Students can Download 2nd PUC Computer Science Model Question Paper 1 with Answers, Karnataka 2nd PUC Computer Science Model Question Paper with Answers helps you to revise the complete Karnataka State Board Syllabus and to clear all their doubts, score well in final exams.
Karnataka 2nd PUC Computer Science Model Question Paper 1 with Answers
Time : 3 Hrs. 15 Mins.
Max. Marks : 70
Section – A
I. Answer the following questions in a sentence each: (10 × 1 = 10)
Question 1.
What is microprocessor?
Answer:
The CPU is fabricated as a single Integrated circuit [IC] chip and is also known as the microprocessor.
Question 2.
Write the standard symbol for AND gate.
Answer:
Question 3.
What are data structures?
Answer:
A data structure is a specialized format for organizing & shoring data.
Question 4.
Is it possible to access data outside a class?
Answer:
No.
Question 5.
How do we initialize a pointer?
Answer:
int num = 25;
int * ipter;
iptr = & num;
Question 6.
What is normalization?
Answer:
Normalization is the process of organizing data in a database.
Question 7.
Expand ARPANET.
Answer:
Advanced Reseach project Agency Network.
Question 8.
What are cookies?
Answer:
Cookies are messages that a web scanner transmits to a web browser so that a web scanner can keep hack of the users activity on a specific web site.
Question 9.
What are URL?
Answer:
URL stands for Uniform Resource Locator and it is the address of a file or resource on the internet.
Question 10.
Define a Domain.
Answer:
Name that identifies a computer on the Internet.
Section – B
II. Answer any 5 questions. Each question caries 2 marks (5 × 2 = 10)
Question 11.
What are the fundamental products for each at this input words ABCD = 0010, ABCD = 0110. Write SOP expression.
Answer:
Fundamental product are
0011 = \(\overline{\mathrm{A}} \overline{\mathrm{B}} \mathrm{C} \overline{\mathrm{D}}\)
0110 = \(\overline{\mathrm{A}} \mathrm{B} \mathrm{C} \overline{\mathrm{D}}\)
1110 = \(\mathrm{ABC} \overline{\mathrm{D}}\)
SOP expression is \(\overline{\mathrm{A}} \overline{\mathrm{B}} \mathrm{C} \overline{\mathrm{D}}+\overline{\mathrm{A}} \mathrm{B} \mathrm{C} \overline{\mathrm{D}}+\mathrm{ABC} \overline{\mathrm{D}}\)
Question 12.
Draw the general K – map for 4 – variables A, B, C & D.
Answer:
Question 13.
Explain data encapsulation?
Answer:
Data encapsulation combines data and functions into a single unit called class. Data encapsulation will present direct access to data. The data can be accessed only through methods present inside the class. The data cannot be modified by an external non – member function of a class.
Question 14.
Why are constructors needed in a program? Justify.
Answer:
It is sometimes convinient if an object can initialize object when it is first created, without the need to make a separate call to a member function. This is possible with special member functions. Automatic initialization is carried out using such a special member function called constructor.
Question 15.
Differentiate between if stream classes & of stream class.
Answer:
ifstream:
Stream class to read form files & provides input operations for file – It inherit the function get (), getline (), read () & functions supporting random access ( seekg () & tell g ()) from istream class defined inside iostream. h file.
ofstream:
Stream class to write on file and provides output operations for file. It inherit the function put (), and tellp() from ofstream class defined inside iostream. h file.
Question 16.
What is relation algebra?
Answer:
Relational algebra is the formal description of how a relational data base operates an interface to the data stored in the data base itself, the mathematics which underpin SQL operations.
Question 17.
What are logical operators in SQL.
Answer:
ALL, AND, BETWEEN, EXISTS, ANY, NOT, OR, IN, LIKE, ISNULL, UNIQUE.
Question 18.
What is SIM card?
Answer:
The SIM stands for subscriber Identify Module – is a chip card, the size of a cellular device its unique phone number. It has memory, a processor and the ability to interact with the user.
Section – C
III. Answer any 5 questions. Each question caries 3 marks (5 × 3 = 15)
Question 19.
Explain the characteristics of motherboard.
Answer:
The characteristics of motherboard are:
1. Form factors:
Refers to the motherboard’s geometry, dimensions, arrangement and electrical requirements, different standards have been developed to build motherboards, which can be used in different brands. Advanced Technology Extended. (ATX) is the most common design of motherboard for desktop computers.
2. Chipset:
Controls the majority of resources of the computer. The function of chipset integrated into the motherboard, which includes a recent chipset, in order to maximize the computer’s upgradeability.
3. The processor socket may be a regular connector into which the processor is mounted vertically or a square shaped connector with many small connectors into .which the processor is directly inserted.
Question 20.
Draw the logical gate diagram to implement Not gate using NAND and NOR.
