Download as pdf or txt
Download as pdf or txt
You are on page 1of 130

SEE COMPUTER SCIENCE 2076

Computer Fundamentals-22 Marks


Database Management System – 10 Marks
Programming – 18 Marks

SLC 2064 to SEE 2075 SLC 2065 Supplementary Megha, Asia, Benchmark, Ekta,
Questions Solutions to SLC 2075 Upgrade
Question Solutions
Innovative, Read More, Times,
Guniess, Sunrise, Unique,
Vidhyarthi, Sanjiwani
2019/20
Fundamentals Questions - 175 300 Questions / Answers
DBMS Questions - 55 1325 Objectives Q/A
Programming Theory Questions - 70 325 – Qbasic Programs
MCQ - 315
300 – Number System
True or False - 360
Fill in the Blanks - 170
Match the Following - 80
Total: 2250
Technical Terms - 200
Full Forms - 200
Number System - 300
Output - 70
Debug - 35
Analytical - 40
Qbasic programming Solutions - 180

COMPILED BY: DEEPAK SHRESTHA


SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Table of Contents

Networking and Telecommunication ................................................................................................................................ 4


Questions and Answers [70] ......................................................................................................................................... 4
MCQ (Multiple Choice Questions) [85] ..................................................................................................................... 12
Fill in the Blanks [30] ................................................................................................................................................. 15
True / False [70] .......................................................................................................................................................... 16
Technical Terms [65] .................................................................................................................................................. 17
Internet and Its Services .................................................................................................................................................. 19
Questions and Answers [40] ....................................................................................................................................... 19
MCQ (Multiple Choice Questions) [40] ..................................................................................................................... 22
Fill in the Blanks [30] ................................................................................................................................................. 24
True / False [50] .......................................................................................................................................................... 24
Technical Terms [50] .................................................................................................................................................. 25
Computer Security .......................................................................................................................................................... 27
Questions and Answers [20] ....................................................................................................................................... 27
MCQ (Multiple Choice Questions) [30] ..................................................................................................................... 29
Fill in the Blanks [15] ................................................................................................................................................. 30
True / False [40] .......................................................................................................................................................... 30
Technical Terms [25] .................................................................................................................................................. 31
Computer Virus ............................................................................................................................................................... 32
Questions and Answers [15] ....................................................................................................................................... 32
MCQ (Multiple Choice Questions) [30] ..................................................................................................................... 33
Fill in the Blanks [20] ................................................................................................................................................. 35
True / False [30] .......................................................................................................................................................... 35
Technical Terms [20] .................................................................................................................................................. 36
Multimedia ...................................................................................................................................................................... 37
Questions and Answers [15] ....................................................................................................................................... 37
MCQ (Multiple Choice Questions) [30] ..................................................................................................................... 38
Fill in the Blanks [20] ................................................................................................................................................... 40
True / False [35] .......................................................................................................................................................... 40
Technical Terms [20] .................................................................................................................................................. 41
Cyber Law And Ethics .................................................................................................................................................... 42
Questions and Answers [15] ....................................................................................................................................... 42
MCQ (Multiple Choice Questions)[20] ...................................................................................................................... 43

https://seeqbasicomputer.blogspot.com/ 2|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Fill in the Blanks [20] ................................................................................................................................................... 44
True / False [35] .......................................................................................................................................................... 45
Technical Terms [20] .................................................................................................................................................. 46
Ms-Access ....................................................................................................................................................................... 47
Questions and Answers [55] ....................................................................................................................................... 47
MCQ (Multiple Choice Questions) [80] ....................................................................................................................... 52
Fill in the Blanks [35] ................................................................................................................................................. 55
True / False [100] ........................................................................................................................................................ 56
Match the following – MS Access [30] ...................................................................................................................... 58
Full Forms [200] .......................................................................................................................................................... 60
Match the Following – Fundamentals [50] ................................................................................................................. 64
Modular Programming .................................................................................................................................................... 68
Questions and Answers [25] ....................................................................................................................................... 68
Handling of data file ....................................................................................................................................................... 70
Questions and Answers [25] ....................................................................................................................................... 70
Introduction of C ............................................................................................................................................................. 71
Questions and Answers [20] ....................................................................................................................................... 71
Find Output [70] ............................................................................................................................................................. 73
Debugging [35] ............................................................................................................................................................... 85
Analytical Questions [40] ............................................................................................................................................... 93
Qbasic Programming Questions [180] .......................................................................................................................... 107
Number System [300] ................................................................................................................................................... 128

https://seeqbasicomputer.blogspot.com/ 3|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Networking and Telecommunication

Questions and Answers [70]


1. Communication
Communication is sending and receiving information between two or more persons.

2. Telecommunication [MFT 2075]


Telecommunication is a system of transmission of sounds, images, texts or data in the form of electronic signals.

3. Data Communication [SLC 2067]


Data communication is a process of transferring data electronically from one place to other using different transmission
mediums. Eg. E-Mail, Chat and phone calls.

Components of Data Communication.


i) Data ii) Sender iii) Medium iv) Receiver v) Protocol

4. Medium
A path through which the sender makes communication to the receiver is known as medium.

5. Protocol [MFT 2075]


Protocol is a set of rules by which computers on the network communicate with each other.
E.g. TCP/IP, SMTP, HTTP etc.

6. Data Transmission Mode [MF 2076]


Data transmission mode is the way of transmission of data from one location to another. There are three types of
transmission mode:
i) Simplex mode
ii) Half duplex mode
iii) Full Duplex Mode

7. Simplex mode [MF 2076]


The transmission mode in which transmission of data can take place in one direction only is called simplex mode.
E.g.: Newspaper, Radio and Television.

8. Half duplex mode [MF 2076]


The transmission mode in which transmission of data can take place in both directions but only in one direction at a
time is called half duplex mode.
E.g.: Wireless handset and walkie-talkie.

9. Full duplex mode [MF 2076]


The transmission mode in which data can be transmitted in both directions simultaneously is called full duplex
mode.
E.g.: Telephone, internet etc.

10. Bandwidth [SEE 2066 S]


Bandwidth can be defined as the maximum volume of data that can be transmitted through a communication
system.
We can measure bandwidth in digital devices by bits per second and in analogue devices by cycles per second or
Hertz (Hz).

https://seeqbasicomputer.blogspot.com/ 4|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
11. Transmission medium / Communication Channel [SLC 2070 S] [SEE 2074 U] [MM 2076] [MFT 2075]
Transmission medium is a pathway that can transmit information from a sender to a receiver through wired or
wireless medium on a network.
The types of communication medium are:
i) Guided Medium (Bounded or Wired)
ii) Unguided Medium (Unbounded or Wireless)

12. Guided medium [SEE 2074 U]


The transmission media which comprises of cables or wires through which data is transmitted is called guided
medium. They are called guided since they provide a physical channel from the sender device to the receiver
device. The signal travelling through these media are bounded by the physical limits of the medium.
E.g.: twisted pair cable, co-axial cable, fibre optics cable, etc.

13. Features of guided media: [SEE 2075]


- Data transmits through the physical cable or fixed path
- Data transmission rate is higher.

14. Unguided medium [SEE 2074 U]


The transmission media which transfer data in the form of electromagnetic waves that do not require any cables for
transmission is called unguided medium. These media are bounded by geographical boundaries.
E.g.: radio wave, microwave, infrared etc.

15. Twisted pair cable


A pair of wires twisted with each other is known as twisted pair cable. A set of four pairs of twisted wires are
bundled to form cable. These are the most common medium for LAN. Wires are twisted with each other so as to
reduce crosstalk (A disturbance caused by electromagnetic interference, along a circuit or a cable pair).
Its types are:
a) Unshielded Twisted Pair Cable
b) Twisted Pair Cable

16. Unshielded twisted pair (UTP)


Unshielded twisted pair is a popular type of cable that consists of two unshielded wires twisted around each other
which are used in telephone wiring and local area networks (LANs). It is called unshielded because it has no
additional foil wrap, or shield.
RJ-45 connector is commonly used with unshielded twisted pair.

17. Shielded twisted pair (STP)


Shielded twisted pair is a type of copper telephone wiring in which each of the two copper wires are twisted
together and coated with an insulating coating. The extra covering in shielded twisted pair wiring protects the
transmission line from electromagnetic interference.
D-shell connectors are used with shielded twisted pair.

18. Co-axial cable


Coaxial (or “coax”) cable is a common type of cable used for transmitting data over long distances. They are most
commonly used to transmit cable TV and Internet signals.
The connectors used with co-axial cables are BNC, T-connectors and terminators in bus topology.
10 Mbps is the maximum speed of co-axial cable.

https://seeqbasicomputer.blogspot.com/ 5|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
19. Fiber optic cable
Fiber optics cable is one of the costlier cables used in data communication which uses light to carry a data signal
through the cable.
The connectors used in fiber optics are Screw Mounted Adaptors (SMA), Spring-loaded Twist (ST), SC and FC.
It is costlier to maintain, produce and install.

20. Radio wave transmission


The transmission making use of radio waves through air is called radio wave transmission.
It provides low bandwidth for data communication.
Radio, TV, cellular phones etc. uses radio transmission in one form or another.
The radio waves can travel through walls and through an entire building.
Depending upon the frequency, they can travel long distance or short distance.
It does not require line of sight for data transmission
21. Microwave transmission
Microwave is a line-of-sight wireless communication technology that uses high frequency beams of radio waves to
provide high speed wireless connections that can send and receive voice, video, and data information.
Microwaves do not pass through buildings. So, indoor receivers cannot be used effectively.
It provides higher bandwidth for data communication.
It requires line of sight for data transmission.

22. Infrared transmission


Infrared Transmission is the transmission of data or voice information over infrared (IR) light over short ranges.
It requires line-of-sight and is unable to break through walls.

23. Computer network [SLC 2066] [SLC 2068 S] [SLC 2069 S] [SLC 2070 S] [SLC 2071 S] [SEE 2074]
[MF 2076]
A computer network means two or more computers connected with each other to share data, hardware, software
and other resources.

24. Advantages of computer network [SLC 2065 S] [SLC 2069] [SLC 2071 S] [SEE 2075 S2] [MF 2076]
[MFT 2075]
a) Computer in a network can access the network-connected hardware devices like printers, disk drives, etc.
b) Data in a network environment can be updated from any computer. Updated data can be accessed by all
computers on the network.
c) Computers in a network system share different software packages.
d) Information can be exchanged rapidly in computer network.

25. Disadvantages of computer network [SEE 2075 S2] [MF 2076] [MFT 2075]
a) The sharing of information may leak the privacy of other clients.
b) The networking cost is high
c) If hardware or software malfunctions, it affects the whole network.
d) Data and information may be stolen by computer hackers if the security of network is not reliable.

26. Services of computer network.


a) Directory services
b) File services
c) Application services
d) Communication services

https://seeqbasicomputer.blogspot.com/ 6|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
27. Reasons of keeping computers on the network [SLC 2070 S]
a) To share hardware devices like printers, scanners, hard disks etc.
b) To share data, information and programs.
c) To communicate with each other.

28. Goals of computer network


a) Resource sharing and Reliability
b) Communication medium
c) Access to remote database
d) Easy data transfer

29. Computer Network reduces expenses of an office. Justify this statement with an example.
Computer Network reduces expenses of an office because computer on a network share different hardware devices
like printers, scanners, hard disk etc. And sharing those hardware devices will reduces the expense of an office. For
example if there are twenty computers in an office, now for printing the data there is no need to buy twenty printers
individually rather than simple network the computer and connect the printer on the network which helps in
sharing of the one printer among twenty computers which reduces the cost of buying nineteen printers individually.

30. Computer network makes the world a small place. Justify.


Computer network makes the world small place. It is true because in computer network we can know about the
events and things place outside or inside the country sitting within a room. And we also can communicate with our
relatives who are far away from us or has gone to abroad for job or study. Therefore, computer network makes the
world a small place.

31. Hardware components of a computer network (Elements of Network)


Physical parts and devices used to connect computers in the network environment are called hardware components.
The hardware components of computer network are
a) Computer system (Server or Workstation) b) Network connectors c) Network cables
d) NIC Card e) MODEM f) Hub g) Bridge
h) Switch i) Router j) Gateway k) Repeater

32. Server
A server is the main computer that provides services, data and other resources to the other computers in the
network environment. Network operating software used by server is Novell Netware, Linux, Unix etc. Different
types of servers are file server, print server, application server etc.

33. Workstation
Workstation is a computer network that utilizes network resources. Network operating software used by
workstation are Windows 98, Windows XP etc.

34. Node
Each computer or device of network is called node.

35. Router [MFT 2075]


Router is an intelligent device that connects two different networks which uses the address for filtering and
forwarding the data as well as it has an ability to determine the best route for destination.

https://seeqbasicomputer.blogspot.com/ 7|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
36. Network Interface Card (NIC) [SQE 2075K]
A Network Interface Card (NIC) is the adapter through which the computer is connected to the network. The
function of NIC is to convert data into electronic signals and transfer them through cables and vice-versa. The
advantage is to present the platform for a communication between the computers within a network.

37. Cable
Cables are commonly used media of physical channel for transmitting data between computers in network.
Examples of cables are coaxial, twisted pair and fiber optic cable.

38. Connector
Connector is an interface between the NIC of the computer and the cable that passes data between computers in
network. Examples of connectors are BNC used with coaxial cable, RJ 45 used with UTP cable, ST used with fiber
optic cable etc.

39. Hub [MF 2076]


A hub is a network device with multiple points or ports which acts as a central point from where different
computers and other devices are connected. It broadcasts all network data across each connection.
Hub is mostly used in physical star topology.

40. Switch [MF 2076]


A switch is a networking device that has multiple connecting ports which is often used interchangeably with the
bridge.

41. Bridge
A bridge is a device that connects two or more similar types of network which filters the data or inspects incoming
signals and decides whether to forward the signals or discard them.

42. Gateway
Gateway is an interconnecting device that connects two dissimilar networks

43. Repeater
Repeater is a device that amplifies the incoming signals, creates a copy of it and transmits the signal on network.

44. MODEM [MFT 2075]


MODEM is a device which is used to transfer the data of one computer to another computer using telephone lines.
The role of MODEM in data transmission is that it transfers data from one computer to another through telephone
line. It also converts the digital signal into analog and vice versa.

45. Importance of MODEM [SLC 2064] [SLC 2071 S] [SEE 2073 U]


MODEM modulates the digital codes of the computer into analog signal, which then can travel through the
telephone cable. At the receiving end the MODEM kept there will demodulate the analog signal to digital codes,
which can be then understood and used by the receiving computer. In this way a MODEM makes the computer
network possible.

46. Modulation
The process of translating digital signals of a computer to analog signals, which are then transmitted across the
standard telephone lines, is known as modulation.

https://seeqbasicomputer.blogspot.com/ 8|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
47. Demodulation
The process of translating analog signals from a phone line and converts then into digital signals for the computer
is known as demodulation.

48. Software components of a computer network


a) Network protocol
b) Network operating system
c) Device driver

49. Network operating system [PMT 2075K]


Network operating system is a set of computer program that manages the resources on network. E.g. Novell
network, Microsoft Windows NT, Linux, Unix etc.

50. Device driver


Device driver is a program that controls the functionality of the hardware device.

51. Types of Network


a) LAN (Local Area Network)
b) MAN (Metropolitan Area Network)
c) WAN (Wide Area Network)

52. LAN (Local Area Network)


A LAN is a type of network which covers small area i.e. within a room, building, or short distance by using cables
or small wireless devices. It is controlled by a single organization. It uses private connection media. E.g.: network
in a school, college or cyber cafe. The diameter is not more than a few kilometres. LAN offers bandwidth of 10-
100 Mbps.

53. MAN (Metropolitan Area Network)


A MAN is a type of network which covers an entire city. It is controlled by single or group of organization. It uses
private or public connection media. E.g.: interconnection between different branches on same branch and ISP
providing internet services. It offers a number of network services compatible with bandwidth from 128 kbps to 1
Gbps.

54. WAN (Wide Area Network)


A WAN is a type of network which connects two or more computers generally across a wide geographical area
such as cities, districts, and countries. It is controlled by group of organization. It uses public connections media
like telephone lines, satellite links or microwave system to connect several LANs and MANs. E.g. internet. Data
transmission in WAN is slower than LANs and WANs.

55. Network topology (LAN topology) [SLC 2064] [SLC 2065 S] [SEE 2066 S] [SEE 2067 S] [SLC 2068]
[SLC 2070] [SEE 2072] [SEE 2075U]
The arrangement or connection pattern of computers or nodes and other devices of the network is called network
topology. The three basic topologies are bus topology, ring topology and star topology

56. Bus topology


The network topology in which computers and other devices are arranged in linear format which uses a common
backbone or wire to connect all the computers and devices is called bus topology.

https://seeqbasicomputer.blogspot.com/ 9|Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
57. Diagram of bus topology [SEE 2067 S] [SLC 2069 S]

58. Advantages of bus topology [SEE 2073]


a) It is easy to set up computers and other devices in bus topology, because all the devices are connected through
a single wire.
b) It requires fewer cable media, so it is cheaper than other topologies.
c) It is easy to add new node to the network.
d) Failure of one workstation does not affect other computers on the network.

59. Disadvantages of bus topology


a) The whole network system collapses if the cable or backbone is damaged.
b) The network slows down if additional computers are connected.
c) The limited length of the cable in a network may restrict to connect the workstation or devices.
d) It is difficult to find fault in this network topology.

60. Ring topology [MF 2076]


The network topology in which computers are connected in the shape of a circle without any end points is called
ring topology. Each workstation contains two neighbours for communication or an input and output connections.

61. Diagram of ring topology [SEE 2072] [MF 2076]

62. Advantages of ring topology


i) It is easy it set up and configure.
ii) Each computer gets equal opportunity to access the network resources.
iii) It supports high data transmission rate.
iv) Performs better than a star topology under heavy network load.

https://seeqbasicomputer.blogspot.com/ 10 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
63. Disadvantages of ring topology
i)Failure of any cable or single computers may affect the entire network.
ii) It is difficult to detect the errors.
iii) Adding/removing the devices affect the entire network.
iv) Much slower than an Ethernet network under normal load.
64. Star topology [SLC 2065] [U1]
The network topology in which all computers or other devices are connected through a central device through a
central device called hub or switch is called star topology.
65. Diagram of star topology [SLC 2064] [SLC 2065] [U1]

66. Advantages of star topology


i) Easy to set up and configure.
ii) Failure of single computer or cable doesn’t affect the entire network.
iii) It is easy to find the fault.
iv) It is easy to extend to network by attaching new devices to the central devices.
Disadvantages of star topology
i) It requires more cable in comparison of bus topology so it is more costly.
ii) Failure of central devices (hub or switch) break down the whole system.
67. Network architecture (Models of Computer Network)
The arrangement of the computers on the network which is based on the computing model is called network
architecture. Its types are
a) Centralized computing network
b) Client / Server Network
c) Peer to Peer Network
68. Centralized computing network [SQE 2074K]
A centralized computing network is a network in which a central host computer performs data processing and
storage on behalf of clients. It is different from client server network as client server network consists of at least
one server and one or more client as well as client server provides high security of data and other resources.
69. Client/server network [SLC 2071]
Client/ server network is a type of network architecture that consists of at least one server and one or more clients
or workstations, where users do their work. It provides central security administration and the network
administrator is responsible for data security and other resources management of the network.
70. Peer-to-peer network [SLC 2071]
Peer-to-Peer network is a group of computers, which function both as servers and workstations to share data,
information and other resources of the network. It lacks centralized network administration, where the network
administrator needs to manage security on each computer. It provides no reliable security and might put data in
higher risks.

https://seeqbasicomputer.blogspot.com/ 11 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
MCQ (Multiple Choice Questions) [85]
1. Data communication means:
a) We can easily send and receive the message b) Data computing system is fastest in network
c) The process of transferring data and information d) None of above
2. The term network basically refers to:
a) Communication b) Interconnection c) Sharing d) All of them
3. Which of the following are is not a goal of computer networks?
a) Resource sharing b) High reliability c) Scalability d) None of the above
4. Which one of the device is simplex?
i. Television ii. Telephone iii. Computer iv. Walkie-Talkie
5. TV broadcasting is an example for data transmitting
i. Half-duplex Mode ii. Simplex Mode iii. Full duplex mode iv. None of them
6. Which refers to the communication media: [SLC 2065] [SLC 2071 S] [SLC 2064]
a) UTP Cable b) Fiber optics cable c) Satellite d) All of above
7. Which is not a communication media? [SEE 2075 U]
a) NOS b) Satellite c) Infrared d) STP
8. Which is not a communication media? [SLC 2067]
a) Wire b) Microwave c) Satellite d) NIC
9. Which is not unguided media? [SLC 2069]
i) Fiber optics ii) Microwave iii) Infrared iv) Radio wave
10. Which is NOT a guided media? [SLC 2066 S]
i) UTP Cable ii) STP Cable iii) Satellite iv) Fiber Optics
11. Which of the following is not a guided data communication media? [SLC 2068 S]
i) Coaxial cable ii) Fiber optic iii) twisted pair iv) Satellite
12. Which transmission media is not used for guided transmission media?
a) Fiber Optic b) Coaxial Cable c) RJ45 d) Satellite
13. Which one is an example of bounded media? [SLC 2067 S] [SLC 2070] [MFT 2076]
i) Fiber optics ii) Microwave transmission iii)Laser transmission iv) infrared transmission
14. Which one is an example of unbound media? [SLC 2071 S]
i) UTP cable ii) Microwave transmission iii) Fiber optic cable iv) All of the above
15. Unbounded communication medium is ......... [MFT 2075]
i) Satellite ii) Dial Up iii) Fiber Optics iv) UTP
16. An example of guided media_______
a) Radio wave b) Infrared c) Fiber Optics d) Micro wave
17. In which communication media data transfer high? [SLC 2068]
i) Twisted pair ii) Co-axial cable iii) Fiber optics iv) Microwave
18. Fastest and high bandwidth data communication medium is: [SEE 2074 U]
a) Optical fiber b) Twisted Pair c) Coaxial Cable d) Telephone Line
19. Media used to transfer data in forms of light? [SLC 2070 S]
i. Microwave ii. Fiber optical iii. Radio wave iv. Satellite
20. Microwave and Infrared technology are related with:
a) Unbounded media b) Bounded Media c) Confounded d) Hot Bounded
21. A form of wireless transmission in which signals are sent via pulses of infrared light.
i) Radio networking ii) Infrared transmission iii) Microwave transmission iv) None of the above
22. Which is the connector of UTP cable?
i. BNC ii. T-Connector iii. ST connector iv. RJ-45 connector
23. Which is the connector of coaxial cable.
i. RJ 45 ii. BNC iii. ST iv. None of them
24. Which of the following is not Media connector?
i. BNC ii. terminator iii.RJ-45 iv.NIC
https://seeqbasicomputer.blogspot.com/ 12 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
25. The device used for connecting PC to telephone line is
i) CD-ROM ii) MODEM iii) Printer iv) Port
26. A device that converts the discrete stream of digital ON-OFF electric pulses used by computer into the
continuously variable analog wave patterns used to transmit the human voice over many existing telephone lines.
i) Modem ii) Bridge iii) Gateway
27. In binary number systems 1 and 0 means ........ [SEE 2074 U]
(i) ON, OFF (ii) YES, TRUE (iii) OFF, NO (iv) YES, ON
28. Modem converts ______________ [SLC 2066 S]
a) Sound into digital b) Digital signal into sound c) Both (i) and (ii) d) None of above
29. The process of converting analog signals into digital signals [MFT 2076]
a) Modulation b) Demodulation c) Both d) None
30. The process of converting digital signals into analog signals. [MFT 2075]
i) Modulation ii) Demodulation iii) Both i) and ii) iv) None of them
31. The speed of Modems is measured in terms of
i. mbps ii.bps iii. kbps iv. bits
32. Which device is used to connect multiple networks that uses the same protocol. [SLC 2074]
(i) Bridge (ii) NIC (iii) Switch (iv) Gateway
33. Which of the following is used to connect totally dissimilar networks?
i) Router ii) Bridge iii) Gateway iv) None of the above
34. A networking device that joins multiple networks having different protocols is_ [MFT 2076] [MFT 2075]
i. Switch ii. Router iii. Gateway iv. Bridge
35. Which is not a network device?
a) Hub b) Repeater c) Switch d) TCP/IP
36. Which is not a physical component of computer network ?
i) Cable ii) NIC iii) Network OS iv) Hub
37. Which is not network hardware component?
i. HUB ii. Repeater iii. Router iv. Windows NT
38. The hardware components of a network. [MM 2076]
i) NOS ii) LAN iii) Switch iv) All of them
39. Which is the component of a network?
i. MSDOS ii. Hub iii. Volt guard iv. None of them
40. A network device that amplifies the incoming signal creates a new copy of it and transmits. [MM 2076]
a) Hub b) Bridge c) Repeater d) Router
41. A network navigation device that merely retransmits a signal to all other nodes attached to it:
a) Router b) NIC c) Hub d) Adapter
42. A device that lets you link two networks together.
i. Switch ii. Hub iii. Router iv. None of above
43. NIC is a ....... [SEE 2073 U]
(i) Software (ii) Hardware (iii) HUB (iv) Network operating system
44. Which of the following device is multi ports repeater?
a) Hub b) router c) bridge d) Gateway
45. Any network device that can connect to the network and can generate ,process or transfer network data.
a) Node b) Client c) Peer d) None
46. A __________ is the card that physically makes the connection between the computer and the network cable.
a) Network cables b) Network connector c) NIC d) None
47. Which is not the network operating system:
a) Linux b) UNIX c) MS-DOS d) Windows Server 2012
48. Which is Network operating system(NOS)? [SLC 2064]
a) Linux b) Windows XP c) MS-DOS d) All
49. Which is the network operating system used in a server computer?
a) Windows XP b) Windows Vista c) Windows NT server d) None of them
https://seeqbasicomputer.blogspot.com/ 13 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
50. Which one is an operating system software? [SLC 2070]
a) MS-Word b) MS-Excel c) Firefox d) MS-DOS
51. Protocols in network means
a) Language for b) Rules for exchange of c) Both d) None of the above
communication message between two
between computer or more hosts
52. Which of the following is not a protocol? [SLC 2068] [SLC 2074]
a) POP b) TCP/IP c) NOS d) FTP
53. Which is not a network protocol?
a) TCP/IP b) HTTP c) LAN d) FTP
54. Which of the following is not a protocol?
a) TCP/IP b) IPX/SPX c) NETBIOS/NETBUI d) Client
55. Which is not the network protocol? [SQE 2074K]
a) TCP/IP b) STP c) FTP d) SMTP
56. Which is not a protocol? [SEE 2073 U]
a) FTP b) POP c) HTTP d) TIP
57. Which of the following is protocol?
a) TCP/IP b) HTTP c) FTP d) All of them
58. The communication protocol used to connect to web servers on the internet or on a local network (intranet).
a) TCP/IP b) HTTP c) SMTP d) POP
59. _______ is the protocol used to send email:
a) HTTP b) SMTP c) POP d) FTP
60. Which protocol is used to receive mail from mail server?
a) POP b) FTP c) HTTP d) SMTP
61. Which of the following networking solution is suitable for networking within a building?
a) WAN b) LAN c) MAN d) None of above
62. A network of computer spread over a city or town located in the same geographical area.
a) LAN b) MAN c) WAN d) CAN
63. A telecommunication network, usually used for connecting computers, that spans a wide geographical area.
a) LAN b) MAN c) CAN d) WAN
64. Connection of computer between two different cities. [MFT 2076]
a) WAN b) MAN c) WLAN d) Wi-Max
65. Connection of computer between two different countries. [MFT 2075]
a) WAN b) MAN c) WLAN d) Wi-Max
66. Which type of network is used in the internet?
a) LAN b) MAN c) CAN d) WAN
67. Which of the following topologies share a single channel on which all stations can receive and transmit the data?
a) LAN b) BUS c) TREE d) None of the above
68. Physical structure of computer network. [SEE 2075]
a) protocol b) Topology c) MAN d) cabling
69. Which is not a network topology? [SLC 2066]
a) STAR b) Ring c) Client / Server d) BUS
70. In ......... Network Topology, nodes are connected in a single wire. [SEE 2073 U]
a) Star b) Bus c) Mesh d) All of the above
71. Which of the following topologies is least affected by addition/removal of a node?
a) Star b) Ring c) Bus d) None of the above
72. In which topology network devices are connected through hub? [SLC 2067] [SEE 2075] [PMT 2075]
a) Ring topology b) Bus topology c) Star topology d) None of the above
73. Token passing system is used in _____ topology.
a) Star b) Ring c) Bus d) Mesh
74. The network architecture used in most home networks is:
a) Client-server LAN b) Peer-to-peer LAN c) Client-server WAN d) Peer-to-peer WAN

https://seeqbasicomputer.blogspot.com/ 14 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
75. A _______ is a self-sufficient computer that acts both as a server and a client to other similar computers on the
network.
a) Node b) Client c) Peer d) None
76. A group of computers that functions both as a client and as a server.
a) Centralized b) Client/server c) Peer-to-peer d) Local Area Network
computing
77. In which of the following network model all the computers have equal access?
a) Peer-to-peer b) apple talk network c) Client/server network d) None of the above
network
78. A specialized network device on a host-based network that transmits the data entered by the user to the host for
processing and displays the results.
a) Client b) Network Server c) Terminal d) None of the above
79. A centralized computing network is a type of network where all the users connect to a host computer that is the
acting agent for all communication.
a) Peer-to peer b) Client/server c) Both d) None of the above
80. A network in which a central host computer performs data processing and storage on behalf of clients.
a) Centralized b) Client/Server network c) Peer-to-peer network d) None
computing network
81. Which of the following acts as the central authority in the network?
a) protocol b) client c) server d) none of the above
82. A server in LAN is a
a) Device offering b) NIC c) Workstation with huge d) None of the above
service to user secondary storage
83. A dedicated server that manages printers and printing jobs is_
a) Network Server b) Printer Server c) Modem Server d) File Server
84. The maximum speed at which data can be transmitted between two nodes on a network.
a) Bit rate b) Bandwidth c) Band length d) None of them
85. The bandwidth of digital signal is measured in_
a) Hertz b) Cycle per second c) Bits per second d) None of the above

Fill in the Blanks [30]


1. Telecommunication is a system of transmission of sounds, images, texts or data in the form of
electronic signals.
2. Telecommunication is a transmission of data and information between computers using a communication link
such as a standard telephone line.
3. The interconnection of computers with or without wires in order to share information is called computer
network.
4. Computer network is a communication system connecting two or more computer that work together to
exchange information and share resources.
5. The server computer is used to serve data and information.
6. A server is a computer designed to process requests and deliver data to other (client) computers over a Local
Network or the Internet.
7. The server computer acts as the storehouse and distributor for the data, information and programs.
8. A peer is a self sufficient computer that acts both as a server and a client to other similar computers on the
network.
9. A computer on a network that uses resources of the network is workstation.
10. A peer to peer network is a group of computers that function both as client and server.
11. A centralized network is a network in which a central host computer performs data processing and storage on
behalf of clients.
12. The wireless technology used for long distance is called microwave transmission.
13. Cat 5 cable is used with RJ-45 connector.
14. Microwave is a wireless technology that can be used to transmit data between two different computers.

https://seeqbasicomputer.blogspot.com/ 15 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
15. A set of rules used to define communication is called protocol.
16. Protocol is a set of rules that governs the communications between computers on a network.
17. The smallest area covers by network is called LAN
18. The network of computer within the room, building or campus is LAN.
19. A MAN is a network that interconnects users with computer resources in a geographic area or region larger than
that covered by even a LAN but smaller than the area covered by a WAN.
20. The computer network of any two countries is WAN.
21. The example of WAN is internet .
22. HUB is a hardware device used to connect several computers together.
23. Router is a device connecting two or more networks that facilitates the transfer of data in the form of packets.
24. Gatewayis a device software or a system that converts data between dissimilar network with different protocols.
25. Simplex mode communication is a mode of transmission in which data flows in one direction only.
26. Modes for transmitting data from one device to another are simplex, Half-duplex, and full-duplex mode.
27. Full-duplex mode means two-way communication system. [SLC 2064]
28. Bandwidth is measured in bits per second.
29. A topology refers to the shape of the network in which all the computers are connected together.
30. A physical ring topology is a network topology in which network nodes are connected in a continuous circle.

True / False [70]


1. A computer network is just used for resource sharing. False
2. It is possible to share hardware resources on a computer network. True
3. Computer network reduces the cost. [SLC 2073] True
4. Computer network cannot transfer multimedia contents. False
5. Computer Network can share both hardware and software resources. True
6. Networked computers allow easy transfer of data from one computer to another. True
7. Computer network only allows us to share computer hardware. False
8. In a computer network, the data is passed from one computer to another by means of cables or satellites. True
9. The computers in a network system share only software packages. False
10. Computer network increases worker productivity and offers tremendous convenience. True
11. You can send message from one computer to another computer on the network. True
12. A peer-to-peer network is a simple, inexpensive network designed to connect computers together using twisted
pair cable or coaxial cable. True
13. Peer-to-peer is a network model which has more security than client server. False
14. In client/server network architecture the resources are distributed to different terminals. False
15. Nodes are also called workstations. True
16. A workstation is a computer that uses the service of the network. True
17. A node is the primary data path that can carry large amount of data traffic. False
18. A server computer acts as the storehouse and distributer for the program data and information. True
19. A server is a network computer that utilizes the resources of other network computers, including other clients. False
20. Each computer or device in a network is called node. True
21. A network connector is defined as a device that facilitates the connection or the interconnection of computers and
other device to a network. True
22. A hub is also called multiport repeater. True
23. HUB provides power backup in the event of power cut on the network system. [SLC 2064] False
24. A hub is a device that amplifies a signal being transmitted on the network. False
25. A repeater is a network device that regenerates electric signals. True
26. Bridge connects two dissimilar networks and carried out protocol conversion if needed. False
27. A bridge is a network device that connects different LAN segments using the same access method. True
28. Router is a network device used to regenerate or replicate a signal. False
29. Router provides power backup if there is power cut in the network system. [SEE 2075 S2] False
30. A gateway is a network device which connects two dissimilar networks together. True
31. Star topology uses a single cable as a backbone from where all other nodes are connected. False
32. It is difficult to identify and isolate the failure node in ring topology compared to star topology. True
33. Bus topology requires more media than other topology. False
34. In BUS Network Topology, nodes are connected in a single wire. [SEE 2075 S2] True
https://seeqbasicomputer.blogspot.com/ 16 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
35. STAR topology is the most popular network topology used to connect computers. True
36. In the star topology computers must be arranged in the form of star. False
37. A physical ring topology is a network topology in which network nodes are connected in a continuous circle. True
38. Normally there is more transmission error rate in unguided transmission media than guided transmission media. True
39. Wireless Access Point is a device that provides connection between wireless devices and can connect to wire
networks. True
40. In the wired network, computers are connected with each other through wires. True
41. Guided transmission media does not use cables. False
42. RJ-45 is the connector for co-axial cable. False
43. Coaxial cable has much greater bandwidth than fiber optic cable. False
44. There is possibility producing more crosstalk in twisted pair cable than coaxial cable. True
45. Fiber optics uses light to carry a data signal through cable. [SLC 2064] [SLC 2065 S] True
46. Fiber optic is one of the cheapest networks. False
47. Data transfer rate is higher in optical fiber cable than co-axial cable. [SLC 2072] True
48. Microwave transmission is an example of bound media. [SLC 2073] False
49. Microwave signals travel in straight line and cannot pass through obstacles like buildings, hills, etc. True
50. Protocol is the computer language only understood by computer. True
51. Protocol is required to transfer data between two computers. True
52. Protocols are not required to exchange data between two different computers. False
53. HTTP is an internet based standard for retrieval of email by user from an email server. False
54. Network operating system is a formal description of messages formats and the rules that two or more machines
must follow to exchange those messages. False
55. A MODEM is a central network device that connects network devices in a star topology. False
56. MODEM is necessary to access the internet. [SLC 2064] [SLC 2065 S] True
57. MODEMS are not needed in wireless network communication. True
58. Modem can convert digital signal into analog signal and vice versa. True
59. Wire communication is suitable for Local Area Network. True
60. The network that covers small area is called PAN. False
61. Local Area Network is a network that spans multiple geographical locations. False
62. A computer network that covers small local area is MAN. False
63. A metropolitan area network (MAN) is a network of computers between two different cities. False
64. Metropolitan Area Network connects two or more LAN together with in a large city or state. True
65. Internet is an example of WAN. True
66. Wide Area Network (WAN) is a geographically dispersed telecommunication network. True
67. WAN uses guided transmission media like microwave or radio wave. False
68. Connecting computer between two different countries is an example of WAN. True
69. In half duplex mode of communication, data can be transmitted in both directions simultaneously. False
70. Walky - Talky is the example of full duplex mode. [SLC 2072] False

Technical Terms [65]


1. Sending or receiving information between two or more persons. Communication
2. A system of transmission of sounds, images, texts or data in the form of electronic signals. Telecommunication
3. The process of transferring digital data or information between computers. [MFT 2076]. Data Communication
4. Network sharing and exchanging information between different people. [SLC 2070 S] Computer Network
5. A group of the interconnected computers. Computer Network
6. The interconnection between two or more computers through physical and logical components to share resources.
Computer Network
7. The path through which the sender makes communication to the receiver. Medium
8. A path through data is transmitted from one computer to another. Communication Medium
9. A network of computers formed by using cables. Wired Network
10. A network of computers formed by using unguided media. Wireless Network
11. Medium that carries data without physical path. [SQE 2074K] Unbounded Media
12. The data or signals transmitted through the air in the communication. [MFT 2076] Unguided Media
13. A transmission medium through which data are transmitted in the form of light. Fiber Optic
14. The amount of data transmitted per second through a communication channel. Bandwidth
15. The data carrying / handling capacity of communication channel. [SLC 2068 S, 2071] [MM 2076] Bandwidth
16. The volume of bits that can be transferred per second through the communication media. [SEE 2075] Bandwidth
https://seeqbasicomputer.blogspot.com/ 17 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
17. A device used at end user’s computer in a network which converts digital signal into analog and vice-versa. MODEM
18. The device used to connect PC with telephone line. [SLC 2068] MODEM
19. The conversion of digital signals into analog signals. Modulation
20. The conversion of analog signals into digital signals. Demodulation
21. A card used to connect network cable to computer. [SLC 2066 S] [SEE 2071 S] NIC
22. A hardware device that provide common wiring point in LAN. [MFT 2075] Hub
23. A network device that retransmits signals to all nodes on the network. Hub
24. A multiple port repeater. Hub
25. A network device that retransmits signals to a destination node on the network. Switch
26. A network device that connects the segments of the same or different network having same protocol. Bridge
27. A network device that can determine the best path for forwarding the data packets. Router
28. A device that forwards signals between networks in networks in network traffic. Router
29. An intelligent device that connects two different networks by setting best network traffics. Router
30. A device that can connect networks which may use different communication protocols. [SEE 2073 U] Gateway
31. The device which is used to connect two dissimilar network topology. [SEE 2075 S2] Gateway
32. The device which accepts weak signals regenerates them and sends them back on their way. Repeater
33. A device that amplifies the incoming signals creates a new copy of it and transmits the signals on the network. Repeater
34. The device that connects communication media with network devices. Connector
35. Interface between the NIC of the computer and the cable that passes data from one computer to another computer. Connector
36. A computer in a network which can provide services to other computer. [SLC 2070] [SLC 2072] [SEE 2074] Server
37. A main computer in the computer network. [SLC 2068] [SEE 2074 U] Server
38. The computer that controls and coordinates all the activities of the entire computer in a network. Server
39. A powerful computer which controls and co-ordinates all computers connected in a network. [SEE 2075] Server
40. A computer on the network that uses resources of the network. Workstation / Client
41. The computer on which users run applications. Client
42. The network models where there is at least one server. Client/Server Network
43. The network model where each node has equal right. Peer to Peer Network
44. A type of network in which every computer works as both client and server. Peer to Peer Network
45. A network model in which resources sharing, processing and communication control are completely
decentralized. Peer to Peer Network
46. A computer network limited within a room. [SLC 2065] LAN
47. A large computer network that spans a metropolitan area or campus. MAN
48. A network which is extended beyond the boundary of countries. WAN
49. The modes of transmission in which communication takes place from both the sides simultaneously. Full Duplex mode
50. A mode of transmission in which data flows in both directions, but only from one direction at a time. Half Duplex mode
51. Data communication which is possible in one way only. [U1] Simplex mode
52. An operating system used in a server computer. NOS
53. The software which controls and manages all the operation in computer network. NOS
54. The physical layout or cabling structure of computers on Local area network. [SLC 2069]
[SEE 2074] [SEE 2071 S] [MFT 2076] [MFT 2075] Topology
55. The arrangement or connection patterns of computers or nodes and other devices of the network. Topology
56. The topology in which all the computers are connected by a common distribution channel. Bus Topology
57. A network topology in which network nodes are arranged in a linear format, with each node connected directly to
the network cable with a T-connector or tap. Bus topology
58. Requires less media than other topology. [PMT 2075] Bus Topology
59. The cabling pattern of computers where all nodes are connected in a closed loop. Ring topology
60. The cabling pattern of computers where each node is individually connected to centrally located device. Star topology
61. Hub or switch based network topology. [SLC 2068 S] Star Topology
62. A set of rules or procedures for transmitting data between electronic devices, such as computer. [SLC 2067] [ SLC 2070 S] Protocol
63. The rules and regulations to systematize the computer related technology. [SLC 2065 S] Protocol
64. Rules and format to accept and transfer data in the computer network. [SLC 2066] Protocol
65. The rules that make the network communication possible. [SLC 2068] [SEE 2073 U] Protocol

https://seeqbasicomputer.blogspot.com/ 18 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Internet and Its Services
Questions and Answers [40]
1. Internet [SLC 2065 S] [SLC 2066] [SLC 2069] [SLC 2069 S] [SLC 2071 S] [SEE 2074] [MFT 2075]
[PMT 2075K]
Internet is an interconnection of several thousands of computers of different types belonging to the various
networks all over the world in order to share data and information.
In other words network of networks is called Internet.
2. Who controls internet?
Different organization like ISOC (Internet Society), W3C (World Wide Web Consortium), IAB (Internet
Architecture Board), IEFT (Internet Engineering Task Force), IRTF (Internet Research Task Force), IESG (Internet
Engineering Steering Group) and INIC (Internet Network information Centre) gives directive and guideline for the
proper use of internet.
3. Internet called Network of networks [PMT 2075K]
The internet is called ‘network of networks’ because all the smaller networks of organizations are linked together
into the one giant network called the internet.
4. Protocol used by the internet.
TCP/IP is the communication protocol used by the internet.
5. Components required for internet connection
a) A TCP/IP enabled computer with web browser
b) An account with an ISP
c) Router / MODEM (necessary if you are using a telephone line to access the Internet)
6. Connection (ISDN, Satellite, cable and dial-up)
Types of internet connection [SQE 2074K]
i) Dial Up Connection
ii) ADSL Connection
iii) Fiber Connection

7. ADSL (Asymmetric Digital Subscriber Line) [SQE 2074K]


ADSL is a technology for transmitting digital information at a high bandwidth on existing phone lines to homes
and businesses. Unlike regular dialup phone service, ADSL provides continuously-available, "always on"
connection.
8. Services of internet [SLC 2065] [SLC 2068] [SEE 2072] [MFT 2075] [U1]
a) WWW (World Wide Web)
b) E-mail (Electronic mail)
c) FTP (File Transfer Protocol)
d) IRC (internet Relay Chat)
e) Newsgroup
f) Telnet
g) Internet Telephony
h) E-commerce
9. Advantages of internet [SLC 2065 S] [SEE 2075]
a) Internet has an endless knowledge supply which anyone can access that too free of cost.
b) Selling and buying has become so easy with the use of internet and it has helped millions to sell and buy their
goods online.
c) Internet has given us E-Mail which is fast, secure and reliable mode of communication.
d) It makes easy to transfer the file or information.
10. Disadvantages of internet
a) Increasing virus threats not only steals your sensitive data but also damages your computer.
b) People using too much of internet get disconnected from the real world.
c) Pornography that can get in the hands of young children too easily.
d) Addiction to online games affects health leading to obesity and serious health issues.

https://seeqbasicomputer.blogspot.com/ 19 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
11. Intranet
An intranet is a private computer network that uses the internet protocol to securely share any part of information
of an organization. It is owned by a single organization or company. It can only be used by the employees of the
owned organization.
12. Extranet
An extranet is a computer network that allows controlled access from outside for specific business or educational
purposes.
13. ISP (Internet Service Provider)
An Internet service provider (ISP) is an organization that provides services for accessing and using the Internet.
World Link, Mercantile, Classitech, Vianet etc are the ISPs of Nepal.
E-mail (Electronic Mail) [SLC 2068 S] [SLC 2069 S] [SEE 2075 S2] [MM 2076] [MFT 2075]
E-mail (Electronic mail) is one of the most popular services provided by the internet which exchanges messages
between the computers through a network. It is the soft copy service of the internet.
E-mail can be sent using a computer with modem, e-mail program and internet facility.
E.g. xyz@gmail.com
Any four sites that provide e-mail services are:
a) www.yahoomail.com
b) www.hotmail.com
c) www.gmail.com
d) www.outlook.com
14. Advantages of E-mail [SEE 2067 S] [SLC 2070] [SEE 2073 U] [MM 2076] [MF 2076] [MFT 2075]
a) It allows to send and receive message across the world at very low cost.
b) E-mail is faster, cheaper, more reliable than traditional mail.
c) The image, sound, video and documents can be attached to e-mail message.
d) Email can be accessed from anywhere in the world.
15. Disadvantages of e-mail
i) Minor mistakes in e-mail address may deliver the mail to wrong address.
ii) Since it passes through a vast electronic network, it may be seized in between.
16. E-fax (Electronic Fax)
E-fax is the service of the internet through which a user can send and receive faxes(documents or graphics) directly
from a computer to another computer. It is the hard copy service of the internet. E-fax can be sent using a computer
with modem, e-fax program and internet facility.
17. Newsgroup
Newsgroups are discussion groups that focus on a particular topic such as politics, health, computer, etc. The
interested people on the particular field write the information or articles. Then these articles are posted to the
newsgroup so that other people can read them.
18. Telnet
A telnet is a program that allows a user to log in to a remote computer on internet as a user on that system.

