You are on page 1of 15

SET 1 5. Re-write the given program after correcting the bugs.

[2]
Group „A‟ (10 Marks) REM to create a new file
1. Answer the following questions in one sentence. [6×1=6] CLS
a. What is internet? OPEN “ABC.DAT” FOR INPUT AS #1
b. What is browser? DO
c. Which is the logical data type of MS Access? INPUT “Enter Name, Roll No & Total. “; N$, R, T
d. Which view is used to modify a table in MS-Access? INPUT #1, N$, R, T
e. Which is the structure programming language? INPUT “Supply more records Y/N”; C$
f. Write any two data types of C language. LOOP WHILE UCASE(Y$)=”Y”
2. Write appropriate technical terms for the following: [2×1=2] CLOSE #1
a. Crimes committed using electronic devices and cyber space. END
b. A malicious program of computer that damages data and software. 6. Study the following program and answer the given questions.[2×12]
3. Write the full forms of the following: [2×1=2] OPEN “EMP.DAT” FOR INPUT AS #1
a. UTP: b. WWW: DO
Group „B‟ [24 Marks] INPUT #1, N$, A$, S
4. Answer the following questions. [9×2=18] IF UCASE$(A$)=”KATHMANDU” THEN
a. What is computer network? Write any two disadvantages of it. PRINT N$, A$, S
b. What is cyber ethics? Write any two cyber ethics. END IF
c. What is hardware security? Write the role of UPS in hardware security. LOOP WHILE NOT EOF(1)
d. What is e-banking? Write any two uses of it. CLOSE #1
e. What is database management system? Give two examples. END
f. What is database? Give any two examples. a. Write the use of statement “INPUT #1, N$, A$, S” in the above
g. Define field and record. program.
h. What is a report? Write its use. b. What happens if you remove “UCASE$” from the above program?
i. Define form? Write any two uses of it. 7. Convert / Calculate as per the instruction. [4×1=4]
5. Write the output of the given program: (Workout with dry run) [2] a) (ABC)16 = (?)8 b) (52)10 = (?)2
DECLARE FUNCTION OUTPUT1(A) c) (1010)2 + (110)2 – (1111)2 = (?)2 d) (1101101)2  (110)2
CLS 8. a. Write a program in QBASIC that allows the user to input length,
N=135 breadth and height and then calculate the area of 4 walls. Hint: [A =
CALL OUTPUT1(N) 2H(L+B)]
END b. Write a program to create a sequential data file named “Employ.Dat” to
SUB OUTPUT1(A) store Name, Post, Address and Salary for the number of employees. The
DO WHILE A < > 0 program should terminate on user‟s choice.
R = A MOD 10 9. Write a program in C language to input a number and then check
T=T+R whether the number is positive, negative or zero number.
A = A \ 10 OR
LOOP Write a program in C language to display the series 1, 1, 2, 3, 5, 8 upto
PRINT T 10th terms.
END SUB
SET 2 REM to add record in an existing file
Group „A‟ (10 Marks) CLS
1. Answer the following questions in one sentence. [6×1=6] OPEN “Record.Dat” FOR OUTPUT AS #1
a. What is search engine? AA:
b. What is the business done through internet? INPUT “Enter Name, Class and Roll No.”; Nm$, Cl, Rn
c. Which data type is used to store alpha numeric characters or special symbols in MS- INPUT #2, Nm$, Cl, Rn
Access? INPUT “More records”; Y$
d. Which view is used to modify a table in MS-Access? IF UCASE$(Y$)=”Y” THEN GOT aa
e. What is modular programming? CLOSE “Record.dat”
f. Write any two features of C language. END
2. Write appropriate technical terms for the following: [2×1=2] 7. Study the following program and answer the given questions. [2×12]
a. Law that governs the legal issues of cyberspace. OPEN “Detail.dat” FOR INPUT AS #1
b. The smallest unit to represent information on quantum computer. OPEN “Temp.dat” FOR OUTPUT AS #2
3. Write the full forms of the following: [2×1=2] INPUT “Enter name of the students”; S$
a. STP: b. WAP: FOR I=1 TO 10
Group „B‟ [24 Marks] INPUT #1, Nm$, Cl, A
4. Answer the following questions. [9×2=18] IF S$< >Nm$ THEN
a. What is computer network? Enlist any two advantages of it. WRITE #2, Nm$, Cl, A
b. What is computer ethics? Write any two of them. END IF
c. What is software security? Write any two measures of hardware security. NEXT I
d. What is m-commerce? Write any two important services. CLOSE #1, #2
e. What is IoT? Write any two importance of it. KILL “Detail.dat”
f. What is database? Give any two examples. NAME “Temp.dat” AS “Detail.dat”
g. What is primary key? List any two advantages of it. END
h. What is data sorting? List any two advantages of using it. a. What is the main objective of the program given above?
i. What type of work is done in MS-Access using form and query object. b. Do you get any problem in the above program if “Kill” statement is removed?
5. Write the output of the given program: Show with dry run in table. 2 Give reason.
DECLARE SUB SHOW(A) 8. Convert / Calculate as per the instruction. [4×1=4]
CLS a. (11001101)2 = (?)16 (524)10 = (?)2
N=87 b. (1010)2 × (110)2 – (1011)2 = (?)2 (10110)2  (101)2
CALL SHOW(N) 9. a. Write a program in QBASIC that asks length, breadth and height of room and
END calculate its area and volume. Create a user defined function to calculate area and sub-
SUB SHOW(A) program to calculate volume. Hint: [A=L×B], [V=L×B×H]
DO b. A sequential data file called “Record.txt” has stored data under the field heading Roll
B=A MOD 6+3 No., Name, Gender, English, Nepali, Maths and Computer. Write a program to display all
IF B MOD 4=0 THEN GOTO AA the information of those students whose gender is “F” and obtained marks in computer is
PRINT B; more than 90.
