Solved Question of Different Examinations-1 1
Solved Question of Different Examinations-1 1
Solved Question of Different Examinations-1 1
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 1
d. Sharing of infected external portable disks like floppy disk, pen drive or CD.
c) List any four media used in multimedia technology.
Ans: The four media used in multimedia technology are as follows:
i) Audio ii) Animation iii) Video iv) Graphics
d) Define the term computer security. Also mention the technique to protect data from the virus.
Ans: Computer security refers to the security given to the computer for the protection of data, application, software and
hardware from being lost or damaged due to accidental or intentional harm.
The technique to protect data from viruses is to use antivirus software.
e) Mention advantages and disadvantages of e-mail.
Ans: The advantages of e-mail are as follows:
a. It is fast, economic and instant communication media.
b. Any form of data like text, pictures, audio or video can be sent through e-mails.
c. The disadvantages of e-mail are as follows:
d. Minor mistakes in e-mail address may deliver the mail to a wrong address.
e. Since, it may passes through a vast electronic network. It may be seized in between.
7. a) Write any four features of DBMS.
Ans: The four features of DBMS are as follows:
a. It controls data redundancy which means duplication of data.
b. It maintains accurate database.
c. It allows sharing the existing database by different programs.
d. It allows updating large volume of data as the specified conditions.
b) What is filtering? Write a difference between sorting and filtering.
Ans: Filtering is an option that selects the required records and displays the result.
The differences between filtering and sorting are as follows:
Sorting Filtering
The arrangement of records on the basis of a field The process of viewing required records of a table
or group of fields of a table either in ascending or that satisfies the specified criteria is known as
descending order is known as sorting. filtering records.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 2
b. Define the term internet. List out any two services provided by the internet.
Ans: Internet can be defined as the interconnection of several thousands of computers belonging to various networks all
over the world.
Any two services provided by the internet are as follows:
e-commerce IRC(internet relay chat)
c. Define computer security. List out any two measures to protect computer.
Ans: Computer security can be defined as the security given to the data, software and the hardware for their protection from
being lost or damaged due to accidental or intentional harm.
Two measures to protect computer are:
· password · insurance policy
d. What are the reasons of making computer viruses? Explain
Ans: The reasons of making computer viruses are:
a. to stop software piracy
b. to entertain users by displaying interesting messages and pictures
c. to steal data and information
d. to expose the programmers ability
e. to earn money
e. What is cyber law? List any two subjects included in cyber law.
Ans: The law which governs the legal issues in the cyber space regarding the internet or www for digital data processing
wand transaction is known as cyber law.
Two subjects included in cyber law are:
a. Electronic and digital signature law
b. intellectual property law
1. Name any four objects of Access.
Ans: Any four objects of access are:
a. table
b. form
c. report
d. query
2. What is form? Mention any two methods to create form.
Ans: form is a database object used primarily to display records on screen to make it easier to enter new records and to make
changes to the existing records.
Its importance is:
a. using auto form features
b. using form wizard features
3. Differentiate between data and information.
Ans: The differences between data and information are:
Data Information
Data can be letters, numbers, or symbols representing Information is an organized collection of related
facts and figures, which may or may not give data, which gives a complete sense.
complete sense.
For example:- Ram, student, 20, For example: Ram is a student. He is 20 years old.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 3
· MKDIR: The function of MKDIR is to create a sub-directory which is used to manage files.
· CLOSE: The function of CLOSE is to close one or all open file from the diskette.
Model Set 3
1. What is meant by data communication? Explain with any two examples.
Ans: A data communication is the collection of hardware, software and other devices in order to exchange data, information
and voice between two or more than two devices through a bounded or unbounded media.
The two examples of data communication re:
a. E-mail b. Chat
2. Differentiate between chat and email clearly.
Ans: The differences between chat and email are:
Chat e-mail
We can send and receive instant meddase with other There is no need to send instant message. The user can read,
in real time. reply or ignore the message according to his/her wish.
3. Write any four ways of protecting computer from viruses.
Ans: The four ways of protecting computer from viruses are:
· Install a powerful anti-virus program to protect and update its virus definition file frequently.
