Saturday, February 21, 2026

SEE COMPUTER SCIENCE 2082 – FULL N FINAL REVISION –28 Marks– PREPARED BY – DEEPAK SHRESTHA

SEE COMPUTER SCIENCE 2082 – FULL N FINAL REVISION –28 Marks– PREPARED BY – DEEPAK SHRESTHA



1️ Write any two data types used in C language.

Answer: Two data types used in C language are int and char.

 

2️ What is modular programming?

Answer: Modular programming is a technique of dividing a program into small, manageable and logical modules or sub-programs.

 

3️ What is the maximum length of field name in MS-Access?

Answer: The maximum length of a field name in MS-Access is 64 characters.

 

4️ What is search engine?

Answer: A search engine is an online tool that helps users find information on the internet using keywords.

 

5️ What is the business done through internet?

Answer: The business done through the internet is called e-commerce.

 

6️ Which data type is used to store photo in MS-Access?

Answer: OLE Object data type is used to store photos in MS-Access.

 

7️ What is web browser?

Answer: A web browser is a software application used to access and display web pages on the internet.

 

8️ What is looping?

Answer: Looping is the process of repeating a statement or group of statements until a certain condition is satisfied.

 

9️ Name any two unguided transmission media.

Answer: Two unguided transmission media are radio waves and microwaves.

 

What is social media?

Answer: Social media are online platforms that allow users to create, share and interact with content and connect with others.

 

Which statement is used to call sub-procedure?

Answer: The CALL statement is used to call a sub-procedure.

 

What is the default extension of MS-Access?

Answer: The default extension of MS-Access is .accdb (and .mdb in older versions).

 

Which object of MS-Access is used to retrieve data from the table?

Answer: Query is used to retrieve data from a table.

 

What is network protocol?

Answer: A network protocol is a set of rules that govern communication between devices in a network.

Which data type is used to store date of birth in MS-Access?

Answer: Date/Time data type is used to store date of birth in MS-Access.

 

Write any two elements of database.

Answer: Two elements of a database are field and record.

 

Write any two benefits of e-governance service.

Answer: Two benefits of e-governance are transparency and easy access to government services.

 

Which type of query is used to calculate total marks in MS-Access?

Answer: Select query is used to calculate total marks in MS-Access.

 

List the different types of procedures in QBasic.

Answer: The two types of procedures in QBasic are Sub procedure and Function procedure.

 

Which format specifier is used for ‘int’ in C language?

Answer: The format specifier used for int in C language is %d.

 

What is telecommunication?

Answer: Telecommunication is the transmission of data and information from one place to another for communication.

 

Give any two examples of simplex mode.

Answer: Two examples of simplex mode are radio and television broadcasting.

 

Write the syntax of KILL statement.

Answer: The syntax of KILL statement is: KILL "filename".

 

What is online payment?

Answer: Online payment is the process of paying for goods or services through the internet.

 

Write down any two objects of MS-Access.

Answer: Two objects of MS-Access are table and form.

 

What is report?

Answer: A report is a database object used to present data in a formatted and printable manner.

 

Write the function of WRITE statement.

Answer: The WRITE statement is used to write data into a sequential file.

 

 

 

 

 

 

 

📘 GROUP B

1️ What is Computer Network? Enlist any two advantages.

Answer:

A computer network is a group of two or more computers and devices connected together through communication media to share data and resources. It allows users to communicate and exchange information efficiently.

Advantages:

  1. Hardware devices like printers and scanners can be shared.
  2. Data and information can be exchanged quickly among users.

 

2️ What is Computer Ethics? Write any two ethics.

Answer:

Computer ethics refers to the moral principles and guidelines that regulate the proper use of computers and information technology. It encourages responsible and lawful behavior while using digital devices.

Any two ethics:

  1. Do not use a computer to harm others.
  2. Do not access or modify others’ files without permission.

 

3️ What is Computer Security? Write any two measures.

Answer:

Computer security is the protection of computer systems, data, and devices from unauthorized access, misuse, or damage. It ensures the safety and confidentiality of information.

Any two measures:

  1. Install antivirus software to prevent malware attacks.
  2. Use strong passwords and firewall protection.

 

4️ What is Software Security? Write any two measures.

