0% found this document useful (0 votes)
17 views33 pages

Prev Questions

Uploaded by

cijato1932
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views33 pages

Prev Questions

Uploaded by

cijato1932
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 33

Nagarjuna College of Information Technology

Shankhamul -09, Lalitpur


SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Operating System Pass Marks: 24
Code No: CACS 251 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
1.

Candidates are required to answer the questions in their own words as far as possible.
Group A
1. Circle (0) the correct answer.
10×1=10
i) Which of the following does not contain PCB?
a) code b) data c) stack d) bootstrap program
ii) The Test and Set instruction in executed:
a) Atomically b) periodically c) after a particular process d) none of these
iii) How circular wait condition can be prevented?
a) By using pipes b) by using threads
c) by resource grant on all or none basis d) by defining linear ordering of resource type.
iv) Which process can be affected by other processes executing in the system?
a) Parent process b) Init process c) cooperating process d) Child Process.
v) External fragmentation will not occur when?
a) first fit b) worst fit
c) best fit d) No matter which algorithm is used, it will always occur
vi) why is one-time password safe?
a) it is easy to generated b) it is different for every access
c) it cannot be shared d) it is complex encrypted password.
vii) How process on the remote system are identified.
a) host id b) host name and identifier
c)identifier d) process id
viii) In distributed system each process has its own:
a) Local memory b) clock
c) both local memory and clock d) none of these
ix) The main memory accommodates
a) CPU b) user processes
c) OS d) all of the mentioned
x) In Unix, which system call creates the new process?
a) fork b) new c) create d) none of the mentioned
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Operating System Pass Marks: 24
Code No: CACS 251 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
2.

Candidates are required to answer the questions in their own words as far as possible.
Group A
1. Circle (0) the correct answer. 10×1=10
i) What does OS X have?
a) Micro kernel b) monolithic kernel
c) hybrid kernel d) monolithic kernel with modules
ii) Which of the following is not the valid state of the thread?
a) new b) running
c) parsing d) blocked
iii) How circular wait condition can be prevented?
a) By using pipes b) by using threads
c) by resource grant on all or none basis d) by defining linear ordering of resource
type.
iv) Which process can be affected by other processes executing in the system?
a) Parent process b) Init process
c) cooperating process d) Child Process.
v) The signal operations of the semaphore basically works on the basic system calls
a) wake-up() b) continue
c) start d) getup()
vi) Why is one-time password safe?
a) it is easy to generated b) it is different for every access
c) it cannot be shared d) it is complex encrypted password.
vii) How process on the remote system are identified.
a) host id b) host name and identifier
c)identifier d) process id
viii) In distributed system each process has its own:
a) Local memory b) clock
c) both local memory and clock d) none of these
ix) The main memory accommodates
a) CPU b) user processes
c) OS d) all of the mentioned
x) Which of the following is not a major reason for building distributed systems?
a) Resource sharing b) Computation speedup c) Reliability d) simplicity
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Operating System Pass Marks: 24
Code No: CACS 251 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
Short Answer Questions (Any SIX): 6×5=30
1. What is an operating system? Explain the functions of operating system.
2. Define the term semaphore. How does semaphore help in dining philosopher problem?
3. What is system call? Discuss process of handling system calls briefly.
4. A system has two process and three resource. Each process needs a maximum of two
resources. Is deadlock possible? Explain with example.
5. Differentiate between internal and external fragmentation? Suppose that we have memory of
100 MB with 5 partitions of size 150KB, 200KB, 250KB, 100KB and 300KB. Where the
processes A and B of size 175KB and 125KB will be loaded, if we used best-fit and worst-fit
strategy?
6. Given references to the following pages by a program,
0,9,0,1,8,1,8,7,8,7,1,3,8,2,7,8,3,4,8,3 how many page fault will occur if the program has three
page frames for each of the following algorithms a) FIFO b) LRU
7. What is file? Explain how access control matrix provides resource protection that may access
process.
8. What do you mean by one-time password in authentication? How worms are differing from
virus.
Group C
Long Answer Questions (Any TWO):
2×10=20
9. What kind of problem arises with sleep and wake-up mechanism of achieving mutual
exclusion? Explain with suitable code snippet.
10. Write CPU scheduling criteria. For the processes listed in following table, draw Gannt chart
illustrating their execution and calculate average waiting time and turnaround time using
a) first come first serve
b) long remaining time next
c) Round Robin (quantum = 1 sec)
d) priority
Proc AT BT Priority
esses
P0 0.0 8 3
p1 2.01 7 1
p2 3.01 2 4
p3 3.02 2 2
11. Define term seek time and rotational delay in desk scheduling. Suppose that a disk has 100
cylinders, numbered 0 to 99. the drive is currently serving a request at cylinders 44 and
previous request was at cylinder 26. the queue of pending request, in FIFO order is: 86, 70,
13, 74, 48, 9, 22, 50, 30 Starting from the current head position, what is total distance that the
disk arm moves to satisfy all pending request for each of following disk scheduling
algorithms? a) FCFS b) SSTF c) SCAN d)LOOK

Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Operating System Pass Marks: 24
Code No: CACS 251 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
Short Answer Questions (Any SIX): 6×5=10
1. What is an operating system? Explain the functions of operating system.
2. Define the term semaphore. How does semaphore help in dining philosopher problem?
3. What is the importance of paging and segmentation in memory management?
4. A system has two process and three resource. Each process needs a maximum of two
resources. Is deadlock possible? Explain with example.
5. Differentiate between internal and external fragmentation? Suppose that we have memory of
100 MB with 5 partitions of size 150KB, 200KB, 250KB, 100KB and 300KB. Where the
processes A and B of size 175KB and 125KB will be loaded, if we used best-fit and worst-fit
strategy?
6. Given references to the following pages by a program,
7, 0, 1, 2, 0, 3, 0, 4, 2, 3, 0, 3, 2, 1, 2, 0, 1, 7, 0, 1 .how many page fault will occur if the
program has three page frames for each of the following algorithms a) FIFO b) LRU
7. What is file? Explain how access control matrix provides resource protection that may access
process.
8. Discuss various system threats to operating system. What is access control and
authentication?
Group C
Long Answer Questions (Any TWO): 2×10=20
9. Explain the need of CPU management. Which are the different scheduling schemes?
10. Write CPU scheduling criteria. For the processes listed in following table, draw Gannt chart
illustrating their execution and calculate average waiting time and turnaround time using
a) first come first serve
b) long remaining time next
c) Round Robin (quantum = 1 sec)
d) priority
Proc AT BT Priority
esses
P0 0 4 2
p1 1 3 3
p2 2 1 4
p3 3 5 5
p4 4 2 5
11. Define term seek time and rotational delay in desk scheduling. Suppose that a disk has 100
cylinders, numbered 0 to 99. the drive is currently serving a request at cylinders 44 and
previous request was at cylinder 26. the queue of pending request, in FIFO order is: 86, 70,
13, 74, 48, 9, 22, 50, 30 Starting from the current head position, what is total distance that the
disk arm moves to satisfy all pending request for each of following disk scheduling
algorithms? a) FCFS b) SSTF c) CSCAN d)CLOOK

Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Operating System Pass Marks: 30
Course No.: CACS 251 Time: 3 hrs.
Semester: IV
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group 'A'
Attempt all the questions. [10×1=10]
Circle (Ο) the best answer
1. A critical section is a program segment________
a. where shared resources are accessed
b. which should run in a certain specified amount of time
c. which avoids deadlocks
d. which must be enclosed by a pair of semaphore operations, P and V
2. CPU scheduling is the basis of ___________
a. multiprogramming operating systems b. larger memory-sized systems
c. multiprocessor systems d. none of the mentioned

3. The percentage of times a page number is found in the TLB is known as ____________
a. miss ratio b. hit ratio c. miss percent d. none of the mentioned

4. If the semaphore value is negative ____________


a) its magnitude is the number of processes waiting on that semaphore
b no operation can be further performed on it until the signal operation is performed on it
c) none of the mentioned d) it is invalid

5. The content of the matrix Need is :


a) Allocation – Available b) Max – Available c) Max – Allocation d)
Allocation – Max
6. Deadlock prevention is a set of methods ____________
a. to ensure that at least one of the necessary conditions cannot hold
b. to ensure that all of the necessary conditions do not hold
c. to decide if the requested resources for a process have to be given or not
d. to recover from a deadlock
7. Consider a disk queue with requests for I/O to blocks on cylinders:
98 183 37 122 14 124 65 67 Considering SSTF (shortest seek time first) scheduling, the total
number of head movements is, if the disk head is initially at 53 :

a. 224 b. 236 c. 245 d. 240


8. In the ______ algorithm, the disk arm starts at one end of the disk and moves toward the other end,
servicing requests till the other end of the disk. At the other end, the direction is reversed and
servicing continues.
a. LOOK b. SCAN c. C-SCAN d. C-LOOK
9. Which of the following are the two parts of the file name?
a. name & identifier b. identifier & type c. extension & name d. type & extension
10. Suppose that a process is in “Blocked” state waiting for some I/O service. When the service is
completed, it goes to the __________
a. Running state b. Ready state
c. Suspended state d. Terminated state
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application FM: 60
Course Title: Operating System PM: 30
Course No.: CACS 251 Time: 3 hrs.
Semester: IV
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group B
Attempt any six questions: 6×5=30
1. What is a critical region? How do they relate to controlling access to shared resources?
2. Differentiate between trap and interrupts.
3. Why thread is necessary? In which circumstances user-level thread is better than Kernel level
thread?
4. What is Internal and External fragmentation? In which memory management technique internal
fragmentation occurs, Explain the solution for it.
5. Discuss details about paging hardware using TLB
6. How starvation differs from deadlock? Consider the following situation of processes and resources:

a) What will happen if process P3 requests 1 resource?


b) What will happen if process P4 requests 1 resource?
7. What is Memory Mapped i/o? Explain the merits and demerits
Group C
Attempt any two questions: 10×2=20
8. What is semaphore? How can we achieve the synchronization using semaphore for producer
consumer problem?
9. For the processes listed in the following table, draw a Gantt chart illustrating their execution
and calculate the average waiting time using:
a.) First-Come-First-Serve
b.) Short-Job-First
c.) Shortest-Remaining-Time-Next
d.) Round-Robin (quantum = 2)
e.) Round-Robin (quantum = 1)
Processes Arrival time Burst Time
A 0.00 4
B 2.01 7
C 3.01 2
D 3.02 2
10. Suppose the head of a moving- head disk with 200 tracks, numbered 0 to 199 is currently
serving a request at track 143 and has finished a request at track 125. The queue it requests is
kept in the FIFO order 86, 147, 91, 177, 94, 150, 102, 175, and 130. What is the total head
movement needed to satisfy these requests for the following disk-scheduling algorithms?
i. FCFS ii. SSTF iii. SCAN iv. LOOK
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Numerical Methods Pass Marks: 24
Code No: CACS 252 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
3.

Candidates are required to answer the questions in their own words as far as possible.
Group A
Attempt all the questions. (10 × 1 = 10)
1. Which one of the following is numerical error?
a) Missing Information b) Data Error
c) Roundup Error d) Conversion Error
2. Which one of the following method is used to solve the system of linear equations?
a) Bisection Method b) Taylor Series Method
c) False Position Method d) Matrix Inverse Method
3. How many significant digits in the number 105.78904560?
a) 1 b) 8
c) 3 d) 10
4. What will be the solution of equations x + y=3 and 2x + 2y=6?
a) Unique Solution b) No Solution
c) Infinite Solution d) Ill-Condition
5. Which of the following is four point formula to estimate integration?
a) Trapezoidal Rule b) Simpson’s 1/3 Rule
c) Boole’s Rule d) Simpson’s 3/8 Rule
6. A differential equation is considered to be ordinary if it has
a) one dependent variable b) more than one dependent variable
c) one independent variable d) more than one independent variable
7. The technique for computing the value of the function inside the given argument is called
a) interpolation b) extrapolation
c) partial fraction d) inverse interpolation
8. In case of Newton-Raphson method the error at any stage is proportional to____.
a) The error in the previous stage. b) The square of the error in the previous
stage.
c) The cube of the error in the previous stage d) Square root of the error in the previous
stage.
9. In which of the following methods proper choice of initial value is very important?
a) Bisection method b) False Method
c) Newton Raphson d) Secant Method
10. The ratio of truncation error to that round off error is
a) 2:1 b) 1:2
c) 1:1 d) 1:3

Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Numerical Methods Pass Marks: 24
Code No: CACS 252 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
4.

Candidates are required to answer the questions in their own words as far as possible.
Group “A”
Objective Type Questions: [10 × 1 = 10]
1. Solving an engineering problem requires four steps. In order of sequence, the four steps
are
a formulate, solve, interpret, implement b solve, formulate, interpret, implement
c formulate, solve, implement, interpret d formulate, implement, solve, interpret
2. True error is defined as
a Present Approximation – Previous Approximation
b True Value – Approximate Value
c abs (True Value – Approximate Value)
d abs (Present Approximation – Previous Approximation)
3. The next iterative value of the root of using Newton-Raphson method, if the initial guess
is 3, is
a 1.500 b 2.066 c 2.167 d 3.000
4. The following system of equations has ____________ solution(s).
x+y=2
6x+6y =12
a Infinite b No c Two d Unique
5. The goal of forward elimination steps in the Gauss elimination method is to reduce the
coefficient matrix to a (an) _____________ matrix.
a Diagonal b Identity c lower triangular d upper triangular
6. The LU decomposition method is computationally more efficient than Naïve Gauss
elimination method for solving
a single set of simultaneous linear equations
b multiple sets of simultaneous linear equations with different coefficient matrices and the
same right hand side vectors.
c multiple sets of simultaneous linear equations with the same coefficient matrix but
different right hand sides.
d less than ten simultaneous linear equations.
7. How much significant digits in this number 204.020050?
a5 b7 c9 d 11
8. Newton-Raphson method is useable to?
a Algebraic equations only
b Transcendental equations only
c Both algebraic and Transcendental Equations
d Both algebraic and transcendental and also used when the roots are complex
9. Which of the following statements applies to the bisection method used for finding roots
of functions?
a Converges within a few iterations
b Guaranteed to work for all continuous functions
c Is faster than the Newton-Raphson method
d Requires that there be no error in determining the sign of the function
10. In which of the following methods proper choice of initial value is very important?
a Bisection method b False Method
c Newton Raphson d Secant Method
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Numerical Methods Pass Marks: 24
Code No: CACS 252 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B
Attempt any SIX questions. (6 × 5=30)
1. Using False Position method, solve the equation xtan(x) = -1 starting with initial guess 2.5 and
3 correct up to 3- decimal places.
6 1
2. Evaluate the Integral∫0 1+𝑥 2 𝑑𝑥, taking six intervals by using (i) Trapezoidal (ii) Simpson’s
1/3 rule.
3. Solve the following set of equations by Gauss-Jordan method.
2x1 + x2 – 3x3 = 11
4x1 – 2x2 + 3x3 = 8
–2x1 + 2x2 – x3 = –6
4. Fit the following curve to the given data set.
𝑦 = 𝑎𝑒 𝑏𝑥
x 1 3 5 7 9

y 115 105 95 85 80

5. A slider in a machine moves along a fixed straight rod. Its distance x(m) along the rod are
given in the following table for various values of the time t (seconds)
t(sec) 1 2 3 4 5 6

x(m) 0.0201 0.0844 0.3444 1.0100 2.3660 4.7719

Find the velocity at time t=6sec


6. Define error and explain its types with example.
7. Find the eigenvalues and eigenvectors of the matrix using power method.

Group C
Attempt any TWO questions. (2 × 10=20)

8. Write an algorithm and program of Newton Raphson method.


9. Given the data points:
x 1 2 3 4 5

y 13 15 12 9 13

Find the natural cubic spline interpolation at x = 3.4.


10. Appropriate the solution of y’=2x + y. y(0)=1 using Euler’s method with step size 0.1.
Approximate the value of y(0.4).

Solve the equation over the square with sides 0 ≤x≤ 3 and 0≤y≤3 with
u = 0 on the boundary and mesh length =1
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Numerical Methods Pass Marks: 24
Code No: CACS 252 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group “B”
Explanation Questions (Any SIX): [6×5 = 30]
11. Find the root of following equations using Newton method up to 4 decimal places.
𝒆𝒙 − 𝟑𝒙𝟐 = 𝟎
12. From the following table estimate the number of students who obtained marks in computer
programming between 75 and 80.
Marks 35-45 45-55 55-65 65-75 75-85

No. of students 20 40 60 60 20

13. A slider in a machine moves along a fixed straight rod. Its distance x(m) along the rod are given
in the following table for various values of the time t (seconds)
t(sec) 1 2 3 4 5 6

x(m) 0.0201 0.0844 0.3444 1.0100 2.3660 4.7719

Find the velocity at time t=6sec


14. Solve the following set of equations by Gauss-Jordan method.
2x1 + x2 – 3x3 = 11
4x1 – 2x2 + 3x3 = 8
–2x1 + 2x2 – x3 = –6
15. Appropriate the solution of y’=2x + y. y(0)=1 using Euler’s method with step size 0.1.
Approximate the value of y(0.4).
16. Solve the equation 2 = –10(x2 + y2 + 10) over the square with sides x = 0 = y, x = 3= y with u =
0 on the boundary and mesh length = 1.
1.2
17. Evaluate the Integral∫0 𝑒 𝑥 𝑑𝑥, taking six intervals by using (i) Trapezoidal (ii) Simpson’s 1/3
rule.
Group “C”
Long Questions (Any TWO): [2 × 10 = 20]

18. Given the data points:


x 1 2 3 4 5

y 13 15 12 9 13

Find the natural cubic spline interpolation at x = 3.4.


19. Solve the following equations by Jacobi’s method.
15x + 3y – 2z = 85
2x + 10y + z = 51
x – 2y + 8z = 5

20. Fit the following curve to the given data set.


𝑦 = 𝑎𝑒 𝑏𝑥
x 1 3 5 7 9

y 115 105 95 85 80

Write the algorithm of Bisection method.


