alphabets present in the given word using SUB procedure. [3]
Answer:
DECLARE SUB vowels (N$)
INPUT "Any work" ; N$
CALL vowels (N$)
END.
SUB vowels (N$)
v = 0
A$ = UCASE$ (N$)
L = LEN (A$)
FOR X = 1 To L
B$ = MID$ (A$, X, 1)
IF B$="A" OR B$ ="E" OR B$ ="I" OR B$="O" OR B$="U" THEN
v = v+1
END IF
NEXT X
PRINT "No. of vowels" ; v
END SUB
(Or any satisfactory answer)
c. A data file "STAFF. dat" has stored records of few employees with EmPID, First name, Lastname, post and salary. Write a program to display all the records of the employees whose salary is more than 40,000. [3]
Answer:
OPEN "STAFF.dat" FOR INPUT AS #1
DO WHILE NOT EOF (1)
INPUT #; EmPID, Firstname$, Lstname$, Post$, Salary
IF SALARY>40000 THEN
PRINT EmPID, Firstname$, Lstname$, Post$, Salary
END IF
LOOP
CLOSE #1
END
(Or any satisfactory answer)
2075/2019 SEE Question Paper., SEE Secondary Education Examination Nepal., SEE Question Papers and Solution 2075/2019., Solution Of Question SEE 2075/2019., SEE Question Paper of Gandaki Province 2075/2019., Province No. 4 SEE 2075/2019 Question Paper., Download SEE Question Paper 2075/2019., SEE Optional II Computer Science RE-334 Question 2075-2019., Optional II Computer Science RE-334 SEE Question Paper 2075/2019., SEE Solved Exam Paper Of Optional II Computer Science RE-334 2075-2019., SEE Optional II Computer Science RE-334 Question Paper 2075/2019., Check and Download Optional II Computer Science RE-334 Question 2075/2019., Download Question Paper Optional II Computer Science RE-334 2075-2019., Check SEE Optional II Computer Science RE-334 Question Paper 2075/2019., Solution Of Optional II Computer Science RE-334 Question SEE 2075/2019., 2075/2019 Optional II Computer Science RE-334 Question With Solution Secondary Education Examination SEE. alert-info
You can find SEE Solved Question Paper of Optional II Computer Science 2075-2019 RE-334.
Check and Download | All Question Papers Of SEE | 2075/2019Also Check:
SEE 2074/2018 Optional II Computer Science Question Paper RE-334
Candidates are required to give their answer according to the given instructions.
Group 'A'
Computer Fundamental (22 Marks)
1. Answer the following questions): [5x2=10]
a. Write any two features of Guided Media.
Answer: The two features of Guided Media are as follows:
i. Data transmit through the physical cable or fixed path.
ii. Data transmission rate is higher.
b. Write any four advantages of Internet.
Answer: The four advantages of Internet are as follows:
i. It makes easy learning.
ii. It makes communication.
iii. It makes easy to search information.
iv. It makes easy to transfer the file or information.
c. What is multimedia?
Answer: Multimedia is integration of text, sound, graphics, animation and video. It can be stored, transmitted and processed digitally.
d. How Password secure the data?
Answer: Password helps to protect the data from unauthorized access. Only the person who knows the system password can access the system which helps to secure the data.
e. Write any two preventive measures to protect computer from computer virus.
Answer: The two preventive measures to protect computer from computer virus are as follows:
i. Install antivirus software and scan regularly.
ii. Do not use any pirated software.
2.
a. Perform the conversion as per the direction: [2x1=2]
(i) (217)10 into Binary
Answer: 110011001 [Process should be compulsory]
(ii) (39C)16 into Decimal.
Answer: 924 [Process should be compulsory]
b. Perform the binary calculation): [2x1=2]
(i) 1011 x 11
Answer: 100001 [Process should be compulsory]
(ii) 110111 − 11001
Answer: 1111 0 [Process should be compulsory]
3. Match the following: [4x0.5=2]
3. Match the following: [4x0.5=2]
Group 'A' | Group 'B' |
---|---|
(a) HUB | (i) Communication Media |
(b) TCP/IP | (ii) Network connection device |
(c) UTP | (iii) Windows NT |
(d) NOS | (iv) Protocol |
(v) Computer security |
Group 'A' | Group 'B' |
---|---|
(a) HUB | (ii) Network connection device |
(b) TCP/IP | (iv) Protocol |
(c) UTP | (i) Communication Media |
(d) NOS | (iii) Windows NT |
4. Select the best answer of the following: [4x0.5=2]
Choose the best answer of the following:
a. The physical structure of Computer Network.
