
2nd puc computer science model question papers with answers,2nd puc computer science solved model question papers
PU-II COMPUTER SCIENCE
SOLVED MODEL QUESTION PAPER 1
Answer ALL the questions.
Each question carries 1 mark. (10 X 1 = 10)
Each question carries 1 mark. (10 X 1 = 10)
1. Expand PCI.
Ans: Periphercal Compenent Interconnect
2. Draw OR gate.
Ans:
3. What is data structure?
Ans: a data
structure is a specialized format for organizing and storing data.
4. Name any two member access
specifiers.
Ans: private, public, protected.
5. Define pointer.
Ans: pointer is a special variable that
holds the address of another variable.
6. What is database?
Ans: a data base is a collection of
logically related data organized in a way that data can be easily accessed,
managed and updated.
7. Define network.
Ans: a network is an inter-connection of
autonomous computers.
8. What is interspace?
Ans: it is a
client/server software program that allows multiple users to communicate online
with real-time audio, video and text chat in dynamic 3D environments.
9. Define telnet.
Ans: telnet is an older
internet utility that allows you to log on to remote computer systems. It is
used to connect thousands of catalogs at libraries around the world.
10. Name the tag used for creating link in HTML.
Ans: anchor tag, <a href=”path”>text
here</a>Answer any FIVE of the following.
Each question carries 2 marks. (5 X 2 = 10)
11. What is minterm and max term?
Ans: : “The sum of all the literals with or
without bar in the logic system is called minterms”.
“The product of all the literals with or without bar in the
logic system is called maxterms”.
12. Prove X + YZ = (X+Y)(X+Z).
Ans: RHS=(X+Y)(X+Z)
=XX+XZ+YX+YZ | distributive
law
=X+XZ+XY+YZ | indempotence law
=X(1+Z+Y)+YZ | properties of 0
and 1
=X.1+YZ
=X+YZ
=LHS
13. What is polymorphism?
Ans:it is an
ability of the message to process in more than one form.
14. Write disadvantages of default constructor.
Ans: - when many objects of the same class
are created, all objects are initialized to same set of values by default
constructor.
-
It
is not possible to initialize different objects with different initial values
using default constructor.
15. Name the methods to open a file.
Ans: - opening file using constructor.
-
Opening
file using open() member function.
16. List the names of RDBMS software.
Ans: oracle, cybase, ingres, Informix,db2,ms
access MySQL etc.
17. Write the syntax of SELECT with an example.
Ans: syntax: select column1,column2…column from
table name [where condition];
Example: select rollno,name from student;
18. List any two networking goals.
Ans: - resource sharing
-
Reliability
-
Cost
factor
-
Communication
medium
Answer any FIVE of the following.
Each question carries 3 marks. (5 X 3 = 15)
Each question carries 3 marks. (5 X 3 = 15)
19. Explain the characteristics of mother board.
Ans: following are the
characteristics of the motherboard,- Form factor: it refers to the motherboard’s geometry, dimensions, arrangement and electrical requirements. Advanced Technology Extended (ATX) is the most common design of motherboard for desktop computers
- Chipset: this controls most of the computer resources. It coordinates data transfer between the various components.
- The processor socket: it may be rectangular connector into which the processor is mounted vertically, or a square shaped connector with many small connectors into which the processor is directly inserted
20. How to covert NAND-to-AND
logic.
Ans:
Ans:
21. Explain memory representation of one-dimensional array.
LOC (A [P]) =base (A) +W (P-LB)
Where W is the number of words per memory cell
Example: suppose if a string S is used to store a string ABCDE in it with starting address at 1000, one can find the address of fourth element as follows
Now the address of element S[3] can be calculated as follows:
Address(S[3])=Base(S)+W(P-LB)
where W=1 for characters
=1000+1(3-0)
=1003
22. Explain array of pointers.
Ans: An array of pointers means
that it is a collection of addresses.Example: int *iptr[5];
int i=10,j=20,k=30,l=40,m=50;
iptr[0]=&i; *iptr[0]=10;
iptr[0]=&j; *iptr[0]=20;
iptr[0]=&k; *iptr[0]=30;
iptr[0]=&l; *iptr[0]=40;
iptr[0]=&m; *iptr[0]=50;
23. Differentiate between text file and binary file.
Ans: 1. Binary form: - The
information stored is in the form of Bits- No delimiters are used for a line
- No translation required
2. Text form: - The information stored is in the form of ASCII characters
- Each line of text is terminated with a special character known as EOL (End Of Line) character.
- Internal translation occurs
Ans: Following are the list of database applications
- Banking: used in banks for customer, accounts, loans and banking transaction information
- Water meter billing: meter number and all the details of the customer is stored in the database
- Rail and airlines: for reservations and schedule information
- Colleges: used to store students information, course registrations and grades
- Human resources: used to store information about employees, salaries, payroll taxes and benefits etc.
Ans: proprietary software is software that is neither open nor freely available. Its use is regulated and further distribution and modification is either forbidden or requires special permission by the supplier or vendor. Source code of proprietary software in normally not available.