Nagarjuna College of Information Technology
Shankhamul-09, Lalitpur
Pre-Board Examination 2080
Bachelor in Computer Application
Course Title: Numerical Method Full Marks: 60
Course No.: CACS 252 Pass Marks: 30
Semester: IV
Time: 3 hrs.
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group 'A'
Circle (Ο) the best answer [10×1=10]
1. Solving an engineering problem requires four steps. In order of sequence, the four steps are
a formulate, solve, interpret, implement
b solve, formulate, interpret, implement d formulate, implement, solve, interpret
c formulate, solve, implement, interpret
2. True error is defined as
a Present Approximation – Previous Approximation
b True Value – Approximate Value
c abs (True Value – Approximate Value)
d abs (Present Approximation – Previous Approximation)
3. The next iterative value of the root of using Newton-Raphson method, if the initial guess is 3, is
a 1.500 c 2.167
b 2.066 d 3.000
4. The following system of equations has ____________ solution(s).
a. x + y = 2 c Two
b. 6x+6y =12 d Unique
a Infinite
b No
5. The goal of forward elimination steps in the Gauss elimination method is to reduce the coefficient matrix to
a (an) _____________ matrix.
a
Diagonal c lower triangular
b Identity d upper triangular
6. The LU decomposition method is computationally more efficient than Naïve Gauss elimination method for solving
a. a single set of simultaneous linear equations
b. multiple sets of simultaneous linear equations with different coefficient matrices and the same
right hand side vectors.
c. multiple sets of simultaneous linear equations with the same coefficient matrix but different
right hand sides.
d. less than ten simultaneous linear equations.
9. How much significant digits in this number 204.020050?
a5 b. 7 C.9 D.11 C.11
10. Newton-Raphson method is useable to?
a Algebraic equations only
b Transcendental equations only
c Both algebraic and Transcendental Equations
d Both algebraic and transcendental and also used when the roots are complex
9. Which of the following statements applies to the bisection method used for finding roots of functions?
a Converges within a few iterations
b Guaranteed to work for all continuous functions
c Is faster than the Newton-Raphson method
d Requires that there be no error in determining the sign of the function
10. In which of the following methods proper choice of initial value is very important?
a Bisection method
b False Method d Secant Method
c Newton Raphson
Nagarjuna College of Information Technology
Shankhamul-09,Lalitpur
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Numerical Method Pass Marks: 30
Course No.: CACS 252 Time: 3 hrs.
Semester: IV
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group “B”
2. Explanation Questions (Any six): [5 X 6 = 30]
21. Find the root of following equations using Newton method up to 4 decimal places.
𝒆𝒙 − 𝟑𝒙𝟐 = 𝟎
22. From the following table estimate the number of students who obtained marks in computer programming
between 75 and 80.

Marks 35-45 45-55 55-65 65-75 75-85

No. of students 20 40 60 60 20

23. A slider in a machine moves along a fixed straight rod. Its distance x(m) along the rod are given in the following
table for various values of the time t (seconds)
t(sec) 1 2 3 4 5 6

x(m) 0.0201 0.0844 0.3444 1.0100 2.3660 4.7719

Find the velocity at time t=6sec


24. Solve the following set of equations by Gauss-Jordan method.
2x1 + x2 – 3x3 = 11
4x1 – 2x2 + 3x3 = 8
–2x1 + 2x2 – x3 = –6
25. Appropriate the solution of y’=2x + y. y(0)=1 using Euler’s method with step size 0.1. Approximate the value
of y(0.4).
26. Solve the equation 2 = –10(x2 + y2 + 10) over the square with sides x = 0 = y, x = 3= y with u = 0 on the
boundary and mesh length = 1.
1.2
27. Evaluate the Integral∫0 𝑒 𝑥 𝑑𝑥 , taking six intervals by using (i) Trapezoidal (ii) Simpson’s 1/3 rule.

Group “C”
2. Long Questions (Any two): [2 X 10 = 20]
28. Given the data points:
x 1 2 3 4 5

y 13 15 12 9 13

Find the natural cubic spline interpolation at x = 3.4.


29. Solve the following equations by Jacobi’s method.
15x + 3y – 2z = 85
2x + 10y + z = 51
x – 2y + 8z = 5
30. Fit the following curve to the given data set.
31. 𝑦 = 𝑎𝑒 𝑏𝑥
x 1 3 5 7 9

y 115 105 95 85 80

Write the algorithm of Bisection method.


Nagarjuna College of Information Technology
SET - A Shankhamul – 09, Lalitpur
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Scripting Language Pass Marks: 24
Course Code No: CACS 254 Time: 3 hours
Year / Semester: Second / Fourth
Name: ………………………………………………. Symbol No.: …………….
Candidates are required to answer the questions in their own words as far as possible.

Group A

Attempt All the questions: [101=10]

1.Circle (O) the correct answer.

I. Which method is used to access an HTML element in the DOM by its ID?
a) getElementByName() b) getElementById()
c) getElementByTag() d) getElementByClass()
II. Which method is commonly used to prevent form submission if client-side validation fails?
a) preventDefault() b) stopPropagation()
c) validateForm() d) submitForm()
III. How do you embed JavaScript code within an HTML document?
a) Using the <script> tag b) Using the <javascript> tag
c) Using the <js> tag d) Using the <code> tag
IV. Which superglobal array in PHP is used to retrieve data sent to the server using HTTP POST
method?
a) $_GET b) $_POST
c) $_REQUEST d) $_SERVER
V. Which function is used to open a file in PHP for reading?
a) fopen() b) open()
c) readfile() d) file_open()
VI. Which MySQL statement is used to delete rows from a table?
a) REMOVE FROM b) DELETE FROM
c) ERASE FROM d) DROP FROM
VII. What is the purpose of a destructor in object-oriented programming?
a) To create an object b) To initialize class variables
c) To free resources used by an object before it is destroyed d) To call superclass methods
VIII. How do you select an HTML element with the id "image" using jQuery?
a) $("image") b) $("#image")
c) $(".image") d) $("*image")
IX. What is the main purpose of a Joomla component?
a) To add design elements to a website b) To extend Joomla's core functionality
c) To optimize website performance d) To provide security features
X. What is the purpose of a WordPress theme?
a) To manage user roles and permissions
b) To provide a visual layout and design for a WordPress website
c) To create custom post types
d) To optimize website performance

Nagarjuna College of Information Technology
SET - A Shankhamul – 09, Lalitpur
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Scripting Language Pass Marks: 24
Course Code No: CACS 254 Time: 3 hours
Year / Semester: Second / Fourth
Candidates are required to answer the questions in their own words as far as possible.

