SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION

Size: px
Start display at page:

Download "SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION"

Transcription

1 Computer Science (4) Q.NO Expand SCSI Small computer system interface PART-A Name the gate which produces output 0, if there are even numbers of s in the input XOR What is complete tree? Tree in which each leaf is at the same distance from the root. i.e. all the nodes have maximum two subtrees. 4 Name the two types of members referenced in a class? Data members and meber functions. What is free store? Free store is a pool of unallocated memory heap given to a program that is used by the program for dynamic allocation during execution. 6 Define is data mining? Data mining is concerned with the analysis and picking out relevant information. It is the computer, which is responsible for finding the patterns by identifying the underling rules of the features in the data. 7 Expand OSI. Open system interconnect 8 What are cookies? Cookies are messages that a web server transmits to a web browser so that a web server can keep track of the user s activity on a specific web site 9 What is WC? WC is acronym for World Wide Web Consortium. WC is responsible for producing the software standards for World Wide Web 0 Define dedicated hosting. In this type of hosting, the company wishing to go online, rents an entire web server from the hosting company. This is suitable for companies hosting larger websites State and prove complementarity laws? a) X +X = Proof by perfect induction: If X = 0, LHS = X+ X = 0 + = = RHS If X =, LHS = X + X =+ 0 = = RHS Thus X+ X = SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION PART-B b) X. X=0 Proof by perfect induction: If X= 0, LHS = X. X = 0. = 0 = RHS If X =, LHS = X. X =.0 = 0 = RHS Thus X. X = 0 MARKS

2 Prove X.(X+Y)=X L.H.S=X.(X+Y) =X.X+X.Y =X+X.Y =X(+Y)=X=RHS Explain any two applications of OOP s.. Computer graphic applications. CAD/ CAM Software. Object -Oriented Database 4. User Interface design such as Windows. Real-time systems 6. Simulation and Modeling 7. Artificial intelligence and expert systems 4 Mention the features of default constructor. A constructor which does not accept any arguments is called a zero argument constructor. Features of default constructor are For every object created, this constructor is automatically called. All objects of a class are initialized to same set of values by the default constructor. If different objects are to be initialized with different values, it cannot be done using default constructor. Which are the types of data file. Text file:it is a file that stores information in ASCII characters. Binary file:it is a file that contains information in the same format as it is held in memory. 6 What is DBMS? Give an example for DBMS software. DBMS-DATABASE MANAGEMENT SYSTEM: A DBMS is a software that allows creation, definition and manipulation of database. DBMS is actually a tool used to perform any kind of operation on data in database. 7 Differentiate between ORDER BY and GROUP BY clause used in SQL. Give example for each. ORDER BY clause is used to sort the data in ascending or descending order, based on one or more columns. Some database sorts query results in ascending order by default. e.g.: select id,name from emp ORDER BY salary GROUP BY clause is used in collaboration with the SELECT statement to arrange identical data into groups. The GROUP BY clause follows the WHERE clause in a SELECT statement and precedes the ORDER BY clause. SELECT column, column FROM table_name WHERE [ conditions ] GROUP BY column, column ORDER BY column, column 8 What is communication (transmission) mode? Explain any one communication mode The communication mode defines in which data can flow depending upon the type media used. They are Simplex, Half Duplex and Full Duplex. Simplex: On this panel there is only one interface that is a transmitter and all other interfaces is a receiver. Half Duplex: On this channel each interface works as transmitter and receiver, but only one interface can transmit at a time. Full Duplex: This channel has two ends, each serving as transmitter and receiver. Each interface can transmit and receive at the same time. The modern telephone system use Full Duplex channels.

