SEE Questions Day 1 | Computer Science | SEE Computer Science Practice Questions

blogs SEE Computer Questions




Best SEE Computer Science Model Questions, SEE / SLC Computer Science Practice Question available here. This set is for Day 1. Read all of these questions very well. SEE / SLC Computer Science Practice Questions 

Answers to this questions are available at the bottom.

    1. Define Computer Network with any 2 example.

    2. What is Data Communication ? List any 2 example.

    3. What is Internet ? Mention full form of LAN, MAN and WAN.




    1. Differentiate between Virus and Trojan

    2. Define Cyber Security. List 2 example of Cyber Crime.

    3. What is multimedia ? Mention 3 devices used in multimedia field.

    4. Role of Antivirus. Mention 2 names of Antivirus Software.




  1. Define Database with 2 examples.

  2. What is primary key ? What is the purpose of primary key ?

  3. Define Query and Data Type.

  4. What is the function of CALL and PRINT statements ?




Answers to above questions here :

A computer network is a set of computers connected together for the purpose of sharing resources. The most common resource shared today is connection to the Internet. Example : Printer connected to computer, Server connected to computer.

Data communications refers to the transmission of this digital data between two or more computers. It enables the movement of electronic or digital data between two or more nodes, regardless of geographical location, technological medium or data contents. Example : Email and Facebook Chat.




The Internet is the global system of interconnected computer networks that use the Internet protocol suite (TCP/IP) to link devices worldwide. LAN – Local Area Network, WAN – Wide Area Network, MAN – Metropolitan Area Network.

A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria: It must execute itself. It will often place its own code in the path of execution of another program. It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike.




Trojan horses are impostors–files that claim to be something desirable but, in fact, are malicious. A very important distinction from true viruses is that they do not replicate themselves, as viruses do. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in effect, invite these programs onto your computers–for example, by opening an email attachment. The PWSteal.Trojan is a Trojan.

Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks. Example of cyber crime : Phising (attack to get email and password), Hacking ATM for money.




Multimedia is content that uses a combination of different content forms such as text, audio, images, animations, video and interactive content. 3 devices : speaker, projector, headphone.

Role of Antivirus : Antivirus helps to detect unwanted malicious files, it helps to defend against incoming virus, worms and trojans. 2 names : NOD 32 and Kaspersky.

A database is an organized collection of data, generally stored and accessed electronically from a computer system. 2 example : users profile in website, students record in software




A query is a database object that creates a datasheet of selected fields and records from one or more tables.

A data type is an attribute for a field that determines what type of data it can contain. The different data types that can be stored on Access data field are: numeric, text, currency, date/time, AutoNumber, Yes/No, OLE object, Hyperlink and Lookup Wizard.

A primary key is a field that uniquely identifies each record. A primary key prevents duplicate records from being entered in the table and is used to control the order in which records display in the table. This makes it faster for databases to locate records in the table and to process other operations. The primary key is also used to create a link between tables in a database.




CALL: Used to transfer control to another procedure, a BASIC SUB program.

PRINT: Display result on the screen

Computer Training Class after SLC/SEE. Remember us for computer training in Pokhara after SEE.

Leave a Reply

Your email address will not be published.