19. FTP (File Transfer Protocol) [MFT 2075]


File Transfer Protocol is the internet tool that allows the user to transfer the file from one computer to another
computer. It helps to upload and download the files.
20. Use / Function of FTP [SLC 2071] [SEE 2073]
File Transfer protocol helps to transfer (download or upload) files from one computer to another computer.
21. Uploading [MF 2076] [MFT 2075]
Ans: Uploading refers to copying files or documents, programs or data from the user computer to the internet
server.

https://seeqbasicomputer.blogspot.com/ 20 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
22. Downloading [MF 2076] [MFT 2075]
Downloading refers to the copying files or document or program or data from the internet server to the user
computer.
23. IRC (Internet Relay Chat) [MFT 2075]
Internet Relay Chat is one of the important services provided by the internet which allows the user to communicate
with other people in real time.
It uses the browser software without using special chat software. It communicates only text.
For eg: chatting on facebook.
24. Internet telephony
Internet telephony is one of the cheapest and reliable services provided by the internet that allows the user to make
telephone communication or voice communication through internet.
25. FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) is an online document that possesses series of common questions and answers
on a specific topic.
26. E-commerce (Electronic commerce) [SLC 2069]
E-commerce is one of the popular service of internet which helps in buying and selling of goods over the internet.
It is doing business online through the internet.
Any two e-commerce websites are:
https://www.daraz.com.np/
https://muncha.com/
27. Video conferencing
Video conferencing is an important and interesting service provided by the internet which makes communication
using sounds as well as pictures. It requires necessary hardware and software to see and speak to each other.
It enables virtual face-to-face communication among people sitting at different locations.
For eg: chatting on skype.
28. Online banking
Online banking is the practice of making transaction using the internet.
29. Webpage
Webpage is an electronic document written using a computer language which contain information about any
person ,organization, etc is called HTML.
30. Website
Website is a collection of web pages that can be published by an organization or individual.
It contains home page and other sub pages.
31. HTTP (Hyper Text Transfer Protocol)
HTTP is a protocol used by the WWW to establish client and server interactions.
32. Web browser [SEE 2075 U] [SLC 2067] [MF 2076]
Web browser is a computer program that access web pages and displays them on the user computer.
Examples of web browsers are Mozilla Firefox, Google chrome, Internet Explorer, opera etc. Browsing/ Surfing
means searching information on the internet.
33. URL (Uniform Resource Locator)
Ans: URL is a unique address that provides location of a webpage on the internet.
Example of URL: http://www.abc.com/mainpage/first.html
http: protocol name, www.abc.com: server name, mainpage: path, first.html: filename
34. Search engine [SEE 2074 U] [SQE 2075K]
Ans: A search engine is a software program or script available through the Internet that searches documents and
files for keywords and returns the results of any files containing those keywords. They are used to locate specific
sites and information. Examples of search engines are Google, Bing, Yahoo etc

https://seeqbasicomputer.blogspot.com/ 21 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
35. Blog (weblog)
A blog is a time-stamped online journal that appears on a website. A blog is a frequently updated online personal
journal or diary. A place to share your thoughts and your passions to the world.
36. Wi-Fi (Wireless Fidelity)
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide wireless high-
speed Internet and network connections.
37. ISDN (Integrated Services Digital Network)
ISDN is a high speed digital communication network involving from existing telephony integrated digital network
(IDN) which provides end to end digital connectivity to support a wide range of services including voice and non-
voice service.
38. WWW (World Wide Web)
The World Wide Web (abbreviated WWW or the Web) is an information space where documents and other web
resources are identified by Uniform Resource Locators (URLs), interlinked by hypertext links, and can be accessed
via the Internet.
39. DNS (Domain Name System)
Domain Name System is an Internet service that translates domain names into IP addresses.
40. Social Networking Websites
Social networking websites are online communities in which member interact. Eg. Facebook, Twitter, Instragram etc.

MCQ (Multiple Choice Questions) [40]


1. The internet was developed by US.
a) Department of b) Department of c) Department of d) None
Defense Electronics Commerce
2. The large group of millions of computers around the world that are all connected to one another.
a) LAN b) Intranet c) Internet d) All of above
3. Which is not related to Internet? [SLC 2067] [PMT 2075]
a) ISP b) TCP/IP c) WWW d) UPS
4. Which of the following network connects computer to the Internet? [SLC 2069 S]
a) Intranet b) LAN c) WAN d) MAN
5. Which device is necessary to operate the internet? [SLC 2066 S]
a) CD-ROM b) ISP c) Modem d) All of above
6. Connection between a computer and the Internet done using a normal telephone is called
a) Satellite network b) Dial-Up network c) Cable network d) None of them
7. Which is the protocol used in internet?
a) TCP/IP b) FTP c) ICP d) ISP
8. __________ is the main line of defense between a local network or intranet and the Internet.
a) USB port b) Encryption key c) Firewall d) Decryption key
9. Each computer on the Internet has a unique numeric address called a/an …. [SLC 2069 S]
a) Web address b) Domain address c) Network binding d) IP address
10. The ARPAnet that helped to develop protocol is
a) TCP/IP b) ARP c) POPA d) None of above
11. Which of the flowing is the internet service? [SLC 2069]
a) IRC b) E-Mail c) Telnet d) All of above
12. Which is the internet service? [SLC 2064]
a) Telnet b) POP c) Both d) None
13. Which one is not the service of the Internet?
a) Electronic Fax b) Chatting c) Sharing hardware d) Electronic mail
14. Which is not an internet service? [SEE 2075]
a) e-commerce b) NIC c) WWW d) e-mail
15. Which is not an internet service? [SLC 2066 S]
a) e-mail b) e-telephone c) e-fax d) e-commerce
16. WWW is a [SEE 2073 U]
a) Web browser b) Protocol c) Internet service d) None of above

https://seeqbasicomputer.blogspot.com/ 22 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
17. Email is
i. Mail concerning electronic devices
ii. Transaction of letters, messages and memos over a communication network.
iii. Transaction of messages within a computer. Iv. None of them.
18. E-mail is a/an …………… [SLC 2067 S]
a) organization which b) protocol to access c) service of Internet d) none
controls internet internet
19. Which is the correct Email ID? [SLC 2065]
a) Yahoo@ramesh b) Ramesh@yahoo.com c) @ramesh.yahoo.com d) None of the above
20. In an email address : abc@yahoo.com, what does ‘yahoo’ refer?
a) User account name b) Domain name c) Top level domain name d) None of them
21. Which of the following is online business?
a) E-Commerce b) E-shopping c) E-Business d) All of the above
22. E-commerce is ………….[SLC 2067 S] [SLC 2071 S] [SQE 2074K]
a) a type of business b) a type of virus c) Both d) None of the above
23. Each web page has its own unique address known as
a) Uniform Resource b) Universal Resource c) Uniform Resources d) Universal
Locator Locator Locator Resources Locator
24. Which of the following allows the user to surf and interact with the web-page?
a) website b) Browser c) web page d) web server
25. Which is web browser software? [SLC 2067]
a) Windows 2007 b) Internet explorer c) Windows NT d) All of the above
26. Web sites that allow the users to search information based on keywords or a combination of keywords.
a) World Wide Web b) Electronic mail c) Search engines d) E-Commerce
27. Which is not the search engine?
a) Yahoo.com b) Google.com c) Bing.com d) Ebay.com
28. Yahoo! Is a ……..
a) browser b) home page c) search engines d) None
29. Opera and Firefox is a/an................. [SQE 2075K]
i. chat program ii. Web browser iii. search engine iv. None of the above
30. FTP is used to
a) Browse the Internet b) Send emails c) transfer files from one d) None of above
computer to another
31. Used to transfer file from one computer to another computer in Internet. [SLC 2070 S]
a) FAQ b) IRC c) FTP d) TPF
i. ii. iii. iv.
32. Which of the following is remote login service? [SLC 2068 S] [SLC 2071]
a) Video conferencing b) Telnet c) FTP d) TCP/IP
33. A web site in the internet that brings people together in central location to talk, share ideas, share
interests, make new friends.
a) USENET b) Social network c) Web chat d) None
34. An online interactive communication mechanism that lets people to make a real time decision with one or more
people through the Internet.
a) Web chat b) Newsgroup c) Videoconferencing d) E-commerce
35. The service of the Internet that provides audio and video conversation is_
a) Chat b) . E-mail c) Video conference d) Video chat
36. The process of transferring file from a remote computer to local computer is:
a) Uploading b) Downloading c) Searching d) File transfer protocol
37. The process of transferring file from a local computer to internet is:
a) Uploading b) Downloading c) Searching d) File transfer protocol
38. Web-site is a collection of
a) HTML documents b) Graphics File c) audio and video files d) All of above
39. A technology that allows the creation of collaborative web sites.
a) Wiki b) E-Mail c) . Search Engine d) All of above
40. A set of interconnected WebPages, usually including a homepage, generally located on the same server, and
prepared and maintained as a collection of information by a person, group, or organization.
a) Web site b) Web Browser c) Web server d) None of above
https://seeqbasicomputer.blogspot.com/ 23 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Fill in the Blanks [30]
1. Internet is an interconnection of several computers of different types belonging to various network all over the world.
2. The Internet is network of networks.
3. The Internet began life in 1969 when the United States Department of Defense started a network called
ARPA net
4. The internet originated from an experimental network called ARPAnetcreated in 1969.
5. World Wide Web is also known as internet.
6. Dial-up internet access requires MODEM and telephone.
7. A web site is the collection of web pages.
8. Each page of information is known as web page
9. Each web sites is identified by the URL.
10. The main page of the website is called homepage.
11. Web server are computers that deliver (serves up) Web pages.
12. Windows Internet Explorer and Netscape Navigator are two popular web browser.
13. Web browser is software that allows the user to surf the information through the Internet.
14. HTTP is a set of standards that allow users of the World Wide Web to exchange information found on web pages.
15. The WWW is the leading information-exchange service of the Internet.
16. Search engine are online services that allow users to scan the contents of the Internet to find Web sites or specific
information of interest to them.
17. On the Internet, a search engine is a coordinated set of programs that receives your search request, compares it to
the entries in the index and returns result to you.
18. E-mail is defined as the exchange of message and computer file between computers over a computer network.
19. Web chat on the Internet has become a popular way for people to connect online in a group(a chat room) to share
similar interests.
20. IRC is an online textual communication with each other in real time.
21. The remote login protocol is telnet and file transfer protocol is FTP.
22. FTP is a protocol used to upload and download information.
23. E-commerce refers to the buying and selling of things over the Internet.
24. Broadband can be simply defined as a fast connection to the internet that is always on.
25. Wi-Fi refers to wireless networking technology that allows computer and other devices to communicate over a
wireless signal.
26. Wi-max is a standard for high speed broadband internet access over a wireless connection.
27. Usenet is a collection of user-submitted notes or messages on various subjects that are posted to servers on a
worldwide network.
28. Video conference is a live video connection between people in separate locations for the purpose of
communication or interaction.
29. Social network is a web site on the Internet that brings people together in a central location to talk, share ideas,
share interests, make new friends, etc.
30. The process of transferring a copy of a file from a remote computer to the requesting computer is called
downloading.[SLC 2064]

True / False [50]


1. The internet allows playing the interactive multimedia games, listening to music and watching digital movies. True
2. The Internet is a network between different computers within a group. False
3. Internet is a collection of millions of computers of different types belonging to various networks over the globe. True
4. The Internet has greatly changed the way people use computers and communicate today. True
5. The Internet user can only buy goods through the Internet. False
6. Internet is the service provided by WWW. False
7. The network of network is called the Internet. [SLC 2065 S] True
8. The Internet carries large amount of data stored in specific server. True
9. In the Internet information can be sent from any computer to any other 24 hours a day. True

https://seeqbasicomputer.blogspot.com/ 24 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
10. US government controls the Internet. False
11. ARPANET was the first computer network. True
12. The seeds of today’s Internet were planted in 1959, when U.S. Department of Defense sponsored a project
named ARPANET. False
13. The World Wide Web uses a protocol called TCP/IP. False
14. TCP/IP is responsible for ensuring that the packets are sent to the right destination. True
15. TCP is responsible for ensuring that the packets are sent to the right destination. False
16. The web uses HTTP protocol to transmit data. True
17. A person can reverse the room in a hotel and even purchase goods by using his computer. True
18. WWW is an organization which controls the internet. [SLC 2073] False
19. Web documents contain graphics, sounds, text and video. True
20. FTP is document that allows you to log into another computers on the Internet. False
21. Usenet messages are stored on central computers. True
22. The Internet provides facility for posting messages on various subjects on the newsgroup. True
23. FTP is used to transfer file from one computer to another. True
24. Communication between all the different devices on the internet is made possible by FTP. False
25. Downloading is process of sending files from your computer to another computer on the Internet. False
26. E-commerce is buying and selling products services online. True
27. Probably the most common web-based resources available through Telnet is library catalogs. True
28. Telnet allows you to remote computers (called hosts) over a TCP/IP network (such as the internet). True
29. DNS is used to convert domain name into IP address. True
30. Websites have their own uniqueness address known as United Resource Locator. False
31. Chatting only supports voice messages. False
32. A search engine allows you to search web sites on the net as specified. True
33. The method of locating information on the internet involves the use of search engine. True
34. ISP provides the Internet service to end users. True
35. Google chrome is a search engine. False
36. Web servers are stored in websites. False
37. Dial-up connections involves large volumes of information being carried at high speeds to your PC. False
38. DNS represents a powerful internet technology for converting domain names to IP address. True
39. Wiki is a technology that allows the creation of collaborative web sites. True
40. Web server is a set of interconnected web pages. False
41. Wi-Fi refers to wireless networking technology that allows computers and other devices to communicate over a
wireless signal. True
42. Web chat is a live video connection between people in separate locations for the purpose of communication or
interaction. False
43. People can send or receive email through the IRC. False
44. You can send only text message through the Internet. False
45. Social network is a web site on the Internet that brings people together in a central location to talk, share ideas,
share interests, make new friends etc. True
46. You can send mail through internet but cannot receive the mail. False
47. We will use IRC to make real time communication. True
48. Electronic mail contains a large collection of linked text , image, sound and video files. False
49. Fire wall programs allow workgroups to use the internet to see each other’s face in small window on
the computer screen and to hear their voice through speakers. False
50. A web page can have only textual information. False

Technical Terms [50]


1. A network of networks. [SLC 2065 S] [SLC 2067 S] [SEE 2071 S] Internet
2. The largest computer network. Internet
3. A collection of millions of computers of different types belonging to various networks all over the globe. Internet
4. The private network within an organization that utilizes the internet services. Intranet
5. The protocol used for transferring hypertext documents that make the World Wide Web possible. HTTP
6. A protocol used by the WWW to establish client server interaction. HTTP
7. A company that provides the Internet facility. [SLC 2067 S] [SLC 2070] [SLC 2072] [SEE 2075 U]ISP
8. Commercial activities on the Internet. E-commerce
9. The business conducted through Internet. [SLC 2068] [SEE 2074] [MFT 2075] E-commerce
https://seeqbasicomputer.blogspot.com/ 25 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
10. Buying and selling products and services online. [SLC 2065] [SLC 2071] [SLC 2065 S] [SLC 2069] [MFT 2076]
E-commerce
11. Sending mail by using computer. E-Mail
12. Online postal service [MM 2076]. E-Mail
13. The exchange of messages and computer files between computers over a computer network. [SQE 2075K]
E-Mail
14. A server which sorts and directs your mail for you. Mail server
15. Protocol used to receive / download e-mail from the mail server. [SLC 2073] [PMT 2075] [MFT 2076]
[MFT 2075] POP
16. A protocol used for sending emails from one server to another. SMTP
17. Protocol used to browse the internet. TCP/IP
18. Both a program and method used to transfer files between computers. FTP
19. A protocol used for transferring files from one computer to another typically from your computer to a web server.
[MFT 2075] FTP
20. An internet tool that helps to download /upload the file. [SLC 2067] FTP
21. A program that allows the user to log into a remote computer on the Internet as a user on that system. Telnet
22. A service of the Internet that allows a user to access the remote computer. Telnet
23. A web page, which is designed to search other web pages. Search engine
24. A coordinated set of programs that receives your search request, compares it to the entries in the index, and
returns result to you. Search engine
25. A searchable database of Internet files collected by a computer program. Search engine
26. A software which enables to view HTML pages in the Internet [SEE 2073 U]. Web browser
27. Software that is used for surfing information through the internet. [MFT 2076] Web browser
28. A global electronic bulletin board system in which millions of computer users exchange information on a vast
range of topics. Usenet News
29. An online meeting and information system that allows people to carry on discussions. Newsgroup
30. A service of the internet that allows a user to post question for discussion. Newsgroup
31. Internet programs to communicate with each other by typing in real time.IRC
32. A service of the Internet that allows a user to send or receive instant message. IRC
33. An online interactive communication mechanism that lets people to make a real time discussion with one or more
people through the internet. IRC
34. The visual communication of parties around the world. Video Conference
35. A component of the Internet that presents information in a graphical interface. WWW
36. The total set of interlinked by hypertext documents residing on HTTP servers. WWW
37. A collection of internet resources such as files, hyperlinked text, audio, video etc. WWW [SQE 2074K]
38. The technology with deliver voice over the Internet. Skype
39. The learning process by using the Internet. [SQE 2074K] E-learning
40. Learning through electronic media. [SLC 2070 S] E-learning
41. A mechanism which is used to convert domain names into IP addresses. DNS
42. The process of sending file from user's computer to web server.[SEE 2075 S2] Upload
43. The process of copying files, documents, programs, etc from users computer to the web server / internet server.
[MM 2076] Upload
44. The process of transferring a copy of a file from a remote computer to the requesting computer. Download
45. The document formatting language used to link document in on the web. HTML
46. A document or resource of information that is suitable for the World Wide Web and can be accessed through a
web browser and displayed on a monitor or mobile device. Web Page
47. The very first page of every web site. Home page
48. High speed digital communication network evolving from existing telephony. ISDN
49. The wireless technology that allows computer and other devices communicate over a wireless signal. Wi-Fi
50. A character (such as asterisk or question mark) that stands for any other character, or series of any character. [SLC
2064] Wild card character

https://seeqbasicomputer.blogspot.com/ 26 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Computer Security
Questions and Answers [20]
1. Computer security [SLC 2067] [SLC 2069] [SLC 2070 S] [SEE 2073] [SEE 2074 U] [SEE 2075 S2]
The security given to the computer for the protection of hardware, software and data from being lost or damaged
due to accidental or intentional harm is known as computer security. The types of computer security are hardware
security and software security.
2. Objectives of computer security
a) Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words,
only the people who are authorized to do so can gain access to sensitive data.
b) Integrity refers to ensuring the authenticity of information—that information is not altered, and that the source
of the information is genuine.
c) Availability means that information is accessible by authorized users.
3. Possible threats to computer security [SLC 2069 S]
a) Human error c) Computer crime e) Natural disasters
b) War and terrorist activity d) Hardware failure
4. Hardware security [SLC 2066] [SEE 2066 S] [SLC 2068 S] [SLC 2071 S]
The securing hardware components of the computer system from being damaged or lost due to electrical voltage
fluctuation, extreme temperatures, dust, high humidity or mechanical stress is known is hardware security.
5. Some of the hardware security measures [SLC 2064] [SLC 2065] [SEE 2067 S] [SLC 2070 S] [SLC 2071]
a) Regular maintenance of computer hardware
b) Fire detectors
c) Insurance Policy
d) Use grille in the windows and use lock in the door to protect from thieves
e) Use power protection device to protect computer from power fluctuation.
f) Use vacuum cleaner to clean the room and avoid dust
g) Protect computer from rain water, moisture and other natural calamities
6. Software security [SLC 2065 S] [SEE 2066 S]
The security given to the software and data from being lost or damaged due to accidental or intentional harm is
called software security. Software prevents the data loss by
a) Antivirus software can detect and remove virus from the computer.
b) Scan disk checks folders, bad sector and other error of the disk and fix them.
c) Software for backup helps in securing the information by keeping backup.
7. Some of the software security measures [SLC 2065] [SLC 2065 S] [SLC 2068] [SLC 2069] [SLC 2071 S]
a) keep the backup copy of important data or software
b) Scandisk
c) Defragmentation
d) use Password
e) use antivirus software and update frequently
f) use firewall to prevent virus.
8. Voltage regulator device
A voltage regulator device is an electronic regulator device designed to automatically maintain a constant voltage
level.E.g.: UPS, Spike guard, Volt guard, etc.
Power protection device
The device that provides clean AC power to sensitive electrical equipment are called power protection devices.
Examples are: UPS, Volt Guard, Spike guard, etc.
Power protection device is needed in a computer system to protect the computer system from damage and
expensive data loss.
9. Importance of power protection device [SEE 2074]
i) To protect the hardware against damage from unexpected power failures.
ii) To protect files and programs being corrupted due to sudden power failure.
https://seeqbasicomputer.blogspot.com/ 27 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
10. Surge Protector
Surge protector is a device that shields computer and other electronic devices from surges in electric power or
transient voltage, that flow from the power supply.
11. UPS (Uninterruptible Power Supply)
A UPS is a device that allows computer to keep running for at least a short time when the primary power source is
lost. It provides continuous power supply to the computer system and protects them from power surge and voltage
fluctuation.
12. Importance of UPS [SLC 2070]
The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides
enough backup electric power to the computer system when there is power failure.
13. Regular Maintenance [SQE 2075K]
Computer system need regular maintenance to keep the computer hardware in good working condition and it also
helps to find out problems in hardware and correct the problems before they cause several damages.
14. Fire detectors
Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting
and closed circuit television cameras should be used to protect computer system from theft.
15. Air Condition [SQE 2074K]
Computer system needs air conditioned room because the factor of climate such as temperature and humidity can
pose a threat to computer security. Extremely heat can cause failure of electronic components. Excessive or very
low humidity can also have an adverse effect on the computer equipment. This leads to a reduction in the life span
of equipment. So, a good air conditioning system is required to eradicate heat-related failures.
16. Password
A password is a secret word or phrase that gives a user access to a particular program or system. To protect a
system from unauthorized access, password should be kept in a system which provides security to the system. A
password should be difficult to guess and determine and should be changed regularly and memorized.
Any four criteria for strong password are:
a) Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
b) Do not keep word as password that is currently popular.
c) Keep a password with mixture of alphabet and numbers which is difficult to guess.
d) Keep changing your password regularly.
How Password secure the data? [SEE 2075]
Password secures the data by protecting the data from unauthorized access.
17. Password policy
A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use
them properly is called password policy.
18. Backup [SEE 2075 U]
Backup is a copy of a file which is used in the event of the original file being corrupted. Backup is essential to
computer security system to recover the important data and programs from accidental and intentional harm. They
are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or
damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data
and software.
19. Scan disk
Scan disk is a process which involves in maintaining the disk files and folders, bad sectors, lost clusters, lost chains
and other errors of the specific disk and it can fix them if it is possible.
20. Defragmentation [U1]
The process of re-writing parts of a file to continuous sector on a hard disk to increase the speed of access and
retrieval is called defragmentation.
Fragmentation
The scattering of the parts of the same disk file over different location is called fragmentation.

https://seeqbasicomputer.blogspot.com/ 28 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
MCQ (Multiple Choice Questions) [30]
1. The term computer security refers to:
a) Use of antivirus b) Protection of software c) Protection to a d) Use of firewall
computer system
2. Common computer security is
a) Hardware Security b) Software security c) Hardware & d) None of them
software security
3. _______ protect the machine and peripheral hardware from theft, electronic intrusion and damage.
a) Information security b) Hardware security c) Software security d) None of the above
4. Some of the methods of hardware protection are:
a) Fire Alarms b) Security Lighting c) Closed-circuit d) All of above
cameras
5. Some of the methods of hardware protection are: [SQE 2075K]
a) Password policy b) Security lighting c) Scandisk d) All of the above
6. Which of the following is not hardware security method?
a) Insurance b) Maintenance c) Closed-circuit d) Hard lock key
cameras
7. Hardware security includes
a) Regular maintenance b) Use of power of c) Both d) None of them
regulator devices
8. Which is not the power protection device?
a) UPS b) Spike Guard c) Volt Guard d) Scan disk
9. Which of the following is not power supply device?
a) Volt guard b) UPS c) Constant Voltage d) Power Plug
Transformer
10. A device that protects your PC against power surges and spikes.
a) UPS b) Voltage Regulator c) Surge suppressor d) All of the above
11. An electrical regulator designed to automatically maintain a constant voltage level.
a) UPS b) Voltage regulator c) Surge processor d) All of the above
12. UPS is a
a) Voltage filtration b) Voltage processing c) Voltage regulator d) None
device device device
13. ……….. is a device that allows your computer to keep running for at least a short time when the primary power
source is lost.
a) UPS b) Voltage regulator c) Surge processor d) All of the above
14. To prevent the loss of data during power failures, we use:
a) Encryption program b) Surge protector c) Firewall d) UPS
15. Which device protects hardware? [SLC 2068]
a) UPS b) MODEM c) Gateway d) All of the above
16. The temperature in computer system should be maintained between ______to________ [SQE 2075K]
a) 21`C to 24`C b) 20`C to 25`C c) 23`C to 28`C d) None of the above
17. The temperature in the computer system should be maintained between ………. and ……….
a) 68 to 72 degree b) 88 to 78 degree c) 68 to 27 degree d) All
Fahrenheit Fahrenheit Fahrenheit
18. The type of security that provides barriers and other cyber –tools that protect programs, files and the information flow
to and from a computer.
a) Computer security b) Hardware security c) Software security d) None of the above
19. Which of the following is not software security measure?
a) Virus Scanning b) . Scandisk c) Password d) Security Guard
20. Data and software security includes
a) Protection from b) Cover the computer c) Both d) None of them
computer virus property
21. _____ is a device that protects your PC from computer virus. [PMT 2075]
i. UPS ii. Voltage regulator iii. NAV iv. None of them
https://seeqbasicomputer.blogspot.com/ 29 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
22. An important counter measure against data corruption or loss. [SQE 2074K]
a) Password policy b) Defragmentation c) Scan disk d) Backup system
23. Which of the following measure allows to protect computers being opened from unauthorized user?
a) Antivirus program b) Password c) Debug d) program
24. Scan disk is used for
a) Removing virus b) Removing bad clusters c) Backup data d) All of above
25. Scan disk is performed by using
a) Application software b) Operating system software c) Utility software d) None
26. Backup is way of
a) Securing data and b) Securing internal part c) Securing external d) None of them
information of the computer parts of the computer
27. _________ refers to the condition of a disk in which files are divided into pieces scattered around the disk.
a) Fragmentation b) Defragmentation c) Scan disk d) All of the above
28. Process of arranging the scattered parts of file into a contiguous manner. [SLC 2068 S] [SLC 2071] [SLC 2074]
a) Backup b) Defragmentation c) Debugging d) All of the above
29. The process of loading the noncontiguous fragments of data, rearranging the fragments and restoring them into
fewer fragments or into the whole life.
a) Fragmentation b) Defragmentation c) Scan disk d) None
30. Defragmentation is a process of
a) Formatting the disk b) Relocation of the disk c) Relocation of the d) None of them
files of the disk

Fill in the Blanks [15]


1. The protection given to the computer hardware and software from being lost or damaged is known as computer security.
2. Computer security focuses on protecting computers, networks, programs, and data from unintended or unauthorized access,
change or destruction.
3. Computer security is the process of preventing and detecting unauthorized use of any computer.
4. Hardware security protects the machine and peripheral devices from theft, damage and electronic instruction.
5. The regular maintenance of hardware keeps the computer devices in good operating condition and helps to find out the
problems in hardware.
6. Voltage regulator an electrical regulator designed to automatically maintain a constant voltage level.
7. The suitable temperature in the computer room should be maintained between 21 to 24 degree Celsius.
8. A computer requires a constant source of 110 volt AC power.
9. The recommended computer room temperature should be 220celcius.
10. UPS is a battery supported power unit between and external power source and a computer system which supplies clean and
continuous power even during power failure.
11. UPS is a device which provides continuous power and protects the computer equipments from power surges and voltage
fluctuations
12. A power conditioner is an electrical device that provides “clean” AC power to sensitive electrical equipment.
13. A surge suppressor is an appliance designed to protect electrical devices from voltage spikes.
14. The tool that is used to maintain performance and error free file management is called scan disk.
15. A password is a secret series of characters that enables a user to access a file, computer, or program.
True / False [40]
1. The parts of the computer which can be seen and touched are called hardware. [SLC 2073] True
2. Computer security is concerned with hardware security only. [SLC 2072] False
3. The use of ID card prevents unauthorized person from being entered in computer room. True
4. IP cameras are used for the surveillance and maintenance. True
5. Lighting cannot cause physical damage to physical system. False
6. Hardware securing means securing hard disk from being damaged only. False
7. System maintenance is used to clear viruses from the system. False
8. The regular maintenance helps to detect problems in computer hardware. True
9. The routine servicing of hardware is a must to keep equipment tin good operating condition and to find and correct problems
before they develop into serious malfunctions. True
10. Computer equipment should be used and stored at a relative humidity of 5 percent with 50 percent variation. False
11. Alarms, security lightning and closed-circuit television cameras are some of the methods of software protection. False
12. Dust, fluctuation of electricity and over heat can damage hardware of computer system. True
https://seeqbasicomputer.blogspot.com/ 30 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
13. A computer requires a constant source of 110-volt AC power. True
14. The required voltage for computer system is 220 to 240. True
15. The dust particles can damage hard disk of a computer. True
16. When a hard disk of a computer system get damaged or lost, we don’t lose any data and information. False
17. A volt guard supplies back up electric power to the electronic goods when there is load shedding. False
18. UPS is a device that maintains a constant voltage level. False
19. UPS protests our computer against voltage fluctuation. [U1] False
20. Volt guard and stabilizer can supply back up electric power tom a computer system when there is power cut off. False
21. The electronic device used in the setup of the computer is not delicate. False
22. Power protection devices protect computer software. False
23. Air conditioning is more important for the computer system where the temperature and the humidity must be controlled. True
24. Insurance is one of the computer security measures. True
25. Security lighting and closed –circuit television cameras are the methods of software protection. False
26. Loss of information costs more than protecting it. True
27. Software protection can be made by using physical security. False
28. Antivirus program are used to protect from unauthorized people. False
29. Scandisk helps to scan and remove viruses from computer. False
30. The data and programs stored in a disk cannot be damaged. False
31. Fragmentation reduces data access time and allows storage to be used more efficiently. False
32. Defragmentation is the tool that ensures error free file management. False
33. Backup is used for scanning and protecting computer from viruses. False
34. The lost data and information can be easily recovered in computer. False
35. Scandisk is a disk tool that allows checking files, folders, bad sectors, lost clusters, lost chains and any errors of the specific
disk. True
36. Valuable data and information may get lost due to the faulty wiring system. False
37. The loss of information can cause serious damage to the organization. True
38. The password prevents unauthorized users to access a file, application or computer system. True
39. Password protection can be implemented to the computer system only. False
40. When we set a password to file, and unauthorized person can delete the file. False

Technical Terms [25]


1. The process of preventing and detecting unauthorized use of your computer. Computer Security
2. The process of ensuring confidentiality, integrity, and availability of computers, their programs, hardware devices and data.
Computer Security
3. The protection of the components of a computer system. Hardware Security
4. The securing data and programs from being lost or damaged due to accidental or intentional harm. Software Security
5. The method applied to increase the life of computers and its assets. Regular Maintenance
6. A secret word that gives a user access to a particular program and system. [SLC 2064] [SLC 2065 S] [SLC 2069] [SLC 2070
S] Password
7. A spare copy of important program and documents. [SLC 2069 S] Backup
8. Making an extra copy of data and software. [SLC 2066] [SLC 2066 S] Backup
9. Making duplicate copy of file for security purpose. [SLC 2067] Backup
10. The scattering of the parts of the same disk file over different locations. Fragmentation
11. The method of consolidating fragmented files on the computer. [SLC 2069 S] Defragmentation
12. The process of rearranging the fragmented files in the contiguous locations on the disks. Defragmentation
13. A program that checks a condition of hard disk. Scan Disk
14. A disk tool which helps to fix errors in the disk and also remove bad sectors. Scan Disk
15. A television transmitted to the particular audience at specific location via coaxial cables, telephone wires, fiber-optics strands,
microwave radio systems, or communications satellites, as compared to open-circuit (broadcast) television intended for the
general public. CCTV
16. The use of video cameras to transmit a signal to a specific place, on a limited set of monitors. CCTV
17. A device that protects your PC against power surges and spikes. Surge Suppressor
18. A device or circuit that maintains a load voltage nearly constant over a range of variations of input voltage and load current.
Voltage Regulator Device
19. An electrical regulator designed to automatically maintains a constant voltage level. Voltage Regulator Device
20. An electrical device that provides “clean” AC power to sensitive electrical equipment. Power Conditioner
21. A device that protects computer system from the fluctuation of electric voltage. Volt Guard
22. Device used for power protection. [SLC 2066 S] Volt guard
23. An electronic device that supply electronic current when electricity is cut off[ SLC 2067 S] [SEE 2073 U]. UPS
24. The power regulating device this supplies constant power to the computer from its backup system.UPS
25. A battery supported power unit between and external power source and a computer system which supplies clean and
continuous power even during power failures. UPS

https://seeqbasicomputer.blogspot.com/ 31 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Computer Virus
Questions and Answers [15]
1. Computer virus [SLC 2064] [SLC 2068 S] [SLC 2069] [SEE 2074] [SQE 2074K]
Computer virus is a type of computer program which is written by the programmer with the intent of destroying or
damaging the data and programs residing in the computer system. E.g. C-Brain, Frodo, Disk Killer, I Love You etc
The purpose of creating computer virus are:
a) To stop computer piracy
b) To entertain user by displaying interesting message and pictures
c) To destroy data, information and files
d) To expose the programmers ability
e) To earn money

2. Common characteristics of computer virus


a) Destroy data, information, files or programs of a file.
b) Steal important data and information.
c) Load and run unwanted applications.
d) Display the unnecessary messages or pictures.
e) Degrade overall performance of the computer system.

3. Spreading computer virus [SLC 2071]


a) Sharing infected internal portable disk like floppy disk, pen drive, CDs, etc.
b) Opening a virus infected email, messages and attached files.
c) Downloading files and programs form the websites which are not secure.
d) Exchanging data and information over a network

4. Symptoms of computer virus [SLC 2067] [SLC 2068] [SLC 2070 S] [SEE 2072] [SEE 2074] [SEE 2074 U]
a) Program takes long time to load.
b) Increased use of disk space and growth in file size.
c) Corrupting the system data.
d) Renaming files with different names.

5. Effects of computer virus [MM 2076]


a) Virus can change the contents of file, and codes of program.
b) Degrade the overall performance of computer system.
c) Change in size of file by adding or removing text accordingly.

6. Preventive ways to protect computer system form virus [SLC 2066] [SEE 2066 S] [SEE 2073] [SEE 2075]
[SEE 2075 U] [SQE 2075K] [U1]
a) Write protect your floppy disks when using them on other computers.
b) Scan the mail or unknown files of internet before opening in your computers.
c) Use a good antivirus program to scan floppy disk, CD, etc. before copying.
d) Don’t install pirated software, especially computer games.
e) Don’t interchange the internal disk among the computers.

7. Types of viruses [SLC 2064]


a) Boot sector virus c) File infector virus e) Multipartite virus
b) Stealth virus d) Macro virus

https://seeqbasicomputer.blogspot.com/ 32 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
8. Antivirus software [SEE 2073 U] [SLC 2071 S] [SLC 2065] [SLC 2065 S] [SEE 2067 S] [SLC 2069 S]
[PMT 2075K]
Antivirus software is software designed to detect and remove virus from computer system and ensures virus free
environment. E.g. Kaspersky, NAV, MSAV, McAfee, NOD 32 etc.

9. Boot sector virus


Ans: The virus which destroys or infects the boot sector of the disk where master boot record is stored is called
boot sector virus. The boot sector virus modifies the Master Boot Record (MBR) that prevents the computer system
from being able to boot or start up the computer from system disk. MBR is a small program which is responsible
for booting computer system.

10. Program or file virus


The virus that infects the executable program file having extension .exe, .bin, .sys, .com, etc. is called program
virus.

11. Stealth virus


The virus that infects the program files and boot records which rarely gives the information about its presence is
called stealth virus.

12. Multipartite virus


Ans: The virus which infects both application program and boot sector of a disk is called multipartite virus.

13. Macro virus


The virus that infects the software document or template created using word processing or spread sheet software is
called macro virus.

14. Computer worm


A Worm is a malicious program that replicates itself and can spread to different computers via Network.

15. Trojan horse


Trojan horse is a destructive program that disguises as a game or a utility or an application program, which
pretends to be something interesting and harmless.

