SOLVED KOSHI PABSON SEE PRE-BOARD EXAMINATION – 2082
Subject: Optional II Computer
Science
Full Marks: 50
Group “A”
1. Answer the following questions in
one sentence. [6×1=6]
a) What do you mean by foreign key?
Answer:
A foreign key is a field in one table that refers to the primary key of another
table to establish a relationship between the two tables.
b) Define RDBMS.
Answer:
RDBMS (Relational Database Management System) is a database system that stores
data in tables and manages relationships among them using keys.
c) Define VR.
Answer:
VR (Virtual Reality) is a computer-generated simulation of a three-dimensional
environment that allows users to interact as if they are physically present.
d) What is a Global Variable?
Answer:
A global variable is a variable declared outside all functions or modules and
can be accessed throughout the program.
e) Define digital payment.
Answer:
Digital payment is a method of transferring money electronically using digital
devices such as mobile phones, computers, or online systems.
f) Define unary operator used in C
language.
Answer:
A unary operator is an operator that operates on only one operand, such as increment
(++), decrement (--).
2. Write appropriate technical term
for the following: [2×1=2]
a) A protocol used for receiving
emails from one server to another.
Answer: POP (Post Office Protocol)
b) First computer network system.
Answer: ARPANET
3. Write the full form of the
following: [2×1=2]
a) IMAP
Answer: Internet Message Access Protocol
b) SIM
Answer: Subscriber Identity Module
✅ Group “B”
4. Answer the following questions:
[9×2=18]
a) What is computer network
topology? Mention any two types.
Answer:
Computer network topology is the physical or logical arrangement of computers
and devices in a network.
Two types are:
- Bus topology
- Star topology
b) What do you mean by cryptography?
Why is it important?
Answer:
Cryptography is the technique of converting plain text into coded form to
protect information from unauthorized access.
It is important because it ensures data security, confidentiality, and safe
communication.
c) What is meant by the CIA triad?
Define any one of them.
Answer:
The CIA triad stands for Confidentiality, Integrity, and Availability.
Confidentiality:
It ensures that information is accessible only to authorized users.
d) Differentiate between
computerized and non-computerized databases.
|
Computerized
Database |
Non-Computerized
Database |
|
Data stored electronically |
Data stored manually in
files/registers |
|
Fast processing and searching |
Slow processing and searching |
|
Easy backup and recovery |
Difficult backup and recovery |
|
More secure |
Less secure |
e) What is IoT? Enlist two
application areas of AI.
Answer:
IoT (Internet of Things) is a network of physical devices connected to the
internet to collect and exchange data.
Two application areas of AI:
- Robotics
- Expert systems
f) What is software and data
security? Enlist any two measures to protect it.
Answer:
Software and data security refers to protecting software programs and
information from unauthorized access, damage, or theft.
Two protective measures:
- Use antivirus and firewall
- Use strong passwords and access control
g) Define report in MS-Access.
Enlist any two uses of the report.
Answer:
A report in MS-Access is a database object used to present and print data in a
formatted manner.
Two uses:
- To print formatted data
- To summarize data using grouping and totals
h) What is filtering in the
database? Write any two data types used in MS-Access.
Answer:
Filtering is the process of displaying only those records that meet specific
criteria.
Two MS-Access data types:
- Text
- Number
i) Identify validation rule, query,
input mask and validation text from the given statements.
- SELECT NAME FROM STUD_TABLE WHERE CLASS = 9;
- "Sorry, the maximum limit is 5000 a day, try again
next day"
- > 6000
- (DD-MM-YY)
Answer:
- Query: SELECT NAME FROM STUD_TABLE WHERE CLASS = 9;
- Validation Text: "Sorry, the maximum limit is 5000
a day, try again next day"
- Validation Rule: > 6000
- Input Mask: (DD-MM-YY)
✅
GROUP “B”
5. Write down the
output of the given program. (Work out with a dry-run table.) [2]
DECLARE FUNCTION PRS(A$)CLSA$ = "MAKE EASY"PRINT PRS(A$)END FUNCTION PRS(A$)FOR K = LEN(A$) TO 1 STEP -3 B$ = MID$(A$, K, 1) + B$NEXT KPRS = B$END FUNCTION
✅
Step 1: Understand the string
A$ = "MAKE EASY"
Count
characters carefully (including space):
|
Position |
Character |
|
1 |
M |
|
2 |
A |
|
3 |
K |
|
4 |
E |
|
5 |
(space) |
|
6 |
E |
|
7 |
A |
|
8 |
S |
|
9 |
Y |
So,
LEN(A$) = 9
✅ Step 2: Loop execution
Loop:
FOR K = 9 TO 1 STEP -3
Values
of K:
9 → 6 →
3 → (next would be 0, stop)
✅ Step 3: Dry-Run Table
|
K |
MID$(A$,K,1) |
B$ = MID$ + B$ |
|
9 |
Y |
Y |
|
6 |
E |
EY |
|
3 |
K |
KEY |
✅ Final Value
B$ = "KEY"
So,
PRS = B$
✅ Final Output:
KEY
See?
