Students and Teachers Forum

The procedure for conversion of octal numbers to their decimal equivalents is similar to conversion of binary numbers to their decimal equivalents but with the difference, that the base used in this case is 8 instead of 2 used in binary.Solution: 3 .....

Hexadecimal digit is represented in 4 bits. A hexadecimal number is converted to its binary equivalent by just substituting the respective binary value for each digit of the hexadecimal number.Solution:Hexadecimal Number: 4 A 5Binary Equivalent: 100 .....

The decimal equivalent of a hexadecimal number is the sum of the digits multiplied by 16 with their corresponding weights. Solution: 2 1 0 (weight)Hexadecimal Number: A 2 EDecimal Equivalent = A×162 + 2×161 + E×160 = 10×256 + .....

A number system that uses sixteen different digits to represent different values is known as hexadecimal number system. The base of hexadecimal number system is 16 because it consist sixteen digits from 0 to 9 and A to F to represent values from ten .....

A number system that uses eight different digits to represent different values is known as octal number system. The base of octal number system is 8 because it consist eight digits from 0 to 7. The octal number system is used in the computer to .....

Using FUNCTION Procedure:DECLARE FUNCTION Age$(A)CLSINPUT"Enter your age";APRINT Age$(A)ENDFUNCTION Age$(A)IF A >= 18 THENAge$= "You can give vote"ELSEAge$= "You can't give vote"ENDIFEND .....

DECLARE SUB Per( P )CLSINPUT"Enter your percentage";PCALL Per ( P )ENDSUB Per ( P )SELECT CASE PCASE is < 30PRINT"You are fail"CASE 31 to 60PRINT"You are third"CASE 61 to 75PRINT"You are second"CASE 76 to 85PRINT"You are first"CASE ELSEPRINT"You .....

DECLARE FUNCTION Smallest$( A,B,C)CLSINPUT"Enter the first number";AINPUT"Enter the second number";BINPUT"Enter the third number";CPRINT Smallest$ (A,B,C)ENDFUNCTION Smallest$( A,B,C)IF A < B AND A < C THENSmallest$="A is smallest"ELSEIF B .....

Using SUB Procedure:DECLARE SUB Greatest(A,B,C)CLSINPUT"Enter the first number";AINPUT"Enter the second number";BINPUT"Enter the third number";CCALL Greatest (A,B,C)ENDSUB Greatest(A,B,C)IF A >B AND A > C THENPRINT"A is greatest"ELSEIF B > .....

DECLARE SUB Array (n( ) )CLSDIM n(10 )FOR I= 1 to 10INPUT" Enter any number";n(i)NEXT ICALL Array( n ( ) )ENDSUB Array (n( ) )ENDSUB Array ( n ( ) )FOR I = 1 to 10IF n(i) > max THEN max= n(i)NEXT IPRINT" Maximum number";MaxEND .....

DECLARE SUB Even (n( ) )CLS DIM n(5)FOR I= 1 to 5INPUT" Enter the number"; n(i)NEXT ICALL Even ( n ( ) )ENDSUB Even( n ( ) )ENDSUB Even (n ( ) )FOR I = 1 to 5R= n(i) mod 2 =0SUM = SUM + n(i)NEXT IPRINT"Sum of even numbers is";SUMEND .....

DECLARE FUNCTION Kins( a( ) )CLSDIM a(5)FOR I = 1 to 5INPUT"Enter the number"; a(i)NEXT IPRINT kins ( a ( ) )FOR I = 1 to 5SUM = SUM + a(i)NEXT IKins= SUMEND .....

DECLARE SUB Array( a( ) )CLSDIM a(5)FOR I = 1 to 5INPUT" Enter any number"; a(i)NEXT ICALL Array( a( ) )ENDSUB Array ( a( ) )FOR I = 1 to 5PRINT a(i)NEXT IEND .....

Declare Sub Kul ( )CLSCall kul ( )ENDSub kul ( )C=1While C <= 10Print CC= .....

Using SUB Procedure:DECLARE SUB SUM(A$)CLSINPUT"Enter any string";A$CALL SUM(A$)ENDSUB SUM(A$)FOR I = 1 to LEN(A$)B$= Ucase$(MID$(A$,I,1))S=S+ASC(B$)NEXT IPRINT"Sum of ASCII value";SEND .....

DECLARE FUNCTION Sentence(A$)CLSPRINT Sentence(A$)ENDFUNCTION Sentence(A$)FOR I = 1 to LEN(A$)B$= Ucase$(MID$(A$,I,1)IF B$= "A" THEN C= C+1NEXT ISentence = CEND .....

DECLARE SUB Alter(A$)CLSINPUT"Enter any string";A$CALL Alter(A$)ENDSUB Alter(A$)FOR I = 1 to LEN(A$)C$= MID$(A$,I,1)IF I MOD 2 = 1 THENB$=B$+ Ucase$(C$)ELSEB$=B$+ Lcase$(C$)ENDOFNEXT IPRINT"Alternate character is";B$END .....