3 9 Explain different components of motherboard? Components of Motherboard Processor (CPU) BIOS CMOS Slots Disk Controllers I/O Ports and Interfaces BUS 0 Construct OR and NOT operation PART-C a) Using only NOR gate b) Using only NAND gate NOT using NOR logic A A A NOR A = A + A =A OR using NOR logic A B A + B (A NOR B) NOR (A NOR B) A+ = A + B NOR A + B = (A + B) + (A + B) = A + B [X+X=X] = A+B [X=X] Similarly using NAND Write an algorithm to delete an element from the array. Algorithm: A is the array with N elements. ITEM is the element to be deleted in the position P and it is stored into the variable Item. Step : Item = A[P] Step : for I = P to N- A[I] = A[I+] End of for Step : N = N- Step 4: Exit

4 4 Explain the operations performed on pointer We can add an integer value to a pointer. We can subtract an integer value from a pointer We can compare two pointers, if they point the elements of the same array We can subtract one pointer from another pointer if both point to the same array. We can assign one pointer to another pointer provided both are of same type. Discuss the file mode parameters in C++. File mode parameter Meaning Stream Type ios::app Append to end of file ofstream ios::in Open file for reading only ifstream ios::out Open file for writing only ofstream ios::ate Open file for updation and move ifstream,ofstream the file pointer to the end of file ios::binary Opening a binary file ifstream,ofstream 4 What are the advantages of random/direct access file organization? Random/Direct Access File Organization: Direct access file organization allow immediate direct access to individual records on the file. The record are stored and retrieved using a relative record number, which gives the position of the record in the file. This type of organization also allows the file to accessed sequentially. The primary storage in a CPU truly provides for direct access. There are some devices outside the CPU which can provide the direct feature; the direct access storage devices have the capability of directly reaching any location. Although there are several types of storage devices including discs and other mass storage. What are the services of E-commerce? Electronic Funds transfer(eft) Electronic Benefits transfer(ebt), Electronic forms(online admissions forms for college and other registrations) Digital cash(dc) Interoperable database access Bulletin Boards(BBs) Electronic Banking(EB) 6 Explain features of DHTML DHTML refers to web content that changes each time it is viewed. For example, the same URL could result in a different page depending on any number of parameters. Features in Dynamic HTML An object-oriented view of a Web page and its elements Cascading style sheets and the layering of content Programming that can address all or most page elements Dynamic fonts

5 PART-D 7 Given the Boolean function F W, X, Y, Z = π(0,4,8,9,0,,,,), reduce using K-map REDUCED FORM Y Z W X W Y W Y Z 8 Write an algorithm for insertion sort method. Algorithm: Let A be an array with N unsorted elements. The following algorithm sorts the elements in order. Step : for I = to N- Step : J = I While ( J >= ) If( A[J] < A[J-]) temp = A[J] A[J] = A[J-] A[J-] = temp If end J = J- While end for end Step :Exit 9 What is linear data structure? Explain the operations performed on linear data structure Linear data structures are a kind of data structure that has homogenous elements. Each element is referred to by an index. The linear data structures are Stack, Queues and Linked Lists. Traversal: The process of accessing each data item exactly once to perform some operation is called traversing. Insertion: The process of adding a new data item into the given collection of data items is called insertion. Deletion: The process of removing an existing data item from the given collection of data items is called deletion.

6 6 Searching: The process of finding the location of a data item in the given collection of data items is called as searching. Sorting: The process of arrangement of data items in ascending or descending order is called sorting. Merging: The process of combining the data items of two structures to form a single structure is called merging. 0 Give the difference between Procedural oriented programming and Object oriented programming ANY DIFFERENCE Write the general syntax for defining and declaring classes and objects. Explain the terms and give example. Syntax : class class_name { private: Variable declaration; Function declaration; public: Variable declaration; Function declaration; protected: Variable declaration; Function declaration; }; The keyword class is used to declare a class. The class_name is a User-defined name. The class body is enclosed within a pair of flower brackets followed by semicolon. The class body contains the declaration of data variables and functions. The Data variables are known as data members of a class. The Function declarations in a class are called Member functions. There may be zero or more member functions in a class. This is also known as interface. The private, protected, public are the access control specifiers. For Example : class item { private: int itemcode; public: void display(); }; Declaring object of a class (Declaration of a class): The declaration of objects is same as declaration of variables of basic data types. An object is an instance of a class template. When objects are created only during that moment the memory is allocated to them. Syntax: class classname { private: //members and methods public: }; classname object,object,. ;