· Do not use the pirated software.
· Do not open suspicious emails and attachments files send by the unknown person.
· Do not use freely distributed software.
4. How can multimedia help in education field?
Ans: Multimedia can help in education field in the following ways:
· It makes presentation of the related subject matter attractive.
· It makes teaching-learning easier in classroom.
· Presentation can be done in a big screen so that many students can see it.
· It makes easy to share views, thoughts and ideas among students.
5. What is meant by computer security? List out any four software security measures.
Ans: The security given to the computer for the protection of computer hardware, software and other resources from being
lost or damaged due to accidental or intentional harm is known as computer security.
Any four software security measures are:
· Defragmentation
· Scan disk
· Backup
· Password
6. Differentiate between text and memo.
Ans: The differences between text and memo are:
Text Memo
It is used for storing text or combination of text and It is used for storing lengthy text and numbers.
numbers.
It can store up to 255 characters. It can store up to 65,535/64000 characrers.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 4
11. Write down the function of RMDIR and FILES statement.
Ans: The function of :
· RMDIR: The function of RMDIR is to remove empty sub-directory.
· FILES: The function of FILES is to display all the files from the diskette.
Model Questions 4
Answer the following.
a) What is LAN? List out the types of LAN topologies.
Ans: A LAN is a network of computers that are relatively near to each other and are connected in a way that enables them to
communicate by cable and a small wireless device.
The types of LAN topologies are :
· Bus Topology
· Star Topology
· Ring Topology
b) How does Internet differ from Intranet? Explain.
Ans: Internet differs from Intranet as Internet is the interconnection of several thousands of computers of different types
belonging to various networks all over the world whereas Intranet is a private computer network that uses the internet
protocol to securely share any part of information of organization.
c) What are the precautions to protect data from viruses?
Ans: The precautions are:
· Do not download files and programs from the websites without scanning
· Use properly working antivirus software
· Do not exchange internal disk among computers
· Scan the mail or unknown files of Internet before opening in your computer
d) How do you know that your computer is infected from viruses?
Ans: We can know our computer is infected from viruses when:
· Programs take a long time to load
· Unusual increase of the disk space and grow in file size
· Corrupting the system’s data takes place
· Renaming of files with different names
What are the requirements of multimedia computer system?
Ans: The requirements are:
· Computer
· Software (WMP,Adobe Photoshop,etc.)
· CD-ROM/DVD drive
· Sound card
· Microphone
· Speaker
Group ‘B’
a) What is primary key? Give its importance.
Primary key is a field that uniquely identifies the record.
Its importance is:
1) Controls data redundancy and makes the record unique.
2) It sets relationship among the tables.
b) Differentiate between “format” and “input mask”.
The differences between format and input mask are given below.
Input mask Format
The input mask field property specifies a pattern The format field property specifies the layout for a field i.e.
for all data to be entered in a field. appearance of value when displayed.
This enables to control the manner in which data is This field property only changes the appearance of the data
entered in a field. on the screen but actually doesn’t change the way
how the data is stored in the field.
c) Write the importance of computerized database system in comparison to non-computerized database system.
Ans: The importance of computerized database in comparison to non-computerized database is that it can store large volume
of data and information, and is very fast to find specific record. Data can be sorted in ascending or descending order on
multiple criteria and data can also be kept secure in this system.
Group C
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 5
a) Write the syntax and example of SUB…END SUB statement.
Ans: Syntax:
Example:
SUB sum (A, B)
S=A+B
PRINT S
END SUB
Model set 5
1. Answer the following questions.
a. In what way does the client server network differ from peer to peer network? Explain
Ans: The difference between client server and peer to peer network are as follows:-
Client Server Peer to Peer
It consists of at least one or more clients. It is a group of computers in which each computer act both
as client and server.
It provides centralized network administration. It lacks centralized network administration.
It provides high reliable security of data and resources. It lack proper security of data and resources.
It is suitable for large organizations. It is suitable for small office and homes.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 6
· Using wizard
b. What is database? Explain with examples.
