Skip to main content

Grade XII model sets-NEB

 

Set 1

Full Marks: 50 | Time: 2 Hrs

 

Group A [9x1=9]

Rewrite the correct options of each question in your answer sheet

1.    Which of the following gives the logical structure of database graphically?

a. Database diagram                           b. Entity diagram

c. Architectural representation            d. Entity relationship diagram

2.    How many primary keys can have in a Table?

a. only 1        b. only 2           c. Depends on number of columns d. Depends on DBA

3.    Find the cities name with the condition and temperature from table 'whether' where condition = sunny or cloudy but temperature >= 60.    a. SELECT city, temperature, condition FROM weather WHERE condition = 'cloudy' AND condition = 'sunny' OR temperature >= 60

b. SELECT city, temperature, condition FROM weather WHERE condition = 'cloudy' OR condition = 'sunny' OR temperature >= 60g

c. SELECT city, temperature, condition FROM weather WHERE condition = 'sunny' OR condition = 'cloudy' AND temperature >= 60

d. SELECT city, temperature, condition FROM weather WHERE condition = 'sunny' AND condition = 'cloudy' AND temperature >= 60

4. The session, presentation and application layers are the …… support layers.

a. software   b. hardware      c. Both             d. None

5. Which of the following is the correct output for the following JavaScript code:

 

Var x=5, y=1 

var obj ={x:10} 

with(obj) 

{ 

      alert(y) 

} 

a.       1 b. Error   c. 10 d. 5

6.       Which among the following best defines abstraction?

a.    Hiding the implementation

b.    Showing the important data

c.    Hiding the important data

d.    Hiding the implementation and showing only the features

7.       System analyst have to interact with ….

a. Managers                           b. Users

c. Programming team             d. All of above

8.    Which one of the following is the correct way for calling the JavaScript code?

a. Preprocessor          b. Triggering Event       c. RMI              d. Function Method

9.    An IoT network is a collection of ….. devices.

a. Signal                                b. Machine to machine

c. Interconnected                   d. Network to network

 

Group - B[5×5=25]

Short questions:                                         

10.   Describe Relational database model?                                         [5]

                                                    OR

What are the keys used in DBMS? Explain DDL and DML with examples.                                                                                      [5]

                                                                        

11.   Write JavaScript program to find area of circle                        [5]

                                          OR

What are the necessary parameters for establishing a connection to a MySQL database using PHP? Write a PHP code for Database connection.

12.   Explain different types of inheritance with example.                [5]

13.   Describe the concept of software testing with examples.          [5]

14.   Explain the concept of cloud computing with advantages and disadvantages.

 

Group – C [2×8=16]

Long answer questions

15.   Describe OSI refence model , star and Bus topology.               [8]

16.   Differentiate between structure and union. Write a program to input the employee’s name and the post of five employees and display the records in proper format using structure.

                                     Or

What is file handling functions? Write a C program to store student_id, name, address, phone and marks in a file and display them in proper format.                                   

***

 

GRADE XII – COMPUTER SCIENCE (4281)

Set 2

Full Marks: 50 | Time: 2 Hrs

Group A [9x1=9]

Rewrite the correct options of each question in your answer sheet

1.       The entity relationship set is represented in ER diagram as.

a. Undivided rectangles                    b. Diamond

c. Dashed lines                                 d. Double diamonds

2.    Which of the following options are correct regarding these three keys (Primary Key, Super Key, and Candidate Key) in a database?

I. Minimal super key is a candidate key

II. Only one candidate key can be a primary key

III. All super keys can be a candidate key

IV. We cannot find a primary key from the candidate key

a. I and II     b. II and III       c. I and III                    d. II and IV

3. Which command is used to change the definition of a table in SQL?

      a. CREATE b. ALTER   c. UPDATE   d. DELETE

4.       A pointer is a

a. Variable that stores address of another variable

b. Variables that stores address of an instruction

c. Both

d. None

5.    See the given code of JavaScript and choose the correct output from the following:

functioncomparing() 

{ 

intx=9; 

chary=9; 

if(x==y) 

returntrue; 

else 

returnfalse; 

}

a. compilation Error

b. Runtime Error

c. False

d. True

6. which statement will output $x on the screen?

a. echo “\$x” b. echo “$$x”  c. echo “\$x”  d. echo “$x” 

7. The agile software development model is built based on __________.

a. Linear Development   b. incremental Development   c. Iterative Development d. both incremental and iterative

8.       The OSI model consists of …. Layers

a. Seven                   b. Five              c. Two              d. six

9.       Which segment do eBay, amazon belong?

a. B2B         b. C2B             c. B2C              d. C2C

 

 

Group – B [5×5=25]

Long questions:                                         

10.   Define Normalization. Explain the types of normalization in detail.

                                           OR

Explain the advantages and disadvantages of using DBMS.