Answer:

Software security refers to the protection of computer programs and applications from hacking, viruses, and unauthorized modification. It ensures that software functions safely and correctly.

Any two measures:

  1. Update software regularly to fix vulnerabilities.
  2. Use licensed and genuine software only.

 

5️ Define E-Commerce. Write any two benefits.

Answer:

E-commerce is the buying and selling of goods and services over the internet through electronic transactions. It allows businesses and customers to perform transactions online.

Any two benefits:

  1. Customers can shop anytime and from anywhere.
  2. It reduces operational and transportation costs.

 

 

6️ What is DBMS? Write any two advantages.

Answer:

DBMS (Database Management System) is software used to create, store, manage, and retrieve data efficiently in an organized manner. It helps in systematic handling of large amounts of information.

Any two advantages:

  1. Reduces duplication of data.
  2. Provides better data security and control.

 

7️ What is Primary Key? List any two advantages.

Answer:

A primary key is a field in a database table that uniquely identifies each record and does not allow duplicate or null values.

Any two advantages:

  1. Ensures uniqueness of records.
  2. Helps establish relationships between tables.

 

8️ What is Query? Mention its types.

Answer:

A query is a database object used to retrieve, filter, and manipulate specific data from one or more tables based on given conditions.

Types of query:

  1. Select Query
  2. Action Query (Update, Delete, Append, Make Table)

 

9️ What is Form? Write any two uses.

Answer:

A form is a database object used to enter, edit, and display data in a structured and user-friendly format.

Any two uses:

  1. Simplifies data entry.
  2. Allows modification of existing records.

 

🔟 What is Report? Why is it necessary?

Answer:

A report is a database object used to present data in a formatted and printable layout. It organizes information in a clear and structured way.

It is necessary because it summarizes data and produces professional output for printing and presentation.

 

🔹 What is Data Sorting? List any two advantages.

Answer:

Data sorting is the process of arranging records in ascending or descending order based on a specific field such as name, roll number, or marks. It helps organize data systematically.

Any two advantages:

  1. Makes data easier to understand.
  2. Helps in quick searching of records.

🔹 What is Antivirus Software? Name any two examples.

Answer:

Antivirus software is a program designed to detect, prevent, and remove viruses and other malicious software from a computer system. It protects the system from security threats.

Examples:

  1. Norton Antivirus
  2. Kaspersky Antivirus

🔹 Define Artificial Intelligence (AI). Write any two uses.

Answer:

Artificial Intelligence (AI) is the branch of computer science that enables machines to perform tasks that normally require human intelligence, such as learning and decision-making.

Any two uses:

  1. Self-driving cars
  2. Medical diagnosis systems

 

🔹 What is M-Commerce? Write any two important services.

Answer:

M-Commerce (Mobile Commerce) is the buying and selling of goods and services using mobile devices such as smartphones through wireless internet.

Any two services:

  1. Mobile banking
  2. Online shopping apps

 

🔹 What is IoT? Write any two importance of it.

Answer:

Internet of Things (IoT) refers to a network of interconnected devices that communicate and exchange data through the internet without human intervention.

Any two importance:

  1. Reduces human effort through automation.
  2. Allows remote monitoring and control of devices.

 

🔹 Define Field and Record.

Answer:

A field is a column in a database table that stores a specific type of data.
A record is a row in a table that contains complete information about one entity.

 

🔹 What are the symptoms of computer virus?

Answer:

A computer virus is a harmful program that affects system performance.

Any two symptoms:

  1. Slow performance of the computer.
  2. Files and programs may get corrupted or deleted.

 

 

🔹 What is Network Topology? List any two types.

Answer:

Network topology refers to the physical or logical arrangement of computers and devices in a network.

Any two types:

  1. Star topology
  2. Bus topology

 

🔹 Define Virtual Reality. Write any two areas where it is used.

Answer:

Virtual Reality (VR) is a computer-generated simulated environment that appears real and allows users to interact with it.

Any two uses:

  1. Gaming
  2. Medical training

 

🔹 What is Password? Write any two importance of password protection.

Answer:

A password is a secret combination of characters used to protect computer systems and accounts from unauthorized access.

Any two importance:

  1. Prevents unauthorized access.
  2. Protects personal and confidential data.

 

🔹 What are Validation Rule and Validation Text?