7 7 For Example - : class student { private: int rollno; public: void getdata( ); }; student obj, obj; / / obj, obj are objects of class student When function overloading is needed? Write advantages and restrictions of function overloading. Function overloading means two or more functions have same name, but differ in the number of arguments or data type of arguments. Therefore it is said that (function name) is overloaded. Function overloading therefore is the process of defining same function name to carry out similar types of activities with various data items. The advantages of function overloading are: When different functions are created for different operations, then user has to call respective function depending on the situation. Instead, for different situations if the same function is called with different arguments using function overloading, then the compiler automatically decides about the appropriate function by comparing the argument types used in the call to the function and calls the required function. Thus the code is executed faster. It is easier to understand the flow of information and debug. Code maintenance is easy. Easier interface between programs and real world objects Restrictions on overloaded functions Each function in a set of overloaded functions must have different argument list. If typedef is used for naming functions, then the function is not considered as different type What is constructor? Give the rules for writing a constructor function A constructor is a special member function that is used in classes to initialize the objects of a class automatically. A constructor is a member function of a class with the same name as that of the class. A constructor is defined like other member functions of a class. It can be defined either inside the class definition or outside the class definition. It is called constructor because it constructs the values of data members of the class. The following rules are used for writing a constructor function: A Constructor always has name that is same as the class name of which they are the members. This will help the compiler to identify that they are the constructors. There is no return type for constructors (not even void). Since, the constructor is called automatically by the system, there is no program for it to return anything to; a return value would not make sense. A constructor should be declared in public section. A constructor is invoked automatically when objects are created. Constructors can have default arguments. It is not possible to refer to the address of the constructors. The constructors make implicit calls to the operators new and delete when memory allocation is required. 4 What is inheritance? Mention its types. Explain the advantages of inheritance Inheritance is the capability of one class to inherit properties from another class. Single inheritance Multilevel inheritance Multiple inheritance Hierarchical inheritance. Hybrid inheritance

8 8 Inheritance has following advantages: Reusing existing code Faster development time Easy to maintain Easy to extend Memory utilization Differentiate between hierarchical data model and network data model. Hierarchical model: This model was developed by IBM. Network Model: The network data model is that a parent node can This data model organizes the data in a tree-like have many child nodes and a child node can also structure, in which each child node can have have many parent nodes. This model was presented only one parent node. by CODASYL (conference on data systems languages). In this model, the data is also This data model comprises a set of records represented by a collection of records. The connected to one another through links. relationships among the data represented by links. The link is an association between two or more All the nodes are linked to each other without any records. hierarchy. In network model the data is organized is Advantage: both the retrieval and updates can in the form of graphs. be highly optimized by the DBMS. Disadvantage: the link is permanently established and cannot be modified. Advantage: It permits the modelling of many-tomany relationships in data. Disadvantage: it is complicated to maintain all the links. 6. Explain various group functions available in SQL Group Functions:- These functions group the rows of data based on the values returned by the query. These functions are used to calculate aggregate values like total or average, which return just one total or average value after processing a group of rows. Aggregate Functions in SQL are COUNT(), MAX(), MIN(), AVG(), SUM(), DISTINCT() 7. What is network security? Mention and explain protection methods. Network Security: To define the mechanism of providing security over network to the clients and servers. Network security is to make sure that only legal or authorized user and programs gain access to information resources like databases. Under this type of security, mechanisms like authorization, authentication, encrypted smart cards, biometrics and firewalls, etc are implemented. PROTECTION METHODS. Authorization: It determines whether the service provider has granted access to the web service to the requestor. Authorization confirms the service requestor s certificate.. Authentication: Authentication also termed as password protection as the authorized user is asked to provide a valid password and if he or she is able to do this, he or she considered to be an authentic user.. Encrypted Smart Cards: An encrypted smart card is a hand held smart card that can generate a token that a Computer system can recognize. Every time a new and different token is generated, which even though cracked or hacked, cannot be used later. 4. Bio Metric Systems: They form the most secure level of authorization. The Biometric systems involve some unique aspects of a person s body such as finger prints retinal patterns, etc. to establish his/ her identity. Firewall: A system designed to prevent unauthorized access to or from a private network is called firewall. There are several types of firewall techniques. i. Packet Filter ii. Application gateway iii.circuit Level Gateway iv. Proxy Server