11.   Write a JavaScript code snippet along with HTML, that displays the multiplication table of entered number.                                    [5]

                                                 OR

Develop a PHP code to add a record like (101, Ram, M, 2002-10-25, Kathmandu) in the table named info student (regno integer, name character 25, gender character 1, DOB character 10, address character 25) of the database named “SCHOOL”.

 

 

What is feasibility study? Explain different levels of feasibility study

12.   Explain OOP with its advantages and disadvantages.   [5]                           

13.   What is feasibility study? Explain the types of feasibility study with examples.                                    [5]

14.   What is AI? Explain the application areas of AI.                    [5]

 

Group – C [2×8=16]

Long answer questions)                                               

15.   Explain LAN, MAN and WAN with advantages and disadvantages.

16.   What is structure? Write a program to enter name, address and salary of 20 employee and display the record of employee getting salary in the range of 10000 to 20000          [2+6]

                                                 OR

What do you mean by file handling? Write a program to enter name, address and salary of 20 employee and store it in a file.    [2+6]

***

 

 

GRADE XII – COMPUTER SCIENCE (4281)

Set 3

Full Marks: 50 | Time: 2 Hrs

Group A [9x1=9]

Rewrite the correct options of each question in your answer sheet:

1.    In which normal form of database all the attributes of the non-primary keys are fully dependent on primary keys?

A)  First       B) Second        C) First and Second     D) All of the above

2.    Which one of the following refers to the "data about data"?

A)  Directory                       B) Data mining

C) Metadata                           D) Data warehouse

3.    Which of the following statement is correct to display all the cities with the condition, temperature, and humidity whose humidity is in the range of 60 to 75 from the 'whether' table?

A)  SELECT * FROM weather WHERE humidity IN (60 to 75);

B)  SELECT * FROM weather WHERE humidity BETWEEN 60 AND 75

C)  SELECT * FROM weather WHERE humidity NOT IN (60 AND 75)

D) SELECT * FROM weather WHERE humidity NOT BETWEEN 60 AND 75

4.    Which of the following is a file transfer service?

A) FTP         B) Telnet          C) SMTP          D) All of the above

5.    Which of the following is a server-side scripting language?

A)  PHP                B) MySQL       C) JavaScript    D) SQL

6.    Which syntax is used for opening and closing a PHP script?

A) <php> . . . </php>                        B) <?php. . .?>

C)? php . . .? php                               D) <p> . . . </p>

7.    What output will be obtained from the following JavaScript?

var a=15;

var b=0;

console.log(a/b);

A)  15 is printed                         B) 0 is printed

C) Infinity is printed                  D) Garbage value

8.    The process of deriving new class from base class is …...

A) Class.                              B) Polymorphism.

C) Inheritance.                     D) Data Abstraction.

9.    When can white-box testing be started?

A)  After analysis                  B) After programming

     C) After designing                D) After installation

 

GROUP B [5×5=25]

Short Answer Questions                                                                                         

10.   Suppose you are appointed as an IT expert in a School. What kind of database model you preferred and why?                       [1+4]

OR

Most of the Hotel prefer applying a centralized database system. Justify the statement with your arguments.                                    [5]

11.   Write a program in JavaScript to calculate factorial of a number. [5]

OR

How can you connect MYSQL database with PHP? Demonstrate with an example.                                                               [5]

12.   Define OOPs. Explain any three characteristics of OOP.  [5]

13.   List out different stages of SDLC and explain any three.              [1+2+2]

14.   Explain the advantages of IoT.                                                   [5]

 

GROUP C [2×8=16]

Long Answer Questions                                                         

15.   Suppose you are appointed as an IT expert of any bank which LAN topology you suggested to design and why?                                 [2+6]

