Solved Question of Different Examinations-1 1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 21

CDC MODEL QUESTION + NEEMA PUBLICATION 2071 + PABSON, NPABSON, SOS, JEC, SEDIPS 2070 +

SLC 2065 TO 2070 AND SLC SUPPLEMENTARY 2065 TO 2069 SOLUTIONS!!!!

CDC Model Question 2065


1. Define computer network.
Ans: The interconnection of two or more than two computers by the means of transmission medium like cables or without
cables in order to share data, software, applications and other resources is known as computer network.
2. What is internet and email?
Ans: The interconnection of several thousands of computers of different type belonging to various networks all over the
world is known as internet.
E-mail is one of the most popular services of internet which helps to transmit data, text files, and digital photos, audio
or video files from one computer to another over the internet.
3. Write down any four application areas of multimedia.
Ans: The four application areas of multimedia are:
a. Adding special effects in movies
b. Video games
c. Public Accessing
d. Animated Advertisement
4. List any four measures to protect computer software.
Ans: The four measures to protect computer software are:
a. Backup
b. Password
c. Defragmentation
d. Scan disk
5. How can we protect computer from computer virus?
Ans: We can protect computer from virus by the following ways:
a. Install a powerful anti-virus program and update its virus definition file frequently.
b. Do not use pirated software.
c. Do not open suspicious emails and attachment file sent by unknown persons.
d. Do not use free distributed software.
6. What is a DBMS?
Ans: DBMS is software that is used to manage data, manipulate them and provide the information to the user.
7. Make a list of any four types of data used in MS-Access.
Ans: A list offour data types of MS-Access are:
a. Text
b. Memo
c. Currency
d. Date/Time
8. Define query.
Ans: Query is an object of MS-Access that is used to extract information from one or multiple linked tables.
9. What is user-defined function?
Ans: The functions which are defined by the user according to his/her need are known as user-defined function.
10. Write down the function of:
Ans: The functions of:
a. KILL: The function of KILL statement is to delete one or more files from the diskette.
b. MKDIR: The function of MKDIR is to create a sub-directory which is used to manage files.

Neema Publication Set 1


a) List out any four reasons of using computer network.
Ans: The four reasons of using the computer network are as follows:
a. To share hardware devices like printer, hard disk, scanner, etc.
b. To share the different software packages.
c. To exchange information rapidly in the computer network.
d. To access updated data by all computers of the network.
b) How does virus spread from one computer to another?
Ans: Virus spread from one computer to another by following ways:
a. Downloading files or programs from websites which are not secured.
b. Opening of the virus infected e-mail, message and attached files.
c. Using pirated software.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 1
d. Sharing of infected external portable disks like floppy disk, pen drive or CD.
c) List any four media used in multimedia technology.
Ans: The four media used in multimedia technology are as follows:
i) Audio ii) Animation iii) Video iv) Graphics
d) Define the term computer security. Also mention the technique to protect data from the virus.
Ans: Computer security refers to the security given to the computer for the protection of data, application, software and
hardware from being lost or damaged due to accidental or intentional harm.
The technique to protect data from viruses is to use antivirus software.
e) Mention advantages and disadvantages of e-mail.
Ans: The advantages of e-mail are as follows:
a. It is fast, economic and instant communication media.
b. Any form of data like text, pictures, audio or video can be sent through e-mails.
c. The disadvantages of e-mail are as follows:
d. Minor mistakes in e-mail address may deliver the mail to a wrong address.
e. Since, it may passes through a vast electronic network. It may be seized in between.
7. a) Write any four features of DBMS.
Ans: The four features of DBMS are as follows:
a. It controls data redundancy which means duplication of data.
b. It maintains accurate database.
c. It allows sharing the existing database by different programs.
d. It allows updating large volume of data as the specified conditions.
b) What is filtering? Write a difference between sorting and filtering.
Ans: Filtering is an option that selects the required records and displays the result.
The differences between filtering and sorting are as follows:
Sorting Filtering
The arrangement of records on the basis of a field The process of viewing required records of a table
or group of fields of a table either in ascending or that satisfies the specified criteria is known as
descending order is known as sorting. filtering records.

c) Define query. Write its importance in database.


Ans: Query is a database object that creates a datasheet of selected fields and records from one or more tables.
Its importance in database is as follows:
a. To view records including some fields or all the fields of a table or multiple linked table.
b. To perform mass update, delete or append new records to a table.
10. a) Write any two advantages and disadvantages of modular programming.
Ans: The two advantages of modular programming are as follows:
a. Different programmers can design program modules independently.
b. It is easy to design code and test the program modules independently.
The disadvantages of modular programming are as follows:
a. can lead to problems with variable names
b. can lead to problems when modules are linked because link must thoroughly tested
b) Give any two features of C-language.
Ans: The features of C-language are as follows:
i) It is specially used to create system software.
ii) It supports a rich and powerful set of operators.
c) Write down the functions of following statements:
i) KILL: It is used to delete the specified file from a disk
ii) NAME AS: It is used to rename the file of a diskette.

Neema Publication Set 2


a. How does computer network reduces cost of operation?
Ans: Computer network reduces cost of operation because it allows sharing of resources like hardware ,software and
services. For example a printer or one internet connection can be shared by all users of a network. In this way it helps
to save the cost of buying extra hardware or service. Problems can be solved by one or few experts from one place.
This saves the cost of hiring experts for all the branches of the office and the cost of travel by the expert to different
branches.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 2
b. Define the term internet. List out any two services provided by the internet.
Ans: Internet can be defined as the interconnection of several thousands of computers belonging to various networks all
over the world.
Any two services provided by the internet are as follows:
e-commerce IRC(internet relay chat)
c. Define computer security. List out any two measures to protect computer.
Ans: Computer security can be defined as the security given to the data, software and the hardware for their protection from
being lost or damaged due to accidental or intentional harm.
Two measures to protect computer are:
· password · insurance policy
d. What are the reasons of making computer viruses? Explain
Ans: The reasons of making computer viruses are:
a. to stop software piracy
b. to entertain users by displaying interesting messages and pictures
c. to steal data and information
d. to expose the programmers ability
e. to earn money
e. What is cyber law? List any two subjects included in cyber law.
Ans: The law which governs the legal issues in the cyber space regarding the internet or www for digital data processing
wand transaction is known as cyber law.
Two subjects included in cyber law are:
a. Electronic and digital signature law
b. intellectual property law
1. Name any four objects of Access.
Ans: Any four objects of access are:
a. table
b. form
c. report
d. query
2. What is form? Mention any two methods to create form.
Ans: form is a database object used primarily to display records on screen to make it easier to enter new records and to make
changes to the existing records.
Its importance is:
a. using auto form features
b. using form wizard features
3. Differentiate between data and information.
Ans: The differences between data and information are:
Data Information
Data can be letters, numbers, or symbols representing Information is an organized collection of related
facts and figures, which may or may not give data, which gives a complete sense.
complete sense.
For example:- Ram, student, 20, For example: Ram is a student. He is 20 years old.