Ans: Database is the collection of related and organized information that is used to store, organize and extract data.
For examples: -dictionary, telephone directory.
c. What is data type? List any four data types in MS access.
Ans: Data type is an attribute for a field that determines what type of data it can contain.
The four data types are:-
· Text
· Memo
· Currency
· Date/Time
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 7
· It allows sharing the existing database by different programs.
· It provides high security of data and resources as well as maintains accurate database.
7. What is a field? List any two uses of primary key.
Ans: A field is a column in a table that contains a specific piece of information within a record.
The two uses of primary key are:
· To stop duplication of the records in a table.
· To set relationship between tables.
8. What is a query? List any two uses of form in MS Access.
Ans: Query is an object of MS-Access that is used to extract information from a table or multiple linked tables.
The Uses of for in MS-Access are:
· It displays one complete record at a time. SO, using a form, data of a table can be easily edited.
· It allows designing the layout of fields on the screen in any arrangement.
9. What is a local variable?
Ans: Those variables which are not visible to other modules or function and are declared inside a function is known as local
variable.
10. List any two similarities of QBASIC and C language.
Ans: The two similarities of QBASIC and C language are:
· Both of them use high level language.
· Both supports local and global variable.
11. Write the function of FILES and EOF function.
Ans: The functions of:
· FILES: The function of FILES is to display all the files from the diskette.
· EOF(): The function of EOF() is to detect the End of File marker reading from an open sequential file.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 8
7. List out any four objects of MS-Access.
Ans: The four objects of MS-Access are:
· Table
· Form
· Query
· Report
8. Why is report created?
Ans: Reports are created in order to:
· Present the data and information from tables or query in a flexible layout.
· Present data in printed format.
9. What is user defined function?
Ans: The function that is defined by the user according to his/her need in order to fulfill specific task is known as user-
defined function.
10. List out any two numerical data type of C language.
Ans: The two numeric data types of C language are:
· int
· char
11. Write down the function of KILL and OPEN statement.
Ans: The function of:
· KILL: The function of KILL statement is to delete the file or files from the specified drive and directory.
· OPEN: The function of OPEN statement is to open a sequential file one of the three possible operations, i.e. INPUT,
OUTPUT or APPEND.
2. What is a browser? Write any one difference between upload and download.
Ans: A computer program that access web pages and displays them on the user’s screen is
known as web browser.
One difference between upload and download are:
Upload Download
Upload refers to the process of copying files Download refers to the process of copying
or documents or programs or data data or programs or files or
from the user computer to the documents from the internet to users
internet. computer.
3. Name any two media used in multimedia technology. What is digital signature?
Ans: Any two media used in multimedia are:
· Text
· Audio
Digital signature is a security mechanism system in the cyberspace for digital data processing and transaction.
4. What do you mean by backup? Write any two ways to protect hardware.
Ans: A copy of a file that is used in the place of original file being corrupted is known as backup.
Any two ways to protect computer hardware are:
· Regular maintenance
· Insurance Policy
5. How can we confirm that the computer is virus infected? What measures can be adopted to protect computer from
virus?
Ans: We can confirm that computer is virus infection by the following ways:
· Program takes long time to load.
· The floppy disk or hard disk is suddenly accessed without a logical reason.
· Increased use of disk space and growth in file size.
· Renaming the files and folders without the knowledge of the user.
· The measures that can be adopted to protect computer from viruses are:
· Install a powerful anti-virus program to protect and update its virus definition file frequently.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 9
· Do not use the pirated software.
· Do not open suspicious emails and attachments files send by the unknown person.
· Do not use freely distributed software.
6. What is DBMS? Write any two examples of DBMS software.
Ans: DBMS is a software that is used to manage data, manipulate them and provide the information.
The two examples of DBMS are:
· MS-Access
· Oracle
7. What is meant by data sorting? What is a record?
Ans: Data sorting means grouping all the records either in ascending or descending order based on a key field of the record.
Record is a row in a table that contains information about a given person, product or event.