Group B
Attempt any SIX questions: [65=30]
2. Explain the concept, structure and importance of Document Object Model (DOM).(5)
3. Write a JavaScript program that takes an array of numbers as input and returns the sum of all elements
using the forEach loop.(5)
4. How do you create a cookie and read a cookie in JavaScript?(5)
5. What are the $_GET, $_POST, and $_REQUEST superglobal variables in PHP?.(5)
6. What is the use of JQuery? Write the sample program to show and hide the certain with use of JQuery.(1+4)
7. Why Ajax is required in web development? WAP to synchronize data between JavaScript and PHP.(1+4)
8. Why is CMS? Write the steps to create a sub-menu in WordPress or Joomla.(1+4)
Group C
Attempt any TWO questions: [210=20]
9. Design an HTML form to collect information for an "Online Course Enrollment" process. The form should
have the following fields:
a. Student ID Number
b. Email Address
c. Upload Course Materials (Supported file formats: PDF, DOCX, XLSX, PPT, JPG)
Write the corresponding server-side script (e.g., PHP) to handle the form submission and perform the
following validation rules:
• Student ID Number, Email Address, and Course Materials upload are mandatory fields.
• Email Address should be in a valid email format.
• Uploaded file format must be one of the supported formats (PDF, DOCX, XLSX, PPT, JPG).
• File size must not exceed 5 MB.
Assume you have your own database and necessary database connectivity constraints. The server-side
script should upload the submitted file to the server and store the student's data (including the file path)
into the database.(10)
10. Explain the syntax for creating a child class that inherits from a parent class in PHP. Explain the difference
between method overloading and method overriding, and provide examples of each.(3+7)
11. Develop an age calculator application that determines a person's age based on their date of birth. The
application should have input fields for the date of birth (day, month, and year) and display the calculated
age in years, months, and days. Use HTML and JavaScript to create the user interface and implement the
age calculation logic.(10)

Nagarjuna College of Information Technology
SET - B Shankhamul – 09, Lalitpur
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Scripting Language Pass Marks: 24
Course Code No: CACS 254 Time: 3 hours
Year / Semester: Second / Fourth
Name: ………………………………………………. Symbol No.: …………….
Candidates are required to answer the questions in their own words as far as possible.

Group A
Attempt All the questions: [101=10]
1.Circle (O) the correct answer.
I. Which property is used to change the content of an HTML element in the DOM?
a) textContent b) innerHTML
c) contentText d) elementContent
II. Which event in JavaScript is commonly used to trigger form validation when a user submits a form?
a) onsubmit b) onclick
c) onvalidate d) oninput
III. Which attribute of the <script> tag is used to specify an external JavaScript file?
a) file b) src
c) link d) href
IV. Which HTTP method is typically used to send data to the server using the $_GET superglobal array?
a) POST b) GET
c) PUT d) DELETE
V. How do you close a file handle in PHP?
a) fclose() b) close()
c) file_close() d) endfile()
VI. What does the MySQL WHERE clause do?
a) Specifies the columns to be retrieved b) Specifies the table to be updated
c) Filters the rows that meet a specified condition d) Deletes all rows from a table
VII. Which OOP principle refers to the bundling of data with the methods that operate on that data?
a) Abstraction b) Polymorphism
c) Encapsulation d) Inheritance
VIII. How do you select an HTML element with the id "image" using jQuery?
a) $("image") b) $("#image")
c) $(".image") d) $("*image")
IX. Which of the following is NOT a common type of Joomla extension?
a) Modules b) Components
c) Widgets d) Plugins
X. Which section of the WordPress dashboard is used to manage pages?
a) Posts b) Media
c) Pages d) Appearance


Nagarjuna College of Information Technology
SET - B Shankhamul – 09, Lalitpur
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Scripting Language Pass Marks: 24
Course Code No: CACS 254 Time: 3 hours
Year / Semester: Second / Fourth
Candidates are required to answer the questions in their own words as far as possible.

Group B
Attempt any SIX questions: [65=30]
2. What is a callback function in JavaScript and how do you use it?.(5)
3. How do you use the fetch API in JavaScript to make HTTP requests?.(5)
4. What are some common window events in JavaScript and how are they used.(5)
5. What is the purpose of the date() function in PHP?.(5)
6. What are sessions in PHP, and why are they important?(1+4)
7. Explain the basic steps involved in sending an email using PHP.(5)
8. How can you handle AJAX requests on the server-side using PHP?(5)
Group C
Attempt any TWO questions: [210=20]
9. Design an HTML form for a "Job Application" process. The form should include fields for the applicant's
name, email address, phone number, resume upload (PDF or DOCX format), and a dropdown menu for
selecting the desired position. Write a server-side script (e.g., PHP) to handle form submission with the
following validation rules:
• All fields are mandatory.
• Email address should be in a valid format.
• The uploaded resume must be in either PDF or DOCX format and should not exceed 5 MB in size.(10)
Implement database connectivity to store applicant data and uploaded resumes.
10. Explain the concept of inheritance in object-oriented programming (OOP) with respect to PHP. Provide the
syntax for creating a child class that inherits from a parent class, and discuss the benefits of inheritance in
code reusability and maintenance.(3+7)
11. Design the following form in HTML and display the value in the result box after calculating basic arithmetic
operations based on user input with use of JavaScript.


Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Scripting Language
Pass Marks: 30
Course No.: CACS 254
Semester: IV Time: 3 hrs.
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group 'A'
Attempt all the questions. [10×1=10]
Circle (Ο) the best answer
i. The script tag must be placed in,
a) head b) head and body c) title and head d) All of the above
ii. The unordered collection of properties, each of which has a value is called?
a) String b) Object c) Serialized d) All of the mentioned
iii. The basic purpose of the toLocalString() is to
a) return a localized object representation
b) return a local time in the string format
c) return a localized string representation of the object
d) return a parsed string
iv. Ajax stands for:
a) Abstract JSON and XML b) Asynchronous JavaScript and XML
c) Another Java Abstraction for X-Windows d) Another Java and XML Library
v. JQuery code to set the background color of all span elements to blue?
a) $(“span”).style(“background-color”,”blue”)
b) $(“span”).manipulate(“background-color”,”blue”)
c) $(“span”).css(“background-color”,”blue”)
d) $(“span”).color(“background-color”,”blue”)
vi. JQuery method is used to perform as asynchronous HTTP request?
a) JQuery.ajaxSetup() b) JQuery.ajaxAsync()
c) JQuery.ajax() d) JQuery.httpRequest()
vii. Which of the following characters are taken care of by htmlspecialchars?
a) < b) > c) single quote d) double quote e) & f) All of the above
viii. What is the output of the following code?
class test {
public $value = 0;
function test() {
$this->value = 1;
}
function __construct() {
$this->value = 2;
}
}
$object = new test();
echo $object->value;
a) 2 b) 1 c) 0 d) 3 e) No Output, PHP will generate an error message.
ix. How would you store email ([email protected]) in a ‘userEmail’ cookie in PHP?
a) setcookie (‘userEmail’,’[email protected]’)
b) storeCookie (‘userEmail’,’[email protected]’)
c) makeCookie (‘userEmail’,’[email protected]’)
d) window.cookie (‘userEmail’,’[email protected]’)
x. Which keyword is used to put a stop on inheritance?
a) stop b) end c) break d) final
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Scripting Language
Pass Marks: 30
Course No.: CACS 254
Group 'B' Time: 3 hrs.