Answer:

Validation Rule is a field property in MS-Access that restricts the type of data entered in a field.
Validation Text is the error message displayed when invalid data is entered.

 

🔹 Give the differences between Select Query and Action Query.

Answer:

Select Query

Action Query

It is used to retrieve and display data from one or more tables.

It is used to modify data in a table.

It does not change the original data.

It changes the original data permanently.

Example: Viewing records based on a condition.

Example: Update, Delete, Append, Make Table queries.

 

🔹 What is Backup? How does it help to secure data?

Answer:

Backup is a duplicate copy of important data stored separately for safety. It helps recover data in case of system failure, virus attack, or accidental deletion.

 

🔹 What is Social Media? Write any one reason why it is popular.

Answer:

Social media are online platforms that allow users to create, share, and interact with content and communicate globally.

It is popular because it enables instant communication and fast information sharing.


🔹 Differentiate between Guided and Unguided Media.

Answer:

Guided Media

Unguided Media

Guided media uses physical cables or wires to transmit data.

Unguided media uses wireless signals to transmit data.

Data travels through a fixed path.

Data travels through air or space without physical connection.

Examples: Twisted pair cable, Coaxial cable, Fiber optic cable.

Examples: Radio waves, Microwaves, Satellite communication.

 

🔹 What is E-Governance? Give any two examples.

Answer:

E-Governance is the use of electronic systems and the internet to provide government services to citizens efficiently.

Any two examples:

  1. Online tax payment
  2. Online PAN registration

 

🔹 What is Data Communication? List two modes.

Answer:

Data communication is the process of transferring data between two or more devices through communication channels.

Two modes:

  1. Simplex
  2. Duplex

 

🔹 What is Table? Which view is used to modify a table?

Answer:

A table is the main database object in MS-Access used to store data in rows and columns.

Design View is used to modify the structure of a table.

 

🔹 Give any two differences between Form and Report.

Answer:

Form

Report

A form is used to enter, edit, and view data in a database.

A report is used to present data in a formatted and printable layout.

Data can be modified through a form.

Data cannot be modified through a report.

 

 

 

FULL FORMS

1️ STP – Shielded Twisted Pair

2️ POP – Post Office Protocol

3️ G2G – Government to Government

4️ ISP – Internet Service Provider

FTP – File Transfer Protocol

MAN – Metropolitan Area Network

AI – Artificial Intelligence

IoT – Internet of Things

URL – Uniform Resource Locator

NIC – Network Interface Card

OTP – One Time Password

UPS – Uninterruptible Power Supply

VR – Virtual Reality

WAP – Wireless Application Protocol

TECHNICAL TERMS

A program that protects computer from computer virus / A program that can disinfect a file from virus.

Answer: Antivirus Software

Network of networks.

Answer: Internet

Learning through the electronic media.

Answer: E-Learning

Digital trails created while using internet / The recording of interaction with the digital world.

Answer: Digital Footprint

Law that governs the legal issues of cyberspace.

Answer: Cyber Law

The smallest unit to represent information on a quantum computer.

Answer: Qubit (Quantum Bit)

A system of copying data and information into another location.

Answer: Backup

A company which provides services of Internet.

Answer: Internet Service Provider (ISP)

A secret group of characters used to protect computer system from unauthorized users.

Answer: Password

An artificial environment created by a computer system that appears real.

Answer: Virtual Reality

Data transmission in only one direction.

Answer: Simplex Mode

The websites that search documents for specified keywords in WWW.

Answer: Search Engine

An illegal activity done through computer and internet.

Answer: Cyber Crime

The rate at which data is transmitted through a given medium.

Answer: Bandwidth


Thursday, February 12, 2026

SOLVED KOSHI PABSON SEE PRE-BOARD EXAMINATION – 2082

 

SOLVED KOSHI PABSON SEE PRE-BOARD EXAMINATION – 2082

Subject: Optional II Computer Science
Full Marks: 50

Group “A”

1. Answer the following questions in one sentence. [6×1=6]

a) What do you mean by foreign key?

Answer:
A foreign key is a field in one table that refers to the primary key of another table to establish a relationship between the two tables.


b) Define RDBMS.

Answer:
RDBMS (Relational Database Management System) is a database system that stores data in tables and manages relationships among them using keys.


c) Define VR.