8. What is form? Write any two advantages of using form.
Ans: Form is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
The two advantages of using form are:
· It provides a user-friendly platform for input of data into the database.
· It helps to display data in more presentable form than a datasheet.
9. What is mean by local variable?
Ans: Those variables which are not visible to other modules or function and are declared inside a function is known as local
variable.
10. Write any two data types supported by C language.
Ans: The data types supported by C language are:
· int
· char
· float
· double
11. Write down the function of Name and Kill statement.
Ans: The function of:
· NAME: The function of NAME is to rename a file or group of files from the diskette.
· KILL: The function of KILL statement is to delete the file or files from the specified drive and directory.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 10
Ans: MS-Access is a relational database management system developed by Microsoft Corporation which is used to store and
manipulates large volume of data in the form of tables.
Any two examples of RDBMS are:
· MS-Access
· FOXPRO
7. Differentiate between validation rule and validation text.
Ans: The differences between validation rule and validation text are:
Validation Rule Validation Text
It limits the value that can be accepted into a field. It allows to type text to be displayed if the user input value
is prohibited by the validation text.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 11
5. What is cyber law? Write any two ethical values for computer operators.
Ans: The law which governs the legal issue in the cyberspace regarding the Internet or WWW for digital data processing and
transaction is known as cyber law.
Any two ethical values for computer operators are:
· You should not spread false and illegal information.
· You should not disclose the secrecy of computer.
6. What is Database Management System? Give any two example of database management system software.
Ans: Database Management System is software that is used to manage data, manipulate them and provide the information.
Any two examples of database management system are:
· MS-Access
· Oracle
7. Differentiate between select query and action query.
Select Query Action Query
It is a type of query that is used for extracting specific It is a type of query which makes changes to many
information from one or more tables in a database. records in just single operation.
8. Identify a record, field and value from the following table structure.
Roll Name Marks
1 Rajani Lama 79
2 Mahesh Pandey 75
Ans: In the table:
Records: 1, Rajani Lama, 79, 2, Mahesh Pandey, 75
Field: Roll, Name, Marks
Value: 1,2, Rajani Lama, Mahesh Pandey, 79, 75
9. How do you define global and local variable in QBASIC. Give an example.
Ans: Variables which are declared outside of any function is known as global variable. Their values is not protected from
outside interference and have effect on the variables outside the procedure.
Example: DIM SHARED A, B, N (10)
COMMON SHARED X, Y
Here, A, B, N (), X, Y are global variables
The variable which is declared inside the procedure and is not visible to other modules or function is known as local
variable. Its value is protected from outside interference and has no effect on the variables outside procedure.
Example: SUB SUM (A, B)
S=A+B
PRINT S
END SUB
Here, “S” is the local variable.
10. List any three data types used in C language.
Ans: The three data types of C language are:
· int
· char
11. Write the function of FILES and NAME AS.
Ans: The function of:
· FILES: The function of FILES statement is to display files from the diskette.
· NAME AS: The function of NAME AS is to rename a file of the diskette.
SLC Examination-2065(2009)
a. Define star topology with figure.
Ans: The topology in which all computers or the network devices are connected through a
central device in the shape of star structure is called star topology.
Diagram of star topology
b. List out any four services of internet.
Ans: Any four services of internet are
i) E-mail (Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 12
c. Define computer ethics.
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.
d. Write down two measures of each to protect computer hardware and software.
Ans: Any two hardware security measures are:
i) Insurance Policy ii) Power Regulator Device
Any two software security measures are:
i) Backup ii) Password
SLC Examination-2066(2010)
a) What is computer network?
Ans: computer network means two or more computers connected with each other to share data, hardware, software and other
resources.
b) What is internet?
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all
over the world.
c) Write any four preventive measures to protect computer system from virus infection.
Ans: Any four preventive measures to protect computer system from virus infection are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Don’t install pirated software, especially computer games.
SLC Examination-2067(2011)
a. Write any two examples of data communication.
Ans: Any two examples of data communication are
· E-mail
· Telephone
b. What do you mean by web browser?
Ans: Web browser is a computer program that access web pages and displays them on the user computer.
c. Write any four advantages of multimedia.
