SEE Pre-Qualifying Examination – 2082, Kathmandu
Subject: Computer Sc[6ience
Time: 2 hrs
Attempt all the questions.
Group – A [10 Marks]
1. Answer the following questions in one sentence. [6 x 1 = 6]
a) Define network protocol.
Ans : A set of rules followed for interconnection and communication between computers in a network is called a protocol. For eg: SMTP, TCP/IP, FTP, etc.
b) List some areas where AI can help us.
Ans: The some areas where AI can help us are:
- Healthcare: Medical diagnosis and treatment planning
- Finance: Fraud detection and prevention.
c) What is the size of YES/NO field in MS-Access?
Ans: The size of YES/NO field in MS-Access is 1 bit.
d) Write any two examples of database management system.
Ans: The two examples of database management system are MS-Access and Oracle.
e) What is the use of EOF ( ) function?
Ans: The use of EOF ( ) function is to check whether the record pointer reaches at the end of file or not.
f) Write any two format specifier used in C language.
Ans: Any two format specifier used in C language are : %d for the int and % f for the float.
2. Write the appropriate technical terms for the following. [2 x 1 = 2]
a) A device that connects two dissimilar networks. Gateway
b) Delivery of different services through the internet. Cloud computing
3. Write the full forms of the following: [2 x 1 = 2]
a) G2B = Government to Business
b) TCP/IP = Transmission Control Protocol / Internet Protocol
Group B [24 Marks]
4. Answer the following questions. [9 x 2 = 18]
a) Differentiate between LAN and WAN. (any two points)
| LAN | WAN |
| 1) It is a network that connects computers and devices within a small area such as a home, office or school. | 1) It is a network that connects computers and devices over a very large area such as a country or the whole world often using satellite, microwave, etc. |
| 2) It has low setup and maintenance cost. | 2) It has high setup and maintenance cost. |
| 3) It is owned and managed by an individual or organization. | 3) It is owned and managed by multiple organizations. |
b) What is cybercrime? Write any two examples of cybercrime.
Ans: The crime done by using the internet and a computer is called cybercrime. The two examples of cybercrime are: Phishing and hacking.
c) What is firewall? Why is it important in network security?
Ans: A firewall is a security system that monitors and controls incoming and outgoing network traffic to protect systems from unauthorized access and cyber threats. It is important in network security because:
- It prevents unauthorized users from accessing a network or computer system.
- It controls and filters incoming and outgoing network traffic based on security rules.
d) Mention any two benefits and any two limitations of e-commerce.
Ans: Any two benefits of E-commerce are:
1) It makes buying/selling possible 24/7, faster, as well as easy to find products.
2) Low operational costs and better quality of services.
Any two limitations of E-commerce are:
1) Lack of personal touch. We cannot touch the goods physically.
2) Not all goods can be purchased online.
e) What is virtual reality? List any two advantages of it.
Ans: Virtual Reality (VR) is a technology that creates a simulated environment, allowing users to immerse themselves in a 3D world that they can interact with it.
Any two advantages of Virtual Reality are:
- It makes a playing games and exploring places more exciting because it feels real.
- VR helps students learn by letting them explore virtual ancient cities or cells.