Prev Questions
Prev Questions
Candidates are required to answer the questions in their own words as far as possible.
Group A
1. Circle (0) the correct answer.
10×1=10
i) Which of the following does not contain PCB?
a) code b) data c) stack d) bootstrap program
ii) The Test and Set instruction in executed:
a) Atomically b) periodically c) after a particular process d) none of these
iii) How circular wait condition can be prevented?
a) By using pipes b) by using threads
c) by resource grant on all or none basis d) by defining linear ordering of resource type.
iv) Which process can be affected by other processes executing in the system?
a) Parent process b) Init process c) cooperating process d) Child Process.
v) External fragmentation will not occur when?
a) first fit b) worst fit
c) best fit d) No matter which algorithm is used, it will always occur
vi) why is one-time password safe?
a) it is easy to generated b) it is different for every access
c) it cannot be shared d) it is complex encrypted password.
vii) How process on the remote system are identified.
a) host id b) host name and identifier
c)identifier d) process id
viii) In distributed system each process has its own:
a) Local memory b) clock
c) both local memory and clock d) none of these
ix) The main memory accommodates
a) CPU b) user processes
c) OS d) all of the mentioned
x) In Unix, which system call creates the new process?
a) fork b) new c) create d) none of the mentioned
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Operating System Pass Marks: 24
Code No: CACS 251 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
2.
Candidates are required to answer the questions in their own words as far as possible.
Group A
1. Circle (0) the correct answer. 10×1=10
i) What does OS X have?
a) Micro kernel b) monolithic kernel
c) hybrid kernel d) monolithic kernel with modules
ii) Which of the following is not the valid state of the thread?
a) new b) running
c) parsing d) blocked
iii) How circular wait condition can be prevented?
a) By using pipes b) by using threads
c) by resource grant on all or none basis d) by defining linear ordering of resource
type.
iv) Which process can be affected by other processes executing in the system?
a) Parent process b) Init process
c) cooperating process d) Child Process.
v) The signal operations of the semaphore basically works on the basic system calls
a) wake-up() b) continue
c) start d) getup()
vi) Why is one-time password safe?
a) it is easy to generated b) it is different for every access
c) it cannot be shared d) it is complex encrypted password.
vii) How process on the remote system are identified.
a) host id b) host name and identifier
c)identifier d) process id
viii) In distributed system each process has its own:
a) Local memory b) clock
c) both local memory and clock d) none of these
ix) The main memory accommodates
a) CPU b) user processes
c) OS d) all of the mentioned
x) Which of the following is not a major reason for building distributed systems?
a) Resource sharing b) Computation speedup c) Reliability d) simplicity
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Operating System Pass Marks: 24
Code No: CACS 251 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
Short Answer Questions (Any SIX): 6×5=30
1. What is an operating system? Explain the functions of operating system.
2. Define the term semaphore. How does semaphore help in dining philosopher problem?
3. What is system call? Discuss process of handling system calls briefly.
4. A system has two process and three resource. Each process needs a maximum of two
resources. Is deadlock possible? Explain with example.
5. Differentiate between internal and external fragmentation? Suppose that we have memory of
100 MB with 5 partitions of size 150KB, 200KB, 250KB, 100KB and 300KB. Where the
processes A and B of size 175KB and 125KB will be loaded, if we used best-fit and worst-fit
strategy?
6. Given references to the following pages by a program,
0,9,0,1,8,1,8,7,8,7,1,3,8,2,7,8,3,4,8,3 how many page fault will occur if the program has three
page frames for each of the following algorithms a) FIFO b) LRU
7. What is file? Explain how access control matrix provides resource protection that may access
process.
8. What do you mean by one-time password in authentication? How worms are differing from
virus.
Group C
Long Answer Questions (Any TWO):
2×10=20
9. What kind of problem arises with sleep and wake-up mechanism of achieving mutual
exclusion? Explain with suitable code snippet.