Ans: Any four advantages of multimedia are:
i) It makes teaching / learning easier in classroom.
ii) It makes easy to share views, ideas and thoughts among various people.
iii) It can store data and information for longer period.
iv) It makes presentation of related subject matter attractive.
d. Mention any four symptoms of computer virus.
Ans: Any four symptoms of computer virus are:
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
e. What is computer security?
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged
due to accidental or intentional harm is known as computer security.
a) Define DBMS with examples.
Ans: DBMS is a software which is used to manage data, manipulate them and provide the information. Examples of DBMS
are MS-Access and Oracle.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 14
b) What is primary key?
Ans: Primary key is a field that uniquely identifies the record. It is needed because it neither accepts duplicate values
nor null values.
c) Why is report created?
Ans: Report is created to print documents according to user’s specifications of the summarized information through query or
table.
10. i) What is procedure?
Ans: Procedure is a block of statement that solves a particular problem.
SLC Examination-2068(2012)
1. Answer the following questions:
a) Define LAN topology and write any two types of LAN topology.
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as LAN
topology.
Any two types of LAN topology are
i) Bus topology ii) Star topology
b) Write any four services of Internet.
Ans: Any four services of internet are
i) E-mail (Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
c) Write any two advantages of multimedia in education field.
Ans: Any two ad advantages of multimedia in education field are
i) It makes teaching/learning easier in classroom.
iv) It makes presentation of related subject matter attractive.
d) Write any two software security measures.
Ans: Any two software security measures are:
i) Backup
ii) Password
e) Write any four symptoms that show, computer is infected by computer virus.
Ans: Any four symptoms that show, computer is infected by computer virus are :
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
a) What is database?
Ans: Database is a collection of related and organized information that can be used for different purpose.
b) What is data sorting?
Ans: Data sorting means grouping all the records in a table either in ascending or descending order based on a key field of
the record.
c) What is a form?
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked
tables.
10. a) What is loop?
Ans: Loop means executing a statement or group of statements a certain number of times depending upon the condition.
b) List any two data types supported by ‘C’ language.
Ans: Any two data types supported by ‘C’ language are:
i) char
ii) int
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 15
c) State the function of the following statement:
i) EOF
Ans: It detects the end of the file marker reading the data from an open sequential file.
ii) MKDIR
Ans: It creates a subdirectory which is used to manage files.
SLC Examination-2069
1. Answer the following questions:
a) Write any four advantages of computer network.
Ans: Any 4 advantages of computer network are as follows:
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
ii) Information can be exchanged rapidly in computer network.
iii) Computers in a network environment can be updated from any computer.
iv) Software packages can be shared between network connected computers.
b) What is internet? Write the name of any two E-commerce sites.
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all
over the world.
c) What is computer ethic?
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.
d) What is hardware security? Write any two software security measures.
Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or
intentional harm is hardware security.
Any two software security measures are:
i) password
ii) backup
e) What is computer virus?
Ans: Computer virus is a program written by the programmer with the intention of destroying and damaging the data and
programs residing in the computer system.
a) What is database? Give two examples.
Ans: Database is a collection of related and organized information that can be used for different purpose.
Two examples of database are:
i) Dictionary
ii) Telephone Directory
b) Write any two types of primary key.
Ans: The uses of Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
c) What is query?
Ans: Query is an object of Ms-Access which extracts and arranges information from a table.
10.a) What is meant by mode of data file?
Ans: Mode of data file means opening a sequential file for one of the three modes of operation like output mode, input mode
and append mode.
SLC Examination-2070
a) What is network topology? Write any one advantage of star topology.
Ans:- The arrangement or connection pattern of computer or nodes and other devices of the network are known as network
topology.
Any one advantage of star topology is:
i) Failure of single computer or cable doesn’t affect the entire network.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 16
b) Give any two advantages of E-mail over traditional mail.
Any two advantages of E-mail over traditional mail are
i) It allows sending and receiving message across the world at very low cost.
ii) Emails are usually received fairly quickly, most of the time a couple of seconds after they are sent.
c) List any two main aims of formulating cyber law in Nepal.