1. Differentiate between inbuilt function and user defined function.


Ans: The differences between inbuilt function and user defined function are:
In-built function User-defined function
The functions provided by the QBASIC system which The functions written by the programmers to do
are used by the programmer according to the specific task is known as user-defined function.
requirement are known as in-built function.
For Example: LEN, LEFT$, MID$ etc For example|: Function written by using
FUNCTION-END FUNCTION OR SUB-END
SUB
2. Write any two data types used in C language.
Ans: Any two data types used in C language are:
· char
· int
3. Write down the function of MKDIR and CLOSE statement.
Ans: The functions of:

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 3
· MKDIR: The function of MKDIR is to create a sub-directory which is used to manage files.
· CLOSE: The function of CLOSE is to close one or all open file from the diskette.

Model Set 3
1. What is meant by data communication? Explain with any two examples.
Ans: A data communication is the collection of hardware, software and other devices in order to exchange data, information
and voice between two or more than two devices through a bounded or unbounded media.
The two examples of data communication re:
a. E-mail b. Chat
2. Differentiate between chat and email clearly.
Ans: The differences between chat and email are:
Chat e-mail
We can send and receive instant meddase with other There is no need to send instant message. The user can read,
in real time. reply or ignore the message according to his/her wish.
3. Write any four ways of protecting computer from viruses.
Ans: The four ways of protecting computer from viruses are:
· Install a powerful anti-virus program to protect and update its virus definition file frequently.
· Do not use the pirated software.
· Do not open suspicious emails and attachments files send by the unknown person.
· Do not use freely distributed software.
4. How can multimedia help in education field?
Ans: Multimedia can help in education field in the following ways:
· It makes presentation of the related subject matter attractive.
· It makes teaching-learning easier in classroom.
· Presentation can be done in a big screen so that many students can see it.
· It makes easy to share views, thoughts and ideas among students.
5. What is meant by computer security? List out any four software security measures.
Ans: The security given to the computer for the protection of computer hardware, software and other resources from being
lost or damaged due to accidental or intentional harm is known as computer security.
Any four software security measures are:
· Defragmentation
· Scan disk
· Backup
· Password
6. Differentiate between text and memo.
Ans: The differences between text and memo are:
Text Memo
It is used for storing text or combination of text and It is used for storing lengthy text and numbers.
numbers.
It can store up to 255 characters. It can store up to 65,535/64000 characrers.

7. Write any four advantages of DBMS.


Ans: Any four advantages of DBMS are:
· It controls redundancy which means duplication of data.
· Large volume of data can be stored and updates easily.
· It allows sharing the existing database by different programs.
· It provides high security of data and resources as well as maintains accurate database.
8. What do you mean by formatting a table?
Ans: The process of changing column width, row height, hiding columns or changing fonts, font size, font style of data of a
table and table border, etc. is known as formatting a table.
9. Differentiate between function and sub procedure.
Ans: The differences between sub procedure and function procedure are:
Sub procedure Function procedure
it doesnot return any value. It must return a value.
It is enclosed inside SUB……….END SUB. It is enclosed inside FUNCTION…………END FUNCTION.

10. How many keywords are in C language?


Ans: There are 32 keywords in C language.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 4
11. Write down the function of RMDIR and FILES statement.
Ans: The function of :
· RMDIR: The function of RMDIR is to remove empty sub-directory.
· FILES: The function of FILES is to display all the files from the diskette.

Model Questions 4
Answer the following.
a) What is LAN? List out the types of LAN topologies.
Ans: A LAN is a network of computers that are relatively near to each other and are connected in a way that enables them to
communicate by cable and a small wireless device.
The types of LAN topologies are :
· Bus Topology
· Star Topology
· Ring Topology
b) How does Internet differ from Intranet? Explain.
Ans: Internet differs from Intranet as Internet is the interconnection of several thousands of computers of different types
belonging to various networks all over the world whereas Intranet is a private computer network that uses the internet
protocol to securely share any part of information of organization.
c) What are the precautions to protect data from viruses?
Ans: The precautions are:
· Do not download files and programs from the websites without scanning
· Use properly working antivirus software
· Do not exchange internal disk among computers
· Scan the mail or unknown files of Internet before opening in your computer
d) How do you know that your computer is infected from viruses?
Ans: We can know our computer is infected from viruses when:
· Programs take a long time to load
· Unusual increase of the disk space and grow in file size
· Corrupting the system’s data takes place
· Renaming of files with different names
What are the requirements of multimedia computer system?
Ans: The requirements are:
· Computer
· Software (WMP,Adobe Photoshop,etc.)
· CD-ROM/DVD drive
· Sound card
· Microphone
· Speaker
Group ‘B’
a) What is primary key? Give its importance.
Primary key is a field that uniquely identifies the record.
Its importance is:
1) Controls data redundancy and makes the record unique.
2) It sets relationship among the tables.
b) Differentiate between “format” and “input mask”.
 The differences between format and input mask are given below.
Input mask Format
The input mask field property specifies a pattern The format field property specifies the layout for a field i.e.
for all data to be entered in a field. appearance of value when displayed.
This enables to control the manner in which data is This field property only changes the appearance of the data
entered in a field. on the screen but actually doesn’t change the way
how the data is stored in the field.

c) Write the importance of computerized database system in comparison to non-computerized database system.
Ans: The importance of computerized database in comparison to non-computerized database is that it can store large volume
of data and information, and is very fast to find specific record. Data can be sorted in ascending or descending order on
multiple criteria and data can also be kept secure in this system.
Group C

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 5
a) Write the syntax and example of SUB…END SUB statement.
Ans: Syntax:

SUB {sub program name }(parameter list)


<Statement block>
END SUB

Example:
SUB sum (A, B)
S=A+B
PRINT S
END SUB

b) Write a feature of C language.