10. Write CPU scheduling criteria. For the processes listed in following table, draw Gannt chart
illustrating their execution and calculate average waiting time and turnaround time using
a) first come first serve
b) long remaining time next
c) Round Robin (quantum = 1 sec)
d) priority
Proc AT BT Priority
esses
P0 0.0 8 3
p1 2.01 7 1
p2 3.01 2 4
p3 3.02 2 2
11. Define term seek time and rotational delay in desk scheduling. Suppose that a disk has 100
cylinders, numbered 0 to 99. the drive is currently serving a request at cylinders 44 and
previous request was at cylinder 26. the queue of pending request, in FIFO order is: 86, 70,
13, 74, 48, 9, 22, 50, 30 Starting from the current head position, what is total distance that the
disk arm moves to satisfy all pending request for each of following disk scheduling
algorithms? a) FCFS b) SSTF c) SCAN d)LOOK
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Operating System Pass Marks: 24
Code No: CACS 251 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
Short Answer Questions (Any SIX): 6×5=10
1. What is an operating system? Explain the functions of operating system.
2. Define the term semaphore. How does semaphore help in dining philosopher problem?
3. What is the importance of paging and segmentation in memory management?
4. A system has two process and three resource. Each process needs a maximum of two
resources. Is deadlock possible? Explain with example.
5. Differentiate between internal and external fragmentation? Suppose that we have memory of
100 MB with 5 partitions of size 150KB, 200KB, 250KB, 100KB and 300KB. Where the
processes A and B of size 175KB and 125KB will be loaded, if we used best-fit and worst-fit
strategy?
6. Given references to the following pages by a program,
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 .how many page fault will occur if the
program has three page frames for each of the following algorithms a) FIFO b) LRU
7. What is file? Explain how access control matrix provides resource protection that may access
process.
8. Discuss various system threats to operating system. What is access control and
authentication?
Group C
Long Answer Questions (Any TWO): 2×10=20
9. Explain the need of CPU management. Which are the different scheduling schemes?
10. Write CPU scheduling criteria. For the processes listed in following table, draw Gannt chart
illustrating their execution and calculate average waiting time and turnaround time using
a) first come first serve
b) long remaining time next
c) Round Robin (quantum = 1 sec)
d) priority
Proc AT BT Priority
esses
P0 0 4 2
p1 1 3 3
p2 2 1 4
p3 3 5 5
p4 4 2 5
11. Define term seek time and rotational delay in desk scheduling. Suppose that a disk has 100
cylinders, numbered 0 to 99. the drive is currently serving a request at cylinders 44 and
previous request was at cylinder 26. the queue of pending request, in FIFO order is: 86, 70,
13, 74, 48, 9, 22, 50, 30 Starting from the current head position, what is total distance that the
disk arm moves to satisfy all pending request for each of following disk scheduling
algorithms? a) FCFS b) SSTF c) CSCAN d)CLOOK
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Operating System Pass Marks: 30
Course No.: CACS 251 Time: 3 hrs.
Semester: IV
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group 'A'
Attempt all the questions. [10×1=10]
Circle (Ο) the best answer
1. A critical section is a program segment________
a. where shared resources are accessed
b. which should run in a certain specified amount of time
c. which avoids deadlocks
d. which must be enclosed by a pair of semaphore operations, P and V
2. CPU scheduling is the basis of ___________
a. multiprogramming operating systems b. larger memory-sized systems
c. multiprocessor systems d. none of the mentioned
3. The percentage of times a page number is found in the TLB is known as ____________
a. miss ratio b. hit ratio c. miss percent d. none of the mentioned
Candidates are required to answer the questions in their own words as far as possible.
Group A
Attempt all the questions. (10 × 1 = 10)
1. Which one of the following is numerical error?
a) Missing Information b) Data Error
c) Roundup Error d) Conversion Error
2. Which one of the following method is used to solve the system of linear equations?
a) Bisection Method b) Taylor Series Method
c) False Position Method d) Matrix Inverse Method
3. How many significant digits in the number 105.78904560?
a) 1 b) 8
c) 3 d) 10
4. What will be the solution of equations x + y=3 and 2x + 2y=6?
a) Unique Solution b) No Solution
c) Infinite Solution d) Ill-Condition
5. Which of the following is four point formula to estimate integration?
a) Trapezoidal Rule b) Simpson’s 1/3 Rule
c) Boole’s Rule d) Simpson’s 3/8 Rule
6. A differential equation is considered to be ordinary if it has
a) one dependent variable b) more than one dependent variable
c) one independent variable d) more than one independent variable
7. The technique for computing the value of the function inside the given argument is called
a) interpolation b) extrapolation
c) partial fraction d) inverse interpolation
8. In case of Newton-Raphson method the error at any stage is proportional to____.
a) The error in the previous stage. b) The square of the error in the previous
stage.
c) The cube of the error in the previous stage d) Square root of the error in the previous
stage.
