PABSON SEE PRE-QUALIFING EXAMINATION-2080
Subject: Opt. II (Computer Science) Full Marks: 50
Time: 1:30 hrs
Candidates are required to give their answers according to the instructions.
Attempt all the questions.
Group 'A'
1. Answer the following questions in one sentence: [6×1=6]
a) What do you mean by primary key?
Ans: A primary key is a unique identifier for each record in a database table.
b) What is database? Give example.
Ans: Process of keeping records in a systematic way is known as database.
Examples: Dictionary, Marks ledger etc.
c) Define cyber ethics.
Ans: Cyber ethics involves the ethical guidelines for responsible behavior online, focusing on privacy, integrity, and respect.
d) Write any two keywords used in C-programming language.
Ans: Two keywords used in C-programming language are: int, return
e)What do you mean by B2C model of e-commerce?
Ans: B2C in e-commerce means businesses selling directly to consumers online, like Darazz or your local store's website.
f) What is the function of INT() in Qbasic programming?
Ans:In QBasic programming, the INT() function is used to return the integer part of a number by removing any fractional component.
2. Write appropriate technical term for the following. [2×1=2]
a) The device that is used to connect two networks with different communication protocol.
Ans: Gateway
b) A person who breaks computer security and uses a computer and file present in it.Ans: Hacker
a) VOIP: Voice Over Internet Protocol
b) WLAN: Wireless Local Area Network
4. Answer the following questions: [9×2=18]
a) What is computer network architecture? Mention its types.
Ans: Computer Network Architecture is defined as the physical and logical design of the software, hardware, protocols, and media of the transmission of data.
Following are the different types of network architecture:
i) Peer-to-Peer network
ii) Client/server network
iii) Centralized network
b) What do you mean by digital signature? Why it is important?
Ans: A digital signature is a cryptographic technique that verifies the authenticity and integrity of a digital document or message.
The following are the importance of digital signatures:
i) Digital signatures confirm the identity of the sender, ensuring the recipient knows who created the document or message.
ii) It provides a high level of security for online transactions, protecting against fraud and unauthorized access.
c) What is a firewall? Enlist the types of firewalls.
Ans: A firewall can be defined as a special type of network security device or a software program that monitors and filters incoming and outgoing network traffic based on a defined set of security rules.
Following are the different types of firewall:
i) Packet-filtering firewalls
ii) Proxy Firewall
iii) Network Address Translation (NAT) firewalls.
d) Differentiate between computerized and non-computerized databases.
Ans: Following are the differences between computerized and non-computerized databases.
Computerized databases |
Non-computerized databases. |
Database organized in computer using electronic device and software is called computerized / electronic database. |
Database in sheet of paper, organized manually is known as non- computerized database. |
Data updating, editing and deletion of records will be faster. |
Non computerized database is very difficult to access, update and search data |
Computerized databases stored electronically on computer systems (hard drives, SSDs, cloud). |
Non-computerized database stored physically in forms like paper records, files. |
It has enhanced security features like encryption, password, backup, and access control. |
In it security depends on physical measures. |
e) What is AI? Enlist two application areas of AI.
Ans: Artificial Intelligence is the branch of computer science that focuses on creating machines capable of performing tasks that typically require human intelligence.
Following are the application area of AI:
i) Robotics
ii) Healthcare
iii) Automobile
iv) Education
f) What is hardware security? Enlist any two measures to protect it.
Ans: The process of protecting the physical parts of the computer system is known as hardware security.
The following are the hardware security measures:
i) Insurance
ii) Implement physical security measures.
g) What is field property in Ms-Access? Enlist any four of them.
Ans: In Ms-Access, field properties define the characteristics and behavior of data stored in each field within a table.
Following are the examples of four field property:
i) Field size
ii) Format
iii) Validation rule
iv) Default value
h) What is indexing? Why forms and reports are used in MS-Access?
Ans: Indexing is a data structure technique that allows you to quickly retrieve records from a database file.
Forms are used for entering, modifying, and viewing records.
Reports are used for organizing, summarizing, and presenting data in a visually appealing format for analysis or printing.
i) What is Query? Write the types of Action Query.
Ans: A query in MS Access is a object that allows you to retrieve and manipulate data from one or more tables based on specific criteria.