AA: 10. Write a program in C language that asks a number and check whether it is odd or even.
A=A-10 OR
LOOP WHILE A>=50 Write a program in C language to display the series with their sum.1, 2, 3, 4 upto 10 th
END SUB terms.
6. Re-write the given program after correcting the bugs: [2]
SET 3 EXECUTE Series
1. Answer the following questions in one sentence: 6x1=6 END
a) Write the name of any two search engines. SUB Series( )
b) What is social media? REM Program to generate 1 1 2 3 5 ..... upto the 20th terms
c) Which data type is suitable to store photographs of students in MS-Access? A=1
d) Which view is used to modify a table structure in MS-Access? B=1
e) Which statement is used to call sub-procedure? FOR ctr=10 to 1
f) Write any two data types used in C language. DISPLAY A:B:
2. Write appropriate technical term for the following. 2x1=2 A=A+B
a) A system of copying data and information reading in computer into B=A+B
another location. NEXT ctr
b) A company which provides services of Internet. END Series ( )
3. Write the full form of the following. 2x1=2 7. Study the following program and answer the given questions. 2x1=2
a) FTP: DECLARE FUNCTION TEST(X)
b) MAN: X=100
4. Answer the following questions. 9x2=18 Z=TEST(X)
a) What is computer network? Write any two advantages of it. PRINT Z
b) Define software security. Write any two protection measures for it. END
c) What is search engine? Write any two popular search engines. FUNCTION TEST(X)
d) Define e-commerce. Write any two benefits of it. FOR R=1 TO X
e) Write ant two advantages and disadvantages of social media. S=S+I
f) What is DBMS? Write any two advantages of it. NEXT R
g) What is primary key? Write any two features of it. TEST=S
h) Define field and record. END FUNCTION
i) Define form. Write any two uses of it. a) How many parameters are used in the above program?
5. Write the output of the given program: (Workout with a dry run). 2 b) How many times does the statement S=S+I execute in the above program?
DECLARE SUB ABC(A) 8. Convert / Calculate as per the instruction. 4x1=4
CLS i) (11111101)2 = (?)16 ii) (245)10 = (?)2
A=2 iii) (1010) 2 x (101) 2 =(?)2 iv) (101110) 2  (110) 2\
CALL ABC(A) 9 a) Write a program in QBASIC that asks length, breadth of a room and
END calculate its area and perimeter. Create a user defined function to calculate area
SUB ABC(A) and sub program to calculate perimeter.
FOR J= 1 TO 5 [Hint: [Area=LxB], [p=2(L+B]]
PRINT A; b) Write a program to create a sequential data file “salary.dat” to store
A=A+3; programmer‟s name, salary and post according to the need of the user.
NEXT J 10. Write a C program that asks a number and check whether it is negative,
END SUB positive or zero.
6. Re-write the given program after correcting the bugs: 2 OR
DECLARE SUB Series ( ) Write a program in C language to display first 10 odd numbers.
CLS
SET 4 6. Re-write the given program after correcting the bugs: 2
Group „A‟ REM to display records from existing file.
1. Answer the following questions in one CLS
sentence: 6×1=6 OPEN “emp.txt” FOR APPEND AS #1
a) What is web browser? WHILE NOT EOF(#1)
b) Mention any two services provided by internet. WRITE #1, eN$, post$, salary
c) What is the default extension of MS-Access? PRINT eN$, post$, salary
d) Which object of MS-Access is used to retrieve data from the table? CLOSE#1
e) Write any one advantage of Modular Programming. END
f) Mention any two basic data type of C language?
2. Write appropriate technical term for the following. 2×1=2
a) Network of Networks. 7. Study the following program and answer the given questions. 2x1=2
b) Computer program that protects computer from computer virus. DECLARE FUNCTION Prod(A,B)
3. Write the full form of the CLS
following. 2×1=2 INPUT “Enter first number”; A
a) POP: INPUT “Enter second number”; B
b) AI: PRINT “The product of the two number=”; prod(A,B)
Group B (24 Marks) END
4. Answer the following questions. 9x2=18 FUNCTION Prod(A,B)
a) What is computer network? List any two importance of it. P=A*B
b) What is computer ethics? Write down any two ethics of it. Prod=P
c) What is computer security? Write any two hardware security measures. END FUNCTION
d) Give two differences between E-Commerce and Traditional Commerce. a) List all the numerical variables used in the program.
e) Write ant two symptoms of computer virus. b) List the local variable/s used in the above program.
f) What is DBMS? Write any two examples.
g) What is primary key? List any two advantages of it. 8. Convert / Calculate as per the instruction. 4x1=4
h) What is data sorting? List any two advantages of using it. i) (214)10 = (?)2
i) List the field name from the following table structure. ii) (ABC)16 = (?)2
Symbol No. Name Marks iii) (1011) 2 × (101) 2 + (101) 2 =(?)2
00100200Q Surya Gurung 85 iv) (101110) 2 ¸ (110) 2
00100201R Birendra Sharma 91
5. Write down the output of the given program. Show with dry run in table. 2 9 a) Write a program to calculate Area of circle using Function procedure and use SUB
DECLARE SUB Result(C$) procedure to calculate its circumference in Q-Basic.
C$=”COMPUTER” [Hint: [A=r2], [C=2r]
CALL Result(C$) b) Students Name, Class, Section and Address are stored in a data file called
END “STUDENT.dat”. Write a program to print all the records of students.
SUB Result(C$) 10. Write a program in C language to input a number then check whether the number is
FOR C=1 TO LEN(C$) STEP 2 fully divisible by 5 or not.
M$=MID$(C$,C,1) OR
N$=N$+M$ Write a program in C language to display the series 2, 4, 6, 8 up to 10 th terms.
NEXT C
PRINT N$
END SUB
SET 5 FUNCTION Rev$(N$)
Group A FOR K=LEN$(N$) to 1 STEP-1
1. Answer the following questions in one sentence: B$=B$+MID$(N$,1,K)
a) What is search engine? NEXT K
b) What is the business done through the internet called? B$=REV$
c) What is the default size of text field in MS-Access? END FUNCTION
d) Which data type is used to store photo in MS-Access? 7. Study the following program and answer the given questions.
e) What is looping? DECLARE FUNCTION SUM(N)
f) List any two data types used in C-Programming language. CLS
2. Write appropriate technical term for the following: INPUT”Enter any number”: N
a) A program that can disinfect a file from virus. X=SUM(N)
b) Learning through the electronic media. PRINT”The sum of individual digit is “; X
3. Write the full form of the following. END
a) G2G b) ISP FUNCTION SUM(N)
4. Answer to the following questions: WHILE N<>0
a) What is network topology? List any two types of network topology. R=N MOD 10
b) What is antivirus software? Name any two popular antivirus software. S=S+R
c) What is cyber law and cyber crime? N=INT(N/10)
d) What is virtual reality? Write any two areas where virtual reality are used. WEND
e) What is password? Write any two importance of password protection. SUM=S
f) What is DBMS? Write any four objects of MS-Access. END FUNCTION
g) What are validation text and validation rule? a) Write the function of INT.
h) What is form? Write any two advantages of using form. b) How many times the WHILE…..WEND LOOP repeats if the value of N is 123?
i) What is record? Why is primary key necessary in record?
5. Write down the output of the given program: 8. Convert/Calculate as per the instruction:
DECLARE SUB Series(A) i) (11001101)2 = (?)16
CLS ii) (524)10 = (?)2
A=20 iii) (1010)2  (110)2 – (1011)2 = (?)2
CALL Series(A) iv) (10110)2 ÷ (101)2
END 9. Answer the following questions.
SUB Series(A)
FOR K=1 to 5 a) Write a program in QBASIC that will asks the user to input length,
PRINT A; breadth and height of a room then use SUB procedure calculate its
A=A+10 volume and FUNCTION procedure to calculate its area of four walls.
NEXT K
END SUB b) A sequential data file called “Record.dat” has stored data under the field
6. Re-Write the given program after correcting the bugs: heading Roll No., Name, Gender, English, Nepali, Maths and Computer.
REM Program to make a word reverse Write a program to display all the information of those students whose
DECLARE FUNCTION Rev$(N$) marks in English is more than 40.
CLS 10. Write a program C language that asks any two numbers and displays the greatest
INPUT “Enter a word”: N$ among them.
DISPLAY “Reversed is”; Rev$(N$) Or
END Write a program in „C‟ language to display the series with their sum 1, 2, 3, 4 ,……up
to 10th terms.
SET 6 6) Re-write the given program after correcting the bugs. [2]
Group ‟A‟ REM to add more data in a sequential file.
Very short questions. OPEN “EMP.DAT” FOR INPUT AS #2
1) Give answer in one sentence for the following question. 6 x1 =6 DO
a) Define bandwidth. INPUT “ENTER NAME”; N$
b) What is cyber bulling? INPUT “ENTER ADDRESS”; A$
c) What is AI? INPUT “ENTER SALARY”; S$
d) What is the storage size of memo and text data type in MS- Access? WRITE #1, N$, A$, S
e) What is local variable? INPUT” Do you want to add more records.”; M$
f) What is an operator in C language? LOOP WHILE UCASE(M$) = “Y”
2) Write appropriate technical terms for the following. 2 x1=2 END
a) Secret group of characters which helps to protect file from unauthorized person. 7) Study the given program and answer the given questions. [2]
b) A type of network in which every computer works as both client and server. DECLARE FUNCTION test$ (A$)
CLS
3) Write the full forms of the following. 2x1=2 INPUT “ENTER ANY WORD”; T$
i) ADSL – ii) TCP/IP – PRINT test$(t$)
Group ‟B‟ 12 x 2 = 24 END
4) Answer the following questions. 9 x2 =18 FUNCTION test$ (A$)
a) Differentiate between LAN and WAN. FOR M = LEN(A$) TO 1 STEP -1
b) Write any four commandments of computer ethics. C$= C$+ MID$(A$, M,1)
c) What is E- commerce? List any two E- commerce companies in Nepal. NEXT M
d) What are the advantages of cloud computing? Test$ = C$
e) What is VR? Mention its application areas. END FUNCTION
f) What is DBMS? Give any two examples. a) List the formal and actual parameters used in the program given above.
g) What is primary key? List any two advantages. b) List the library function used in the above program.
h) What is query?
i) What is data sorting? Write its two advantages. Group „C‟ [4 x4= 16]
5) Write down the output of the given programs. [2] 8) Convert/Calculate as per the instruction: 4 x1 =4
DECLARE SUB DISPLAY (A) a) (CCA)16into binary
CLS b) (654)10 into octal
A= 3 c) (111011 / 100)2
CALL DISPLAY (A) d) (10101 - 1110)2 x (10) 2
END 9) Write a program in QBASIC that allows user to enter radius of a circle. Create a user
SUB DISPLAY (A) define function to find the area of circle and sub procedure to find volume of a cylinder.