Ans: The features of C language are:
· It is used to prepare system software.
· It has rich and powerful set of operators.
c) Write the function of :
· OPEN- It opens a sequential file for one of the three operations i.e. appending, writing, reading.
· LINE INPUT# - It reads the entire line or maximum 255 characters from the keyboard or from the sequential file up
to a carriage return.

Model set 5
1. Answer the following questions.
a. In what way does the client server network differ from peer to peer network? Explain
Ans: The difference between client server and peer to peer network are as follows:-
Client Server Peer to Peer
It consists of at least one or more clients. It is a group of computers in which each computer act both
as client and server.
It provides centralized network administration. It lacks centralized network administration.
It provides high reliable security of data and resources. It lack proper security of data and resources.
It is suitable for large organizations. It is suitable for small office and homes.

b. Differentiate between Email and EFax.


Ans: The difference between E-mail and E-fax are given below.
E-mail E-fax
E-mail is one of the popular services of Internet which It is the service of Internet through which user can send
allows exchange of information and computer files and receive faxes directly from a computer to
between computers over a network using Internet. another.

c. What is a backup? Why backups play a vital role in computer security.


Ans: Backup is the system of copying data and programs into another location or creating a duplicate copy of a file.
Backups are vital to computer security because it saves data and programs from being lost or damaged due to accidental or
intentional harm. When data and programs get lost, we can recover from backup.

d. Why IT policy is important in our country. Explain.


Ans: IT policy is important because IT plays a vital role to build up knowledge based society and boost up the economic
condition of any country. For example we can take importance of IT policy in Nepal. Such as, IT policy is needed for
Nepal to provide the general people access to IT to make knowledge based society to established knowledge based
industry and to change the economic conditions of people.
e. What do you mean by virtual reality?
Ans: Virtual reality is an artificial environment created with computer hardware and software and presented to the user in
such a way that it appears real.
7. Answer the following.
a. Define Query. Mention the method to create query.
Ans: Query is an object of MS access that selects specific data from a table or multiple linked tables.
The methods to create query:-
· Using design view.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 6
· Using wizard
b. What is database? Explain with examples.
Ans: Database is the collection of related and organized information that is used to store, organize and extract data.
For examples: -dictionary, telephone directory.
c. What is data type? List any four data types in MS access.
Ans: Data type is an attribute for a field that determines what type of data it can contain.
The four data types are:-
· Text
· Memo
· Currency
· Date/Time

1. Write down the syntax of FUNCTION……END FUNCTION.


Ans: The syntax of FUNCTION…….END FUNCTION is:
FUNCTION Function name (Parameter list)
[Statements of function]
Function Name=Expression
END FUNCTION
2. What is identifier in C language?
Ans: An identifier is a combination of alphanumeric character, the first being the letter of alphabet or an underline and the
remaining being any letter of the alphabet, any numeric digit, or the underline.
3. Write down the function of:
· WRITE#: The function of WRITE# is to send one or more data items to the specified file.
· CLOSE#: The function of CLOSE# is to close one or all open file.

Model Set 6 (PABSON 2070)


1. What is communication media? List any two advantages of client-server network model.
Ans: A communication media is a channel through which data/ signals can be transmitted from one point to another.
Any two advantages of client/server network model are:
· It provides high level of security, since only the authorized person gets access to the service of the network.
· The controlling and managing of workstation computers are done by powerful centralized server computer. So,
administration work becomes easier.
2. What is internet? List nay two advantages of email.
Ans: The interconnection of million thousands of computers of different types belonging to various networks all over the
world is known as internet.
The advantages of email are:
· It is fast, economic and instant communication media.
· Any form of data like text, image, audio, or video can be sent through e-mail.
3. List any four advantages of multimedia.
Ans: The four advantages of multimedia are:
· It makes easy to share views, ideas and thoughts among various people around the world.
· It can store the data and information for a long period.
· It is very cheap to get the knowledge about the related subject matter in a short time through multimedia.
· It makes the presentation of the related subject matter attractive.
4. What is the role of UPS in the computer security?
Ans: The role of UPS is to control the fluctuation of electric voltage and provide enough backup electric power to the
computer system when there is power failure so important data or files can be stored and computer can be turned off
properly.
5. List any four preventive measures for protecting computer from computer viruses.
Ans: Any four preventive measures of protecting computer from computer virus are:
· Install a powerful anti-virus program to protect and update its virus definition file frequently.
· Do not use the pirated software.
· Do not open suspicious emails and attachments files send by the unknown person.
· Do not use freely distributed software.
6. List any four advantages of DBMS.
Ans: Any four advantages of DBMS are:
· It controls redundancy which means duplication of data.
· Large volume of data can be stored and updates easily.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 7
· It allows sharing the existing database by different programs.
· It provides high security of data and resources as well as maintains accurate database.
7. What is a field? List any two uses of primary key.
Ans: A field is a column in a table that contains a specific piece of information within a record.
The two uses of primary key are:
· To stop duplication of the records in a table.
· To set relationship between tables.
8. What is a query? List any two uses of form in MS Access.
Ans: Query is an object of MS-Access that is used to extract information from a table or multiple linked tables.
The Uses of for in MS-Access are:
· It displays one complete record at a time. SO, using a form, data of a table can be easily edited.
· It allows designing the layout of fields on the screen in any arrangement.
9. What is a local variable?
Ans: Those variables which are not visible to other modules or function and are declared inside a function is known as local
variable.
10. List any two similarities of QBASIC and C language.
Ans: The two similarities of QBASIC and C language are:
· Both of them use high level language.
· Both supports local and global variable.
11. Write the function of FILES and EOF function.
Ans: The functions of:
· FILES: The function of FILES is to display all the files from the diskette.
· EOF(): The function of EOF() is to detect the End of File marker reading from an open sequential file.

