2nd PUC Computer Science Model Question Paper 3 with Answers

Students can Download 2nd PUC Computer Science Model Question Paper 3 with Answers, Karnataka 2nd PUC Computer Science Model Question Paper with Answers helps you to revise the complete Karnataka State Board Syllabus and to clear all their doubts, score well in final exams.

Karnataka 2nd PUC Computer Science Model Question Paper 3 with Answers

Time : 3 Hrs. 15 Mins.
Max. Marks : 70

Section – A

I. Answer the following questions in a sentence each: (10 × 1 = 10)

Question 1.
Expand SDRAM.
Answer:
Synchronous Dynamic Random Access Memory.

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 2.
Write the truth table for OR gate.
Answer:
2nd PUC Computer Science Model Question Paper 3 with Answers 1

Question 3.
What is non – linear data structure?
Answer:
A data structure in which a data item is connected to several other data items is called non – linear data structure.

Question 4.
What do you mean by array at objects?
Answer:
The array of class type is known as array of object.

Question 5.
What is static memory allocation?
Answer:
The scheme of allocating memory before executing the program begins is called static memory allocation.

Question 6.
What is a database schema?
Answer:
A database schema is a way to logically group objects such as tables, views, stored procedures etc.

Question 7.
Name the two types of servers.
Answer:

  1. Non – dedicated servers.
  2. Dedicated servers

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 8.
What is the data speed of 2.5G networks?
Answer:
The data rates upto about 144 k bit/sec.

Question 9.
What is Telnet?
Answer:
It is a network protocol that allows a network user on one computer to log into another computer that is part of the same network.

Question 10.
What is the user of DHTML?
Answer:
It is a HTML extension that will enable a web page to react to user input without sending requests to the web server.

Section – B

II. Answer five questions. Each question carries two marks (5 × 2 = 10)

Question 11.
Explain principle of duality.
Answer:
Principle duality of theorem states that, starting with a Boolean relation can be derived by

  1. Changing each OR sign (+) to an AND sign (.)
  2. Changing each AND sign (.) to an OR sign (+)
  3. Changing each 0 by 1 and each 1 by 0.
    Ex : X + 1 = 0 dual X . 0 = 0

Question 12.
What is maxterm? Find the maxterm for X + Y + Z.
Answer:
The boolean expression containing all the input variables either in complemented or uncomplemented form in each of the sum term is known as a canonical POS expression and each term is called maxterm.
2nd PUC Computer Science Model Question Paper 3 with Answers 2

Question 13.
What is overloading? Mention its type.
Answer:
Overloading means two is more functions having same name but different types of arguments or different number of arguments. The two types of overloading are:

  1. Operator overloading
  2. Function overloading

Question 14.
Write any two features of parameterized constructors.
Answer:

  1. Parameterized constructors can be overloading.
  2. Parameterized constructors can have default arguments and default values.

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 15.
What is use of seek p () and seek g () functions?
Answer:

  1. Moves the put pointer to a specified location from the beginning of a file.
  2. Moves the get pointer to the a specified location from the beginning of a file.

Question 16.
What is relation algebra? Define cartesian product.
Answer:
Relation algebra is a formal system for manipulating relations. Operands of this algebra are relations. The cartesian product is also an operator which works each row in one table with each row in the other table.

Question 17.
What are the uses of Alter command in SQL?
Answer:

  1. To Add a column to an existing table.
  2. To Modify a column that already exists.

Question 18.
Mention any two types of virus.
Answer:
The two types of virus are:

  1. File virus.
  2. Network virus.

Section – C

III. Answer any five questions. Each questions carries three marks (5 × 3 = 15)

Question 19.
Briefly explain features of serial port.
Answer:
Serial port is used for connecting communication devices like modems or mouse. Serial port provide the serial transmission of data of one bit at a time. There are two types, namely com ports → 9 pin ports & 25 pinports.

Question 20.
Draw the logic gate diagram to implement AND OR gates using NAND gates only, (any two gates)
Answer:
AND Operation:
2nd PUC Computer Science Model Question Paper 3 with Answers 3

OR Operation:

Question 21.
Write an algorithm for traversal in a linear array.
Answer:
Let A be a linear array with LB & UB as lower bound and upper bound. This algorithm traverses the array, A by applying the operation PROCESS to each elements of A.
1. for LOC = LB – UB
PROCESS A [LOC]
End of for
2. Exit

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 22.
What is delete operator in C++? Give example.
Answer:
We can allocate storage for ci variable while program is running by using new operator. Dynamic allocation is perhaps the key to pointers. It is used to allocate memory without having to define variable & than make pointers point to them.