Using FUNCTION Procedure:DECLARE FUNCTION Pal(A$)CLSINPUT"Enter any string";ACALL Pal(A$)ENDFUNCTION Pal(A$)FOR I = LEN(A$) to 1 Step-1B$= B$+MID$(A$,I,1)NEXT IIF A$ = B$ THENA$ = "It is palindrome"ELSEA$="It is not palindrome"END IFEND .....

DECLARE SUB KINS(A$)CLSCALL KINS(A$)ENDSUB KINS(A$)FOR I = 1 to LEN(A$)PRINT MID$(A$,I,1)NEXT IEND .....

DECLARE SUB KINS(A$)CLSA$= "Nepal"CALL KINSENDSUB KINS (A$)FOR I = 1 to LEN (A$)PRINT RIGHT$(A$,1)NEXT IEND .....

DECLARE SUB KINS(A$)CLSA$= "NEPAL"CALL KINS(A$)ENDSUB KINS(A$)FOR I = LEN(A$) to 1 Step-1PRINT LEFT$(A$,1)NEXT IEND .....

Virtual Reality is an artificial environment created with the computer hardware and software and presented to the user in such a way that it appears real. .....

Any four areas where multimedia are used are as follows: Business Entertainment Advertising Web .....

The list of any four software required in the multimedia computer to play the multimedia products are as follows: Microsoft media player Microsoft power point Xing player Flash player .....

Any two disadvantages of multimedia are as follows: It is not always compatible. Only skill manpower can use multimedia technology. .....

Any four advantage of multimedia are as follows: It enhances the messages by adding interesting sounds and visuals. It helps students to learn themselves using the subject wise multimedia CD. Games and movies are made more realistic .....

Scandisk is an important utility program that helps to keep a disk in a good working condition. It checks files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk and it can fix them if it is .....

Software prevents data loss by following ways:1) Antivirus software can detect and remove viruses from computer.2) Scan disk Checks file, folders, bad sectors and any other errors of specific disk and fix them.3) Software for backup helps in .....

The defragmentation is the process of rearranging the fragmented files in the contiguous spaces on the disk. When the fragmented files are defragmented, the files and the programs are loaded faster than the previous. .....

The backup system is one of the important data and software security measures which helps to make a duplicate copy of data and software. When data and software are damaged due to intentional or accidental harm, we can restore data and .....

A password is a secret word or a sequence of characters that provides accessibility to a user to access file, application or computer system. A computer user has to enter user name and password for logging into computers, retrieving e-mail from .....

The protection of data and programs from being lost or damaged due to accidental or intentional harm is known as data and software security. Any four data and software security measures are as follows: Password Antivirus software .....

Some destructive effects of computer viruses are: 1) virus can change the contents of the files and codes of programs. 2) Virus can delete and destroy data, information and programs. 3) Virus can replicate and spread from one file to other files. 4) .....

Computer virus is a destructive program, which replicates itself by making copies of itself without the user's knowledge. It is developed by the programmer by the help of internet for destroying or damaging the data, information and programs .....

Any four preventive ways to protect computer system from computer viruses are as follows: Install antivirus software and update the virus definition file frequently. Install the firewall. Install the latest security patch program. Scan .....

Antivirus software are those software that can protect from virus so that your computer system runs smoothly. Any four antivirus software are as follows: Norton Antivirus Kaspersky PC-cilin Norman Virus Control. .....

Boot sector virus infects the information system during the start-up process. It tends to create bad sector of the hard drive or floppy disk. The virus infects the system by using infected diskettes during start up. The entire computer system .....

A wide area network (WAN) is the large network of computers in wide geographical area such as cities, districts and countries through satellite or other long range communication technologies. A WAN can formed by joining many groups of LANs and MANs. .....

A metropolitan area network (MAN) is the network of computers spread over a city through wire or wireless media. A MAN can be formed by joining two or many groups of LANs within a cities. Network of different branches of bank, college, companies .....

A local area network (LAN) is a small network of computers that are relatively near with each other within a small area like a room, building or within a short distance through wire or wireless media. A LAN where wireless media are used is known as .....

The full form of SMTP is Simple Mail Transfer Protocol. .....

The full form of POP is Post Office Protocol. .....

The full form of TCP/IP is Transmission Control Protocol/ Internet Protocol. .....

The major laws included in the cyber law are:1) Electronic and digital signature law2) Cyber crime law3) Data protection and privacy law4) Telecommunication law5) Intellectual property .....

Virtual space is created by world wide computer network, internet and telecommunication is called cyber .....

The branch of practical principal that deals with how the computer experts should make decision in regard to the social and professional behavior is known as computer ethics.Any four commandments of the computer ethics are as follows:You should not .....

"The electronic transaction and digital signature Act-ordinance"is popularly known as cyber law of Nepal. It is important in Nepal because it legalize the transaction through electronic media, to control and stop the various types of electronic .....

The law which is used for stopping computer crime like hacking, online fraud, software piracy, etc. and computer abuse is known as cyber law. .....

In ring topology, all computers and other devices are connected in the shape of a circle without any end point. Computers are connected together in a closed loop or a ring and signals are transmitted in one direction.Advantages:1) It is easy to .....

A network interface card (NIC) is the adapter through which a computer is connected to a network. It should be installed in one of the empty expansion slots of a motherboard but is built-in in the present motherboard. Each NIC is assigned a unique .....