MCQ (Multiple Choice Questions) [30]


1. Computer virus is___________software.
i. Malware ii. Utility iii. Application iv. Operating System
2. Computer virus is ………. [SLC 2068 S]
i) dust particle ii) computer programs iii) useful program iv) none of the above
3. Virus is a [SLC 2071]
i. Utility program ii. Destructive program iii. System program iv. None
4. Computer virus can
i. Hide in a host file ii. Replicate iii. Spread iv. All of the above.
5. Computer virus can destroy
i. Hardware ii. Software iii. Data iv. All
6. Which one of the following is harmed by computer virus? [SEE 2074 U]
(i) Monitor (ii) Mouse (iii) Printer (iv) Hard Disk
7. Which is not a virus? [SLC 2064]
i. Worm ii. Logic bomb iii. Trojan Horse iv. Win-zip

https://seeqbasicomputer.blogspot.com/ 33 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
8. Which one is not a type of virus? [SLC 2067 S] [SLC 2070] [SLC 2071 S] [SQE 2074K]
i) Message Carrying virus ii) Boot sector virus iii)System virus
iv)Special Purpose Application Infector
9. Route of virus transmission. [SLC 2065] [PMT 2075]
a) Mouse b) Printer c) Microphone d) Pen drive/Flash drive
10. Computer virus can spread from one computer to another through_
i. Infected portable disk ii. The Internet iii. Pirated software iv. All of the above.
11. A program or set of programs designed to prevent, search for, detect, and remove software viruses, and other
malicious software like worms, Trojans, adware and more.
i)Shareware ii)Freeware iii)Antivirus
12. Which is not a computer virus ? [SEE 2075]
(i) kaspersky (ii) message carrying virus (iii) Boot sector virus (iv) Program virus
13. Which of the following is not anti-virus
i.AVG ii.NAV iii. Kaspersky iv. I Love you
14. Which of the following is an anti-virus program? [SLC 2068 S]
i) NAV ii) Windows iii) Photoshop iv) All of the above
15. An example of antivirus software is
i. NAV ii. McAfee iii. CPAV iv. All
16. Which is antivirus software?
i. Scan ii. Defrag iii. Kaspersky iv. Power point
17. A program that is used to detect and remove virus. [SEE 2075 U]
i) C- Brain ii) Worm iii) Trojan Horse iv) Kaspersky
18. Norton antivirus, when loaded onto a computer system , checks the following areas for viruses
a) boot record b) programs at the time you use them c) both
19. ________ Virus are often transmitted by a floppy disk left in the floppy disk drive.
a) Boot-sector Trojan horse Script logic bomb
20. Which computer virus damages the master boot record? [SLC 2068]
i) Macro virus ii) File virus iii) New folder virus iv) Boot sector virus
21. Which virus infects boot sector files? [SLC 2069]
i) Macro virus ii) Multipartite virus iii) Boot sector virus iv) Program virus
22. Boot sector virus infects [SLC 2066]
i. System files ii. Master boot record iii. Application software iv. Document file
23. Disk Killer, stoned and Michelangelo are examples of ________________
i) Boot sector virus ii) File infecting virus
iii) Polymorphic virus iv) All of the above
24. A virus that infects the part of the computer called a system sector.
i. Boot sector virus ii. File infecting Virus iii. Polymorphic virus iv. None of the above
25. Which of the following virus infects the various parts of operating system?
i. boot sector ii. Worm iii. Macro iv. system infector
26. A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil.
i) Boot sector virus ii) File infecting iii) Script virus iv) Macro virus
27. __________ Virus can infect both programs and boot sectors.
a) Stealth virus b) File infectors c) Multipartite virus d) Polymorphic virus
28. Multipartite viruses have combination features of
i. Boot sector & stealth virus ii. Boot sector &macro virus
iii. Boot sector & program virus iv. None
29. Viruses attach themselves to documents such as Word and Excel.
a) Macro virus b) File infectors c) Polymorphic virus
30. __________ is a self-encrypted virus designed to avoid detection by a scanner.
i. Polymorphic virus ii. Macro virus iii. Script virus iv. None of the above
https://seeqbasicomputer.blogspot.com/ 34 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Fill in the Blanks [20]
1. The first person who introduced the concept of replicating program was John von nevmann.
2. Computer virus Is a program that spreads by first infecting files or the system areas of a computer or network
router’s hard drive and then making copies of itself.
3. Computer virus is a program that can copy itself and infect a computer without the permission or knowledge of
the user.
4. Computer virus is a program containing code that can generate multiple copies of itself .
5. The capability of generating the copies of itself is called replication.
6. Antivirus software is a class of program that searches your hard drive and floppy disks for any known or potential viruses.
7. Antivirus are used to detect and remove computer virus from infected file or memory. [SLC 2064]
8. Message carrying viruses usually do not destruct the computer files/programs but display interesting information
to entertain the users.
9. Firewall are software programs or hardware devices designed to keep computers safe from hackers.
10. A MBR is an area of the computer hard drive or a floppy disk that is executed when the computer is started.
11. Boot sector virus infects or substitutes its own code for either the DOS boot sector or the master boot
record(MBR)
12. File infector viruses infect executable program files having an extension .exe,.com,or.dll.
13. File infector virus affect executable file.
14. A macro virus is a type of computer virus that infects the word processing or spread sheet document or template.
15. A malicious program that pretends to be something useful program is known as trojan horse.
16. A program that is not a virus but behave like virus and can replicate is known as worm.
17. Multipartite viruses can infect both the application programs and the boot sector of a disk.
18. Polymorphic code is a code that mutates while keeping the original algorithm intact.
19. A polymorphic virus is a complicated computer virus that affects data types and functions.
20. Polymorphic viruses are very difficult to identify and detect by anti-virus.
True / False [30]
1. A computer virus can cause actual damage or destruction to the hardware components of a computer system. True
2. Virus spreads across disks and networks by making copies of it. True
3. Computer viruses used to be a developed unknowingly while developing computer program. False
4. Viruses are easily identified as other programs. False
5. Viruses mostly spread through computer network. False
6. Viruses change the size of file and memory. True
7. Computer virus deletes unnecessary data, information and programs of a computer. False
8. Computer virus is visible like other files and programs. False
9. Computer viruses are created to stop the software piracy. True
10. Computer viruses hide themselves in host files. True
11. Computer virus decreases the space in the main memory and increase the size of the executable files. True
12. A computer virus needs another program in order to be able to be activated and infect other computer files. False
13. Each computer virus contains instructions to initiate a unique, problematic event on the infected computer. True
14. Computer viruses cannot delete files and format a user’s hard disk. False
15. Pirated software copies viruses, to the computer. True
16. Do not install pirated software, especially computer games. True
17. Viruses can easily hide within a system by attaching themselves to other files or program because they are small
in size. True
18. System infectors usually enter to the system as a device driver and get loaded into memory. [SLC 2064]. True
19. Script viruses attach themselves to any executable file, usually .COM, .BIN, EXE etc. False
20. A macro virus infects both the application program and the boot sector of disk. True
21. Macro viruses infect files created in Microsoft application software like MS-Word, MS-Excel, etc. True
22. A virus that can change its appearance with every infection is called macro virus. False
23. Stealth virus is a file virus that uses special technique to hide its presence from user and virus scanners. True
24. Stealth virus is a computer virus that uses various mechanisms to avoid detection by antivirus software. True
25. A files infecting virus activated only when you turn or a restart your computer. False

https://seeqbasicomputer.blogspot.com/ 35 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
26. A macro virus is a computer virus that replaces a macro, which is what enables a program to work and instigates a
designated group of action and commands. True
27. An anti-virus program having old virus definition file can effectively detect the latest virus. True
28. Antivirus software must perform algorithms scanning to detect script virus. True
29. Multi-partite virus can infect both the boot sector of the disk and executable file. True
30. Boot sector virus infects the program files. [SEE 2075 S2] False

Technical Terms [20]


1. A software program with the ability to generate multiple copies itself. Computer Virus
2. A program that destroys other program. [SLC 2065] Computer Virus
3. A computer program that entertains and damages the user’s file. Computer Virus
4. A program that effect the normal functioning of computer. [SLC 2068] Computer Virus
5. The software that protects computer virus.[SLC 2069]. Antivirus
6. A program that can disinfect a file from virus. [SLC 2070] [SLC 2072]. Antivirus
7. Program used to detect and eliminate computer virus. [SLC 2066 S] [SQE 2075K] Antivirus
8. A virus that infects the part of the computer called a system sector. Boot Sector Virus
9. A virus infects or substitutes its own code for either the DOS boot sector or the master boot record (MBR) Boot Sector Virus
10. A small program that runs every time the computer starts up. MBR
11. A type of virus that infects executable files having .exe, .com, .ovl, .drv, .sys, or .dil. File Infector Virus
12. A virus that affects application programs. File Infector Virus / Program Virus
13. A virus that corrupts system files of operating system. [SLC 2066] System Infector Virus
14. A virus that shows different behavior in each infection. Polymorphic Virus
15. A complicated virus that affects data types and functions. It is a self encrypted virus designed to avoid detection
by a scanner. Polymorphic Virus
16. A code that mutates while keeping the original algorithm intact. Polymorphic Virus
17. A series of commands and actions that help to automate some task. Macro Virus
18. A computer virus that damages the documents created in MS-Word & MS-Excel. [SLC 2068 S] [PMT 2075]
Macro Virus
19. A virus that infects both boot sector of a disk and program files. Multipartite Virus
20. A file virus that uses special technique to hide its presence from users and virus scanners. Stealth Virus

https://seeqbasicomputer.blogspot.com/ 36 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Multimedia
Questions and Answers [15]
1. Multimedia [SLC 2064] [SLC 2065 S] [SEE 2067 S] [SLC 2070 S] [SEE 2073] [SEE 2073 U] [SEE 2075]
Multimedia is the integration of multiple forms of media, which presents information in more interesting and
understandable way.
Multimedia technology is becoming popular because it shares the ideas, views and thoughts of people in an
interactive, effective and understandable way.
The five types of media used in multimedia technology are:
i) Text ii) Audio iii) Video iv) Graphics v) Animation

2. Application areas of multimedia technology [SLC 2064] [SLC 2065 S] [SEE 2067 S] [SLC 2070 S]
[SEE 2073 U]
The application areas of multimedia technology are Communication, Entertainment, Medicine, Education, Video
games, Advertisement, Presentation, Films, Public accessing, Learning foreign language, etc.

3. Advantages of multimedia technology [SLC 2067] [SLC 2069 S] [SEE 2072] [PMT 2075K]
a) Multimedia enhances standard education techniques and makes learning process easier.
b) It makes easy to share views, ideas and thoughts among various people.
c) The use of multimedia can enhance every area in a presentation.
d) It makes presentation of related subject matter attractive.
e) Information combined with multimedia will be easy to understand and convincing.

4. Disadvantages of multimedia technology [SEE 2072]


a) The cost of developing a multimedia product is high.
b) An ordinary computer cannot play multimedia.
c) Skilled manpower is required to operate multimedia.
d) Computer needs extra hardware like CD-Drive, head phone, sound box, etc, which adds expense.

5. Hardware components required for multimedia


i) Sound Card ii) Speaker iii) Headphones iv) CD/DVD ROM drive v) Graphics Card

6. Software packages used for multimedia technology [SLC 2066]


i) Adobe Photoshop ii) Macromedia flash player iii) Animator Pro iv) 3D studio MAX
v) Maya vi) Coral Draw etc.

7. Animation
Animation is a simulation of movement created by displaying a series of pictures or frame.
The moving graphic images is called animation.
For example: Cartoons

8. Video
Video presents the moving images of the real events.
For example: Movies.

9. Virtual reality
Virtual reality is an artificial environment created by computer hardware and software and presented to the user in
such a way that it appears real.

https://seeqbasicomputer.blogspot.com/ 37 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
10. Multimedia computer system [SQE 2074K]
A multimedia computer is a computer equipped with special hardware and software that makes multimedia
possible. The components of multimedia computer are:
i) Faster CPU ii) Larger storage device iii) Large main memory
iv) High resolution monitor v) Sound card and speaker vi) Keyboard and pointing device

11. Multimedia in education [ [SEE 2066 S] SLC 2068] [SLC 2068 S] [MM 2076]
The role of multimedia in education is that it makes teaching / learning easier in classroom as well as it makes
presentation of related subject matter attractive.

Edutainment
A form of education which is designed to be entertaining in order to keep people interested and engaged is called
edutainment.

12. Multimedia in advertisement [SQE 2075K]


The role of multimedia in advertisement is to to promote any items and approach new user to use it perfectly.

Hyper media
An extension of hypertext that supports linking graphics, sound and video elements in addition to text elements is
called hypermedia.

13. Multimedia in entertainment


Multimedia is useful in entertainment to develop special effects in movies and animation and also to develop
multimedia games.

14. Multimedia useful in industrial sector


Multimedia is used in business to present information to share holders, superior and co-workers. It is also used for
various purposes such as employee training , sales presentation, products, advertisement, consumer education, etc.

Multimedia in presentation software


Multimedia presentation software is a tool that computer users of varying industries and backgrounds use to
dynamically present information to an audience.

MCQ (Multiple Choice Questions) [30]


1. A computer-derived electronic system that allows the user to control, combine, and manipulate different types
different types of media, such as text, sound, video, computer graphics and animation.
Monomedia Multimedia Hypermedia None of the above
2. Which of the following media are used in Multimedia system?
i. Text-audio ii. Text-visual iii. Text, graphic, audio and visual iv. Text, graphic and sound
3. The types of media used in multimedia includes
i. Text Graphics Sound All of them
4. A MUK consists of the
i. CD-ROM Drive Sound Card Speaker All of them
5. Which of the following are components of multimedia?
i. Computer ii. Software iii. Projector iv. All of above
6. Which of the following is main component of multimedia? [SLC 2065] [SQE 2075K]
i. Floppy disk ii. Floppy drive iii. Sound card iv. Magnetic tape
7. Which of the following is the main component of Multimedia system? [SEE 2074 U]
(i) Keyboard (ii) Windows (iii) Sound Card (iv) Printer

https://seeqbasicomputer.blogspot.com/ 38 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
8. Which of the following is the component of multimedia? [SLC 2069 S]
i) Network ii) Microphone iii) Power cable iv) Printer
9. Select the common components of the multimedia computer system.
i. Floppy Floppy drive CD-ROM None
10. Which is not related to multimedia? [SLC 2069]
i) Printer ii) Sound card iii) Microphone iv) CD-ROM
11. Which of the following is an audio output device? [SLC 2070]
i) Microphone ii) Speaker iii) Monitor iv) Printer
12. Which of the following is an audio input device? [SLC 2071]
i. Printer ii. Microphone iii. Head phone iv. Speaker
13. Which of these software is used for photo editing? [SLC 2074]
(i) Ms-Excel (ii) Photoshop (iii) Power-Point (iv) Ms-Word
14. Which one is the software used in multimedia?
CD-ROM Sound Card Sound Forge MS-Word
15. Software used in multimedia system. [SEE 2075 U]
a) Animator b) Flash Player c) Power Point d) All of them
16. Which is the multimedia software ? [MM 2076]
i) Photoshop ii) MS Power point iii) VLC Player iv) All of them
17. The software associated with the multimedia technology is .
i. Macromedia Flash ii. Microsoft Word. iii. Adobe In design iv. None of the above
18. Software associated with the multimedia technology is
Windows XP Macromedia Flash QBASIC None
19. Which of the following is software used in multimedia technology.
i. Office XP ii. Adobe Photoshop iii. Basic iv. None of the above
20. Which of the following is not multimedia software?
i. Windows media player ii. Windows XP iii. Adobe illustrator iv. Macromedia flash
21. Which of the following is multimedia application?
i. Education ii. Entertainment iii. virtual reality iv. All of above
22. Multimedia technology is very effective in
i. Market Classroom War None
23. Multimedia technology is used in ……… [SLC 2066]
i) Education ii) Business iii) Health care iv) All of the above
24. An artificial reality that projects the user into a 3D space generated by the computer.
Virtual Reality Virtual Computer All of the above None of the above
25. An upcoming technology that makes users feel in Virtual Environment(VE) by using computer hardware and
software.
i)Virtual space ii)Virtual computer iii)Virtual reality iv)None of above
26. _____ deals with the recording and display sequence of images at a reasonable speed to create an impression of
movement.
Graphics Video Animation Text
27. Graphics that contain movement often referred to as .
i. Graphics ii. Video iii. Animation iv. Text
28. _______ provides a visual impact.
Image Graphics Video None of them
29. The process of displaying still images in a rapid sequence to create the illusion of movement.
i)Text ii)Graphics iii)Video iv)Animation
30. An extension to hypertext supports linking graphics, sound and video elements in addition to text elements.
Interactive media Hypermedia All of the above None of the above

https://seeqbasicomputer.blogspot.com/ 39 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

Fill in the Blanks [20]


1. A computer capable of handling texts, graphics, audios, animations and videos is called multimedia computer.
2. Multimedia is a computer-delivered electronic system that allows the user to control, combine and manipulate
different types of media such as sound, video, computer graphics and animation.
3. Multimedia is the integration of multiple forms of media.
4. Multiple media in one content is called multimedia .
5. Multimedia enhances the information for better communication and understanding.
6. Graphics provides a visual impact.
7. Graphics is a digital representation of non-text information such as a drawing, chart or photographs.
8. Graphics deal with the generations, representations, manipulation and display of pictures with the aid of
computer.
9. Animation represents multiple picture in a sequence.
10. Video is the process of displaying still images in a rapid sequence to create the illusion of movement.
11. Video deal with recording and displaying of a sequence of mages at a reasonable speed to create an impression of
movement.
12. Video refers to pictures in motion.
13. Text is the primary component of multimedia.
14. Optical disk is used to store data and information in the multimedia technology.
15. Hoarding board is an example to use multimedia in commercial field.
16. Multimedia is used in the entertainment industry, especially to develop special effects in movies and animation.
17. Virtual Reality is an artificial environment created with computer hardware and software and presented to the
user in such a way that it appears.
18. A simulated 3-D environment is called Virtual Reality.
19. Virtual Reality is the use of computer modeling and simulation to enable a person to interact with an artificial
three-dimensional visual or other sensory environment.
20. Virtual reality uses head sets and data gloves.

True / False [35]


1. Multimedia is used only in the field of information technology. False
2. Multimedia presentation is less effective than lecturing. False
3. Multimedia manipulates the information for better communication. True
4. Multimedia helps to develop creative ideas. True
5. Multimedia products take much time to develop and are expensive. True
6. Multimedia computer can play more than one medium simultaneously. True
7. Multimedia is used in business to promote business. True
8. Multimedia products are stored in pen drive. False
9. Multimedia is used in movies to add special effects. True
10. Multimedia manipulates the information for better communication. True
11. Multimedia technology used in public places as an information provider. True
12. Multimedia provides a medium to promote, sell, teach and communicate in new interactive ways. True
13. Multimedia uses more than one media. True
14. Multimedia does not include animation. [SLC 2064] [SLC 2065 S] False
15. All the multimedia products are available in optical disks. True
16. A computer that can handle only text and audio is multimedia computer. False
17. Microphone is essential in multimedia. [U1] True
18. Sound card is one of the hardware required in multimedia computer. [SLC 2072] True
19. Sound card is one of the components of multimedia.[SEE 2075 S2] True
20. Sound cards capture movies, or pictures from external device. [SLC 2064] False
21. Keyboard and mouse are two important components for any multimedia computers. True
22. All the computers are capable of handling multimedia. False
23. A picture is a worth of thousand words. True
24. Virtual reality is a simulated process to represent real world scenario. False
https://seeqbasicomputer.blogspot.com/ 40 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
25. Virtual Reality is an artificial reality that projects the user into 3D space generated by the computer. True
26. Tutorial CD and TOEFL CD are interactive multimedia CDs. True
27. Video increase the retention of information for long time in the memory of people. True
28. The important elements of multimedia are text, graphics, video, animation and audio. True
29. Animation is a digital representation of non-text information, such as a drawing, charts or photographs. False
30. Animation deals with synthesizing, recording and playback of audio or sound with the aid of computer. False
31. Animation refers to simulation of movement created by displaying a series of picture one after another. True
32. Cartoon movies are examples of animation. True
33. Most of the information is conveyed through the text medium. True
34. Images do not play any role in multimedia. False
35. Graphics is a series of image that are displayed in rapid succession giving, the illusion of movement. False

Technical Terms [20]


1. A computer system that is capable of handling more than one medium simultaneously. Multimedia Computer System
2. The integration of text, audio, sound and animation. [SLC 2067] [SLC 2069 S] [SLC 2071] [SEE 2074 U] [SEE
2075 S2]. Multimedia
3. The combination of more than media such as text, picture, sound, movies clips, etc. Multimedia
4. A technology that will enhance multimedia by supporting real time, interactive, three-dimensional graphics.
[PMT 2075] Virtual Reality
5. An upcoming technology that makes user feels in a Virtual Environment (VE) by using computer hardware and
software. Virtual Reality
6. The artificial environment created by computer technology to entertain users [MM 2076]. Virtual Reality
7. Learning through the electronic media. [SEE 2074 U] e-learning
8. An emerging term, multimedia used in education. Edutainment
9. A technology that makes teaching-learning easier in a classroom. Computer Aided Learning (CAL)
10. A form of education which is designed to be entertaining, in order to keep people interested and engaged. Edutainment
11. The technique used to provide medical information and services through the internet. [SQE 2075K] E- medicine
12. The process of displaying still images in rapid sequence to create the illusion of movement. Animation
13. A simulation of movement created by displaying a series of images of artwork one after the other. Animation
14. The moving graphic images. [SEE 2073] [SEE 2075 U]. Animation
15. The real images of artwork. Animation
16. The process of giving the illusion of movement to drawings, models or inanimate objects. Animation
17. The creation and manipulation of picture images in the computer. Graphics
18. The display of still-frame pictures or photos on a computer screen. Graphics
19. An extension to hypertext that supports linking graphics, sound and video elements in addition to text elements. Hypermedia
20. The process of displaying alphanumeric characters on the screen to present information. Text

https://seeqbasicomputer.blogspot.com/ 41 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Cyber Law And Ethics

Questions and Answers [15]


1. Cyber law [SEE 2075 S2] [PMT 2075K]
The law which governs the legal issues in the cyber space regarding the internet or WWW for digital data
processing and transaction is called cyber law. The importance of cyber law is that it controls cyber-crime and
misuse of computer.

2. Importance of Cyber Law [PMT 2075K]


Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the
Internet, the World Wide Web and Cyberspace.

Requirement of Cyber law in Nepal


Cyber law is needed to legalize the transaction through electronic media to control various types of electronic
frauds and to punish a person who does criminal activities through electronic means especially on computers.

3. Aims of formulating cyber law in Nepal [SLC 2070]


i) To legalize the transaction through electronic media to control various types of electronic frauds
ii) To punish a person who does criminal activities through electronic means especially on computers.

4. Cyber space
A virtual space created by computer network, internet and telecommunication is called cyber space.

5. Major laws included in cyber law


a) Electronic and Digital Signature law
b) Computer crimes/Cyber-crime law
c) Intellectual property law
d) Data protection and privacy law
e) Telecommunication law

6. Five major aspects of cyber law of Nepal 2004


a) Provides legal status for various banking transaction through electronic media, which will be instrumental in
boosting economic activities throughout the world via internet.
b) Provides a legal framework to facilitate and safeguard electronic transactions in electronic medium.
c) Provides detailed provisions for the controller of certifying authorities to regulate certifying authorities.
d) Provides punishment who conducts cyber crime.
e) Provisions under the act in order to control and regulate the criminal activities apparent in Nepal cyber
environment.

7. Major issues address by cyber law


a) Criminal activities on cyberspace.
b) Electronic commerce, online transactions and digital signature.
c) Intellectual property right, copyright violation
d) The provision of e-governance by promoting electronic recording system

8. Cyber crime [SEE 2074] [SLC 2071]


Cyber crime is an illegal action involved in any computer, computer system or over all computer networks like
internet. E.g. Software piracy, hacking, cracking, pornography etc.
Computer hacking means stealing and destroying other data, information, files and program.

https://seeqbasicomputer.blogspot.com/ 42 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
9. Digital signature
Digital signature is a security mechanism system used on the internet for data and information transaction by
attaching a code at the end of the electronic message that attests the authenticity of sent message. The importance
of digital signature is that it provides legal framework to facilitate and safeguard electronic transaction in the
electronic media.

10. Encryption
The process of encoding (scrambling) information in such a way that it is unreadable to all is encryption.

Decryption
The process of restoring encrypted data to its original form is decryption.

11. Computer ethics [SEE 2075 U] [SLC 2065] [SLC 2069] [U1]
Computer ethics refers to follow the rules and regulation of computer technology and not to harm other computer
users knowingly or unknowingly.

12. Some commandments of computer ethics.


a) Not to use computer to harm other people.
b) Not to search the files or records of other people.
c) Not to destroy, steal and use others computer passwords.
d) Not to destroy, erase or edit personal or group records.
e) Not to use computer to steal.

13. Intellectual property rights


The legal property rights of someone over his creations of the mind both artistic and commercial are called
intellectual property rights.

14. Data security and privacy law


Data protection and privacy refers to the process of ensuring the preservation, integrity and reliability of data. The
law related to it is called data security and privacy law.

15. Freedom of information act


The purpose of freedom of information act of 1970 is to promote maximum disclosure of information in the public
interest, to guarantee the right of everyone to access information and to provide for effective mechanism to secure
that right.

Video privacy protection act


The purpose of video privacy protection act of 1988 is to limit the disclosure of personally identifiable
information regarding video rentals.

MCQ (Multiple Choice Questions)[20]


1. A genetic term that is concerned to the legal and regulatory aspects of Internet and computer technology.
Copyright law Cyber law Computer Crime None of them
2. “The Electronic Transaction and Digital Signature Act-Ordinance” is Known as:
i. Intellectual Property Law Cyber Law
ii. Telecommunication Law Data Protection Law
3. When did cyber law introduced in Nepal? [SEE 2075 U]
i.2002 A.D. ii.2003 A.D. iii.2004 A.D. iv.2005 A.D.
4. When did cyber law introduced in Nepal? [SLC 2066] [SLC 2070 S]
i) 2061 B.S. ii) 2062 B.S. iii) 2007 B.S. iv) 2016 B.S.
https://seeqbasicomputer.blogspot.com/ 43 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
5. The government of Nepal has passed the cyber law on:
31st Bhadra 2061 BS 29th Bhadra 2061 BS 30thBhadra 2062 BS 30thBhadra 2061 BS
6. The term ‘cyberspace’ was used in:
1984 1884 1985 1885
7. A criminal activity within the information technology infrastructure.
Digital crime Intellectual property Cybercrime All of them
8. Which of the following is computer crime?
i. piracy ii. pornography iii. harassment iv.All of above
9. Which of the following is not computer crime?
i. Plagiarism ii. Password guessing iii. Internet iv. virus transferring
10. _______ is the normal Principal that regulates the use of computers.
Cyber Law Cyber act Computer ethics All of them
11. Which of the following is not computer ethics?
Not to steal data Not to bear false message Not to use Internet Not to harm the society

12. Premeditated, usually politically-motivated violence committed against civilians through the use of, or with the
help of, computer technology
i) Cyber stalking ii) Cyber laundering iii) Cyber theft iv) Cyber terrorism
13. The act of attempting to acquire sensitive information like usernames, passwords and credit card details by
disguising as a trust worthy source.
i) Hacking ii) Phishing iii) Computer Virus iv) Cyber stalking
14. Electronic transfer of illegally-obtained monies with the goal of hiding its source and possibly its destination.
i)Cyber stalking ii) Cyber laundering iii) Cyber theft iv) Cyber terrorism
15. The method of making the data or message unreadable by unauthorized people.
Digital signature Decryption Encryption All of them
16. Which of the following is included in cyber law?
i. Trademark right ii. Copyright iii. Data privacy iv. All of the above
17. The law which includes literature and art, films, computer programs, invention, designed used by traders for their
goods or services is called:
iii. Data Privacy Law Intellectual Property Law
iv. Telecommunication Law Cyber crime Law
18. The Process of ensuring the preservation, integrity and reliability of data is Known as:
v. Intellectual Property Law Data Protection and Privacy law
vi. Cyber Law Telecommunication Law
19. The law that provides a legal framework to facilitate and safeguard electronic transaction in the electronic
medium.
i. Digital signature law ii. Intellectual property law ii. Telecommunication law
20. A federal law enacted in 1970 to ensure confidentiality of consumer credit information held by lenders and credit
reporting agencies.
i. Fair credit reporting act ii.Federal privacy act iii.Copyright act

Fill in the Blanks [20]


1. Telecommunication is the exchange of information over significant distances by electronic means.
2. Cyber law includes a wide variety of legal issues to the use of communication technology.
3. Cyber law is a generic term, which refers to all the legal and regulatory aspects of internet and the world wide
web
4. Cyber law is the law governing computers and the Internet.
5. Cyber law of Nepal commonly known as the Electronic Transaction And Digital Signature Act-Ordinance was
enacted in Nepal in 2061 B.S. [SLC 2064]

https://seeqbasicomputer.blogspot.com/ 44 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
6. Cyber crime may include thefts or actions in electric form that causes damages or difficulty to other computer
users.
7. Cyber crime is a criminal activity done using computers and the Internet.
8. Cyber Crime refers to illegal activities involved in any computer.
9. The activity of breaking into a computer system to gain an unauthorized access is known as .
hacking.
10. The use of communication technology, mainly the Internet to torture other individuals is known as cyber stalking.
11. Computer ethics is the set of moral principles that regulate the use of computers.
12. Cyber space does not only include the internet and computers, but it present where two or more cables or wires
etc meet.
13. Cyberspace has become synonyms with the internet.
14. A digital signature is an electronic signature that can be used to authenticate the identity of the sender of a
message or the signer of the document, and possibly to ensure that the original content of the message or
document that has been sent is unchanged.
15. Digital Signature is a security Mechanism system in the cyberspace for digital data processing and transaction.
16. Intellectual property law is a term referring legal property rights of someone over his creations of the mind ,
both artistic and commercial.
17. The law which is enacted to ensure the preservation, integrity and reliability of data is called data protection and
privacy law.
18. Fair credit reporting act is a federal law enacted in 1970 to insure confidentiality of consumer credit information
held by lenders and credit reporting agencies.
19. Video privacy protection act limits the disclosure of personally identifiable information regarding video rentals.
20. US introduced fair credit reporting act in 1970 A.D.

True / False [35]


1. The term ‘cyberspace’ was used by William Gibson in 1984 for the first time. True
2. The cyberspace describes the real world of computer. False
3. Cyber law does not deal with issues relating to telecommunications. False
4. Some common issues of cyber ethics are intellectual property right, privacy concerns and how computer affect society. True
5. The cyber law of Nepal has the provision of appellate judicial body to issue licenses of certification to the IT industry monitor
implementation of the act and regulate ICT activities. True
6. Cyber law is the set of moral principles that govern the behavior of a group or individual.
7. Cyber law is legal and regulatory framework in cyber space. False
8. Cyber law covers those areas including ICTS. True
9. Cyber law of Nepal commonly known as the Electronic and Digital Transaction Act-Ordinance was enacted in Nepal in 2061
B.S. True
10. “The Electronic Transaction and Digital Signature Act-Ordinance” is popularly known as “cyber law” of Nepal. True
11. The government of Nepal could not pass “The Electronic Transaction and Digital Signature Act-Ordinance”. False
12. Moral principles that regulate the use of computers are also explained in cyber law. False
13. Cyber ethics are moral principles that make aware to the computer users. [SLC 2064] [SLC 2065 S] True
14. Computers ethics refer the behavior and ways of thinking of computer users in situations where a choice can affect the dignity
and wellbeing of others. True
15. The copyright law makes it legal to produce extra copies of software for sale. False
16. Copy right law is one of the laws of cyber law. [U1] True
17. Copyright law is related to intellectual property law. True
18. Copyright includes inventions (patents), trademarks industrial designs and geographic indications of source. False
19. Copyright Act of 1992 provides access right to government to see any record of individual. False
20. The copyright act of 1992 imposed on entirely new body of requirements on the federal government handling of information
concerning individuals. False
21. Data protection law provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium.
False
22. Intellectual Property can be defined as the relationship between collection and dissemination of data, technology privacy, and
the legal and political issues surrounding them. False
https://seeqbasicomputer.blogspot.com/ 45 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
23. Intellectual property describes a wide variety of property created by musicians ,authors , artist, and inventors. True
24. Fair credit reporting act is a federal law enacted in 1970 to ensure confidentiality of consumer credit information held by
lenders and credit reporting agencies. True
25. Two possible reasons for cyber-crime are problems with moral vision and rationalization of the problem. True
26. Internet pornography is a type of cyber-crime. True
27. Cybercrime is a criminal activity involving the information technology infrastructure. True
28. Cybercrime refers any illegal act that involves a computer. True
29. Cybercrime is defined as any type of illegal activity that makes use of the internet, a private or public network, or an in-house
computer system. True
30. The digital signature allows the user to attach an original signature on the document of electronic records. False
31. Digital signature law provides a legal framework to facilitate and safeguard electronic transaction in the electronic medium.
True
32. The digital signature is simply a small block of data that is attached to documents you sign. True
33. Freedom of the information Act is a federal law passed by Congress in 1966 and became effective on 4 July 1967. True
34. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy
and so on, which invade our privacy and offend our senses. True
35. Information Technology (IT) provides a new shape to build a dynamic world. True
36. Cyber laundering is the transferring illegal items through the internet (such as encryption technology) that is banned in some
locations. False

Technical Terms [20]


1. The law that governs the legal issue of cyberspace. [SLC 2064] [SLC 2065] [SLC 2069 S] Cyber Law
2. The rules and regulation to systematize the computer related technology. [SLC 2065 S] Cyber Law
3. The law that controls cyber crimes (fraud, hacking). [SEE 2073] [SEE 2074] [SEE 2074 U] [SEE 2075 U]. Cyber Law
4. The moral principles that control cyber-crime. [SLC 2068 S] [SLC 2071] [SEE 2071 S]. Computer Ethics
5. Moral rules to be followed by computer and other professionals.[SLC 2066] Computer ethics
6. A person who steals the password or credit card number of Internet users and make unauthorized access of it.
[SLC 2070] [SLC 2072]. Hacker
7. The activity of breaking into a computer system to gain an unauthorized access. Hacking
8. A computer user who attempts to break into copyright protected software or an information system. Cracker
9. Illegal activities committed through the use of computer and Internet. [SEE 2075] Cyber Crime
10. Committing crime using computer and Internet. [SEE 2075 S2] Cyber Crime
11. An electronic equivalent of a signature. Digital Signature
12. A mathematical scheme for demonstrating the authenticity of a digital message or document. Digital Signature
13. A security mechanism used on the internet that relies on two keys, one public and one private. Digital Signature
14. The rights granted to creator and owners of the works that are the result of the human intellectual creativity.
Intellectual Property Law
15. Law that prevents illegal copying. Copyright Law
16. Software that do not come from reliable sources. Pirated Software
17. The unauthorized duplication and use of computer software. Software Piracy
18. Transferring illegal item through the internet (such as encryption technology) that is banned in some locations.
Cyber Contraband
19. The electronic transfer of monies with the goal of hiding its source and possibility its destination. [SQE 2074K]
Cyber Laundering.
20. The protection of creations of the mind, which have both a moral and a commercial value. Intellectual Property Law
21. The repeated acts of harassment or threatening the victim by using internet services like e-mail. Cyber Stalking
22. Virtual space created by computer networks, internet to make communication. Cyber Space

https://seeqbasicomputer.blogspot.com/ 46 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Ms-Access

Questions and Answers [55]


1. Database [SEE 2074] [SEE 2073] [SEE 2073 U] [SLC 2072] [SEE 2071 S] [SLC 2064] [SLC 2065]
A database is an organized collection of related information that can be used for different purpose so that it can
easily be accessed, managed, and updated.
E.g. Dictionary, Marks Ledger, Telephone Directory etc.

2. Electronic Database [SQE 2075K]


An electronic database refers to an organized collection of data stored in a computer in such a way that its content
can be easily accessed.

3. Computerized Database [SQE 2075K]


a) It can store large volume of data. It is very fast to find a specific record.
b) Data can be sorted into ascending or descending order on multiple criteria.
c) The database can be kept secure by use of passwords.
d) We can search data very easily.
e) Modification is very easy in comparison of manual database.

4. Non-Computerized Database
It is limited by physical storage available.
It can take a while to manually search through all of the records.
Difficult to sort data on more than one criteria.
The only security would be locking up the records.

5. Data [SEE 2073] [SLC 2064] [SLC 2070] [[SLC 2065 S] [SLC 2069 S]
Data can be numbers, letters or symbols representing facts and figures which may or may not give any sense.
E.g.: Ram, student, 20, etc.

6. Information [SLC 2070]


Information is an organized collection of related data, which gives a complete sense.
“Ram is a student. He is 20 years old.”, is information that gives a complete sense.

7. DBMS (Database Management System) [SEE 2075 U] [SEE 2074 U] [SLC 2066] [SLC 2067] [SLC 2067 S]
[SLC 2069 S] [SQC 2075K]
DBMS is a software which helps to extract, view and manipulate data in an organized way.
In DBMS, data can be accessed, managed and updated easily.
E.g.: MS-Access, Oracle, Fox pro, Dbase etc.

8. RDBMS (Relational Database Management System) [SQE 2074]


RDBMS is a database management system that is based on the relation model in which data is stored in the form
of tables and the relationship among the data is also stored in the form of tables.
E.g.: SQL, MS-Access, Oracle, etc.

9. Importance / Advantages of DBMS / Computerized database [SEE 2075] [SLC 2071]


a) It controls data redundancy which means duplication of data.
b) It allows sharing the existing data by different programs.
c) Large volume of data can be stored and updated easily.
d) It provides high security of data as well as maintains accurate database.

https://seeqbasicomputer.blogspot.com/ 47 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
10. MS-Access
MS-Access is a relational database management system developed by Microsoft Corporation which is used to
store and manipulates large volume of data in the form of table.

11. Features of MS-Access


a) It provides the flexible ways to add, edit, delete and display the related data.
b) Queries help to view, change and analyse the data indifferent ways.
c) Forms are used for viewing and editing the information.
d) Reports are used for summarizing and printing the data.

12. Objects of MS-Access [SEE 2074 U] [SLC 2071]


a) Table b) Form c) Query d) Report

13. Define table.


Table is an object of Ms-Access that stores large volume of data in the form of rows and columns.
The different ways to create table are:
i) Design view
ii) Using wizard
iii) Entering data

14. Importance of table


a) Different properties of a field can be set in a table.
b) It provides options for primary key which helps to make data consistent.

15. Form [SEE 2073 U] [SLC 2064] [SLC 2066] [SLC 2068] [SLC 2065 S] [SLC 2069 S] [SQE 2075K]
[SQE 2074]
Form is an object of Ms-Access which provides graphical interface to enter data into the tables or multiple linked
tables.
Forms are usually displayed on the screen.
Forms generally provide a detailed took at records and usually for the people who actually work with the database.
Methods to create a form are:
i) By using auto forms features.
ii) By using the form wizard features.
iii) By using your own in design view.

16. Importance / Function / Advantages of form [SEE 2075] [SLC 2064] [SLC 2066] [SLC 2065 S]
[SLC 2070 S] [SQE 2074]
a) It provides an interactive platform for input of data into the database.
b) It helps to display data in more presentable form than a datasheet.
c) It gives a separate platform to handle data.

17. Query [SEE 2075 U] [SEE 2075 S2] [SLC 2072] [SLC 2065] [SLC 2069] [SEE 2066 S] [SLC 2068 S]
[MM 2076] [PMT 2075K]
Query is an object of Ms-Access which extracts and arranges information from a table in a manner that is
specified.
The different types of query are:
i) Select query
ii) Action query
In action query, we have update query, append query, delete query and make-table query.

18. Advantages of query [SLC 2065]


a) We can filer, perform calculations and summarize data.
b) Large volume of records can be updated or deleted at a same time.
c) It retrieves and display records including some fields or all the fields of a table or multiple linked tables.

https://seeqbasicomputer.blogspot.com/ 48 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
19. Purposes of query in MS-Access [PMT 2075K]
a) To view records including some fields or all the fields of a table or multiple linked tables.
b) To perform mathematical calculation of a data.
c) To sort the records on the basis of one or more key fields.
d) To perform mass update, delete or append new records to a table.

20. Select query


A select query is the most common category and is used for extracting specific information from one or more
tables in a database. It cannot make changes in tales.
We use select query to group records and perform calculations on field values in the groups such as sum, count,
average, minimum and maximum.

21. Action query


Action query is a query which makes changes to many records in just one operation.

22. Update query


Update query is a type of action query which make global changes to a group of records in one or more tables.

23. Append query


The use of append query is to add a group of records at the end from one or more tables. It can do changes in
tables by update, append.

24. Report [SEE 2074 U] [SEE 2071 S] [SLC 2070] [SLC 2067 S]
Report is an object of Ms-Access which displays the output in an effective way to present the data in a printed
format.
Reports can be previewed on the screen, but they are usually printed.
Reports are often used to group and summarize data, and are often for the people who don’t work with the
database but who use its information for other business task.
The data sources for report are table and query.
The methods of creating report are:
i) Using design view
ii) Using report wizard

25. Why is Report created? [SEE 2075 U] [SLC 2067]


Report is created to print documents according to user’s specifications of the summarized information through
query or table.

26. Importance of report [SEE 2071 S] [SLC 2070] [SLC 2067 S]


a) It helps to prepare well formatted output.
b) It displays the information the way we want to view it.
c) It presents the information retrieved through queries or tables.
d) It presents the information in designed layouts by adding necessary titles, setting font colour or font size, etc.

27. What are the advantages of form over table?


Ans: The advantages of form over a table are:
i) It allows to design the layout of field on screen in any arrangement.
ii) It shows only the information we want to see.
iii) It can display one complete record at a time.

28. Data type [SEE 2075 S2] [SEE 2074] [SEE 2073] [SLC 2072] [SLC 2064] [SLC 2066] [SLC 2070]
Data type is an attribute for a field that determines what type of data it can contain.
Any four data types of MS-Access are:
i) Text
ii) Number
iii) Memo
iv) Currency

https://seeqbasicomputer.blogspot.com/ 49 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
29. While designing table structure which data types are suitable to store information about teacher’s name,
address, salary and date of birth. [SLC 2065] [SLC 2068 S]
Teacher’s name - Text
Address – Text
Salary – Currency
Date of birth – Date/Time

30. Identify a record, field and value from the following table structure. [SQE 2074]
Roll Name Marks
1 Kopila 87
2 Rabin Rana 56
Ans: Record = 1 Kopila 87, 2 Prabin Rana 56
Field = Roll, Name, Marks
Value = 87, 56

31. What happens when we enter text in a numeric field?


Ans: If we enter text in a numeric field then it displays the errors.

32. Text
It is used for storing text or combination of text and numbers. It can store up to 255 characters.

33. Memo
It is used for storing lengthy text and numbers. It can store up to 65,535 characters.

34. Field properties


The four types of field properties of MS-Access are:
i) Caption ii) Format iii) Validation rule iv) Input mask

35. Input mask


Input mask is a field property that controls the value of a record and sets in a specific format.

36. Caption
Caption is a field property which displays an alternate name for the field to make the field name more explanatory.
It can contain up to 2048 characters.

37. Validation rule:


A field property which enables to limit values that can be accepted into a field is known as validation rule.

38. Validation text


A field property which allows type text to be displayed if the user input value is prohibited by the validation rule
is known as validation text.

39. Field size


Field size is a field property that specifies the maximum number of characters allowed in the field.