Question 23.
Differenciate between read ( ) and write ( ).
Answer:
The function read () is used to read binary data from a file & the function write () is used to write binary data to a file. It is used to write binary date to a file.

Question 24.
Write a note on Chen style of relation.
Answer:
The cardinality notation can be shown using Information Engineering style. Bachman style, Chen style & Martin style.

Chen style
One to zero or more 1 : N ( n = 0, 1, 2, 3…)
Zero or more to zero M : N (m and
or more n = 0,1, 2, 3, …)
One to one 1 : 1

Question 25.
Write a note on open sources?
Answer:
Open sources software, on the other hand, can be hand, can be freely used but it does not have to be free of charge. Here the company constructing the business models around open source software may recieve the payments concering supports, further development, what is important to known here is that in open source software, the source code is freely available to the customer. Open source doesn’t Just mean access to the source code. The distribution terms of open source. Software must comply with the following criteria.

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 26.
What do you mean by web hosting? Mention its type.
Answer:
Web hosting is a means of hosting web-server application on a computer system through which electronic content on the Internet is readily available to any web – browser client.
Various types of web hosting services are available:

  1. Free Hosting
  2. Virtual or shared hosting
  3. Dedicated hosting
  4. Collocation hosting

Section – D

IV. Answer any seven questions. Each questions carries 5 marks (7 × 5 = 35)

Question 27.
Find the complement of F = x + yz, then show that \(\text { F. } \overline{\mathbf{F}}=\mathbf{0}\) & \(\mathbf{F}+\overline{\mathbf{F}}=1\).
Answer:
The complement of F = x + yz is
\(\bar{F}=\overline{x+y z}\)
\(\overline{\mathrm{F}}=\overline{\mathrm{x}} \cdot(\overline{\mathrm{y}}+\overline{\mathrm{z}})\)
To show that \(\text { F. } \overline{\mathbf{F}}=\mathbf{0}\),
If F = 1, THEN 1 . 0 = 0
F = 0, then 0 . 1 = 0
∴ \(\text { F. } \overline{\mathbf{F}}=\mathbf{0}\). Hence proved.

To show that \(\mathbf{F}+\overline{\mathbf{F}}=1\)
if F = 1, then \(1+\bar{1}\) = 1 + 0 = 1
if F = 0, then \(0+\overline{0}\) = \(0+\bar{1}\) = 1
∴\(\mathbf{F}+\overline{\mathbf{F}}=1\).
Hence proved.

Question 28.
Write an algorithm to insert a data element at the rear end of the queue.
Answer:
Let QUEUE is the linear array consisting of N elements. FRONT is the pointer that contains the location of the element to be deleted and REAR contains the location of the inserted element. ITEM is the element to be inserted.
Step 1 : If REAR = N Then [ check for over flow]
PRINT “overflow”
Exit
Step 2 : If FRONT = NULL Then [check whether QUEUE is empty]
FRONT = 0
REAR = 0
Else
REAR = REAR + 1 [Increment REAR pointer]
Step 3 : QUEUE = [REAR] = ITEM [Copy ITEM to REAR position]
Step 4 : Return

Question 29.
Write a note on stacks.
Answer:

  1. A stack is an ordered collection of items where the addition of new items and the removal of existing items always takes place of the same end. This end is commonly refered to as the “top”. The end opposite to top is known as the base.
  2. One application of stack is recursive function / expression evaluation.
  3. The stack (), push (item), pup(), peek (), is empty () & six ( ) are the operations that can be performed on stacks
  4. The process of adding new item to the top of the stack is called PUSH and the process of removing the top item from the top of the stack is called pop operation.
  5. The data structure stack is called LIFO (Last in First Out) which means last inserted data item is removed first.
  6. The two types of representation of stacks in memory are static representation and dynamic representation.