FOR X = 1 TO 6 Hint: [A= r2 v= r2h]
PRINT A;
IF A MOD 2 = 0 THEN 10) A sequential data file “emp.dat” contains employee‟s name, address, gender and salary.
A=A/2 WAP to display all the information of employees whose salary is more than Rs. 20,000
ELSE 11) Write a program in C language to input any two numbers and find greater number.
A= (A*3)+1 OR
END IF Write a program in C language that asks user to enter any number and check whether the
NEXT X number is odd or even.
END SUB The End
SET 7 CALL REV (A)
1. Answer the following question in one sentence. PRINT "REVERSE ="; RE
a) What is an email? END
b) What is cyber law? FUNCTION REV$ (A)
c) What is the field size of yes/no field? WHILE A<> 0
d) Write any two objects of ms access. R= A MOD2
e) What is module? S = S * 10 + R
f) Write any two data types of C language. A = A - 10
2. write appropriate technical term for the following. WEND
b) A types of network in which each computer can act as a server as well as client. REV = S
c) a collective online communications channels dedicated to community based input, END SUB
interaction, content sharing and collaboration.
3. write the full form of the following. 7. Study the following program and answer the given questions.
B2B = CLS
ICT = OPEN "INFO.DAT" FOR INPUT AS #5
Group - B TOP:
4. Answer the following questions. INPUT "ENTER NAME"; N$
a) Write any two advantages and disadvantages of computer network. INPUT "ENTER ADDRESS";A$
b) What is digital footprint? Write any two tips to maintain digital reputation. INPUT "ENTER PHONE NUMBER";P
c) What is password policy? Write any two important criteria for creating strong password. WRITE #5, N$, A$, P
d) What is e-commerce? Write any two disadvantages of e-commerce. INPUT "DO YOU WANT TO CONTINUE (Y/N)?"; AN$
e) What is IoT? Write any two advantages of it. IF UCASE$ (AN$) = "Y" THEN GOTO TOP
f) What is DBMS? Write any two examples. CLOSE #5
g) What is MS Access? Write any two advantages of it. END
h)What is query? Write its type. Questions:
a) List the variables used in above program.
5. Write down the output of the given program. Show with the dry run in table. b) What is the name of data file used in above program?
DECLARE SUB SERI ( ) Group - C
CLS 8. Convert / calculate as per the instruction:
CALL SERI a) (110111)2 into (decimal)
END b)(25AF)16 into (Binary)
SUB SERI c)11110 + 10011 = 110001
A$ = "SCIENCE" d) 1110 ÷ 110 = 10 Remainder: 10
B = LEN (A$)
FOR I = 1 TO 4 9. Write a program in QBASIC that ask the radius of circle. Write a program to calculate
PRINT TAB(I); MID$(A$, I, B) the area and circumference of a circle. Create a user defined function first
B =B-2 (r) to calculate area and sub procedure second (r) to calculate circumference of a circle.
NEXT I 10. Write a program to update the rate by increasing 10% from a sequential data file
END SUB "Data.dat" that store item name, rate and quantity.
6. Rewrite the given program after correcting the bugs. 10. Write a program in c language to calculate simple interest.
Rem to convert the given number in reverse order or
DECLARE FUNCTION REV (A) Write a C program to find the sum of first 10 natural numbers.
CLS
INPUT "ENTER A NUMBER"; A
SET 8 CLS
1. Answer the following questions in very short: 1×10=10 N=5
i. What is computer network? PRINT FACT (N)
ii. What is e-mail? END
iii. What is full form of ISDN? FUNCTION FACT (N)
iv. What is the full form of WAN? F=1
v. Write the technical term: The arrangement of connection patterns of computers or nodes FOR I=1 TO N
and others resources. F=F*I
vi. Write the technical term: Commerce done by mobile. NEXT I
vii. What is primary key? FACT=F
viii. What is DBMS? END FUNCTION
ix. What is modular programming? xii. Study the following program and answer the given questions:
x. Write down two data type of C language. DECLARE SUB PC$ (N)
3. Answer the following questions in short: 2×9=18 CLS
i. What is transmission medium? Write down with examples. INPUT "Enter a number"; N
ii. What is Internet? Write down its services. CALL PC$ (N)
iii. What is computer security? Give some examples. END
iv. What is cyber law? Give some examples. SUB PC$ (N)
v. What is computer virus? Give some examples. FOR I=2 TO N-1
vi. What is data type? What happens while we enter text in number data type? R=N MOD I
vii. What is sort? IF C=0 THEN
viii. What is table? Is table a database? PRINT "Prime number"
ix. What is report? ELSE
PRINT "Composite number"
x. Debug the following program. ENDIF
DECLARE FUNCTION PAL$ (W$) END SUB
CLS a. What is the name of sub procedure?
INPUT "Enter a word"; W$ b. List the local variable.
