0% found this document useful (0 votes)
210 views8 pages

SEE Model Question All Subject

This document contains an examination table for the subject "Computer Science" with details such as distribution of marks, time duration, chapters covered, types of questions and marks allocation. It provides the exam blueprint for the final secondary level examination in Computer Science subject with an objective to assess students' understanding of the basics and concepts in a structured and standardized way. The exam will have 27 questions worth 50 marks to be completed in 1 hour and 30 minutes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
210 views8 pages

SEE Model Question All Subject

This document contains an examination table for the subject "Computer Science" with details such as distribution of marks, time duration, chapters covered, types of questions and marks allocation. It provides the exam blueprint for the final secondary level examination in Computer Science subject with an objective to assess students' understanding of the basics and concepts in a structured and standardized way. The exam will have 27 questions worth 50 marks to be completed in 1 hour and 30 minutes.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

sDKo'6/ lj1fg

ljlzi6Ls/0f tflnsf 18
ljlzi6Ls/0f tflnsf, @)&^
;}4flGts d"Nofª\sg
ljifo M sDKo'6/ lj1fg

ljlzi6Ls/0f tflnsf
k"0ff{ª\s M %) ;do M ! 306f #) ldg]6
k|Zg of]hgf tyf cª\sef/ ljt/0f
PsfO If]q÷PsfO Kff7\o 1fg Aff]w k|of]u pRr bIftf hDdf cª\sef/
ef/ clt 5f]6f] nfdf] clt 5f]6f] nfdf] clt 5f]6f] nfdf] clt 5f]6f] nfdf] clt 5f]6f] nfdf]
5f]6f] 5f]6f] 5f]6f] 5f]6f] 5f]6f]
! Computer Funda- 34 3 2 3 2 1 6 4 1
mental

Dtabase manage- 42 1 2 1 2 2 4
ment system

# Programming in 61 1 2 2 2 3 2 2
Qbasic

$ Introduction to C 29 1 1 1 1
Language

Total 170 6 4 4 3 2 4 1 3 12 11 4

19
k|Zgsf k|sf/x¿
k|Zgsf k|sf/x¿ ;f]lwg] ;ª\Vof ;do ljefhg k'0ff{ª\s
clt ;ª\lIfKt k|Zg 12 @% ldg]6 12
5f]6f pQ/ cfpg] k|Zg 11 #% ldg]6 22
Nffdf] pQ/ cfpg] k|Zg 4 #) ldg]6 16
hDdf 27 ! 306f #) ldg]6 50

ljlzi6Ls/0f tflnsf 20
dfWolds lzIff k/LIff
gd'gf k|Zgkq

ljifoM sDKo'6/ lj1fg


k"0ff{ª\s M %) ;do M ! 306f #) ldg]6
;d"x s Group ‘A'

!= tnsf k|Zgx¿sf] Ps jfSodf pQ/ lbg'xf];\ M -^×!Ö ^_


Answer the following questions in one sentence:
-s_ ;r{ OlGhg eg]sf] s] xf] <
What is search engine?
-v_ OG6/g]6dfkm{t ul/g] Jofkf/nfO{ s] elgG5 <
What is the business done through the internet?
-u_ Pd=P;= PS;];df s'g 8f6f 6fOkn] cNkmf Go'd]l/s Sof/]S6/ jf :k];n l;Daf]N;nfO{ cg'dlt
lbG5 <
Which data type is used to store numeric characters or special symbols in
MS-Access?