Attempt any SIX questions. [65 = 30]

1. Write the code to add and remove elements into using JavaScript DOM.
2. What is Ajax? Write a script to check username availability into signup form.
3. What is JavaScript Object? Describe different properties and methods associated with windows object.
4. What is cookie, Describe how can we relate session with cookie in PHP?
5. What is CMS? Describe major features of CMS.
6. Describe how for loop and foreach loop works with array in PHP.
7. What is framework, Describe How MVC framework work in PHP?
Group 'C'
Attempt any TWO questions. [210 = 20]

9. What are different data fetch mode in PHP through MySQL? Write a program to lists student information
and delete those data from database using PHP
10. What is Exception Handling? How exception is handled in PHP, Describe 4 major principles of object
oriented programming with PHP.
11. What is the need of client side scripting? Why need form validation into website, which validation is best
among client side and server side validation describe with examples.
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Software Engineering Pass Marks: 30
Course No.: CACS 253 Time: 3 hrs.
Semester: IV
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.
Group – A
Attempt All Questions: [10×1=10]
1. Circle ( O ) the correct answer in the following questions
a. Where is the waterfall model of software development well suited?
i. When software is medium sized and requirements are not clear.
ii. When working software is required quickly.
iii. When requirement are well defined and project is small.
iv. When project is large in size and large development team.
b. Which granularity level of testing checks the behavior of module cooperation?
i. Unit Testing ii. Integration Testing
iii. Acceptance testing iv. Regression Testing
c. user requirements are expressed as ……….. in extreme programming
i. Implementation task ii. Functionalities
iii. Scenarios iv. None of above
d. In which phase of requirement elicitation process conflict are resolved?
i. Requirement Discovery.
ii. Requirement classification and organization.
iii. Requirement Requirements prioritization and negotiation.
iv. Requirement Specification.
e. Which of the following pattern is the basis of interaction management in many web-based systems?
i. Layered Pattern ii. MVC pattern
iii. Repository Pattern iv. Generic Pattern
f. Which of the following is not the principle of agile development?
i. Customer Involvement ii. Maintain Simplicity
iii. Incremental Development iv. Version Control
g. The relationship of data elements within a module is called………..
i. Modularity ii. Coupling
iii. Cohesion iv. Granularity
h. Which of the following is concerned with making the system more maintainable?
i. Software maintenance ii. Configuration management
iii. Software reengineering iv. Software refactoring
i. Which of the following is not configuration management activity?
i. Change management ii. Release management
iii. Version management iv. Risk management
j. White box testing is sometimes called.
i. Functional Testing ii. Loop testing
iii. Behavioral testing iv. Graph based testing
Nagarjuna College of Information Technology
Pre-Board Examination 2080
Full Marks: 60
Bachelor in Computer Application Pass Marks: 30
Course Title: Software Engineering Time: 3 hrs.

Course No.: CACS 253


Semester: IV
Candidates are required to answer all the questions in their own words as far as practicable.
Group – B
Attempt Any SIX Questions [6×5=30]
2. What is software process model? Explain attributes of good software.
3. Differentiate between functional requirement and non functional requirement with example.
4. What is project scheduling? Explain importance of activity network in scheduling.
5. What do you mean by architectural design? Explain client server model of architectural design.
6. Differentiate between black box testing and white box testing.
7. What is software evolution? Explain software evolution dynamics.
8. Draw use case diagram to model library management system.

Group – C
Attempt Any TWO Questions [2×10=20]
9. What is agile software development? Explain the principles of agile development.
10. What do you mean by requirement engineering? Explain requirement engineering process with block
diagram.
11. Define software verification and validation. Explain software inspection process.
Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
5.

Candidates are required to answer the questions in their own words as far as possible.
Group – A
Attempt All Questions: [10×1=10]
2. Circle ( O ) the correct answer in the following questions
c. Where is the waterfall model of software development well suited?
v. When software is medium sized and requirements are not clear.
vi. When working software is required quickly.
vii. When requirement are well defined and project is small.
viii. When project is large in size and large development team.
d. Which granularity level of testing checks the behavior of module cooperation?
i. Unit Testing
ii. Integration Testing
iii. Acceptance testing
iv. Regression Testing
c. user requirements are expressed as ……….. in extreme programming
i. Implementation task ii. Functionalities
iii. Scenarios iv. None of above
j. In which phase of requirement elicitation process conflict are resolved?
v. Requirement Discovery.
vi. Requirement classification and organization.
vii. Requirement Requirements prioritization and negotiation.
viii. Requirement Specification.
k. Which of the following pattern is the basis of interaction management in many web-based systems?
ii. Layered Pattern ii. MVC pattern
iv. Repository Pattern iv. Generic Pattern
l. Which of the following is not the principle of agile development?
i. Customer Involvement ii. Maintain Simplicity
iii. Incremental Development iv. Version Control
m. The relationship of data elements within a module is called………..
i. Modularity ii. Coupling
iii. Cohesion iv. Granularity
n. Which of the following is concerned with making the system more maintainable?
i. Software maintenance ii. Configuration management
iii. Software reengineering iv. Software refactoring
o. Which of the following is not configuration management activity?
i. Change management ii. Release management
iii. Version management iv. Risk management
k. White box testing is sometimes called.
i. Functional Testing ii. Loop testing
iii. Behavioral testing iv. Graph based testing

Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
6.

Candidates are required to answer the questions in their own words as far as possible.
Group - A
Attempt All Questions: [10×1=10]
1. Circle ( O ) the correct answer in the following questions
a. Where is the prototyping model of software development well suited?
i. When requirements are well defined.
ii. For projects with large development team.
iii. When customer can not define requirement clearly.
iv. None of the above.
b. Which granularity level of testing checks the behavior of module cooperation?
i. Unit Testing ii. Integration Testing
iii. Acceptance testing iv. Regression Testing
c. Scrum sprints
i. Is schedule
ii. Is Duration
iii. Should be tested so that it releases potentially shippable increments
iv. Both ii and iii
d. In which phase of requirement elicitation process conflict are resolved?
i. Requirement Discovery.
ii. Requirement classification and organization.
iii. Requirement Requirements prioritization and negotiation.
iv. Requirement Specification.
e. Which of the following pattern is the basis of interaction management in many web-based systems?
i. Layered Pattern ii. MVC pattern
iii. Repository Pattern iv. Generic Pattern
f. Which of the following is not the principle of agile development?
i. Customer Involvement ii. Maintain Simplicity
iii. Incremental Development iv. Version Control
g. The relationship of data elements within a module is called………..
i. Modularity ii. Coupling
iii. Cohesion iv. Granularity
h. Which of the following is concerned with making the system more maintainable?
i. Software maintenance ii. Configuration management
iii. Software reengineering iv. Software refactoring
i. Which of the following is not configuration management activity?
i. Change management ii. Release management
iii. Version management iv. Risk management
j. Black box testing is sometimes called.
i. Functional Testing ii. Loop testing
iii. Behavioral testing iv. Graph based testing

Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV

Candidates are required to answer the questions in their own words as far as possible.

