You are on page 1of 4

Symbol No.....................

RE-334
SEE 2074 (2018)
P]lR5s låtLo sDKo'6/ lj1fg
lbOPsf lgb]{zgsf cfwf/df cfkm\g} z}nLdf l;h{gfTds pQ/ lbg'xf];\ .
;do M ! 3G6f #) ldg]6 k"0ff{ª\s M %)
;d"x ‘s’ (Group 'A')
Computer Fundamental (22 Marks)
!= tnsf k|Zgx¿sf] pQ/ lbg'xf];\ (Answer the following questions): %x@=!)
-s_ sDKo'6/ g]6js{sf] kl/efiff n]Vg'xf];\ . (Define computer network.)
-v_ Internet sf] kl/efiff n]Vg'xf];\ . (Define Internet)
-u_ sDKo'6/ k|0ffnLnfO{ ;'/lIft /fVgsf] nflu power protection pks/0fsf]
dxŒjaf/] pNn]v ug'x{ f];\ .
Write the importance of power protection device to protect the computer system.
-3_ sDKo'6/ efO/; eg]sf] s] xf] < sDKo'6/df efO/; nfu]kl5 b]lvg] s'g} b'Oc{ f]6f nIf0fx?
pNn]v ug'x{ f];\ .
What is computer virus? Mention any two symptoms that can be seen
when a computer is infected by computer virus.
-ª_ ;fOa/ ck/fw eg]sf] s] xf] < s'g} b'Oc{ f]6f pbfx/0f lbg'xf];\ .
What is cybercrime? Give any two examples.
@= s_ lgb]{zgcg';f/ ?kfGt/ ug'{xf];\ M @ x! = @
Perform the conversion as per the direction:
(i) (523)8 into Binary (ii) (2074)2 into hexadecimal.
v_ Binary lx;fa ug'{xf];\ (Perform the binary calculation): @ x! =@
(i) 110 x 101 (ii) 111010 ÷ 110
#= hf]8f ldnfpg'xf];\ (Match the following) : $ x)=% =@
Group 'A' Group 'B'
(a) RJ 45 connector (i) Duplicate copy
(b) Back up (ii) Multimedia
(c) Microphone (iii) Twisted pair cable
(d) Hub/switch (iv) Ring Topology
(v) Star Topology
$= tn lbOPsf k|Zgx?sf] ;a}eGbf ldNg] pQ/ 5fGg'xf];\ M $ x)=%
)=%=@@
Select the best answer of the following:
-s_ tn lbOPsf dWo] s'grflx“ g]6js{ k|f6] f]sn xf]Og <
Which of the following is not a network protocol?
(i) POP (ii) FTP (iii) TCP/IP (iv) NOS
-v_ tn lbOPsf dWo] s'grflx“ ;k\m6j]o/ kmf]6f] ;Dkfbgsf] nflu k|of]u ul/G5 <
Which of these software is used for photo editing?
(i) Ms-Excel (ii) Photoshop (iii) Power-Point (iv) Ms-Word
-u_ tn lbOPsf dWo] s'grflx“ pks/0f pxL k|f6] f]sn k|of]u ug{ w]/} g]6js{x? hf]8g\ sf
nflu k|of]u ul/G5 <
Which device is used to connect multiple networks that uses the same protocol.
(i) Bridge (ii) NIC (iii) Switch (iv) Gateway
j|mdzM
RE-334 (2)
-3_ 5l/P/ /x]sf kmfOnsf efux?nfO{ PsLs[t ug]{ k|lj|mof
Process of arranging the scattered files into a contiguous manner.
(i) Scandisk (ii) Backup (iii)Defragmentation (iv) Debugging
% = pko'Qm k|fljlws zAbx¿ n]Vg'xf];\ M $ x)=% =@
Write the appropriate technical terms of the following:
-s_ nf]sn Pl/of g]6js{sf] physical layout .
The physical layout of local area network.
-v_ Internet sf] dfWodaf6 ul/g] Aofkf/ . (The business conducted through Internet.)
-u_ sDKo'6/ tyf OG6/g]6sf] k|of]u u/L ul/g] ck/fwnfO{ lgoGq0f ug]{ sfg'g .
The law which controls the crime which is done with the help of
computer and Internet.
-3_ s'g} sDKo'6/ jf pks/0f h;n] sDKo'6/ g]6js{sf c? sDKo'6/x?nfO{ ljleGg ;]jf k|bfg ub{5 .
A computer or device which provides different services to other
computers connected to the network.
^ = k"0f{ ¿k n]Vg'xf];\ (Write the full form): $ x)=% =@
(i) SMTP (ii) WAN (iii) URL (iv) VOIP

;d"x ‘v’ (Group 'B')


Database (10 Marks)
&= tnsf k|Zgx¿sf] pQ/ n]Vg'xf];\ (Answer the following questions):#x@=^
-s_ 8]6fj];sf] kl/efiff n]Vg'xf];\ . (Define Database.)
-v_ Data redundancy eg]sf] s] xf] < o;nfO{ s;/L sd ug{ ;lsG5 <
What is data redundancy? How can it be reduced in database?
-u_ Ms-Access df k|of]u ug{ ;lsg] s'g} rf/ k|sf/sf data type x? pNn]v ug'x{ f];\ .
Mention any four data types that can be used in Ms-Access.
* = ;xL pQ/ 5fGg'xf];\ (Select the correct answer): $ x)=%
)=%=@@
-s_ tn lbOPsf dWo] s'grflx“ primary key n] :jLsf/ ub}g{ <
Which of the following is not accepted by primary key?
(i) Number (ii) Text (iii) Null value (iv) None
-v_ 8]6fa]; 6]ansf] row x?nfO{ s] elgG5 <
What is called rows in database table?
(i) Field (ii) Record (iii) Form (iv) None
-u_ ;a}eGbf sd storage space k|of]u ug]{ Pp6f data type s'g xf] <
Which data type consumes the least storage space?
(i) Text (ii) Yes/No (iii) OLE object (iv) Memo
-3_ Ms-Access sf] default data type s'g xf] <
Which is the default data type of Ms-Access?
(i) Memo (ii) Number (iii) Text (iv) Auto number
j|mdzM
(3) RE-334
( = hf]8f ldnfpg'xf];\ (Match the following): $ x)=% =@
Group 'A' Group 'B'
(a) Data (i) Input, view, edit data
(b) Form (ii) Formated output
(c) Report (iii) Collection of raw facts
(d) Table (iv) Question to the database
(v) Stores data in database
;d"x ‘u’ (Group 'C')
Programming (18 Marks)
!)= -s_ Formal parameter eg]sf] s] xf] < (What is formal parameter?) !
-v_ C k|fu] f| ldª Nofª\Uj]hdf k|of]u ul/g] s'g} b'Ocf]6f data type x? pNn]v ug'x{ f];\ . !
List any two data types used in C programming language.
-u_ KILL / CLOSE :6]6d]G6x?sf] sfo{ n]Vg'xf];\ . !
Write the function of KILL and CLOSE statements.
!!= tnsf] program df ePsf uNtLx¿nfO{ ;RofP/ k'gM n]Vg'xf];\ M $x)=%=@
Re-write the given program after correcting the bugs:
REM TO find the factorial of a given number.
DECLARE FUNCTION FACTO (N$)
CLS
INPUT "Enter a number", X
PRINT "The Factorial is: ", FACTO (N)
END
FUNCTION FACTO (N)
F=1
WHILE N = 0
F = F*N
N=N-1
WEND
F = FACTO
END FUNCTION
!@= tn lbOPsf] program sf] output n]Vg'xf];\ M @
Write the output of the following program:
DECLARE SUB Display (T$)
CLS
T$ = "COMPUTER"
CALL Display (T$)
END
SUB Display (T$)
FOR C = 1 TO LEN (T$) STEP 2
j|mdzM
RE-334 (4)
D$ = MID$ (T$, C, 1)
PRINT D$;
NEXT C
END SUB
!#= tnsf] program sf] cWoog u/L lbOPsf k|Zgx¿sf] pQ/ n]Vg'xf];\ M@x!=@
Study the following program and answer the given questions:
DECLARE FUNCTION SUM (N)
CLS
INPUT "Enter any number", N
S = SUM (N)
PRINT "The Sum of individual digit is:", S
END
FUNCTION SUM (N)
WHILE N > 0
R = N MOD 10
T=T+R
N = N\10
WEND
SUM = T
END FUNCTION.
-s_ dflysf] k|fu] f| ddf nfOg gDa/ $ df k|of]u ul/Psf] e]l/Pan S sf] sfd pNn]v ug'x{ f];\ .
State the purpose of using variable S in line 4 in above program.
-v_ dflysf] k|fu] f| ddf k|of]u ul/Psf] MOD sf] sfd pNn]v ug'x{ f];\ .
Write the use of MOD in above program.
!$= -s_ Sub..... End Sub sf] k|of]u u/]/ s'g} Pp6f j[Qsf] If]qkmn lgsfNg] k|fu] f| d
n]Vg'xf];\ . #
Write a program to calculate area of a circle using Sub..... End Sub.
-v_ FUNCTION...END FUNCTION sf] k|of]u u/]/ s'g} Pp6f jfSodf ePsf
zAbx?sf] u0fgf ug]{ k|fu] f| d n]Vg'xf];\ . #
Write a program using FUNCTION... END FUNCTION to count the
number of words in a sentence.
-u_ s'g} % hgf ljBfyL{x?sf] /f]n g+=, gfd, sIff / 7]ufgf;lxtsf] /]s8{ e08f/0f ug]{
8]6fkmfOn agfpg] k|fu] f| d n]Vg'xf];\ . #
Write a program to store Roll no., Name, Class and Address of any
five students.
"""

You might also like