Set 5: PABSON 2080(Karnali/Sudurpaschim)
![](https://deepak2081.com.np/wp-content/uploads/2024/08/SEE-Grade-Increment-2080-2014-SOLVED-4-1024x1024.png)
Opt. II Computer Science
Time : 2 hours Full Marks: 50
Candidates are required to give their answer according to the given instructions.
Attempt all questions.
Group ‘A
- Answer the following questions in one sentence:
- What do you mean by primary key?
Ans: A primary key is a field or combination of fields in a table that uniquely identifies each record, and is used to establish relationships between tables and enforce data integrity.
- What is a database? Give example.
Ans: A collection of systematically organized inter-related data which store, organize and retrieve data is called a database. E.g. Dictionary, Marks Ledger etc.
- Define cyber ethics.
Ans: Cyber ethics is a set of moral principles or code of conducts that regulate the use of computers systematically without making harm to other users.
- Write any two keywords used in C-programming.
Ans: Any two keywords used in C-programming are int, return.
- What do you mean by B2C model of e-commerce?
Ans: The B2C (Business-to-Consumer) model involves businesses selling products or services directly to consumers online.
- What is the function of INT() in QBASIC programming?
Ans: The INT() function in QBASIC returns the integer portion of a number by removing the decimal part.
- Write appropriate technical term for the following:
- The device that is used to connect two networks with different communication protocols. Gateway
- A person who breaks computer security and uses a computer and file present in it. Hacker
- Write the full form of the following:
- VOIP – Voice Over Internet Protocol
- WLAN – Wireless Local Area Network
Group ‘B’
- Answer the following questions:
- What is computer network architecture? Mention its types.
Ans: Computer network architecture defines how the computer communicates and interacts with each other on network. Types include Centralized, Peer-to-Peer (P2P) and Client-Server architectures.
- What do you mean by digital signature? Why it is important?
Ans: A digital signature is an encrypted code attached to an electronic document, verifying the sender’s identity. It is important because it ensures the authenticity and integrity of a document.
- What is a firewall? Enlist the types of firewall.
Ans: A firewall is a security system that monitors and controls incoming and outgoing network traffic.
Types of firewall are:
Network-Based Firewall: This type of firewall protects an entire network. It’s like a big wall around a city, guarding all the computers in that network from outside threats. It is usually placed where the network connects to the internet.
Host-Based Firewall: This type of firewall protects a single computer. It’s like a personal security guard for your computer, checking all the data that comes in and out of it.
- Differentiate between computerized and non- computerized databases.
Ans:
Computerized Database | Non-Computerized Database |
It can store large volume of data. | It is limited by physical storage available. |
We can search data very easily. | It can take a while to manually search through all of the records. |
- What is Al? Enlist two application areas of Al.
Ans: Artificial intelligence (AI) is an area of computer science that emphasizes the creation of intelligent machines that work and reacts like humans.
Application areas include Natural Language Processing and Robotics.
- What is hardware security? Enlist any two measures to protect it.
Ans: Hardware security refers to the protection of physical devices from damage, theft, or unauthorized access. Measures include regular maintenance and insurance.
- What is field property in Ms-Access? Enlist any four of them.
Ans: Field properties in MS-Access define the characteristics and behavior of fields in a table. Examples: Field Size, Format, Default Value, Validation Rule.
- What is Indexing? Why form and report are used in MS-Access?
Ans: Indexing is a field property which speeds up searching and sorting of records based on a field.
Forms are used to easily enter, view, and edit data in the database. They provide a user-friendly way to interact with the data.
Reports are used to present data in a structured and printable format. They allow us to create professional-looking documents that summarize and display the information stored in the database.
- What is Query ? Write the types of Action Query .
Ans: Query is an object of database that is used to view, retrieve, change and analyze records from a table or multiple linked tables based on specified condition.
Types of Action Queries include Update, Append, Delete, and Make-Table.
- Write the output of the given program. (workout with a dry-run table)
DECLARE SUB Show ( )
CLS
CALL Show
END
SUB Show
C=3
B=2
FOR I = 2 TO 8 STEP 2
PRINT C;
SWAP B, C
B = C + 1
NEXT I
END SUB
Dry Run Table
B | C | FOR I = 2 TO 8 STEP 2 | PRINT C; | SWAP B, C | B=C+1 |
2 | 3 | 2 to 8 step 2 yes | 3 | B=3, C=2 | 2+1=3 |
3 | 2 | 4 to 8 step 2 yes | 2 | B=2, C=3 | 3+1=4 |
4 | 3 | 6 to 8 step 2 yes | 3 | B=3, C=4 | 4+1=5 |
5 | 4 | 8 to 8 step 2 yes | 4 | B=4, C=5 | 5+1=6 |
6 | 5 | 10 to 8 step 2 no Loop Exits |
|
|
|
The output of the program is:
3 2 3 4
- Rewrite the given program after correcting bugs:
REM To add a few records in the existing data file
CLS
OPEN “emp.dat” FOR OUTPUT AS #2
DO
INPUT “Enter Employee Name, Post, Salar”; :EN$, POST$, SALARY
PRINT #2, EN$, POST$, SALARY
INPUT “ADD MORE RECORDS (Y/N)?”; C
LOOP WHILE LICASE$(C$)=”Y”
CLOSE #1
END
Debugged Program
REM To add a few records in the existing data file
CLS
OPEN “emp.dat” FOR APPEND AS #2
DO
INPUT “Enter Employee Name, Post, Salary: “; EN$, POST$, SALARY
PRINT #2, EN$, POST$, SALARY
INPUT “ADD MORE RECORDS (Y/N)? “; C$
LOOP WHILE UCASE$(C$) = “Y”
CLOSE #2
END
- Study the following program and answer the given questions:
DECLARE FUNCTION SUM(N)
CLS
INPUT “Enter a number”; N
X=SUM(N)
PRINT “The sum of individual digits is”; X
END
FUNCTION SUM(N)
WHILEN<>0
R=N MOD 10
S=S+R
N=INT(N/10)
WEND
SUM=S
END FUNCTION
- Name the user defined function in the above program.
