Thursday, February 12, 2026

SOLVED KOSHI PABSON SEE PRE-BOARD EXAMINATION – 2082

 

SOLVED KOSHI PABSON SEE PRE-BOARD EXAMINATION – 2082

Subject: Optional II Computer Science
Full Marks: 50

Group “A”

1. Answer the following questions in one sentence. [6×1=6]

a) What do you mean by foreign key?

Answer:
A foreign key is a field in one table that refers to the primary key of another table to establish a relationship between the two tables.


b) Define RDBMS.

Answer:
RDBMS (Relational Database Management System) is a database system that stores data in tables and manages relationships among them using keys.


c) Define VR.

Answer:
VR (Virtual Reality) is a computer-generated simulation of a three-dimensional environment that allows users to interact as if they are physically present.


d) What is a Global Variable?

Answer:
A global variable is a variable declared outside all functions or modules and can be accessed throughout the program.


e) Define digital payment.

Answer:
Digital payment is a method of transferring money electronically using digital devices such as mobile phones, computers, or online systems.


f) Define unary operator used in C language.

Answer:
A unary operator is an operator that operates on only one operand, such as increment (++), decrement (--).


2. Write appropriate technical term for the following: [2×1=2]

a) A protocol used for receiving emails from one server to another.

Answer: POP (Post Office  Protocol)


b) First computer network system.

Answer: ARPANET


3. Write the full form of the following: [2×1=2]

a) IMAP

Answer: Internet Message Access Protocol

b) SIM

Answer: Subscriber Identity Module


✅ Group “B”

4. Answer the following questions: [9×2=18]


a) What is computer network topology? Mention any two types.

Answer:
Computer network topology is the physical or logical arrangement of computers and devices in a network.
Two types are:

  1. Bus topology
  2. Star topology

b) What do you mean by cryptography? Why is it important?

Answer:
Cryptography is the technique of converting plain text into coded form to protect information from unauthorized access.
It is important because it ensures data security, confidentiality, and safe communication.


c) What is meant by the CIA triad? Define any one of them.

Answer:
The CIA triad stands for Confidentiality, Integrity, and Availability.

Confidentiality:
It ensures that information is accessible only to authorized users.


d) Differentiate between computerized and non-computerized databases.

Computerized Database

Non-Computerized Database

Data stored electronically

Data stored manually in files/registers

Fast processing and searching

Slow processing and searching

Easy backup and recovery

Difficult backup and recovery

More secure

Less secure


e) What is IoT? Enlist two application areas of AI.

Answer:
IoT (Internet of Things) is a network of physical devices connected to the internet to collect and exchange data.

Two application areas of AI:

  1. Robotics
  2. Expert systems

f) What is software and data security? Enlist any two measures to protect it.

Answer:
Software and data security refers to protecting software programs and information from unauthorized access, damage, or theft.

Two protective measures:

  1. Use antivirus and firewall
  2. Use strong passwords and access control

g) Define report in MS-Access. Enlist any two uses of the report.

Answer:
A report in MS-Access is a database object used to present and print data in a formatted manner.

Two uses:

  1. To print formatted data
  2. To summarize data using grouping and totals

h) What is filtering in the database? Write any two data types used in MS-Access.

Answer:
Filtering is the process of displaying only those records that meet specific criteria.

Two MS-Access data types:

  1. Text
  2. Number

i) Identify validation rule, query, input mask and validation text from the given statements.

  1. SELECT NAME FROM STUD_TABLE WHERE CLASS = 9;
  2. "Sorry, the maximum limit is 5000 a day, try again next day"
  3. > 6000
  4. (DD-MM-YY)

Answer:

  • Query: SELECT NAME FROM STUD_TABLE WHERE CLASS = 9;
  • Validation Text: "Sorry, the maximum limit is 5000 a day, try again next day"
  • Validation Rule: > 6000
  • Input Mask: (DD-MM-YY)

✅ GROUP “B”


5. Write down the output of the given program. (Work out with a dry-run table.) [2]

DECLARE FUNCTION PRS(A$)
CLS
A$ = "MAKE EASY"
PRINT PRS(A$)
END
 
FUNCTION PRS(A$)
FOR K = LEN(A$) TO 1 STEP -3
    B$ = MID$(A$, K, 1) + B$
NEXT K
PRS = B$
END FUNCTION

✅ Step 1: Understand the string

A$ = "MAKE EASY"

Count characters carefully (including space):

Position

Character

1

M

2

A

3

K

4

E

5

(space)

6

E

7

A

8

S

9

Y

So,

LEN(A$) = 9


✅ Step 2: Loop execution

Loop:

FOR K = 9 TO 1 STEP -3

Values of K:

9 → 6 → 3 → (next would be 0, stop)


✅ Step 3: Dry-Run Table

K

MID$(A$,K,1)

B$ = MID$ + B$

9

Y

Y

6

E

EY

3

K

KEY


✅ Final Value

B$ = "KEY"

So,

PRS = B$

✅ Final Output:

KEY

See?

