Full width home advertisement

Grade 10 Revision

Post Page Advertisement [Top]

SEE practice questions for Winter Vacation

Set 1

Fundamentals:
1. Define computer network. Write any two advantages.
2. Differentiate between internet and intranet.
3. Mention any four ways for securing the computer software
4. Convert: (BAA)16 into Octal
5. Divide: 110111 by 111
6. Write the full forms of URL, WWW, HTTP, FTP,VOIP, FAT, FAQ


DBMS:
1. Define data and database.
2. Differentiate between form and report.
3. What is primary key? Write its importance

Programming:
1. Differentiate between C and QBASIC.
2. WAP to count the total number of vowels in a word using SUB.
3. WAP to reverse a given string using FUNCTION.
4. WAP to store the records on name, post, salary, and age and phone number in a sequential file named “rosebud.dat”.


Set 2
Fundamentals:
1. Define communication channel.
2. What do you mean by computer ethics?
3. Mention any four provisions of cyber law in Nepal.
4. Write the full forms of : CDMA, ADSL, ATM, SMPS, STP
5. What is computer security? Mention the importance of defragmentation.
6. Perform the following binary operations: i. 10001 +111 ii. 111111-11000
iii. 101 x 11 +10

DBMS:
1. Define validation rule and validation text.
2. Differentiate between select query and action query
3. Mention any four data types in Ms- Access.
4. List out any four objects of DBMS
5. What is the maximum field size for Text, OLE, Yes/No and Auto number?


Programming:
1. WAP to input any two numbers calculate the square root of their sum using SUB.
2. WAP to check whether a given string is palindrome or not using Function…. END.. Function.
3. Re-write the given program after correcting the bugs:
CREATE FUNCTION square(A)
Rem to print square of a number
CLS
Get “a number”; A
CALL square(A)
END

FUNCTION square(A)
Ans=A^2
Square=Ans
END Square(A)
4. Write the output of the following program:
DECLARE SUB Series()
CALL Series
END
SUB Series
A=2
B=2
For ctr=1 to 2
PRINT A; B;
A= A+B
B=A+B
Next ctr
END SUB

5. Analyze the program given below and answer the questions:
Declare function count(N$)
Input “Enter a word”; R$
C= Count(R$)
Print C
END
Function count(N$)
For k=1 to LEN(n$)
X$=MID$(N$,K,1)
IF UCASE$(X$)=”A” then
X=X+1
End if
Next K
Count = X
End function

i) List any two library functions used in the above program.

ii) Write the use of variable ‘C’ inline 3 [i.e. C=Count(R$)] given in the above program.


SET 3
Fundamentals:
1. Define antivirus with two examples.
2. How do you protect your computer from virus?
3. Define boot sector virus and macro virus.
4. Convert: (505)10 into octal
5. Divide: 101010 by 111
6. Mention any four services of internet.
7. Write the full forms of : TCP/ IP, DVD, PDF, POP, SMTP

DBMS:
1. Define query with its importance.
2. Mention any four importance of DBMS.
3. Define DBMS with examples.


