Set 2: PABSON 2081 (Set A) Solved
COMPUTER SCIENCE F.M 50
P.M 17.5
Group 'A'
a. What is web browser?
A web browser is an application software used to access and view websites on the internet.
b. What is the business conducted through wireless handheld device?
Mobile commerce (m-commerce).
c. Which data type is used to video file in MS-Access?
OLE Object / Attachment.
d. What is Filtering?
Filtering is the process of displaying only the records that meet specific criteria in a database.
e. Write difference between function procedure and sub procedure.
A function procedure returns a value, whereas a sub procedure does not return a value.
f. Write any two header files of C language.<stdio.h> and <conio.h>.
Write appropriate technical term [2]
a. Copying someone else’s work and publishing as your own.
Copyright violation.
b. Converting plaintext into ciphertext.
Encryption.
Write the full form [2]
a. ASCII → American Standard Code for Information Interchange.
b. MAC → Media Access Control.
Group "B" [2 marks × 9 = 18]
a. Define computer network. List the types of computer network.
A computer network is a system that connects two or more computers and other devices together to share data, resources, and services such as files, printers, and internet access. Networking allows communication between users and devices over short or long distances.
The main types of computer networks are:
-
LAN (Local Area Network): Covers a small area such as a school, office, or building.
-
MAN (Metropolitan Area Network): Covers a larger area such as a city or town.
-
WAN (Wide Area Network): Covers a very large geographical area, even worldwide, such as the internet.
b. What is cyber ethics? List any two of them.
Cyber ethics refers to the moral principles and proper behavior that people should follow while using the internet and digital technology. It guides users on how to act responsibly, respect others, and avoid harmful activities online. Cyber ethics ensures a safe and trustworthy digital environment.
Two examples of cyber ethics are:
-
Avoid hacking or spreading viruses – Do not break into others’ systems or damage their data.
-
Respect privacy – Do not misuse or share someone’s personal information without their permission.
c. What is computer security? Write any two measures of hardware security.
Computer security is the protection of computer systems, hardware, software, and data from unauthorized access, theft, damage, or misuse. It ensures confidentiality, integrity, and availability of information.
Two measures of hardware security are:
-
Physical locks and restricted access – Placing computers in secure rooms and using locks to prevent theft.
-
Biometric and password protection – Using fingerprints, smart cards, or strong passwords to restrict unauthorized users from operating the system.
d. What is m-computing? Write advantages of m-computing.
Mobile computing (m-computing) refers to the ability to access data, applications, and services using portable devices such as smartphones, tablets, or laptops while being mobile. It allows users to perform computing tasks without being fixed to a particular location.
Advantages of m-computing are:
-
Portability: Users can carry devices anywhere and perform tasks on the go.
-
Instant communication and access: It provides quick access to email, internet, and cloud storage.
-
Time-saving: Work can be done from any location, increasing productivity.
e. What is VR? Write two application areas of VR.
Virtual Reality (VR) is an advanced computer technology that creates a simulated 3D environment where users feel as if they are physically present in that world. By wearing VR headsets or using VR-enabled devices, users can interact with the virtual environment in real time.
Two application areas of VR are:
-
Gaming and Entertainment – VR provides realistic experiences in video games and movies.
-
Medical Training – Doctors and medical students use VR to practice surgery and treatment in a risk-free environment.
f. What is query? List its types.
A query is a request made to a database in order to search, retrieve, or manipulate specific information. It allows users to display data that meet certain conditions. Queries are one of the most important tools in database management.
Types of queries are:
-
Select Query: Retrieves specific data from a table.
-
Action Query: Performs actions like update, delete, or append.
-
Parameter Query: Prompts the user for input when run.
-
Crosstab Query: Summarizes data in a tabular format.
g. Define filtering. Write two examples of it.
Filtering is the process of displaying only those records in a database that match certain criteria while hiding others. It helps in analyzing and managing data more efficiently.
Examples of filtering:
-
Showing only students who scored more than 40 marks in English.
-
Displaying employees who belong to the "IT" department.
h. Define primary key.Write any two advantages of it.
A primary key is a unique field or combination of fields in a database table that uniquely identifies each record. No two records can have the same primary key value, and it cannot be left empty.
Advantages of using a primary key:
-
Prevents duplication: Ensures that every record is unique.
-
Maintains data integrity: Makes searching and linking data between tables easier and more accurate.
i. What is field and database?
A field is the smallest unit of data in a database that stores a single piece of information, such as Name, Age, or Roll Number. Each field has a specific data type.
A database is an organized collection of related data stored electronically in a systematic way. It allows easy storage, retrieval, and management of information. Example: A school database storing student records.
| Step | M | N | Output Printed |
|---|---|---|---|
| 1 | 1 | 1 | 1 |
| 2 | 11 | 2 | 11 |
| 3 | 112 | 3 | 112 |
| 4 | 1123 | 4 | 1123 |
| 5 | 11234 | 5 | 11234 |
| 6 | 112345 | 6 | Loop Ends |
6. After debugging
Q.7 Study Program
a. List arguments and parameters:
Arguments = X, Y, Z
Parameters = A, B, C
b. List local variables:
Local variables in main = X, Y, Z
Local variables in sub = A, B, C, SUM
Q.9 (a) Program for surface area & volume of cylinder in QBASIC
Q.9 (b) QBASIC program (Employee.txt)
Q.10 C program (smallest number among three)
COPYRIGHT TO MILAN BARAL

No comments:
Post a Comment