Model Set 7(NPABSON 2070)


1. What is telecommunication? List any two elements of telecommunication.
Ans: A system of transmission of sounds, images, text or data in the form of electronic signals is known as
telecommunication.
Any two elements of telecommunication are:
· A transmitter that takes information and converts it to signal.
· A transmission medium that carries the signal.
2. Write any two advantages of email service of internet.
Ans: The two advantages of e-mail service of the internet are as follows:
· It is fast, economic and instant communication media.
· Any form of data like text, image, audio, or video can be sent through e-mail.
3. What is hardware security? Suggest any two techniques for securing computer hardware.
Ans: The security given to the computer hardware tools and equipment’s from being lost or damages due to accidental or
intentional harm is known as hardware security.
The techniques for securing computer hardware are:
· Insurance Policy
· Power Protection Device
· Protection from Dust and Extreme Temperature.
· Regular maintenance
4. What is multimedia?
Ans: The integration of several form of media such as text, image, audio, video and animation in order to present the data
and information in more interactive and attractive way is known as multimedia.
5. What is a computer virus? Five an objective of developing a computer virus.
Ans: The type of computer program written by the computer programmer with the intent of damaging and destroying the
data and resources located in the computer memory are known as computer viruses.
The objectives of developing computer virus are:
· To stop computer piracy.
· To entertain user by displaying interesting messages or pictures.
· To destroy data, information and files.
· To expose the programmers ability.
· To earn money.
6. List any two functions of DBMS.
Ans: The two functions of DBMS are:
· It controls redundancy which means duplication of data.
· Large volume of data can be stored and updates easily.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 8
7. List out any four objects of MS-Access.
Ans: The four objects of MS-Access are:
· Table
· Form
· Query
· Report
8. Why is report created?
Ans: Reports are created in order to:
· Present the data and information from tables or query in a flexible layout.
· Present data in printed format.
9. What is user defined function?
Ans: The function that is defined by the user according to his/her need in order to fulfill specific task is known as user-
defined function.
10. List out any two numerical data type of C language.
Ans: The two numeric data types of C language are:
· int
· char
11. Write down the function of KILL and OPEN statement.
Ans: The function of:
· KILL: The function of KILL statement is to delete the file or files from the specified drive and directory.
· OPEN: The function of OPEN statement is to open a sequential file one of the three possible operations, i.e. INPUT,
OUTPUT or APPEND.

Model Set 8 (JOINT EXAMINATION COMMITTEE 2070)

1. Define ring topology with figure.


Ans: The topology in which computers are connected in the shape of circle without any
end points is known as ring topology.
The figure of ring topology is:

2. What is a browser? Write any one difference between upload and download.
Ans: A computer program that access web pages and displays them on the user’s screen is
known as web browser.
One difference between upload and download are:
Upload Download
Upload refers to the process of copying files Download refers to the process of copying
or documents or programs or data data or programs or files or
from the user computer to the documents from the internet to users
internet. computer.

3. Name any two media used in multimedia technology. What is digital signature?
Ans: Any two media used in multimedia are:
· Text
· Audio
Digital signature is a security mechanism system in the cyberspace for digital data processing and transaction.
4. What do you mean by backup? Write any two ways to protect hardware.
Ans: A copy of a file that is used in the place of original file being corrupted is known as backup.
Any two ways to protect computer hardware are:
· Regular maintenance
· Insurance Policy
5. How can we confirm that the computer is virus infected? What measures can be adopted to protect computer from
virus?
Ans: We can confirm that computer is virus infection by the following ways:
· Program takes long time to load.
· The floppy disk or hard disk is suddenly accessed without a logical reason.
· Increased use of disk space and growth in file size.
· Renaming the files and folders without the knowledge of the user.
· The measures that can be adopted to protect computer from viruses are:
· Install a powerful anti-virus program to protect and update its virus definition file frequently.
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 9
· Do not use the pirated software.
· Do not open suspicious emails and attachments files send by the unknown person.
· Do not use freely distributed software.
6. What is DBMS? Write any two examples of DBMS software.
Ans: DBMS is a software that is used to manage data, manipulate them and provide the information.
The two examples of DBMS are:
· MS-Access
· Oracle
7. What is meant by data sorting? What is a record?
Ans: Data sorting means grouping all the records either in ascending or descending order based on a key field of the record.
Record is a row in a table that contains information about a given person, product or event.
8. What is form? Write any two advantages of using form.
Ans: Form is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
The two advantages of using form are:
· It provides a user-friendly platform for input of data into the database.
· It helps to display data in more presentable form than a datasheet.
9. What is mean by local variable?
Ans: Those variables which are not visible to other modules or function and are declared inside a function is known as local
variable.
10. Write any two data types supported by C language.
Ans: The data types supported by C language are:
· int
· char
· float
· double
11. Write down the function of Name and Kill statement.
Ans: The function of:
· NAME: The function of NAME is to rename a file or group of files from the diskette.
· KILL: The function of KILL statement is to delete the file or files from the specified drive and directory.

Model Set 9 (SEDIPS 2070)


1. What is network protocol? Give any two examples of protocols belongings to TCP/IP family.
Ans: A set of rules that must be followed by sender and receiver to make communication possible is known as network
protocol.
Two examples of protocols belonging to TCP/IP family are:
· FTP(File Transfer Protocol)
· HTTP(Hyper Text Transfer Protocol)
2. Mention any four symptoms of computer virus.
Ans: Any four symptoms of computer virus are:
· Program takes long time to load.
· The floppy disk or hard disk is suddenly accessed without a logical reason.
· Increased use of disk space and growth in file size.
· Renaming the files and folders without the knowledge of the user.
3. What do you mean by cyber law? When was cyber law of Nepal introduced?
Ans: The law which governs the legal issue in the cyberspace regarding the Internet or WWW for digital data processing
and transaction is known as cyber law.
Cyber law was introduced in Nepal on 30stBhadra 2061 B.S. (15th September 2004 A.D.)
4. What is interactive multimedia? List any two interactive multimedia?
Ans: Interactive multimedia is the integration of several forms of media such as text, audio, video, graphics and animation
that is used to display information in more attractive and understandable way.
Any two interactive multimedia are:
· Multimedia in advertisement
· Special effect in movies
5. What is website? Give any two examples of website that belongs to Microsoft Corporation.
Ans: Website is a collection of web pages that can be published by an organization or individual.
Any two examples of websites that belongs to Microsoft Corporation are:
· www.msn.com
· www.microsoft.com
6. What is MS-Access? Give any two examples of RDBMS.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 10
Ans: MS-Access is a relational database management system developed by Microsoft Corporation which is used to store and
manipulates large volume of data in the form of tables.
Any two examples of RDBMS are:
· MS-Access
· FOXPRO
7. Differentiate between validation rule and validation text.
Ans: The differences between validation rule and validation text are:
Validation Rule Validation Text
It limits the value that can be accepted into a field. It allows to type text to be displayed if the user input value
is prohibited by the validation text.