-3_ Pd=P;= PS;];df 6]ansf]] structure nfO{ modify ug{ s'g rflxF view sf] k|of]u ul/G5
<
Which view is used to modify a table in MS-Access?
-ª_ df]8\o'n/ k|f]u|fldª eg]sf] s] xf] <
What is Modular Programming?
-r_ C language s'g} b'O{cf]6f ljz]iftf n]Vg'xf];\ .
Write any two features of C language.
@= pko'St k|fljlws zAb n]Vg'xf];\ M
-@×!Ö @_
Write appropriate technical term for the following:
-s_ ;fOa/ :k];;DaGwL sfg'gL k|lqmof
Law that governs the legal issues of cyberspace.
-v_ SjfG6d sDKo'6/sf] ;"rgfsf] ;a}eGbf ;fgf] PsfOsf] ¿k

ljlzi6Ls/0f tflnsf 21
The smallest unit to represent information on quantum compute.
#= k"/f ¿k n]Vg'xf];\ M -@×!Ö @_
Write the full form of the following:
I. STP
II. WAP

;d"x v Group ‘B'


$= tnsf k|Zgx¿sf] 5f]6f] pQ/ lbg'xf];\ M (×@Ö!*
Answer the following questions:
-s_ sDKo'6/ g]6js{ eg]sf] s] xf] < o;sf s'g} b'O{cf]6f kmfObfx¿ pNn]v ug'{xf];\ .
What is computer network? Enlist any two advantages of it.
-v_ sDKo'6/ g}ltstf eg]sf] s] xf] < o;sf s'g} b'O{ gLltx¿ n]Vg'xf];\ .
What is computer ethics? Write any two of them.
-u_ ;ˆ6j]o/ ;'/Iff eg]sf] s] xf] < xf8{j]/ ;'/Iffsf s'g} b'O{ pkfox¿ n]Vg'xf];\ .
What is software security? Write any two measures of hardware security.
-3_ Pd sd;{ eg]sf] s] xf] < o;sf b'O{ dxŒjk"0f{ ;]jfx¿ n]Vg'xf];\ .
What is m-Commerce? Write its two important services.
-ª_ OG6/g]6 ckm lyª\; (IoT) eg]sf] s] xf] < o;sf s'g} b'O{ dxŒjx¿ n]Vg'xf];\ .
What is IoT? Write any two importance of it.
-r_ 8f6fa]; eg]sf] s] xf] < s'g} b'O{cf]6f pbfx/0f lbg'xf];\ .
What is database ? Give any two examples.
-5_ k|fOd/L sL eg]sf] s] xf] < o;sf s'g} b'O{cf]6f kmfObfx¿ pNn]v ug'{xf];\ .
What is primary key? List any two advantages of it.
-h_ 8f6f ;l6{ª eg]sf] s] xf] < o;sf] k|of]uaf6 x'g] s'g} b'O{cf]6f kmfObfx¿ pNn]v ug'{xf];\ .
What is data sorting? List any two advantages of using it.
-em_ s:tf] sfo{ ug{ PS;];df Sj]/L / kmd{ cAh]S6sf] k|of]u ul/G5 <
What types of work is done in MS-Access using Form and query object?
%. tn lbOPsf] k|f]u|fdsf] cfp6k'6 n]Vg'xf];\ . Dry run 6]andf b]vfpg'xf];\ . -@_
Write down the output of the given program. Show with dry run in table.
DECLARE SUB SHOW (A)
CLS

ljlzi6Ls/0f tflnsf 22
N = 87
CALL SHOW (N)
END
SUB SHOW (A)
DO
B = A MOD 6 + 3
IF B MOD 4 = 0 THEN GOTO AA
PRINT B;
AA:
A = A - 10
LOOP WHILE A >= 50
END SUB
^= tn lbOPsf] k|f]u|fddf /x]sf uNtLx¿nfO{ ;RofP/ k'gM n]Vg'xf];\ M -@_
Re-write the given program after correcting the bugs:
REM to add record in an existing file
CLS
OPEN “Record.Dat” FOR OUTPUT AS #1
AA:
INPUT “Enter Name, Class and Roll No. “; Nm$, Cl, Rn
INPUT #2, Nm$, Cl, Rn
INPUT “More records “; Y$
IF UCASE$(Y$) = “Y” THEN GOTO aa
CLOSE “Rrecord.dat”
END
&= tn lbOPsf] k|f]u|fdnfO{ cWoog u/L lbOPsf k|Zgx¿sf] pQ/ n]Vg'xf];\ M -@×!Ö @_
Study the following program and answer the given questions:
OPEN “Detail.dat” FOR INPUT AS #1
OPEN “Temp.dat” FOR OUTPUT AS #2
INPUT “Enter name of the students “; Sn$
FOR I = 1 TO 10
INPUT #1, Nm$, Cl, A
IF Sn$ < > Nm$ THEN
WRITE #2, Nm$, Cl, A