40. Format
The use of ‘Format’ field property is to display data in a different format.

41. Lookup Wizard


The use of Lookup Wizard is that it creates a field that allows choosing a value from another table or from a list of
values by using a list box or combo box.
42. Hyperlink
The use of Hyperlink is that it stores hyper like addresses like email addresses, websites, database objects or other field.

https://seeqbasicomputer.blogspot.com/ 50 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

43. Indexing
Indexing is one of the important properties of database that speed up searching and storing of records using on the
field.

44. Relationship
Relationship is an association among several entities (table). Its types are:
i)One to one relationship
ii)One to many relationship
iii)Many to many relationship

45. Referential integrity


Referential integrity is a set of rules used by RDBMS to make sure that the relationships between tables are valid
and that the related data is not accidentally changed or deleted.

46. Record [SEE 2075 S2]


Record is complete set of information. Record is a collection of multiple related fields in a row which gives
complete information about a person or thing. E.g.: Ram Chabahil 4468790

47. Field [SEE 2075 S2]


Field is a small unit of information. A column in a table is called field, and it contains a specific piece of
information within a record. E.g.: Name, Address, Telephone

48. Sorting [SEE 2073 U] [SLC 2068]


Sorting is the process of arranging the record in ascending or descending order according to a given field or fields.
Sorted data is easier to handle than unsorted data. The advantages of sorting are:
i) It helps to find specific information quickly.
ii) It helps to arrange data in alphabetical order.
49. Filtering
Filtering is an option that selects the required records and displays the result.
Primary key [SEE 2075] [SEE 2073] [SEE 2071 S] [SLC 2067] [MM 2076] [PMT 2075K]
A key that uniquely identifies each record in a database is primary key. It is needed because it neither accepts
duplicate values now null values.
50. Uses of Primary key [SLC 2069]
i) To reduce and control duplication of record in a table.
ii) To set the relationship between tables.
51. Purpose of Primary key [PMT 2075K]
A primary key prevents duplicate records from being entered in the table and is used to control the order in which
records display in the table. This makes it faster for databases to locate records in the table and to process other
operations. The primary key is also used to create a link between tables in a database.

52. Importance of Primary Key [SEE 2073] [SLC 2069 S] [MM 2076]
a) It does not allow duplicate data.
b) It does not allow null value
53. Composite key
The group of primary key that consists of two or more attributes is called composite key.
54. Foreign Key
Foreign key is a unique field or combination of fields in linked table whose value matches with a primary key in
another table.
55. Data Redundancy [SEE 2074]
Data redundancy means repetition of same piece of data in a database in more than one location.. Data redundancy
can be controlled in MS-Access by normalization of database.

https://seeqbasicomputer.blogspot.com/ 51 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
MCQ (Multiple Choice Questions) [80]
1. Database is a
i.tool of editing documents ii. way to automate common tasks
iii. collection of related information
2. A (n) ____________________ is an organized collection of the related information.
Object database Property document
3. Which is the database?
Data of SLC Exam Oracle MS-Access Excel
4. A database is the collection of __________[PMT 2075]
i. Hardware ii. Software iii. Record iv. None of these
5. Which is not the database?
i. Phone diary ii. Mark ledger iii. Attendance Register iv. Report Card
6. Which is the example of Relational Database Management System?
i.Oracle ii.FoxBASE iii.Sybase iv.FoxPro
7. __________ is a Database Management System.
DBase MSAV EXCEL All of above
8. Ms-Access is a ............ software. [SEE 2075 S2]
(i) Word processing (ii) DBMS (iii) Spreadsheet (iv) Web
9. MS-Access is a
DBMS RDBMS Database Metabase
10. MS-Access is used to create _____________.
Database DBMS Record Table
11. ___________ is not DBMS.
Oracle dBase FoxPro Paint
12. Which is an example of database? [SLC 2064]
DBase MS-Access Telephone Directory All
13. …………… is the DBMS. [SLC 2065]
i) Fox-Pro ii) MS-Excel iii) Lotus-123 iv) All of the above
14. Which of the following is database application? [SLC 2070]
i) MS-Word ii) MS-Access iii) MS-Excel iv) QBASIC
15. Which of the following is not a database application? [SLC 2069]
i) Oracle ii) Foxpro iii) MS-Access iv) MS-Excel
16. MS-Access is a ------------ software.
i. Utility ii. Application iii. System iv. None of the above.
17. Which is DBMS?
i. Database ii. Metabase iii. dBase iv. MS-Excel.
18. A Database Management System can be used to .
i. retrieve information ii. search information iii. sort information iv. all of the above
19. ___________________ is a set of rules used by Access to ensure that the relationships between tables are valid
and that the related data is not accidentally changed or deleted.
Relationship Referential integrity Query Forms
20. What is extension of access database? (MS-Access 2003 version) [SLC 2066]
DBF MDB MBD DBM
21. _____ is the table design creating option to create custom table design.
Datasheet Design view Wizard Link Table
22. _____ is a data type used for lengthy text and numbers
Text Long Text OLE Object Memo
23. A field name can be up to _____ characters long. [MM 2076]
40 46 64 2048
24. Data type that requires 8 bytes of storage.
Yes/No Currency Long Integer All of them
25. Memory space consumed by a currency data type maximally is …………[SLC 2069]
i) 2 bytes ii) 4 bytes iii) 8 bytes iv) 1 GB
https://seeqbasicomputer.blogspot.com/ 52 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
26. The data type appropriate to store salary is: [SLC 2067]
i)Memo ii)Currency iii)Text iv) Auto number
27. The name of caption can be declared up to _____ characters.
1024 2024 2048 2005
28. Memory space used by a auto number data type is _____
1 Byte 2 Bytes 4 Bytes 8 Bytes
29. What is the default size of Access?
(i) 10 (ii) 20 (iii) 30 (iv) 50
30. Date/Time occupies ………. bytes of memory. [SLC 2066] [SLC 2067] [MM 2076] [PMT 2075]
i) 4 ii) 2 iii) 8 iv) 16
31. The maximum size of text field in MS-Access is …………. [SLC 2068 S] [SLC 2070]
i) 50 ii) 10 iii) 6400 iv) 255
32. Format symbol that converts all characters to uppercase.
@ & < >
33. …………… is not the data type of MS-Access. [SLC 2065] [SLC 2068]
i) Number ii) Text iii) Memo iv) Form
34. The logical field data type of MS-Access is______________ [SLC 2064]
i. Yes/No ii. True/False iii. On/Off iv. All of the above.
35. The field size of logical field data type is __________ in MS-Access.
i. 1 bit ii. 1 byte iii. 2 bytes iv. 2 bits
36. Which data type consumes the least storage space? [SEE 2074]
(i) Text (ii) Yes/No (iii) OLE object (iv) Memo
37. Which of the following data type is appropriate to store gender of person in terms M or F?
i. Memo ii. Currency iii. Yes no iv. Auto number
38. The default data type of MS-Access is: [SLC 2068 S] [SLC 2069] [SEE 2074] [SQE 2074K]
i) Number ii)Text iii) Memo iv) Auto number
39. The default field size of “AutoNumber” data type is [SEE 2075 S2] .
i. Byte ii. Integer iii. Long Integer iv. Long Integer
40. Which is the subtypes for the number data type?
Hyperlink Bit Index Integer
41. Which is the subtype of number data type?
i. Integer ii. Byte iii. Single iv. All of the above.
42. Number field is used for storing only _______________.
Number Text and Number Number and Time Number and Year
43. The datatype which is used for only integer value.
i.text ii.currency iii.number iv.OLE
44. Which is not MS-Access object? [SQE 2074K]
a) Form b) Query c) Caption d) Table
45. Which of the following is not a Microsoft Access database object? [PMT 2075]
i. Tables ii. Queries iii. Forms iv. Sorting
46. Which of them is not a data type?
Memo Yes/No Time/Date Caption
47. Which of the following is not a data type?
i. Picture ii.date/time iii.text iv.number
48. Which of the following is not the data type used in MS-Access?
i. Date/Time ii. Counter iii. Hyperlink iv. Caption
49. Which of the following is not a data type in Microsoft Access?
i. Text ii. Currency iii. Hypertext iv. Date/Time
50. What field type is used to store picture in a table?
i.memo ii.OLE iii.hyperlink iv.None
51. Which is suitable data type to store video? [SLC 2070] [SEE 2073]
i) Text ii) Number iii) Hyperlink iv) OLE object
https://seeqbasicomputer.blogspot.com/ 53 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
52. The data type appropriate to store address is .
i. Memo ii. Currency iii. Text iv. Auto number
53. What kind of data is kept in memo field?
(i) Hyperlink (ii) Software (iii) Data (iv) Pictures
54. What kind of data are kept in memo field?
i.Name of Student ii.Students phone number iii.Students Bio data iv.Students picture
55. Which specifies the expression that checks the invalid data? [MM 2076]
Validation Rule Validation Text Input Mask Required
56. _____ is not a field property of MS-Access.
Caption Index Color Format
57. …………… defines a standard pattern for the appearance of all data entered in the field
i.format ii.input mask iii.default value
58. A field property that limits the data to be entered in a field is___________
i. Validation Rule ii. Format iii. Input Mask iv. Indexed
59. The maximum number of characters that can be stored in a field is determined by_
i. Field Type ii. Field Size iii. Field Length iv. Field width
60. Field size, format, input mask, caption and default values are: [SQE 2074K]
Key elements field properties Navigating modes data types
61. The primary key contains _____ value.
Null No Null Number Auto number
62. The _________________ key uniquely identifies each record. [SLC 2066]
Primary database Object premier
63. Primary key does not accept …………… [SLC 2064] [SLC 2065] [SLC 2068] [SEE 2074] [SQE 2074K]
i) Text ii) Number iii) Null value iv) None of the above
64. In MS-Access data are stored in ……………… [SLC 2068]
i) Form ii) Query iii) Table iv) All of the above
65. Form is designed for
i. filters data ii. Sort data iii. Print data iv. Modify data
66. Which component of MS-Access is used to enter data? [SLC 2065]
i. Query ii. Forms iii. Report iv. Both (i) and (ii)
67. Which component of MS-ACCESS does not allow entering data? [SLC 2064]
i. Table ii. Query iii. Form iv. None of them
68. Query is used to
i. retrieves data from database ii. Create table in database iii. Print database iv. All
69. …………….. query changes value in main table. [SLC 2068 S]
i) Select ii) Update iii) Both (i) &(ii) iv) None of the above
70. Which is not a type of query? [SLC 2067] [SEE 2073]
i) Search ii) Select iii) Update iv)All of the above
71. Report can be generated by using data from …………[SLC 2068 S]
i) Table ii) Query iii) Forms iv) Both (i) &(ii)
72. ……………….. object of access is used to print formatted data. [SLC 2068] [SEE 2073]
i) Query ii) Form iii) Report iv) Table
73. The object of MS-Access that is used to generate hard copy of records. [SLC 2066]
i) Query ii) Table iii) Form iv) Report

74. __________allows MS-Access to query and sort record faster. [SEE 2075 S2]
i. Sorting ii. Editing iii. Filtering iv. Indexing
75. A collection of records for a single subject, such as all of the customer records. [PMT 2075]
i. Field ii. Record iii. Table iv. Data
76. Collecting multiple related fields is called: [SLC 2067]
i) Records ii)Table iii) Forms iv)Query

https://seeqbasicomputer.blogspot.com/ 54 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
77. Record of the table is also knows as ...... [SEE 2075 S2]
(i) Tuple (ii) Field (iii) Text (iv) All
78. A field is also known as [MM 2076]
i.records ii. column iii.Database iv.entity
79. Row is also called …………[SLC 2069] [SEE 2074]
i) Record ii) Field iii) Database iv) Table
80. The columns in database tables are called: [SLC 2070] [SEE 2073]
i) Record ii) Field iii) Report iv) Memo

Fill in the Blanks [35]


1. Database is an organized collection of related data in tabular form.
2. A collection of related data of a person or anything is known as database.
3. DBMS is a general program designed to manage a database.
4. DBMS is a complex set of software program that controls the organization, storage, management, retrieval of data
in database.
5. Ms-Access is a relational database management system where data is arranged in the form of tables .
6. Data is the raw facts to generate information.
7. Information is the processed value which we get after we get after processing by the computer.
8. SQL stands for structured query language.
9. A primary key cannot contain the null values.
10. A primary key is a fixed field which uniquely identifies every record in a table.
11. You cannot enter duplicate values in a primary field.
12. Foreign key is the linking field between two values.
13. A combination of two or more keys which can be used as a primary key is called a composite key.
14. A text data type allows the field to contain up to 255characters.
15. The default field size for text type is 50 characters.
16. Memo field can hold 65535 characters.
17. Maximum width of field is 64 characters.
18. An input mask is the format we will assign for the introduction of values into a field.
19. The default value property is used to define a default value that is automatically entered in field when you add a
new record, at o time of data entry.
20. Filtering allows you to retrieve specific information from a table in Microsoft Access 2003.
21. A column in a table is called field and row in a table is called record.
22. The smallest unit of data organization is called a field.
23. Auto number field type automatically enters number in a field which increase by one for every new record.
24. We can change data type of field in table design view.
25. Validation rule is used to make sure that the data entered in a field is within the criteria set by the user.
26. A table contains records and field.
27. Query help us to retrieve and view only those records from the database tables that meet a specific condition or
criteria set by us.
28. A query is a database object that creates a datasheet of selected fields and records from one or more tables.
29. A query extracts and arranges information from a table in a manner that you specify.
30. Action query is used to change record in a table at a single operation.
31. Delete query is used to delete records from the table.
32. Query that makes changes in table is called update query
33. A form is a database object used primarily to display records on screen, to make it easier to enter new records and
to make changes to the existing records.
34. The report design View window is the place where you design reports from a scratch or add your own touches to
reports you create with the report wizard.
35. Report enables you to format your data in an attracting and informative layout for printing.
https://seeqbasicomputer.blogspot.com/ 55 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
True / False [100]
1. A database can be managed manually. True
2. DBMS is application software. True
3. Microsoft Access is a Relational Database Management System. True
4. A database file of MS-Access can have only one table. False
5. The extension of MS-Access database file is MDB. True
6. DBMS is word processing software. False
7. Default data type of MS-Access is a number. False
8. MS-ACCESS is spread-sheet software. [SLC 2065 S] False
9. MS-Access is not a spreadsheet software. [SLC 2071 S] True
10. The extension of database file created by MS-Access is .BDF. [SLC 2066 S] False
11. MS-Access is not spreadsheet software. [SLC 2067 S] True
12. A database can contain multiple tables. [SLC 2069 S]True
13. MS-Access is DBMS software. [SLC 2072] True
14. A field name refers to the category of information about a subject. True
15. Field names are used to define properties for a database. False
16. A field name can be upto 255 characters long. [SQE 2075K] False
17. You cannot delete a field in a database once they have been defined. False
18. Removing a primary key does not delete a field. True
19. The data in primary key field need to be unique and not null. [SLC 2065 S] [SLC 2072] True
20. The primary key is an optional field in MS-Access table. True
21. The primary key in a table is a field that contains information unique to the records. True
22. The primary key field of a table allows the duplication of data. False
23. Primary key field may contain the same value in two records. False
24. Primary key does not accept null value. [SLC 2066 S] True
25. The primary key field can also be left empty. [SLC 2067 S] True
26. Primary key field can accept duplicate values . [SEE 2075 U] False
27. Primary key accepts null value. [SEE 2074 U] [SLC 2071 S] False
28. Many related fields makeup a record and many records makeup table. True
29. A query is used to select fields and records from one or more tables. [SLC 2065 S] True
30. Queries are used to display records onscreen to make them easier to enter new records and to make change in existing
records. False
31. A select query retrieve data from one or more tables using criteria you specify. True
32. An action query makes changes in a table. [SLC 2071] [SEE 2074 U] True
33. A query is used to select fields and records from only one table. [SLC 2072] False
34. Update Query does not change the data of table. [SLC 2070 S] False
35. A query is used to select fields and records from many tables. [SLC 2065 S] [SLC 2067 S] True
36. A query is database object that creates a datasheet of selected fields and records from one or more tables. True
37. A query cannot be the source for a form. False
38. Query can be used to apply mathematical calculations in the table.
39. Queries are used to display records onscreen to make them easier to enter new records and to make change in existing
records. False
40. A query is a collection of related data stored in an organized manner. False
41. A query can be created without tables. False
42. Query allows viewing the desired records only. False
43. Select query is used to retrieve and display records from the selected table. [SEE 2075] True
44. Database has been being used knowingly or unknowingly in our daily life. True
45. The maximum field size of text field is 255 characters. [SEE 2075 U] True
46. Pictures and graphics cannot be stored in the table in MS Access 2007. False
47. A form is an object of MS-Access used for entering data. [SLC 2071] True
48. A form allows displaying one complete information at once. True
49. We can make the form as the source of table. False
50. Form allows you to select specific data from one or more tables. False
51. Form is a graphical interface through which data can be printed or displayed is specified format. False
52. Report is used to enter the data into the table in MS-Access 2007. False
53. A report can be used to modify data of a table. False
54. Report is used to prepare database for final printing. True
55. A report can be used to delete record from a table. False
56. Report is a database object used to print final report. [SEE 2073 U] True
57. Index makes sort process fast. [SLC 2070 S]True
58. Index increases the speed of the query and sort operations. [SLC 2067 S] [SLC 2071 S] True

https://seeqbasicomputer.blogspot.com/ 56 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
59. Index decreases the speed of the query and sort operations. [SLC 2065 S] [SLC 2072] False
60. Indexing is the process of arranging the records in ascending or descending order. [SEE 2075] False
61. Arranging all the records in a table either ascending or descending order is known as filtering. [SEE 2073 U] False
62. Indexed field property speeds up searching and sorting of records based on a field. True
63. A row in a table is known as record. [SLC 2069 S]True
64. Collecting multiple related fields is called report.[ SQE 2075K] [False]
65. A row in a table is called field and it contains a specific piece of informarion within a record. False
66. Column is also called field [SEE 2075 U]. True
67. Lookup Wizard is a tool that automates many database tasks. True
68. Money is a data type used in MS-Access. [SEE 2073 U] False
69. Table is not the data type of MS-Access. [SLC 2071 S] True
70. Default field size of text type of data is 65535 characters. False
71. Date/Time type of data requires 8 bytes of memory. True
72. The size of currency data type is 10 Bytes. [SEE 2075] False
73. FORMAT property allows us to delete data from database. False
74. Subtype of number data type is integer. True
75. Deleting a field does not delete data in the field. False
76. Validation rule is used to specify whether a value is required in a field. True
77. Validation rule specifies the expression that checks the invalid data. True[ SQE 2075K]
78. Validation rule will limit data entry. [SEE 2075] True
79. You cannot insert any field after entering data in the table. False
80. Logical field has the size 2. False
81. The information can be used as data for the further processing. True
82. The Auto Number data type generates random number automatically whenever a new record is added to a table. False
83. We cannot change data type of a field. False
84. Memo field is used to store long information beyond of the text. True
85. Yes/No Logical field stores one bit of data. True
86. OLE is the data type of MS Access. [SQE 2075K] True
87. Logical value can also be stored in database. True
88. A field can’t be declared with data type. True
89. Hyperlink field type in used to store photographs. False
90. Data validation enables you to limit the values that can be accepted into a field. True
91. A default value is one that is not displayed automatically for the field into a field. False
92. The data filter selects the required records and displays the result. True
93. Memo data type cannot be indexed. [SLC 2066 S] True
94. The default size of text data type is 50. [SLC 2066 S] True
95. Text is and object of MS-Access. [SEE 2075 U] False
96. Default text field size is of 255 characters. [SLC 2069 S] False
97. Data like sound and pictures are held by memo data type. [SLC 2069 S] False
98. Auto number data type is used to store data supplied by us. [SLC 2070 S] False
99. Auto Number Data consumed 2 bytes of memory space. [SEE 2075 U] False
100. Maximum data size of an auto number is 4 bytes. [SEE 2073 U] True
101. Formatted document is also called report. [SLC 2070 S] True
102. Graphics can also be stored in MS-Access database. [SLC 2071] [SEE 2074 U]True
103. Maximum field size of memo field is 256 characters. [SLC 2071] False

https://seeqbasicomputer.blogspot.com/ 57 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Match the following – MS Access [30]
1. [SLC 2065 S] 2. [SLC 2066]
a) MS-ACCESS (d) analyze and present data in a a) Default value (c) 255 Characters
printed format
b) Data update (b) Query b) Fox Pro (d) Column Name
c) Field (c) a piece of information related to c) Text (b) DBMS
someone or something
d) Report (a) Database management software d) Field (a)Field Properties
(-) collection of related fields (-) Search fast

3. [SLC 2066 S] 4. [SLC 2067]


a) OLE (d) Formatted output a) OLE (d)Report
b) Primary key (c) Interface b) Data entry (a) Picture
c) Form (-) 64,000 characters c) Indexing (-) Table
d) Report (b) Unique Field d) Formatted printout (c)Fast searching
(a) Picture (b)Form

5. [SLC 2067 S] 6. [SLC 2068]


a) MS-Access (d) DATA entry and editing interface a) Indexing (c) Limits the value

b) Query (-) Electronic Spreadsheet software b) Report (d) Data type

c) Record (b) Tool to retrieve data from one or c) Validation (-) Error messages
more than one tables Rule
d) Form (a) Data base management software d) Hyper (b) Final output
link
(c) Collection of related fields (a) Search fast

7. [SLC 2068 S] 8. [SLC 2069]


a) Indexing data (d) Retrieves data conditionally a) OLE (d) Data Entry
b) Long Text (c) DBMS b) Hyperlink (c) Formatted Hardcopy
c) Fox Pro (b) Memo field c) Report (a) 1 GB
d) Query (a) Searching fast d) Form (-) Up to 255 characters
(-) Report (b) Up to 2048 characters

9. [SLC 2069 S] 10. [SLC 2070]


a) Report (b) Data type a) Indexing Data (d) Size upto 1 GB
b) Currency (d) Column b) Form (c) Column of datasheet
c) Long Text (a) Database object c) Field (-) Row on a datasheet
d) Field (-) Record d) OLE object (a) Searching Fast
(c) Memo (b) Graphical interface for
data entry
11. [SLC 2070 S] 12. [SLC 2071]
a) dBASE (c)OLE a) Indexing data (b)Final output
b) Primary key (d)Memo b) Report (d)View data
c) Photo (a)DBMS c) Yes/No (a)Searching fast
d) Long text (b)Uniquely defined d) Select query (-)Picture
()Hyper links (c)Data type
13. [SLC 2072] 14. [SLC 2065] [SEE 2073]
a) OLE (c) Data Entry a) Query (d) Printed format
b) Validation Rule (-) Stores data b) Form (c) Stores data
c) Form (b) Limits the value c) Table b) Allows view, edit, input data
d) Indexing (a) Data type d) Report (a) Extracts selected record for view
(d) Easy to search (-) DBMS
15. [SEE 2074] 16. [SEE 2075 U]
a) Data (b) Input, view, edit data a) Caption (d) Logical data type
b) Form (c) Formated output b) OLE (-) Error Message
c) Report (a) Collection of raw facts c) Data Redundancy (b) Picture
d) Table (-) Question to the database d) Yes/No (a) Label for field
(d) Stores data in database (c) Duplication of data
https://seeqbasicomputer.blogspot.com/ 58 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

17. 18.
a) Data redundancy (b)Error message a. Indexing data (a)Searching fast
b) Validation Text (c)Pattern of data in a field b. Long text (d)Caption
c) Input Mask (d)Limits the value c. FoxPro (b)Memo field
d) Validation Rule (a)Data duplication d. Label for a field (c)DBMS
19. 20.
a) Text (d)2048 characters a. Data type (b)Field property
b) Currency (a)up to 255 Characters b. Format (d)Relationship
c) Memo (b)8 Bytes c. Form (a)Memo
d) Hyperlink (c)0-65535 Characters d. One-to-one (c)Database Object
21. 22.
a) Data Integrity (c)No. of character can be a) Index (c)Tuple
entered
b) Automatic (d)Contains distinct value b) Data (d)software
redundancy
c) Field size (a)Validation Rule c) Record (a)easy to search

d) Primary key (b)Default value d) DBMS (b)repetition of data

23. 24.
a) Sort (d) mass change e) Number (d)50

b) Single (c)DBMS f) Yes/No (c)8 bytes


precision
c) FoxPro (a)Arranging data g) Currency (a)Long integer

d) Update (b)sub type of number h) Text (b)1 bit


query
25. [SEE 2075] 26. [SEE 2075 S2]
a) Yes / No b) 4 bytes a) Table d) Printed format
b) Long integer d) MS Access object b) Primary Key c) Allows viewing editing and
inputting data
c) OLE c) Picture c) Form b) uniquely defined
d) Report a) 1 bit d) Report a) stores data
8 bytes Extracts selected record for
view
27. [SEE 2074 U] 28. [SEE 2073 U] [SEE 2071 S]
a) Form b) Column on datasheet a) Ms-Access d) data entry and editing
interface
b) Field c) Data type b) Query - electronic spreadsheet
software
c) Currency a) Graphical interface for c) Record b) tool to retrieve data from
data entry one or more tables.
d) Query - DBMS d) Form a) database management
software
d) Retrieves data c) collection of related fields
conditionally
29. [MM 2076] 30. [SQE 2075K]
a) Hyperlink d) Label for a field a) Query b) View data
b) Fox Pro a) Data type b) Report c) Relationship
c) Memo b) DBMS c) One to One d) Action query
d) Caption c) Long text d) Delete Query a) Extract selected data
Database software
31.[SQE 2074K] 32. [PMT 2075]
a) Show final output b) Form a) Data type b) Field property
b) Data Entry c) Design View b) Format d) Relationship
c) Change the table d) Field Properties c) Form Referential integrity
structure
d) Validation Rule a) Report d) One to one c) Database object
a) Memo
https://seeqbasicomputer.blogspot.com/ 59 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Full Forms [200]

1 NIC Network Interface Card


2 FTP File Transfer Protocol
3 POP Post Office Protocol
4 UTP Unshielded Twisted Pair
5 SMTP Simple Mail Transfer Protocol
6 URL Uniform Resource Locator
7 HTTP Hyper Text Transfer Protocol
8 WWW World Wide Web
9 MAN Metropolitan Area Network
10 UPS Uninterruptible Power Supply
11 VOIP Voice Over Internet Protocol
12 NOS Network Operating System
13 DVD Digital Versatile Disk
14 ISP Internet Service Provider
15 LAN Local Area Network
16 ADSL Asymmetric Digital Subscriber Line
17 ICT Information and Communication Technology
18 IRC Internet Relay Chat
19 PDF Portable Document Format
20 STP Shielded Twisted Pair
21 WAN Wide Area Network
22 ISDN Integrated Services Digital Network
23 MBR Master Boot Record
25 VSAT Very Small Aperture Terminal
26 TCP/IP Transmission Control Protocol/Internet Protocol
27 DNS Domain Name Service
28 TCP Transmission Control Protocol
29 WI-MAX Worldwide Interoperability for Microwave Access
30 WLAN Wireless Local Area Network
31 ARPA Advanced Research Projects Agency
32 BNC British Naval Connector
33 bps bits per second
34 CCTV Closed Circuit Television
35 CD-ROM Compact Disk Read Only Memory
36 CVT Constant Voltage Transformer
37 GPRS General Packet Radio Service
38 JPEG Joint Photographic Experts Group
39 MODEM Modulator Demodulator
40 MUK Multimedia Upgrade Kits
41 SIM Subscriber Identification Module
42 W3C World Wide Web Consortium
43 Wi-Fi Wireless Fidelity
44 ARP Address Resolution Protocol
45 ARPANET Advanced Research Projects Agency Network
46 ASCII American Standard Code for Information Interchange
47 AVG Anti-Virus Guard
48 BBS Bulletin Board System
49 bits binary digit
50 CAD Computer Aided Designing
51 CAL Computer Aided Learning
https://seeqbasicomputer.blogspot.com/ 60 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
52 CDMA Code Division Multiple Access
53 EMI Electro - Magnetic Interference
54 GIF Graphics Interchange Format
55 IAB Internet Architecture Board
56 IEEE Institute of Electrical and Electronics Engineers
57 MAC Media Access Control
58 NITC National Information Technology Centre
59 .ORG Organization
60 ANSI American National Standards Institute
61 ATM Automated Teller Machine
62 CAI Computer Aided Instruction
63 DDoS Distributed Denial of Service
64 EBCDIC Extended Binary Coded Decimal Interchange Code
65 FAQ Frequently Asked Questions
66 FM Frequency Modulation
67 Gbps Gigabits per second
68 GPL General Public License
69 IPX/SPX Internetwork Packet Exchange/ Sequenced Packet Exchange
70 ISOC Internet Society
71 Kbps Kilobits per second
72 MBPS Mega Bytes Per Second
73 MPEG Moving Picture Experts Group
74 MSAV Multistation Anti Virus
75 NAT Network Address Translation
76 NAV Norton Anti Virus
77 OS Operating System
78 PSTN Public Switched Telephone Network
79 SQL Structured Query Language
80 USB Universal Serial Bus
81 VHF Very High Frequency
82 VRML Virtual Reality Modeling Language
83 3D Third Dimension
84 3G Third Generation
85 4GL Fourth Generation Language
86 AC Alternating Current
87 AI Artificial Intelligence
88 AM Amplitude Modulation
89 AP Access Point
90 ARC Net Attached Resource Computer Network
91 AVI Audio Video Interleaved
92 BCC Blind Carbon Copy
93 B-ISDN Broadband Integrated Services Digital Network
94 Blog Web Log
95 BMP Bitmap
96 CAE Computer Aided Education
97 CAM Computer Aided Manufacturing
98 CAN Campus Area Network
99 CATV Cable Television
100 CAVE Cave Automatic Virtual Environment
101 CBL Computer Based Learning
102 CBT Computer Based Training
103 CCA Controller of Certification Authority
https://seeqbasicomputer.blogspot.com/ 61 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
104 CD-RW Compact DisK ReWritable
105 CMOS Complementary Metal-Oxide Semiconductor
106 COBOL Common Business Oriented Language
107 CRBT Caller Ring Back Tone
108 CSMA/CD Carrier Sense Multiple Access with Collision Detection
109 CSU/DSU Channel Service Unit / Data Service Unit
110 DARPA Defense Advanced Research Projects Agency
111 DBA Database Administrator
112 DBMS Database Management System
113 DHCP Dynamic Host Configuration Protocol
114 DIX Digital Intel Xerox
115 DOD Department Of Defense
116 DOS Disk Operating System
117 DTH Direct To Home
118 DVD-RW Digital Versatile Disk Rewritable
119 E-Commerce Electronic Commerce
120 EDI Electronic Document Interchange
121 E-Fax Electronic Fax
122 E-mail Electronic Mail
123 ETDSA Electronic Transaction and Digital Signature Act
124 FAT File Allocation Table
125 FAX Facsimile
126 FC Ferrule Connector
127 FCRA Fair Credit Reporting Act
128 FDDI Fiber Distributed Data Interface
129 FTTH Fiber To The Home
130 GSM Global System for Mobile Communications
131 HDD Hard Disk Drive
132 HTML Hyper Text Markup Language
133 HTTPS Hyper Text Transfer Protocol Secure
134 ICMP Internet Control Message Protocol
135 IE Internet Explorer
136 IESG Internet Engineering Steering Group
137 IETF Internet Engineering Task Force
138 IIS Internet Information Services
139 IMAP Internet Mail Access Protocol
140 INIC Internet Network Information Center
141 INTERNET International Network
142 IP Internet Protocol
143 IPR Intellectual Property Rights
144 IPX Internetwork Packet Exchange
145 IRTF Internet Research Task Force
146 IS Information System
147 ISA Industry Standard Architecture
148 ISO International Organization for Standardization
149 IT Information Technology
150 LCD Liquid Crystal Display
151 LED Light Emitting Diode
152 MIDI Musical Instrument Digital Interface
153 MILNet Military Network
154 MMS Multimedia Messaging Service
155 MOST Ministry of Science and Technology
https://seeqbasicomputer.blogspot.com/ 62 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
156 MoSTE Ministry of Science, Technology and Environment
157 MSAU MultiStation Access Unit
158 NetBEUI NetBIOS Extended User Interface
159 NETBIOS Network Basic Input/Output System
160 NITCC National Information Technology Co-ordination Committee
161 NITDC National Information Technology Development Committee
162 NSF National Science Foundation
163 NSFNet National Science Foundation Network
164 NTC Nepal Telecom
165 PAN Personal Area Network
166 PAT Port Address Translation
167 PCO Public Call Office
168 PIN Personal Identification Number
169 PKI Public Key Infrastructure
170 PM Phase Modulation
171 PSK Phase Shift Keying
172 PUK Personal Unlocking Key
173 RAM Random Access Memory
174 RDBMS Relational Database Management Software
175 RF Radio Frequency
176 RGB Red Green Blue
177 RIP Routing Information Protocol
178 RJ – 45 Registered Jack-45
179 ROM Read Only Memory
180 ROMBIOS Read Only Memory Basic Input Output System
181 SC Subscriber Connector
182 SDSL Symmetric Digital Subscriber line
183 SMA Screw Mounted Adapter
184 SMS Short Message Service
185 ST Straight Tip Connector
186 STD Subscriber Trunk Dialing
187 Telnet Telecommunication Network
188 UHF Ultra High Frequency
189 UNCITRAL United Nations Commission on International Trade Law
190 UseNet User Network
191 VIRUS Vital Information Resources Under Seize
192 VLAN Virtual Local Area Network
193 VMS Voice Messaging Service
194 VPN Virtual Private Network
195 VPPA Video Privacy Protection Act
196 VR Virtual Reality
197 WAIS Wide Area Information Server
198 WAP Wireless Application Protocol
199 WPA Wi-Fi Protected Access
200 XGA Extended Graphics Array

https://seeqbasicomputer.blogspot.com/ 63 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Match the Following – Fundamentals [50]

1. [SLC 2064] 2.
a) Radio Wave (d) Device to connect network a) NCSA Mosaic (d)Internet Protocol
having different technology
b) Cyber ethics (c) power protection device b) ARPA (e)Online shopping
c) Spike guard (-) internet c) WWW (b)Funded by US DOD
d) Gateway (b) professionally guided principles d) TCP/IP (c)Dr. Berners-Lee
(a) Wireless Media e) E-commerce (a)First web browser

3. [SLC 2065] 4. [SLC 2066]


a) Server (c) HTTP a) T-connector (b)Network device
b) Node (b) Work Station b) Bridge (d)Power protection
c) Protocol (a) Main Computer c) CD-ROM (a)Coaxial cable
d) Coaxial Cable (-) Repeater d) Spike Guard (c)Multimedia component
(d) Communication Media (-)Virus scanning

5. [SLC 2067] 6. [SLC 2068]


a) Satellite (-)Multimedia a) Microwave (c)Multimedia
b) HTTP (b)Protocol b) Volt guard (d)Protocol
c) Online business (a)Unguided media c) Sound card (a)Unguided media
d) Fiber optics (c)E-commerce d) TCP/IP (b)Power protection devices
(d)Guided media (-)Guided media

7. [SLC 2069] 8. [SLC 2070]


a) RJ-45 (d)Multimedia a) Combination of several (c)Guided Media
media
b) WAN (c)Duplicate copy b) POP (d)Power Protection Device
c) Back up (-)Fiber optic cable c) UTP (a)Multimedia
d) Microphone (a)Twisted pair cable d) UPS (b)Protocol used in e-mail
(b)Internet (-)CD-ROM

9. [SLC 2071] 10. [SLC 2065 S]


a) E-commerce (b)Power protection device a) McAfee (b)Supplies continuous power
b) Volt guard (a)Online shopping b) UPS (d)Internet protocol
c) Satellite link (c)WAN c) Web Browser (a)Antivirus software
d) Sound card (-)Optical fiber d) TCP/IP (c)Internet explorer
(d)Multimedia

11. [SLC 2066 S] 12. [SLC 2067 S]


a) Bandwidth (b)ISP a) Pictures in motions (c)Guided media
b) Internet (-)FAT b) TCP/IP (a)animation
c) Network (a)bps c) UTP (d)Random Access Memory
d) Software security (d)NAV d) Volatile memory (-)CD-ROM
(c)NIC (b)Protocol used in Internet

13. [SLC 2068 S] 14. [SLC 2069 S]


a) LAN (b)Within a city a) Sound card (d)WAN
b) MAN (d)Internet protocol b) Virus (c)Internet explorer
c) UPS (a)Within a room c) Web browser (a)Multimedia
d) IPX/SPX (c)Power supply device d) Satellite link (b)damage or corrupt data
(-)Between countries (-)Bridge

https://seeqbasicomputer.blogspot.com/ 64 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
15. [SLC 2070 S] 16. [SLC 2071 S]
a) TCP/IP (c)Multimedia a) Node a) Workstation
b) Back up (d)Web address b) Server d) HTTP
c) Sound card (b)Software security c) Coaxial cable c) Communication media
d) URL (a)Protocol d) Protocol b) Main computer
17. [SEE 2072] 18. [SEE 2073]
a) Microwave (c) Power protection device a) Malicious software (c) UPS
b) UTP (d) Protocol b) Primary storage device (a) virus
c) UPS (a) Unguided media c) Power protection device (d) copyright
d) SMTP (-) Internet d) Intellectual property law (b) RAM
(b) Guided media e) Malicious software (c) UPS
19. [SEE 2074] 20. [SEE 2075 Upgrade]
a) RJ 45 connector (b) Duplicate copy a) Microwave (d) Protocol
b) Back up (c) Multimedia b) UTP (c) Power protecting device
c) Microphone (a) Twisted pair cable c) UPS (a) Unguided media
d) Hub/switch (-) Ring Topology d) SMTP (-) Internet
(d) Star Topology (b) Guided media
21. [SEE 2075] 22. [U1]
a) Hub (c) Communication media a) LAN c) Software security
b) TCP/IP (a) Network connecting device b) Client/server d) Hardware security
c) UTP (d) Windows NT c) Back up a) Network type
d) NOS (b) Protocol d) Fire control b) Network architecture
e) Computer Virus

23. [SEE 2075 State 2] 24. [MFT 2075]


a) Backup (d) Online shopping Node Powerful computer
b) Microphone (a) Duplicate data Protocol d) Prevents gaining access
c) Web browser (-) Damage or corrupt data Scan disk c) Checking for disk error
d) E-commerce (b) Multimedia Firewall a) Workstation
(c) Display of web pages b) Rules for network
communication

25. [SEE 2074 Upgrade] 26. [PMT 2075]


a) BNC (d) Two way communication a) Microwave c) Multimedia
b) URL (b) Address of web page b) Web browser d) Protocol
c) Online business (a) Connector c) Sound card a) Unguided media
d) Duplex (c) E-commerce d) TCP/IP b) Microsoft Edge
(-) Protocol Guided Media

27. [SEE 2073 U] 28. [SQE 2074K]


a) Network services (d) Power protection device NOS d) Virus
b) Infrared (c) E-Banking Web Page c) Transmission Media
c) Internet services (b) Transmission media CAT- 5 b) Any pages of the web site
d) Volt Guard (a) File sharing Spyware a) Windows Server

29. [SQE 2075K] 30. [MFT 2076]


a) Animation b) The creation and manipulation a) WAN c) Twisted Pair cable
of picture images in the computer
b) Graphics d) A system that enables one or b) Protocol d) Coaxial cable
more users to move and react with
computer graphics
c) Multimedia a) The moving graphic images c) RJ45 a) Internet
d) VR c) The combination of different d) BNC b) HTTP
media
https://seeqbasicomputer.blogspot.com/ 65 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
31. 32. [MM 2076]
a) Coaxial Cable (c)RJ-45 a) Graphics c) Checking for disk error
b) Optical Fiber cable (a)BNC b) SMTP d) Prevents gaining access
c) Twisted Pair (b)ST c) Scandisk a) Still frame pictures
d) Telephone Wire (d)RJ-11 d) Firewall b) Network protocol
33.
a) Node (b)a network computer that utilizes the resources of other computer
b) Client (e)a set of rules by which computers communicate with each other over a network
c) Host (d)a self-sufficient computer that acts both as a server and a client(shares and uses resources
d) Peer (a)any network device that can connect to the network and can generate, process or transfer network
data
e) Protocol (c)the most powerful type of computer on the network, that does all the processing for the user

34.
a) TCP/IP (a)Addressing data, converting them into packets and Routing
b) FTP (d)Transfer mail and attachment on the network
c) POP (b)Transfer files between two computers
d) SMTP (c)Fetching mails from the mail server to a user’s computer

35.
a) E-mail (e)A private network within an organization
b) World Wide Web (c)The opening or main page of a website
c) Home Page (d)The buying and selling of goods and services on internet
d) Electronic commerce (b) The leading information – exchange service of the internet
e) Intranet (a)The exchange of computer-stored messages telecommunication

36. 37.
a) Usenet (b)Instant Chatting a) Internet (c)Service of internet
b) MSN (c)Remote Login b) HTTP (d)Internet Service provider

c) Telnet (d)Internet component c) Email (a)Networks of networks

d) Modem (a)Newsgroup d) ISP (b)Protocol


(-)Website (-)online chat

38. 39.
a) password (c)Duplicate copy of data a) Antivirus (d)Software that prevent gaining
access
b) Encryption (a)Secret word or phrase b) Scandisk (c)Arranging the scattered data
c) Backup (d)Authentication c) Defragmentation (b)Checking for disk error
d) Access Control (-)Rearrangement of fragmented d) Firewall (a)Software to remove malicious
file Programs
(b)Scrambled and unreadable form
of information

40. 41.
a) Hardware (-)Rewriting the files to contiguous a) Real player (b)Upgrade the PC
security sector
b) Software (c) Scattering the disk file over b) MUK (d)Headsets and data gloves
different locations
c) Fragmentation (d)Provide access to the computer c) Animation (a)Software to view multimedia
system content
d) Password (b)Antivirus d) Virtual reality (c)Cartoon on television
(a)Insurance policy (-)Multimedia component

https://seeqbasicomputer.blogspot.com/ 66 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
42. 43.
a) Backup (d)Software that destroys a) Hard Lock Key (c)Hardware Security
data
b) Password (c)Utility software b) Spike guard (a)Software security
c) Scan Disk (a)Copy of data c) Insurance (b)Power protection device
d) Computer virus (b)Allows the user to access d) Burlar alarm (-)Computer Security
system
(-)System Software (d)Prevents unauthorized
entrance

44. 45.
a) Boot sector virus (-) McAFee a) Boot virus (c)Cascade
b) File infecting virus (c) W97M.Melissa b) Parasitic virus (a)Disk Killer

c) Macro virus (a) stoned c) polymorphic virus (e)Whale


d) Polymorphic virus (e) Frodo d) Script viruse (d)I LOVE YOU

e) Stealth virus (b) Friday the 13th e) stealth virus (b)Jerusalem


(d) Involuntary

46. 47.
a) Edutainment (c) Components of a) Audio (b)Monitor
multimedia
b) Virtual Reality (d) Multimedia software b) Video (a)Speaker
c) Graphics (a) Multimedia in education c) Sound (d)Still frame pictures
Card
d) Adobe Photoshop (b) Simulated software d) Graphics (c)Recording and playing
sound
(-)Multimedia card

48.
a) Cyber stalking (c)Electronic transfer of illegally-obtained monies with the go with the goal of hiding its source and
possibly its destination
b) Phishing (e)The activity of breaking into a computer system to gain to unauthorized access
c) Cyber laundering (a)The use of communication technology, mainly the internet, to torture other individuals
d) Cyber Contraband (b)The act of attempting to acquire sensitive information like usernames, passwords and credit card
details by distinguishing as a trustworthy source
e) Hacking (d)Transferring illegal items through the internet (such as encryption technology) that is banned in some
locations.