8. What do you mean by action query? Mention its types.


Ans: The query that makes changes to many records in just single operation is known as action query.
The types of action query are:
· Update query
· Append query
· Delete query
· Make table query
9. Differentiate between program file and data file.
Ans: The difference between program file and data file are:
Data file Program file
It is a collection of the related data stored in the hard disk A program file is a file which contains a set of
or any other secondary storage devices separately instructions written in a computer language.
from the program that used it.

10. What is unary operator? Give any one example.


Ans: A unary operator is an operator that takes a single operand in an expression or a statement. Example: ++, --, etc.
11. Give syntax and an example of OPEN statement.
Ans: The syntax of OPEN statement is:
OPEN “filename.ext” FOR <mode> AS #filenumber
Example: OPEN “student.dat” FOR OUTPUT AS #1

Model Set 10 (SOS)


1. “Computer Network reduces cost”. Give any two points to support this statement.
Ans: Computer network reduces the cost of operation as it allows sharing of resources like hardware, software and services-
for example: a printer or one internet connection can be shared by all the users of anetwork. In this way, it helps to
save the cost of a buying extra hardware or services. Problems of the computers in a network can be solved by one or
few experts from one place. This saves the cost of hiring experts for all the branches of an office and the cost of travel
by the expert to different branches.
2. What is a backup? Why is backup vital to computer security system?
Ans: A copy of a file that is used in the place of original file being corrupted is known as backup.
Backup are vital to the computer system in order to save the important data from being lost or damaged due to accidental or
intention harm. When data and software are damaged or lost, we can easily recover it from backup copy.
3. How does virus spread from one computer to another?
Ans: Backup spread from one computer to another by the following ways:
· Sharing of infected portable disk like floppy disk, pen drive, CDs, etc.
· Opening a virus infected emails, messages and attached files.
· Downloading files and programs from the websites which are not secure.
· Exchanging data and information over a network.
4. What do you mean by multimedia? Name any four media used in multimedia technology.
Ans: The integration of several form of media such as text, image, audio, video and animation in order to present the data
and information in more interactive and attractive way is known as multimedia.
The names of any four media of multimedia are:
· Text
· Audio
· Video
· Animation

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 11
5. What is cyber law? Write any two ethical values for computer operators.
Ans: The law which governs the legal issue in the cyberspace regarding the Internet or WWW for digital data processing and
transaction is known as cyber law.
Any two ethical values for computer operators are:
· You should not spread false and illegal information.
· You should not disclose the secrecy of computer.
6. What is Database Management System? Give any two example of database management system software.
Ans: Database Management System is software that is used to manage data, manipulate them and provide the information.
Any two examples of database management system are:
· MS-Access
· Oracle
7. Differentiate between select query and action query.
Select Query Action Query
It is a type of query that is used for extracting specific It is a type of query which makes changes to many
information from one or more tables in a database. records in just single operation.

8. Identify a record, field and value from the following table structure.
Roll Name Marks
1 Rajani Lama 79
2 Mahesh Pandey 75
Ans: In the table:
Records: 1, Rajani Lama, 79, 2, Mahesh Pandey, 75
Field: Roll, Name, Marks
Value: 1,2, Rajani Lama, Mahesh Pandey, 79, 75
9. How do you define global and local variable in QBASIC. Give an example.
Ans: Variables which are declared outside of any function is known as global variable. Their values is not protected from
outside interference and have effect on the variables outside the procedure.
Example: DIM SHARED A, B, N (10)
COMMON SHARED X, Y
Here, A, B, N (), X, Y are global variables
The variable which is declared inside the procedure and is not visible to other modules or function is known as local
variable. Its value is protected from outside interference and has no effect on the variables outside procedure.
Example: SUB SUM (A, B)
S=A+B
PRINT S
END SUB
Here, “S” is the local variable.
10. List any three data types used in C language.
Ans: The three data types of C language are:
· int
· char
11. Write the function of FILES and NAME AS.
Ans: The function of:
· FILES: The function of FILES statement is to display files from the diskette.
· NAME AS: The function of NAME AS is to rename a file of the diskette.

SLC Examination-2065(2009)
a. Define star topology with figure.
Ans: The topology in which all computers or the network devices are connected through a
central device in the shape of star structure is called star topology.
Diagram of star topology
b. List out any four services of internet.
Ans: Any four services of internet are
i) E-mail (Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 12
c. Define computer ethics.
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.
d. Write down two measures of each to protect computer hardware and software.
Ans: Any two hardware security measures are:
i) Insurance Policy ii) Power Regulator Device
Any two software security measures are:
i) Backup ii) Password

e. What is anti-virus? Write down any two examples of anti-virus software.


Ans: Antivirus software is software designed to detect and remove virus from computer system to ensure virus free
environment.
Any two examples of antivirus software are:
i) Kaspersky ii) NOD32
7. Answer the following question:
a) What is database?
Ans: Database is a collection of related and organized information that can be used for different purpose.
b) While designing table structure which data types are suitable to store information about teacher’s name,
address, salary, and date of birth.
While designing table structure the data types are suitable to store information about
teacher’s name = Text
Address = Memo
Salary = currency
Date of birth = Date / Time
c) Write down any two advantages of Query.
Any two importance of query are:
· It allows user to make calculations and change data in automated fashion.
· It provides option to delete all the unwanted data matching certain criteria.
10. a) Write down one difference between function and sub procedure.
Ans: One difference between function and sub procedure are given below:
Sub Procedure Function Procedure
It doesn’t not return value. It does not return any value.

b) List any two data type used in C language.


Ans: Any two data type used in C language is char and int
c) Write down the functions of:
i) RMDIR
· Ans:It is used to remove or delete only the subdirectories from a disk. It can remove only empty subdirectories.
ii) NAME
· Ans: The NAME statement renames a file on a disk.