26. Explain the structure of HTML.
Ans: <HTML> marks the beginning of HTML
<HEAD> begins the heading section
<TITLE>…</TITLE> gives title to the HTML document that appears on the title bar of the browser window. The text must appear between <HEAD>…</HEAD> tags; should be straight text, no other tags are to be used
</HEAD> defines the end of the heading
<BODY> defines the body of an HTML document; text written within the <BODY>…</BODY> tags appear on the canvas of the window
</BODY>
</HTML> defines the end of HTML document
Answer any SEVEN of the following.
Each carries 5 marks (7 X 5 =
35)
m1,m3,m5,m6,m7,m9,m11,m13.
Ans:
Ans: Step 1: set B=LB, E=UB LOC=-1
Step 2: while(B<=E)
M=(B+E)/2
If(ELE=A[M])
LOC=M
goto step 4
else
if(ELE<A[M])
E=M-1
else
B=M+1
end of while
Step 3:
if(LOC>=0)
PRINT LOC
else
PRINT “Search is
unsuccessful”
Step 4: exit.
Ans: An algorithm for PUSH() Operation
Step 1: if TOP=N then
PRINT “stack is full”
Exit
End of if
Step 2: TOP=TOP+1
Step 3: STACK[TOP]=ITEM
Ans: Following are the advantages of OOP over earlier programming methods
- Using class and objects, programs are modularized
- Linking code and object allows related objects to share common code. This reduces code duplication and code reusability
- As the data is encapsulated along with functions, the non-member functions cannot access or modify data. Thus, providing data security
- Complexity of the program development is reduced through the use of inheritance
- Reduces time, as creation and implementation of OOP code is easy
- Through message passing OOP communicates to the outside system
Ans:
procedural
programming
|
object
oriented programming
|
Variables
|
Objects
|
User defined data types
|
Classes
|
Structure members
|
Instance variables
|
Functions
|
Methods
|
Function class
|
Message passing
|
Ans: function overloading means two or more functions have same name, but differ in the number of arguments or data type of arguments. Therefore, it is said that function name is overloaded. The need for function overloading:
- When functions are overloaded, then the compiler automatically decides and executes appropriate function based on type of arguments and calls the required function. Thus the code is executed faster
- It is easier to understand the flow of information and debug
- Code maintenance is easy
- Easier interface between programs and real world objects
Ans: Rules for writing a constructor function are as follows
- A constructor name is always same as that of the class name.
- There is no return type for the constructors not even void.
- A constructor should be declared in public section.
- A constructor is invoked automatically when objects are created.
- It is not possible to refer to the address of constructors.
- The constructors make implicit calls to the operators new and delete when memory allocation is required.
Ans: inheritance has the following advantages
- Reusing existing code
- Faster development time
- Easy to maintain
- Easy to extend
- Memory utilization
Ans: the information processing cycle consists of five specific steps
- Input: any kind of data- letters, numbers, symbols, shapes, images or whatever raw material put into the computer system that needs processing. Input data is put into the computer using a keyboard, mouse or other devices such as the scanner, microphone and the digital camera. In general data must be converted to computer understandable form
- Processing: the processing is a series of actions or operations from the input data to generate outputs. Some of the operations are classification based on some condition, calculation, sorting, indexing, accessing data, extracting part of file/attribute, substring etc. conversion of data into information by the central processing unit. For example, when the computer adds 4+2=6 that is an act of processing
- Storage: data and information not currently being used must be stored so it can be accessed later. There are two types of storage, primary and secondary storage. Primary storage is the computer circuitry that temporarily holds data waiting to be processed (RAM) and it is inside the computer, secondary storage is where data is held permanently. A floppy disk, hard disk or CD. ROM is example of this kind of storage
- Output: the result or information obtained after processing the data must be presented to the user in user understandable form. The result may in the form of reports (hard copy or soft copy). Some of the output can be animated with sound and video/picture
- Communication: With wired and wireless communication connections, data may be input from a far , processed in a remote area and stored in several different places and then be transmitted by modem as an e-mail or posted to the website where the online services are rendered
Ans:
i) count(): this
function returns the number of rows that satisfies a condition written in WHERE
clause.
Ex: a) select count(*) from employee;
b)
select count(*) from employee where
dept=’computer science’;
i) max(): this function returns the
maximum value from the column.
Ex: select max(salary) from employee;
ii) min(): this function returns the
minimum value from the column.
Ex: select min(salary) from
employee;
iii) avg(): this function returns the average value of a
numeric column.
Ex: select avg(salary) from
employee;
iv) sum(): this function returns the
sum of a numeric column.
Ex: select sum(salary) from employee;
Ans:
- The
physical layer: it is concern with transmitting raw bits over a
communication channel.
It also deals with mechanical, electrical and timing
interfaces
- The data
link layer: it transform a raw transmission into a line that forms frame
- The
network layer: it determines how packets are routed from source to
destination
- The
transport layer: it splits up packets into smaller units if needed, and
pass these to the network layer and ensure that the pieces all arrive correctly at the other end
- The
session layer: it allows users on different machines to establish sessions
between them. It includes dialog control, token management and synchronization
- The
presentation layer: it is concerned with the syntax and semantics of the
information transmitted
- The
application layer: it contains a variety of protocols that are commonly
needed by the user. For example, HTTP (HyperText Transfer Protocol) which is
the bases for the World Wide Web (WWW) to access web pages.
2nd puc computer science model 1 question papers with answers
Reviewed by Vision Academy
on
January 14, 2020
Rating:

No comments: