Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Monday, February 5, 2024

PABSON SEE PRE-QUALIFING EXAMINATION-2080 a complete solution.

PABSON SEE PRE-QUALIFING EXAMINATION-2080




Subject:  Opt. II (Computer Science)                                       Full Marks: 50

Time: 1:30 hrs

Candidates are required to give their answers according to the instructions.

Attempt all the questions.

Group 'A'

1. Answer the following questions in one sentence: [6×1=6]

a) What do you mean by primary key?

Ans: A primary key is a unique identifier for each record in a database table.

 

b) What is database? Give example.

Ans: Process of keeping records in a systematic way is known as database.

Examples: Dictionary, Marks ledger etc.

 

c) Define cyber ethics.

Ans: Cyber ethics involves the ethical guidelines for responsible behavior online, focusing on privacy, integrity, and respect.

 

d) Write any two keywords used in C-programming language.

Ans: Two keywords used in C-programming language are: int, return

 

e)What do you mean by B2C model of e-commerce?

Ans: B2C in e-commerce means businesses selling directly to consumers online, like Darazz or your local store's website.

 

f) What is the function of INT() in Qbasic programming?

Ans:In QBasic programming, the INT() function is used to return the integer part of a number by removing any fractional component.

 

2. Write appropriate technical term for the following.  [2×1=2]

a) The device that is used to connect two networks with different communication protocol.

Ans: Gateway

b) A person who breaks computer security and uses a computer and file present in it.

Ans: Hacker


3. Write the full form of the following: [2×1=2]

a) VOIP: Voice Over Internet Protocol

b) WLAN: Wireless Local Area Network

 

 Group 'B'

4. Answer the following questions:   [9×2=18]

a) What is computer network architecture? Mention its types.

Ans: Computer Network Architecture is defined as the physical and logical design of the software, hardware, protocols, and media of the transmission of data. 

Following are the different types of network architecture:

i) Peer-to-Peer network

ii) Client/server network

iii) Centralized network

 

b) What do you mean by digital signature? Why it is important?

Ans: A digital signature is a cryptographic technique that verifies the authenticity and integrity of a digital document or message.

The following are the importance of digital signatures:

i) Digital signatures confirm the identity of the sender, ensuring the recipient knows who created the document or message.

ii) It provides a high level of security for online transactions, protecting against fraud and unauthorized access.

 

c) What is a firewall? Enlist the types of firewalls.

Ans: A firewall can be defined as a special type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a defined set of security rules.

Following are the different types of firewall:

i) Packet-filtering firewalls

ii) Proxy Firewall

iii) Network Address Translation (NAT) firewalls.

 

d) Differentiate between computerized and non-computerized databases.

Ans: Following are the differences between computerized and non-computerized databases.

Computerized databases

Non-computerized databases.

Database organized in computer using electronic device and software is called computerized / electronic database.

Database in sheet of paper, organized manually is known as non- computerized database.

Data updating, editing and deletion of records will be faster.

Non computerized database is very difficult to access, update and search data

Computerized databases stored electronically on computer systems (hard drives, SSDs, cloud).

Non-computerized database stored physically in forms like paper records, files.

It has enhanced security features like encryption, password, backup, and access control.

In it security depends on physical measures.

 

e) What is AI? Enlist two application areas of AI.

Ans: Artificial Intelligence is the branch of computer science that focuses on creating machines capable of performing tasks that typically require human intelligence.

Following are the application area of AI:

i) Robotics

ii) Healthcare

iii) Automobile

iv) Education

 

f) What is hardware security? Enlist any two measures to protect it.

Ans: The process of protecting the physical parts of the computer system is known as hardware security.

The following are the hardware security measures:

i) Insurance

ii) Implement physical security measures.

 

g) What is field property in Ms-Access? Enlist any four of them.

Ans: In Ms-Access, field properties define the characteristics and behavior of data stored in each field within a table.

Following are the examples of four field property:

i) Field size

ii) Format

iii) Validation rule

iv) Default value

 

h) What is indexing? Why forms and reports are used in MS-Access?

Ans: Indexing is a data structure technique that allows you to quickly retrieve records from a database file. 

Forms are used for entering, modifying, and viewing records.

Reports are used for organizing, summarizing, and presenting data in a visually appealing format for analysis or printing.

 

i) What is Query? Write the types of Action Query.

Ans: A query in MS Access is a object that allows you to retrieve and manipulate data from one or more tables based on specific criteria.