9. In which of the following methods proper choice of initial value is very important?
a) Bisection method b) False Method
c) Newton Raphson d) Secant Method
10. The ratio of truncation error to that round off error is
a) 2:1 b) 1:2
c) 1:1 d) 1:3
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Numerical Methods Pass Marks: 24
Code No: CACS 252 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
4.
Candidates are required to answer the questions in their own words as far as possible.
Group “A”
Objective Type Questions: [10 × 1 = 10]
1. Solving an engineering problem requires four steps. In order of sequence, the four steps
are
a formulate, solve, interpret, implement b solve, formulate, interpret, implement
c formulate, solve, implement, interpret d formulate, implement, solve, interpret
2. True error is defined as
a Present Approximation – Previous Approximation
b True Value – Approximate Value
c abs (True Value – Approximate Value)
d abs (Present Approximation – Previous Approximation)
3. The next iterative value of the root of using Newton-Raphson method, if the initial guess
is 3, is
a 1.500 b 2.066 c 2.167 d 3.000
4. The following system of equations has ____________ solution(s).
x+y=2
6x+6y =12
a Infinite b No c Two d Unique
5. The goal of forward elimination steps in the Gauss elimination method is to reduce the
coefficient matrix to a (an) _____________ matrix.
a Diagonal b Identity c lower triangular d upper triangular
6. The LU decomposition method is computationally more efficient than Naïve Gauss
elimination method for solving
a single set of simultaneous linear equations
b multiple sets of simultaneous linear equations with different coefficient matrices and the
same right hand side vectors.
c multiple sets of simultaneous linear equations with the same coefficient matrix but
different right hand sides.
d less than ten simultaneous linear equations.
7. How much significant digits in this number 204.020050?
a5 b7 c9 d 11
8. Newton-Raphson method is useable to?
a Algebraic equations only
b Transcendental equations only
c Both algebraic and Transcendental Equations
d Both algebraic and transcendental and also used when the roots are complex
9. Which of the following statements applies to the bisection method used for finding roots
of functions?
a Converges within a few iterations
b Guaranteed to work for all continuous functions
c Is faster than the Newton-Raphson method
d Requires that there be no error in determining the sign of the function
10. In which of the following methods proper choice of initial value is very important?
a Bisection method b False Method
c Newton Raphson d Secant Method
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Numerical Methods Pass Marks: 24
Code No: CACS 252 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
Attempt any SIX questions. (6 × 5=30)
1. Using False Position method, solve the equation xtan(x) = -1 starting with initial guess 2.5 and
3 correct up to 3- decimal places.
6 1
2. Evaluate the Integral∫0 1+𝑥 2 𝑑𝑥, taking six intervals by using (i) Trapezoidal (ii) Simpson’s
1/3 rule.
3. Solve the following set of equations by Gauss-Jordan method.
2x1 + x2 – 3x3 = 11
4x1 – 2x2 + 3x3 = 8
–2x1 + 2x2 – x3 = –6
4. Fit the following curve to the given data set.
𝑦 = 𝑎𝑒 𝑏𝑥
x 1 3 5 7 9
y 115 105 95 85 80
5. A slider in a machine moves along a fixed straight rod. Its distance x(m) along the rod are
given in the following table for various values of the time t (seconds)
t(sec) 1 2 3 4 5 6
Group C
Attempt any TWO questions. (2 × 10=20)
y 13 15 12 9 13
Solve the equation over the square with sides 0 ≤x≤ 3 and 0≤y≤3 with
u = 0 on the boundary and mesh length =1
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Numerical Methods Pass Marks: 24
Code No: CACS 252 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group “B”
Explanation Questions (Any SIX): [6×5 = 30]
11. Find the root of following equations using Newton method up to 4 decimal places.
𝒆𝒙 − 𝟑𝒙𝟐 = 𝟎
12. From the following table estimate the number of students who obtained marks in computer
programming between 75 and 80.
Marks 35-45 45-55 55-65 65-75 75-85
No. of students 20 40 60 60 20
13. A slider in a machine moves along a fixed straight rod. Its distance x(m) along the rod are given
in the following table for various values of the time t (seconds)
t(sec) 1 2 3 4 5 6
y 13 15 12 9 13
y 115 105 95 85 80
No. of students 20 40 60 60 20
23. A slider in a machine moves along a fixed straight rod. Its distance x(m) along the rod are given in the following
table for various values of the time t (seconds)
t(sec) 1 2 3 4 5 6
Group “C”
2. Long Questions (Any two): [2 X 10 = 20]
28. Given the data points:
x 1 2 3 4 5
y 13 15 12 9 13
y 115 105 95 85 80
Group A
I. Which method is used to access an HTML element in the DOM by its ID?
a) getElementByName() b) getElementById()
c) getElementByTag() d) getElementByClass()
II. Which method is commonly used to prevent form submission if client-side validation fails?
a) preventDefault() b) stopPropagation()
c) validateForm() d) submitForm()
III. How do you embed JavaScript code within an HTML document?
a) Using the <script> tag b) Using the <javascript> tag
c) Using the <js> tag d) Using the <code> tag
IV. Which superglobal array in PHP is used to retrieve data sent to the server using HTTP POST
method?