Ans: SUM ( ) is the user defined function in the above program.
- How many times the WHILE WEND loop repeats If the value of Nis 1234?
Ans: 4 times the WHILE WEND loop repeats If the value of N is 1234.
Group C
Calculate or convert as per the instructions.
(CA)16 = (?)10
= (12 × 16¹) + (10 × 16⁰)
=12×16 + 10 × 1
=192+10
=202
(CA)16 = (202)10
(652)10 = (?)8
Divide by the base 8 to get the digits from the remainders:
Division | Quotient | Remainder (Digit) | Digit # |
(652)/8 | 81 | 4 | 0 |
(81)/8 | 10 | 1 | 1 |
(10)/8 | 1 | 2 | 2 |
(1)/8 | 0 | 1 | 3 |
= (1214)8
(652)10 = (1214)8
(10101)2 x (11)2 – (1110)2
|
|
| 1 | 0 | 1 | 0 | 1 |
|
|
|
|
| x | 1 | 1 |
|
|
| 1 | 0 | 1 | 0 | 1 |
|
| 1 | 0 | 1 | 0 | 1 | X |
|
| 1 | 1 | 1 | 1 | 1 | 1 |
|
|
|
| 1 | 1 | 1 | 0 |
|
| 1 | 1 | 0 | 0 | 0 | 1 |
(10101)2 x (11)2 – (1110)2 = (110001)2
(111011)2 / (100)2
100) | 1 | 1 | 1 | 0 | 1 | 1 | (1110 |
| 1 | 0 | 0 |
|
|
|
|
|
| 1 | 1 | 0 |
|
|
|
|
| 1 | 0 | 0 |
|
|
|
|
|
| 1 | 0 | 1 |
|
|
|
|
| 1 | 0 | 0 |
|
|
|
|
|
|
| 1 | 1 |
|
|
|
|
|
|
| 0 |
|
|
|
|
|
| 1 | 1 |
|
Q = 1110
R = 11
9 a. Write a program in QBASIC to input a radius, create a user defined function to calculate the volume of hemisphere and total surface area (TSA) of the sphere using sub procedure.
DECLARE SUB CalcSphere(R)
INPUT “Enter Radius: “; R
CALL CalcSphere(R)
END
SUB CalcSphere(R)
V = (2/3) * 3.14159 * R^3
TSA = 4 * 3.14159 * R^2
PRINT “Volume of Hemisphere = “; V
PRINT “Total Surface Area of Sphere = “; TSA
END SUB
b A sequential data file “record.dat” contains the name, address, salary of employees, and displays the record of those whose salary is more than 37000 and whose name ends with “DHA.
OPEN “record.dat” FOR INPUT AS #1
DO WHILE NOT EOF(1)
INPUT #1, NAME$, ADDR$, SALARY
IF SALARY > 37000 AND RIGHT$(NAME$, 3) = “DHA” THEN
PRINT NAME$, ADDR$, SALARY
END IF
LOOP
CLOSE #1
END
- Write a C program to input a character and check whether it is vowel or consonant. (4)
#include <stdio.h>
int main() {
char ch;
printf(“Enter a character: “);
scanf(“%c”, &ch);
if (ch == ‘A’ || ch == ‘E’ || ch == ‘I’ || ch == ‘O’ || ch == ‘U’ ||
ch == ‘a’ || ch == ‘e’ || ch == ‘i’ || ch == ‘o’ || ch == ‘u’) {
printf(“%c is a vowel.\n”, ch);
} else {
printf(“%c is a consonant.\n”, ch);
}
return 0;
}
OR
Write a program in C ‘language’ to input a number and check whether it is a palindrome or not. [4]
#include <stdio.h>
int main() {
int n, reversed = 0, original, remainder;
printf(“Enter an integer: “);
scanf(“%d”, &n);
original = n;
while (n != 0) {
remainder = n % 10;
reversed = reversed * 10 + remainder;
n /= 10;
}
if (original == reversed) {
printf(“%d is a palindrome.\n”, original);
} else {
printf(“%d is not a palindrome.\n”, original);
}
return 0;
}