SLC Examination-2066(2010)
a) What is computer network?
Ans: computer network means two or more computers connected with each other to share data, hardware, software and other
resources.
b) What is internet?
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all
over the world.
c) Write any four preventive measures to protect computer system from virus infection.
Ans: Any four preventive measures to protect computer system from virus infection are:
i) Write protect your floppy disks when using them on other computers.
ii) Scan the mail or unknown files of internet before opening in your computers.
iii) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
iv) Don’t install pirated software, especially computer games.

d) Write any two software used for multimedia.


Ans: Any two software used for multimedia are:
· Windows Media Player
· VLC Media Player
Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 13
e) What is hardware security?
Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or
intentional harm is hardware security.
a) What is DBMS? Write any two examples of DBMS software.
Ans: DBMS is a software which is used to manage data, manipulate them and provide the information. Examples of DBMS
are MS-Access and Oracle.
b) List any four data types used in MS-Access.
Ans: Any four data types used in Ms-Access are:
· Text
· Memo
· Number
· Yes/No
c) What is form? Write any two advantages of using form.
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked
tables.
Any two advantages of using form are:
· It helps to display data in more presentable form than a datasheet can.
· It provides an interactive platform for input of data into the database.
10. a) What is modular program?
Modular program is a technique used to divide program into many small, manageable, logical and functional modules
or blocks.
b) Write any two advantages of Structured programming.
Ans: Any two advantages of Structured programming
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the function of following statement:
i) Files
· Ans: The FILES statement displays the files of the current sub directory or specified sub directory.
· ii) KILL
Ans: The KILL statement deletes the file or files from the specified drive and directory.

SLC Examination-2067(2011)
a. Write any two examples of data communication.
Ans: Any two examples of data communication are
· E-mail
· Telephone
b. What do you mean by web browser?
Ans: Web browser is a computer program that access web pages and displays them on the user computer.
c. Write any four advantages of multimedia.
Ans: Any four advantages of multimedia are:
i) It makes teaching / learning easier in classroom.
ii) It makes easy to share views, ideas and thoughts among various people.
iii) It can store data and information for longer period.
iv) It makes presentation of related subject matter attractive.
d. Mention any four symptoms of computer virus.
Ans: Any four symptoms of computer virus are:
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
e. What is computer security?
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged
due to accidental or intentional harm is known as computer security.
a) Define DBMS with examples.
Ans: DBMS is a software which is used to manage data, manipulate them and provide the information. Examples of DBMS
are MS-Access and Oracle.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 14
b) What is primary key?
Ans: Primary key is a field that uniquely identifies the record. It is needed because it neither accepts duplicate values
nor null values.
c) Why is report created?
Ans: Report is created to print documents according to user’s specifications of the summarized information through query or
table.
10. i) What is procedure?
Ans: Procedure is a block of statement that solves a particular problem.

ii) Write any two characteristics of C language.


Ans: Any two characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
iii) Write the function of:
· -INPUT : It reads data from the sequential data file.
· -MKDIR: It creates a subdirectory which is used to manage files.

SLC Examination-2068(2012)
1. Answer the following questions:
a) Define LAN topology and write any two types of LAN topology.
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as LAN
topology.
Any two types of LAN topology are
i) Bus topology ii) Star topology
b) Write any four services of Internet.
Ans: Any four services of internet are
i) E-mail (Electronic mail)
ii) FTP (File Transfer Protocol)
iii) IRC (internet Relay Chat)
iv) E-commerce
c) Write any two advantages of multimedia in education field.
Ans: Any two ad advantages of multimedia in education field are
i) It makes teaching/learning easier in classroom.
iv) It makes presentation of related subject matter attractive.
d) Write any two software security measures.
Ans: Any two software security measures are:
i) Backup
ii) Password
e) Write any four symptoms that show, computer is infected by computer virus.
Ans: Any four symptoms that show, computer is infected by computer virus are :
i) Program takes long time to load.
ii) The floppy disk or hard disk is suddenly accessed without a logical reason.
iii) Increased use of disk space and growth in file size.
iv) Corrupting the system data.
a) What is database?
Ans: Database is a collection of related and organized information that can be used for different purpose.
b) What is data sorting?
Ans: Data sorting means grouping all the records in a table either in ascending or descending order based on a key field of
the record.

c) What is a form?
Ans: Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked
tables.
10. a) What is loop?
Ans: Loop means executing a statement or group of statements a certain number of times depending upon the condition.
b) List any two data types supported by ‘C’ language.
Ans: Any two data types supported by ‘C’ language are:
i) char
ii) int

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 15
c) State the function of the following statement:
i) EOF
Ans: It detects the end of the file marker reading the data from an open sequential file.
ii) MKDIR
Ans: It creates a subdirectory which is used to manage files.
SLC Examination-2069
1. Answer the following questions:
a) Write any four advantages of computer network.
Ans: Any 4 advantages of computer network are as follows:
i) Computer in a network can access network connected hardware devices like printer, disk drives, etc.
ii) Information can be exchanged rapidly in computer network.
iii) Computers in a network environment can be updated from any computer.
iv) Software packages can be shared between network connected computers.
b) What is internet? Write the name of any two E-commerce sites.
Ans: Internet is an interconnection of several thousands of computers of different types belonging to the various networks all
over the world.
c) What is computer ethic?
Ans: Computer ethics is the set of moral principles or code of conducts that should be followed by computer user.
d) What is hardware security? Write any two software security measures.
Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or
intentional harm is hardware security.
Any two software security measures are:
i) password
ii) backup
e) What is computer virus?
Ans: Computer virus is a program written by the programmer with the intention of destroying and damaging the data and
programs residing in the computer system.
a) What is database? Give two examples.
Ans: Database is a collection of related and organized information that can be used for different purpose.
Two examples of database are:
i) Dictionary
ii) Telephone Directory
b) Write any two types of primary key.
Ans: The uses of Primary key are:
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
c) What is query?
Ans: Query is an object of Ms-Access which extracts and arranges information from a table.
10.a) What is meant by mode of data file?
Ans: Mode of data file means opening a sequential file for one of the three modes of operation like output mode, input mode
and append mode.

b) Write any two characteristics of ‘C’ language.


Ans: The characteristics are :
i) It is a high level language with some features of low level language.
ii) It is mostly used to prepare system software.
c) Write the function of the following statements:
i) NAME
Ans: The NAME statement renames a file on a disk.
ii) KILL
Ans: The KILL statement deletes the file or files from the specified drive and directory.