a) $_GET b) $_POST
c) $_REQUEST d) $_SERVER
V. Which function is used to open a file in PHP for reading?
a) fopen() b) open()
c) readfile() d) file_open()
VI. Which MySQL statement is used to delete rows from a table?
a) REMOVE FROM b) DELETE FROM
c) ERASE FROM d) DROP FROM
VII. What is the purpose of a destructor in object-oriented programming?
a) To create an object b) To initialize class variables
c) To free resources used by an object before it is destroyed d) To call superclass methods
VIII. How do you select an HTML element with the id "image" using jQuery?
a) $("image") b) $("#image")
c) $(".image") d) $("*image")
IX. What is the main purpose of a Joomla component?
a) To add design elements to a website b) To extend Joomla's core functionality
c) To optimize website performance d) To provide security features
X. What is the purpose of a WordPress theme?
a) To manage user roles and permissions
b) To provide a visual layout and design for a WordPress website
c) To create custom post types
d) To optimize website performance
Nagarjuna College of Information Technology
SET - A Shankhamul – 09, Lalitpur
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Scripting Language Pass Marks: 24
Course Code No: CACS 254 Time: 3 hours
Year / Semester: Second / Fourth
Candidates are required to answer the questions in their own words as far as possible.
Group B
Attempt any SIX questions: [65=30]
2. Explain the concept, structure and importance of Document Object Model (DOM).(5)
3. Write a JavaScript program that takes an array of numbers as input and returns the sum of all elements
using the forEach loop.(5)
4. How do you create a cookie and read a cookie in JavaScript?(5)
5. What are the $_GET, $_POST, and $_REQUEST superglobal variables in PHP?.(5)
6. What is the use of JQuery? Write the sample program to show and hide the certain with use of JQuery.(1+4)
7. Why Ajax is required in web development? WAP to synchronize data between JavaScript and PHP.(1+4)
8. Why is CMS? Write the steps to create a sub-menu in WordPress or Joomla.(1+4)
Group C
Attempt any TWO questions: [210=20]
9. Design an HTML form to collect information for an "Online Course Enrollment" process. The form should
have the following fields:
a. Student ID Number
b. Email Address
c. Upload Course Materials (Supported file formats: PDF, DOCX, XLSX, PPT, JPG)
Write the corresponding server-side script (e.g., PHP) to handle the form submission and perform the
following validation rules:
• Student ID Number, Email Address, and Course Materials upload are mandatory fields.
• Email Address should be in a valid email format.
• Uploaded file format must be one of the supported formats (PDF, DOCX, XLSX, PPT, JPG).
• File size must not exceed 5 MB.
Assume you have your own database and necessary database connectivity constraints. The server-side
script should upload the submitted file to the server and store the student's data (including the file path)
into the database.(10)
10. Explain the syntax for creating a child class that inherits from a parent class in PHP. Explain the difference
between method overloading and method overriding, and provide examples of each.(3+7)
11. Develop an age calculator application that determines a person's age based on their date of birth. The
application should have input fields for the date of birth (day, month, and year) and display the calculated
age in years, months, and days. Use HTML and JavaScript to create the user interface and implement the
age calculation logic.(10)
Nagarjuna College of Information Technology
SET - B Shankhamul – 09, Lalitpur
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Scripting Language Pass Marks: 24
Course Code No: CACS 254 Time: 3 hours
Year / Semester: Second / Fourth
Name: ………………………………………………. Symbol No.: …………….
Candidates are required to answer the questions in their own words as far as possible.
Group A
Attempt All the questions: [101=10]
1.Circle (O) the correct answer.