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70 Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70 I. Answer ALL the questions 10 x 1= 10 1. What is DHTML? Dynamic HTML is a term used to describe the combination of HTML, style

More information

Government of Karnataka SYLLABUS FOR SECOND PUC - COMPUTER SCIENCE (41) SUB-UNITS

Government of Karnataka SYLLABUS FOR SECOND PUC - COMPUTER SCIENCE (41) SUB-UNITS SL No NAME OF THE UNIT/CHAPTER 1 Typical configuration of Computer system Organisation 5 Hrs/ 4 Marks BOOLEAN ALGEBRA 15 Hrs/ 13 Marks Government of Karnataka SYLLABUS FOR 014-015 SECOND PUC - COMPUTER

More information

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70 Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 5 min Max. marks : 7 I. Answer ALL the questions x =. Expand the term DDRRAM. Double Data Rate Random Access Memory 2. Write the standard symbol for

More information

ONE MARKS QUESTION AND ANSWERS

ONE MARKS QUESTION AND ANSWERS ONE MARKS QUESTION AND ANSWERS Question No 1 Typical Configuration of Computer System: 1. What is a motherboard? The motherboard is the most important circuit board of the computer; all the components

More information

SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session

SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session 2008-09 Sr.No. Duration Number of Working Days From To Topic to be Covered Nos. of Periods required CAL/TAL

More information

3.Constructors and Destructors. Develop cpp program to implement constructor and destructor.

3.Constructors and Destructors. Develop cpp program to implement constructor and destructor. 3.Constructors and Destructors Develop cpp program to implement constructor and destructor. Constructors A constructor is a special member function whose task is to initialize the objects of its class.

More information

IMPORTANT QUESTIONS WITH ANSWERS FOR II PU FINAL EXAMINATION

IMPORTANT QUESTIONS WITH ANSWERS FOR II PU FINAL EXAMINATION IMPORTANT QUESTIONS WITH ANSWERS FOR II PU FINAL EXAMINATION Chapter 1: Configuring a computer system ONE mark questions 1. What is a motherboard? Ans.: A Printed Circuit Board (PCB) used to connect all

More information

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 7 Introduction to Structured Query Language (SQL)

Database Systems: Design, Implementation, and Management Tenth Edition. Chapter 7 Introduction to Structured Query Language (SQL) Database Systems: Design, Implementation, and Management Tenth Edition Chapter 7 Introduction to Structured Query Language (SQL) Objectives In this chapter, students will learn: The basic commands and

More information

VALLIAMMAI ENGINEERING COLLEGE

VALLIAMMAI ENGINEERING COLLEGE VALLIAMMAI ENGINEERING COLLEGE SRM Nagar, Kattankulathur 603 203 DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK B.E. - Electrical and Electronics Engineering IV SEMESTER CS6456 - OBJECT ORIENTED

More information

CSC Web Programming. Introduction to SQL

CSC Web Programming. Introduction to SQL CSC 242 - Web Programming Introduction to SQL SQL Statements Data Definition Language CREATE ALTER DROP Data Manipulation Language INSERT UPDATE DELETE Data Query Language SELECT SQL statements end with

More information

ADMINISTRATIVE MANAGEMENT COLLEGE

ADMINISTRATIVE MANAGEMENT COLLEGE First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and

More information

COIMBATORE EDUCATIONAL DISTRICT

COIMBATORE EDUCATIONAL DISTRICT COIMBATORE EDUCATIONAL DISTRICT REVISION EXAMINATION JANUARY 2015 STD-12 COMPUTER SCIENCE ANSEWR KEY PART-I Choose the Correct Answer QNo Answer QNo Answer 1 B Absolute Cell Addressing 39 C Void 2 D

More information

MODEL PAPER -1 PART-A. 3.Define an array? An array is a linear data structure contain homogeneous data elements with a common name.