49.
a) Hacking (c)The use of communication technology, mainly the Internet, to torture other individual.
b) Phishing (-)The computer program that can replicate themselves and harm the computer system on a network
(d)within the knowledge of the system users.
c) Cyber stalking (a)The activity of breaking into a computer system to gain an unauthorized access.
d) Computer viruses (e)This is one of the most serious frauds as it involved stealing money and obtaining other benefits
through the use of false identity.
e) Identity Theft (b)The act of attempting to acquire sensitive information like usernames, passwords, and credit card
details disguising as a trustworthy source.
50.
a) Digital Signature (b)Cyber crime a) Fair Credit reporting Act (d)1988
b) Forgery (a)Electronic security b) Copyright (g)Encryption and
system decryption
c) Encryptions (d)Cyber law c) Cyber law of Nepal (e)1992
d) Copy right (c)Locking message d) Video Privacy Protection (a)1970
Act
e) Copyright Act (c)2004
f) Federal Privacy Act (f)1974
g) Digital Signature (b)Intellectual property
https://seeqbasicomputer.blogspot.com/ 67 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Modular Programming
Questions and Answers [25]
1. Modular programming [SEE 2075 U] [SLC 2066] [SEE 2065 S] [MM 2076] [PMT 2075K]
Modular programming is a technique used to divide program into many small, manageable, logical and functional
modules or blocks.

2. Qbasic is called Modular Programming [MFT 2075] [SQE 2074K]


QBasic is called modular programming because it divides program into many small, manageable, logical and
functional modules or blocks.

3. Advantages of modular programming [SEE 2073 U] [MFT 2075] [SQE 2074K]


i) Different programmers can design different program modules independently, which is required in a large and
complex program.
ii) It is easy to design code and test the program modules independently.
iii) It is possible to use a single module in different places which reduces program codes.
4. Main module
The top level controlling section or the entry point in modular programming is called main module.

5. Sub module
Module is a block of statement that solves a particular problem. Sub module is a program which is written under
the main module. A program may have one or more sub modules under main module.

6. Procedure [SLC 2072] [SLC 2071] [SLC 2064] [SLC 2067] [SLC 2068 S] [SQE 2075K] [PMT 2075K]
Procedure is a block of statements that solves a particular program.
Procedure is a section of code which performs one or more specific tasks and can be accessed from remote
location.
There are two types of procedure – SUB Procedure and FUNCTION procedure

7. SUB procedure [SLC 2064] [SLC 2065] [SLC 2069 S] [MM 2076]
A SUB procedure is a small, logical and manageable functional part of program which prefers specific task and
does not return any value. SUB-procedure is called by CALL statement. SUB-procedure’s name does not accept
data type symbol because it does not need to return a value.

8. FUNCTION procedure [SLC 2064] [SLC 2065] [SLC 2069 S] [MM 2076]
A FUNCTION procedure is a small, logical and manageable functional part of a program which performs specific
task and returns single value to the main program or calling module. FUNCTION-procedure is called by statement
and expression method. FUNCTION-procedure’s name accepts data type symbols such as $, %, !, #, &, etc. and it
depends on the type of value to be returned. E.g.: FUNCTION REV$ returns string.

9. String function [SEE 2074 U]


String function is used with string it returns string value.

10. Numeric function [SEE 2074 U]


Numeric function is used with number it returns numeric value.

11. Library functions [SQE 2074K]


Library functions are built-in or readymade functions provided by QBASIC. E.g. MID$( ), LEN( ), SQR( ) etc.

12. User defined function [SLC 2066 S] [SQE 2074K]


Function which is defined by the user according to the need is called user defined function.
https://seeqbasicomputer.blogspot.com/ 68 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
13. Parameters [SEE 2074]
Parameters are variables that will receive data (arguments value) sent to the procedures (SUB program and
FUNCTION). Formal parameters are called parameter.
14. Arguments
Arguments are the values that are sent to the procedures (SUB program and FUNCTION). Actual or real
parameters are called arguments.
15. CALL statement [SLC 2071] [PMT 2075K]
The function of CALL statement is to transfer the control to another procedure.
16. DECLARE statement
The function of DECLARE statement is to declare procedure such as FUNCTION or SUB in modular
programming.
17. DIM SHARED statement
i) It makes variable accessible to all modules.
ii) It appears in main module/ program.
18. SHARED [SLC 2071]
It is used in the sub program to share the values of certain variables between main module and sub program
19. COMMON SHARED [SEE 2074 U]
It is used in the main program to share variable list between main module and all sub programs. This statement is
used to declared variable global.
20. Local Variable [SEE 2075 S2]
Variables which are declared inside the procedure are called local variables. Local variables are not visible to
other modules or functions. Its value is protected from outside interference and has no effect on the variables
outside the procedures. Local variable can access only in its own module.
21. Global Variable [SEE 2075 S2]
Variables which are declared outside the procedure are called global variables. Global variables are visible to
other modules or functions. Its values can be accessed from any procedure or module. Global variable can be
access throughout the program
22. Passing arguments by value
When arguments are passed by value it makes a duplicate copy of arguments and their values (constants) are used
directly in parameter. It doesn’t make any effect on values of variable which are passed to a procedure even they
are changed in the procedure. To pass the argument by value, variable is enclosed in parenthesis.

23. Passing arguments by reference


When arguments are passed by reference the address of the variables are passed to the procedure. The changes
made in the procedure’s variable will affect the variables used at calling module. By default the value is passed by
reference.

24. Qbasic Operators [MFT 2075] [SQE 2074K]


Operators are special symbols that are meant for specific tasks or operators.
i) Arithmetic operators
ii) Relational operators
iii) Logical Operators
iv) String operator

25. Static variable


The variable which is declared by using the “STATIC” keyword is called static variable.

https://seeqbasicomputer.blogspot.com/ 69 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Handling of data file
Questions and Answers [25]
1. Data file
The file which contains data given by the user to the program and information provided by the user to the computer is called
data file.
The different types of data file are:
a) Sequential Access files - A data file that stores a sequential data file containing name, address of some people in the same
order or in sequential order is called sequential access data file. It takes long time to access if the data file contains a large
volume of data. In sequential access data file we cannot change the existing entry or insert a new entry.
b) Random access files
2. Program File
The file which contains a set of instructions that are needed for data processing is called program file.
3. Mode of data file [SLC 2069]
Mode of data file means opening a sequential file for one of the three modes of operation like output mode, input mode and
append mode.
4. Modes of operation for opening a sequential file
a) Output Mode: It is used to create a new data file and write data in it. If the file already exists its current contents will be
destroyed.
b) Input Mode: It is used to retrieve records or contents of existing data file.
c) Append Mode: It is used to add more records in existing file. If the specified file does not exist APPEND mode creates it.
5. File number
The number assigned to a file in order to identify it during processing is called file number.
Write down the functions of:
6. OPEN statement: It opens a sequential file for one of the three possible operations (reading, writing, appending).
7. WRITE statement [SEE 2075] [MM 2076]: It sends one or more data items to the specified file. It inserts commas between
the data items. It encloses strings in double quotation marks.
8. PRINT#: It adds spaces between data items while storing data. It does not enclose strings in double quotation marks.
9. CLOSE statement [SEE 2074] [SEE 2073: It closes one or all open files.
10. INPUT# statement [SEE 2075 U] [SEE 2075 S 2]: It reads data from the sequential data file.
11. EOF( ) function [SEE 2075 S 2]: It is used to test the end of records with in a file.
12. LINE INPUT statement: It reads the entire line or maximum 255 characters form the keyboard or the sequential file.
13. INPUT$ function: It reads the specified number of characters form the data file.
14. NAME statement [SEE 2073] [SLC 2071 S]: The NAME statement renames a file on a diskette. Only file name changes,
data and program line remains intact.
15. KILL statement [SEE 2074]: The KILL statement deletes the file or files from the specified drive and directory.
16. MKDIR statement [SEE 2075 U]: It creates a subdirectory which is used to manage files.
17. CHDIR statement: It allows QBASIC to change from one directory to another.
18. RMDIR statement [SLC 2065] [SLC 2068 S]: It is used to remove or delete only the subdirectories from a disk. It can
remove only empty subdirectories.
19. FILES statement: The FILES statement displays the files of the current sub directory or specified sub directory.
20. SHELL: The SHELL statement allows a program to run external programs or command line statements in Windows, MAC
OS and Linux.
21. INT [MM 2076] [MFT 2075]: It rounds and returns the largest integer less than or equal to a numeric expression.
22. PRINT [PMT 2075K] : Display result on screen.
23. MID$ ( ) [MFT 2075]: It is a string function that returns the specified number of characters from the specified location of
string.
24. LEN ( ) [SQE 2074K]: Returns the number of characters in a string or the number of bytes required to store a variable.
25. SQR ( ) [SQE 2074K]: Returns the square root of a numeric expression.

https://seeqbasicomputer.blogspot.com/ 70 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Introduction of C
Questions and Answers [20]

1. Structured programming
The programming that follows a top- down approach, on which developers separate the overall program structure
into different sub selection, is called structured programming.

2. Advantages of structured programming [SEE 2075] [SLC 2066]


a) It is easy to design code and test the program modules independently
b) It is possible to use a single module in different in different places which reduces program codes.

3. C language
C language is a structured programming language that divides program into many functions. Dennis Ritchie at
Bell telephone laboratory developed C-language in 1972 AD.
C is called middle level language because it combines elements of high level language with some features of
assembler. A high level language tries to give programmer everything through built-in language. A low level
language forces programmer to define function directly from user level.
C is mostly used to write system program such as operating system, language, compiler, text editor, language
interpreters, utilities, etc.
C keywords are words which have special meaning for the compiler. Examples are: auto, break ,case, char etc.

4. Data types used in C


Data type are means to identify the type data and associated operation of handling it.

5. Data types used in C language [SEE 2074] [SLC 2072] [SLC 2071 S] [SLC 2065] [SLC 2068] [SLC 2070]
[SEE 2065 S] [SLC 2066 S] [SLC 2067 S] [SLC 2069 S] [SLC 2070 S] [SQE 2074K]
a) char b) int c) float d) double

6. Data Modifiers: Data modifiers change the meaning of the basic data type to fit the various situations. The data
modifiers are: short int, unsigned int and long int

7. Characteristics of C language [SEE 2075 U] [SEE 2075 S 2] [SLC 2071] [SLC 2067] [SLC 2069]
a) It is a high level language with some features of low level language.
b) It is mostly used to prepare system software.
c) It is structured programming language with function procedure.
d) It has enough number of inbuilt functions and operators.
e) It is a small programming language which occupies less memory space.

8. Features of C- language [SEE 2073 U]


a) Simple and easy to use
b) Occupies less memory
c) C is the structured programming language.
d) C has powerful set of operators.
e) C is a high level programming language.
f) C contains very less number of keywords

9. Advantages of C language
a) It is machine independent programming language
b) It is easy to learn and implemented C language
c) It can be implemented from mobile device to mainframe computers.
d) It is the mother of all modern programming language like python, pearl 5 and PHP

https://seeqbasicomputer.blogspot.com/ 71 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

10. Disadvantages of C language


a) There is no runtime checking. It has poor errors detection system.
b) On large programs , it is hard to find errors.
c) There is no strict type checking int data type to float variables.
d) It does not support modern programming methodologies oriented programming language.

11. Counter
Counter is a variable which controls the loop statement and provides the track to run the loop statement in certain
number times.

12. Accumulator
Accumulator is a numeric variable which accumulates the values in a loop statement.

13. Variable [SEE 2073] [SLC 2071 S] [SLC 2070] [MFT 2075]
A variable is a location in the memory of a computer whose value may change during the execution of program.

14. Constant
Constant are the values that do not change during the execution of a program.

15. Operator [SQE 2075K]


Operators are special symbols that are meant for specific tasks or operators.
The different types of C operators are:- Arithmetic operators, Assignment operators, Unary operators, Relational
operators, Logical operators and Conditional operators.
Arithmetic operators are the operators that are used for manipulating arithmetic data and performs arithmetic
operation. The arithmetic operators are:- +, - , * , / and %
The operator that operate on one operand variable or constant is called urinary operator. E.g. ++, - -

16. Logical Operator [SEE 2075]


The operators used for logical operation is called logical operator.

17. Selection statement.


Selection statement is a statement that allows the selective execution o statements depending on the value of an an
expression. The selection statements of C program are:- If statement and Switch statement

18. Loop [SEE 2073] [SLC 2068] [SLC 2067 S] [SLC 2070 S]
A set of statements which is used to repeat a block of statements for a specific number of times or as long as the
condition is true/false is called loop.
The looping statements provided by care:-For loop, While loop and Do.....while loop

19. Comparing C and QBASIC language [SEE 2074 U] [SLC 2068 S]


QBASIC C
It is a high level language without feature of low It is a high level language with some features of
level language. low level language.
It is mostly used to design application software. It is mostly used to prepare system software.
It supports structure programming with sub and It is a structured programming language with
function procedure. function procedure.
It is not case sensitive It is case sensitive
IBM PC version of BASIC has around 159 It has only 32 keywords.
keywords.

https://seeqbasicomputer.blogspot.com/ 72 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

Find Output [70]


1. [SLC 2065 S] 2. [SLC 2072]
DECLARE FUNCTION Interest (p,t,r) DECLARE FUNCTION Interest (p,t,r)
CLS CLS
LET p = 30 LET p = 100
LET t = 40 LET t = 2
LET r = 6 LET r = 5
LET d = Interest (p, t, r) LET d = Interest (p, t, r)
PRINT “The simple interest will be”; d PRINT "The simple interest =" ; d
END END
FUNCTION Interest (p, t, r) FUNCTION Interest (p, t, r)
answer= (p*t*r) /100 ans= (p*t*r) /100
Interest=answer Interest=ans
END FUNCTION END FUNCTION
Output: Output:
The simple interest will be 72 The simple interest = 10
3. [SLC 2064] 4. [SLC 2068 S] [SLC 2070] [SLC 2073]
DECLARE FUNCTION AREA (A,B) DECLARE FUNCTION AREA(L, B)
LET A = 30 LET L = 10
LET B = 40 LET B = 5
LET D = AREA(A,B) PRINT “The area=”; AREA(L, B)
PRINT D END
END FUNCTION AREA(L, B)
FUNCTION AREA(A,B) A = L*B
PRINT A, B AREA = A
AREA=A*B END FUNCTION
END FUNCTION
Output: Output:
30 40 The area= 50
1200
5. [SLC 2071] 6. [SLC 2067 S]
DECLARE FUNCTION AVGE(A, B, C) DECLARE FUNCTION Area (L,B)
X=10 LET L = 100
Y=5 LET B = 20
Z=15 LET ans = Area (L,B)
AV= AVGE(X, Y, Z) PRINT “The area is”; ans
RPINT “Average of three numbers”; AV END
END FUNTION Area (L, B)
FUNCTION AVGE(A, B, C) ar = L * B
S=A+B+C Area = ar
AVGE = S/3 END FUNCTION
END FUNCTION
Output: Output:
Average of three numbers 10 The area is 2000
7. DECLARE FUNCTION AREA(L, B) 8. DECLARE SUB PAT (A)
CLS A= -144
LET length = 50 CALL PAT (A)
LET breadth = 60 END
PRINT AREA (length, breadth)
PRINT AREA (10, 20) SUB PAT(A)
END B=ABS(A)
C= SQR(B)
FUNCTION AREA (L, B) D=C MOD 2
AREA = L * B PRINT A, B, C, D
END FUNCTION END SUB

Output: Output:
3000 -144 144 12 0
200

https://seeqbasicomputer.blogspot.com/ 73 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
9. DECLARE SUB SHOW (S) 10. DECLARE SUB VOL (L, B, H)
CLS CLS
CALL SHOW (534) LET L1 = 20
END LET B1 = 14
LET H1 = 2
SUB SHOW (N) CALL VOL(L1, B1, H1)
A = N MOD 10 END
B = N \ 10 SUB VOL (L, B, H)
C = B MOD 10 LET V = L * B * H
D = INT (N / 100) PRINT “Volume=”; V
PRINT “Ans=”; A + C + D END SUB
END SUB
Output: Output:
Ans=12 Volume=560

11. DECLARE SUB TEST(NUM) 12. [MM 2076]


CLS DECLARE SUB NUM( )
CALL TEST(-5) CLS
CALL TEST(5) CALL NUM
CALL TEST(0) END
END
SUB TEST(NUM) SUB NUM
SELECT CASE NUM A=3: B=7
CASE IS < 0 FOR I =1 TO 5 STEP 2
M$ = “Negative”
PRINT A;
CASE IS > 0
M$ = “Positive” SWAP B, A
CASE ELSE B=A+1
M$ = “Zero” NEXT I
END SELECT END SUB
PRINT NUM; ”is”; M$
END SUB
Output: Output:
-5 is Negative 3 7 8
5 is Positive
0 is Zero

13. [PMT 2075] 14. [MFT 2076]


DECLARE SUB SER (P) DECLARE SUB sum( )
P = 15 CLS
CALL SER (P) CALL sum
END END
SUB sum
SUB SER (P) P=2
M=3 A=1
WHILE M < 10 FOR K = 8 to 2 STEP -2
PR = M * P N=N+A
PRINT PR, PRINT N
M=M+2 A=A+P
WEND NEXT K
END SUB END SUB

Output is: Output


45 75 105 135 1
4
9
16
https://seeqbasicomputer.blogspot.com/ 74 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
15. DECLARE SUB MIN(A, B) 16. DECLARE SUB OUTPOOT(L, B)
CLS CLS
A=5 LET L = 15
B = 10 LET B = 10
CALL MIN(A, B) CALL OUTPOOT(L, B)
END CALL OUTPOOT(3, 6)
SUB MIN(A, B) END
IF A < B THEN SUB OUTPOOT(L, B)
C=A+5 IF L < B THEN
PRINT C PRINT L
ELSE ELSE
PRINT B ^ 2 PRINT B
END IF END IF
END SUB END SUB

Output: Output:
10 10
3
17. DECLARE SUB FEBON(P, Q) 18. DECLARE FUNCTION OUT(A, B)
CLS CLS
R=2:S=1 D = OUT(17, 7)
CALL FEBON(R, S) PRINT D
END END
FUNCTION OUT(A, B)
SUB FEBON(P, Q) R = A MOD B
T=1 IF R MOD 2 = 0 THEN
PRINT P; Q; C = R MOD 6 + 30
LAB: ELSE
LET U = P + Q C = R MOD 6 + 15
PRINT U; END IF
P=Q D=C\5
Q=U OUT = D
T=T+1 END FUNCTION
IF T <=8 THEN GOTO LAB
END SUB
Output: Output:
2 1 3 4 7 11 18 29 47 76 3

19. DECLARE SUB Result() 20. [SLC 2066]


CLS DECLARE SUB Series()
CALL Result CALL Series
END END
SUB Result SUB Series
A=1 X=1
FOR I = 1 TO 5 Y=1
PRINT I*A FOR Z=1 TO 4
A=A+(10^I) PRINT X;
NEXT I Y=Y+1
END SUB X=X*10+Y
NEXT Z
END SUB
Output: Output:
1 1 12 123 1234
22
333
4444
55555
https://seeqbasicomputer.blogspot.com/ 75 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
21. 22. DECLARE SUB RESULT ( )
DECLARE SUB series ( ) CLS
CALL series CALL RESULT
END END
SUB series SUB RESULT ( )
X=1 Z=3
FOR K = 1 TO 4 FOR A = 1 TO 10
PRINT X; PRINT (A^2)*Z
X=X+K NEXT A
NEXT K END SUB
END SUB
Output: Output:
1 2 5 9 3
12
21
48
23. DECLARE SUB Show ( ) 24. DECLARE SUB Series( )
CALL Show CALL Series
END END
SUB Show SUB Series
C=3 A=2
B=2 B=2
FOR I=2 TO 8 STEP 2 For ctr=1 to 2
PRINT C, PRINT A; B;
SWAP B, C A= A+B
B=C+1 B=A+B
NEXT I Next ctr
END SUB END SUB
Output: Output:
3 2 3 4 2 2 4 6
25. [SLC 2066 S] 26. [SLC 2070 S]
DECLARE SUB Result ( ) DECLARE SUB Series ()
CALL Result CALL Series
END END
SUB Result SUB Series
For I = 1 to 9 STEP 2 X=0
Sum=Sum +I^2 FOR K = 10 TO 4 STEP -2
Next I A = K ^2
PRINT Sum X=X+A
END SUB NEXT K
PRINT X
END SUB
Output: Output:
165 216
27. DECLARE SUB SERIES()[SQE 2074K] 28. [SEE 2075 S2]
CALL SERIES DECLARE FUNCTION SQD(N)
END S=0
SUB SERIES() FOR L = 1 TO 3
R=2 READ NUM
M=5 S = S +SQD (NUM)
WHILE M>=1 NEXT L
PRINT R PRINT " Sum" ; S
R=R*10+2 DATA 2,4,6
M=M-1 END FUNCTION SQD (N)
WEND SQD = N^2
END SUB END FUNCTION
Output: Output:
2 Sum 56
22
222
2222
22222

https://seeqbasicomputer.blogspot.com/ 76 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
29. DECLARE SUB SERIES() 30. [SLC 2069]
CLS DELARE SUB NUMBER()
CALL SERIES CLS
END CALL NUMBER
END
SUB SERIES( ) SUB NUMBER
X#=11111 N=3
FOR I= 1 TO 5 C=1
PRINT X#^2 WHILE C<=5
X# = (X# - 1) / 10 PRINT N
NEXT I N=N*10+3
END SUB C=C+1
WEND
END SUB
Output: Output:
123454321 3
1234321 33
12321 333
121 3333
1 33333
31. DECLARE SUB CHECK () 32. DECLARE SUB FIND(N)
CALL CHECK N=654
END CALL FIND(N)
SUB CHECK END
CLS SUB FIND(N)
FOR K = 1 TO 5 WHILE N < > 0
FOR I = 5 TO K STEP -1 R= N MOD10
PRINT I; P= P*10 + R
NEXT I N= N \ 10
PRINT WEND
NEXT K PRINT P
END SUB END SUB
Output: Output:
54321 456
5432
543
54
5

33. [SEE 2071 S] 34. DECLARE FUNCTION CONVERSION(B)


DECLARE FUNCTION test (N) CLS
CLS Z=1111
FOR Ctr = 1 TO 3 ANS= CONVERSION(Z)
PRINT”THE RESULT”;ANS
READ N
END
Sum = Sum + test (N) FUNCTION CONVERSION(B)
NEXT Ctr P=0
PRINT “The result=”; Sum DO WHILE B<>0
DATA 3, 2, 1 D= B MOD 10
END E = D*2^P+E
B = INT(B/10)
FUNCTION test (N) P = P+1
Test = N^2 LOOP
END FUNCTION CONVERSION=E
END FUNCTION
Output: Output:
The result = 14 THE RESULT 15
https://seeqbasicomputer.blogspot.com/ 77 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
35. DECLARE SUB PER(P) 36. [SEE 2073 U]
P=15 DECLARE SUB CHECK (N)
CALL SER(12) CLS
END N = 1436
SUB SERIES (P) CALL CHECK (N)
M=3 END
WHILE M<7
PR=M*P SUB CHECK (N)
PRINT PR, DO WHILE n< >0
M=M+2 R = N MOD 10
WEND S = S*10+R
END SUB N = N\10
LOOP
PRINT "NOW N BECOMES"; S
END SUB
Output: Output:
36 60 NOW N BECOMES 6341
37. [SQE 2075K] 38. DECLARE FUNCTION TEST (N)
DECLARE FUNCTION RESULT (N) CLS
N=4 FOR J= 3 TO 9 STEP 2
PRINT RESULT (N) X= TEST(J)
END PRINT X
FUNCTION RESULT (N) NEXT J
FOR I = 1 TO N END
T=I+2
D=D+T FUNCTION TEST (N)
NEXT I TEST = (N^2)+ 2
RESULT = D END FUNCTION
END FUNCTION
Output: Output:
18 11
27
51
83
39. DECLARE SUB OUTP(A$) 40. DECLARE SUB CHK (N$())
CLS FOR I= 1 TO 6
A$ = “COMPUTER” READ N$(I)
CALL OUTP(A$) NEXT I
END CALL CHK (N$())
SUB OUTP(A$) DATA Patan, Pray, Ada, Cabbage, English,
B = LEN(A$) Samsung
C=1 END
LAB: SUB CHK (N$())
PRINT LEFT$(A$, C) FOR I = 1 TO 6
C=C+1 S$=S$+MID$(N$(I)),I,1)
IF C <= B THEN GOTO LAB NEXT I
END SUB PRINT S$
END SUB
Output: Output:
C Prabin
CO
COM
COMP
COMPU
COMPUT
COMPUTE
COMPUTER
https://seeqbasicomputer.blogspot.com/ 78 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
41. DECLARE SUB DISPLAY(B$) 42. DECLARE SUB RESULT (S$)
CLS CLS
CALL DISPLAY(“101”) A$=”PROGRAMMER”
END CALL RESULT (A$)
END
SUB DISPLAY(B$) SUB RESULT (A$)
FOR I=LEN(B$) TO 1 STEP-1 FOR C= LEN (A$) TO 1 STEP -2
A$=MID$(B$,I,1) X$= MID$(A$, C, 1)
C=VAL(A$) PRINT X$;
D=D+C*8^P NEXT C
P=P+1 END SUB
NEXT I
PRINT D
END SUB
Output: Output:
65 RMAGR
43. DECLARE SUB PRO (A AS INTEGER, B AS 44. DECLARE SUB SHOW (ABC$)
STRING) CLS
N = 62 AB$="ZHTUOMENXSA"
CALL PRO (N, S$) CALL SHOW (AB$)
PRINT S$ END
END
SUB PRO (A AS INTEGER, B AS STRING) SUB SHOW (AB$)
X=A Y=48
DO FOR I=1 TO 5
R = X MOD 8 N=Y MOD 7
B = STR$ (R) + B PRINT MID$(AB$, N, 1);
X = (X - R) / 8 Y=Y-1
LOOP UNTIL X = 0 NEXT I
END SUB END SUB
Output: Output:
76 MOUTH

45. DECLARE SUB RESULT ( ) 46. DECLARE SUB PICTURE (ST$)


CLS X$ = "SCIENCE"
CALL RESULT CALL PICTURE(ST$)
END END
SUB RESULT () SUB PICTURE(S$)
W$="SCIENCE" T=20
L=LEN (W$) P=4
X=1: Y=3 N=1
FOR I= 1 TO L STEP 2 FOR A= 1 TO 4
PRINT TAB (Y); MID$(W$, X, L) PRINT TAB(T); MID$(ST$,P,N)
X=X+1 P=P-1
L=L-2 N=N+2
Y=Y+1 T=T-1
NEXT I NEXT A
END SUB END SUB
Output: Output:
SCIENCE E
CIENC IEN
IEN CIENC
E SCIENCE

https://seeqbasicomputer.blogspot.com/ 79 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
47. DECLARE SUB PATTERN (W$) 48. DECLARE SUB PATTERN(S$)
CLS B$=”PROGRAM”
LET W$=”KATHMANDU”
CALL PATTERN (W$) CALL PATTERN(B$)
END END
SUB PATTERN(S$)
SUB PATTERN (W$) H=LEN(S$)
T=5
FOR K=1 TO LEN(W$) STEP 2 I=10
PRINT TAB(T); MID$(W$,T,K) FOR J=1 TO H STEP 2
T=T-1 PRINT TAB(I); MID$(S$,J,H)
NEXT K H=H-2
END SUB
I=I+1
NEXT J
END SUB
Output: Output:
M PROGRAM
HMA ROGRA
THMAN OGR
ATHMAND G
KATHMANDU

49. [SLC 2067] 50. [SEE 2074]


DECLARE SUB RESULT(N$) DECLARE SUB Display (T$)
N$ = "SCIENCE" CLS
CALL RESULT(N$) T$ = "COMPUTER"
END CALL Display (T$)
END
SUB RESULT (N$) SUB Display (T$)
B = LEN(N$) FOR C = 1 TO LEN (T$) STEP 2
COUNT = 1 D$ = MID$ (T$, C, 1)
WHILE COUNT <= B PRINT D$;
X$ = X$ + MID$(N$, COUNT, 1) NEXT C
COUNT = COUNT + 2 END SUB
WEND
PRINT X$
END SUB
Output: Output:
SINE CMUE

51. [SLC 2065] 52. DECLARE SUB TEST(A$)


DECLARE SUB RESULT(A$) CLS
A$ = "education" A$="NEPAL"
CALL RESULT(A$) CALL TEST(A$)
END END
SUB RESULT (A$)
FOR C = 1 TO LEN(A$) STEP 2 SUB TEST(A$)
X$ = MID$(A$, C, 1) FOR I = 1 TO LEN(A$)
PRINT X$ B$ = MID$(A$, I, 1) + B$
NEXT C NEXT I
END SUB PRINT B$
END SUB
Output: Output:
e LAPEN
u
a
i
n

https://seeqbasicomputer.blogspot.com/ 80 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
53. DECLARE FUNCTION OUTP$(A$()) 54. DECLARE FUNCTION RE$(ST$())
DIM A$(5) DIM ST$(7)
FOR I=1 TO 5 CLS
READ A$(I) FOR I=1 TO 7
NEXT I INPUT "Enter string"; ST$(I)
DATA NETRA, NAVIN, SUSAN, GOPAL, NEXT I
SUNIL PRINT RE$(ST$())
PRINT OUTP$(A$()) DATA “Prabhu”, “Alok”, “Bimal”, “Suman”,
END “Ishwor”, “Om”, “Nitu”
FUNCTION OUTP$(A$()) END
SWAP A$(1),A$(2)
SWAP A$(3),A$(4) FUNCTION RE$(ST$()))
FOR J=1 TO 5 FOR J = 1 TO 7
T$=T$+MID$(A$(J),J,1) VR$ = VR$ + MID$(ST$(J), I,1)
NEXT J NEXT J
OUTP$=T$ RE$=VR$
END FUNCTION END FUNCTION
Output: Output:
NEPAL PABSION
55. DECLARE FUNCTION answer$(x$) 56. DECLARE FUNCTION OUT$(A$( ))
CLS DIM A$(6)
Y$ = “Question” FOR A = 0 to 5
PRINT answer$(Y$) READ A$(A)
END NEXT A
FUNCTION answer$(x$) DATA SARITA, JEHEN, RADHIKA, ISHIKA,
FOR I = LEN(x$) to 1 STEP – 4 DILIP, BRIJESH
Z$ = MID$(x$, I, 1) + Z$ PRINT OUT$(A$( ))
NEXT i END
answer$ = Z$ FUNCTION OUT$(A$( ))
END FUNCTION CTR = 1
FOR R = 0 TO 5
T$ = T$ + MID$ (A$(R), CTR, 1)
CTR = CTR + 1
NEXT R
OUT$ = T$
END FUNCTION
Output: Output:
Sn SEDIPS

57. DECLARE FUNCTION ABC(X) 58. DECLARE FUNCTION CHECK(A)


CLS CLS
FOR I=1 TO 8 PRINT CHECK(4387)
READ N END
Z=ABC(N)
S=S+Z FUNCTION CHECK(A)
NEXT I WHILE A<>0
PRINT S R=A MOD 10
DATA 7, 22, 11, 34, 17, 52, 26, 13 IF R MOD 2=0 THEN
END S=S+R
FUNCTION ABC(X) END IF
IF X MOD 2 < > 0 THEN ABC=X A=A\10
END FUNCTION WEND
CHECK=S
END FUNTION

Output: Output:
48 12
https://seeqbasicomputer.blogspot.com/ 81 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
59. DECLARE FUNCTION CHECK (B) 60. DECLARE SUB NUM( )
A = 125 CLS
S=0 CALL NUM
CLS END
PRINT “OUTPUT:::”;CHECK (A) SUB NUM()
END A=3
FOR I = 1 TO 5
FUNCTION CHECK (B) PRINT A,
WHILE B<>0 IF A MOD 2 < > 0 THEN
C = B MOD 10 A = A*3+1
IF C MOD 2=1 THEN D = D + C^3 ELSE
B = INT(B/10) A =A/2
WEND ENDIF
CHECK = D NEXT I
END FUNCTION END SUB
Output: Output:
OUTPUT::: 126 3 10 5 16 8
61. DECLARE SUB RESULT(X,Y) 62. DECLARE SUB RSLT (A, B)
CALL RESULT(3,9) CALL RSLT (3, 15)
END END

SUB RESULT(X,Y) SUB RSLT (A, B)


FOR I = X TO Y FOR I = A TO B
R=I MOD 2 R = I MOD 2
IF R=1 THEN PRINT I IF R = 0 THEN PRINT I
NEXT I NEXT
END SUB END SUB
Output: Output:
3 4
5 6
7 8
9 10
12
14
63. DECLARE SUB DISPLAY(X) 64. DECLARE SUB G(A, B)
CLS FOR X = 1 TO 4
FOR N = 1 TO 10 STEP 3 READ P, Q
CALL DISPLAY (N) CALL G(P, Q)
NEXT N NEXT X
END DATA 4, 5, 8, 6, 15, 10, 17, 19
END
SUB DISPLAY (X) SUB G(A, B)
IF X MOD 2 =1 THEN PRINT X; IF A < B THEN
END SUB TH = A
ELSE
TH = B
END IF
PRINT TH
END SUB
Output: Output:
1 7 4
6
10
17

https://seeqbasicomputer.blogspot.com/ 82 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
65. DECLARE SUB ABC(A) 66. DECLARE SUB OUTPOOT()
FOR I = 1 TO 5 CLS
READ N CALL OUTPOOT
CALL ABC(N) END
NEXT I
DATA 24, 15, 48, 18, 12 SUB OUTPOOT
END I=1
SUB ABC(N) N=10
R = N MOD 4 DO
R1 = N MOD 6 IF N MOD 2=0 THEN PRINT N
IF R = 0 AND R1 = 0 THEN I=I+1
PRINT N N=N+1
END IF LOOP UNTIL I>9
END SUB END SUB
Output: Output:
24 10
48 12
12 14
16
18
67. DECLARE FUNCTION CNT(ST$) 68. DECLARE FUNCTION PAB(S$)
ST$ = “COMPUTER” CLS
TOT = CNT(ST$) R$=”Today is my computer exam”
PRINT TOT PRINT PAB(R$)
END END
FUNCTION CNT(ST$)
C=1 FUNCTION PAB(S$)
DO WHILE C <= LEN(ST$) C=1
A = ASC(MID$(ST$, C, 1) FOR I = 1 TO LEN(S$)
S=S+A A$=MID$(S$,I,1)
C=C+1 IF A$= “m” THEN C=C+1
LOOP NEXT I
CNT = S PAB=C
END FUNCTION END FUNCTION
Output: Output:
623 3

69. DECLARE SUB TEST(A$) 70. DECLARE SUB DISPLAY(S$)


A$ = “COMPUTER” A$=”MAAF”
CALL TEST(A$) DISPLAY A$
END END
SUB TEST(A$) SUB DISPLAY(S$)
FOR I=1 TO LEN(A$) L=LEN(S$)
B$=MID$(A$,I,1) FOR I=L TO 1 STEP -1
C=ASC(B$) VER$=MID$(S$, I, 1)
IF C MOD 2 =0 THEN IF I MOD 2 =1 THEN
D$=D$+CHR$(C+32) CON$=CON$+LCASE$(VER$)
ELSE ELSE
D$=D$+B$ CON$=CON$+UCASE$(VER$)
ENDIF END IF
NEXT I NEXT
PRINT D$ PRINT CON$
END SUB END SUB
Output: Output:
COMpUtEr FaAm

https://seeqbasicomputer.blogspot.com/ 83 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
71. DECLARE FUNCTION VCOUNT(A$) 72. DECLARE FUNCTION CONV$(D)
X$=”SCHOOL” CLS
Y$=” INSTITUTE” D = 509
IF VCOUNT(S$)>VCOUNT(Y$) THEN PRINT PRINT CONV$(D)
X$ ELSE PRINT Y$ END
END FUNCTION CONV$(D)
WHILE D<>0
FUNCTION VCOUNT(A$) R = D MOD 16
N$=UCASE$(A$) IF R < 10 THEN
FOR X= 1 TO LEN(N$) S$ = STR$(R) +S$
C$=MID$(N$,I,1) ELSE
IF C$=”A” OR C$=”E” OR C$=”I” OR C$=”O” S$ = CHR$(R+55) +S$
OR C$=”U” THEN V=V+1 END IF
END IF D = D\16
NEXT X WEND
VCOUNT=V CONV$ = S$
END FUNCTION END FUNCTION
Output: Output:
INSTITUTE 1FD
73. [SEE 2075 U] 74. [SEE 2074 U]
DECLARE FUNCTION SUM ( a ) DECLARE SUB REMINDER (R)
a=9 FOR I = 1 TO 4
PRINT SUM ( a ) READ X
END CALL REMINDER (X)
NEXT I
FUNCTION SUM ( a ) DATA 56, 28, 8, 48
FOR K = 1 to a END
IF K MOD 2 = 0 THEN SUB REMINDER (R)
S=S+K R1 = R MOD 4
R2 = R MOD 3 IF
END IF
R1 = 0 AND R2<> 0 THEN
NEXT K PRINT R
SUM = S END IF
END FUNCTION END SUB

Output: Output:
20 56
28
8

https://seeqbasicomputer.blogspot.com/ 84 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Debugging [35]
1. DECLARE SUB correct( ) DECLARE SUB correct( )
CLS CLS
REM to calculate the area of rectangle REM to calculate the area of rectangle
CALL SUB correct CALL correct
END END
SUB Correct SUB Correct
INPUT “enter length”;L INPUT “enter length”;L
INPUT “enter breadth”;B INPUT “enter breadth”;B
A= LENGTH* BREADTH A= L*B
PRINT “area of rectangle=”;Area PRINT “area of rectangle=”; A
SUB END END SUB
2. Rem program to find the cube of the cube of a Rem program to find the cube of the cube of a given
given number number
DECLARE FUNCTION CUBE(R) DECLARE FUNCTION CUBE(R)
ENTER R INPUT R
DISPLAY CUBE(R) PRINT CUBE(R)
END END
FUNCTION CUBE(R) FUNCTION CUBE(R)
S=R^3 S=R^3
PRINT S CUBE = S
COMPLETE END FUNCTION
3. [SLC 2071] DECLARE SUB CUBE(N)
DECLARE SUB CUBE(N) CLS
CLS FOR I = 1 TO 5
FOR I = 1 TO 5 READ No
READ CALL CUBE(No)
CALL CUBE(No) NEXT I
NEXT X DATA 3, 5, 2, 6, 4
DATA 3, 5, 2, 6, 4 END
END SUB CUBE(N)
SUB CUBE( ) PRINT N^3
DISPLAY N^3 END SUB
END SUB

4. [SLC 2065] [SLC 2065]


DECLARE FUNCTION SUM(a,b) DECLARE FUNCTION SUM(a,b)
REM Program to sum given two numbers REM Program to sum given two numbers
Input ”Enter first number”; x Input ”Enter first number”; x
Input “Enter second number; y Input “Enter second number”; y
PRINT SUM(a,b) PRINT SUM(x, y)
END END
FUNCTION SUM(x,y) FUNCTION SUM(a, b)
SUM=a+b SUM=a+b
END END FUNCTION

5. [SLC 2072] [SLC 2072]