I. Which property is used to change the content of an HTML element in the DOM?
a) textContent b) innerHTML
c) contentText d) elementContent
II. Which event in JavaScript is commonly used to trigger form validation when a user submits a form?
a) onsubmit b) onclick
c) onvalidate d) oninput
III. Which attribute of the <script> tag is used to specify an external JavaScript file?
a) file b) src
c) link d) href
IV. Which HTTP method is typically used to send data to the server using the $_GET superglobal array?
a) POST b) GET
c) PUT d) DELETE
V. How do you close a file handle in PHP?
a) fclose() b) close()
c) file_close() d) endfile()
VI. What does the MySQL WHERE clause do?
a) Specifies the columns to be retrieved b) Specifies the table to be updated
c) Filters the rows that meet a specified condition d) Deletes all rows from a table
VII. Which OOP principle refers to the bundling of data with the methods that operate on that data?
a) Abstraction b) Polymorphism
c) Encapsulation d) Inheritance
VIII. How do you select an HTML element with the id "image" using jQuery?
a) $("image") b) $("#image")
c) $(".image") d) $("*image")
IX. Which of the following is NOT a common type of Joomla extension?
a) Modules b) Components
c) Widgets d) Plugins
X. Which section of the WordPress dashboard is used to manage pages?
a) Posts b) Media
c) Pages d) Appearance
Nagarjuna College of Information Technology
SET - B Shankhamul – 09, Lalitpur
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Scripting Language Pass Marks: 24
Course Code No: CACS 254 Time: 3 hours
Year / Semester: Second / Fourth
Candidates are required to answer the questions in their own words as far as possible.
Group B
Attempt any SIX questions: [65=30]
2. What is a callback function in JavaScript and how do you use it?.(5)
3. How do you use the fetch API in JavaScript to make HTTP requests?.(5)
4. What are some common window events in JavaScript and how are they used.(5)
5. What is the purpose of the date() function in PHP?.(5)
6. What are sessions in PHP, and why are they important?(1+4)
7. Explain the basic steps involved in sending an email using PHP.(5)
8. How can you handle AJAX requests on the server-side using PHP?(5)
Group C
Attempt any TWO questions: [210=20]
9. Design an HTML form for a "Job Application" process. The form should include fields for the applicant's
name, email address, phone number, resume upload (PDF or DOCX format), and a dropdown menu for
selecting the desired position. Write a server-side script (e.g., PHP) to handle form submission with the
following validation rules:
• All fields are mandatory.
• Email address should be in a valid format.
• The uploaded resume must be in either PDF or DOCX format and should not exceed 5 MB in size.(10)
Implement database connectivity to store applicant data and uploaded resumes.
10. Explain the concept of inheritance in object-oriented programming (OOP) with respect to PHP. Provide the
syntax for creating a child class that inherits from a parent class, and discuss the benefits of inheritance in
code reusability and maintenance.(3+7)
11. Design the following form in HTML and display the value in the result box after calculating basic arithmetic
operations based on user input with use of JavaScript.
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Scripting Language
Pass Marks: 30
Course No.: CACS 254
Semester: IV Time: 3 hrs.
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group 'A'
Attempt all the questions. [10×1=10]
Circle (Ο) the best answer
i. The script tag must be placed in,
a) head b) head and body c) title and head d) All of the above
ii. The unordered collection of properties, each of which has a value is called?
a) String b) Object c) Serialized d) All of the mentioned
iii. The basic purpose of the toLocalString() is to
a) return a localized object representation
b) return a local time in the string format
c) return a localized string representation of the object
d) return a parsed string
iv. Ajax stands for:
a) Abstract JSON and XML b) Asynchronous JavaScript and XML
c) Another Java Abstraction for X-Windows d) Another Java and XML Library
v. JQuery code to set the background color of all span elements to blue?
a) $(“span”).style(“background-color”,”blue”)
b) $(“span”).manipulate(“background-color”,”blue”)
c) $(“span”).css(“background-color”,”blue”)
d) $(“span”).color(“background-color”,”blue”)
vi. JQuery method is used to perform as asynchronous HTTP request?
a) JQuery.ajaxSetup() b) JQuery.ajaxAsync()
c) JQuery.ajax() d) JQuery.httpRequest()
vii. Which of the following characters are taken care of by htmlspecialchars?
a) < b) > c) single quote d) double quote e) & f) All of the above
viii. What is the output of the following code?
class test {
public $value = 0;
function test() {
$this->value = 1;
}
function __construct() {
$this->value = 2;
}
}
$object = new test();
echo $object->value;
a) 2 b) 1 c) 0 d) 3 e) No Output, PHP will generate an error message.
ix. How would you store email ([email protected]) in a ‘userEmail’ cookie in PHP?
a) setcookie (‘userEmail’,’[email protected]’)
b) storeCookie (‘userEmail’,’[email protected]’)
c) makeCookie (‘userEmail’,’[email protected]’)
d) window.cookie (‘userEmail’,’[email protected]’)
x. Which keyword is used to put a stop on inheritance?
a) stop b) end c) break d) final
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Scripting Language
Pass Marks: 30
Course No.: CACS 254
Group 'B' Time: 3 hrs.