MODEL PAPER -1 PART-A. 3.Define an array? An array is a linear data structure contain homogeneous data elements with a common name. 1.Expand PCI? Pheripheral component interconnect MODEL PAPER -1 PART-A 2.What do you understand by the truth function? A truth function is a function formed using set of truth values. 3.Define an array?

More information

Short Notes of CS201

Short Notes of CS201 #includes: Short Notes of CS201 The #include directive instructs the preprocessor to read and include a file into a source code file. The file name is typically enclosed with < and > if the file is a system

More information

CS201 - Introduction to Programming Glossary By

CS201 - Introduction to Programming Glossary By CS201 - Introduction to Programming Glossary By #include : The #include directive instructs the preprocessor to read and include a file into a source code file. The file name is typically enclosed with

More information

Code No: R Set No. 1

Code No: R Set No. 1 Code No: R05010106 Set No. 1 1. (a) Draw a Flowchart for the following The average score for 3 tests has to be greater than 80 for a candidate to qualify for the interview. Representing the conditional

More information

4. BOOLEAN ALGEBRA 8 5. NETWORKING AND OPEN SOURCE SOFTWARE 10

4. BOOLEAN ALGEBRA 8 5. NETWORKING AND OPEN SOURCE SOFTWARE 10 SPLIT UP SYLLABUS SUBJECT : COMPUTER SCIENCE (083) SESSION:2014-15 Class XII (Theory) - C++ Duration: 3 hours Total Marks: 70 Unit No. Unit Name MARKS 1 OBJECT ORIENTED PROGRAMMING IN C++. 2. DATA STRUCTURE

More information

OBJECT ORIENTED PROGRAMMING USING C++ CSCI Object Oriented Analysis and Design By Manali Torpe

OBJECT ORIENTED PROGRAMMING USING C++ CSCI Object Oriented Analysis and Design By Manali Torpe OBJECT ORIENTED PROGRAMMING USING C++ CSCI 5448- Object Oriented Analysis and Design By Manali Torpe Fundamentals of OOP Class Object Encapsulation Abstraction Inheritance Polymorphism Reusability C++

More information

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder MCA Lateral 1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder 2. What would be the output of the following C program? main ( ){ int

More information

STIDistrict Query (Basic)

STIDistrict Query (Basic) STIDistrict Query (Basic) Creating a Basic Query To create a basic query in the Query Builder, open the STIDistrict workstation and click on Utilities Query Builder. When the program opens, database objects

More information

SQL functions fit into two broad categories: Data definition language Data manipulation language

SQL functions fit into two broad categories: Data definition language Data manipulation language Database Principles: Fundamentals of Design, Implementation, and Management Tenth Edition Chapter 7 Beginning Structured Query Language (SQL) MDM NUR RAZIA BINTI MOHD SURADI 019-3932846 razia@unisel.edu.my

More information

Computer Science Engineering Sample Papers

Computer Science Engineering Sample Papers See fro more Material www.computetech-dovari.blogspot.com Computer Science Engineering Sample Papers 1 The order of an internal node in a B+ tree index is the maximum number of children it can have. Suppose

More information

Chapter 7. Introduction to Structured Query Language (SQL) Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel

Chapter 7. Introduction to Structured Query Language (SQL) Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel Chapter 7 Introduction to Structured Query Language (SQL) Database Systems: Design, Implementation, and Management, Seventh Edition, Rob and Coronel 1 In this chapter, you will learn: The basic commands

More information

Department of Computer science and Engineering Sub. Name: Object oriented programming and data structures Sub. Code: EC6301 Sem/Class: III/II-ECE Staff name: M.Kavipriya Two Mark Questions UNIT-1 1. List

More information

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which

More information

(DMCA101) M.C.A. DEGREE EXAMINATION, MAY First Year INFORMATION TECHNOLOGY

(DMCA101) M.C.A. DEGREE EXAMINATION, MAY First Year INFORMATION TECHNOLOGY (DMCA101) M.C.A. DEGREE EXAMINATION, MAY - 2017 First Year INFORMATION TECHNOLOGY Time : 3 Hours Maximum Marks : 70 SECTION - A (3 15 = 45) Answer any three of the following Q1) Discuss business pressures