Following are the different types of action query.

i) Delete Query

ii) Append Query

iii) Update Query

 

5. Write the output of the given program. (workout with dry-run)  [2]

DECLARE SUB show ()

CLS

CALL show

END

 

SUB show

c = 3

b = 2

FOR i = 2 TO 8 STEP 2

PRINT c;

SWAP b, c

b = c + 1

NEXT i

END SUB

Dry Run:


Variable c

Variable b

Loop check?

FOR I= 2 TO 8 STEP 2

Print c (Output)

C=3

B=2

 FOR I= 2 TO 8 ? Yes

3

C=2

B=3

B=2+1=3

FOR i=4 TO 8 ? Yes

2

C=3

B=2

B=3+1=4

FOR i= 6 TO 8? Yes

3

C=4

B=3

B=4+1=5

FOR i= 8 TO 8? Yes

4

C=5

B=4

FOR i= 10 TO 8? No

Exit from loop.

 


Final Output:

3 2 3 4

 

6. Re-write the given program after correcting bugs.  [2]

REM to add a few records in the existing data file.

CLS

OPEN "emp.dat" FOR OUTPUT AS #1

DO

INPUT "Enter employee name, post, salary";en$,post$,salary

PRINT #2.EN$,post$,salary

INPUT "Add more records(Y/N)?";c

LOOP WHILE UCASE$(c$)="Y"

CLOSE #1

END

Ans: Debugged program:

REM to add a few records in the existing data file.

CLS

OPEN "emp.dat" FOR APPEND AS #2

DO

INPUT "Enter employee name, post, salary";en$,post$,salary

WRITE #2,.EN$,post$,salary

INPUT "Add more records(Y/N)?";c$

LOOP WHILE UCASE$(c$)="Y"

CLOSE #2

END

 

7. Study the following program and answer the given questions. [2]

DECLARE FUNCTION SUM(n)

CLS

INPUT "Enter a number";n

x=sum(n)

PRINT "The sum of individual digits is:";x

END

 

FUNCTION sum(n)

WHILE n<>0

r= n MOD 10

s=s+r

n=INT(n/10)

WEND

sum=s

END FUNCTION

a) Name the user define function in above program.

Ans: sum

b) How many times the WHILE….WEND loop repeats, if the value of n is 1234?

Ans: 4 times

 

Group 'C'

8. Calculate or convert as per instructions. [4×1=4]

a) (CA)16=(?)10

b) (652)10=(?)8


c) (10101)2×(11)2-(1110)2

d) (111011)2÷(100)

 


9.a) Write a program in QBASIC to input a radius, and create a user-defined function to calculate the volume of the hemisphere and total surface area (TSA) of the sphere using the SUB procedure.    [4]

DECLARE FUNCTION volume (r)

DECLARE SUB tsa (r)

CLS

INPUT "Enter radius:"; r

PRINT volume(r)

CALL tsa(r)

END

 

SUB tsa (r)

t = 4 * 22 / 7 * r ^ 2

PRINT "Total surface area: "; t

END SUB

 

FUNCTION volume (r)

volume = 2 / 3 * 22 / 7 * r ^ 3

END FUNCTION

 

b) A sequential data file "record.dat" contains the name, address, salary of employee, and display the records of those whose salary is more than 37000 and whose name ends with "DHA"    [4]

CLS

OPEN "record.dat" for INPUT AS #1

DO WHILE NOT EOF(1)

INPUT #1, n$,a$,s

IF s>37000 AND RIGHT$(a$,3)="DHA" THEN

PRINT "Name:";n$

PRINT "Address: ";a$

PRINT "Salary:";s

ENDIF

LOOP

CLOSE #1

END

 

10. a) Write a 'C' program to input a character and check whether it is a vowel or consonant. [4] 

Ans:

#include<stdio.h>

int main()

{

                char c;

                printf("Enter any character");

                scanf("%c",&c);

                if(c=='a'||c=='e'||c=='i'||c=='o'||c=='u')

                printf("vowel character");

                else

                printf("consonent character");

                return 0;

}

OR

Write a program in 'C' language to input number and check whether it is a palindrome or not. [4]

#include<stdio.h>

int main()

{

                int n,r,t,a;

                printf("Enter any number:");

                scanf("%d",&n);

                a=n;

                while (n>0)

                {

                                r=n%10;

                                t=t*10+r;

                                n=n/10;

                }

                if(a==t)

                printf("number is palindrom");

                else

                printf("number is not palindorm");

                return 0;

}



You may also read:

SEE computer question paper 2079 (2023) solved.

Solved Computer see grade promotion exam 2079-2023

No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages