Friday, December 13, 2024

SOLVED PABSON, Lalitpur SEE PRE-QUALIFYING EXAMINATION-2081 Subject-Opt II. Computer Science

 



PABSON, Lalitpur

SEE PRE-QUALIFYING EXAMINATION-2081

Subject-Opt II. Computer Science

Time: 3 hrs

Attempt all questions.

Group A [20 Marks]

 

1. Answer the following questions in one sentence: (6x1=6)

 

a)     What is hacking?

Hacking is the act of breaking into computer systems or networks without permission, often to steal, change, or destroy data, or to disrupt operations.

 

b)     Why is browser needed?

Browser is needed to access and view websites on the internet.

 

c)     Write two examples of cyber-crime.

Any two examples of cyber-crime are Phishing and Hacking

 

d)     What are the different data types available in C?

The different data types available in C are int, char, double and float

 

e)     Which data type is used to store paragraph in MS-Access?

The data type used to store paragraph in MS-Access is Memo.

 

f)      What is the use of CALL statement in modular programming?

The use of CALL statement is to call sub-procedure in modular programming.

 

2. Write the technical term for the following statements:

a)     The process of transferring data or files from a local device to a remote system, server, or online platforms. Uploading

b)     The responsible and ethical use of technology and digital platform to engage, communicate, and participate in online communities effectively and safely. Digital Citizenship

 

3. Write the full forms of the following:

a)     IRC - Internet Relay Chat

b)     CCTV – Closed Circuit Television

 

Group B [24 Marks]

4. Answer the following questions: [9 x 2=18]

 

a)     What do you mean by digital footprint? List any two ways to maintain our digital reputation.

A digital footprint is the trail of data and information left behind by an individual's online activities which includes social media posts, website visits, online purchases, and other digital engagements.

Any two ways to maintain our digital reputation are:

·       Think carefully before sharing online, as it can be difficult to remove or change once it's posted.

·       Use privacy settings to choose who can see your posts and keep your personal info, like your phone number and address, private.

 

b)     Write any two advantages and two disadvantages of cloud computing.

Any two advantages of cloud computing are:

·       It is easier to get back-up and restore the data.

·       It reduces both hardware and software maintenance costs for organizations.

Any two disadvantages of cloud computing are:

·       Storing sensitive data on remote servers raises privacy issues.  

·       Uploading and downloading large volumes of data can be time-consuming.  

 

c)     What DBMS? List its two functions.

DBMS is a computerized system that stores data, processes them and provides information in an organized form.

Any two functions are:

·       It reduces data redundancy which means duplication of data.

·       It allows multiple users to access the same data simultaneously.

 

d)     What do you mean a by field property in MS Access? List any two field properties with example.

Field properties are settings or attributes that allow users to control various aspects of data entry, validation, formatting, and behavior within the database.

Any two field properties with example are:

·       Field Size - Field size is a field property which is used to set the maximum size for data stored in the field that is set to the Text or Number data type.

·       Caption - Caption is a field property which gives alternative name given for any field.

The maximum size for this is 2048 characters.

 

e)     What is form? List its uses.

Form is one of the MS-Access database objects which provides graphical interface to view, modify and add data in a table or multiple linked tables.

The uses of form are:

·       Forms provide an easy-to-use interface for data entry and manipulation, improving data accuracy and completeness.

·       Forms can include validation rules to ensure data quality and prevent errors.

 

f)      What is hardware security? List any four methods to protect the data from your computer.

Hardware security refers to the protection of the physical components of a computer or electronic device from unauthorized access, theft, or damage.

Any four methods to protect the data from computer are:

Password, Backup, Scandisk and Antivirus

 

g)     What is bus topology? Mention any two differences between bus and ring topology.

Bus topology is a network configuration where all devices are connected to a single central cable known as a "bus".

Any two differences between bus and ring topology

Bus Topology

Ring Topology

Data sent in both directions over a shared cable

Data sent in one direction around the ring

Failure in the bus can disrupt the entire network

Single point of failure can disrupt the network, but can be mitigated with dual rings

 

h)     What is B2C? Give any two examples of B2C in Nepal.

B2C is a type of e-commerce model which establishes the electronic business relationships between a business organization (merchant) and final consumers.

Any two examples of B2C in Nepal are: Daraz and Hamrobazar.

 

i)      What is query? List its types.

Query is an object of database that is used to view, retrieve, change and analyze records from a table or multiple linked tables based on specified condition.

Its types are : Select Query and Action Query

 

 

Write the output of the given program showing the dry run table. (2)

DECLARE SUB test()

CALL test

END

SUB test

X=0

FOR K=10 TO 4 STEP-2

A=K^2

X=X+A

NEXT K

PRINT X

END SUB

 

X

K=10 TO 4 STEP-2

A=K^2

X=X+A

PRINT X

 

0

10 TO 4  YES

10^2=100

0+100=100

 

 

 

8 TO 4  YES

8^2=64

100+64=164

 

 

 

6 TO 4  YES

6^2=36

164+36=200

 

 

 

10 TO 4  YES

4^2=16

200+16=216

 

 

 

2 TO 4 NO

LOOP EXITS

 

 

216

 

 

 

 

 

 

 

 

The output of the program is :

216

 

6. Re-write the following program correcting the bug.

REM To copy all data from sequential data file INFO.DAT to NEWINFO.DAT.