Answer:
VR (Virtual Reality) is a computer-generated simulation of a three-dimensional environment that allows users to interact as if they are physically present.


d) What is a Global Variable?

Answer:
A global variable is a variable declared outside all functions or modules and can be accessed throughout the program.


e) Define digital payment.

Answer:
Digital payment is a method of transferring money electronically using digital devices such as mobile phones, computers, or online systems.


f) Define unary operator used in C language.

Answer:
A unary operator is an operator that operates on only one operand, such as increment (++), decrement (--).


2. Write appropriate technical term for the following: [2×1=2]

a) A protocol used for receiving emails from one server to another.

Answer: POP (Post Office  Protocol)


b) First computer network system.

Answer: ARPANET


3. Write the full form of the following: [2×1=2]

a) IMAP

Answer: Internet Message Access Protocol

b) SIM

Answer: Subscriber Identity Module


✅ Group “B”

4. Answer the following questions: [9×2=18]


a) What is computer network topology? Mention any two types.

Answer:
Computer network topology is the physical or logical arrangement of computers and devices in a network.
Two types are:

  1. Bus topology
  2. Star topology

b) What do you mean by cryptography? Why is it important?

Answer:
Cryptography is the technique of converting plain text into coded form to protect information from unauthorized access.
It is important because it ensures data security, confidentiality, and safe communication.


c) What is meant by the CIA triad? Define any one of them.

Answer:
The CIA triad stands for Confidentiality, Integrity, and Availability.

Confidentiality:
It ensures that information is accessible only to authorized users.


d) Differentiate between computerized and non-computerized databases.

Computerized Database

Non-Computerized Database

Data stored electronically

Data stored manually in files/registers

Fast processing and searching

Slow processing and searching

Easy backup and recovery

Difficult backup and recovery

More secure

Less secure


e) What is IoT? Enlist two application areas of AI.

Answer:
IoT (Internet of Things) is a network of physical devices connected to the internet to collect and exchange data.

Two application areas of AI:

  1. Robotics
  2. Expert systems

f) What is software and data security? Enlist any two measures to protect it.

Answer:
Software and data security refers to protecting software programs and information from unauthorized access, damage, or theft.

Two protective measures:

  1. Use antivirus and firewall
  2. Use strong passwords and access control

g) Define report in MS-Access. Enlist any two uses of the report.

Answer:
A report in MS-Access is a database object used to present and print data in a formatted manner.

Two uses:

  1. To print formatted data
  2. To summarize data using grouping and totals

h) What is filtering in the database? Write any two data types used in MS-Access.

Answer:
Filtering is the process of displaying only those records that meet specific criteria.

Two MS-Access data types:

  1. Text
  2. Number

i) Identify validation rule, query, input mask and validation text from the given statements.

  1. SELECT NAME FROM STUD_TABLE WHERE CLASS = 9;
  2. "Sorry, the maximum limit is 5000 a day, try again next day"
  3. > 6000
  4. (DD-MM-YY)

Answer:

  • Query: SELECT NAME FROM STUD_TABLE WHERE CLASS = 9;
  • Validation Text: "Sorry, the maximum limit is 5000 a day, try again next day"
  • Validation Rule: > 6000
  • Input Mask: (DD-MM-YY)

✅ GROUP “B”


5. Write down the output of the given program. (Work out with a dry-run table.) [2]

DECLARE FUNCTION PRS(A$)
CLS
A$ = "MAKE EASY"
PRINT PRS(A$)
END
 
FUNCTION PRS(A$)
FOR K = LEN(A$) TO 1 STEP -3
    B$ = MID$(A$, K, 1) + B$
NEXT K
PRS = B$
END FUNCTION

✅ Step 1: Understand the string

A$ = "MAKE EASY"

Count characters carefully (including space):

Position

Character

1

M

2

A

3

K

4

E

5

(space)

6

E

7

A

8

S

9

Y

So,

LEN(A$) = 9


✅ Step 2: Loop execution

Loop:

FOR K = 9 TO 1 STEP -3

Values of K:

9 → 6 → 3 → (next would be 0, stop)


✅ Step 3: Dry-Run Table

K

MID$(A$,K,1)

B$ = MID$ + B$

9

Y

Y

6

E

EY

3

K

KEY


✅ Final Value

B$ = "KEY"

So,

PRS = B$

✅ Final Output:

KEY

See?

 

6. Rewrite the given program after correcting the bugs. [2]

Given (Incorrect Program):

REM add some records in the data file "info.dat"

OPEN "REC.DAT" FOR OUTPUT AS #2

CLS

TOP:

INPUT "ENTER NAME, CLASS, SECTION"; NAMES, CLASS, SECTIONS

PRINT #2, NAMES, CLASS, SECTIONS

INPUT "ADD MORE RECORDS ? YES/NO"; CH

IF LCASE(CH$) = "yes" THEN GOTO TOP

CLOSE #2

END


✅ Corrected Program:

REM Add some records in the data file "info.dat"

OPEN "info.dat" FOR APPEND AS #2

CLS

TOP:

INPUT "ENTER NAME, CLASS, SECTION"; NAME$, CLASS, SECTION$

PRINT #2, NAME$, CLASS, SECTION$

INPUT "ADD MORE RECORDS? YES/NO"; CH$

IF LCASE$(CH$) = "yes" THEN GOTO TOP

CLOSE #2

END


7. Study the following program and answer the given questions: [2]

DECLARE FUNCTION ABC$(N$)

CLS

INPUT "ENTER ANY WORD"; W$

PRINT "THE RESULT STRING IS"; ABC$(W$)

END

 

FUNCTION ABCS(N$)

FOR K = 1 TO LEN(N$)

    PS$ = MID$(N$, K, 1)

    RS$ = PS$ + RS$

NEXT K

SHARED RS$

ABCS = RS$

END FUNCTION


a) Enlist actual and formal parameters used in the above program.

Answer:

  • Actual parameter: W$
  • Formal parameter: N$

b) What is the use of the SHARED keyword in the above program?

Answer:

The SHARED keyword is used to make a variable global so that it can be accessed by the main program and other procedures.


There.

✅ Group “C”

8. Calculate or convert: [4×1=4]

a) (B2)₁₆ = 10110010₂

b) (241)₁₀ = 361₈

c) (10101)₂ + (11)₂ − (1110)₂ = 1010₂

d) (101011)₂ ÷ (111)₂
Quotient = 110₂
Remainder = 1₂


9(a). Write a QBASIC program to calculate the Simple Interest of a given Principal, Rate and Time using a FUNCTION procedure and calculate the Total Amount using a SUB procedure. Display both the Simple Interest and the Total Amount. [4]

DECLARE FUNCTION SI (P, R, T)

DECLARE SUB SHOW (P, R, T)

 

CLS

INPUT "Enter Principal "; P

INPUT "Enter Rate "; R

INPUT "Enter Time "; T

CALL SHOW(P, R, T)

PRINT "Simple Interest = "; SI (P, R, T)

END

 

FUNCTION SI (P, R, T)

SI = (P * R * T) / 100

END FUNCTION

 

SUB SHOW (P, R, T)

A = ((P * R * T) / 100) + P

PRINT "Amount = "; A

END SUB


9(b). Write a QBASIC program to read records from “info.dat” and display only those employees whose salary is greater than 37000 and whose address starts with ‘D’ or ‘K’. [4]

 

CLS

OPEN "info.dat" FOR INPUT AS #1

 

WHILE NOT EOF(1)

    INPUT #1, N$, A$, S

    F$ = UCASE$(LEFT$(A$, 1))

    IF S > 37000 AND (F$ = "D" OR F$ = "K") THEN

        PRINT N$, A$, S

    END IF

WEND

 

CLOSE #1

END


10(a). Write a C program to check whether a given year is a leap year or not. [4]

 

#include <stdio.h>

 

int main() {

    int y;

    scanf("%d", &y);

 

    if ((y % 400 == 0) || (y % 4 == 0 && y % 100 != 0))

        printf("Leap Year");

    else

        printf("Not Leap Year");

 

    return 0;

}


OR

10(b). Write a C program to reverse a multi-digit integer number. [4]


✅ Answer:

#include <stdio.h>

 

int main() {

    int n, rev = 0, r;

    scanf("%d", &n);

 

    while (n != 0) {

        r = n % 10;

               rev = rev * 10 + r;

        n = n / 10;

    }

 

    printf("%d", rev);

    return 0;

}