Programming:
1. Why is C called middle level language?
2. Mention the function of MKDIR, CHDIR, FILE, NAME, SYSTEM, SHELL, RMDIR, KILL and WRITE #
3. Write the output of the following program
DELARE SUB NUMBER()
CLS
CALL NUMBER
END
SUB NUMBER
N=3
C=1
WHILE C<=5 PRINT N N=N*10+3 C=C+1 WEND END SUB 4. Rewrite the given program after correcting the bugs: REM display Records of students From Data File OPEN “STDREC.DAT” FOR INP AS #1 PRINT “ROLL”,”NAME”,”ADDRESS”,”CLASS”,”SECTION” DO WHILE NOT EOF INPUT #1,RN,N$,AD$,CL,S$ PRINT RN,N$,AD$,CL,S$ NEXT CLOSE #1 END 5. Write a program to add some data in an existing sequential data file “emp.dat” having fields name ,post and salary. 6. Write a program to read all the data from the data file named “sal.dat” having fields name , post and salary and display only those records where the salary is equal or greater than 5000 and post is “manager”. SET 4 SLC 2065 to SEE 2070 (Discussions) SET 5 SLC 2070 to SEE 2074 (Discussions) SET 6 1. Write the output of the given program: DECLARE SUB Result: CALL Result END SUB Result For I = 1 to 9 STEP 2 Sum=Sum +I^2 Next I PRINT Sum END SUB 2. Rewrite the following program after correcting the bugs: REM to store Name, post and salary OPENEMP.DOCFOROUTAS#1 INPUT “Enter Name”; N INPUT “Enter post”; P$ INPUT “Enter salary”; S WRITE #2, N$,P$,S CLOSE #1 END 3. Study the following program and answer the following questions: DECLARE FUNCTION COUNT(A$) Input “Enter a word”; W$ END Function Count(A$) B=LEN(A$) C$=UCASE$(A$) FOR I=1 TO B E$=MID$(C$,I,1) IF E$=”A” OR E$=”E” OR E$=”I” OR E$=”O” OR E$=”U” THEN C=C+1 END IF NEXT I COUNT=C END FUNCTION a) List the string Library functions used in the above program. b) Write down the missing statements in the main module to execute the program. 4. WAP to check whether a given number is prime or composite using SUB… END SUB. 5. WAP to calculate the volume of a cuboid using Function… END…. Function. SET 7 Fundamentals: 1. Which is not a unguided media? i) Fiber Optic ii) Microwave iii) Infrared iv) Radio wave 2. Which is the internet service? i) IRC ii) Telnet iii) E-mail iv) All of above 3. Which is not related to multimedia? i) Printer ii) Sound Card iii) Microphone iv) CD-ROM 4. Which virus infects boot sector files? i) Macro virus ii) Multi partite virus iii) Boot sector virus iv) Program virus 5. Which of the following is not a guided data communication media? i) Coaxial cable ii) Fiber optic iii) Twisted pair iv) Satellite 6. Process of arranging the scattered parts of the file into a contiguous manner. i) Backup ii) Defragmentation iii) Debugging iv) All of the above 7. Which of the following is remote login service? i) Video conference ii) Telnet iii) FTP iv) All of the above 8. Which of the following is an anti-virus program? i) NAV ii) Windows iii) Photoshop iv) All of the above 9. Which of the following is not a protocol? i) POP ii) TCP/IP iii) NOS iv) FTP 10. Which device protects hardware? i) UPS ii) MODEM iii) Gateway iv) All of the above 11. In which communication media data transfer is high? i) Twisted pair ii) Co-axial cable iii) Fiber optics iv) Microwave 12. Which computer virus that damages the master boot record? i) Macro virus ii) File virus iii) New folder virus iv) Boot sector virus 13. E-commerce is ___________ i) a type of business ii) a type of virus iii) both i) and ii) iv) None of the above 14. Email is a/an __________ i) organization which controls internet ii) protocol to access internet iii) service of internet iv) None 15. Which one is not a type of virus? i) message carrying virus ii) boot sector virus iii) system infector iv) special purpose application infector 16. Which one is an example of bounded media? i) fiber optic ii) microwave transmission iii) laser transmission iv) infrared transmission 17. Which is not a communication media? i) Wire ii) Microwave iii) Satellite iv) NIC 18. Which is a web browser software? i) Windows 2007 ii) Internet Explorer iii) Windows NT iv) All of the above 19. In which topology network devices are connected through hub? i) Ring ii) Bus iii) Star iv) None of above 20. Which is not related to internet? i) ISP ii) TCP/IP iii) WWW iv) UPS 21. List out any four protocols along with their use. 22. Mention any four cybercrimes. 23. Discuss the negative impacts of internet in society. 24. Define multimedia along with its importance SET 8 1. Write output of the following program. DECLARE FUNCION NUM(X) P=11001 PRINT “The result is “; NUM(P) END FUNCTION NUM(X) WHILE X<> 0
R=X MOD 10
SUM=R* 2 ^ A+ SUM
X=X10
A=A+1
WEND
NUM=SUM
END FUNCTION

2. a.Write a program to define a function procedure which returns number of factors of the given number and use this function to check whether input integer is prime or composite. (3)
b. Write a program using SUB .. END SUB to calculate volume of a cylinder.[Hint: V=p* r^2* h]. (3)
c. A sequential data file “result.rec” contains the name, marks secured by students in three subjects. Assume pass marks for each subject is 40. Write a program to display the records of passed students and total number of failed students. (3)

3. a. Write a program to calculate and display area of a triangle using FUNCTION..END FUNCTION. (Hints: Area =1/2*base*height) (3)
b. Write a program to check whether the given word is ‘palindrome or not’ using SUB….END SUB. (3)
c. Write a program to create a sequential data file "marks.dat" to store Name and Mark obtained in Computer, Math and Science subjects for some student. (3)

2 comments:

  1. Hi All!

    We are selling fresh & genuine SSN Leads, with good connectivity. All data is tested & verified.
    Headers in Leads:

    First Name | Last Name | SSN | Dob | Address | State | City | Zip | Phone Number | Account Number | Bank Name | DL Number | Routing Number | IP Address | Reference | Email | Rental/Owner |

    *You can ask for sample before any deal
    *Each lead will be cost $1
    *Premium Lead will be cost $5
    *If anyone wants in bulk I will negotiate
    *Sampling is just for serious buyers

    Hope for the long term deal
    For detailed information please contact me on:

    Whatsapp > +923172721122
    email > leads.sellers1212@gmail.com
    telegram > @leadsupplier
    ICQ > 752822040

    ReplyDelete
  2. Hello all
    am looking few years that some guys comes into the market
    they called themselves hacker, carder or spammer they rip the
    peoples with different ways and it’s a badly impact to real hacker
    now situation is that peoples doesn’t believe that real hackers and carder scammer exists.
    Anyone want to make deal with me any type am available but first
    I‘ll show the proof that am real then make a deal like

    Available Services

    ..Wire Bank Transfer all over the world

    ..Western Union Transfer all over the world

    ..Credit Cards (USA, UK, AUS, CAN, NZ)

    ..School Grade upgrade / remove Records

    ..Spamming Tool

    ..keyloggers / rats

    ..Social Media recovery

    .. Teaching Hacking / spamming / carding (1/2 hours course)

    discount for re-seller

    Contact: 24/7

    fixitrogers@gmail.com

    ReplyDelete

Bottom Ad [Post Page]