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 30.
Explain on how arrays can be used as members of class with an example.
Answer:
The arrays can be used as data members and objects of a class as well.
In the example, the data member student name that contains 100 element of one-dimensional array.
Example:

class student
{
Private : 
int reg no, fees;
char studentname [50];
public :
void getdata();
void printdata ();
};
Student obj [100] ;

Question 31.
What is friend function? Write the syntax & example for friend function.
Answer:
A friend function is a non – member function that is a friend of a class. The friend function is declared with in a class with the prefix friend. But it should be defined outside the class like a normal function without the prefix friend.lt can access public data members like non member functions.
Syntax : – Class class – name
{
public :
friend void function 1( void);
};

Example:
class base
{
int val1 , val2;
public :
void get data ()
{
Cout << " Enter two values: " ; Cin >> val1 >> val2;
}
};
friend float mean (base ob);
float mean (base ob)
{
return float (ob. val1 + ob. val2) /2
}

Question 32.
Write the real life applications of object oriented programming.
Answer:

  1. Computer graphic application
  2. CAD / CAM software
  3. Object oriented database
  4. User Interface design such as Windows.
  5. Real time systems.
  6. Simulation & modeling
  7. Artificial intelligence & expert systems.

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 33.
Explain class definition & class declaration with syntax & example.
Answer:

  1. A class definition is a process of naming a class, data variable & operations of a class.
  2. A class declaration specifier the representation of objects of the class & set of operations that can be applied to such objects.

Defining a class:

class class - name
{
private :
Data members;
Member functions;
protected :
Data members;
Member functions ;
public :
Data members;
Member functions ;
};

Here, class Keyword used to declare a class Name ot the class.
Body of the class is enclosed in a pair of curled braces. Class body contains the declaration of class members [data members & member functions]. There are generally there types of members namely private, public & protected. There are called as access specifiers.
Ex:

class account
{
private :
int accno ;
char name [20] ; || implicit by default
char acctype [4];
int bal - amt;
public :
void get - date (); || Member functions
void display data ();
}

Question 34.
Explain the friend functions & their characteristics.
Answer:
A function is a non – member function that is a friend of a class, The friend function is declared inside the class with the perfix friend.

  1. A friend function although not a member function, has the full access right to the private & protect members of the classes.
  2. A friend function cannot be called using the object of the class. It can be invoked like any normal function.
  3. A friend function is declared by the class that is granting access. The friend declared. Can be placed anywhere in the class declaration. It is not affected by the access control keywords (public, private and protected)
  4. They are normal external functions that are given special access privileges.
  5. It cannot access the number variable directly & has to use an object- name member – name [Here, is a membership operator]
  6. The function is a declaration with the keyword friend But while defining friend function it does not use either keyword friend or :: operator.

2nd PUC Computer Science Model Question Paper 3 with Answers

Question 35.
Write the rules for writing a constructor function.
Answer:

  1. A constructor always has name that is same as the class name of which they are the members. This will help the complier to identity that they are the constructors.
  2. There is no return type for the constructor (not even viod). Since the constructors are called automatically by the system there is no program for it to return anything a return value world not make sense.
  3. A constructors should be declared in the public section.
  4. A constructors is invoked automatically when objects are created. Constructors can have default arguments.
  5. It is not possible to refer to the address of the constructros.
  6. The constructors make implicit class to the operators new & delete when memory allocation is required.

Question 36.
Write the advantages & Disadvantages of twisted pair cable.
Answer:
Advantages:

  1. It is simple & physically flexible
  2. It can be easily connected
  3. It is easy to install & maintain
  4. It has a low weight
  5. It is very inexpensive.

Disadvantages:

  1. It’s low bandwidth capabilities make it unsutiable for broadband applications.
  2. Because of high attenuation, it is incapable carrying a single over long distances without the use of repeaters.
  3. It supports maximum data rates 1 Mbps without conditioning and 10 Mbps with conditioning.

Question 37.
What is E-commerce? Explain types of E-commerce.
Answer:
E-Commerce can be defined as using telecommunications and computers to facilitate the trade of goods and services.

  1. Business – to – Business (B2B): The Exchange of services, information and /or products from one business to another Buriness partners. Ex E bay, com
  2. Business-to-Consumer(B2C): The Exchange of service, information and / or product from a business to consumer.
  3. Consumer – to -Business (C2B): Customer directly contact with business vendors by posting their project work with set budge online so that the needy companies review it and contact the customer directly with bid. The consumer reviews all the bids and selects the company for further processing. Ex: quree.com, feelancer.com.
  4. Consumer – to – Consumer: Electronic commerce is an internet facilitated form of business (commerce).