16.   Define recursive function. Write a C program to input a number and find its factorial using recursive function.  [2+6]                                           

OR

Write a program in C to create and store same, address, and contact no of students to a data file named “LOCATION.DAT” and display all the records in the proper format.                                      [8]

***

 

GRADE XII – COMPUTER SCIENCE (4281)

Set 4

Full Marks: 50 | Time: 2 Hrs

Group A [9x1=9]

Rewrite the correct options of each question in your answer sheet:

1.       In which normal form of database, atomicity is introduced?

A) First             B) Second       C) Third                      D) Fourth

2.       Which of the following techniques is not implemented to protect a database?

A) Rollback      B) Backup        C) Recovery     D) Firewall

3.       Which one of the following SQL commands is executed to display all the records having a second letter in the LNAME (LAST NAME) as “A” from the customer table?

A)   SELECT * FROM CUSTOMER WHERE LNAME LIKE “? A%”;

B)   SELECT * FROM CUSTOMER WHERE LNAME LIKE “_A%”;

C)   SELECT * FROM CUSTOMER WHERE LNAME LIKE “A%”;

D)  SELECT * FROM CUSTOMER WHERE LNAME LIKE “%A”;

4.       Which of the following IP address of class C?

A) 10.0.1.0 B) 192.168.1.0 C) 127.0.1.0     D) All

5.       Which of the following is a server-side scripting language?

A) JavaScript          B) MySQL         C) PHP             D) jQuery

6.       Which of the following keywords are used to declare a variable in JavaScript?

A) int or var      B) float or let    C) var or let      D) char or var

7.        Which of the following commands is executed in PHP to concatenate the variables $x with $y?

A) $x + $y         B) $x=$y          C) concat ($x,$y)               D) $x.$y

8.       Which statement is incorrect about the object-oriented approach?

A) Emphasis is on data rather than procedure.

B) Data is hidden and cannot be accessed.

C) Objects communicate through functions.

D) It supports abstract data but not the class.

9.       Which of the following feasibility study is concerned with cost benefit analysis?

A) Technical feasibility                   B) Economic feasibility

C)  Operational feasibility               D) Schedule feasibility

 

Group B [5x5=25]

Short Answer  

10.   Which type of database system (centralized or distributed) is mostly preferred by financial institution like a bank? Give any four suitable reasons.                                                                                [1+4]          

                                OR                                                                    

Implement DDL statement by creating table name “NEB” of having attributed school id, school address, school code.                                               [5]                                     

11.   Develop a programing JavaScript to exchange/swap the values of any two variables.                                                           [5]            

                                                                            

                               OR   

Write a PHP code using function to add two number.                                                

12.   Differentiate between OOP and POP                       [5]

13.   List out different stages of SDLC and explain any two.           [1+2+2]

14.   Explain E-governance with advantages and disadvantages.                               [5]

 

GROUP – C [2×8=16]

Long Question Answer

15.   Define Transmission media. Explain the types of transmission media with suitable example.                                [2+6]

16.   Develop a program in C using structure to ask the information of any 12 students with roll_number, name and marks scored in sub1, sub2, and sub3. Also, display them in proper format along with the calculation of total and percentage. [Note: the full marks of each subject are 100].

OR

What are the modes of file handling in C. Demonstrate a program in C to create a data file named score.dat to store students’ information with Reg_no, name, gender, and address. The program should ask the user to continue or not. When finished, the program should also display all the records in the proper format.

***

GRADE XII – COMPUTER SCIENCE (4281)

Set 5

Full Marks: 50 | Time: 2 Hrs

Group A [9x1=9]

Rewrite the correct options of each question in your answer sheet:

1.       In which normal form of the database, is redundancy minimized?

A) First       B) Second        C) Third           D) Fourth

2.       What technique is implemented to ensure data integrity in a database?

A) Rollback           B) Backup        C) Recovery     D) Constraints

3.       Which one of the following SQL commands is executed to display all the records having a second letter in the LNAME (LAST NAME) as “A” from the customer table?