SHOW PAL$ (W$) 1. Write a program in QBASIC to ask a number and display sum of digits by using
END FUNCTION..END FUNCTION. [4]
FUNCTION PAL$ (W$) 2. Write a program in QBASIC to create a file "EMP.DAT" and store employees
FOR I= LEN (W$) TO 1 STEP1 Name, Address, Salary and Telephone number on the basis of user choice. [4]
R$=R$+MID$ (W$, I, 1) 3. Write a program in C language to ask length, breadth and height and display
NECT I volume of box. [4]
IF R$-W$ THEM 2. Solve the problem as indicated: 1×4=4
P$="Palindrome" i. (209)10 into Octal number
ELSE ii. (A0F)16 into Binary number.
P$="Not palindrome" i. (1011011)2 × (110)2
ENDIF ii. (1110001)2 ÷ (101)2
P$=PAL$
END FUNCTION
xi. What will be output?
DECLARE FUNCTION FACT (N)
SET 9 DECLARE FUNCTION vowel(S$)
Group-A w$=we love our country
v=vowel(w$)
PRINT "The total no. of vowel::"; v
1) Answer the following questions: END
a) Define Bandwidth. FUNCTION vowel$(S$)
b) What is digital citizenship? c=0
the Internet and digital devices to engage with the society on any level. FOR K=1 TO length(S$)
c) Name any to modes of Electronic Payments. B$=MID$(S$, K, 1)
d) Define relationship. B$=LCASE$(B$)
e) What do you mean by modular programming? SELECT CASE B$
f) Write any two data types used in C language. CASE "a", "e", "i", "o", "u"
2) Give the appropriate technical terms of the following: c=c+1
a) Hacking done with permission from the client. END SELECT
b) The process of identifying an individual usually based on a username and password. NEXT K
3) Write the full forms for the following: C=vowel
SMTP- VRML- END FUNCTION
Group-B Analytical Questions
(Short Questions-24 Marks) OPEN “MARKINFO.TXT” FOR INPUT AS #1
4) Answer the following questions: OPEN “TEMP.TXT” FOR OUTPUT AS #2
a) Define data communication. Write its components. CLS
b) Write any two Opportunities and Threats in Social Media. DO UNTIL EOF(1)
c) What is software security? List any two security mechanism of Computer Hardware Security. INPUT #1, REGISTRATIONNUMBER, STUDENTNAME$, ENGLISH, NEPALI,
d) Define M-commerce. Write any four examples of M-Commerce. MATHEMATICS
e) What do you mean by Iot? List its any two advantages. IF MATHEMATICS<20 THEN
f) What is DBMS. Write any two advantages of DBMS. MATHEMATICS=MATHEMATICS+10
g) Define the term Validation Rule and Validation Text. END IF
h) Differentiate between select query and update query. WRITE #2, REGISTRATIONNUMBER, STUDENTNAME$, ENGLISH, NEPALI,
i)Define Data types. List any four names of the data types. MATHEMATICS
LOOP
FIND OUTPUT ALONG WITH DRY RUN CLOSE#1
CLOSE #2
DECLARE SUB SERIES ( ) KILL “MARKINFO.TXT”
CLS NAME “TEMP.TXT” AS “MARKINFO.TXT”
CALL SERIES END
END a) What is the main objective of the program given above?
SUB SERIES b) Do you get any problem in above program if “Kill” statement is removed? Give reason.
A$="NEPAL" 8) Calculate/Convert as per the instructions:
B=1 a) (101010)2 × (101011)2-(100101)2 b) (1001011)2 ÷ (10101)2
FOR I=1 TO LEN(A$) STEP 2 c) (DEF42)16 =(?)8 c) (986)10 = (?)2
IF B < > 3 THEN 9. a) Write a QBASIC program that asks length, breadth, height and calculate Volume of Cuboid and
PRINT MID$(A$,B,I) Total Surface Area. Create a USER DEFINED FINCTION to calculate Volume of Cuboid and SUB-
ELSE PROGRAM to calculate Total Suface of Area.
PRINT MID$(A$,1,I) b) A sequential data file"records.dat" contains S.NO., Name, Address, Telephone No and Email
END IF Address. WAP to count and display those records whose email address ends in "yahoo.com" domain.
B=B+1 Your display should be in tabular format having the fields Name, Address and Email address only.
NEXT I 10. Write a program in C language that asks a number check whether number is Positive, Negative
END SUB or zero.
OR
Debug Write a program in C language to display the series with their sum 7, 10, 13, 16…… upto 10th term.
SET 10 PRINT X$
GROUP „A‟ - END SUB
1. Answer the following questions in one sentence: [6x1 = 6] 6. Re-write the given program after correcting the bugs: [2]
REM print the input integer in reverse order
a. Give the name of any two guided transmission media. DECLARE SUB REV (N)
b. What is software security? CLS
c. What is the validation rule in MS-Access? INPUT "Enter an integer number"; NO
d. Which view is used to modify a table structure in MS-Access? CALL REV (NO)
e. Write the function of INPUT # statement. END
f. Give the name of any two header files used in C language. SUB REV (N)
2. Write appropriate technical term for the following: [2x1 = 2] A=N
a. The moral principle that controls cybercrime. WHILE A = 0
b. Combination of Public and Private clouds. R = A MOD 10
3. Write the full form of the following: [2x1 = 2] S = S + 10 + R
a. PIN b. OTP A = A \ 10
GROUP „B‟ - NEXT
4. Answer the following questions: [9x2 = 18] DISPLAY "Reverse"; S
END SUB
a. Write any two difference between LAN and WAN.
