SEE Solved Question Paper Of Computer Science Opt. II | 2074 [2018] | RE-334

see solved question paper of computer science optional ii 2074-2018 re-334
DR Gurung
SEE-Solved-Question-Paper-Of-Computer-Science-Opt-II-2074-2018-RE-334
SEE - 2074 (2018)
OPTIONAL II COMPUTER SCIENCE
RE-334
Time: 1hr 30 minutes
Full Marks: 50
DOWNLOAD PDF | SEE Optional II Computer Science | Question Paper | RE-334 | 2074/2018
Download
Also Check:
Solved SEE Computer Science Question Paper 2075-2019 RE-334.
Also Check:
Check and Download | All Question Papers Of SEE | 2074/2018

Candidates are required to give their answer according to the given instructions.

Group 'A'

Computer Fundamental (22 Marks)

1. Answer the following questions): [5x2=10]

a. Define computer network.
Answer: Computer network can be defined as a connection between computers and other
electronic devices to share the resources and information. Or any other similar answer.

b. Define Internet.
Answer: A global computer network providing a variety of information and communication facilities is called internet.

c. Write the importance of power protection device to protect the computer system.
Answer: The importance of power protection device to protect the computer system are:

i) To protect the hardware against damage from unexpected power failures.
ii) To protect files and programs being corrupted due to sudden power failure.

d. What is computer virus? Mention any two symptoms that can be seen when a computer is infected by computer virus.
Answer: A computer program which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
The two symptoms that can be seen when a computer is infected by computer virus are:
i) Unexpected computer behavior
ii) Computer becomes slower

e. What is cybercrime? Give any two examples.
Answer: The criminal activities involving the information technology with the help of computer is known as cyber crime. The two examples of cyber crime are:
i) Fraud and Identity theft,
ii) Phishing scams.

2. a. Perform the conversion as per the direction: [2x1=2]

(i) (523)8 into Binary
Answer:

Conversion to Binary
(ii) (2074)2 into hexadecimal.
Answer:

Conversion to Hexadecimal
b. Perform the binary calculation): [2x1=2]
(i) 110 x 101
Answer:

Binary Calculation
(ii) 111010 ÷ 110
Answer:

Binary Calculation 

3. Match the following: [4x0.5=2]

Group 'A' Group 'B'
(a) RJ 45 connector (i)Duplicate copy
(b) Back up (ii) Multimedia
(c) Microphone (iii) Twisted pair cable
(d) Hub/switch (iv) Ring Topology

(v) Star Topology

Answer:


(a) RJ 45 connector ⇾ (iii) Twisted pair cable
(b) Back up ⇾ (i) Duplicate copy
(c) Microphone ⇾ (ii) Multimedia
(d) Hub/switch ⇾ (v) Star Topology

4. Select the best answer of the following: [4x0.5=2]

a. Which of the following is not a network protocol?
(i) POP (ii) FTP (iii) TCP/IP (iv) NOS
Answer: (iv) NOS

b. Which of these software is used for photo editing?
(i) Ms-Excel (ii) Photoshop (iii) Power-Point (iv) Ms-Word
Answer: (ii) Photoshop

c. Which device is used to connect multiple networks that uses the same protocol.
(i) Bridge (ii) NIC (iii) Switch (iv) Gateway
Answer: (i) Bridge

d. Process of arranging the scattered files into a contiguous manner.
(i) Scandisk (ii) Backup (iii)Defragmentation (iv) Debugging
Answer: (iii)Defragmentation

5. Write the appropriate technical terms of the following: [4x0.5=2]

a. The physical layout of local area network.
Answer: Topology
b. The business conducted through Internet.
Answer: E-commerce
c. The law which controls the crime which is done with the help of computer and Internet.
Answer: Cyber law
d. A computer or device which provides different services to other computers connected to the network.
Answer: Server

6. Write the full form): [4x0.5=2]

(i) SMTP
Answer: Simple Mail Transfer Protocol
(ii) WAN
Answer: Wide Area Network
(iii) URL
Answer: Uniform Resource Locator
(iv) VOIP
Answer: Voice Over Internet Protocol

Group 'B'

Database (10 Marks)

7. Answer the following questions): [3x2=6]

a. Define Database.
Answer: Database can be defined as an organized collection of data which can be easily accessed, managed and updated.

b. What is data redundancy? How can it be reduced in database?
Answer: The repeatition of same piece of data in a database in more than one location is called data redundancy.

c. Mention any four data types that can be used in Ms-Access.
Answer: The four data types that can be used in Ms-Access are:
i) Text,
ii) Record,
iii) Number,
iv) Date/Time or any other valid data types.