OPEN "INFO.DAT" FOR INPUT AS #1

OPEN "NEWINFO.DAT" FOR INPUT AS #2

DO WHILE NOT EOF(1)

LINE INPUT #1, ALL$

COPY #2, ALL$

WEND

FINISH #1,#2

END

 

Debugged Program

REM To copy all data from sequential data file INFO.DAT to NEWINFO.DAT.

OPEN "INFO.DAT" FOR INPUT AS #1

OPEN "NEWINFO.DAT" FOR OUTPUT AS #2

DO WHILE NOT EOF(1)

LINE INPUT #1, ALL$

WRITE #2, ALL$

LOOP

CLOSE #1,#2

END

 

7. Read the program given below and answer the questions that follows.(2)

DECLARE FUNCTION RETURNS(A$)

LINE INPUT "Enter a Sentence"; S$

PRINT RETURN$(S$)

END

 

FUNCTION RETURNS(A$)

FOR T=1 TO LEN(A$)

E$= MID$(A$,T,1)

 IF E$ SPACE$(1) THEN

R$=E$+R$

END IF

NEXT T

RETURN$=R$

END FUNCTION

Questions:

a) List all the string library function(s) from the program.

            The string library function(s) from the program are: LEN( ), MID$( ), SPACE$( )

b) How many times loop T execute, if A$= 'MY PRIDE MY NATION"?

            T execute 18 times, if A$= 'MY PRIDE MY NATION"?

 

Group C [16 Marks]

 

8. Convert /Calculate as per the instructions. (4 x 1)

 

i. (111101100)2 into octal

Soln:

Converting binary to octal

111 = 7

101 = 5

100 = 4

 (111101100)2 = (754)8

 

 

ii (401)16 into Decimal  

Soln:

(401)₁₆

= (4 × 16²) + (0 × 16¹) + (1 × 16⁰) = (1025)₁₀

=4×256 + 0 × 16 + 1 × 1

=1024 + 0 + 1

=1025

(401)16 = (1025)10  

 

iii. (10101)2-(11011)2+(10001)2

 

 

iy (101101)2 ¸ (100)  

 

100)

1

0

1

1

0

1

(1011

 

1

0

0

 

 

 

 

 

 

 

1

1

0

 

 

 

 

 

1

0

0

 

 

 

 

 

 

1

0

1

 

 

 

 

 

1

0

0

 

 

 

 

 

 

 

1

 

 

Q=1011

R=1

 

Write a program in QBASIC that asks length, breadth and height of room and calculates its area and volume. Create a user-defined function to calculate area and sub-program to calculate volume. (4) [Hint: Area=LxB Volume LXBXH]

 

DECLARE FUNCTION AREA(L,B)

DECLARE SUB VOL(L,B,H)

CLS
INPUT “Enter Length”; L

INPUT “Enter Breadth”; B

INPUT “Enter Height”; H

PRINT “Area of room=”; AREA(L,B)

CALL VOL(L,B,H)

END

 

FUNCTION AREA(L,B)

AREA = L * B

END FUNCTION

 

SUB VOL(L,B,H)

V=L*B*H

PRINT “Volume of Room=”; V

END SUB

 

 

19. A sequential data file called "STUDENT.DAT" has stored data under the field heading Registration No., Class, Section, Name, Date of Birth and Gender. Write a program to display all the information of class NINE students whose gender is 'FEMALE'. (4)

 

OPEN “STUDENT.DAT” FOR INPUT AS #1

CLS

WHILE NOT EOF(1)

INPUT #1, R, CL, SE$, N$, D$, G$

IF UCASE$(G$)=”FEMALE” AND CL=9 THEN

PRINT R, CL, SE$, N$, D$, G$

END IF

WEND

CLOSE #1

END

 

 

 

11. Using C language, write a program to input three integers then display the highest integer. (4)

 

#include <stdio.h>

int main()

{

    int num1, num2, num3;

    printf("Enter three integers: ");

    scanf("%d %d %d", &num1, &num2, &num3);

    if (num1 >= num2 && num1 >= num3)

    {

        printf("The highest integer is: %d\n", num1);

    }

else if (num2 >= num1 && num2 >= num3)

    {

        printf("The highest integer is: %d\n", num2);

    } else

    {

        printf("The highest integer is: %d\n", num3);

    }

  return 0;

}

 

OR

Using C language, write a program to display all even numbers from 20 to 40 along with their sum.

 

#include <stdio.h>

int main()

{

    int sum = 0;

    printf("Even numbers from 20 to 40 are:\n");

    for (int i = 20; i <= 40; i++) {

     

        if (i % 2 == 0)

        {

            printf("%d ", i);

            sum += i;         

        }

    }

    printf("\nSum of even numbers from 20 to 40 is: %d\n", sum);

    return 0;

}