(i) protocol (ii) Topology (iii) MAN (iv) cabaling
Answer: Topology
b. Which is not an Internet service .
(i) E-commerce (ii) NIC (iii) www (iv) E-mail
Answer: NIC
c. Which is not a computer virus ?
(i) Kaspersky (ii) message carrying virus (iii) Boot sector virus (iv) Program virus
c. Which is not a computer virus ?
(i) Kaspersky (ii) message carrying virus (iii) Boot sector virus (iv) Program virus
Answer: Kaspersky
d. Topology where all the computer are connected to a central connecting device, HUB or switch
(i) BUS (ii) STAR (iii) TREE (iv) RING
Answer: STAR
5. Write the appropriate technical terms of the following: [4x0.5=2]
a. A powerful computer which controls and co-ordinates all computers connected in a network.
Answer: Server
d. Topology where all the computer are connected to a central connecting device, HUB or switch
(i) BUS (ii) STAR (iii) TREE (iv) RING
Answer: STAR
5. Write the appropriate technical terms of the following: [4x0.5=2]
a. A powerful computer which controls and co-ordinates all computers connected in a network.
Answer: Server
b. The volume of bits that can be transferred per second through the communication media.
Answer: Bandwidth
c. Making duplicate copy of file or data.
c. Making duplicate copy of file or data.
Answer: Backup
d. Illegal activities committed through the use of computer and Internet.
d. Illegal activities committed through the use of computer and Internet.
Answer: Cyber crime
6. Write the full form: [4x0.5=2]
(i) STP (ii) PDF (iii) NIC (iv) IRC
Answer:
6. Write the full form: [4x0.5=2]
(i) STP (ii) PDF (iii) NIC (iv) IRC
Answer:
i) The full form of STP is Shielded Twisted Pair.
ii) The full form of PDF is Portable Document Format.
iii) The full form of NIC is Network Interface Card.
iv) The full form of IRC is Internet Relay Chat.
Group 'B'
Database (10 Marks)
7. Answer the following questions): [3x2=6]
a. Write any two advantages of Database Management system.
Answer: The two advantages of Database Management System are:
i) Reduces duplication of data.
ii) Makes data sharing easy and fast.
b. What is primary key?
Answer: A primary key is the field that uniquely identifies record so that there will not be repetition of data.
c. Write any two functions of Form.
Answer: The two functions of Forms are:-
i) to enter data.
ii) to edit data.
8. State whether the following statements are true or false: [4x0.5=2]
a. The size of currency data type is 10 Bytes.
Answer: False
8. State whether the following statements are true or false: [4x0.5=2]
a. The size of currency data type is 10 Bytes.
Answer: False
b. Valadation rule will limit data entry.
Answer: True
Answer: True
c. Indexing is the process of arranging the records in ascending or descending order.
Answer: False
d. Select query is used to retrieve and display records from the selected table.
Answer: True
9. (Match the following): [4x0.5=2]
Group 'A' | Group 'B' |
---|---|
(a) Yes/No | (i) 4 Bytes |
(b) Long Integer | (ii) Ms Access object |
(c) OLE | (iii) Picture |
(d) Report | (iv) 1 Bit |
(v) 8 Bytes |
Group 'A' | Group 'B' |
---|---|
(a) Yes/No | (iv) 1 Bit |
(b) Long Integer | (i) 4 Bytes |
(c) OLE | (iii) Picture |
(d) Report | (ii) Ms Access object |
Group 'C'
Programming (18 Marks)
10. a. Define logical operators. [1]
Answer: Operators used for logical operation is called logical operator.