The two main aims of formulating cyber law in Nepal are:
i) To legalize the transaction through electronic media to control various types of electronic frauds
ii) To punish a person who does criminal activities through electronic means especially on computers.
d) Give any two symptoms of virus attack.
The two symptoms of virus attacks are:
i) Increased use of disk space and growth in file size
ii) Program takes long time to load.
e) Give the importance of UPS to the computer system.
The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides
enough backup electric power to the computer system when there is power failure.
a) Define data and information.
Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense.
Information is an organized collection of related data which gives a complete sense.
b) What is report? Give its importance.
Report is an object of database which displays the output in an effective way to present the data in a printed format.
The importance of report are:
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
c) Name any four data types that can be defined in MS-Access.
Any four data types that can be defined in MS-Access are:
· Text
· Memo
· Number
· Yes/No
10. a) What is a variable?
The data item whose value changes during the execution of a program is called variable.
b) Name any two data types used in C language.
Any two data types used in C language are:
i) char
ii) int
c) Give the functions of:
i) NAME AS
The NAME statement renames a file on a diskette. Only file name changes, data and program
ii) CLOSE
It closes one or all open files.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 17
ii. McAfee
d) What is multimedia? Write any two applications of it.
Ans: The integration of several forms of media like audio, video, animation, etc. to present information in more interactive
and understandable way is known as multimedia.
Any two applications of it are as follows:
i. Adding special effects in movies:
Multimedia is used in movies to add special effects to make movie more realistic and interesting.
ii. Preparing presentation:
Multimedia is used in preparing presentation which helps to convey information in more interesting and interactive way.
e) What do you mean by software security? Write any two methods to protect the computer software.
Ans: The security given to various software or data from being lost or damaged due to accidental or intentional harm is
known as software security.
Any two methods to protect the computer software are:
i. Defragmentation
ii. Scan disk
a) Define data and database.
Ans: Data can be numbers, letters or symbols representing facts and figures that may or may not give complete sense.
Database is a collection of related and organized information that is used to store, organize and extract data.
b) Name any four data types that can be defined in MS-ACCESS.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii. Text
iii. Memo
iv. Auto number
c) What is a form? Give its importance.
Ans: Form is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
Importance of form are as follows:
i. It provides an interactive platform for input if data into the database.
ii. It helps to display data in more presentable form than a datasheet can.
10. a) Define modular programming.
Ans: Modular programming is a technique in which a program is divided into different small manageable program blocks,
which are called modules or sub programs.
b) Name any two data types used in C language.
Ans: Any two data types of C language are:
· char
· int
c) Give the functions of NAME and CLOSE statements.
Ans:
NAME: The function of NAME statement is to rename a file on a diskette
CLOSE: The function of CLOSE statement is to close one or all open files.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 18
Ans: The security given to various hardware tools and equipment from being lost or damaged due to accidental or intentional
harm is known as hardware security. For e.g: protection from theft, power protection device, etc.
The security given to various software and data from being lost or damaged due to accidental or intentional harm is known as
software security. For e.g: defragmentation, scan disk, etc.
a) Define database.
Ans: Database is a collection of related and organized information that is used to store, organize and extract data.
b) Write any four data type used in MS-Access.
Ans: Any four data types used in MS-Access are as follows:
· Number
· Text
· Memo
· Auto number
c) What is query?
Ans: Query is an object of MS-Access which allows selecting specific data from one or more tables.
10. a) What is user defined function?
Ans: The function which is defined by the user according to the need is known as user-defined function.
b) List any two data types used in C language.
Ans: The data types used in C language are:
· Char
· Int
c) Write down the function of the following statements:
i) KILL ii) FILES
Ans: The function of:
i. KILL: It deletes the file or files from the specified drive and directory.
ii. FILES: It displays all the files of the current subdirectory or specified sub directory.
Supplementary Examination 2067
a) Define LAN topology. Draw the Bus topology.