Answer:
Question 21.
Explain the memory representation of queue using arrays.
Answer:
Queue is represented in the memory linear array. Let QUEUE be linear queue. Two pointer variable called FRONT and REAR are maintained. The pointer variable FRONT contains the location of the element to be removed and the pointer variable REAR contains location of the last element inserted. The condition FRONT = NULL indicates that the queue is empty and the condition REAR =N indicates that the queue is full.
Question 22.
What is new operator in C++? Give example.
Answer:
We can allocate storage for a variable while program is running by using new operator. Dynamic allocation is perhaps the key to pointers. It is used to allocate memory without having to define variable & then make pointers point to them.
Question 23.
Mention the types of file. Explain any one.
Answer:
Binary file & text files. Text file is a file that stores information in ASCLL characters. In the text files. Each line of text is termnated with the special character known as EOL (End-of-Line) character & delimiter character, when this EOL character is read or written, certain internal translations take splace.
Question 24.
Give the different notations for E – R diagram.
Answer:
Entity:
An entity is represented using rectangles. Double rectangle represents weak entity In E – R diagram
In E – R diagram
An attribute is represented using eclipse
Composite Attribute Example
Relationship is represented using diamonds.
Question 25.
Write the advantages of www.
Answer:
The WWW (World Wide Web) is a set of protocols that allows you to access any document on the net through a naming system based on URL’s. WWW also specifies a way the Hypertext Transfer Protocol (HTTP) to send a document over the internet. Before WWW Internet was mainly used for obtaining textual information. But post- WWW, the Internet popularity grew tremendously because of graphic-intensive nature of WWW.
Question 26.
What are the steps involved in hosting a web page.
Answer:
- Domain Registration
- E-mail forwarding
- Site Statistics
- Business Account
- Front page Extensions
- CGI, perl, & PHP. scripts
Section – D
IV. Answer any seven questions. Each question carries 5 marks (7 × 5 = 35)
Question 27.
State and prove De – Morgan’s theorem algebraically.
Answer:
To prove De- Morgan’s 1st theorem, \(\overline{x+y}=\bar{x} \cdot \bar{y}\). we will use complementarity laws.
Let us assume that P = x + y.
Where p, x, y are logical variables.
Then, according to complementation law \(p+\bar{p}=1\) and p . p = o. i.e, if p, x, y are Boolean variables then this complementarity law must hold for variable p.
In other words, \(\overline{\mathrm{p}}\) i.e, if \(\overline{x+y}=\bar{x} \cdot \bar{y}\) then (x + y) + \(\overline{x y}\) must be equal to 1 (As x + \(\bar{x}\) = 1) and (x + y) . \(\overline{x y}\) must be equal to 0 (As \(x \bar{x}\) = 0)
Let us prove the 1st part, i.e, (x + y) + (\(\overline{x y}\)) + 1
To prove 2nd theorem (\(\overline{x y}\)) = \(\bar{x}+\bar{y}\) we will make use of complementarity law i.e.,
x + \(\bar{x}\) = 1 and x . \(\bar{x}\) = 0
If xy’s complement is \(\bar{x}+\bar{y}\) then it must be true that
- xy + \((\bar{x}+\bar{y})\) = 1
- xy + \((\bar{x}+\bar{y})\) = 0
To prove that i.e, xy + \((\bar{x}+\bar{y})\) = 0
1. LHS =
= 1
= RHS
2. LHS =
= 0 . y + x . 0
= 0 + 0
= RHS
xy . \((\bar{x}+\bar{y})\) = 0 and xy \((\bar{x}+\bar{y})\) = 1
Thus \(\overline{x \cdot y}=\bar{x}+\bar{y}\)
Hence the theorem proved.
Question 28.
What are the operations performed on linear data structures?
Answer:
- Traversal: The process of accessing each data item exactly once to perform some operation is called traversing
- Insertion: The process of adding a new data item into the given collection of data items is called insertion.
- Deleting : The process of removing an existing data item from the given collection of data items is called deletion.
- Searching : The process of finding the location of a data item in the given collection of data is called searching.
- Sorting: The process of arrangement of data items in ascending or descending order is called sorting
- Meaning: The process of combining the data items of two structures to form a single structure is called merging.
Question 29.
Write an algorithm to insert an element into the array.
Answer:
A is array with N elements. ITEM is the elements to be inserted in the position p.
Step 1 : for I = N – 1 down to P
A [I + 1] = A [ I ]
End of for
Step 2 : A[ P ] = ITEM
Step 3 : N = N + 1
Step 4 : Exit
Question 30.
Explain the advantages at OOPs.
Answer:
- The programs are modularized based on the principle of classes & objects.
- Linking code & object allows related objects to share common code. This reduces the code duplication and code reusability.
- Data encapsulated along with the functions. Therefore the external non member functions cannot access or modify data, thus providing data security.