Following are the different types of action query.
i) Delete Query
ii) Append Query
iii) Update Query
5. Write the output of the given program. (workout with dry-run) [2]
DECLARE SUB show ()
CLS
CALL show
END
SUB show
c = 3
b = 2
FOR i = 2 TO 8 STEP 2
PRINT c;
SWAP b, c
b = c + 1
NEXT i
END SUB
Dry Run:
Variable c |
Variable b |
Loop check? FOR I= 2 TO 8 STEP 2 |
Print c (Output) |
C=3 |
B=2 |
FOR I= 2 TO 8 ? Yes |
3 |
C=2 |
B=3 B=2+1=3 |
FOR i=4 TO 8 ? Yes |
2 |
C=3 |
B=2 B=3+1=4 |
FOR i= 6 TO 8? Yes |
3 |
C=4 |
B=3 B=4+1=5 |
FOR i= 8 TO 8? Yes |
4 |
C=5 |
B=4 |
FOR i= 10 TO 8? No Exit from loop. |
|
3 2 3 4
6. Re-write the given program after correcting bugs. [2]
REM to add a few records in the existing data file.
CLS
OPEN "emp.dat" FOR OUTPUT AS #1
DO
INPUT "Enter employee name, post, salary";en$,post$,salary
PRINT #2.EN$,post$,salary
INPUT "Add more records(Y/N)?";c
LOOP WHILE UCASE$(c$)="Y"
CLOSE #1
END
Ans: Debugged program:
REM to add a few records in the existing data file.
CLS
OPEN "emp.dat" FOR APPEND AS #2
DO
INPUT "Enter employee name, post, salary";en$,post$,salary
WRITE #2,.EN$,post$,salary
INPUT "Add more records(Y/N)?";c$
LOOP WHILE UCASE$(c$)="Y"
CLOSE #2
END
7. Study the following program and answer the given questions. [2]
DECLARE FUNCTION SUM(n)
CLS
INPUT "Enter a number";n
x=sum(n)
PRINT "The sum of individual digits is:";x
END
FUNCTION sum(n)
WHILE n<>0
r= n MOD 10
s=s+r
n=INT(n/10)
WEND
sum=s
END FUNCTION
a) Name the user define function in above program.
Ans: sum
b) How many times the WHILE….WEND loop repeats, if the value of n is 1234?
Ans: 4 times
Group 'C'
8. Calculate or convert as per instructions. [4×1=4]
a) (CA)16=(?)10
b) (652)10=(?)8
d) (111011)2÷(100)
9.a) Write a program in QBASIC to input a radius, and create a user-defined function to calculate the volume of the hemisphere and total surface area (TSA) of the sphere using the SUB procedure. [4]
DECLARE FUNCTION volume (r)
DECLARE SUB tsa (r)
CLS
INPUT "Enter radius:"; r
PRINT volume(r)
CALL tsa(r)
END
SUB tsa (r)
t = 4 * 22 / 7 * r ^ 2
PRINT "Total surface area: "; t
END SUB
FUNCTION volume (r)
volume = 2 / 3 * 22 / 7 * r ^ 3
END FUNCTION
b) A sequential data file "record.dat" contains the name, address, salary of employee, and display the records of those whose salary is more than 37000 and whose name ends with "DHA" [4]
CLS
OPEN "record.dat" for INPUT AS #1
DO WHILE NOT EOF(1)
INPUT #1, n$,a$,s
IF s>37000 AND RIGHT$(a$,3)="DHA" THEN
PRINT "Name:";n$
PRINT "Address: ";a$
PRINT "Salary:";s
ENDIF
LOOP
CLOSE #1
END
10. a) Write a 'C' program to input a character and check whether it is a vowel or consonant. [4]
Ans:
#include<stdio.h>
int main()
{
char c;
printf("Enter any character");
scanf("%c",&c);
if(c=='a'||c=='e'||c=='i'||c=='o'||c=='u')
printf("vowel character");
else
printf("consonent character");
return 0;
}
OR
Write a program in 'C' language to input number and check whether it is a palindrome or not. [4]
#include<stdio.h>
int main()
{
int n,r,t,a;
printf("Enter any number:");
scanf("%d",&n);
a=n;
while (n>0)
{
r=n%10;
t=t*10+r;
n=n/10;
}
if(a==t)
printf("number is palindrom");
else
printf("number is not palindorm");
return 0;
}
You may also read:
SEE computer question paper 2079 (2023) solved.
Solved Computer see grade promotion exam 2079-2023
No comments:
Post a Comment