b. Write any four commandments of computer ethics. 7. Study the following program and answer the given questions: [2x1 = 2]
c. What is a computer security? Write any two ways of hardware security ? DECLARE FUNCTION A (X)
d. Give two differences between E-commerce and Traditional Commerce . CLS
e. What is Internet of Things ? Write any two of its importance. X=5
f. Define DBMS with any two examples. Z = A(X)
g. What is primary key? List any two of its advantages ? PRINT Z
h. What is data sorting? List any two advantages of using it. END
i. Identify a record, field and value from the following table structure. FUNCTION A (X)
FOR I = 1 TO X
Symbol No. Name Marks
S=S+I
00100202S Aarambha Gharti 85 NEXT I
A=S
00100203T Subash Rayamajhi 91 END FUNCTION
a. If the line S=S+I is changed to S=S+I^2, find the output of it.
b. How many times does the statement S=S+I execute in the above program?
5. GROUP „C‟ -
Write down the output of the given program and show them in dry run table: [2] 8. Convert and calculate as per the instruction:
DECLARE SUB CITY (K$) i) (A2B)16= (?)8
CLS ii) (345)10 = (?)2
CALL CITY ("KATHMANDU") iii) (1011)2 x (101)2 = (?)2
END iv) (1011010)2 / (101)2
SUB CITY (K$) 9)
FOR K = 1 TO LEN (K$) a) Write a program in QBASIC that asks length, breadth and height of room and calculates its area
C$ = MID$ (K$, K, 1) and volume. Create a user-defined function to calculate area and sub-program to calculate volume.
IF K MOD 2 = 1 THEN b. The employee's name, address, gender, and salary are stored in the "Emp. Dat" sequential data
C$ = UCASE$ (C$) file. Write a QBASIC program that displays all information about personnel whose salaries exceed
ELSE 50000.
C$ = LCASE$ (C$) 10. Write a program in C language to find simple interest where user need to input principal, rate and
END IF time. OR
X$ = X$ + C$ Write a program in „C‟ language to display the series with their sum. 1,2,3,4,….., up to 10th terms.
NEXT K [ The end ]
CLS OPEN "record.dat" FOR INPUT AS #1
SET 13 UP:
INPUT "ENTER NAME";N$
Answer the following questions in one sentence: INPUT "ENTER ADDRESS";A$
1. In which communication media data transfer is the fastest? INPUT "ENTER PHONE NUMBER";PH
2. What is cyber-crime? WRITE #2, N$,A$,PH
3. What is topology? INPUT "Do you want to continue(y/n)?";an
4. What is primary key? IF LCASE(an$)="y" THEN GOTO UP
5. . Write the types of parameters? CLOSE #1
6. How many keywords are in c language? END
A. Write appropriate technical term for the following:
1. A main computer of a computer network. E. Study the following program and answer the given questions:
2. A malicious program of computer that damages data and Software. DECLARE FUNCTION TEST (A)
3.Write the full form of the following: X = 10
a) WLAN – Z = TEST (X)
b) POP – PRINT Z
END
B. Answer the following questions.
1.What is data communication? Write the basic elements of data communication. FUNCTION TEST (B)
2.What is computer ethics? Write any two commandments of computer ethics. FOR I = 1 TO B
3.What is digital citizenship? List out the major themes of digital citizenship. S=S+I*I
4.What is online payment? Write some different modes of electronic payment. NEXT I
5.What is hardware security? Write the role of Ups in hardware security. TEST= S
6. What is database? Write any two examples. END FUNCTION.
7. What is table in Access? In how many ways we can create a table in Ms Access?
8.What is action query? Write its type. Questions:
9.Name any four objects of Ms-Access . a) How many parameters are used in the above program?
C. Write down the output of the given program. Show with dry run in table . b) How many times does the statement S=S + I * I will be executed in the above program?
F. Convert as per instructions.
DECLARE SUB SERI() a) (110111)2 into (?)8
CLS b)(25AF)16 into (?)10
CALL SERI c)110110 + 100011
END d)1110001 ÷ 110
G.
SUB SERI i. Write a program in QBasic that ask the radius and height of a cylinder and calculate the
X# = 1 volume and curve surface area. Create a user-defined function to calculate volume and sub-
FOR I = 1 TO 5 procedure to calculate curve surface area of a cylinder. [Hints: V=πr2 h, CSA=2πrh]
PRINT X# * X# ii. A sequential data file called "Emp.dat" has stored data under the field heading name,
X# = X# * 10 +1 post and salary. Write a program to display the records of those employees whose salary is
NEXT I more than Rs. 25000.
END SUB H. Write a program in C language to ask to enter two numbers and find out sum and
product.
D. Rewrite the given program after correcting the bugs.
Write a C program to ask to enter a number then find out whether it is even or odd.
REM to create sequential data file "record.dat" to enter some records.
WRITE 1,N$,A
SET 12 CLOSE #1
Group "A" END
1. Answer the following questions in one sentence: [6x1=6]
a) What is search engine ? 7. Study the following programs and answer the given questions. [2x1=2]
b) What is digital currency? DECLARE SUB question (a, b, c)
c) Define MS Access. CLS
d) What is Software security? x=10: y=20 : z=15
e) What is Cloud computing? CALL question(x,y,z)
f) Write any two features of C programming language? END
2. Write appropriate technical terms for the following: [2x1=2] SUB question(a,b,c)
a) A company that provides Internet service to customers. a = a +10
b) A powerful program that controls and coordinates a computer‟s hardware devices and b=b+a
runs software and applications. c=a+b
3. Write the full form of the following: [2x1=2] PRINT a,b,c
a) SMTP- b) POS- END SUB
Group "B" a) What would be its output if x=1,y=2, z=3?