Ans: LAN topology is the arrangement or connection pattern of computers or nodes and other
devices of the network Diagram of Bus topology:
b) What is multimedia? Name any two fields where multimedia is used.
Ans: The integration of several forms of media such as text, audio, video, animation, etc. to
present the information in more attractive and understandable way is known as
multimedia.
Any two fields where multimedia is used are as follows:
i. Multimedia technology in advertisement
ii.Multimedia technology to learn foreign language
c) Give two advantages of e-mail over traditional mail.
Ans: The advantages of e-mail over traditional mail are as follows:
i. It is faster and cheaper.
ii.It allows us to send and receive messages, documents, sounds, etc. across the world.
d) Write any two ways of protecting computer software.
Ans: Any two ways of protecting computer softwares are:
i. Defragmentation
ii.Scan disk
e) What is antivirus? Name any two antivirus software.
Ans: The software designed to detect and remove virus from the computer to ensure a virus free environment is known
as anti-virus software.
Any two anti-virus software are as follows:
i. Norton Antivirus
ii.McAfee
a) What is database? Name any two database software.
Ans: Database is a collection of related and organized information that is used to store, organize and extract data.
Any two database software are as follows:
i. Telephone directory
ii.Dictionary
b) Name any four data types that can be define in MS-Access.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii.Text
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 19
iii. Auto number
iv. Memo
c) What is a report? Give its importance.
Ans: Report is an object of MS-Access that is used to present data in a printed format using a specific layout.
The importance of report are as follows:
i. It presents data and information from table or query in a flexible layout.
ii.It helps to present data in printed format.
10. a) What is a loop?
Ans:The process of repeating a statement or block of statement for a number of times is known as loop.
b) Name any two data types used in C language.
Ans: Any two data types used in C language are:
· int
· char
c) Give the functions of NAME and CLOSE statements.
Ans: The functions of:
i. NAME: It renames a file on a diskette.
ii. CLOSE: It closes one or all open files.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 20
Supplementary Exam 2069
a. What is computer network? Draw the diagram of BUS topology.
A computer network means two or more than two computers connected to each other
to share data, hardware, software and other resources.
Diagram of bus topology:
b. Define Internet and E-mail.
Internet: A collection of millions of computers of different types belonging to various
networks all over the world is known as internet.
E-mail: E-mail is one of the most popular services provided by internet which allows sending and receiving mail through the
internet.
c. Write any four advantages of using multimedia.
Any four advantages of using multimedia are as follows:
i. It makes easy to share views, ideas and thoughts among various people around the world.
ii. It can store data and information for a long period.
iii. It makes the presentation of related subject matter attractive.
iv. It makes teaching-learning easier in classroom.
d. Write any four possible threats to computer security.
Any four possible threats to computer security are:
· Extreme temperature and dust
· Theft of hardware components.
· Voltage fluctuation
· Unauthorized access of data and programs
e. What is anti-virus program? Give any two examples.
The software which is designed to detect and remove viruses from computer system to ensure a virus-free environment is
known as anti-virus software.
Any two examples of anti-virus software are:
i. Norton Antivirus
ii. McAfee
a. What is data? Give any two examples of DBMS software.
Data can be numbers, letters or symbols representing facts and figures, which may or may not give any sense.
Any two examples of DBMS software are:
i. MS-Access
ii. Oracle
b. Write any two things to be considered after assigning primary key for a field.
Any two things to be considered after assigning primary key for a field are as follows:
· Reduce and control duplication of record in a table
· Set the relationship between tables.
c. What is form?
Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
a. Write the difference between SUB procedure and FUNCTION procedure.
The difference between SUB procedure and FUNCTION procedure are as follows:
SUB procedure FUNCTION procedure
Sub procedure does not return a value. FUNCTION procedure must return a value.
SUB procedure is called by CALL statement. FUNCTION procedure is called by statement and
expression method.
SUB-procedure’s name does not accept data type FUNCTION-procedure’s name accepts data type
symbol because it does not need to return a symbols such as $, %, !, #, &, etc. and it
value. depends on the type of value to be returned.
E.g.: FUNCTION REV$ returns string.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 21