SLC Examination-2070
a) What is network topology? Write any one advantage of star topology.
Ans:- The arrangement or connection pattern of computer or nodes and other devices of the network are known as network
topology.
Any one advantage of star topology is:
i) Failure of single computer or cable doesn’t affect the entire network.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 16
b) Give any two advantages of E-mail over traditional mail.
Any two advantages of E-mail over traditional mail are
i) It allows sending and receiving message across the world at very low cost.
ii) Emails are usually received fairly quickly, most of the time a couple of seconds after they are sent.
c) List any two main aims of formulating cyber law in Nepal.
The two main aims of formulating cyber law in Nepal are:
i) To legalize the transaction through electronic media to control various types of electronic frauds
ii) To punish a person who does criminal activities through electronic means especially on computers.
d) Give any two symptoms of virus attack.
The two symptoms of virus attacks are:
i) Increased use of disk space and growth in file size
ii) Program takes long time to load.
e) Give the importance of UPS to the computer system.
The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides
enough backup electric power to the computer system when there is power failure.
a) Define data and information.
Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense.
Information is an organized collection of related data which gives a complete sense.
b) What is report? Give its importance.
Report is an object of database which displays the output in an effective way to present the data in a printed format.
The importance of report are:
i) It displays the information the way we want to view it.
iii) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.
c) Name any four data types that can be defined in MS-Access.
Any four data types that can be defined in MS-Access are:
· Text
· Memo
· Number
· Yes/No
10. a) What is a variable?
The data item whose value changes during the execution of a program is called variable.
b) Name any two data types used in C language.
Any two data types used in C language are:
i) char
ii) int
c) Give the functions of:
i) NAME AS
The NAME statement renames a file on a diskette. Only file name changes, data and program
ii) CLOSE
It closes one or all open files.

SLC Supplementary Examination-2065


1. Answer the following questions:
a) Explain about network topology. Write any two advantages of computer networking.
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as network
topology.
Any two advantages of computer networking are :
i. Computer in network share different software packages.
ii. Communication made by computer network is very cheap.
b) What is internet? Write any two advantages of Internet.
Ans: Internet is a collection of millions of computers of different types belonging to various networks all over the world.
Any two advantages of internet are as follows:
i. The internet provides very fast and cheap communication.
ii. It is easy to access information of different governments and countries.
c) What is antivirus software? List any two antivirus software.
Ans: Those software which are designed to detect and remove viruses from the computer system to ensure a virus free
environment is known as anti-virus software.
Any two antivirus software are:
i. Norton Antivirus

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 17
ii. McAfee
d) What is multimedia? Write any two applications of it.
Ans: The integration of several forms of media like audio, video, animation, etc. to present information in more interactive
and understandable way is known as multimedia.
Any two applications of it are as follows:
i. Adding special effects in movies:
Multimedia is used in movies to add special effects to make movie more realistic and interesting.
ii. Preparing presentation:
Multimedia is used in preparing presentation which helps to convey information in more interesting and interactive way.
e) What do you mean by software security? Write any two methods to protect the computer software.
Ans: The security given to various software or data from being lost or damaged due to accidental or intentional harm is
known as software security.
Any two methods to protect the computer software are:
i. Defragmentation
ii. Scan disk
a) Define data and database.
Ans: Data can be numbers, letters or symbols representing facts and figures that may or may not give complete sense.
Database is a collection of related and organized information that is used to store, organize and extract data.
b) Name any four data types that can be defined in MS-ACCESS.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii. Text
iii. Memo
iv. Auto number
c) What is a form? Give its importance.
Ans: Form is an object of MS-Access that provides user friendly interface to enter data in a table or multiple linked tables.
Importance of form are as follows:
i. It provides an interactive platform for input if data into the database.
ii. It helps to display data in more presentable form than a datasheet can.
10. a) Define modular programming.
Ans: Modular programming is a technique in which a program is divided into different small manageable program blocks,
which are called modules or sub programs.
b) Name any two data types used in C language.
Ans: Any two data types of C language are:
· char
· int
c) Give the functions of NAME and CLOSE statements.
Ans:
NAME: The function of NAME statement is to rename a file on a diskette
CLOSE: The function of CLOSE statement is to close one or all open files.

Supplementary Examination 2066


a) What is bandwidth?
Ans: The data handling capacity of a communication system is known as bandwidth.
b) What is network topology?
Ans: The arrangement or connection pattern of computers or nodes and other devices of the network is known as network
topology.
c) How can multimedia help in education?
Ans: Multimedia technology is very much useful in education. It helps to present the information about various topics in
more interesting and interactive way which makes the learner easy to understand. It helps to give better ideas and
concept to the students with good vocabulary.
d) Write any four safety measures to protect computer form virus.
Ans: Any four safety measures to protect computer from viruses are:
· Write-protect your floppy disk when using them on other computers.
· Do not install pirated software, especially computer games.
· Always scan files downloaded from the internet or transferred over the network before executing them.
· Do not interchange internal disk among the computers.
e) What is computer hardware and software security?

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 18
Ans: The security given to various hardware tools and equipment from being lost or damaged due to accidental or intentional
harm is known as hardware security. For e.g: protection from theft, power protection device, etc.
The security given to various software and data from being lost or damaged due to accidental or intentional harm is known as
software security. For e.g: defragmentation, scan disk, etc.
a) Define database.
Ans: Database is a collection of related and organized information that is used to store, organize and extract data.
b) Write any four data type used in MS-Access.
Ans: Any four data types used in MS-Access are as follows:
· Number
· Text
· Memo
· Auto number
c) What is query?
Ans: Query is an object of MS-Access which allows selecting specific data from one or more tables.
10. a) What is user defined function?
Ans: The function which is defined by the user according to the need is known as user-defined function.
b) List any two data types used in C language.
Ans: The data types used in C language are:
· Char
· Int
c) Write down the function of the following statements:
i) KILL ii) FILES
Ans: The function of:
i. KILL: It deletes the file or files from the specified drive and directory.
ii. FILES: It displays all the files of the current subdirectory or specified sub directory.
Supplementary Examination 2067
a) Define LAN topology. Draw the Bus topology.
Ans: LAN topology is the arrangement or connection pattern of computers or nodes and other
devices of the network Diagram of Bus topology:
b) What is multimedia? Name any two fields where multimedia is used.
Ans: The integration of several forms of media such as text, audio, video, animation, etc. to
present the information in more attractive and understandable way is known as
multimedia.
Any two fields where multimedia is used are as follows:
i. Multimedia technology in advertisement
ii.Multimedia technology to learn foreign language
c) Give two advantages of e-mail over traditional mail.
Ans: The advantages of e-mail over traditional mail are as follows:
i. It is faster and cheaper.
ii.It allows us to send and receive messages, documents, sounds, etc. across the world.
d) Write any two ways of protecting computer software.
Ans: Any two ways of protecting computer softwares are:
i. Defragmentation
ii.Scan disk
e) What is antivirus? Name any two antivirus software.
Ans: The software designed to detect and remove virus from the computer to ensure a virus free environment is known
as anti-virus software.
Any two anti-virus software are as follows:
i. Norton Antivirus
ii.McAfee
a) What is database? Name any two database software.
Ans: Database is a collection of related and organized information that is used to store, organize and extract data.
Any two database software are as follows:
i. Telephone directory
ii.Dictionary
b) Name any four data types that can be define in MS-Access.
Ans: Any four data types that can be defined in MS-Access are as follows:
i. Number
ii.Text