4. Answer the following questions in short : [9x2=18] Ans: The output would be 11 13 24.
aWhat is the difference between Switch and Router? b) Write actual and formal parameters used in the program.
b) Define two major uses of internet. Group C
c) What is data sorting. Give any two examples. 8. Convert /Calculate as per the instruction. [4x1=4]
d) Define online payment with example. a) (1110011010)2 = (?)8
e) What is hardware security ? Write any two security measures of it. b) (255)10 = (?) 2
f) What is report? Mention its uses. c) (1001) 2 – (111) 2 = (?) 2
gWhat do you understand by Data Redundancy? d) (111111) 2 ÷ (111) 2
h) What is firewall in computer. Write its type.
i) What is primary key? Write its importance. 9. Write a program in QBASIC to display greater number using function procedure and smaller number
5. Write down the output of the given program with dry run table. [2] using sub procedure among three numbers. [4]
DECLARE SUB NUMBER () b. A sequential data file called "record.txt " has stored data under the field heading Roll No., Name,
CLS Gender, English, Nepali ,Maths and Computer. Write a program to display all the information of
CALL NUMBER those students whose gender is 'F' and obtained marks in computer is more than 90.
END
SUB NUMBER 10.
N=3:C=1 Write a program in C-language to display first 10 natural numbers. [4]
WHILE C<=5
PRINT N OR
N=N*10+3 Write a „C‟ program that takes principle, rate and time as input and it calculate the simple
C=C+1 interest.
WEND
END SUB
Dry Run
6. Re-write the given program after correcting the
bug. [2]
REM To store name and age in a sequential data file STD.DOC
OPEN STD.DOC FOR OUT AS#1
CLS
INPUT "Enter name";N
INPUT "Enter age";A
6. Re-write the given program after correcting the bugs: [2]
SET 13 REM to store record in data file
Group A CLS
OPEN "employee.dat" FOR INPUT AS #1
1. Answer the following questions in one sentence. DO
a) Where does intranet has been used? INPUT "Enter Name, address and gender": NS, A. G
b) Write any two benefits of cloud computing. INPUT #1, NS, A. G
c) Which data type is used to store date of birth of an employee in MS-Access? INPUT "Do you want to continue "; Y$
d) Write any two data type used in MS-Access database ? WHILE UCASE$(Y$) = "Y"
e) What are procedure in QBASIC? CLOSE "employee.dat"
f) Write any two features in 'C' language. END
2. Write appropriate technical term for the following. [2x1=2]
a) The protocol that makes the network communication possible. 7. Study the following program and answer the given questions: [2]
b) Digital marks created while using Internet. DECLARE FUNCTION text$(N$)
3. Write the full form of the following. [2x1=2] CLS
(a) ISDN – INPUT "Enter any string":X$
b) TCP/IP – PRINT text$(X$)
END
Group B FUNCTION text$(N$)
FOR i=len (N$) TO 1 STEP-1
Answer the following question in short. 9x2=18 W$=W$+MID$(N$,i,1)
a) Differentiate between peer to peer and client-server network with figure. NEXT i
b) What is cyber ethics? Give any two example of it. text$ = WS
(c) What is software security? Write any two measures of software security. NEXT Q
(d) Define E-Commerce ? Write its importance. END FUNCTION
e) Why mobile computing is necessary in present time? Write any two importance of it. Questions:
f) Differentiate between Primary key and Foreign key with example. a) What is the main objective of above program?
g) What is query? List any two advantages of it. b) List all the parameters used in above program.
h) What is data sorting ? List any two advantages of using it.
i) Define form. Write its importance Group C
5. Write down the output of the given program. Show with dry run in table. 8. Convert/ Calculate as per the instruction.
a) (10111101) 2 = (2)x
DECLARE SUB SERIES () c) ( 10101) 2 X (111)
CLS b) (645) 10 = (?)16
CALL SERIES d) (111110) / (110)
END 9. a) Write a program in QBASIC to input length and breadth of room and calculate its
SUB SERIES ( ) area using function and perimeter using sub procedure. [Hint: Area = lxb. Perimeter =
X=1 2(l+b)]
Y=2 b) A sequential data file called "Records.dat" has stored data under the fieldheading Roll
FOR P 1 TO 10 No., Name, Gender, English, Nepali, Maths and Computer. Write a program to display all
PRINT X: the records of students whose marks in computer is more than 90.
X=X+Y 10. Write a program in C to sum of odd number from 80 to 90.
Y=Y+1 OR
NEXT P Write a program in 'C' language to input three number and find greatest number among
END SUB three numbers.