1. Write the code to add and remove elements into using JavaScript DOM.
2. What is Ajax? Write a script to check username availability into signup form.
3. What is JavaScript Object? Describe different properties and methods associated with windows object.
4. What is cookie, Describe how can we relate session with cookie in PHP?
5. What is CMS? Describe major features of CMS.
6. Describe how for loop and foreach loop works with array in PHP.
7. What is framework, Describe How MVC framework work in PHP?
Group 'C'
Attempt any TWO questions. [210 = 20]
9. What are different data fetch mode in PHP through MySQL? Write a program to lists student information
and delete those data from database using PHP
10. What is Exception Handling? How exception is handled in PHP, Describe 4 major principles of object
oriented programming with PHP.
11. What is the need of client side scripting? Why need form validation into website, which validation is best
among client side and server side validation describe with examples.
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Software Engineering Pass Marks: 30
Course No.: CACS 253 Time: 3 hrs.
Semester: IV
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group – A
Attempt All Questions: [10×1=10]
1. Circle ( O ) the correct answer in the following questions
a. Where is the waterfall model of software development well suited?
i. When software is medium sized and requirements are not clear.
ii. When working software is required quickly.
iii. When requirement are well defined and project is small.
iv. When project is large in size and large development team.
b. Which granularity level of testing checks the behavior of module cooperation?
i. Unit Testing ii. Integration Testing
iii. Acceptance testing iv. Regression Testing
c. user requirements are expressed as ……….. in extreme programming
i. Implementation task ii. Functionalities
iii. Scenarios iv. None of above
d. In which phase of requirement elicitation process conflict are resolved?
i. Requirement Discovery.
ii. Requirement classification and organization.
iii. Requirement Requirements prioritization and negotiation.
iv. Requirement Specification.
e. Which of the following pattern is the basis of interaction management in many web-based systems?
i. Layered Pattern ii. MVC pattern
iii. Repository Pattern iv. Generic Pattern
f. Which of the following is not the principle of agile development?
i. Customer Involvement ii. Maintain Simplicity
iii. Incremental Development iv. Version Control
g. The relationship of data elements within a module is called………..
i. Modularity ii. Coupling
iii. Cohesion iv. Granularity
h. Which of the following is concerned with making the system more maintainable?
i. Software maintenance ii. Configuration management
iii. Software reengineering iv. Software refactoring
i. Which of the following is not configuration management activity?
i. Change management ii. Release management
iii. Version management iv. Risk management
j. White box testing is sometimes called.
i. Functional Testing ii. Loop testing
iii. Behavioral testing iv. Graph based testing
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Full Marks: 60
Bachelor in Computer Application Pass Marks: 30
Course Title: Software Engineering Time: 3 hrs.
Group – C
Attempt Any TWO Questions [2×10=20]
9. What is agile software development? Explain the principles of agile development.
10. What do you mean by requirement engineering? Explain requirement engineering process with block
diagram.
11. Define software verification and validation. Explain software inspection process.
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
5.
Candidates are required to answer the questions in their own words as far as possible.
Group – A
Attempt All Questions: [10×1=10]
2. Circle ( O ) the correct answer in the following questions
c. Where is the waterfall model of software development well suited?
v. When software is medium sized and requirements are not clear.
vi. When working software is required quickly.
vii. When requirement are well defined and project is small.
viii. When project is large in size and large development team.
d. Which granularity level of testing checks the behavior of module cooperation?
i. Unit Testing
ii. Integration Testing
iii. Acceptance testing
iv. Regression Testing
c. user requirements are expressed as ……….. in extreme programming
i. Implementation task ii. Functionalities
iii. Scenarios iv. None of above
j. In which phase of requirement elicitation process conflict are resolved?
v. Requirement Discovery.
vi. Requirement classification and organization.
vii. Requirement Requirements prioritization and negotiation.
viii. Requirement Specification.
k. Which of the following pattern is the basis of interaction management in many web-based systems?