More information

LIST OF EXPERIMENTS. (1) (Office Automation)

LIST OF EXPERIMENTS. (1) (Office Automation) LIST OF EXPERIMENTS (1) 310042 (Office Automation) 1 Computer Fundamentals 2 DOS Command 3 Execute DOS Command using examples. 4 Introduction to windows & familarity with controls. 5 Introduction of Ms-Office

More information

CERTIFICATE IN WEB PROGRAMMING

CERTIFICATE IN WEB PROGRAMMING COURSE DURATION: 6 MONTHS CONTENTS : CERTIFICATE IN WEB PROGRAMMING 1. PROGRAMMING IN C and C++ Language 2. HTML/CSS and JavaScript 3. PHP and MySQL 4. Project on Development of Web Application 1. PROGRAMMING

More information

CS201 Latest Solved MCQs

CS201 Latest Solved MCQs Quiz Start Time: 09:34 PM Time Left 82 sec(s) Question # 1 of 10 ( Start time: 09:34:54 PM ) Total Marks: 1 While developing a program; should we think about the user interface? //handouts main reusability

More information

Computer Science 330 Assignment

Computer Science 330 Assignment Computer Science 330 Assignment Note: All questions are compulsory. The marks for each question are given at the same place. Max. Marks: 20 (ii) Write your name, enrolment number, AI name and subject etc.

More information

Fall 2017 CISC/CMPE320 9/27/2017

Fall 2017 CISC/CMPE320 9/27/2017 Notices: CISC/CMPE320 Today File I/O Text, Random and Binary. Assignment 1 due next Friday at 7pm. The rest of the assignments will also be moved ahead a week. Teamwork: Let me know who the team leader

More information

KENDRIYA VIDYALAYA SANGATHAN

KENDRIYA VIDYALAYA SANGATHAN KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION Winter Stations CLASS: XII SESSION: 2016-17 SPLIT-UP SYLLABUS Computer Science MONTH PORTION TO BE COVERED THEORY PRACTICAL April May-June 2016 UNIT-1 REVIEW:

More information

Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS

Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS Contents Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS 1.1. INTRODUCTION TO COMPUTERS... 1 1.2. HISTORY OF C & C++... 3 1.3. DESIGN, DEVELOPMENT AND EXECUTION OF A PROGRAM... 3 1.4 TESTING OF PROGRAMS...

More information

CGS 2405 Advanced Programming with C++ Course Justification

CGS 2405 Advanced Programming with C++ Course Justification Course Justification This course is the second C++ computer programming course in the Computer Science Associate in Arts degree program. This course is required for an Associate in Arts Computer Science

More information

KENDRIYA VIDYALAYA SANGATHAN BHUBANESWAR REGION SPLITUP SYLLABUS FOR COMPUTER SCIENCE CLASS XII

KENDRIYA VIDYALAYA SANGATHAN BHUBANESWAR REGION SPLITUP SYLLABUS FOR COMPUTER SCIENCE CLASS XII KENDRIYA VIDYALAYA SANGATHAN BHUBANESWAR REGION SPLITUP SYLLABUS FOR COMPUTER SCIENCE 2015-16 CLASS XII MONTH PORTION TO BE COVERED THEORY PRACTICAL April-May 2015 June-July 2015 Aug-2015 REVIEW: C++ covered

More information

KENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083

KENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083 KENDRIYA VIDYALAYA SANGATHAN Regional Office Delhi Split-up Syllabus Session-2017-18 Subject:-Computer Science Subject Code:-083 COMPUTER SCIENCE (083)-Theory CLASS XII Unit wise Weightage of Marks Duration:3

More information

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR

SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR SRM ARTS AND SCIENCE COLLEGE SRM NAGAR, KATTANKULATHUR 603203 DEPARTMENT OF COMPUTER SCIENCE & APPLICATIONS QUESTION BANK (2017-2018) Course / Branch : M.Sc CST Semester / Year : EVEN / II Subject Name

More information

What are the characteristics of Object Oriented programming language?