A) SELECT * FROM CUSTOMER WHERE LNAME LIKE “A%”;

B) SELECT * FROM CUSTOMER WHERE LNAME LIKE “_A%”;

C) SELECT * FROM CUSTOMER WHERE LNAME LIKE “A%”;

D) SELECT * FROM CUSTOMER WHERE LNAME LIKE “%A”;

4.       Which of the following is an invalid IP address?

A) 192.168.0.1                   B) 192.168.300.1

C) 172.255.0.0                   D) 202.10.79.4

5.       Which of the following is a client-side scripting language?

A) JavaScript         B) MySql         C) PHP             D) Jquery

6.       Which of the following keywords are used to declare a constant in JavaScript?

A) int         B) const           C) var               D) let

7.       Which of the following commands is executed in PHP to concatenate the variables $x with $y?

A) $x + $y       B) $x=$y     C) concat ($x,$y)          D) $x.$y

8.       Which statement is incorrect about the object-oriented approach?

A) Emphasis is on data rather than procedure.

B) Data is hidden and cannot be accessed.

C) Objects communicate through functions.

D) It supports abstract data but not the class.

9.       Which of the following feasibility studies is concerned with evaluating the technical aspects of a project?

A) Technical feasibility                   B) Economic feasibility

C) Operational feasibility                D) Schedule feasibility

 

Group - B

Short questions                                                            [5×5=25]

10.   Explain the advantages of using a RDBMS database in a web application.             

                                                   OR

Define data security. Explain any three methods of data security.

11.   Write a JavaScript code to find the maximum element in an array.

[5]

OR

Write a PHP code to insert data in a table named “student” having fields Name, Address, Class by checking the database connectivity. Assume that server name=”localhost”, user name= “user”, password=” root” and database name=” college”

12.   Discuss the concept of encapsulation and inheritance in object-oriented programming.                                                                 [5]

13.   What do you understand by waterfall model? Explain different stages of waterfall model.                                                    [1+4]                                                               

14.   Analyze the role of big data in the field of machine learning with advantages and disadvantages.

 

Group - C

Long questions                                                            [2×8=16]

15.   Differentiate between IPv4 and IPV6. Which network architecture (client-server/ p2p) is mostly preferred by organization like banks. Explain. [3+5]

16.   Define pointer with its some advantages. Develop a program in C using function to input length and breadth of rectangle and display the area of rectangle using user-defined function.

OR

Explain the concept of Data file in C. Demonstrate a program in C to create a data file named score.dat to store employee information with Staffid, name, gender, and address. the program should also display all the records in the proper format.

 

***The End***


 

Comments

Popular posts from this blog

Software Process Model(SPM)

  Explain spiral development model with advantages and disadvantages The Spiral Development Model is a risk-driven software development approach that combines iterative and waterfall models. It involves repeated cycles (or spirals) to incrementally refine the software project. Each spiral consists of four major phases: Planning , Risk Analysis , Engineering , and Evaluation .                                                           Fig: Spiral Software development model Phases in the Spiral Model: Planning : Requirements are gathered and objectives are set for the project. Risk Analysis : Risks are identified, analyzed, and mitigation strategies are developed. Develop/Engineering : The actual development and testing of the product take place. Evaluation : Stakeholders/users review the progress and provide feedback, inf...

Solution of NEB model quetions

 solution to model questions are : 

DBMS-SQL

SQL DDL and DML Examples Examples of DDL (Data Definition Language) and DML (Data Manipulation Language) commands in SQL. DDL (Data Definition Language) Examples: 1. Create a new database: CREATE DATABASE SchoolDB;  2. Create a table: CREATE TABLE Students ( StudentID INT PRIMARY KEY, FirstName VARCHAR(50), LastName VARCHAR(50), Age INT );  3. Alter a table to add a new column: ALTER TABLE Students ADD Email VARCHAR(100);  4. Drop a table: DROP TABLE Students;  5. Rename a table: ALTER TABLE OldTableName RENAME TO NewTableName;  DML (Data Manipulation Language) Examples: 1. Insert data into a table:  INSERT INTO Students (StudentID, FirstName, LastName, Age) VALUES (1, 'John', 'Doe', 20);  2. Update data in a table: UPDATE Students SET Age = 21 WHERE StudentID = 1;  3. Delete data from a table: DELETE FROM Students WHERE StudentID = 1;  4. Select data from a table: SELECT * FROM Students;  5. Select data with conditions: SELECT FirstName...