FUNCTION SUM (m,n) DECLARE FUNCTION SUM (m,n)
Rem to print sum of two numbers Rem to print sum of two numbers
a= 6 a= 6
b= 7 b= 7
DISPLAY SUM (a, b) PRINT SUM (a, b)
END END
FUNCTION SUM (m,n) FUNCTION SUM (m,n)
S = m +n S = m +n
S = SUM SUM = S
END SUM END FUNCTION
https://seeqbasicomputer.blogspot.com/ 85 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
6. [SLC 2068] [SLC 2068]
CREATE FUNCTION Square(A) DECLARE FUNCTION Square(A)
Rem to print square of a number Rem to print square of a number
CLS CLS
Get “a number”; A INPUT “a number”; A
CALL square(A) PRINT square(A)
END END
FUNCTION square(A) FUNCTION square(A)
Ans=A^2 Ans=A^2
Square=Ans Square=Ans
END Square(A) END FUNCTION
7. DECLARE FUNCTION AREA (X) DECLARE FUNCTION AREA (X)
CLS CLS
REM TO FIND THE AREA OF CIRCLE REM TO FIND THE AREA OF CIRCLE
INPUT “ENTER THE VALUE OF RADIUS”;R INPUT “ENTER THE VALUE OF RADIUS”;R
CALL AREA (R) PRINT AREA (R)
END END
FUNCTION AREA (X) FUNCTION AREA (X)
AR= (22/7)* R^2 AR= (22/7)* X^2
AR=AREA AREA=AR
FUNCTION END END FUNCTION
8. [SLC 2064] [SLC 2067 S] [SLC 2071 S] DECLARE SUB Series( )
DECLARE SUB Series( ) CLS
CLS CALL Series
EXECUTE Series END
END SUB Series()
SUB Series( ) REM program to generate 3 3 4 9 15 upto 20 th terms.
REM program to generate 3 3 4 9 15 upto 20th terms. A=3
A=3 B=3
B=3 FOR ctr= 10 to 1 STEP-1
FOR ctr= 10 to 1 PRINT A;B;
DISPLAY A;B; A=A+B
A=A+B B=A+B
B=A+B NEXT ctr
NEXT ctr END SUB
END Series( )
9. [SLC 2066] DECLARE SUB Fibonic ()
DECLARE SUB Fibonic () REM *Fibonic series*
REM *Fibonic series* CALL Fibonic
CALL SUB Fibonic END
END SUB Fibonic
SUB Fibonic A=1
A=1 B=1
B=1 FOR x=1 to 10
FOR x=1 to 10 PRINT a; b;
DISPLAY a; a=a+b
a=a+b b=a+b
b=a+b NEXT x
END Fibonic END SUB
10. [SEE 2065 S] DECLARE SUB Series( )
DECLARE SUB Series() CLS
CLS CALL Series
EXECUTE Series END
END SUB Series
SUB Series A=2
A=2 B=2
B=2 FOR ctr= 1 to 5
FOR ctr= 1 to 5 PRINT A;B;
DISPLAY A;B; A=A+B
A=A+B B=A+B
B=A+B NEXT ctr
LOOP ctr END SUB
END Series()
https://seeqbasicomputer.blogspot.com/ 86 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
11. [SEE 2073 U]
DECLARE SUB Series ( ) DECLARE SUB Series ( )
CLS CLS
EXECUTE Series CALL Series
END END
SUB Series SUB Series ( )
REM Program to print 4 4 8 12 20 ....... 20th terms REM program to generate 4 4 8 12 20 …20th term
X=4 X=4
Y=4 Y=4
FOR ctr = 10 To 1 For ctr = 10 TO 1 STEP -1
DISPLAY X; Y; PRINT C ; Y;
X = X+Y X=X+Y
Y = X+ Y X=X+Y
Next ctr NEXT ctr
End Series END SUB
12. [SLC 2070] [SLC 2070]
DECLARE SUB Series( ) DECLARE SUB Series(.)
CLS CLS
EXECUTE Series CALL Series
END END
SUB Series SUB Series
REM to generate 2 2 4 6 10….. upto 10th term REM to generate 2 2 4 6 10….. upto 10th term
P=2 P=2
Q=2 Q=2
FOR Ctr=1 TO 5 FOR ctr=1 TO 5
DISPLAY P,Q, PRINT P,Q,
P=P+Q P=P+Q
Q=P+Q Q=P+Q
WEND NEXT ctr
END Series() END SUB
13. [SEE 2073] [SEE 2073]
DECLARE SUB SUM (N) DECLARE SUB SUM (N)
INPUT "Any Number"; N INPUT "Any Number"; N
PRINT SUM (N) CALL SUM (N)
END END
SUB SUM (N) SUB SUM (N)
S=0 S=0
WHILE N = 0 WHILE N < > 0
R = R MOD 10 R = N MOD 10
S = S+R S = S+R
N = N/10 N = N\10
WEND WEND
PRINT "Sum of digits"; s PRINT "Sum of digits"; s
END END SUB

14. REM To find the sum of even digits of multi digits number REM To find the sum of even digits of multi digits number
DECLARE FUNCTION SUM (N) DECLARE FUNCTION SUM (N)
CLS CLS
INPUT “ENTER MULTI-DIGITS NUMBER ”; N INPUT “ENTER MULTI-DIGITS NUMBER ”; N
PRINT “SUM = ” ; SUM(N) PRINT “SUM = ” ; SUM(N)
END END
FUNCTION SUM(N)
WHILE N=0 FUNCTION SUM(N)
R= N MOD 10 WHILE N < > 0
IF R MOD 2 = 1 THEN S=S+R R= N MOD 10
N = N / 10 IF R MOD 2 = 0 THEN S=S+R
WEND N = N \ 10
SUM (N) =S WEND
END FUNCTION SUM =S
END FUNCTION
https://seeqbasicomputer.blogspot.com/ 87 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
15. [MM 2076] REM To check the input no. is perfect square or not
REM To check the input no. is perfect square or not DECLARE FUNCTION chk$ (a)
DECLARE FUNCTION chk$ (a) CLS
CLS INPUT “Enter the number :”; a
INPUT “Enter the number :”; a PRINT chk$ (a)
CALL chk$ (a) END
END
FUNCTION chk$(a) FUNCTION chk$(a)
m=SQUARE (a) m=SQR (a)
n=INT (m) n=INT (m)
IF m=a THEN IF m=n THEN
c$=”Perfect Square” c$=”Perfect Square”
ELSE ELSE
c$=”Not Perfect Square” c$=”Not Perfect Square”
END IF END IF
C$=chk$ chk$ = c$
END FUNCTION END FUNCTION
16. [SEE 2074] REM TO find the factorial of a given number.
REM TO find the factorial of a given number. DECLARE FUNCTION FACTO (N)
DECLARE FUNCTION FACTO (N$) CLS
CLS INPUT "Enter a number", X
INPUT "Enter a number", X PRINT "The Factorial is: ", FACTO (X)
PRINT "The Factorial is: ", FACTO (N) END
END FUNCTION FACTO (N)
FUNCTION FACTO (N) F=1
F=1 WHILE N < > 0
WHILE N = 0 F = F*N
F = F*N N=N-1
N=N-1 WEND
WEND FACTO = F
F = FACTO END FUNCTION
END FUNCTION
17. DECLARE SUB FACT (N) DECLARE SUB FACT (N)
REM PRINT FACTORS OF INPUT NUMBER REM PRINT FACTORS OF INPUT NUMBER
WITH SUB PROCEDURE WITH SUB PROCEDURE
INPUT “ENTER NUMBER:”, A INPUT “ENTER NUMBER:”, A
CALL FACT(N) CALL FACT(A)
END END
SUB FACT (N) SUB FACT (N)
FOR K=1 TO N FOR K=1 TO N
IF N MOD K =1 THEN IF N MOD K =0 THEN
PRINT K PRINT K
IF END END IF
END FUNCTION END SUB
18. REM TO FIND LONGEST NAME REM TO FIND LONGEST NAME
DECLARE FUNCTION LONGETS$(A$, B$, C$) DECLARE FUNCTION LONGETS$(A$, B$, C$)
INPUT A$, B$, C$ INPUT A$, B$, C$
PRINT LONGEST(A$, B$, C$) PRINT LONGEST$(A$, B$, C$)
END END
FUNCTION LONGEST$(A$, B$, C$) FUNCTION LONGEST$(A$, B$, C$)
A = LEN$(A$) A = LEN(A$)
B = LEN(B$) B = LEN(B$)
C = LEN(C$) C = LEN(C$)
IF A > B OR A > C THEN IF A > B AND A > C THEN
A$ = L$ L$ =A$
ELSEIF B > A OR B > C THEN ELSEIF B > A AND B > C THEN
L$ = B$ L$ = B$
ELSE ELSE
L$ = C$ L$ = C$
END IF END IF
LONGEST$(A$, B$, C$) = L$ LONGEST$ = L$
FUNCTION END END FUNCTION

https://seeqbasicomputer.blogspot.com/ 88 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
19. [SEE 2075] DECLARE FUNCTION reverse$ (N$)
DECLARE FUNCTION reverse$ (N$) INPUT "Any String"; N$
INPUT "Any String"; N$ X$ = reverse$(N$)
X$ = reverse$(N$) PRINT X$
PRINT N$ END
END FUNCTION reverse$ (N$)
FUNCTION reverse (N$) L = LEN (N$)
L = LEN$(N$) FOR X = L To 1 STEP - 1
FOR X = L To 1 STEP - 1 A$ = MID$ (N$,X,1)
A$ = MID$ (N$,X,1) B$ = B$+A$
B$ = B$+A$ NEXT X
NEXT X reverse$ =B$
B$ = reverse$ (N$) END FUNCTION
END FUNCTION
20. [SLC 2069] [SLC 2069]
Rem program to reverse the string or word Rem program to reverse the string or word
DECLARE SUB REV(W$) DECLARE SUB REV(W$)
CLS CLS
INPUT “Enter a word”;W$ INPUT “Enter a word”;W$
CALL REV(W$) CALL REV(W$)
END END
SUB REV(W$) SUB REV(W$)
FOR I=LEN(W$) to 1 step -1 FOR I=LEN(W$) to 1 step -1
C$=LEFT$(W$,I,1) C$=MID$(W$,I,1)
S$=D$+1 S$=S$+C$
LOOP NEXT I
PRINT “Reverse string is:”; D$ PRINT “Reverse string is:”; S$
CLOSE SUB END SUB

21. [MFT 2076]


REM program to display reverse of supplied string REM program to display reverse of supplied string
DECLARE SUB REVE (C$) DECLARE SUB REVE (C$)
CLS CLS
INPUT “Enter the value”; C$ INPUT “Enter the value”; C$
FOLLOW REVE (C$) CALL REVE (C$)
END END
SUB REVE(C$) SUB REVE(C$)
FOR J = 1 to LEN(C$) FOR J = LEN(C$) TO 1 STEP -1
B$ = MID$(C$, 1, J) B$ = MID$(C$, J, 1)
A$=A$+B$ A$=A$+B$
LOOP J NEXT J
PRINT A$ PRINT A$
END SUB END SUB

22. [PMT 2075]


DECLARE FUNCTION REV$ (ST$) DECLARE FUNCTION REV$ (ST$)
CLS CLS
INPUT “Enter string”, S$ INPUT “Enter string”, S$
LET R$= REV$(st$) LET R$= REV$(S$)
PRINT "The reverse string is :"; R$ PRINT "The reverse string is :"; R$
END END
FUNCTION REV$(ST$) FUNCTION REV$(ST$)
FOR I = LEN(ST$) TO 1 FOR I = LEN(ST$) TO 1 STEP - 1
RV$= RV$+ MID$(ST$, 1, I) RV$= RV$+ MID$(ST$, I, 1)
NEXT I NEXT I
RV$=REV$ REV$=RV$
END FUNCTION END FUNCTION

https://seeqbasicomputer.blogspot.com/ 89 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
23. REM do display the reverse of the supplied number REM do display the reverse of the supplied number
DECLARE FUNCTION rev(n) DECLARE FUNCTION rev(n)
CLS CLS
INPUT n INPUT n
PRINT rev(n) PRINT rev(n)
END END

FUNCTION rev(n) FUNCTION rev(n)


WHILE n = 0 WHILE n < > 0
R = n MOD 10 R = n MOD 10
D$ = STR$(R) + D$ D$ = D$ + STR$(R)
n = n / 10 n = n \ 10
WEND WEND
Rev = ASC(D$) Rev = VAL(D$)
END FUNCTION END FUNCTION
24. REM to print odd numbers from 32 to 12 REM to print odd numbers from 32 to 12
DECLARE SUB SHOW ( ) DECLARE SUB SHOW ( )
CLS CLS
CALL SHOW ( ) CALL SHOW
END END

SUB SHOW ( ) SUB SHOW ( )


N = 12 N = 32
WHILE N <= 32 WHILE N >= 12
IF N MOD 2 = 0 THEN PRINT N; IF N MOD 2 = 0 THEN PRINT N;
N = N-1 N = N-1
NEXT N WEND
END SUB END SUB
25. DECLARE SUB CHECK(N) DECLARE SUB CHECK(N)
CLS CLS
INPUT”ENTER A NUMBER”;NUM INPUT”ENTER A NUMBER”;NUM
C=CHECK(N) CALL CHECK(NUM)
END END
SUB CHECK(A) SUB CHECK(N)
FOR I=2 TO N/2 FOR I=2 TO N/2
IF N MOD 1=0 THEN IF N MOD I=0 THEN
C=C+2 C=C+1
END IF END IF
WEND NEXT I
IF C>0 THEN IF C>0 THEN
PRINT”IT IS COMPOSITE” PRINT”IT IS COMPOSITE”
ELSE ELSE
PRINT”IT IS PRIME” PRINT”IT IS PRIME”
END IF END IF
END SUB END SUB

26. [SLC 2067] [SLC 2067]


REM to display all the records from sequential data file REM to display all the records from sequential data file
ABC.DAT ABC.DAT
OPEN “ABC.DAT” FOR OUTPUT AS # 1 OPEN “ABC.DAT” FOR INPUT AS # 1
DO WHILE NOT EOF(“ABC.DAT”) DO WHILE NOT EOF(1)
INPUT # 1,N$,A INPUT # 1,N$,A
PRINT N$,A PRINT N$, A
CLOSE 1 LOOP
END CLOSE # 1
END

https://seeqbasicomputer.blogspot.com/ 90 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
27. [SLC 2068 S] [SLC 2068 S]
Rem to display the contents of a data file. Rem to display the contents of a data file.
OPEN “Marks.dat” FOR OUTPUT AS #1 OPEN “Marks.dat” FOR INPUT AS #1
CLS CLS
WHILE EOF(1) WHILE NOT EOF(1)
INPUT #1, Name$, Age, Add$ INPUT #1, Name$, Age, Add$
DISPLAY Name$, Age, Add$ PRINT Name$, Age, Add$
WEND WEND
CLOSE 1 CLOSE #1
END END
28. [SLC 2069] [SLC 2069]
REM display Records of students From Data File REM display Records of students From Data File
OPEN “STDREC.DAT” FOR INP AS #1 OPEN “STDREC.DAT” FOR INPUT AS #1
PRINT PRINT “ROLL”, “NAME”, “ADDRESS”, “CLASS”,
“ROLL”,”NAME”,”ADDRESS”,”CLASS”,”SECTION” “SECTION”
DO WHILE NOT EOF DO WHILE NOT EOF(1)
INPUT #1,RN,N$,AD$,CL,S$ INPUT #1, RN, N$, AD$, CL, S$
PRINT RN,N$,AD$,CL,S$ PRINT RN, N$, AD$, CL, S$
NEXT LOOP
CLOSE #1 CLOSE #1
END END
29. [SLC 2066 S] [SLC 2066 S]
REM To store Name, post and salary REM To store Name, post and salary
OPEN “EMP.DOC” FOR OUT AS #1 OPEN “EMP.DOC” FOR OUTPUT AS #1
INPUT” Enter name”;N INPUT” Enter name”;N$
INPUT” Enter post”;P$ INPUT” Enter post”;P$
INPUT “Enter salary”;S INPUT “Enter salary”;S
WRITE #2, N$,P$, S WRITE #1, N$, P$, S
CLOSE #1 CLOSE #1
END END
30. REM COPY THE DATA OF “SRC.INF” TO REM COPY THE DATA OF “SRC.INF” TO “DEST.INF”
“DEST.INF” OPEN “SRC.INF” FOR INPUT AS #1
OPEN “SRC.INF” FOR INPUT AS #1 OPEN “DEST.INF” FOR OUTPUT AS #2
OPEN “DEST.INF” FOR OUTPUT AS #2 CLS
CLS WHILE NOT EOF( 1)
WHILE NOT EOF( ) INPUT #1, NM$, RN, AGE
INPUT #2, NM$, RN, AGE WRITE #2, NM$, RN, AGE
WRITE #1, NM$, RN, AGE WEND
CLOSE #1, #2 CLOSE #1, #2
END END
31. [SLC 2070 S] OPEN "STUDENT.DAT" FOR APPEND AS #1
OPEN "STUDENT.DAT" FOR APPEND AS 1# INPUT "NAME"; N$
INPUT "NAME"; N$ INPUT "ADDRESS"; ADD$
INPUT "ADDRESS"; ADD$ INPUT "AGE"; AGE
INPUT "AGE"; AGE$ WRITE #1, N$, ADD$, AGE
WRITE #1, N$, ADD$, AGE CLOSE # 1
END# 1 END
STOP

32. [SEE 2075 U]


REM program to read data from the data file. REM program to read data from the data file.
OPEN “STD.DAT” FOR OUTPUT AS #1 OPEN “STD.DAT” FOR INPUT AS #1
CLS CLS
WHILE NOT EOF(#1) WHILE NOT EOF(1)
WRITE#1, N$, R, C, P INPUT #1, N$, R, C, P
PRINT N$, R, C, P PRINT N$, R, C, P
WEND WEND
CLOSE “STD.DAT” CLOSE #1
END END

https://seeqbasicomputer.blogspot.com/ 91 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
33. [SEE 2074 U]
Rem To print only class 10 record from "student.dat" Rem To print only class 10 record from “student.dat”
CLS CLS
OPEN "I",#2, "Student.Dat" OPEN “I” , #2 , “Student.Dat”
WHILE NOT EOF (#2) WHILE NOT EOF (2)
WRITE#2, N$,C,R INPUT #2, N$, C, R
IF C=10 THEN IF C=10 THEN
DISPLAY N$,C,R PRINT N$, C, R
END IF END IF
NEXT WEND
CLOSE #2 CLOSE #2 END
END
34. [SQE 2075K]
REM to copy from old file to new file REM to copy from old file to new file
OPEN "info.dat" for INPUT AS #1 OPEN "info.dat" for INPUT AS #1
OPEN "temp.dat" for OUTPUT AS #2 OPEN "temp.dat" for OUTPUT AS #2
DO UNTIL EOF(1) DO UNTIL EOF(1)
INPUT #2, n$, p$, d$, s INPUT #1, n$, p$, d$, s
WRITE #1, n$, p$, d$, s WRITE #2, n$, p$, d$, s
WEND LOOP
CLOSE #2, #2 CLOSE #1, #2
END END
35. [SQE 2074K]
REM to print only male record on the printer from the REM to print only male record on the printer from the
data file. data file.
OPEN "EMP.DAT" FOR OUTPUT AS #1 OPEN "EMP.DAT" FOR INPUT AS #1
DO DO
INPUT #4, N$, A%, S$ INPUT #1, N$, A%, S$
SELECT CASE S SELECT CASE S$
CASE MALE CASE "MALE"
PRINT N$, A%, S$ PRINT N$, A%, S$
END SELECT END SELECT
LOOP UNTIL EOF(1) LOOP UNTIL EOF(1)
STOP #1 CLOSE #1
END

https://seeqbasicomputer.blogspot.com/ 92 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Analytical Questions [40]
1. DECLARE SUB TEST(A, B, C)
LET X=4
LET Y=7
LET Z=12
CALL TEST (X, Y, Z)
PRINT X, Y, Z
END

SUB TEST(A, B, C)
A=A+3
B=B+2
SUM=A+B+C/3
PRINT SUM
END SUB
i) What happens if CALL TEST(X, Y, Z) is replaced by CALL TEST(A, B, C)
Ans: If CALL TEST(X, Y, Z) is replaced by CALL TEST(A, B, C) then the output will be:
5
4 7 12
ii) List the formal and real parameters used in the above program.
Ans: Formal Parameters = A, B, C
Real Parameters = X, Y, Z

2. DECLARE SUB question (a, b, c)


x=10 : y=20 : z=15
CALL question (x, y, z)
END
SUB question (a, b, c)
a=a+10
b= b + a
c=a +b
PRINT a, b, c
END SUB
i. Write actual and formal parameter used in the program.
Ans: Actual parameter = x, y, z
Formal parameter = a, b, c
ii. What would be its output if x=1, y=2,z=3?
Ans: The output will be:
11 13 24

3. DECLARE SUB SEQUENCE (A,B,C)


CLS
X=10
Y=20
Z=30
CALL SEQUENCE (X,Y,Z)
END
SUB SEQUENCE (C,B,A)
PRINT A,B,C
END SUB
i. List the formal parameters and actual parameters used in the above program.
Ans: Formal parameter = C, B, A
Actual parameter = X, Y, Z
ii. Will the above program execute if the position of parameter is to be changed? If ‘yes’ then which
sequence of number list will it print either 10,20,30 or 30,20,10?
Ans: it will print 30, 20, 10

https://seeqbasicomputer.blogspot.com/ 93 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
4. [SEE 2075 S2]
DECLARE SUB TRIM (W$)
CLS
INPUT "Enter word" ; WO$
CALL TRIM (WO$)
END
SUB TRIM (WO$)
FOR I = 1 TO LEN (W$)
PRINT LEFT$ (W$, I)
NEXT I
END SUB
i. What will be the output if input string is "SEE" in the above program?
Output
S
SE
SEE
ii. List the real parameter used in the above program.
Ans: Real parameter is WO$
5. DECLARE FUNCTION ADD(N)
CLS
FOR CNT= 1 TO 3
READ NUM
PRINT ADD (NUM)
NEXT CNT
DATA 8, 7, 3
END
FUNCTION ADD(N)
S=0
FOR G=1 TO N
S=S+G
NEXT G
ADD=S
END FUNCTION
i. Name the actual and formal parameter used in above program.
Ans: Actual parameter = NUM
Formal parameter = N
ii. What is the value of NUM when the value of CNT is 2?
Ans: The value of NUM will be 7 when the value of CNT is 2.
6. [SQE 2075K]
DECLARE SUB SERIES(A, R, N)
CLS
INPUT "ENTER FIRST TERM"; X
INPUT "NUMBER OF TERMS TO BE GENERATED:"; Z
CALL SERIES (X,Y,Z)
END

SUB SERIES (A, R, N)


FOR I = 1 TO N
PRINT A
A=A*R
NEXT
END SUB
a. What will be the output if the user input 3, 2 and 4 for variables X, Y and Z variables?
Ans: The output will be
3
6
12
24
b. What type of parameter X, Y and Z are?
Ans: X, Y and Z are actual parameters.
https://seeqbasicomputer.blogspot.com/ 94 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
7. [SLC 2069]
DECLARE SUB EXAM (N$)
INPUT "Enter Word", WO$
CALL EXAM (WO$)
END
SUB EXAM(N$)
FOR I=1 TO LEN (N$)
PRINT RIGHT$(N$,1)
NEXT I
END SUB
i. Write the names of two built in functions used in the program.
Ans: The names of two built in functions are LEN and RIGHT$
ii. List the real parameter and formal parameter in the program.
Ans: The real parameter is WO$ and formal parameter is N$
8. DECLARE FUNCTION NUM(N)
N=14
PRINT NUM(N)
END
FUNCTION NUM(N)
WHILE N<>0
R=N MOD 2
S=S+R*10^P
P=P+1
N=N\2
WEND
NUM=S
END FUNCTION
i. List the local variable used in the function procedure.
Ans: The local variables are N, R, S and P
ii. What will be the output if the program?
Ans: The output is: 1110
9. DECLARE SUB SERIES(A, B)
DECLARE FUNCTION SUM(P,Q)
COMMON SHARED N
INPUT “Enter First Term”;X
INPUT “Enter Second Term”;Y
INPUT “Enter Number of Terms to be generated”; N
CALL SERIES(X, Y)
END
SUB SERIES (A, B)
FOR I = 1 TO N
PRINT A
A=SUM(A,B)
NEXT I
END SUB
FUNCTION SUM (P,Q)
SUM=P+Q
END FUNCTION
i. What will the output if X=10, Y=8 and N=5.
The output is
10
18
26
34
42
ii. List out the local variables and global variable in the above program.
Ans: Local variables = A, B, I, P and Q Global variables = X, Y and N
https://seeqbasicomputer.blogspot.com/ 95 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
10. [SLC 2066]
DECLARE FUNCTION Num(N)
INPUT N
S=Num(N)
PRINT S
END

FUNCTION Num(N)
X=Int(17/N)
Y=15 MOD N
Num=X +Y
END FUNCTION
i. Write the name of the function used in the above program.
Ans: The name of the function is Num.
ii. List out the mathematical function (Library function) used in the above program.
Ans: The library function is Int( )

11. [SLC 2065]


DECLARE FUNCTION xyz(N)
FOR I = 1 TO 5
READ N
Z=xyz(N)
S=S+Z
NEXT I
PRINT S
DATA 10,13,15,4,6
END
FUNCTION xyz(N)
IF N MOD 2=0 THEN xyz=N
END FUNCTION
a) What is the name of the function used in the above program?
Ans: The name of the function is xyz
b) How many times the function will be called in the above program?
Ans: The function will be called 5 times.

12. [SLC 2065 S]


DECLARE FUNCTION Diff(A,B)
CLS
INPUT “Enter first number”;A
INPUT “Enter second number”;B
PRINT “The difference of the two number=”;Diff(A,B)
END
FUNCTION Diff(A,B)
D=A-B
Diff=D
END FUNCTION
i. What will be the output of the program if the user enters 200 as the first number and 100 as the second
number.
Ans: The output is:
The difference of the two number=100
ii. Will the program run if the first line (i.e. DECLARE…..) is deleted?
Ans: Yes, the program will run if the first line (i.e. DECLARE…) is deleted.

https://seeqbasicomputer.blogspot.com/ 96 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
13. [SEE 2073]
DECLARE FUNCTION Diff (A, B)
CLS
INPUT "Enter first number" ; A
INPUT "Enter second number" ; B
PRINT "The difference" ; Diff (A, B)
END
FUNCTION Diff (A, B)
difference = A - B
Diff = difference
END FUNCTION.
a) List all the numeric variables used in the above program.
Ans: The numeric variables are A, B and difference.
b) List the local variables used in the above program.
Ans: The local variables are A, B and difference

14. [SEE 2067 S]

DECLARE FUNCTION Prod(A,B)


CLS
INPUT “Enter first number:”;A
INPUT “Enter second number:”;B
PRINT “the product of two number=”;Prod(A,B)
END
FUNCTION Prod(A,B)
P=A*B
Prod=P
END FUNCTION
a) List all the numerical variables used in the program.
The numerical variables are A, B and P
b) List all the local variables used in the program.
The local variable is P

15. [SEE 2073 U]


DECLARE FUNCTION SUM (A, B)
INPUT A
INPUT B
X = SUM (A, B)
PRINT X
END
FUNCTION SUM (A, B)
S = A+B
SUM = S
END FUNCTION.
a) Write the name of local variable used in the above FUNCTION procedure.
Local Variable: S
b) Write the Mathematical operator and Relation operator used in above program.
Mathematical Operator : +
Relational Operator : =

https://seeqbasicomputer.blogspot.com/ 97 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
16. [SLC 2072]
DECLARE FUNCTION Prod (N)
INPUT "Any Number"; N
X = Prod (N)
PRINT x
END
FUNCTION Prod (N)
F= 1
FOR K = 1 TO N
F=F*K
NEXT K
Prod = F
END FUNCTION
a) Write the name of the user defined function used in above program.
Ans: The name of the user defined function used in above program is Prod.
b) Name the loop in above program?
Ans: The name of loop is FOR….NEXT loop.
[SLC 2069 S]
17. DECLARE FUNCTION CHK$(N)
N=57
PRINT “The number is”; CHK$(N)
END
FUNCTION CHK$(N)
FOR I = 1 TO N
IF N MOD I = 0 THEN C=C+1
NEXT I
IF C>2 THEN
CHK$=”Composite”
ELSE
CHK$=”Prime”
END IF
END FUNCTION
i. Will the above program execute if “DECLARE FUNCTION….” is deleted.
Ans: Yes, the program will run if the first line (i.e. DECLARE…) is deleted.
ii. Why $ sign is used in the name of the above function.
Ans: $ sign is used in the name of the above function because the function returns string value.
18. [SQE 2074K]
DECLARE SUB PATTRA (N)
N=7
CALL PATTRA(N)
END
SUB PATTRA(N)
FOR I = 1 to 5
PRINT N
IF N MOD 2 = 1 THEN
N = (N*2) + 1
ELSE
N=N/2
END IF
NEXT I
END SUB
a) Write the output of the above program?
Ans: The output is:
7
15
31
63
127
b) Write down the function of MOD in the above program.
Ans: The function of MOD operator is to find the remainder.
https://seeqbasicomputer.blogspot.com/ 98 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
19. [SLC 2068]
Declare function count(N$)
Input “Enter a word”; R$
C= Count(R$)
Print C
END
Function count(N$)
For k=1 to LEN(n$)
X$=MID$(N$,K,1)
IF UCASE$(X$)=”A” then
X=X+1
End if
Next K
Count = X
End function
i) List any two library functions used in the above program.
Ans: Any two library functions are LEN( ) and MID$( ).
ii) Write the use of variable ‘C’ inline 3 [i.e. C=Count(R$)] given in the above program.
Ans: The use of variable ‘C’ is to store the value returned by the function count.
20. [PMT 2075]
DECLARE SUB OT (N$)
N$ = "Computer Science"
CALL OT(N$)
END
SUB OT (N$)
B = LEN(N$)
c=1
WHILE c <= B
m$ = MID$(N$, c, 1)
PRINT m$;
c=c+2
WEND
END SUB
a. What is the value of B in the above program?
Ans: The value of B is 16 in the above program.
b. How many parameters are used in the above sub procedure?
Ans: Only one parameter is used in the above program.
21. [SLC 2066 S]
DECLARE FUNCTION COUNT(A$)
Input “Enter a word”; W$
END
Function Count(A$)
B=LEN(A$)
C$=UCASE$(A$)
FOR I=1 TO B
E$=MID$(C$,I,1)
IF E$=”A” OR E$=”E” OR E$=”I” OR E$=”O” OR E$=”U” THEN C=C+1
END IF
NEXT I
COUNT=C
END FUNCTION
i. List the string Library functions used in the above program.
Ans: The string Library functions used in the above program are LEN( ), UCASE$( ) and MID$( ).
ii. Write down the missing statements in the main module to execute the program.
Ans: The missing statements in the main module to execute the program is PRINT COUNT(W$)

https://seeqbasicomputer.blogspot.com/ 99 | P a g e
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
22. [SLC 2071]
DECLARE SUB Stde(N$U)
FOR Loop = 1 TO 5
READ NM$(Loop)
NEXT Loop
DATA RAMA, PRATIMA, PRASANT
DATA NISHA, RUDHRA
CALL Stde(NM$U)
END

SUB Stde(N$U)
PRINT “Name starting from P”
FOR J = 1 TO 5
C$=MID$(N$,(J),1,1)
IF C$=”P” THEN
PRINT N$(J)
END IF
NEXT J
END SUB
i. List the library function used in the above program.
Ans: The library function used in the above program is MID$( ).
ii. List the conditional statement used in the above program.
Ans: The conditional statement used in the above program is IF….THEN (i.e. IF C$ = “P” THEN).

23. [SLC 2068 S]


DECLARE SUB ABC(X,Y,Z)
FOR P=1 TO 3
READ A,B,C
CALL ABC(A,B,C)
NEXT P
DATA 5,4,3,2,1,6,7,8,4
END
SUB ABC(X,Y,Z)
T=X+Y+Z
IF T MOD 2 = 0 THEN
PRINT T
END IF
END SUB
i. List any two variables used in the above program.
Ans: Any two variables used in the above program are X and Y
ii. How many times SUB-procedure will be called when program is executed?
Ans: The SUB procedure will be called 3 times.

https://seeqbasicomputer.blogspot.com/ 100 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
24. [SLC 2071 S]
DECLARE FUNCTION JPT (N)
FOR ctr = 1 TO 6
READ N
J = JPT (N)
Sum = Sum + J
NEXT ctr
PRINT Sum
DATA 10, 20, 30, 40, 50, 60
END

FUNCTION JPT (N)


IF N MOD 2 = 0 THEN JPT = N
END FUNCTION
a) What is name to the function used in the above program?
Ans: The name of the function used in the above program is JPT
b) How many times the function will be executed in the above program?
Ans: The function will be executed six times.

25. DECLARE FUNCTION B(N)


LET N = 12345
PRINT "Sum of Digits :"; B(N)
END
FUNCTION B(N)
WHILE N <> 0
R = N MOD 10
C = C+R
N = INT(N/10)
WEND
B=C
END FNCITON
i. Write the variables used in the program with their type.
Ans: Numeric variables = N, R and C
ii. List out the different types of operators with their type used in the program.
Ans: Arithmetic Operator = MOD, + and / : Relational Operator = < > and =
26. DECLARE SUB WORD (N$)
N$="PABSON”
CALL WORD (N$)
END
SUB WORD (N$)
B=LEN (N$)
C=1
WHILE C < B
M$=MID$(N$, C, 1)
PRINT M$
C=C+2
WEND
END SUB
i) List the string and numeric variables used in the program.
Ans: String variables = N$ and M$
Numeric variables = C and B
ii) What is the value of B in the above program?
Ans: The value of B = 6

https://seeqbasicomputer.blogspot.com/ 101 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
27. DECLARE SUB SUM (N)
N=5
CALL SUM (N)
END
SUB SUM (N)
FOR X = 1 TO N
S=S+X
NEXT X
PRINT S
END SUB
a) In the above program how many times does the FOR ........ NEXT loop executes ?
The FOR … NEXT loop executes 5 times.
b) Write the name of the procedure used in the above program.
The name of the procedure used in the above program is SUM.

28. DECLARE FUNCTION CUBE(T,R)


N=15
S=CUBE (2,4)
PRINT “CUBE=”; S
END
FUNCTION CUBE(P, M)
CUBE = P^3
N=5*2
END FUNCTION
i. How many parameters are used in above program?
Ans: One parameter is used.
ii. List two mathematical operators used in the above program.
Ans: Any two mathematical operators are ^ and *.

29. [SEE 2074 U]


DECLARE FUNCTION TEST (X)
X = 100
Z = TEST (X)
PRINT Z
END
FUNCTION TEST (X)
FOR I = 1 TO X
S = S +I
NEXT I
TEST = S
END FUNCTION.
a) How many parameters are used in the above program?
1 parameter is used in above program.
b) How many times does the statement S=S+I get executed in the above program.
The statement S=S+I gets executed 100 times.

https://seeqbasicomputer.blogspot.com/ 102 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
30. DECLARE FUNCTION A(X)
X=5
Z=A(X)
PRINT Z
END
FUNCTION A(X)
FOR I = 1 TO X
S=S+I
NEXT I
A=S
END FUNCTION
a) How many parameters are used in the program?
Ans: One parameter is used.
b) How many times execute the expression S=S+I in the above program?
Ans: The expression S=S+I will be executed five times in the above program
c) If the line S = S + I is changed to S = S + I ^ 2 then find the output.
Ans: The output is: 15

31. DECLARE FUNCTION Highest (M, N)


M=5 : N=10
PRINT Highest (M, N)
END
FUNCTION Highest(T,P)
While P<>0
R=T MOD P
T=P
P=R
Wend
Highest=T
End Function
i.What is the value the function returns in this program?
The function will return the value 5.
ii.What will happen if R=T Mod P is replaced by R=P MOD T?
Ans: The output is 10

32. DECLARE FUNCTION B (N)


INPUT “ENTER A NUMBER”; N
PRINT “THE EQUIVALENT NUMBER IS = “; B(N)
END
FUNCTION B (N)
WHILE N<>0
r = N MOD 2
j$ = STR$(r)
SUM$ = j$ + SUM$
N = N\2
WEND
B = VAL(SUM$)
END FUNCTION
i. What will be the output of the program, if the value is 9?
The output is 9
ii. What is the use of VAL function in the above program?
VAL will convert the string value to numeric value.

https://seeqbasicomputer.blogspot.com/ 103 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
33. [SLC 2067]
DECLARE SUB SUM(N)
INPUT”ANY NUMBER”;N
CALL SUM(N)
END
SUB SUM(N)
S=0
WHILE N<>0
R=N MOD 10
S=S+R
N=N\10
WEND
PRINT “SUM”;S
END SUB
a) In which condition the statements within the WHILE….WEND looping statement will not be executed?
Ans: When the condition is false (i.e. Value of N=0) , the statements within the WHILE….WEND looping
statement will not be executed
b) Will the output be the same if we place “/” instead of”\” in the above program.
Ans: No. the output will not same if we place “/” instead of”\” in the above program.

34. DECLARE SUB take(x, y)


CLS
FOR i = 1 TO 5
READ c, d
CALL take(c, d)
NEXT i
DATA 13, 15, 16, 12, 31, 12, 16, 17, 21, 22
END
SUB take(a, b)
STATIC s
IF a > b THEN
s=s+a
ELSE
s=s+b
END IF
PRINT s;
END SUB
a) If the statement STATIC s is removed, then what will be the change in its output?
Ans: The statement STATIC s is removed, then the output will be:
15 16 31 17 22
b) List out the formal arguments and actual arguments from the above program.
Ans: Formal arguments = a, b
Actual arguments = c, d

https://seeqbasicomputer.blogspot.com/ 104 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
35. [SLC 2064]
DECLARE FUNCTION CELLS$(W$)
W$=”CYBER”
PRINT CELL$(W$)
END
FUNCTION CELL$
K=LEN(W$)
FOR I = K TO 1 STEP -2
M$=M$+MID$(W$,I,1)
NEXT I
CELLS$=M$
END FUNCTION
a) Why is $(dollar) sign followed in the function name?
Ans: $(dollar) sign followed in the function name because the function returns string value.
b) What will be the output of the program when it is executed?
Ans: The output is : CBR
c) What will be the output of the program when FOR loop is changed as FOR I= 1 TO K STEP 2?
Ans: The output is: RBC
d) What is the name of sign “+” used in the program and what operation does it perform?
Ans: The name of sign “+” is string operator and it is used to join the string i.e. string concatenation.
36. [SLC 2070]
DECLARE FUNCTION Sum(A,B)
INPUT “Enter first number:”; A
INPUT “Enter second number:”; B
PRINT “The sum of the two number=”;Sum(A,B)
END
FUNCTION SUM(A,B)
S=A+B
Sum=S
END FUNCTION
a) List the numerical variables used in the above program.
Ans: The numerical variables used in the above program are S, A and B.
b) Will the program run if the first line (i.e. DECLARE….) is deleted?
Ans: Yes, the program will run if the first line (i.e. DECLARE….) is deleted
37. [SLC 2070 S]
DECLARE FUNCTION rev$ (N$)
INPUT "Any string"; N$
PRINT rev$ (N$)
END
FUNCTION rev$ (N$)
FOR X = LEN (N$) to 1 STEP -1
A$=MID$ (N$, X, 1)
B$ = B$ + A$
NEXT X
rev$ = B$
END FUNCTION
a. List the library function used in the above program.
Ans: The library function used in the above program are LEN( ) and MID$( )
b. What will be the maximum value of X if the N$ is equal to "Computer".
Ans: be the maximum value of X if the N$ is equal to "Computer" is 8.

https://seeqbasicomputer.blogspot.com/ 105 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
38. [SEE 2074]
DECLARE FUNCTION SUM (N)
INPUT "Enter any number", N
S = SUM (N)
PRINT "The Sum of individual digit is:", S
END
FUNCTION SUM (N)
WHILE N > 0
R = N MOD 10
T=T+R
N = N\10
WEND
SUM = T
END FUNCTION.
State the purpose of using variable S in line 4 in above program.
Ans: The purpose of using variable S in line 4 in above program is to store the value returned by the function SUM.
Write the use of MOD in above program.
Ans: The use of MOD operator is to return the remainder.

39. [SEE 2075 U]


DECLARE SUB TEST (N$ )
INPUT N$
CALL TEST ( N$ )
END
SUB TEST (N$ )
FOR P = 1 TO LEN ( N$ )
B$ = MID$ (N$, P, 1)
IF LCASE$ (B$) = “a” THEN
C=C+1
END IF
NEXT P
PRINT C
END SUB
a) Write the name of the sub procedure used in the above program.
Ans: The name of the sub procedure used in the above program is TEST
b) Write any two library functions used in the above program.
Ans: Any two library functions used in the above program are MID$( ) and LEN( )

40. [MM 2076]


DECLARE FUNCTION SUM (N)
FOR I = 1TO 4
READ N
DATA 15 ,25, 69
PRINT SUM (N)
NEXT
END
FUNCTION SUM(N)
S=0
WHILE N<>0
R=N MOD 10
S=S+R
N=INT (N\10)
WEND
SUM=S
END FUNCTION
a) How many times the main function will be executed in the above program?
Ans: The main function will be executed 4 times.
b) List the relational operators used in the above proram?
Ans: The relational operators used are : = and < >

https://seeqbasicomputer.blogspot.com/ 106 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Qbasic Programming Questions [180]
1. Using FUNCTION…END 2. Write a program using SUB to find 3. Using FUNCTION, write a program
FUNTION, write a program to the average of any two numbers given to calculate the sum, product, average
calculate the average of three numbers by the user. and difference of two numbers.

DECLARE FUNCTION AVERAGE (A, DECLARE SUB AVERAGE (A, B) DECLARE FUNCTION SUM (A, B)
B, C) CLS DECLARE FUNCTION DIFF (A, B)
CLS INPUT “ENTER FIRST NUMBER”; A DECLARE FUNCTION PROD (A, B)
INPUT “ENTER FIRST NUMBER”; A INPUT “ENTER SECOND NUMBER”; DECLARE FUNCTION AVERAGE (A,
INPUT “ENTER SECOND NUMBER”; B B)
B CALL AVERAGE (A, B) CLS
INPUT “ENTER THIRD NUMBER”; C END INPUT “ENTER FIRST NUMBER”; A
PRINT “AVERAGE OF THREE INPUT “ENTER SECOND NUMBER”;
NUMBERS”; AVERAGE (A, B, C) SUB AVERAGE (A, B) B
AV = (A + B) / 2 PRINT “SUM OF TWO NUMBERS”;
FUNCTION AVERAGE (A, B, C) PRINT “AVERAGE OF TWO SUM (A, B)
AVERAGE = (A + B + C) / 3 NUMBERS”; AV PRINT “DIFFERENCE OF TWO
END FUNCTION END SUB NUMBERS”; DIFF (A, B)
PRINT “PRODUCT OF TWO
4. Using FUNCTION, write a program 5. Write a program in QBASIC to find NUMBERS”; PROD (A, B)
to input any five numbers and display square of a given number using PRINT “AVERAGE OF TWO
their sum using array (DIM) FUNCTION…..END FUNCTION. NUMBERS”; AVERAGE (A, B)
DECLARE FUNCTION SUM (N ( )) END
CLS DECLARE FUNCTION SQUARE (N)
DIM N( 5) CLS FUNCTION SUM (A, B)
FOR I = 1 TO 5 INPUT “ENTER ANY NUMBER”; N SUM = A + B
INPUT "Enter any 5 numbers"; N (I) PRINT “SQUARE OF NUMBER “; END FUNCTION
NEXT I SQUARE (N)
PRINT "Sum of any 5 numbers is"; END FUNCTION DIFF (A, B)
SUM(N ( )) DIFF = A - B
END FUNCTION SQUARE (N) END FUNCTION
FUNCTION SUM (N ( )) SQUARE = N ^ 2
FOR I = 1 TO 5 END FUNCTION FUNCTION PROD (A, B)
S = S + N (I) PROD = A * B
NEXT I END FUNCTION
SUM = S
END FUNCTION FUNCTION AVERAGE (A, B)
AVERAGE = (A + B) / 2
END FUNCTION
6. Write a program in QBASIC to find 7. Write a program in QBASIC to find 8. Write a program in QBASIC to find
square root of a given number using cube of a given number using cube root of a given number using
SUB…..END SUB. SUB…..END SUB. FUNCTION…..END FUNCTION.