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 19
iii. Auto number
iv. Memo
c) What is a report? Give its importance.
Ans: Report is an object of MS-Access that is used to present data in a printed format using a specific layout.
The importance of report are as follows:
i. It presents data and information from table or query in a flexible layout.
ii.It helps to present data in printed format.
10. a) What is a loop?
Ans:The process of repeating a statement or block of statement for a number of times is known as loop.
b) Name any two data types used in C language.
Ans: Any two data types used in C language are:
· int
· char
c) Give the functions of NAME and CLOSE statements.
Ans: The functions of:
i. NAME: It renames a file on a diskette.
ii. CLOSE: It closes one or all open files.

Supplementary Examination 2068


a) Define Computer network.
Ans: A computer network means two or more than two computers connected to each other to share data, hardware, software
and other resources.
b) What is E-mail? Give an example of valid E-mail I.D.
Ans: E-mail is one of the most popular service provided by the internet which is used to send and receive mail through the
internet.
An example of valid E-mail I.D. is shr_ram01@gmail.com
c) Write any two advantages of multimedia in educational field.
Ans: Any two advantages of multimedia in educational field are:
· It helps to present the information in more interactive and understandable way.
· It makes studying much more interesting.
d) What is a computer hardware security?
Ans: The security given to various hardware tools and equipment from being lost or damaged due to accidental or intentional
harm is known as computer hardware security. For e.g.: fire detector, protection from theft, etc.
e) What is a computer virus?
Ans: A type of computer program which is written by the programmer with the intent of damaging or destroying the data
and programs residing in the computer system is known as computer virus.
a) What is database?
Ans: Database is a collection of related and organized information that is used to store, organize and extract data.
b) What data types are used to store salary and date of the birth?
Ans: The data types that are used for:
· Salary – Currency
· Date of birth – Date/Time
c) What is query?
Ans: Query is an object of MS-Access which allows selecting specific data from one or more tables.
10. a) Mention the types of procedure.
Ans: The types of procedures are:
i. Function Procedure
ii. Sub Procedure
b) Write any one difference between Q-Basic and C language.
Ans: The difference between Q-Basic and C language are as follows:
Qbasic C Language
It is mostly used to design application software. It is mostly used to prepare system software.

c) Write the functions of the following:


i) KILL ii) RMDIR
Ans: The function of:
i. KILL: It deletes the file or files from the specified drive or directory.
ii. RMDIR: It removes or deletes only sub directory from a disk

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 20
Supplementary Exam 2069
a. What is computer network? Draw the diagram of BUS topology.
A computer network means two or more than two computers connected to each other
to share data, hardware, software and other resources.
Diagram of bus topology:
b. Define Internet and E-mail.
Internet: A collection of millions of computers of different types belonging to various
networks all over the world is known as internet.
E-mail: E-mail is one of the most popular services provided by internet which allows sending and receiving mail through the
internet.
c. Write any four advantages of using multimedia.
Any four advantages of using multimedia are as follows:
i. It makes easy to share views, ideas and thoughts among various people around the world.
ii. It can store data and information for a long period.
iii. It makes the presentation of related subject matter attractive.
iv. It makes teaching-learning easier in classroom.
d. Write any four possible threats to computer security.
Any four possible threats to computer security are:
· Extreme temperature and dust
· Theft of hardware components.
· Voltage fluctuation
· Unauthorized access of data and programs
e. What is anti-virus program? Give any two examples.
The software which is designed to detect and remove viruses from computer system to ensure a virus-free environment is
known as anti-virus software.
Any two examples of anti-virus software are:
i. Norton Antivirus
ii. McAfee
a. What is data? Give any two examples of DBMS software.
Data can be numbers, letters or symbols representing facts and figures, which may or may not give any sense.
Any two examples of DBMS software are:
i. MS-Access
ii. Oracle
b. Write any two things to be considered after assigning primary key for a field.
Any two things to be considered after assigning primary key for a field are as follows:
· Reduce and control duplication of record in a table
· Set the relationship between tables.

c. What is form?
Form is an object of MS-Access which provides a user friendly interface to enter data in a table or multiple linked tables.
a. Write the difference between SUB procedure and FUNCTION procedure.
The difference between SUB procedure and FUNCTION procedure are as follows:
SUB procedure FUNCTION procedure
Sub procedure does not return a value. FUNCTION procedure must return a value.
SUB procedure is called by CALL statement. FUNCTION procedure is called by statement and
expression method.
SUB-procedure’s name does not accept data type FUNCTION-procedure’s name accepts data type
symbol because it does not need to return a symbols such as $, %, !, #, &, etc. and it
value. depends on the type of value to be returned.
E.g.: FUNCTION REV$ returns string.

b. Write the two basic data types used in “C” language.


The basic data types used in C language are as follows:
· char
· int
c. Write the function of the following statements:
i. NAME: The function of NAME statement is to rename a file on a diskette.
ii. CLOSE: The function of CLOSE statement is to close one or all open file.

Rishi Raj Gauro [Paragon Public School, Prasphutan International Academy, Nalanda Vidhya Mandir] Page 21

You might also like