You are on page 1of 2

i) Pen drive ii) Floppy disk iii) Sound Card iv) All of these

TRIYOG HIGH SCHOOL 5. Give the technical terms:-


a) Two way communication mode.
[0.5X4=2]

SEE Practice Question


b) A virus that corrupt system file of operating system.
c) A program that allows the user to log into a remote computer on the
Subject: Computer FM: 50
internet.
Class: X PM: 20
d) Technique of providing government information and services through
Time: 1 Hour 30 Mins.
internet..
GROUP-A (FUNDAMENTAL – 22 MARKS) 6. Write the Full forms:- [4X0.5=2]
1. Answer the following questions:- [5X2=10] a) ISDN b)MUK c) CSU d) IPX/SPX
a) What do you mean by network topology? Mention any 2 advantages &
2 disadvantages of Bus topology. GROUP – B (DBMS – 10 MARKS)
b) List out any four services of internet. 7. Answer the following questions:- [3X2=6]
c) Mentions any 4 steps to prevent computer virus a) Define database. Name any 2 DBMS software.
d) What do you mean by hardware security? Mention any 4 hardware b) Name any four types of data type used in MS-ACCESS.
security measures. c) Write any 2 differences between Form and Report.
e) What do you mean by cyber law? Mentions any 2 moral ethics. 8. Select the best answer:- [4X0.5=2]
a) Record of the table is also called:-
2. i) Field ii) Tuple iii) Text iv) All
a) Convert as indicated:- [2X1=2] b) ______ is the filed property of MS-ACCESS
i) (531)10 into octal ii) (652)8 into hexadecimal i) Filter ii) Index iii) Validation Rule iv) Format
b) Perform binary calculation:- [2X1=2] c) Report is used for-
i) (1010 + 111) – 1011 ii) Divide 100101 by 101 i) Data print ii) Data view iii) data input iv) All of these
d) Currency data type occupies-
3. Match the following: - [4X0.5=2] i)2 bytes ii) 4 bytes iii) 8 bytes iv) 1GB
Group “A” Group “B” 9. Match the following:- [4X0.5=2]
a) Volt Guard i) internet Column A Column B
b) protocol ii) Security mechanism Data type limit the value
c) Fiber Optics iii) power protection device Report Searching fast
d) Backup iv) Guided media Form Final Output
v) Communication rule Validation rule OLE
4. Choose the correct answer:- [4X0.5=2] Enter data
a) The unique address of web page on the internet:- GROUP – C( PROGRAMMING- 18 MARKS)
i) Browser ii) HTTP iii) URL iv) BUs 10.
b) Which of the following is computer virus:- a) Define modular programming. [1]
i) Worms ii) Trojan Horse iii) I love you iv) All of these b) Write the function of MKDIR and KILL statement. [1]
c) Cyber law of Nepal was introduced in :- c) Write any 2 data types of “C” language. [1]
i) 2062 ii) 2061 iii) 2051 iv) 2063
d) Main component of multimedia is:- 11. What will be the output:- [2]
DECLARE SUB RESULT( ) b) Write a Sub program to input a number and display whether it is prime
CLS number or composite. [3]
CALL RESULT c) Assume that data file “INFO.DAT” contains employees’ code, name,
END address, salary. Write a program to display records whose salary is
SUB RESULT( ) between 10000 to 50000. [3]
FOR I = 1 TO 6
READ N
S$=S$+ CHR$(N)
NEXT I
PRINT S$
DATA 83,101,108,102,105,101
END SUB
12. Debug the program: - [2]
REM “ TO DISPLAY RECORDS FOR AGE ABOVE 15”
OPEN STUDENT.DAT FOR INPUT #1
DO WHILE NOT EOF(1)
INPUT SYMBOL, NAME$, ADD$, AGE
IF AGE<=15 THEN
PRINT SYMBOL, NAME$, ADD$, AGE
ENDIF
NEXT
CLOSE #1
END
13. Study the following program and answer the given questions:- [2]
DECLARE SUB RESULT (A,B,C )
CLS
READ X,Y,Z
CALL RESULT(X,Y,Z)
DATA 3,5,2
END
SUB RESULT (A,B,C )
IF A<B THEN SWAP A,B
IF B<C THEN SWAP B,C
PRINT A,B,C
END SUB
a) List out arguments and parameters in the above program.
b) What will be the output?
14.
a) Write a function program to calculate distance travelled by a body. [3]

You might also like