ljlzi6Ls/0f tflnsf 23
END IF
NEXT I
CLOSE #1, #2
KILL “Detail.dat”
NAME “Temp.dat” AS “Detail.dat”
END
-s_ dfly lbOPsf] k|f]u|fdsf] d'Vo p2]Zo s] xf] <
What is the main objective of the program given above?
-v_ olb “KILL” statement nfO{ k|f]u|fdaf6 x6fpg] xf] eg] dflysf] k|f]u|fddf s]xL ;d:of cfpF5
ls cfpFb}g < sf/0f n]Vg'xf];\ .
Do you get any problem in the above program if “Kill” statement is removed?
Give reason.
;d"x u Group ‘C'
*= lgb{]zfcg';f/ ¿kfGt/ / lx;fa ug'{xf];\ M -$×!Ö $_
Convert / calculate as per the instruction:
i) (11001101)2 = (?)16
ii) (524)10 = (?) 2
iii) iii) (1010) 2 x (110) 2 – (1011) 2 = (?) 2
iv) iv) (10110) 2 ÷ (101) 2
(= -s_ s'g} Pp6f sf]7fsf] nDafO{, rf}+8fO{ / prfO{ dfuL pQm sf]7fsf] If]qkmn / cfotg kQf
nufpg] k|f]u|fd So'j]l;s efiffsf] k|of]u u/L n]Vg'xf];\ . If]qkmn u0fgf ug{ o'h/ l8kmfOG8 km+S;g
/ cfotg u0fgf ug{ ;a k|f]u|fd agfpg' xf];\ . -$_
Write a program in QBASIC that asks length, breadth and height of room and cal-
culates its area and volume. Create a user-defined function to calculate area and
sub-program to calculate volume. Hint: [A = LxB], [V = LxBxH]
-v_ “Record.dat” eGg] sequential data file df Roll No., Name, Gender, English,
Nepali, Maths / Computer field x¿df data e08f/ u/]/ /flvPsf] 5 . To; data file
af6 Gender ‘F' x'g] / sDKo'6/ ljifodf cª\s () eGbf dfly ePsf ljBfyL{x¿sf] ;Dk"0f{ /]s8{
lk|G6 ug]{ k|f]u|fd n]Vg'xf];\ . -$_
A sequential data file called “Record.txt” has stored data under the field heading
Roll No., Name, Gender, English, Nepali, Maths and Computer. Write a program
to display all the information of those students whose gender is ‘F' and obtained
marks in computer is more than 90.

ljlzi6Ls/0f tflnsf 24
!)= s'g} Pp6f ;ª\Vof dfuL pSt ;ª\Vof hf]8 jf ljhf]8 s] xf], ;f] kQf nufpg] k|f]u|fd ;L Nofª\j]hdf
n]Vg'xf]; . -$_
Write a program in C language that asks a number and check whether it is odd
or even.
cyjf
l; Nofª\j]h sf] k|of]u u/L lbOPsf] cg's|dsf] of]ukmn ;lxt b]vfpg] k|f]u|fd n]Vg'xf];\ .
1,2,3,4,….., bzf}+ kb;Dd .
Write a program in ‘C' language to display the series with their sum. 1,2,3,4,…..,
up to 10th terms.

ljlzi6Ls/0f tflnsf 25

You might also like