DECLARE SUB SQROOT (N) DECLARE SUB CUBE (N) DECLARE FUNCTION CBROOT (N)
CLS CLS CLS
INPUT “ENTER ANY NUMBER”; N INPUT “ENTER ANY NUMBER”; N INPUT “ENTER ANY NUMBER”; N
CALL SQROOT (N) CALL CUBE (N) PRINT “CUBE ROOT OF NUMBER “;
END END CBROOT (N)
END
SUB SQROOT (N) SUB CUBE (N)
S = N ^ (1 / 2) C=N^3 FUNCTION CBROOT (N)
PRINT “SQUARE ROOT OF NUMBER PRINT “CUBE OF NUMBER “; C CBROOT = N ^ (1 / 3)
“; S END SUB END FUNCTION
END SUB

https://seeqbasicomputer.blogspot.com/ 107 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

9. Write a program in QBASIC to find 10. Write a program to calculate and 11. Using FUNCTION, write a
the sum of cube of two input numbers print the simple interest using program to calculate distance travelled
using SUB…..END SUB FUNCTION……END FUNCTION. by a body. (Hint: s=ut+ (1/2) at2)

DECLARE SUB CUBE (A, B,) DECLARE FUNCTION INTEREST (P, DECLARE FUNCTION DISTANCE (U,
CLS T, R) T, A)
INPUT “ENTER FIRST NUMBER”; A CLS CLS
INPUT “ENTER SECOND NUMBER”; INPUT “ENTER PRINCIPAL”; P INPUT “ENTER INITIAL
B INPUT “ENTER TIME”; T VELOCITY”; U
CALL CUBE (A, B) INPUT “ENTER RATE”;R INPUT “ENTER TIME”; T
END PRINT “SIMPLE INTEREST=”; INPUT “ENTER ACCELARATION”; A
INTEREST (P, T, R) PRINT “DISTANCE TRAVELLED = “;
SUB CUBE (A, B) END DISTANCE (U, T, A)
C=A^3+B^3 END
PRINT “SUM OF CUBE OF TWO FUNCTION INTEREST (P, T, R)
NUMBERS “; C I = P* T * R / 100 FUNCTION DISTANCE (U, T, A)
END SUB INTEREST = I DISTANCE = U * T + 1 / 2 * A * T ^ 2
END FUNCTION END FUNCTION

12. Using FUNCTION……END 13. Using FUNCTION……END 14. Write a program using
FUNCTION, write a program to read FUNCTION, write a program to input SUB……END SUB to find the area of
perpendicular and base of a right cost price and selling price from the rectangle. [A=L*B]
angled triangle to find hypoteneous. keyboard to calculate profit.
DECLARE SUB AREA (L, B)
DECLARE FUNCTION HYP(P, B) DECLARE FUNCTION PROFIT (CP, CLS
CLS SP) INPUT “ENTER LENGTH”; L
INPUT "ENTER PERPENDICULAR"; CLS INPUT “ENTER BREADTH”; B
P INPUT “ENTER COST PRICE”; CP CALL AREA (L, B)
INPUT "ENTER BASE"; B INPUT “ENTER SELLING PRICE”; SP END
PRINT "HYPOTENUSE="; HYP (P, B) PRINT “PROFIT AMOUNT=”; PROFIT
END (CP, SP) SUB AREA (L, B)
FUNCTION HYP (P, B) END A=L*B
HYP = (P ^ 2 + B ^ 2) ^ (1 / 2) FUNCTION PROFIT (CP, SP) PRINT “AREA OF RECTANGLE=”; A
END FUNCTION P = SP – CP END SUB
PROFIT = P
END FUNCTION
15. Write a program using 16. Write a program using 17.Write a program in QBASIC to
FUNCTION……END FUNCTION to SUB……END SUB to find the area find the area of four wall of a room
find the perimeter of rectangle. and perimeter of square. [P=4L] using FUNCTION…..END
[P=2(L+B)] [A=L2] FUNCTION.
DECLARE FUNCTION PER (L, B) DECLARE SUB AREA (L) DECLARE FUNCTION AREA (L, B,
CLS DECLARE SUB PERIMETER (L) H)
INPUT “ENTER LENGTH”; L CLS CLS
INPUT “ENTER BREADTH”; B INPUT “ENTER LENGTH”; L INPUT “ENTER LENGTH”; L
PRINT “PERIMETER OF CALL AREA (L) INPUT “ENTER BREADTH”; B
RECTANGLE”; PER (L, B) CALL PERIMETER (L) INPUT “ENTER HEIGHT”; H
END END PRINT “AREA OF FOUR WALLS”;
AREA(L, B, H)
FUNCTION PER (L, B) SUB AREA (L) END
PER = 2 * (L + B) A=L^2
END FUNCTION PRINT “AREA OF SQUARE”; A FUNCTION AREA (L, B, H)
END SUB A = 2 * H * (L + B)
AREA = A
SUB PERIMETER (L) END FUNCTION
P=4*L
PRINT “PERIMETER OF SQUARE”; P
END SUB

https://seeqbasicomputer.blogspot.com/ 108 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
18.Write a sub program cost (l,b,h,c) to 19.Write a program using 20.Write a program to calculate the
find the cost of painting the four walls of FUNCTION…END FUNCTION to area of triangle by using
a room. find area of the triangle. SUB…..END SUB.
[Hints:
DECLARE SUB AREA (L, B, H, C) DECLARE FUNCTION AREA (B, H)
Area=
s(s − a )(s − b)(s − c ) ]
CLS CLS
INPUT “Enter Length”; L INPUT “ENTER BREADTH”; B
INPUT “Enter Breadth”; B INPUT “ENTER HEIGHT”; H DECLARE SUB AREA (A, B, C)
INPUT “Enter Height”; H PRINT “AREA OF TRIANGLE ”; CLS
INPUT “Enter Cost”; C AREA( B, H) INPUT “ENTER VALUE FOR FIRST
CALL AREA (L, B, H, C) END SIDE ”; A
END INPUT “ENTER VALUE FOR
FUNCTION AREA (B, H) SECOND SIDE ”; B
SUB AREA (L, B, H, C) A = 1 / 2 * (B * H) INPUT “ENTER VALUE FOR THIRD
A = 2 * H * (L + B) AREA = A SIDE ”; C
T=A*C END FUNCTION CALL AREA (A, B, C)
PRINT “Cost of painting area of four walls END
is”; T
END SUB SUB AREA (A, B, C)
S = (A + B + C) / 2
AR = (S * (S – A) * (S – B) * (S – C)) ^
(1 / 2)
PRINT “AREA OF TRIANGLE”; AR
END SUB
21.Write a program using SUB….END 22.Write a program using 23.Write a program using
SUB to get radius of circle and then print FUNCTION….END FUNCTION to FUNCTION…END FUNCTION to
its circumference. [C=2R] get radius of the circle and display get radius of circle and then print its
the area. area and circumference.
DECLARE SUB CIRCUM (R)
CLS DECLARE FUNCTION AREA (R) DECLARE FUNCTION AREA (R)
INPUT “ENTER RADIUS”; R CLS DECLARE FUNCTION CIRCUM (R)
CALL CIRCUM (R) INPUT “ENTER RADIUS”; R CLS
END PRINT “AREA OF CIRCLE ”; INPUT “ENTER RADIUS”; R
AREA(R) PRINT “AREA OF SQUARE ”;
SUB CIRCUM (R) END AREA(R)
C = 2 * 3.14 * R PRINT “CIRCLE OF
PRINT “CIRCUMFERENCE OF CIRCLE FUNCTION AREA (L, B) CIRCUMFERENCE”; CIRCUM (R)
”; C A = 3.14 * R ^ 2 END
END SUB AREA = A
END FUNCTION FUNCTION AREA (R)
AREA = 3.14 * R ^ 2
END FUNCTION

FUNCTION CIRCUM (R)


CIRCUM = 2 * 3.14 * R
END FUNCTION
24.Write a program to declare user 25.Using Function…… End 26.Using Sub…… End Sub, write a
defined function using Function, write a program to program to calculate area of sphere. [
FUNCTION……END FUNCTION to calculate volume of hemisphere. [ area = 4πr2]
calculate volume of cylinder. volume = 2/3 πR3] DECLARE SUB TSAREA (R)
DECLARE FUNCTION VOLUME (R, H) DECLARE FUNCTION VOLUME (R) CLS
CLS CLS INPUT “ENTER RADIUS”; R
INPUT “ENTER RADIUS”; R INPUT “ENTER RADIUS”; R CALL TSAREA(R)
INPUT “ENTER HEIGHT”; H PRINT “VOLUME OF HEMISPHERE END
PRINT “VOLUME OF CYLINDER ”; ”; VOLUME(R)
VOLUME(R, H) END SUB TSAREA (R)
END A= 4 * 3.14 * R ^ 2
FUNCTION VOLUME (R) PRINT “TOTAL SURFACE AREA OF
FUNCTION VOLUME (R, H) VOLUME = (2 / 3) * 3.14 * R ^ 3 SPHERE “; A
VOLUME = 3.14 * R ^ 2 * H END FUNCTION END SUB
END FUNCTION

https://seeqbasicomputer.blogspot.com/ 109 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
27.Write a function procedure to read 28.Write a program using Function 29.Write a program to create a
the side of a cube. Calculate its volume Module to calculate and print the procedure using SUB...END SUB to
and surface area. (Hint: vol=side 3 and volume of a box / cuboid. [ V=L*B*H] input the value of length, breadth and
sa=6 side2] height of a box. The program should
DECLARE FUNCTION VOLUME (L, calculate the area and volume of the
DECLARE FUNCTION TSAREA (L) B, H) box.
DECLARE FUNCTION VOLUME (L) CLS DECLARE FUNCTION TSAREA (L, B,
CLS INPUT “ENTER LENGTH”; L H)
INPUT “ENTER LENGTH”; L INPUT “ENTER BREADTH”; B DECLARE FUNCTION VOLUME (L,
PRINT “TOTAL SURFACE AREA OF INPUT “ENTER HEIGHT”; H B, H)
CUBE ”; TSAREA(L) PRINT “VOLUME OF CUBOID ”; CLS
PRINT “VOLUME OF CUBE ”; VOLUME(L, B, H) INPUT “ENTER LENGTH”; L
VOLUME(L) END INPUT “ENTER BREADTH”; B
END INPUT “ENTER HEIGHT”; H
FUNCTION VOLUME (L, B, H) PRINT “TOTAL SURFACE AREA OF
FUNCTION TSAREA (L) VOLUME = L * B * H CUBOID ”; TSAREA(L, B, H)
TSAREA = 6 * L ^ 2 END FUNCTION PRINT “VOLUME OF CUBOID ”;
END FUNCTION VOLUME(L, B, H)
END
FUNCTION VOLUME (L)
VOLUME = L ^ 3 FUNCTION TSAREA (L, B, H)
END FUNCTION TSAREA = 2 * (L * B + B * H + H * L)
END FUNCTION

FUNCTION VOLUME (L, B, H)


VOLUME = L * B * H
END FUNCTION
30.Write a program in QBASIC to 31.Solve a quadratic equation 32.Write a program using
find the total surface area of a box ax2+bx+c=0 on the basis of the Function…..End Function to get
using FUNCTION….END coefficient values a, b, and c using sub temperature in Celsius from the user
FUNCTION. −𝒃±√𝒃𝟐 −𝟒𝒂𝒄 and then print the temperature in
procedure. [𝒙 = ]
𝟐𝒂 Fahrenheit.(hint: F=9C/5+32)
DECLARE FUNCTION TSAREA (L, B, DECLARE FUNCTION CONVERT (C)
H) DECLARE SUB EQUATION (A, B, C) CLS
CLS CLS INPUT “ENTER TEMPERATURE IN
INPUT “ENTER LENGTH”; L INPUT "ENTER VALUE FOR A"; A CELCIUS”; C
INPUT “ENTER BREADTH”; B INPUT "ENTER VALUE FOR B"; B PRINT “TEMPERATURE IN
INPUT “ENTER HEIGHT”; H INPUT "ENTER VALUE FOR C"; C FARENHEIT=”; CONVERT (C)
PRINT “TOTAL SURFACE AREA OF CALL EQUATION (A, B, C) END
CUBOID”; TSAREA (L, B, H) END
END SUB EQUATION (A, B, C) FUNCTION CONVERT (C)
D = (B * B - 4 * A * C) ^ (1 / 2) F = 9 * C / 5 + 32
FUNCTION TSAREA (L, B, H) X = (-B + D) / 2 * A CONVERT = F
TSAREA = 2 * (L * B + B * H + H * L) Y = (-B - D) / 2 * A END FUNCTION
END FUNCTION PRINT "SOLUTION OF QUADRATIC
EQUATION ARE"; X; Y
END SUB
33.Write a program to input 34.Write a program to convert 35.Write a program to convert NC
Fahrenheit and convert it into Celsius USD(dollar) into NC (NEPALI (NEPALI currency) into IC (Indian
using SUB - END SUB. currency) using FUNCTION. Currency) using DECLARE SUB.
DECLARE SUB CONVERT (F) DECLARE FUNCTION CONVERT (D) DECLARE SUB CONVERT (NC)
CLS CLS CLS
INPUT “ENTER TEMPERATURE IN INPUT “ENTER CURRENCY VALUE INPUT “ENTER VALUE IN
FARENHEIT”; F IN DOLLAR”; D NEPALESE RUPEES”; NC
CALL CONVERT (F) PRINT “NEPALESE CURRENCY CALL CONVERT (NC)
END VALUE=”; CONVERT (D) END
SUB CONVERT (F) END SUB CONVERT (NC)
C = (F – 32) * (5 / 9) FUNCTION CONVERT (D) IC = NC / 1.6
PRINT “TEMPERATURE IN NC = D * 110 PRINT “INDIAN CURRENCY
CELCIUS=”; C CONVERT = NC VALUE=”; IC
END SUB END FUNCTION END SUB

https://seeqbasicomputer.blogspot.com/ 110 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
36.WRITE A PROGRAM to ask a 37.Write a program to input distance 38.Write a program to input days
number as paisa and convert them in kilometre and convert into meter and convert into years, months and
into corresponding rupees only solve using function procedure. days using sub procedure.
it using SUB Procedure.
DECLARE FUNCTION CONVERT DECLARE SUB CONVERT(D)
DECLARE SUB CONVERT (P) (K) CLS
CLS CLS INPUT “ENTER DAYS”; D
INPUT “ENTER VALUE IN PAISE”; INPUT “ENTER DISTANCE IN CALL CONVERT(D)
P KILOMETER”; K END
CALL CONVERT (P) PRINT “DISTANCE IN METER=”; SUB CONVERT (D)
END CONVERT (K) Y = D \ 365
END MO = D MOD 365
SUB CONVERT (P) M = MO \ 30
R = P / 100 FUNCTION CONVERT (K) D = MO MOD 30
PRINT “Rupees=”; R M = K * 1000 PRINT Y; “YEARS ” ; M;
END SUB CONVERT = M “MONTHS”; D; “DAYS”
END FUNCTION END SUB

39.Write a program to input seconds 40.Write a function convert (N) to 41.Write a program to input any
and convert into hours minutes and read a number in inches and convert number and check whether the given
seconds using sub procedure. it into feet and inches. no. is divisible by 3 and 7 or not using
[1 foot = 12 inches] function procedure.
DECLARE SUB CONVERT(S)
CLS DECLARE FUNCTION DECLARE FUNCTION CHECK$ (N)
INPUT “ENTER TIME IN CONVERT(N) CLS
SECONDS”; S CLS INPUT “Enter any number”; N
CALL CONVERT(S) INPUT "ENTER VALUE IN PRINT “The given number is ”;
END INCHES"; N CHECK$(N)
SUB CONVERT (S) PRINT CONVERT(N); "FEET"; IN; END
H = S \ 3600 "INCHES"
MI = S MOD 3600 END FUNCTION CHECK$ (N)
M = MI \ 60 FUNCTION CONVERT (N) IF N MOD 3 = 0 AND N MOD 7 = 0
S = MI MOD 60 SHARED IN THEN
PRINT H; “HOURS”; M; IN = N MOD 12 CHECK$ = “divisible by 3 and 7”
“MINUTES”; S; “SECONDS” CONVERT = N \ 12 ELSE
END SUB END FUNCTION CHECK$ = “not divisible by 3 and 7”
END IF
END FUNCTION
42.Using SUB…END SUB, write a 43.Write a program to declare a sub 44.Write a function program to find
program to test whether the given procedure module to decide whether whether the given number is perfect
number is completely divisible by 13 an input no is multiple of 5 or not. number or not.
or not. DECLARE FUNCTION PERFECT (N)
DECLARE SUB CHECK (N) CLS
DECLARE SUB CHECK (N) CLS INPUT "ENTER ANY NUMBER"; N
CLS INPUT “ENTER ANY NUMBER”; N PR = PERFECT (N)
INPUT “ENTER ANY NUMBER”; N CALL CHECK (N) IF PR = N THEN
CALL CHECK (N) END PRINT "PERFECT NUMBER"
END SUB CHECK (N) ELSE
SUB CHECK (N) IF N MOD 5 = 0 THEN PRINT "NOT PERFECT NUMBER"
IF N MOD 13 = 0 THEN PRINT “The given number is multiple END IF
PRINT “The given number is divisible of 5” END
by 13” ELSE FUNCTION PERFECT (N)
ELSE PRINT “The given number is not S=0
PRINT “The given number is not multiple of 5” FOR I = 1 TO N - 1
divisible by 13” END IF IF N MOD I = 0 THEN S = S + I
END IF END SUB NEXT I
END SUB PERFECT = S
END FUNCTION

https://seeqbasicomputer.blogspot.com/ 111 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
45.Write a sub program to find 46.Write a program to display only 47.Write a program to define a
whether the given number is perfect perfect square numbers between 1 to function procedure which returns
square number or not. 100 using SUB-END SUB. whether a input number is positive,
negative or zero using SGN function.
DECLARE SUB PERFECT (N) DECLARE SUB PERFECT ( ) DECLARE FUNCTION CHECK$ (N)
CLS CLS CLS
INPUT "ENTER ANY NUMBER"; N CALL PERFECT INPUT "Enter any number"; N
CALL PERFECT (N) END PRINT "The given number is ";
END SUB PERFECT () CHECK$(N)
SUB PERFECT (N) FOR N = 1 TO 100 END
S = SQR(N) S = SQR(N) FUNCTION CHECK$ (N)
IF S = INT(S) THEN IF S = INT(S) THEN PRINT N, S = SGN(N)
PRINT "PERFECT SQUARE" NEXT N SELECT CASE S
ELSE END SUB CASE 1
PRINT "NOT PERFECT SQUARE" CHECK$ = "positive number"
END IF CASE -1
END SUB CHECK$ = "negative number"
CASE 0
CHECK$ = "zero"
END SELECT
END FUNCTION
48.Write a program to input any 49.Write a program to input a year 50.Write a program to input any
number and display whether it is odd and display whether that year is a number and check whether the given
or even using function procedure. leap year or not. [divisible by 4 but no. is positive or negative using sub
not 100] using sub procedure. procedure.
DECLARE FUNCTION CHECK$ (N)
CLS DECLARE SUB CHECK (Y) DECLARE SUB CHECK (N)
INPUT “ENTER ANY NUMBER”; N CLS CLS
PRINT “THE GIVEN NUMBER IS “; INPUT “ENTER YEAR”; Y INPUT “ENTER ANY NUMBER”; N
CHECK$(N) CALL CHECK (Y) CALL CHECK (N)
END END END
SUB CHECK (Y) SUB CHECK (N)
FUNCTION CHECK$ (N) IF Y MOD 4 = 0 AND Y MOD 100 <> IF N > 0 THEN
IF N MOD 2 = 0 THEN 0 OR Y MOD 400 = 0 THEN PRINT “ POSITIVE NUMBER”
CHECK$ = “EVEN NUMBER” PRINT “LEAP YEAR” ELSEIF N < 0 THEN
ELSE ELSE PRINT “ NEGATIVE NUMBER”
CHECK$ = “ODD NUMBER” PRINT “NOT LEAP YEAR” END IF
END IF END IF END SUB
END FUNCTION END SUB

51.Input the age of a person and find 52.Input the age of a person and find 53.Write a program to enter any two
out whether the person is eligible to out whether the person can cast vote numbers and display the smaller one
drive or not using function or not using sub procedure. [age using function procedure.
procedure. [age >=16] >=18]
DECLARE FUNCTION SMALL (A,
DECLARE FUNCTION CHECK$ (A) DECLARE FUNCTION CHECK$ (A) B)
CLS CLS INPUT “ENTER ANY TWO
INPUT “ENTER YOUR AGE”; A INPUT “ENTER YOUR AGE”; A NUMBERS”; A, B
PRINT “YOU ARE “; CHECK$(A) PRINT “YOU ARE “; CHECK$(A) PRINT “THE SMALLER NUMBER
END END IS”; SMALL (A, B)
FUNCTION CHECK$ (A) FUNCTION CHECK$ (A) END
IF A >= 16 THEN IF A >= 18 THEN FUNCTION SMALL (A, B)
CHECK$ = “ELIGIBLE TO DRIVE” CHECK$ = “ELIGIBLE TO VOTE” IF A < B THEN
ELSE ELSE SMALL = A
CHECK$ = “ NOT ELIGIBLE TO CHECK$ = “ NOT ELIGIBLE TO ELSE
DRIVE” VOTE” SMALL = B
END IF END IF END IF
END FUNCTION END FUNCTION END FUNCTION

https://seeqbasicomputer.blogspot.com/ 112 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
54.Write a program to enter any three 55.Write a program to enter any three 56.Write a program to input three
numbers and display the smallest one numbers and display the middle different numbers in the main module
using function procedure. number using sub procedure. then find the greatest number using
SUB….END SUB.
DECLARE SUB SMALL (A, B, C) DECLARE SUB MIDDLE(A, B, C)
CLS CLS DECLARE FUNCTION GREAT (A, B,
INPUT “ENTER ANY THREE INPUT “ENTER ANY THREE C)
NUMBERS”; A, B, C NUMBERS”; A, B, C INPUT “ENTER ANY THREE
CALL SMALL (A, B, C) CALL MIDDLE (A, B, C) NUMBERS”; A, B, C
END END PRINT “THE GREATEST NUMBER
SUB SMALL (A, B, C) SUB MIDDLE (A, B, C) IS”; GREAT (A, B, C)
IF A < B AND A < C THEN IF A > B AND A < C OR A < B AND A END
S=A > C THEN FUNCTION GREAT (A, B, C)
ELSEIF B < A AND B < C THEN PRINT “THE MIDDLE NUMBER IS”; IF A > B AND A > C THEN
S=B A G=A
ELSE ELSEIF B > A AND B < C OR B < A ELSEIF B > A AND B > C THEN
S=C AND B > C THEN G=B
END IF PRINT “THE MIDDLE NUMBER IS”; ELSE
PRINT “THE SMALLEST NUMBER IS B G=C
“; S ELSE END IF
END SUB PRINT “THE MIDDLE NUMBER IS”; GREAT = G
C END FUNCTION
END IF
END SUB
57.Write a sub program to input 20 58.Write a sub program to input three 59.Write a function program to input
different numbers in an array variable sides of a triangle and determine three sides of a triangle and determine
and find the largest and smallest whether a triangle can be formed or whether a triangle is right angled
number not. triangle or not.

DECLARE SUB GREAT ( ) DECLARE SUB CHECK (A, B, C) DECLARE FUNCTION CHECK$ (H,
DECLARE SUB SMALL ( ) CLS B, P)
DIM SHARED N(20) INPUT “ENTER THREE SIDES OF A CLS
CLS TRIANGLE”; A,B,C INPUT “ENTER HEIGHT, BASE AND
FOR I = 1 TO 20 CALL CHECK (A, B, C) PERPENDICULAR”; H, B, P
INPUT "ENTER THE NUMBERS"; END PRINT CHECK$ (H, B, P)
N(I) END
NEXT I SUB CHECK (A, B, C)
CALL GREAT IF (A + B) > C AND (B + C) > A AND FUNCTION CHECK$ (H, B, P)
CALL SMALL (A + C) > B THEN IF H ^ 2 = (B ^ 2 + P ^ 2) THEN
END PRINT “THE TRIANGLE CAN BE CHECK$ = “IT IS A RIGHT ANGLED
FORMED” TRIANGLE”
SUB GREAT ELSE ELSE
G = N(1) PRINT “THE TRIANGLE CANNOT CHECK$ = “IT IS NOT A RIGHT
FOR I = 2 TO 20 BE FORMED” ANGLED TRIANGLE”
IF N(I) > G THEN G = N(I) END IF END IF
NEXT I END SUB END FUNCTION
PRINT "GREATEST NUMBER"; G
END SUB

SUB SMALL
S = N(1)
FOR I = 2 TO 20
IF N(I) < S THEN S = N(I)
NEXT I
PRINT "SMALLEST NUMBER"; S
END SUB

https://seeqbasicomputer.blogspot.com/ 113 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
60.Write a sub program to input three 61.WAP to print the sum of the digits 62.Write a program to enter a number
sides of a triangle and determine of a given numbers using SUB and find the product of its digits using
whether a triangle is equilateral, Procedure. FUNCTION procedure.
isosceles or scalene triangle or not.
DECLARE SUB CHECK (A, B, C) DECLARE SUB SUM (N) DECLARE FUNCTION PROD (N)
INPUT “ENTER THREE SIDES OF A CLS CLS
TRIANGLE”; A,B,C INPUT "ENTER ANY NUMBER"; N INPUT "ENTER ANY NUMBER"; N
CALL CHECK (A, B, C) CALL SUM (N) PR = PROD (N)
END END PRINT "PRODUCT OF DIGITS"; PR
SUB CHECK (A, B, C) SUB SUM (N) END
IF A = B AND B = C THEN S=0
PRINT “IT IS A EQUILATERAL WHILE N < > 0 FUNCTION PROD (N)
TRIANGLE” R = N MOD 10 P=1
ELSEIF A = B OR B = C OR C = A S=S+R WHILE N < > 0
THEN N = N \ 10 R = N MOD 10
PRINT “IT IS ISOSCELES WEND P=P*R
TRIANGLE” PRINT "SUM OF DIGITS"; S N = N \ 10
ELSEIF A < > B AND B < > C THEN END SUB WEND
PRINT “ IT IS A SCALENE PROD = P
TRIANGLE” END FUNCTION
END IF
END SUB
63.Write a sub program to input 64.Write a sub program to input 65.Write a function program to input
number and find sum of even digits. number and count total no. of digits. number and display only odd digits.
DECLARE SUB SUMEVEN (N) DECLARE SUB COUNT (N) DECLARE FUNCTION ODD (N)
CLS CLS REM
INPUT "ENTER ANY NUMBER"; N INPUT "ENTER ANY NUMBER"; N CLS
CALL SUMEVEN (N) CALL COUNT (N) INPUT "ENTER ANY NUMBER"; N
END END PRINT " ODD DIGITS ARE ";
SUB SUMEVEN (N) SUB COUNT (N) D = ODD(N)
S=0 C=0 END
WHILE N < > 0 WHILE N < > 0 FUNCTION ODD (N)
R = N MOD 10 C=C+1 WHILE N <> 0
IF R MOD 2 = 0 THEN S = S + R N = N \ 10 R = N MOD 10
N = N \ 10 WEND IF R MOD 2 = 1 THEN PRINT R;
WEND PRINT "TOTAL NUMBER OF N = N \ 10
PRINT "SUM OF EVEN DIGITS"; S DIGITS"; C WEND
END SUB END SUB END FUNCTION
66.Write a program using FUNCTION 67.Write a sub program to input any 68.Write a sub program to display first
procedure to reverse and display the number and check whether the given no. 20 palindrome numbers.
integer number having more than one is palindrome or not. DECLARE SUB PALIN ( )
digit passed as arguments from the main DECLARE SUB PALIN (N) CLS
module. [Hint: 123 is reversed as 321]. CLS CALL PALIN
DECLARE FUNCTION REV (N) INPUT "ENTER ANY NUMBER"; N END
CLS CALL PALIN (N) SUB PALIN
INPUT "ENTER ANY NUMBER"; N END N=1
PRINT " REVERSED DIGITS="; REV SUB PALIN (N) CNT = 1
(N) A=N TOP:
END S=0 A=N:S=0
FUNCTION REV (N) WHILE N < > 0 WHILE A < > 0
S=0 R = N MOD 10 R = A MOD 10
WHILE N < > 0 S = S * 10 + R S = S * 10 + R
R = N MOD 10 N = N \ 10 A = A \ 10
S = S * 10 + R WEND WEND
N = N \ 10 IF A = S THEN IF N = S THEN
WEND PRINT A; "IS PALINDROME" PRINT N,
REV = S ELSE CNT = CNT + 1
END FUNCTION PRINT A; "IS NOT PALINDROME" END IF
END IF N=N+1
END SUB IF CNT <= 20 THEN GOTO TOP
END SUB

https://seeqbasicomputer.blogspot.com/ 114 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
69.Write a sub program to display all 70.Write a function program to input any 71.Write a sub program to display first 5
palindrome numbers from 1 to 200. number and check whether the given no. is Armstrong numbers.
DECLARE SUB PALIN ( ) Armstrong or not. DECLARE SUB ARM ( )
CLS DECLARE FUNCTION ARM (N) CLS
CALL PALIN INPUT "ENTER ANY NUMBER"; N CALL ARM
END A=N END
SUB PALIN AR = ARM (N) SUB ARM
N=1 IF A = AR THEN N = 1 : CNT = 1
FOR I = 1 TO 200 PRINT A; "IS ARMSTRONG NUMBER" TOP:
A=N ELSE A=N
S=0 PRINT A; "IS NOT ARMSTRONG S=0
WHILE A < > 0 NUMBER" WHILE A < > 0
R = A MOD 10 END IF R = A MOD 10
S = S * 10 + R END S=S+R^3
A = A \ 10 FUNCTION ARM (N) A = A \ 10
WEND S=0 WEND
IF N = S THEN PRINT N, WHILE N < > 0 IF N = S THEN
N=N+1 R = N MOD 10 PRINT N,
NEXT I S=S+R^3 CNT = CNT + 1
END SUB N = N \ 10 END IF
WEND N=N+1
ARM = S IF CNT <= 5 THEN GOTO TOP
END FUNCTION END SUB
72.Write a sub program to display all 73.Write a function program to input 74.Write a sub program to display all
Armstrong numbers from 1 to 500. number and check whether the given prime numbers from 1 to 100.
DECLARE SUB ARM ( ) no. is prime or composite.
CLS DECLARE FUNCTION PRIME(N) DECLARE SUB PRIME ( )
CALL ARM CLS CLS
END INPUT "ENTER ANY NUMBER"; N CALL PRIME
SUB ARM P = PRIME (N) END
N=1 IF P = 2 THEN
FOR I = 1 TO 500 PRINT N; "IS PRIME NUMBER" SUB PRIME
A=N ELSE FOR N = 1 TO 100
S=0 PRINT N; "IS COMPOSITE NUMBER" C=0
WHILE A <> 0 END IF FOR I = 1 TO N
R = A MOD 10 END IF N MOD I = 0 THEN C = C + 1
S=S+R^3 FUNCTION PRIME (N) NEXT I
A = A \ 10 C=0 IF C = 2 THEN PRINT N,
WEND FOR I = 1 TO N NEXT N
IF N = S THEN PRINT N, IF N MOD I = 0 THEN C = C + 1 END SUB
N=N+1 NEXT I
NEXT I PRIME = C
END SUB END FUNCTION
75.Write a sub program to display first 76.Write a sub program to input 77.Write a sub program to input any
20 prime numbers. number and check whether the given number and display the factors.
DECLARE SUB PRIME ( ) no. Composite or not.
CALL PRIME DECLARE SUB COMPOSITE (N) DECLARE SUB FACT (N)
END INPUT "ENTER ANY NUMBER"; N CLS
SUB PRIME CALL COMPOSITE (N) INPUT "ENTER ANY NUMBER"; N
N=1 END CALL FACT (N)
CNT = 1 SUB COMPOSITE (N) END
TOP: C=0
C=0 FOR I = 1 TO N SUB FACT (N)
FOR I = 1 TO N IF N MOD I = 0 THEN C = C + 1 PRINT "FACTORS OF"; N; "=";
IF N MOD I = 0 THEN C = C + 1 NEXT I FOR I = 1 TO N
NEXT I IF C < > 2 THEN IF N MOD I = 0 THEN PRINT I;
IF C = 2 THEN PRINT N; "IS COMPOSITE NUMBER" NEXT I
PRINT N, ELSE END SUB
CNT = CNT + 1 PRINT N; "IS NOT COMPOSITE
END IF NUMBER"
N=N+1 END IF
IF CNT <= 20 THEN GOTO TOP END SUB
END SUB

https://seeqbasicomputer.blogspot.com/ 115 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
78.Write a program source code 79.Write a program using a SUB 80.Write a program in QBASIC to
using FUNCTION.....END procedure module to print the input any two different number and
FUNCTION to calculate the factorial multiplication table of any input print HCF and LCM using
of an input number. number up to tenth terms. [SEE 2075 SUB………END SUB
DECLARE FUNCTION FACT (N) S2] DECLARE SUB HCF(A, B)
CLS DECLARE SUB MUL (N) CLS
INPUT "ENTER ANY NUMBER"; N CLS INPUT "ENTER ANY TWO
PRINT "FACTORIAL ="; FACT (N) INPUT "ENTER ANY NUMBER"; N NUMBERS"; A, B
END CALL MUL (N) CALL HCF (A, B)
END END
FUNCTION FACT (N)
F=1 SUB MUL (N) SUB HCF (A, B)
FOR I = 1 TO N FOR I = 1 TO 10 WHILE A MOD B < > 0
F=F*I PRINT N; "X"; I; "="; N * I T = A MOD B
NEXT I NEXT I A=B
FACT = F END SUB B=T
END FUNCTION WEND
PRINT "H.C.F="; B
END SUB
81.Write a program in QBASIC to 82.Write a program using sub 83.Write a program to display 33333,
display the following series using procedure to print series: 1, 11, 111, 3333, 333, 33, 3 by using
SUB…. END SUB. 1111, 11111 SUB........END SUB
5, 55, 555 ….. up to 6th terms
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( )
CLS CLS CLS
CALL SERIES CALL SERIES CALL SERIES
END END END
SUB SERIES SUB SERIES SUB SERIES
A=5 A=1 A = 33333
FOR I = 1 TO 5 FOR I = 1 TO 5 FOR I = 1 TO 5
PRINT A, PRINT A, PRINT A
A = A * 10 + 5 A = A * 10 + 1 A = A \ 10
NEXT I NEXT I NEXT I
END SUB END SUB END SUB
84.Write a sub procedure to display 85.Write a sub procedure to display 86.Write a sub procedure to display
1, 12, 123, 1234, 12345 1, 22, 333, 4444, 55555 12345, 1234, 123, 12, 1
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB DISP( )
CLS CLS CLS
CALL SERIES CALL SERIES CALL DISP
END END END
SUB SERIES SUB SERIES SUB DISP ( )
FOR I = 1 TO 5 FOR I = 1 TO 5 FOR I = 5 TO 1 STEP -1
FOR J = 1 TO I FOR J = 1 TO I FOR J = 1 TO I
PRINT J; PRINT I; PRINT J;
NEXT J NEXT J NEXT J
PRINT PRINT PRINT
NEXT I NEXT I NEXT I
END SUB END SUB END SUB
87.Write a sub procedure to display 88.Write a sub procedure to display 89.Write a sub procedure to display 5, 54,
55555, 4444, 333, 22, 1 54321, 5432, 543, 54, 5 543, 5432, 54321
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB SERIES ()
CLS CLS CLS
CALL SERIES CALL SERIES CALL SERIES
END END END
SUB SERIES SUB SERIES SUB SERIES
FOR I = 5 TO 1 STEP -1 FOR I = 5 TO 1 STEP -1 FOR I = 5 TO 1 STEP -1
FOR J = 1 TO I FOR J = I TO 1 STEP -1 FOR J = 5 TO I STEP -1
PRINT I; PRINT J; PRINT J;
NEXT J NEXT J NEXT J
PRINT PRINT PRINT
NEXT I NEXT I NEXT I
END SUB END SUB END SUB

https://seeqbasicomputer.blogspot.com/ 116 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
90.Write a Qbasic Program to 91.Write a sub procedure to display: 92.Write a sub procedure to display
generate 1800, 1600, 1400, ……..10 th 1, 121, 12321, 1234321, 123454321 123454321, 1234321, 12321, 121, 1
term. DECLARE SUB SERIES ( ) DECLARE SUB SERIES ()
DECLARE SUB DISP( ) CLS CLS
CLS CALL SERIES CALL SERIES
CALL DISP END END
END SUB SERIES SUB SERIES
SUB DISP ( ) A# = 1 A# = 11111
A = 1800 FOR I = 1 TO 5 FOR I = 1 TO 5
FOR I = 1 TO 10 PRINT A# ^ 2 PRINT A# ^ 2
PRINT A A# = A# * 10 + 1 A# = A# \10
A = A - 200 NEXT I NEXT I
NEXT I END SUB END SUB
END SUB
93.Write a sub program to generate 94.Write a sub procedure to generate 95.Write a sub procedure to generate
9,28,14,7,22,11…………..10th term 7,22,11,34……………10th terms. 22,11,34,17,52,26,13,40,20,10
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( )
CLS CLS CLS
CALL SERIES CALL SERIES CALL SERIES
END END END
SUB SERIES
A=9 SUB SERIES SUB SERIES
FOR I = 1 TO 10 A=7 A = 22
PRINT A; FOR I = 1 TO 10 FOR I = 1 TO 10
IF A MOD 2 = 0 THEN PRINT A; PRINT A;
A=A\2 IF A MOD 2 = 0 THEN IF A MOD 2 = 0 THEN
ELSE A=A\2 A=A\2
A=A*3+1 ELSE ELSE
END IF A=A*3+1 A=A*3+1
NEXT I END IF END IF
END SUB NEXT I NEXT I
END SUB END SUB
96.Write a program to print the following 97.Write a program to print 1, 8, 27, 98.Write a display the following series:
series by using SUB ……END SUB: 1, 4, 64.....upto 10th term. 999, 728, 511.........upto 10th term.
9, 16.....upto 10th term. DECLARE SUB SERIES ( )
DECLARE SUB SERIES ( ) CLS
DECLARE SUB SERIES () CLS CALL SERIES
CLS CALL SERIES END
CALL SERIES END SUB SERIES
END a = 999
SUB SERIES b = 271
SUB SERIES FOR I = 1 TO 9 c = 54
FOR I = 1 TO 9 PRINT I ^ 3 FOR i = 1 TO 10
PRINT I ^ 2 NEXT I PRINT a
NEXT I END SUB a=a-b
END SUB b=b-c
c=c-6
NEXT i
END SUB
99.Write a program to display 315, 270, 100.Write a program to display 5, 10, 20, 101.Write a program to print the
215, 150 ........ upto 10th term. 35, 55.........upto 10th term. following series 2, 8, 18, 32, 10th terms
DECLARE SUB SERIES ( ) DECLARE SUB DISP( ) using SUB ……………. END SUB
CLS CLS DECLARE SUB DISP( )
CALL SERIES CALL DISP CLS
END END CALL DISP
SUB SERIES SUB DISP () END
a = 315 A=5 SUB DISP ( )
b = 45 B=5 A=2
FOR i = 1 TO 10 FOR I = 1 TO 10 B=6
PRINT a PRINT A FOR I = 1 TO 10
a=a-b A=A+B PRINT A
b = b + 10 B=B+5 A=A+B
NEXT i NEXT I B=B+4
END SUB END SUB NEXT I
END SUB
https://seeqbasicomputer.blogspot.com/ 117 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
102.Write a program to display 2 , 4, 103.Write a program to display 2, 4, 7, 104.Write a program to display
8, 14, 22 …upto 10th terms 11, 16 up to 10th terms. 2,6,12,20,30 …..up to 10th term
DECLARE SUB DISP( ) DECLARE SUB DISP( ) DECLARE SUB DISP( )
CLS CLS CLS
CALL DISP CALL DISP CALL DISP
END END END
SUB DISP ( ) SUB DISP ( ) SUB DISP ( )
A=2 A=2 A=2
B=2 B=2 B=4
FOR I = 1 TO 10 FOR I = 1 TO 10 FOR I = 1 TO 10
PRINT A PRINT A PRINT A
A=A+B A=A+B A=A+B
B=B+2 B=B+1 B=B+2
NEXT I NEXT I NEXT I
END SUB END SUB END SUB
105.Write a program to display 0,1, 3, 106.Write a program to display 1, 2, 4, 107.Write a program display : 2, 8, 18,
6, 10, 15 up to 20th terms. 7, 11 up to 10th term. 32..........upto 10 terms.
DECLARE SUB DISP( ) DECLARE SUB DISP( ) DECLARE SUB DISP( )
CLS CLS CLS
CALL DISP CALL DISP CALL DISP
END END END
SUB DISP ( ) SUB DISP ( ) SUB DISP ( )
A=0 A=1 FOR I = 1 TO 10
B=1 B=1 PRINT I ^ 2 * 2
FOR I = 1 TO 20 FOR I = 1 TO 10 NEXT I
PRINT A PRINT A END SUB
A=A+B A=A+B
B=B+1 B=B+1
NEXT I NEXT I
END SUB END SUB
108.Write a program to display 109.Write a program to display 5, 10, 110.Write a program to display: 1, 0, 1,
1,2,3,5,8……………….13th terms. 15, 25, 40, 65, 105 ......up to 10th term 1, 2, 3................... upto 10 th term.
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( )
CLS CLS CLS
CALL SERIES CALL SERIES CALL SERIES
END END END