ii. Layered Pattern ii. MVC pattern
iv. Repository Pattern iv. Generic Pattern
l. Which of the following is not the principle of agile development?
i. Customer Involvement ii. Maintain Simplicity
iii. Incremental Development iv. Version Control
m. The relationship of data elements within a module is called………..
i. Modularity ii. Coupling
iii. Cohesion iv. Granularity
n. Which of the following is concerned with making the system more maintainable?
i. Software maintenance ii. Configuration management
iii. Software reengineering iv. Software refactoring
o. Which of the following is not configuration management activity?
i. Change management ii. Release management
iii. Version management iv. Risk management
k. White box testing is sometimes called.
i. Functional Testing ii. Loop testing
iii. Behavioral testing iv. Graph based testing
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
6.
Candidates are required to answer the questions in their own words as far as possible.
Group - A
Attempt All Questions: [10×1=10]
1. Circle ( O ) the correct answer in the following questions
a. Where is the prototyping model of software development well suited?
i. When requirements are well defined.
ii. For projects with large development team.
iii. When customer can not define requirement clearly.
iv. None of the above.
b. Which granularity level of testing checks the behavior of module cooperation?
i. Unit Testing ii. Integration Testing
iii. Acceptance testing iv. Regression Testing
c. Scrum sprints
i. Is schedule
ii. Is Duration
iii. Should be tested so that it releases potentially shippable increments
iv. Both ii and iii
d. In which phase of requirement elicitation process conflict are resolved?
i. Requirement Discovery.
ii. Requirement classification and organization.
iii. Requirement Requirements prioritization and negotiation.
iv. Requirement Specification.
e. Which of the following pattern is the basis of interaction management in many web-based systems?
i. Layered Pattern ii. MVC pattern
iii. Repository Pattern iv. Generic Pattern
f. Which of the following is not the principle of agile development?
i. Customer Involvement ii. Maintain Simplicity
iii. Incremental Development iv. Version Control
g. The relationship of data elements within a module is called………..
i. Modularity ii. Coupling
iii. Cohesion iv. Granularity
h. Which of the following is concerned with making the system more maintainable?
i. Software maintenance ii. Configuration management
iii. Software reengineering iv. Software refactoring
i. Which of the following is not configuration management activity?
i. Change management ii. Release management
iii. Version management iv. Risk management
j. Black box testing is sometimes called.
i. Functional Testing ii. Loop testing
iii. Behavioral testing iv. Graph based testing
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group – B
3. Differentiate between functional requirement and non functional requirement with example.
5. What do you mean by architectural design? Explain client server model of architectural design.
Group – C
10. What do you mean by requirement engineering? Explain requirement engineering process with block
diagram.
11. Define software verification and validation. Explain software inspection process.
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group - A
Short Answer Questions (Any SIX) [6×5=30]
5. Define software design. Explain the concept of coupling and cohesion in software design.
6. What do you mean software testing? Differentiate between software verification and validation.
7. What is risk management? List the categories of risk in software project. Explain the importance of activity
network in project scheduling.
8. What is software reengineering? Explain software maintenance and its type.
Group – B
9. What is software engineering? Explain spiral model of software development with its advantages,
disadvantages and applicability.
10. What do you mean by software requirement? Differentiate between functional requirement and non
functional requirement. List the functional requirements for Bank ATM system.
11. Software configuration management. Explain software configuration management activities with block
diagram.
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
7.
Candidates are required to answer the questions in their own words as far as possible.
Group A
Attempt all the questions. [10 × 1 = 10]
1. Circle (O) the correct answer.
i. The ability to change the conceptual schema without affecting the external schemas or application programs
is known as ___________________.
a) Program-data independence c) Logical data independence
b) Physical data independence d) Data abstraction
ii. The maximum number of relationship instances in which an entity can participate is known as …………….
a) Participation Constraint c) Domain Constraint
b) Cardinality Constraint d) Referential Integrity Constraint
iii. Which one is the binary operation symbol in the relational algebra?
a) σ c) ⋈
b) Π d) ρ
iv. Which normalization is based on the multivalued dependency?
a) 1NF c) 3NF
b) 2NF d) 4NF
v. Drop Table cannot be used to drop a table referenced by a _________ constraint.
a) Local Key c) Primary Key
b) Composite Key d) Foreign Key
vi. Which of the following SQL functions is to return the total value from a column?
a) AVG() c) COUNT()
b) SUM() d) Both b & c
vii. Which of the following specifies when the trigger will be executed?
a) Before c) After
b) Instead Of d) All of the above
viii. The representation of the query in the form of data structure is classified as ……..
a) Query graph c) Query tree
b) Scanner tree d) Parser tree
ix. Which of the following is the property of transaction that protects data from system failure?
a) Atomicity c) Consistency
b) Isolation d) Durability
x. The _____________ scheme forces the younger transaction to kill itself and release the resource if the older
one requests a resource that is being held by the younger one.
a) Wound-wait c) Wait-die
b) Round wait d) Will wait
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
8.