 

6. Rewrite the given program after correcting the bugs. [2]

Given (Incorrect Program):

REM add some records in the data file "info.dat"

OPEN "REC.DAT" FOR OUTPUT AS #2

CLS

TOP:

INPUT "ENTER NAME, CLASS, SECTION"; NAMES, CLASS, SECTIONS

PRINT #2, NAMES, CLASS, SECTIONS

INPUT "ADD MORE RECORDS ? YES/NO"; CH

IF LCASE(CH$) = "yes" THEN GOTO TOP

CLOSE #2

END


✅ Corrected Program:

REM Add some records in the data file "info.dat"

OPEN "info.dat" FOR APPEND AS #2

CLS

TOP:

INPUT "ENTER NAME, CLASS, SECTION"; NAME$, CLASS, SECTION$

PRINT #2, NAME$, CLASS, SECTION$

INPUT "ADD MORE RECORDS? YES/NO"; CH$

IF LCASE$(CH$) = "yes" THEN GOTO TOP

CLOSE #2

END


7. Study the following program and answer the given questions: [2]

DECLARE FUNCTION ABC$(N$)

CLS

INPUT "ENTER ANY WORD"; W$

PRINT "THE RESULT STRING IS"; ABC$(W$)

END

 

FUNCTION ABCS(N$)

FOR K = 1 TO LEN(N$)

    PS$ = MID$(N$, K, 1)

    RS$ = PS$ + RS$

NEXT K

SHARED RS$

ABCS = RS$

END FUNCTION


a) Enlist actual and formal parameters used in the above program.

Answer:

  • Actual parameter: W$
  • Formal parameter: N$

b) What is the use of the SHARED keyword in the above program?

Answer:

The SHARED keyword is used to make a variable global so that it can be accessed by the main program and other procedures.


There.

✅ Group “C”

8. Calculate or convert: [4×1=4]

a) (B2)₁₆ = 10110010₂

b) (241)₁₀ = 361₈

c) (10101)₂ + (11)₂ − (1110)₂ = 1010₂

d) (101011)₂ ÷ (111)₂
Quotient = 110₂
Remainder = 1₂


9(a). Write a QBASIC program to calculate the Simple Interest of a given Principal, Rate and Time using a FUNCTION procedure and calculate the Total Amount using a SUB procedure. Display both the Simple Interest and the Total Amount. [4]

DECLARE FUNCTION SI (P, R, T)

DECLARE SUB SHOW (P, R, T)

 

CLS

INPUT "Enter Principal "; P

INPUT "Enter Rate "; R

INPUT "Enter Time "; T

CALL SHOW(P, R, T)

PRINT "Simple Interest = "; SI (P, R, T)

END

 

FUNCTION SI (P, R, T)

SI = (P * R * T) / 100

END FUNCTION

 

SUB SHOW (P, R, T)

A = ((P * R * T) / 100) + P

PRINT "Amount = "; A

END SUB


9(b). Write a QBASIC program to read records from “info.dat” and display only those employees whose salary is greater than 37000 and whose address starts with ‘D’ or ‘K’. [4]

 

CLS

OPEN "info.dat" FOR INPUT AS #1

 

WHILE NOT EOF(1)

    INPUT #1, N$, A$, S

    F$ = UCASE$(LEFT$(A$, 1))

    IF S > 37000 AND (F$ = "D" OR F$ = "K") THEN

        PRINT N$, A$, S

    END IF

WEND

 

CLOSE #1

END


10(a). Write a C program to check whether a given year is a leap year or not. [4]

 

#include <stdio.h>

 

int main() {

    int y;

    scanf("%d", &y);

 

    if ((y % 400 == 0) || (y % 4 == 0 && y % 100 != 0))

        printf("Leap Year");

    else

        printf("Not Leap Year");

 

    return 0;

}


OR

10(b). Write a C program to reverse a multi-digit integer number. [4]


✅ Answer:

#include <stdio.h>

 

int main() {

    int n, rev = 0, r;

    scanf("%d", &n);

 

    while (n != 0) {

        r = n % 10;

               rev = rev * 10 + r;

        n = n / 10;

    }

 

    printf("%d", rev);

    return 0;

}