Wednesday, April 8, 2026

SOLVED SEE COMPUTER SCIENCE 2082

 


SOLVED SEE COMPUTER SCIENCE 2082

 


SOLVED SEE COMPUTER SCIENCE 2082

 

Group 'A' (Very Short Answer Questions)

1. Answer the following questions in one sentence:

(a) What is transmission media?

Transmission media is a channel or path through which data and information are transmitted between connected devices in a network environment is called communication media.

(b) What is mobile commerce?

M-commerce refers to the buying and selling of goods and services through mobile devices like smartphones and tablets.

(c) Why Primary key is used in MS-Access?

A primary key is used in MS access because it reduces and control duplication of the record in a table, sets the relationship between tables and identifies each record of a table uniquely.

(d) Which data type is suitable to store date of admission of student while designing table structure in MS-Access?

The Date/Time data type is most suitable to store date of admission of student while designing table structure in MS-Access.

(e) What is modular programming?

Modular programming is a technique which divides program into many small logical, manageable and functional modules or blocks

(f) Write any two logical operators of 'C' language.

The two logical operators are && (AND) and || (OR).


2. Write appropriate technical term for the following:

(a) A program that can disinfect virus from a file: Antivirus

(b) An artificial environment created by a computer system that appears real: Virtual Reality (VR)


3. Write the full form of the following:

(a) LAN: Local Area Network

(b) URL: Uniform Resource Locator


Group 'B' (Short Answer Questions)

4. (a) Mention any two difference between Client/Server and Peer-to-Peer Architecture of the computer network.

Client-Server Network

Peer to Peer Network

In a client-server network, powerful computers called servers provide resources and services, while other computers, known as clients, access these resources and services.

In a peer-to-peer network, all computers have equal roles and can both provide and request resources without a centralized server.

Security and data management are handled by the server. Network administrator manages and enforces security policies.

Security is managed individually on each peer. Each peer is responsible for its own security and data.

 

(b) Write any two opportunities and two threats of social media

Opportunities of using social media

Networking: Connect globally, build relationships, and join communities.

Information Sharing: Quickly access and share news and educational content.

Threats of using social media

Privacy Risks: Personal information can be exposed or misused.

Cyberbullying: Harassment or bullying through online interactions.

(c) Write the importance of backup in data and software security:

The importance of backup in data and software security is to keep copies of important files and data in a safe place. If computer crashes or accidentally deleted something, we can use these copies to restore our information and avoid losing important work or personal files.

 

 

(d) What is e-banking? Write its two advantages.

E-banking is a digital banking system that allows customers to perform financial transactions and manage their accounts online via the internet or mobile apps, eliminating the need to visit a physical bank branch.

Two advantages of e-banking:

24/7 access to banking services and convenience of performing transactions from home.

(e) What is IoT? Write any two importance of it.

Internet of Things (IoT) refers to a network of interconnected physical devices that can collect and exchange data over the internet without requiring human intervention.

Any two importance of Internet of Things (IoT) are

v It reduces the human effort, so it saves a lot of time. 

v Information is easily accessible from any place at any time on any device. 

(f) Write any four advantages of DBMS.

Four advantages of DBMS:

a)     It reduces data redundancy which means duplication of data.

b)     It allows multiple users to access the same data simultaneously.

c)     Large volume of data can be stored and updated easily.

d)     It provides high security of data as well as maintains accurate database.

(g) Which data types are suitable while designing table structure to store information about student’s name, Roll No., Address and Date of Birth in MS-Access 

Four data types for Student Table (Name, Roll No, Address, DOB):

  1. Name: Short Text
  2. Roll No: Number
  3. Address: Short Text / Long Text
  4. Date of Birth: Date/Time

(h)What is select query? Write the function of action query.

Select query is a type of query which is used to select and display the relevant data from the database.

The function of action query is to makes changes to or removes many records in just one operation.

(i) Define report. Why it is necessary to create a report in DBMS?

Report is one of the MS-Access database objects used to present information in an effective and organized format that is ready for printing.

It is necessary to create a report in DBMS to present data from one or more tables in a formatted and organized manner, allowing users to easily view and analyze the information.