Group – B

Short Answer Questions (Any SIX): [6×5=30]

2. What is software process model? Explain attributes of good software.

3. Differentiate between functional requirement and non functional requirement with example.

4. What is project scheduling? Explain risk management process.

5. What do you mean by architectural design? Explain client server model of architectural design.

6. Differentiate between black box testing and white box testing.

7. What is software evolution? Explain types of software maintenance.

8. Draw use case diagram to model library management system.

Group – C

Long Answer Questions (any TWO): [2×10=20]

9. What is agile software development? Explain the principles of agile development.

10. What do you mean by requirement engineering? Explain requirement engineering process with block
diagram.

11. Define software verification and validation. Explain software inspection process.


Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B
Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Software Engineering Pass Marks: 24
Code No: CACS 253 Time: 3 hours
Semester: IV

Candidates are required to answer the questions in their own words as far as possible.

Group - A
Short Answer Questions (Any SIX) [6×5=30]

2. What is software? Explain key challenges of software engineering facing.

3. List the principles of extreme programming. Explain agile scrum process.

4. What is requirement engineering? Explain different types of requirement validation checks.

5. Define software design. Explain the concept of coupling and cohesion in software design.

6. What do you mean software testing? Differentiate between software verification and validation.
7. What is risk management? List the categories of risk in software project. Explain the importance of activity
network in project scheduling.
8. What is software reengineering? Explain software maintenance and its type.

Group – B

Long Answer Questions (Any TWO) [2×10=20]

9. What is software engineering? Explain spiral model of software development with its advantages,
disadvantages and applicability.
10. What do you mean by software requirement? Differentiate between functional requirement and non
functional requirement. List the functional requirements for Bank ATM system.
11. Software configuration management. Explain software configuration management activities with block
diagram.


Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
7.

Candidates are required to answer the questions in their own words as far as possible.
Group A
Attempt all the questions. [10 × 1 = 10]
1. Circle (O) the correct answer.
i. The ability to change the conceptual schema without affecting the external schemas or application programs
is known as ___________________.
a) Program-data independence c) Logical data independence
b) Physical data independence d) Data abstraction
ii. The maximum number of relationship instances in which an entity can participate is known as …………….
a) Participation Constraint c) Domain Constraint
b) Cardinality Constraint d) Referential Integrity Constraint
iii. Which one is the binary operation symbol in the relational algebra?
a) σ c) ⋈
b) Π d) ρ
iv. Which normalization is based on the multivalued dependency?
a) 1NF c) 3NF
b) 2NF d) 4NF
v. Drop Table cannot be used to drop a table referenced by a _________ constraint.
a) Local Key c) Primary Key
b) Composite Key d) Foreign Key
vi. Which of the following SQL functions is to return the total value from a column?
a) AVG() c) COUNT()
b) SUM() d) Both b & c
vii. Which of the following specifies when the trigger will be executed?
a) Before c) After
b) Instead Of d) All of the above
viii. The representation of the query in the form of data structure is classified as ……..
a) Query graph c) Query tree
b) Scanner tree d) Parser tree
ix. Which of the following is the property of transaction that protects data from system failure?
a) Atomicity c) Consistency
b) Isolation d) Durability
x. The _____________ scheme forces the younger transaction to kill itself and release the resource if the older
one requests a resource that is being held by the younger one.
a) Wound-wait c) Wait-die
b) Round wait d) Will wait

Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Name:………………………………………….. Roll No:…………
8.

Candidates are required to answer the questions in their own words as far as possible.
Group A
Attempt all the questions. [10 × 1 = 10]
1. Circle (O) the correct answer.
i. Which of the following is not a function of the database?
a) Managing stored data b) Security of stored data
c) Manipulating data d) Analyzing code
ii. What are rows of a relation known as?
a) Degree b) Tuple
c) Entity d) None
iii. If multiple columns are used as Primary Key, it is known as ______________.
a) Unique Key b) Foreign Key
c) Composite Key d) None
iv. Which one is the example of Trivial Functional Dependency?
a) id, name → name b) id → address
c) id → name d) id → name, address
v. Which SQL constraint do we use to set some value to a field whose value has not been added explicitly?
a) UNIQUE b) DEFAULT
c) NOT NULL d) CHECK
vi. What is the meaning of “GROUP BY” clause?
a) Group data by row values b) Group data by column value
c) Group data by column and row values d) None
vii. The program which performs some common action on database data and is also stored there is called?
a) Trigger b) Stored Function
c) Stored Procedure d) None of the above
viii. What does the term “Query Optimization” refer to?
a) Storing queries in a centralized repository
b) Automatically rewriting queries to improve efficiency
c) Ensuring data consistency across tables
d) Reducing the number of database tables
ix. Which transaction isolation level ensures that a transaction sees committed changes made by other
transactions?
a) Read Uncommitted b) Repeatable Read
c) Serializable d) Read Committed
x. What is the primary purpose of using indexing in a database?
a) To store data b) To improve data security
c) To enforce data integrity d) To speed up data retrieval

Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - A Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B

Attempt any SIX questions. [6 × 5 = 30]

2. What do you mean by DBMS? Discuss the importance of DBMS.


3. How do we add and drop CHECK constraint and DEFAULT constraint?
4. What is schema? Explain different join operations in relational algebra.
5. Explain different types of functional dependencies with example.
6. What do you mean by serializability? Explain timestamp based locking protocol.
7. Explain materialization for evaluating a query execution tree.
8. What is indexing? Discuss about dense and sparse index with example.