SUB SERIES ( ) SUB SERIES ( ) SUB SERIES ( )


A=1 A = 25 A=1
B=2 B = 40 B=0
FOR I = 1 TO 13 FOR I = 1 TO 10 FOR I = 1 TO 5
PRINT A; PRINT A; PRINT A;
C=A+B C=A+B PRINT B;
A=B A=B A=A+B
B=C B=C B=A+B
NEXT I NEXT I NEXT I
END SUB END SUB END SUB
111.Write a program to generate 3, 3, 6, 9, 112.Write a program to generate series 2, 113.Write a to generate the series: 81, 64,
15, 24, 39, 63, 102, 165 . 2,4,6,10,16,……..10th terms 49, ......1
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( )
CALL SERIES CALL SERIES CLS
END END CALL SERIES
SUB SERIES ( ) SUB SERIES ( ) END
A=3 A=2 SUB SERIES ( )
B=3 B=2 FOR I = 9 TO 1
FOR I = 1 TO 10 FOR I = 1 TO 10 PRINT I ^ 2
PRINT A; PRINT A; NEXT I
C=A+B C=A+B END SUB
A=B A=B
B=C B=C
NEXT I NEXT I
END SUB END SUB

https://seeqbasicomputer.blogspot.com/ 118 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
114.Write a sub program to display 115.Write a sub program to display 116.Write a program to print the
numbers 2, 4, 6, ............20. numbers 100, 90, 80, .................10 following serial 9, 7, 5,……1

DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( )


CLS CLS CLS
CALL SERIES CALL SERIES CALL SERIES
END END END
SUB SERIES SUB SERIES SUB SERIES
FOR I = 2 TO 20 FOR I = 100 TO 80 STEP-10 FOR I = 9 TO 1 STEP-2
PRINT I PRINT I PRINT I
NEXT I NEXT I NEXT I
END SUB END SUB END SUB
117.Write a sub program to display 118.Write a sub program to print first 119.Write a program to print the
product of all numbers from 4 to 8. ten odd numbers. [SLC 2071 S] natural numbers from 1 to 5 using
SUB...........END SUB.
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( )
CLS CLS DECLARE SUB SERIES ( )
CALL SERIES CALL SERIES CLS
END END CALL SERIES
SUB SERIES END
P=1 SUB SERIES
FOR I = 4 TO 8 FOR I = 1 TO 10 SUB SERIES
P=P*I S=S+I FOR I = 1 TO 5
NEXT I NEXT I PRINT I,
PRINT “PRODUCT OF ALL PRINT “SUM OF FIRST TEN NEXT I
NUMBERS FROM 4 TO 8”; P POSITIVE INTEGERS” ; S END SUB
END SUB END SUB
120.Write a QBASIC program to find 121.Write a sub program to display all 122.Write a sub program to enter 10
the sum of square of first 10 integers. even numbers from 2 to 100 also different numbers then find out sum of
DECLARE SUB SERIES ( ) display its sum. even numbers
CLS
CALL SERIES DECLARE SUB SERIES ( ) DECLARE SUB SUM(N())
END CLS CLS
CALL SERIES FOR I = 1 TO 10
SUB SERIES END INPUT "ENTER 10 NUMBERS";
FOR I = 1 TO 10 SUB SERIES N(I)
S=S+I^2 FOR I = 2 TO 100 STEP 2 NEXT I
NEXT I PRINT I,
PRINT “SUM OF SQUARE FIRST 10 S=S+I CALL SUM(N())
INTEGERS=” ; S NEXT I END
END SUB PRINT “SUM OF ALL EVEN SUB SUM (N())
NUMBERS FROM 2 TO 100=”; S FOR I = 1 TO 10
END SUB IF N(I) MOD 2 = 0 THEN S = S +
N(I)
NEXT I
PRINT "SUM OF EVEN NUMBERS=";
S
END SUB
123.Write a sub program using to display 124.Write a sub program using to display 125.WAP to print first ten multiples of
first 13 odd numbers. first 19 even numbers. input number.
DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( ) DECLARE SUB SERIES ( N)
CLS CLS CLS
CALL SERIES CALL SERIES INPUT “ENTER ANY NUMBER”; N
END END CALL SERIES (N)
END
SUB SERIES SUB SERIES
A=1 A=2 SUB SERIES (N)
FOR I = 1 TO 13 FOR I = 1 TO 19 FOR I = 1 TO 10
PRINT A, PRINT A, PRINT N * I,
A = A+ 2 A = A+ 2 NEXT I
NEXT I NEXT I END SUB
END SUB END SUB

https://seeqbasicomputer.blogspot.com/ 119 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
126.Write a program using FUNCTION to get a word from 127.Write a program to test whether the input word is
the user and print the word in the reverse order. palindrome word or not using FUNCTION…………END
FUNCTION.
DECLARE FUNCTION REV$ (S$)
CLS DECLARE FUNCTION REV$ (S$)
INPUT "ENTER ANY STRING"; S$ CLS
PRINT "REVERSED STRING IS "; REV$(S$) INPUT "ENTER ANY STRING"; S$
END C$ = REV$(S$)
IF S$ = C$ THEN
FUNCTION REV$ (S$) PRINT “THE GIVEN STRING IS PALINDROME”
FOR I = LEN(S$) TO 1 STEP -1 ELSE
B$ = MID$(S$, I, 1) PRINT “THE GIVEN STRING IS NOT PALINDROME”
W$ = W$ + B$ END IF
NEXT I END
REV$ = W$
END FUNCTION FUNCTION REV$ (S$)
FOR I = LEN(S$) TO 1 STEP -1
B$ = MID$(S$, I, 1)
W$ = W$ + B$
NEXT I
REV$ = W$
END FUNCTION
128.Write a program to print the shortest word among the 129.Write a function program to enter any ten strings and
three different word input by the user using display the shortest string.
FUNCTION…….END FUNCTION.
DECLARE FUNCTION SHRT$( A$, B$, C$) DECLARE FUNCTION SHRT$( A$ )
CLS CLS
INPUT "ENTER FIRST STRING"; A$ INPUT "ENTER FIRST STRING"; A$
INPUT "ENTER SECOND STRING"; B$ PRINT "SHORTEST STRING="; SHRT$(A$)
INPUT "ENTER THIRD STRING"; C$ END
PRINT "SHORTEST STRING="; SHRT$( A$, B$, C$) FUNCTION SHRT$(A$)
END FOR I = 2 TO 10
FUNCTION SHRT$( A$, B$, C$) INPUT "ENTER NEXT STRING"; B$
IF LEN(A$) < LEN(B$) AND LEN(A$) < LEN(C$) THEN IF LEN(B$) < LEN(A$) THEN A$ = B$
S$ = A$ NEXT I
IF LEN(B$) < LEN(A$) AND LEN(B$) < LEN(C$) THEN SHRT$ = A$
S$ = B$ END FUNCTION
ELSE
S$ = C$
END IF
SHRT$ = S$
END FUNCTION
130.Write a program using FUNCTION….END 131.Write a program to find the numbers of vowels in an
FUNCTION to input a string and count the total number of input string using ‘SUB…..END SUB’.
consonants. DECLARE SUB COUNT (S$)
DECLARE FUNCTION COUNT (S$) CLS
CLS INPUT "ENTER ANY STRING"; S$
INPUT "ENTER ANY STRING"; S$ CALL COUNT(S$)
PRINT "TOTAL NO. OF CONSONANTS= "; COUNT(S$) END
END
FUNCTION COUNT (S$) SUB COUNT (S$)
CC = 0 VC = 0
FOR I = 1 TO LEN(S$) FOR I = 1 TO LEN(S$)
B$ = MID$(S$, I, 1) B$ = MID$(S$, I, 1)
C$ = UCASE$(B$) C$ = UCASE$(B$)
IF C$ <> "A" AND C$ <> "E" AND C$ <> "I" AND C$ <> IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$ =
"O" AND C$ <> "U" THEN CC = CC + 1 "U" THEN VC = VC + 1
NEXT I NEXT I
COUNT = CC PRINT "TOTAL NO. OF VOWELS= "; VC
END FUNCTION END SUB

https://seeqbasicomputer.blogspot.com/ 120 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
132.Write a program using FUNCTION... END 133.Write a program to declare SUB procedure to print
FUNCTION to count the number of words in a sentence. only the vowels from a given word.

DECLARE FUNCTION COUNT (S$) DECLARE SUB DISPV (S$)


CLS CLS
INPUT "ENTER ANY STRING"; S$ INPUT "ENTER ANY STRING"; S$
PRINT "TOTAL NO. OF WORDS= "; COUNT(S$) CALL DISPV(S$)
END END

FUNCTION COUNT (S$) SUB DISPV(S$)


WC = 1 FOR I = 1 TO LEN(S$)
FOR I = 1 TO LEN(S$) B$ = MID$(S$, I, 1)
B$ = MID$(S$, I, 1) C$ = UCASE$(B$)
IF B$ = " " THEN WC = WC + 1 IF C$ = "A" OR C$ = "E" OR C$ = "I" OR C$ = "O" OR C$
NEXT I = "U" THEN C$=C$+ B$
COUNT = WC END IF
END FUNCTION NEXT I
PRINT “VOWELS ONY ARE”; C$
END SUB
134.Write a program to input a string then print vowel 135.Write a program to enter any word and print
characters in upper case and consonant characters in alternate case of each character using DECLARE SUB
lower case using function – end function. (Suppose input eg. Nepal to NePaL.
string is NEPAL then output should be nEpAl)
DECLARE SUB ALT(S$)
DECLARE SUB ALT(S$) CLS
CLS INPUT "ENTER ANY WORD"; S$
INPUT "ENTER ANY WORD"; S$ CALL ALT(S$)
CALL ALT(S$) END
END
SUB ALT$ (S$)
SUB ALT$ (S$) FOR I = 1 TO LEN(S$)
FOR I = 1 TO LEN(S$) B$ = MID$(S$, I, 1)
B$ = MID$(S$, I, 1) IF I MOD 2 = 1 THEN
IF I MOD 2 = 1 THEN W$ = W$ + LCASE$(B$)
W$ = W$ + LCASE$(B$) ELSE
ELSE W$ = W$ + UCASE$(B$)
W$ = W$ + UCASE$(B$) END IF
END IF NEXT I
NEXT I PRINT W$
PRINT W$ END SUB
END SUB

136.Write a function program to enter a string and then 137.Write a sub program to input any string and display
find out the sum of even ASCII value of each characters. only consonant by removing vowels.
DECLARE FUNCTION DISP$ (S$)
DECLARE FUNCTION SUM(A$) CLS
CLS INPUT "ENTER ANY STRING"; S$
INPUT "ENTER ANY STRING"; A$ PRINT DISP(S$)
PRINT " SUM OF EVEN ASCII VALUE="; SUM(A$) END
END
FUNCTION SUM (A$) FUNCTION DISP$ (S$)
FOR I = 1 TO LEN(A$) FOR I = 1 TO LEN(S$)
B$ = MID$(A$, I, 1) B$ = MID$(S$, I, 1)
C = ASC(B$) C$ = UCASE$(B$)
IF C MOD 2 = 0 THEN S = S + C IF C$ <> "A" AND C$ <> "E" AND C$ <> "I" AND C$ <>
NEXT I "O" AND C$ <> "U" AND C$ <> " " THEN W$=W$+B$
SUM=S END IF
NEXT I
END FUNCTION DISP$ = W$
END FUNCTION

https://seeqbasicomputer.blogspot.com/ 121 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
138.Write a program to enter a long string and display only 139.Write a program using SUB……….END SUB to
initial character of each word Using function procedure. display:
DECLARE FUNCTION INIT$(A$) N
CLS E
INPUT "ENTER ANY STRING"; A$ P
PRINT INIT$(A$) A
END L
FUNCTION INIT$ (A$) DECLARE SUB PATTERN (S$)
C$ = LEFT$(A$, 1) S$ = "NEPAL"
FOR I = 1 TO LEN(A$) CALL PATTERN(S$)
B$ = MID$(A$, I, 1) END
IF B$ = " " THEN C$ = C$ + MID$(A$, I + 1, 1) SUB PATTERN (S$)
NEXT I FOR I = 1 TO LEN(S$)
INIT$ = C$ PRINT MID$(S$, I, 1)
END FUNCTION NEXT I
END SUB
140.Write a program to display the following pattern: - 141.Write a program using SUB..........END SUB to display
H -
KHA NEPAL
OKHAR NEPA
POKHARA NEP
DECLARE SUB PATTERN (S$) NE
S$ = "POKHARA" N
CALL PATTERN(S$) DECLARE SUB PATTERN (S$)
END S$ = "NEPAL"
SUB PATTERN (S$) CALL PATTERN(S$)
A=4 END
FOR I = 1 TO LEN(S$) STEP 2 SUB PATTERN (S$)
PRINT TAB(A); MID$(S$, A, I) FOR I = LEN(S$) TO 1 STEP - 1
A=A-1 PRINT LEFT$(S$, I)
NEXT I NEXT I
END SUB END SUB
142.Write a program using SUB……….END SUB to display. 143.Write a sub to print the following pattern:
N NEPAL
NE EPAL
NEP PAL
NEPA AL
NEPAL L
DECLARE SUB PATTERN (S$) DECLARE SUB PATTERN (S$)
CLS CLS
S$ = "NEPAL" S$ = "NEPAL"
CALL PATTERN(S$) CALL PATTERN(S$)
END END
SUB PATTERN (S$) SUB PATTERN (S$)
FOR I = 1 TO LEN(S$) FOR I = LEN(S$) TO 1 STEP - 1
PRINT LEFT$(S$, I) PRINT RIGHT$(S$, I)
NEXT I NEXT I
END SUB END SUB
144.Write a SUB procedure to generate given below: 145.Print following pattern
EVEREST
VERES *
ERE ***
R *****
DECLARE SUB PATTERN (S$) *******
S$ = "EVEREST" DECLARE SUB PATTERN (S$)
CALL PATTERN(S$) CLS
END S$ = "*******"
SUB PATTERN (S$) CALL PATTERN(S$)
A=1 END
FOR I = LEN(S$) TO 1 STEP -2 SUB PATTERN (S$)
PRINT TAB(A); MID$(S$, A, I) FOR I = 1 TO LEN(S$) STEP 2
A=A+1 PRINT LEFT$(S$, I)
NEXT I NEXT I
END SUB END SUB

https://seeqbasicomputer.blogspot.com/ 122 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
146.Write a program to store Roll no., Name, Class and 147.A sequential data file called “student.dat” contains
Address of any five students. [SEE 2074] same records under the field’s name, english, nepali and
OPEN "Student.dat" FOR OUTPUT AS #1 computer. Write a program to add some more records in
FOR I = 1 TO 5 the same sequential data file. [SLC 2068]
INPUT "Enter Roll No."; r OPEN “student.dat” FOR APPEND AS #1
INPUT "Enter Name"; n$ DO
INPUT "Enter Class"; c CLS
INPUT "Enter Address"; a$ INPUT “ENTER NAME”; N$
WRITE #1, r, n$, c, a$ INPUT “ENTER MARKS IN ENGLISH”; E
NEXT I INPUT “ENTER MARKS IN NEPALI”; N
CLOSE #1 INPUT “ENTER MARKS IN COMPUTER”; C
END WRITE #1, N$, E, N, C
INPUT “DO YOU WANT TO CONTINUE”; CH$
LOOP WHILE UCASE$(CH$) = “Y”
CLOSE #1
END
148.A sequential data file “RECORD.DAT” and store 149.Create a data file to store the records of few employees
Name, Address and Salary of employees. WAP to add some having Name, Address, Post, Gender and Salary fields.
more records in the data file “RECODR.DAT”. Program [SEE 2073]
should terminate with user choice. OPEN “std.rec” FOR OUTPUT AS #1
OPEN “RECORD.DAT” FOR APPEND AS #1 TOP:
DO CLS
CLS INPUT “Enter Name”; N$
INPUT “ENTER NAME”; N$ INPUT “Enter Address”; A$
INPUT “ENTER MARKS IN ENGLISH”; E INPUT “Enter Post”; P$
INPUT “ENTER MARKS IN NEPALI”; N INPUT “Enter gender”; G$
INPUT “ENTER MARKS IN COMPUTER”; C INPUT “Enter Salary”; S
WRITE #1, N$, E, N, C WRITE #1, N$, A$, P$, G$, S
INPUT “DO YOU WANT TO CONTINUE”; CH$ INPUT “Do you want to continue”; CH$
LOOP WHILE UCASE$(CH$) = “Y” IF UCASE$(CH$)=”Y” THEN GOTO TOP
CLOSE #1 CLOSE #1
END END
150.Create a sequential data file ’Price.dat’ to store item name, 151.Create a sequential data file’post.dat’ to store name and
quantity and Rate also calculate total amount(total=Quantity X marks of any three subjects also calculate total and percentages
Rate).Program should terminate according to the user’s choice. only for 15 students.
OPEN “price.dat” FOR OUTPUT AS #1 OPEN "post.dat" FOR OUTPUT AS #1
TOP: FOR I = 1 TO 15
CLS INPUT "Enter Name"; n$
INPUT “Enter Item Name”; N$ INPUT "Enter marks in any three subjects”; A, B, C
INPUT “Enter Quantity”; Q T=A+B+C
INPUT “Enter Rate”; R P=T/3
T=Q*R WRITE #1, n$, A, B, C, T, P
WRITE #1, N$, Q, R, T NEXT I
INPUT “Do you want to continue”; CH$ CLOSE #1
IF CH$=”Y” OR CH$ = “y” THEN GOTO TOP END
CLOSE #1
END
152.Store SIDNO, name, address and Telephone number of five 153.A sequential data file “Address.inf” contains serial no, name,
students and display the records on monitor in sequential data file address, telephone and email_id.WAP to record as many records as
“STDINFO” the user wants. The serial number should be generated automatically
OPEN "STDINFO.DAT" FOR OUTPUT AS #1 like 5001,5003,5005.
FOR I = 1 TO 5 OPEN " Address.inf " FOR OUTPUT AS #1
INPUT "ENTER NAME"; N$ DO
INPUT "ENTER ADDRESS"; A$ CLS
INPUT "ENTER TELEPHONE"; T# C = 5001
WRITE #1, N$, A$, T# INPUT “ENTER NAME”; N$
NEXT I INPUT “ENTER ADDRESS”; A$
CLOSE #1 INPUT “ENTER TELEPHONE”; T#
OPEN "STDINFO.DAT" FOR INPUT AS #1 INPUT “ENTER EMAIL”; E$
CLS WRITE #1, C, N$, A$, T$, E$
FOR I = 1 TO 5 C=C+2
INPUT #1, N$, A$, T# INPUT “DO YOU WANT TO CONTINUE (Y / N)”; CH$
PRINT N$, A$, T# LOOP WHILE UCASE$(CH$) = “Y”
NEXT I CLOSE #1
CLOSE #1 END
END

https://seeqbasicomputer.blogspot.com/ 123 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
154.A Sequential data file called "SEE.DAT" has stored data under 155.A sequential data file “STD.TXT” contains name and marks in
the field heading Symbol No., Name, English, Nepali, and Computer. three different subjects of some students. Write a program to display
Write a program to display all the information of those students whose only fail student’s records assuming pass marks 40.
marks in Computer is more than 80. OPEN "STD.TXT" FOR INPUT AS #1
OPEN "SEE.DAT" FOR INPUT AS #1 CLS
CLS WHILE NOT EOF (1)
WHILE NOT EOF (1) INPUT #1, B$, C, D, E
INPUT #1, A, B$, C, D, E IF C < 40 AND D <40 AND E <40 THEN PRINT B$, C, D, E
IF E > 80 THEN PRINT A, B$, C, D, E WEND
WEND CLOSE #1
CLOSE #1 END
END
156.Write a program which reads records from the file ”Result.DAT” 157.Write a program to read all the records from the data file
having the fields name, and marks of three different subjects and “STUDENT.TXT” and display all the records where the fields name
display only those records whose percentage is greater than 60 and are unknown.
less than 80. Also count the total number of records presenting in that
data files. OPEN "STUDENT.TXT" FOR INPUT AS #1
OPEN "STD.TXT" FOR INPUT AS #1 CLS
CLS WHILE NOT EOF (1)
WHILE NOT EOF (1) LINE INPUT #1, A$
INPUT #1, B$, C, D, E PRINT A$
A=A+1 WEND
T=C+D+E CLOSE #1
P=T/3 END
IF P > 60 AND P < 80 THEN PRINT B$, C, D, E
WEND
PRINT “TOTAL NO. OF RECORDS=”; A
CLOSE #1
END
158.A data file "pabson.txt" contains the records composed 159.A data file “INFO.DAT” has numerous records in it
of the fields like school, principal, address, contact. Write a with name, address age, and telephone numbers in it. Write
program in Qbasic to display records of the schools located a program to read all the records and print those with
in either Kathmandu or Palpa address “NEPAL” and age >15
OPEN "PABSON.TXT" FOR INPUT AS #1 OPEN "INFO.DAT" FOR INPUT AS #1
CLS CLS
WHILE NOT EOF (1) WHILE NOT EOF (1)
INPUT #1, A$, B$, C$, D INPUT #1, A$, B$, C, D
IF UCASE$(C$) = “KATHMANDU” OR UCASE$(C$) = IF UCASE$(B$) = “NEPAL” AND C >15 THEN PRINT A$, B$,
“PALPA” THEN PRINT A$, B$, C$, D C, D
WEND WEND
CLOSE #1 CLOSE #1
END END
160.A sequential data file called 'ADDRESS.DAT' contains 161.A data file “lib.txt” consists of book’s name, author’s
NAME, AGE, CITY and TELEPHONE fields. Write a name and price of books. Write a program to count and
program to display all the contents of that data file. display the total number of records present in the file.
OPEN "ADDRESS.DAT" FOR INPUT AS #1 OPEN "LIB.TXT" FOR INPUT AS #1
CLS CLS
WHILE NOT EOF (1) WHILE NOT EOF (1)
INPUT #1, A$, B, C$, D INPUT #1, A$, B$, C
PRINT A$, B, C$, D D=D+1
WEND WEND
CLOSE #1 PRINT “TOTAL NUMBER OF RECORDS=”; D
END CLOSE #1
END
162.Write a program in QBASIC to open a sequential data file 163.A sequential data file named “nabil.txt” contains record of
“EMP.DAT”, which contains employees records: Name, address clients of a bank including depositor’s name, deposited amount,
and phone number and display all the records as well as total time and rate of interest. Wap to display detail of all depositors
number of records stored in the file. including simple interest.
OPEN "LIB.TXT" FOR INPUT AS #1 OPEN "NABIL.TXT" FOR INPUT AS #1
CLS CLS
WHILE NOT EOF (1) WHILE NOT EOF (1)
INPUT #1, A$, B$, C INPUT #1, N$, P, T, R
PRINT A$, B$, C I=P*T*R/100
D=D+1 PRINT A$, B$, C, I
WEND WEND
PRINT “TOTAL NUMBER OF RECORDS=”; D CLOSE #1
CLOSE #1 END
END

https://seeqbasicomputer.blogspot.com/ 124 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

164.A sequential data file “SALARY.DAT” contains the 165.A data file name “EMP.DAT”, contains number of
information, Employee-Code, Employee-Name, Post, Basic- records having fields name, post and salary. Write a
Salary. Write a program to display those records whose program to count total number of “Manager” in the data
Basic-salary is between 10000 to 15000 and Post is file. (hint: Manager is a post)
‘OFFICER’. OPEN "EMP.DAT" FOR INPUT AS #1
OPEN "SALARY.DAT" FOR INPUT AS #1 CLS
CLS WHILE NOT EOF (1)
WHILE NOT EOF (1) INPUT #1, N$, P$, S
INPUT #1, E,, N$, P$, S IF UCASE$(P$) = “MANAGER” THEN PRINT C = C + 1
IF UCASE$(P$) = “OFFICER” AND S >= 10000 AND S>= 15000 WEND
THEN PRINT A$, B$, C, D PRINT “TOTAL NO.OF MANAGERS ARE”; C
WEND CLOSE #1
CLOSE #1 END
END
166.A sequential data file “emp.dat” contains name, post 167.A data file “Salary.Dat” contains the information of
and salary fields of information about employees. Write a employee regarding their name, post and salary. Write a
program to display all the information of employees along program to display all the information of employee whose
with tax amount (also tax is 15% of salary). salary is greater than 15000 and less than 40000.
OPEN "EMP.DAT" FOR INPUT AS #1 OPEN "EMP.DAT" FOR INPUT AS #1
CLS CLS
WHILE NOT EOF (1) WHILE NOT EOF (1)
INPUT #1, N$, P$, S INPUT #1, N$, P$, S
T = 15 / 100 * S IF S >= 15000 AND S <= 40000 THEN PRINT N$, P$, S
PRINT N$, P$, S, T WEND
WEND CLOSE #1
CLOSE #1 END
END
168.Write a program that reads the ”INFO.DAT” file that 169.A sequential data file’post.dat’ has few records related
has several record such as name, address, gender, post, and to name, address, salary.WAP to display the records whose
salary .The program display those record whose sex is male address begins with ‘S’ or ‘D’
and salary more than 10,000 and also the program counts OPEN "POST.DAT" FOR INPUT AS #1
the total number of records in that file. CLS
OPEN "INFO.DAT" FOR INPUT AS #1 WHILE NOT EOF (1)
CLS INPUT #1, N$, P$, S
WHILE NOT EOF (1) A$ = UCASE$(LEFT$(N$,1))
INPUT #1, N$, A$, G$, P$, S IF A$ = “S” OR A$ = “D” THEN PRINT N$, P$, S
C=C+1 WEND
IF UCASE$(G$)=”M” AND S >= 10000 THEN PRINT N$, A$, G$, CLOSE #1
P$, S END
WEND
PRINT “TOTAL NUMBER OF RECORDS=”; C
CLOSE #1
END
170.Write a program to open a data file “record.dat” that 171.A sequential data file “Record.dat” has few records
contains name, address, date of birth, email and telephone related to name, address, post and DOB(mm/dd/yyyy).
number of some employees. Now display all those records WAP to display the records of all those who were born
whose date of birth is in current month. between 1971 to 1999.

OPEN "birth.dat" FOR INPUT AS #1 OPEN "RECORD.dat" FOR INPUT AS #1


CLS CLS
WHILE NOT EOF(1) WHILE NOT EOF(1)
INPUT #1, n$, d$, a$ INPUT #1, n$, a$, p$, d$
b$ = LEFT$(DATE$, 2) d$ = RIGHT$(d$, 4)
c = VAL(b$) c = VAL(b$)
e$ = LEFT$(d$, 2) IF c >= 1971 and c<=1999 THEN PRINT n$, d$, a$
f = VAL(e$) WEND
IF c = f THEN PRINT n$, d$, a$ CLOSE #1
WEND END
CLOSE #1
END

https://seeqbasicomputer.blogspot.com/ 125 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
172.Write a Qbasic program that read the "EMP.DAT" file 173.A sequential data file has 100 records having field
with Name, Address, Post and Salary columns from E: name, class and roll number. Write a program to display
drive that has 500 records of employees and displays only from 50th to 60th records.
its last 50 records.
OPEN "E:\EMP.DAT" FOR INPUT AS #1 OPEN "ABC.DAT" FOR INPUT AS #1
CLS CLS
FOR i = 1 TO 500 WHILE NOT EOF (1)
INPUT #1, n$, a$, p$, s INPUT #1, N$, C, R
D=D+1
IF i >= 450 AND i <= 500 THEN PRINT n$, a$, p$, s IF D >= 50 AND D <= 60 THEN PRINT N$, C, R
NEXT i WEND
CLOSE #1 CLOSE #1
END END
174.Write a program to display the first 10 records from a 175.A data file named “EMP.DAT” contains some records
file named “resource.dat” having fields name, phone and with the fields Code, Name, Post and Salary. Write a
email. program to print odd position records of the data file.
OPEN "EMP.DAT" FOR INPUT AS #1
OPEN "RESOURCE.DAT" FOR INPUT AS #1 CLS
CLS WHILE NOT EOF (1)
FOR I = 1 TO 10 INPUT #1, C, N$, P$, S
INPUT #1, N$, C, R D=D+1
PRINT N$, C, R IF MOD 2 = 1 THEN PRINT C, N$, P$, S
NEXT I WEND
CLOSE #1 CLOSE #1
END END

176.A sequential data file named “abc.dat” has several 177.A data file named “record.dat” contains name, age and
records having fields name, roll and class. Write a program salary for n number of persons. Write a program to input a
to copy all the records of class 10 into a newly created file name to search data from a data file. If the data is not
new.dat. found, then display the message “Data not found in the
list”.
OPEN "ABC.DAT" FOR INPUT AS #1 OPEN “RECORD.DAT” FOR INPUT AS #1
OPEN "NEW.DAT" FOR OUTPUT AS #1 CLS
CLS INPUT “Enter name to be searched”; S$
WHILE NOT EOF (1) FLAG=0
INPUT #1, N$, R, C
IF C = 10 THEN WRITE #2, N$, R, C
WHILE NOT EOF(1)
WEND INPUT #1, N$, A$, S
CLOSE #1, #2 IF UCASE$(S$)=UCASE$(N$) THEN
END PRINT N$, A$, S
FLAG=1
END IF
WEND
IF FLAG=0 THEN PRINT “Data not found”
CLOSE #1
END
178.A sequential data file 'Student.dat' contains registration 179.WAP that asks a post of the employee and displays his/her
number, student name, address and date of birth of some students. records from the sequential data file “XYZ.REC” having fields
Write a program that asks a user to input a registration number Name, Post, Dept and Salary.
and displays the record of the particular registration if present. OPEN “XYZ.REC” FOR INPUT AS #1
OPEN “STUDENT.DAT” FOR INPUT AS #1 CLS
CLS INPUT “Enter post to be searched”; S$
INPUT “Enter registration no. to be searched”; S FLAG=0
FLAG=0 WHILE NOT EOF(1)
WHILE NOT EOF(1) INPUT #1, N$, P$, D$, S
INPUT #1, R, N$, A$, D$ IF UCASE$(S$)=UCASE$(P$) THEN
IF S = R THEN PRINT N$, P$, D$, S
PRINT R, N$, A$, D$ FLAG=1
FLAG=1 END IF
END IF WEND
WEND IF FLAG=0 THEN PRINT “Data not found”
IF FLAG=0 THEN PRINT “Data not found” CLOSE #1
CLOSE #1 END
END

https://seeqbasicomputer.blogspot.com/ 126 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
180.Delete some records from “neps.dat” file where 181.A sequential data file “RECORD.DAT” contains
computer ask user to enter the record, which is to be different records under fields: name rollno., name, address
deleted. (Fields are name, address, and telephone number) and percentage. Write a program to edit a record and
display both edited and unedited records on the screen to
OPEN “NEPS.DAT” FOR INPUT AS #1 compare them side by side.
OPEN “TEMP.DAT” FOR OUTPUT AS #1 OPEN "D:\RECORD" FOR INPUT AS #1
CLS OPEN "d:\TEMP.DAT" FOR OUTPUT AS #2
INPUT “Enter name which is to be deleted”; D$ CLS
WHILE NOT EOF(1) INPUT "ENTER ROLL NUMBER TO EDIT DATA"; E
INPUT #1, N$, A$, T# FLAG = 0
IF UCASE$(D$)<>UCASE$(N$) THEN WHILE NOT EOF(1)
WRITE #2, N$, A$, T# INPUT #1, R, N$, A$, P
ELSE IF E <> R THEN
PRINT “Deleted data=”; N$, A$, T# WRITE #2, R, N$, A$, P
END IF ELSE
WEND INPUT "ENTER ROLL NUMBER"; ER
CLOSE #1, #2 INPUT "ENTER NAME"; EN$
KILL “NEPS.DAT” INPUT "ENTER ADDRESS"; EA$
NAME “TEMP.DAT” AS “NEPS.DAT” INPUT "ENTER PERCENTAGE"; EP
END WRITE #2, ER, EN$, EA$, EP
---------------------------------------------------------------------------- FLAG = 1
182.A sequential data file “marks.dat” contains information END IF
such as student’s name, marks obtained in math, science WEND
and computer. Write a program that increase the marks of IF FLAG = 0 THEN
computer by 10 of those student who secured less than 40 PRINT "DATA NOT FOUND"
OPEN "D:\PATIENT.DAT" FOR INPUT AS #1 ELSE
OPEN "d:\TEMP.DAT" FOR OUTPUT AS #2 PRINT "NON EDITED DATA"
CLS PRINT "ROLL NUMBER= "; R
FLAG = 0 PRINT "NAME= "; N$
WHILE NOT EOF(1) PRINT "ADDRESS= "; A$
INPUT #1, N$, A, B, C PRINT "PERCENTAGE= "; P
PRINT "---------------"
IF C > 40 THEN
PRINT "EDITED DATA"
WRITE #2, N$, A, B, C
PRINT "ROLL NUMBER: "; ER
ELSE PRINT "NAME: "; EN$
C = C + 10 PRINT "ADDRESS: "; EA$
WRITE #2, N$, A, B, C PRINT "PERCENTAGE: "; EP
FLAG = 1 END IF
END IF CLOSE
WEND KILL "D:\SALARY.DAT"
IF FLAG = 0 THEN NAME "D:\TEMP.DAT" AS "D:\SALARY.DAT"
PRINT "DATA NOT FOUND" END
ELSE
PRINT "DATA EDITED"
END IF
CLOSE
KILL "D:\PATIENT.DAT"
NAME "D:\TEMP.DAT" AS "D:\PATIENT.DAT"
END

https://seeqbasicomputer.blogspot.com/ 127 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
Number System [300]
[SLC 2065] i) (228)8 into ii) (CA3)16 into binary i) 11×11 ii) Divide 1110 by 11
decimal
[SLC 2065 S] i) (756)8 into ii) (1011011011)2 into (11011x110)-11101 111100÷1000
binary hexadecimal
[SLC 2066] i) (101)10 into ii)(78)8 into decimal 10101-1011 110*11
binary
[SLC 2066 S] i) (524)10 into ii) (31A)16 into Binary 1011x101 1010-111+101
Octal
[SLC 2067] i) (AC3)16 into ii) (110010)2 into octal 11*11-101 Divide 1010 by 10
decimal
[SLC 2067 S] i) (7AF)16 into ii) (1101101)2 into octal 11*11+11 110÷10
binary
[SLC 2068] i) (108)10 into ii) (173)8 into binary 111*11 1010-10+11
binary
[SLC 2068 S] i) (168)10 into ii) (1011)2 into decimal 1011+1101 110x11
binary
[SLC 2069] i) (684)10 into ii) (101011)2 into decimal 1011×11 Divide 100101 by 110
octal
[SLC 2069 S] i) (442)8 into ii) (AB)16 into binary 101 x 10 divide 1101 by 111
decimal
[SLC 2070] i) (BED)16 into ii) (1010111)2 into octal 1010 × 10 10101 ÷ 11
binary
[SLC 2070 S] (209)10-(x)2 ii (537)8-(x)2 101 x 111 110111-1011
[SLC 2071] (108)10 into binary ii) (765)8 into decimal 111×11 Divide 1101 by 11
[SLC 2071 S] (74)8 to decimal (FAC)16 into binary 111×11 101–11
[SLC 2072] (i) (208)10 into (104)8 into decimal 1011 + 1101 110 x 11
Binary
[SEE 2073] (BAD)16 into (1111001)2 into octal 11 x 10 + 11 110 10
Binary
[SEE 2073 U] (364)8 into (1101010)2 into octal 1011 x 101 100101 ÷ 101
decimal
[SLC 2074] (523)8 into Binary (2074)8 into hexadecimal 110 x 101 111010 110
[SEE 2074 U] (CCA)16 into (479)10 into octal (1010) x (111) (10011) ÷ 10
decimal
[SQE 2075K] (235)8 into (BA5)16 into binary (1111 + 1101) – 1101 ´ 11 ¸ 101
decimal (1001)
[SEE 2075 U] (546)8 into (1011100111)2 into 1011 × 101 100101 ¸ 110
decimal Hexadecimal
[SEE 2075] (217)10 into (39C)16 into Decimal 1011 × 11 110111 – 11001
Binary
[SEE 2075 S2] (FA)16 into (420)10 into octal 111 x 10 1101 ÷ 101
Binary
[MM 2076] (974)10 into octal (B52)16 into binary (1011 + 10100) – 1100101 ¸ 101
(1001)
[MFT 2076] (645)8 into decimal (873)10 into Hexa (11011 + 10101) -
1010
(10111011)2 into octal 10101×111 1011011110
[PMT 2075] (105)8 into binary (357)16 into octal (111 ´ 11) – 111 1101 + 101  110
[MFT 2075] (364)8 into (945)10 into Hexa (10101 + 11101) - (10101 + 11101) -
Decimal 1011 1011
(101101011)2 into (1011011) / (101)
Octal
[U1] (AB3)16=(...?...)10 (547)8=(…?...)2 10100-1111+101 Divide 10111 by 101
101011)2 = (?)10 (501)8 into Decimal (1100-101)2 Divide 1011 by 10
https://seeqbasicomputer.blogspot.com/ 128 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha
(235)8 into decimal (BC0D)16 into Binary 10x11+101 111111÷111
(BA5)16 into binary (73)8 into (?)10 11001 – 110 1010011÷111
(ABC)16 to decimal (1352)8 into decimal (10001)2 + (111)2 (110000 /111)
(77)8 to Hexadecimal (CAFE)16 into Octal 1101x11+1011 (10111011) / (101)
(DOE)16 to (?)8 (101101)8 into Decimal 101011+110011-11110 Divide 110111 by 101
(317)10 to (?)2 (DAD)16 = (?)8 (1111+10001) x 111 101011÷111
(48)10 to (?)2 (1204)8 = (?)2 (110101) + (111) – (101) divided 1101 by 101
(75)8to (?)10 (101001-111) * 110 11101 ÷ 101
(458)10 into Octal (167)8= into hexadecimal 10101+110011-10110
(101101101101)2 into (1010111100)2 into 10*111+101 (101x11)2÷100
Hexadecimal Hexadecimal
(11011111101)2 into (?)2 (75)8 into binary (110+10000) x 11 1001 × 101 ÷11
(CAD)16 into (?)10 (675)8 = (?)16 (111000 +111) 1101×11÷111
(45)10 into (?)2 (657)10 = (?)8 (100100 - 11101)2 1001 x 11÷111
(4102)8 into (x)2 (216)10 into (x)16 (1011+1011-111)2 (1110 ÷ 10) + (110)
(486)10 into Hexadecimal (705)8 into Binary 1111+111-101 101110÷111
(487)10 into Hexadecimal (407)8 into Binary 110000 – 10011 1010110÷110
(81)10intoto binary (608)10 =(?)2 1011 * 11 Divide 1101 by 110
(453)8 into hexadecimal (10110000111)2=(?)8 1010+111-101 (1101×110) ÷ 11
(564)10 =(?)2 (100011110111)2=(?)8 1011+110-101 Divide: 101010 by 111
(534)8 into decimal (ACB)16 into binary (1001 - 111) x (111)
(631)10 into Octal (111000000110)2 into (10100)+(1101) (101 × 10)2 + (11 × 10)2 –
Hexadecimal (110)2 – (101)2
(42)10 =(?)2 (14)8 =(?)10 (10100)+(1011) –(1101) Divide 110011 by 11
(30A)16=(?)8 (931)10=(?)16 (110)x11+101 (111001)2 ÷ (101)2
(10011)2 = (?)8 (2A0)16=(?)2 11001 + 1110 – 101 (10100101)2 ÷ (111)2
(715)8 into decimal (BAC)16 into binary (101011-111) × 11 Divide 100101 by 110
(B07)16 =(?)10 (507)8 into Decimal (111)2 × (110)2 – (1101)2 (1110 x1010)2 ÷ 1001
(261)8 =(?)2 (CAFE)16 into Binary (114)2×(101)2-(111)2 101101/100
(1702)8 = (?)16 (1007)10 into hexadecimal (110011 - 11101)2 (100101)2÷(110)2
1005)10 = (?)2 (100010)2 into decimal 1101×101-1101 101110÷111
(101)8 = (?)16 (3AB)16 into octal 110001-(111×10) (10111 x 101) ÷ 1010
(701)8into decimal (1245)10 into binary (1001011)2 ×(1010)2 Divide 1001011 by 100
(CA7E)16 into octal (504)8 into decimal 1010+110-10 Divide 1011011 by 100
(10101111)2= (?)10 (110101011)2 into Hexa (1101+11010)-1001 1010 ÷ 101
decimal
(324)8=(?)16 (231)8 =(?)10 101 + 1001 - 101 (101101 ÷ 110)
(6DB)16=(?)10 (1D3)16 =(?)2 101 × 10 + 10 101101 ÷ 10
(64)8 into binary (233)8 = (?)10 (111001 - 11) + 111001 Divide 100100 by 11

(1010)2 into binary (1001100)2 = (?)16 1101 + 1111 100011 ÷ 111


(6A)16 into decimal (228)8 into decimal 1110 - 111 d ivide 1110 by 11
(BED)16 into binary (CA3)16 into binary 10 × 101 + 1101 Divide 1010 by 10
(1010111)2 into octal (101)10 into binary (101+11) x 101 Divide 100101 by 110
(756)8 into binary (78)8 into decimal 101011 + (110110 – 111100÷1000
11101)
(1011011011)2 into (AC3)16 into decimal 11*11 Divide 1001011 by 100
hexadecimal
(524)10 into Octal (110010)2 into octal 10101-1011 Divide 1011011 by 100

(31A)16 into Binary (108)10 into binary 110*11 divide 1101 by 111
(7AF)16 into binary (173)8 into binary 11*11-101 divide 1011011 by 111
(1101101)2 into octal (684)10 into octal 111*11 10101 ÷ 11
(168)10 into binary (101011)2 into decimal 1010-10+11 110  10
https://seeqbasicomputer.blogspot.com/ 129 |
Page
SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha

SEE BATCH 2076

I BELIEVE THAT WITHOUT MEMORIES THERE IS NO


LIFE, AND THAT OUR MEMORIES SHOULD BE OF
HAPPY TIMES.
NO MATTER WHAT HAPPENS SOME MEMORIES CAN
NEVER BE REPLACED.

Compiled By: Deepak Shrestha


https://seeqbasicomputer.blogspot.com/ 130 |
Page

You might also like