5. Write the output of the given program. Show them in a dry run table.

DECLARE SUB Series (A)

CLS

A = 5

CALL Series (A)

END

 

SUB Series (A)

FOR K = 1 TO 5

    PRINT A;

    A = A * 2

NEXT K

END SUB

 

Dry Run Table

Iteration (K)

Initial Value of A

Action (PRINT A;)

New Value (A = A * 2)

1

5

5

10

2

10

10

20

3

20

20

40

4

40

40

80

5

80

80

160

 

The output of the program is:

5  10  20  40  80

6. Rewrite the given program after correcting the bugs.

 

REM to add record in a existing file

CLS

OPEN "See.dat" FOR OUTPUT AS #2

BB:

INPUT "Enter the Name"; N$

INPUT "Enter the Address"; A$

INPUT "Enter the Class"; C

INPUT #2, N$, A$, C             

INPUT "More record "; Y$

IF UCASE (Y$) = "Y" THEN GOTO BB

CLOSE “see.dat”                        

END

 

 

 

Debugged Program

 

REM to add record in a existing file

CLS

OPEN "See.dat" FOR APPEND AS #2

BB:

INPUT "Enter the Name"; N$

INPUT "Enter the Address"; A$

INPUT "Enter the Class"; C

WRITE #2, N$, A$, C             

INPUT "More record"; Y$

IF UCASE$(Y$) = "Y" THEN GOTO BB

CLOSE #2                        

END

 

7. Study the following program and answer the following questions:

DECLARE FUNCTION LongestName$ (Z$)

DIM SHARED A$, B$, C$

CLS

READ A$, B$, C$

DATA "NEPAL", "BANGLADESH", "BHUTAN"

PRINT LongestName$(Z$)

END

 

FUNCTION LongestName$ (Z$)

    L$ = A$

    IF LEN(B$) > LEN(L$) THEN

        L$ = B$

    ELSEIF LEN(C$) > LEN(L$) THEN

        L$ = C$

    END IF

    LongestName$ = L$

END FUNCTION

 

a) Write the Global variables used in the above program.

The global variables in this program are A$, B$, and C$

(b) Why is the $ (dollar) sign used after the function name?

The $ sign is used after the function name (LongestName$) to indicate that the function will return a string value (text) rather than a numeric value.

 

8. Number System

i) (1011101)_2 = (135)8

ii) (188)_{10} = (BC)16

iii) (101)_2 \times (110)2 = (11110)2

iv) (111011)_2 \div (101)_2 = {Quotient: } (1011)2, { Remainder: } (100)2

 

 


9. QBASIC Programming

a. Write a program to ask three numbers from a user and find their sum using Sub procedure and find the average of those numbers using Function procedure.

 

DECLARE SUB SUM (A, B, C)

DECLARE FUNCTION AVG (A, B, C)

CLS

INPUT "Enter three numbers: ", X, Y, Z

CALL SUM(X, Y, Z)

PRINT "Average of numbers is: "; AVG(X, Y, Z)

END

 

SUB SUM (A, B, C)

    S = A + B + C

    PRINT "Sum of numbers is: "; S

END SUB

 

FUNCTION AVG (A, B, C)

    AVG = (A + B + C) / 3

END FUNCTION

 

b. Write a program to store Roll No, Name, Class, Date of Birth and Address of students in data file "STUDETN.TXT". The program allows the users to input more data as many times as they need.

CLS

OPEN "STUDENT.TXT" FOR OUTPUT AS #1

DO

    INPUT "Enter Roll No: ", R

    INPUT "Enter Name: ", N$

    INPUT "Enter Class: ", C

    INPUT "Enter Date of Birth: ", D$

    INPUT "Enter Address: ", AD$

    WRITE #1, R, N$, C, D$, AD$

    INPUT "Do you want to add more data? (Y/N): ", CH$

LOOP WHILE UCASE$(CH$) = "Y"

CLOSE #1

END


10. Write a program in 'C' language that checks whether the given number is Positive or Negative.

 

#include <stdio.h>

 

int main() {

    int num;

    printf("Enter a number: ");

    scanf("%d", &num);

   

    if (num > 0) {

        printf("%d is Positive.", num);

    } else if (num < 0) {

        printf("%d is Negative.", num);

    }

    return 0;

}

 

Write a program using 'C' language to display the series 100, 95, 90, 85, 80 ..... up to 10th term.C

#include <stdio.h>

 

int main() {

    int a = 100;

    int i;

    for (i = 1; i <= 10; i++) {

        printf("%d ", a);

        a = a - 5;

    }

    return 0;

}