SOLVED SEE COMPUTER SCIENCE 2082
SOLVED SEE COMPUTER SCIENCE 2082
Group 'A' (Very Short Answer
Questions)
1. Answer the following questions
in one sentence:
(a) What is transmission media?
Transmission media is a channel or
path through which data and information are transmitted between connected
devices in a network environment is called communication media.
(b) What is mobile commerce?
M-commerce refers to the buying and
selling of goods and services through mobile devices like smartphones and
tablets.
(c) Why Primary key is used in
MS-Access?
A
primary key is used in MS access because it reduces and control
duplication of the record in a table, sets the relationship between tables and
identifies each record of a table uniquely.
(d) Which data type is suitable to
store date of admission of student while designing table structure in
MS-Access?
The Date/Time data type is most
suitable to store date of admission of student while designing table structure
in MS-Access.
(e) What is modular programming?
Modular programming is a technique
which divides program into many small logical, manageable and functional
modules or blocks
(f) Write any two logical operators
of 'C' language.
The two logical operators are
&& (AND) and || (OR).
2. Write appropriate technical term
for the following:
(a)
A program that can disinfect virus from a file: Antivirus
(b)
An artificial environment created by a computer system that appears real:
Virtual Reality (VR)
3. Write the full form of the
following:
(a)
LAN: Local Area Network
(b)
URL: Uniform Resource Locator
Group
'B' (Short Answer Questions)
4. (a) Mention any two difference
between Client/Server and Peer-to-Peer Architecture of the computer network.
|
Client-Server Network |
Peer to Peer Network |
|
In a client-server
network, powerful computers called servers provide resources and services,
while other computers, known as clients, access these resources and services. |
In a peer-to-peer
network, all computers have equal roles and can both provide and request
resources without a centralized server. |
|
Security and data management are handled by the server.
Network administrator manages and enforces security policies. |
Security is managed individually on each peer. Each peer
is responsible for its own security and data. |
(b) Write any two opportunities and
two threats of social media
Opportunities of using
social media
Networking: Connect globally, build relationships, and
join communities.
Information Sharing: Quickly access and share news and
educational content.
Threats of using social
media
Privacy
Risks: Personal information can be exposed or misused.
Cyberbullying:
Harassment or bullying through online interactions.
(c) Write the importance of backup
in data and software security:
The importance of backup in data
and software security is to keep copies of important files and data in a safe
place. If computer crashes or accidentally deleted something, we can use these
copies to restore our information and avoid losing important work or personal
files.
(d) What is e-banking? Write its
two advantages.
E-banking is a digital banking
system that allows customers to perform financial transactions and manage their
accounts online via the internet or mobile apps, eliminating the need to visit
a physical bank branch.
Two advantages of e-banking:
24/7 access to banking services and
convenience of performing transactions from home.
(e) What is IoT? Write any two
importance of it.
Internet
of Things (IoT) refers to a network of interconnected physical devices that can
collect and exchange data over the internet without requiring human
intervention.
Any
two importance of Internet of Things (IoT) are
v It reduces the human effort, so it saves a lot of time.
v Information is easily accessible from any place at any time
on any device.
(f) Write any four advantages of
DBMS.
Four advantages of DBMS:
a)
It
reduces data redundancy which means duplication of data.
b)
It
allows multiple users to access the same data simultaneously.
c)
Large
volume of data can be stored and updated easily.
d)
It
provides high security of data as well as maintains accurate database.
(g) Which data types are suitable
while designing table structure to store information about student’s name, Roll
No., Address and Date of Birth in MS-Access
Four data types for Student Table
(Name, Roll No, Address, DOB):
- Name:
Short Text
- Roll
No: Number
- Address:
Short Text / Long Text
- Date
of Birth: Date/Time
(h)What is select query? Write the
function of action query.
Select query is a type of query
which is used to select and display the relevant data from the database.
The function of action query is to makes
changes to or removes many records in just one operation.
(i) Define report. Why it is
necessary to create a report in DBMS?
Report is one of the MS-Access
database objects used to present information in an effective and organized
format that is ready for printing.
It
is necessary to create a report in DBMS to present data from one or more tables
in a formatted and organized manner, allowing users to easily view and analyze
the information.
5. Write the output of the given
program. Show them in a dry run table.
DECLARE SUB Series (A)
CLS
A = 5
CALL Series (A)
END
SUB Series (A)
FOR K = 1 TO 5
PRINT A;
A = A * 2
NEXT K
END SUB
Dry Run Table
|
Iteration (K) |
Initial Value of A |
Action (PRINT A;) |
New Value (A = A * 2) |
|
1 |
5 |
5 |
10 |
|
2 |
10 |
10 |
20 |
|
3 |
20 |
20 |
40 |
|
4 |
40 |
40 |
80 |
|
5 |
80 |
80 |
160 |
The output of the program is:
5
10 20 40 80
6. Rewrite the given program after
correcting the bugs.
REM to add record in a existing
file
CLS
OPEN "See.dat" FOR OUTPUT
AS #2
BB:
INPUT "Enter the Name";
N$
INPUT "Enter the
Address"; A$
INPUT "Enter the Class";
C
INPUT #2, N$, A$, C
INPUT "More record "; Y$
IF UCASE (Y$) = "Y" THEN
GOTO BB
CLOSE “see.dat”
END
Debugged Program
REM to add record in a existing
file
CLS
OPEN "See.dat" FOR APPEND
AS #2
BB:
INPUT "Enter the Name";
N$
INPUT "Enter the
Address"; A$
INPUT "Enter the Class";
C
WRITE #2, N$, A$, C
INPUT "More record"; Y$
IF UCASE$(Y$) =
"Y" THEN GOTO BB
CLOSE #2
END
7. Study the following program and
answer the following questions:
DECLARE FUNCTION LongestName$ (Z$)
DIM SHARED A$, B$, C$
CLS
READ A$, B$, C$
DATA "NEPAL",
"BANGLADESH", "BHUTAN"
PRINT LongestName$(Z$)
END
FUNCTION LongestName$ (Z$)
L$ = A$
IF LEN(B$) > LEN(L$) THEN
L$ = B$
ELSEIF LEN(C$) > LEN(L$) THEN
L$ = C$
END IF
LongestName$ = L$
END FUNCTION
a) Write the Global variables used
in the above program.
The global variables in this
program are A$, B$, and C$
(b) Why is the $ (dollar) sign used
after the function name?
The $ sign is used after the
function name (LongestName$) to indicate that the function will return a string
value (text) rather than a numeric value.
8. Number System
i) (1011101)_2 = (135)8
ii)
(188)_{10} = (BC)16
iii) (101)_2 \times (110)2 = (11110)2
iv) (111011)_2 \div (101)_2 = {Quotient:
} (1011)2, { Remainder: } (100)2
9. QBASIC Programming
a. Write a program to ask three
numbers from a user and find their sum using Sub procedure and find the average
of those numbers using Function procedure.
DECLARE SUB SUM (A, B, C)
DECLARE FUNCTION AVG (A, B, C)
CLS
INPUT "Enter three numbers:
", X, Y, Z
CALL SUM(X, Y, Z)
PRINT "Average of numbers is:
"; AVG(X, Y, Z)
END
SUB SUM (A, B, C)
S = A + B + C
PRINT "Sum of numbers is: "; S
END SUB
FUNCTION AVG (A, B, C)
AVG = (A + B + C) / 3
END FUNCTION
b. Write a program to store Roll
No, Name, Class, Date of Birth and Address of students in data file
"STUDETN.TXT". The program allows the users to input more data as
many times as they need.
CLS
OPEN "STUDENT.TXT" FOR OUTPUT
AS #1
DO
INPUT "Enter Roll No: ", R
INPUT "Enter Name: ", N$
INPUT "Enter Class: ", C
INPUT "Enter Date of Birth: ", D$
INPUT "Enter Address: ", AD$
WRITE #1, R, N$, C, D$, AD$
INPUT "Do you want to add more data? (Y/N): ", CH$
LOOP WHILE UCASE$(CH$) =
"Y"
CLOSE #1
END
10. Write a program in 'C' language
that checks whether the given number is Positive or Negative.
#include <stdio.h>
int main() {
int num;
printf("Enter a number: ");
scanf("%d", &num);
if (num > 0) {
printf("%d is Positive.",
num);
} else if (num < 0) {
printf("%d is Negative.",
num);
}
return 0;
}
Write a program using 'C' language
to display the series 100, 95, 90, 85, 80 ..... up to 10th term.C
#include <stdio.h>
int main() {
int a = 100;
int i;
for (i = 1; i <= 10; i++) {
printf("%d ", a);
a = a - 5;
}
return 0;
}