Candidates are required to answer the questions in their own words as far as possible.
Group A
Attempt all the questions. [10 × 1 = 10]
1. Circle (O) the correct answer.
i. Which of the following is not a function of the database?
a) Managing stored data b) Security of stored data
c) Manipulating data d) Analyzing code
ii. What are rows of a relation known as?
a) Degree b) Tuple
c) Entity d) None
iii. If multiple columns are used as Primary Key, it is known as ______________.
a) Unique Key b) Foreign Key
c) Composite Key d) None
iv. Which one is the example of Trivial Functional Dependency?
a) id, name → name b) id → address
c) id → name d) id → name, address
v. Which SQL constraint do we use to set some value to a field whose value has not been added explicitly?
a) UNIQUE b) DEFAULT
c) NOT NULL d) CHECK
vi. What is the meaning of “GROUP BY” clause?
a) Group data by row values b) Group data by column value
c) Group data by column and row values d) None
vii. The program which performs some common action on database data and is also stored there is called?
a) Trigger b) Stored Function
c) Stored Procedure d) None of the above
viii. What does the term “Query Optimization” refer to?
a) Storing queries in a centralized repository
b) Automatically rewriting queries to improve efficiency
c) Ensuring data consistency across tables
d) Reducing the number of database tables
ix. Which transaction isolation level ensures that a transaction sees committed changes made by other
transactions?
a) Read Uncommitted b) Repeatable Read
c) Serializable d) Read Committed
x. What is the primary purpose of using indexing in a database?
a) To store data b) To improve data security
c) To enforce data integrity d) To speed up data retrieval
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
Group C
9. Explain aggregation with example. Consider a database for a car rental agency. Customers rent various cars for
specific rental periods. Each car can be rented by multiple customers. Create an ER diagram for this information
with your own assumptions. [5+5]
10. Define normalization. Describe the importance of normalization in DBMS. Explain 2NF and 3NF with example.
[2+2+6]
11. Consider the following tables: [10]
Customer(CustomerID, Name, Email)
Car(CarID, Make, Model, RentalPerDay)
Rental(RentalID, CustomerID, CarID, RentalStartDate, RentalEndDate)
a. Find the number of cars rented by each customer.
b. Find the names and email addresses of customers who have rented a car.
c. Find the details of customers who have rented a car between 2023-05-01 and 2023-09-01.
d. Find the car information rented by a Customer “Hari Thapa”.
e. Find the cheapest rental car and expensive rental car.
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
2. What do you mean by database? Discuss the merits and demerits of DBMS.
4. State the properties of a transaction. Explain the state of transaction with a diagram.
Group C
9. Describe 3-schema architecture of database. Consider a database of a movie streaming service. Users can
watch multiple movies, and each movie can be watched by multiple users. Create an ER diagram to
represent this information with your own assumptions. [5+5]
10. Why do we need normalization? Explain 1NF, 2NF and 3NF with examples. [1+9]
Group A
Group B
Group C
9. Given the schema as below, write relational algebra and SQL queries for the following:
Employee(employee_name, street, city, salary)
Works(employee_name, company_name)
Company(company_name, city)
Manages(employee_name, manager_name)
a. Find the name of all employees who work for “Nagarjuna Corporation”.
b. Find the names, street and cities of all employees whose salary is more than Rs. 50,000.
c. Find the names of all employees who work under the manager “Ravi Dangol”.
d. Find the name, salary and city of all employees who works in companies located in Kathmandu.
e. Find the name of the employee to whom company is not assigned yet.
10. a) Design an ER diagram for a car-insurance company whose customers own one or more cars each. Each car has
associated with it zero to any number of recorded accidents. Assume attributes of your own choice.
[5]
b) Convert the above ER diagram into equivalent relational tables. [5]
11. a) What do you mean by stored procedure. How can you create it? Illustrate with example.
[1 + 4]
b) Explain Order By, Having By, and Group By clause in SQL with examples. [5]