- Easier to develop complex software, because complexity can be minimized through inheritance.
- The concept of data abstraction separates object specification & object implementation.
- Creation & implementation of OOP code is easy & reducess software development time.
- OOP can communicate through message passing which makes interface description units out side system is very simple.
Question 31.
Illustrate with an example how an array of objects can be defined.
Answer:
An array having class type elements is known as arrray od objects. An array of object is defined after the class definition and is defined in the same way as any other array.
Question 32.
Explain the features of copy constructor.
Answer:
1. Copy constructors is not invoked explicitly.
2. Copy constructor is invoked automatically when a new object is created & equated to an already existing object in the declaration statement itself.
ex: x a1; | | default contructor
x a2; | | copy contructor
a1, display();
The above example shows the use of copy constructor to create a new object a2 using existing object a1.
3. When a new object is declared & existing object is passed instructor is invoked,
ex: x a1 (100, 200); | | parameterized constructor
x a2 (a); | | copy constructor is invoked for
| | object a2 with al as parameter
4. When an object is passed to a function using pass – by value, copy constructor is automatically called.
ex: void test (x b)
{
}
main ()
{
x a;
test (a); | | copy constructor is invoked
5. Copy constructor is invoked when as object returns a value.
Question 33.
What are the types of inheritance? Explain any two.
Answer:
- Single Inheritance
- Multilevel Inheritance
- Multiple Inheritance
- Hierarchical Inheritance
- Hybrid Inheritance
Question 34.
Explain Codd’s rules for database management.
Answer:
Rule zero:
This rule states that for a system to quality as an RDBMS, it must be able to manage database entity through the relational capabilities.
Rule No – 1: Information rule
All information (including meta -data) is to be represented as stored data in cells of tables. The rows and columns have to be strictly unordered.
Rule – 2: Guaranteed access
Each unique piece of data (atomic value) should be accessible by: Table Nam + primary Key (row) + Attibute (Column).
Rule – 3: Sustematic treatment of Null
Null has server meanings, it can mean missing data, not applicable or no value, It should be handled consistently, primary key must not be null. Expression on null must give NDLL.
Rule – 4: Active online catalog
Database dictionary (catalog) must have description of database, catalog to be governed by some rule as rest of the database.
Rule – 5: Powerful Language.
One well defined language must be there to provide all manners of access to data, for ex: SQL
Rule – 6: view updation rule.
All view that are theoritically updatable should be updatable system.
Rule – 7: Relational Level Operation.
There must be Insert, delete, update operations at each level of* relations. Set operation like union, Intersection and minus should also be supported.
Rule – 8: Physical Data Independence
The physical storage of data should not matter to the system.
Rule – 9: Logical Data Independence
If there is change in the logical structure (table structure) of the database the user view of data should not change.
Rule – 10: Integrity Independence
The database should be able to con – force its own integrity rather than using other programs.
Rule – 11: Distribution Independence.
A database should work properly regardless of its distribution across a network. This lays foundation of distributed database.
Rule -12: Non – subversion rule
If low level access is allowed to a system it should not be able to subvert or bypass integrity rule to change data. This can be achieved by some sort of looking or encryption.
Question 35.
Write the difference b/w order by & group by commands with examlpes.
Answer:
ORDER BY clause is used to sort the data in ascending or deseeding order, based on one or more columns. Some database sorts query results in ascending order by default.
Syntax:
SELECT column – list
From table-name [wher condition]
[ORDER by column 1, column 2, —-column N] [ASC/DESC];
SQL> select id, name, salary from employees order by salary;
GROUP BY clause is used in collaboration with the select statement to arrange the identical data into groups. The group by clause follows the WHERE CLAUSE in a SELECT statement and precedes the ORDER by clause.
Syntax:
SELECT column 1, column 2
FROM table-name
WHERE [conditions]
GROUP BY column 1, column2
ORDER BY column 1, column2
Ex: Select id name from Employee group by department;
Question 36.
Give the measures for preventing virus.
Answer:
Virus privention is not difficult task. All you need to be is extra careful of ensure to follow the following guidelines to lead virus fee computing life.
- Never use a ” foreign” disk or Cd without scanning it for virus.
- Allows scan files downloaded from the internet or that sources .
- Never boot your PC from a floppy unless you are certain that it is virus free.
- Write protect your disks.
- Use licensed software.
- Password protect your PC to prevent unattended modification.
- Install & use antivirus software.
- Keep antivirus software upto date.
Some of the antivirus are kaspersky, Quikheal, K7, Norton 360, Micro Trend Titanium, AVG, panda, [SET ESET] Nod 32, Avast. MCAFEE etc.,
Cloud technology:
Cloud technology or cloud computing as it is more commonly known today is a computing platfrom widely used by information Technology (IT) service companies.