6. Rewrite the given program after
correcting the bugs. [2]
Given (Incorrect Program):
REM add some records in the data file "info.dat"
OPEN "REC.DAT" FOR OUTPUT AS #2
CLS
TOP:
INPUT "ENTER NAME, CLASS, SECTION"; NAMES, CLASS,
SECTIONS
PRINT #2, NAMES, CLASS, SECTIONS
INPUT "ADD MORE RECORDS ? YES/NO"; CH
IF LCASE(CH$) = "yes" THEN GOTO TOP
CLOSE #2
END
✅ Corrected Program:
REM Add some records in the data
file "info.dat"
OPEN "info.dat" FOR APPEND AS #2
CLS
TOP:
INPUT "ENTER NAME, CLASS,
SECTION"; NAME$, CLASS, SECTION$
PRINT #2, NAME$, CLASS, SECTION$
INPUT "ADD MORE RECORDS?
YES/NO"; CH$
IF LCASE$(CH$) = "yes" THEN GOTO TOP
CLOSE #2
END
7. Study the following program and
answer the given questions: [2]
DECLARE FUNCTION ABC$(N$)
CLS
INPUT "ENTER ANY WORD"; W$
PRINT "THE RESULT STRING IS"; ABC$(W$)
END
FUNCTION ABCS(N$)
FOR K = 1 TO LEN(N$)
PS$ = MID$(N$, K, 1)
RS$ = PS$ + RS$
NEXT K
SHARED RS$
ABCS = RS$
END FUNCTION
a) Enlist actual and formal
parameters used in the above program.
Answer:
- Actual parameter: W$
- Formal parameter: N$
b) What is the use of the SHARED
keyword in the above program?
Answer:
The
SHARED keyword is used to make a variable global so that it can be accessed by
the main program and other procedures.
There.
✅ Group “C”
8. Calculate or convert: [4×1=4]
a) (B2)₁₆ = 10110010₂
b) (241)₁₀ = 361₈
c) (10101)₂ + (11)₂ − (1110)₂ =
1010₂
d) (101011)₂ ÷ (111)₂
Quotient = 110₂
Remainder = 1₂
9(a). Write a QBASIC program to
calculate the Simple Interest of a given Principal, Rate and Time using a
FUNCTION procedure and calculate the Total Amount using a SUB procedure.
Display both the Simple Interest and the Total Amount. [4]
DECLARE FUNCTION SI (P, R, T)
DECLARE SUB SHOW (P, R, T)
CLS
INPUT "Enter Principal "; P
INPUT "Enter Rate "; R
INPUT "Enter Time "; T
CALL SHOW(P, R, T)
PRINT "Simple Interest = "; SI (P, R, T)
END
FUNCTION SI (P, R, T)
SI = (P * R * T) / 100
END FUNCTION
SUB SHOW (P, R, T)
A = ((P * R * T) / 100) + P
PRINT "Amount = "; A
END SUB
9(b). Write a QBASIC program to read records from “info.dat” and
display only those employees whose salary is greater than 37000 and whose
address starts with ‘D’ or ‘K’. [4]
CLS
OPEN "info.dat" FOR INPUT AS #1
WHILE NOT EOF(1)
INPUT #1, N$, A$,
S
F$ =
UCASE$(LEFT$(A$, 1))
IF S > 37000
AND (F$ = "D" OR F$ = "K") THEN
PRINT N$, A$,
S
END IF
WEND
CLOSE #1
END
10(a). Write a C
program to check whether a given year is a leap year or not. [4]
#include <stdio.h>
int main() {
int y;
scanf("%d",
&y);
if ((y % 400 == 0)
|| (y % 4 == 0 && y % 100 != 0))
printf("Leap
Year");
else
printf("Not
Leap Year");
return 0;
}
OR
10(b). Write a C program to reverse a multi-digit integer number. [4]
✅ Answer:
#include <stdio.h>
int main() {
int n, rev = 0, r;
scanf("%d",
&n);
while (n != 0) {
r = n % 10;
rev =
rev * 10 + r;
n = n / 10;
}
printf("%d",
rev);
return 0;
}