Or, Logical operators are symbol which are used are used to compare two or more than two conditions and give the result either in Yes or No form.
b. Write any two advantages of structure programming. [1]
Answer: The two advantages of structure programming are:
i) Easy to learn and understanding the program.
ii) More than one programmer can work in the system.
c. Write the function of the following command /statements: [1]
(i) FILES (ii) WRITE
Answer:
i) FILES - To display the list of files. Or, the FILES statement displays the files of the current sub directory or specified sub directory.
ii) WRITE - To write data into the file. Or, It sends one or more data items to the specified file.
11. Re-write the given program after correcting the bugs: [4x0.5=2]
DECLARE FUNCTION reverse$ (N$)
INPUT "Any String"; N$
X$ = reverse$(N$)
PRINT N$
END
FUNCTION reverse (N$)
L = LEN$(N$)
FOR X = L To 1 STEP - 1
A$ = MID$ (N$,X,1)
B$ = B$+A$
NEXT X
B$ = reverse$ (N$)
END FUNCTION
Answer:
DECLARE FUNCTION reverse$ (N$)
INPUT "Any String"; N$
X$ = reverse$(N$)
PRINT X$
END
FUNCTION reverse$ (N$)
L = LEN (N$)
FOR X = L To, 1 STEP - 1
A$ = MID$ (N$,X,1)
B$ = B$+A$
NEXT X
reverse$ =B$
END FUNCTION
12. Write the output of the following program: [2]
DECLARE SUB series ( )
CALL series
END
SUB series
X = 1
FOR K = 1 TO 4
PRINT X;
X = X + K
NEXT K
END SUB
Answer:
OUTPUT
1 2 5 9
13. Study the following program and answer the given questions: [2x1=2]
DECLARE SUB SUM (N)
N = 5
CALL SUM (N)
END
SUB SUM (N)
FOR X = 1 TO N
S = S + X
NEXT X
PRINT S
END SUB
a) In the above program how many times does the FOR ........ NEXT loop executes ?
Answer: The FOR ........ NEXT loop executes 5 times.
b) Write the name of the procedure used in the above program.
Answer: The name of the procedure used in the above program is SUM.
14.
a. Write a program to calculate the average of three numbers using FUNCTION procedure. [3]
Answer:
DECLARE FUNCTION Average (A, B, C)
INPUT "First number" ; A
INPUT "Second number" ; B
INPUT "Third number" ; C
Avg = Average (A, B, C)
PRINT "Average of three number" ; Avg
END
FUNCTION Average (A, B, C)
X = (A + B + C)/3
Average = X
END FUNCTION
(Or any satisfactory answer)
b. Write a program to print the total number of vowels alphabets present in the given word using SUB procedure. [3]
Answer:
DECLARE SUB vowels (N$)
INPUT "Any work" ; N$
CALL vowels (N$)
END.
SUB vowels (N$)
v = 0
A$ = UCASE$ (N$)
L = LEN (A$)
FOR X = 1 To L
B$ = MID$ (A$, X, 1)
IF B$="A" OR B$ ="E" OR B$ ="I" OR B$="O" OR B$="U" THEN
v = v+1
END IF
NEXT X
PRINT "No. of vowels" ; v
END SUB
(Or any satisfactory answer)
c. A data file "STAFF. dat" has stored records of few employees with EmPID, First name, Lastname, post and salary. Write a program to display all the records of the employees whose salary is more than 40,000. [3]
Answer:
OPEN "STAFF.dat" FOR INPUT AS #1
DO WHILE NOT EOF (1)
INPUT #; EmPID, Firstname$, Lstname$, Post$, Salary
IF SALARY>40000 THEN
PRINT EmPID, Firstname$, Lstname$, Post$, Salary
END IF
LOOP
CLOSE #1
END
(Or any satisfactory answer)
DR Gurung
A Learner
(अज्ञान जस्तो ठूलो शत्रु अरु केही छैन।) 🙏🙏
Suggestions and/or questions are always welcome, either post them in the comment form or send me an email at drgurung82@gmail.com.
However, comments are always reviewed and it may take some time to appear. Always keep in mind "URL without nofollow tag" will consider as a spam.
To add an image:
[image] image_url [/image]
To add a code block:
[code] your_code [/code]
To add a quote:
[quote] your_quote [/quote]
To add a link:
[link] your_link_text | link_url [/link]