SET 14 DO
Group 'A' INPUT "Enter name"; name$
1. Answer the following questions in one Sentence. [6x1=6] INPUT "Enter address"; address
a) Write two examples of bounded media. WRITE name$, address$
b) Write two methods for hardware security. INPUT "do you want to continue"; ans$
c) What is M-Commerce? LOOP WHILE UCASE$(ans$)="Y"
d) List two examples of DBMS. CLOSE #2
e) What is modular programming in Q-Basic programming? END
f) What is C language? 7. Read the following program and answer the given questions: [2]
2. Write the technical term for the following statements. [2x1=2] DECLARE SUB string(x$)
a) The fake attempt to obtain sensitive information such as username, password by CLS
disguising oneself as a trustworthy entity. X$=“COMPUTER"
b) The technology to encode file or message. CALL string(X$)
3. Write the Full Forms of the following: [2x1=2] END
a) URL - b) ADSL - SUB string(x$)
Group 'B' [9x2=18] L=LEN(X$)
4. Answer the following questions: FOR A = L to 1 step -2
a) "Computer network reduces the operation cost". Justify the statement. PRINT MID$(x$.A,1);
b) What is computer security? Write two measures to protect it. NEXT A
c) What is e-governance? Write any two advantages of e- governance, END SUB
d) What is E-commerce? Write any two advantages of it. Questions:
e). How does IOT help in our daily life? Explain. a) What is the value of L in the above program?
f) List any four data types of MS-Access. Also mention its function. b) List the numeric and string variable in the above program.
g) Define field and record in database. Group C
h) What is primary key? Write its importance. 8. Convert the following as indicated. [4x1=4]
i) What is query in MS-Access? List different types of query in MS-Access. i) (CAB)16 into binary
5. Write the output of the given program showing the dry able. [2] ii) (767)8 into decimal
DECLARE SUB series() i) (1110111)2 + (1011)2-(11)2
CLS iv) (10111101)2 ÷(101)
CALL series 9. Answer the following questions: [4x2=8]
END a) Write a program to calculate total surface area of a cylinder using function
SUB series() procedure and volume using sub procedure. [Hint: Total surface area-2 r(h+r),
A=11111 Volume=r2h] [4]
C=5 b) A sequential data file "employee.dat" contains name, address, age and salary of
WHILE C>=1 employees. WAP to display all the information whose address is 'Kathmandu' and
PRINT A; salary is greater than 50000. [4]
A=A\10 10. Write a program in C programming to find the reverse of an input number. [4] OR
C=C-1 Write a C program to input three different numbers and check whether the input number is
WEND positive, negative or zero. [4]
END SUB
6. Debug the following program.
REM to store name, address in the file "store.dat"
CLS
OPEN "store.dat" FOR INPUT AS #1
INPUT #1, NAME$,AGE,SALARY
SET 14 DISPLAY NAME$, AGE, SALARY
Group 'A' LOOP WEND
1. Answer the following questions. CLOSE #1
a) Write any two examples of full duplex modes of data transmission. END
b) List any two software security measures.
c) Which data type is also known as logical data type in MS-Access? Study the following program and answer the given questions.
d) Which query is used to view the data stored in database?
e) What will be the value of x in given c expression x=55 % 10?
f) What is looping ? DECLARE FUNCTION ABC$(N$)
2. Write appropriate technical term: (2X1-2) CLS
a) Digital marks created while using internet. INPUT “ENTER ANY WORD”; W$
b) The process of repeatedly executing some code until condition satisfies. PRINT “THE RESULT STRING IS”; ABC(W$)
3. Write full forms of the following: (2X1=2) END
bps: VOIP:
Group 'B' FUNCTION ABC$ (N$)
4. Answer the following questions: । (9X2-18) FOR I=1 TO LEN (N$)
a) Define computer network. List two demerits of computer network. P$=MID$ (N$,I,1)
(b) Give any two advantage of E-mail over traditional mail. R$=P$+R$
c) Define computer security How antivirus helps to secure computer software? NEXT I
d) Define E-Commerce? Write the name of any two E-commerce sites. SHARED R$
e) What is Cryptography? How encryption helps in data protection? ABC$=R$
f) What is database? List two advantages of DBMS END FUNCTION
g) What is data redundancy? How can it be reduced in database?
h) Define primary key. Write any two uses of it. 7) Study the following program and answer the given questions. [2]
1) Differentiate between fields and records with an examples.
a) List the arguments and parameters used in above program
5) Write the output of the following program. Show dry run in table. [2] b) What is the use of SHARED in above program?

DECLARE FUNCTION EXAM$(W$) Group 'C'


W$ = "COMPUTER" 5)Perform the operations as indicated.
PRINT EXAM$(W$)
FUNCTION EXAM$ (W$) a) (10111)2-(?)10
FOR P = 1 TO LEN(W$) b) (CCA)16 = (?)2
K$ = MID$(W$, P, 1) c) (1110 + 1110) X 11
IF P MOD 2 = 0 THEN d) (111001) ÷ (101)
K$ = LCASE$(K$)
ELSE 9) Answer the following questions, [4x2=8j
K$ = UCASE$(K$) a) Write a program in QBASIC that asks principal, time and rate of interest and calculate simple
END IF interest and amount. Create a user- defined function to calculate simple interest and sub-program to
S$ = S$ + K$ calculate amount. Hint: [S1-P*T*R/1001, (A-P+SI)
NEXT P b) Write a sequential data file called "abc.dat" has stored data under the field heading Roll No.,
EXAM$ = S$ Name, English, Nepali and Computer. Write a program to display all the information of those
END FUNCTION students whose marks in computer is more than 45.
6) Rewrite the given program after correcting bugs, 10) Write a c program to accept any three numbers and display their average.
REM PROGRAM DISPLAY RECORDS
OPEN INFO.DAT FOR INPUT AS #1 OR
CLS
WHILE NOTEOF(2) Write a C program to find out the given number is odd or even

You might also like