Group C

Attempt any TWO questions. [2 × 10 = 20]

9. Explain aggregation with example. Consider a database for a car rental agency. Customers rent various cars for
specific rental periods. Each car can be rented by multiple customers. Create an ER diagram for this information
with your own assumptions. [5+5]
10. Define normalization. Describe the importance of normalization in DBMS. Explain 2NF and 3NF with example.
[2+2+6]
11. Consider the following tables: [10]
Customer(CustomerID, Name, Email)
Car(CarID, Make, Model, RentalPerDay)
Rental(RentalID, CustomerID, CarID, RentalStartDate, RentalEndDate)
a. Find the number of cars rented by each customer.
b. Find the names and email addresses of customers who have rented a car.
c. Find the details of customers who have rented a car between 2023-05-01 and 2023-09-01.
d. Find the car information rented by a Customer “Hari Thapa”.
e. Find the cheapest rental car and expensive rental car.


Nagarjuna College of Information Technology
Shankhamul -09, Lalitpur
SET - B Pre-Board Examination 2081
Bachelor in Computer Applications Full Marks: 60
Course Title: Database Management System Pass Marks: 24
Code No: CACS 255 Time: 3 hours
Semester: IV
Candidates are required to answer the questions in their own words as far as possible.
Group B

Attempt any SIX questions. [6 x 5 = 30]

2. What do you mean by database? Discuss the merits and demerits of DBMS.

3. Explain integrity constraint and referential integrity constraint with example.

4. State the properties of a transaction. Explain the state of transaction with a diagram.

5. Define query processing. Describe steps of query processing.

6. What is trigger? How it can be used in a database? Explain with an example.

7. Discuss different types of database security.

8. What is relational algebra? Write a relational algebra expression

a. To find all the students whose age is greater than 17.


b. To find all “database” subject book and price is “450”.

Group C

Attempt any TWO questions. [2 x 10 = 20]

9. Describe 3-schema architecture of database. Consider a database of a movie streaming service. Users can
watch multiple movies, and each movie can be watched by multiple users. Create an ER diagram to
represent this information with your own assumptions. [5+5]

10. Why do we need normalization? Explain 1NF, 2NF and 3NF with examples. [1+9]

11. Consider the following tables: [10]

Customer(CustomerID, Name, Email)


Car(CarID, Make, Model, RentalPerDay)
Rental(RentalID, CustomerID, CarID, RentalStartDate, RentalEndDate)
a. Find the number of customers who have rented the same car.
b. Find the names and email addresses of customers who have not rented a car.
c. Find the details of customers who have rented a car between 2024-01-01 and 2024-03-01.
d. Find the car information rented by a Customer “Mina Kumari”.
e. Find the cheapest rental car and expensive rental car.

Nagarjuna College of Information Technology
Shankhamul-09, Lalitpur
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Database Management System Pass Marks: 30
Course No.: CACS 255 Time: 3 hrs.
Semester: IV
Name: ………………………………….. Roll No.: ….
Candidates are required to answer all the questions in their own words as far as practicable.

Group A

Attempt all the questions. [10 × 1 = 10]

2. Circle (O) the correct answer.


i. The ability to change the conceptual schema without affecting the external schemas or application programs
is known as ___________________.
a) Program-data independence c) Logical data independence
b) Physical data independence d) Data abstraction
ii. Which of this DBMS language is employed by end users and programmers to manipulate data in the
database?
a) Data definition language c) Data control language
b) Data manipulation language d) Transaction control language
iii. The relational model of RDBMS is concerned with?
c) Data structure c) Data manipulation
d) Data integrity d) All of the above
iv. The database design prevents some data from being stored due to ____________.
c) Deletion anomalies c) Update anomalies
d) Insertion anomalies d) Selection anomalies
v. Drop Table cannot be used to drop a table referenced by a _________ constraint.
c) Local Key c) Primary Key
d) Composite Key d) Foreign Key
vi. Which of the following SQL functions is to return the total value from a column?
c) AVG() c) COUNT()
d) SUM() d) Both b & c
vii. Which of the following specifies when the trigger will be executed?
c) Before c) After
d) Instead Of d) All of the above
viii. The representation of the query in the form of data structure is classified as ……..
c) Query graph c) Query tree
d) Scanner tree d) Parser tree
ix. Which of the following is the property of transaction that protects data from system failure?
c) Atomicity c) Consistency
d) Isolation d) Durability
x. The _____________ scheme forces the younger transaction to kill itself and release the resource if the older
one requests a resource that is being held by the younger one.
c) Wound-wait c) Wait-die
d) Round wait d) Will wait
Nagarjuna College of Information Technology
Shankhamul-09, Lalitpur
Pre-Board Examination 2080
Bachelor in Computer Application Full Marks: 60
Course Title: Database Management System Pass Marks: 30
Course No.: CACS 255 Time: 3 hrs.
Semester: IV
Candidates are required to answer all the questions in their own words as far as practicable.

Group B

Attempt any six questions. [6 × 5 = 30]

2. Why DBMS is important? Explain merits and demerits of DBMS. [2 + 3]


3. Explain Super key, Candidate key, Primary key, Foreign key, and Composite Key with example.
[5]
4. What are the uses of nested queries? Explain set membership using nested query with example.
[1 + 4]
5. Define normalization. Discuss different normal forms with example. [1 + 4]
6. What are the different methods of indexing? Discuss the benefits of using indexes in a database.
[2 + 3]
7. How wait-for-graph is constructed? How can you use it to detect deadlock in a schedule of transactions?
[3 + 2]
8. What do you mean by non-serial schedule? How do you test conflict serializability? [1+4]

Group C

Attempt any two questions. [2 × 10 = 20]

9. Given the schema as below, write relational algebra and SQL queries for the following:
Employee(employee_name, street, city, salary)
Works(employee_name, company_name)
Company(company_name, city)
Manages(employee_name, manager_name)
a. Find the name of all employees who work for “Nagarjuna Corporation”.
b. Find the names, street and cities of all employees whose salary is more than Rs. 50,000.
c. Find the names of all employees who work under the manager “Ravi Dangol”.
d. Find the name, salary and city of all employees who works in companies located in Kathmandu.
e. Find the name of the employee to whom company is not assigned yet.
10. a) Design an ER diagram for a car-insurance company whose customers own one or more cars each. Each car has
associated with it zero to any number of recorded accidents. Assume attributes of your own choice.
[5]
b) Convert the above ER diagram into equivalent relational tables. [5]
11. a) What do you mean by stored procedure. How can you create it? Illustrate with example.
[1 + 4]
b) Explain Order By, Having By, and Group By clause in SQL with examples. [5]

You might also like