8. Select the correct answer): [4x0.5=2]

a. Which of the following is not accepted by primary key?
(i) Number (ii) Text (iii) Null value (iv) None
Answer: (iii) Null value

b. What is called rows in database table?
(i) Field (ii) Record (iii) Form (iv) None
Answer: (ii) Record

c. Which data type consumes the least storage space?
(i) Text (ii) Yes/No (iii) OLE object (iv) Memo
(i) Field (ii) Record (iii) Form (iv) None
Answer: (ii) Yes/No

d. Which is the default data type of Ms-Access?
(i) Memo (ii) Number (iii) Text (iv) Auto number
Answer: (iii) Text

9. (Match the following): [4x0.5=2]

Group 'A'Group 'B'
(a) Data(i)Input, view, edit data
(b) Form(ii) Formated output
(c) Report(iii) Collection of raw facts
(d) Table(iv) Question to the database

(v) Stores data in database

Answer:
(a) Data ⇾ (iii) Collection of raw facts
(b) Form ⇾ (i) Input, view, edit data
(c) Report ⇾ (ii) Formated output
(d) Table ⇾ (v) Stores data in database

Group 'C'

Programming (18 Marks)

10.
a. What is formal parameter? [1]
Answer: The variable which is used in the function definition is called formal parameter.

b. List any two data types used in C programming language. [1]
Answer: The two data types used in C programming language are:
i) int,
ii) char.

c. Write the function of KILL and CLOSE statements. [1]


Answer: The function of KILL and CLOSE statements are:
i) KILL - To delete the file,
ii) CLOSE - To close any opened file.

11. Re-write the given program after correcting the bugs: [4x0.5=2]

REM TO find the factorial of a given number.
DECLARE FUNCTION FACTO (N$)
CLS
INPUT "Enter a number", X
PRINT "The Factorial is: ", FACTO (N)
END
FUNCTION FACTO (N)
F = 1
WHILE N = 0
F = F*N
N = N - 1
WEND
F = FACTO
END FUNCTION
Answer:

REM To find the factorial of a given number
DECLARE FUNCTION FACTO (N)
CLS
INPUT "Enter a number", X
PRINT "The Factorial is :", FACTO (X)
END
FUNCTION FACTO (N)
F = 1
WHILE N > 0
F = F * N
N = N – 1
WEND
FACTO = F
END FUNCTION
12. Write the output of the following program: [2]
DECLARE SUB Display (T$)
CLS
T$ = "COMPUTER"
CALL Display (T$)
END
SUB Display (T$)
FOR C = 1 TO LEN (T$) STEP 2
D$ = MID$ (T$, C, 1)
PRINT D$;
NEXT C
END SUB
Answer: Output ⇾ CMUE
13. Study the following program and answer the given questions: [2x1=2]
DECLARE FUNCTION SUM (N)
CLS
INPUT "Enter any number", N
S = SUM (N)
PRINT "The Sum of individual digit is:", S
END
FUNCTION SUM (N)
WHILE N > 0
R = N MOD 10
T = T + R
N = N\10
WEND
SUM = T
END FUNCTION.
a) State the purpose of using variable S in line 4 in above program.
Answer: Variable S is used to store the value returned by the function Sum.
b) Write the use of MOD in above program.
Answer: MOD is used to get the remainder of the division.
14.
a. Write a program to calculate area of a circle using Sub..... End Sub. [3]
Answer:
DECLARE SUB Area (r)
CLS
INPUT "Enter radius of circle", r
CALL Area (r)
END
SUB Area (r)
A = 3.14*r*r
PRINT "Area of circle :" ; A
END SUB
b. Write a program using FUNCTION... END FUNCTION to count the number of words in a sentence. [3]
Answer:
DECLARE FUNCTION WCount (S$)
CLS
INPUT "Enter a sentence", S$
C = W Count (S$)
PRINT "The number of words is :" ; C
END
FUNCTION WCount (S$)
W = 1
FOR I = 1 To LEN (S$)
C$ = MID $ (S$, I,1)
IF C$ = " " THEN W = W + 1
NEXT I
W Count = W
END FUNCTION


c. Write a program to store Roll no., Name, Class and Address of any five students. [3]
Answer:
OPEN "Student.dat" FOR OUTPUT AS #1
FOR I = 1 TO 5
INPUT "Enter Roll No.", r
INPUT "Enter Name", n$
INPUT "Enter Class", c
INPUT "Enter Address", a$
WRITE #1, r, n$, c, a$
NEXT I
CLOSE #1
END 

Search Terms/button

SEE Optional II Computer Science RE-334 Question 2074-2018., 2074 SEE Question Paper., SEE Solved Exam Paper Of Computer Science 2074-2018., SEE Optional II Computer Science RE-334 Question Paper 2074., Download SEE Question Paper 2074., Check and Download Optional II Computer Science RE-334 Question 2074., Download Question Paper Of Optional II Computer Science RE-334 2074-2018., Check SEE Optional II Computer Science RE-334 Question Paper 2074/2018., SEE Question Papers and Solution 2074., SEE/SLC Solution Of Computer Science Exam Paper 2074., Solved Question Paper Of Computer Science 2074/2018 Class 10., Solution Of Question SEE 2074., Solution Of Optional II Computer Science RE-334 Question SEE 2074., Optional II Computer Science RE-334 Question Paper 2074/2018. alert-info

DR Gurung
A Learner (अज्ञान जस्तो ठूलो शत्रु अरु केही छैन।) 🙏🙏
Comments
First of all, thank you for taking the time to read my blog. It's much appreciated! If you would like to leave a comment, please do, I'd love to hear what you think!

Suggestions and/or questions are always welcome, either post them in the comment form or send me an email at drgurung82@gmail.com.

However, comments are always reviewed and it may take some time to appear. Always keep in mind "URL without nofollow tag" will consider as a spam.

To add an image:
[image] image_url [/image]

To add a code block:
[code] your_code [/code]

To add a quote:
[quote] your_quote [/quote]

To add a link:
[link] your_link_text | link_url [/link]
Comment Poster
thank you sir. very helpful to students like me. thanks again.
Replied
Most Welcome Dear Eliza :)