What are the characteristics of Object Oriented programming language? What are the various elements of OOP? Following are the various elements of OOP:- Class:- A class is a collection of data and the various operations that can be performed on that data. Object- This is

More information

22316 Course Title : Object Oriented Programming using C++ Max. Marks : 70 Time: 3 Hrs.

22316 Course Title : Object Oriented Programming using C++ Max. Marks : 70 Time: 3 Hrs. Scheme I Sample Question Paper Program Name : Computer Engineering Program Group Program Code : CO/CM/IF/CW Semester : Third 22316 Course Title : Object Oriented Programming using C++ Max. Marks : 70 Time:

More information

END TERM EXAMINATION

END TERM EXAMINATION END TERM EXAMINATION THIRD SEMESTER [BCA] DECEMBER 2007 Paper Code: BCA 209 Subject: Object Oriented Programming Time: 3 hours Maximum Marks: 75 Note: Attempt all questions. Internal choice is indicated.

More information

POINTERS - Pointer is a variable that holds a memory address of another variable of same type. - It supports dynamic allocation routines. - It can improve the efficiency of certain routines. C++ Memory

More information

M.C.A. DEGREE EXAMINATION, MAY First Year Paper - I : INFORMATION TECHNOLOGY. Time : 03 Hours Maximum Marks : 75

M.C.A. DEGREE EXAMINATION, MAY First Year Paper - I : INFORMATION TECHNOLOGY. Time : 03 Hours Maximum Marks : 75 M.C.A. DEGREE EXAMINATION, MAY - 2013 First Year Paper - I : INFORMATION TECHNOLOGY (DMCA 101) Time : 03 Hours Maximum Marks : 75 Section - A (3 15 = 45) Answer any Three of the following 1) What is the

More information

Time : 3 hours. Full Marks : 75. Own words as far as practicable. The questions are of equal value. Answer any five questions.

Time : 3 hours. Full Marks : 75. Own words as far as practicable. The questions are of equal value. Answer any five questions. XEV (H-3) BCA (6) 2 0 1 0 Time : 3 hours Full Marks : 75 Candidates are required to give their answers in their Own words as far as practicable. The questions are of equal value. Answer any five questions.

More information

KENDRIYA VIDYALAYA SANGATHAN, KOLKATA REGION SPLIT-UP SYLLABUS ( ) CLASS XII : COMPUTER SCIENCE (THEORY)

KENDRIYA VIDYALAYA SANGATHAN, KOLKATA REGION SPLIT-UP SYLLABUS ( ) CLASS XII : COMPUTER SCIENCE (THEORY) KENDRIYA VIDYALAYA SANGATHAN, KOLKATA REGION SPLIT-UP SYLLABUS (2017-) CLASS XII : COMPUTER SCIENCE (THEORY) MONTH PORTION TO BE COVERED THEORY PRACTICAL APRIL- MAY Unit 1 Object Oriented Programming in

More information

SQL Interview Questions

SQL Interview Questions SQL Interview Questions SQL stands for Structured Query Language. It is used as a programming language for querying Relational Database Management Systems. In this tutorial, we shall go through the basic

More information

S Y B Voc Software Development Syllabus

S Y B Voc Software Development Syllabus S Y B Voc Software Development Syllabus Course Level Job Roles Course Name: Pattern: Examination Pattern: Eligibility: Medium of Instruction: NSQF Level-VI 1. Jr. Software Developer 2. Trainer Software

More information

Quiz Start Time: 09:34 PM Time Left 82 sec(s)

Quiz Start Time: 09:34 PM Time Left 82 sec(s) Quiz Start Time: 09:34 PM Time Left 82 sec(s) Question # 1 of 10 ( Start time: 09:34:54 PM ) Total Marks: 1 While developing a program; should we think about the user interface? //handouts main reusability

More information

Programming for the Web with PHP

Programming for the Web with PHP Aptech Ltd Version 1.0 Page 1 of 11 Table of Contents Aptech Ltd Version 1.0 Page 2 of 11 Abstraction Anonymous Class Apache Arithmetic Operators Array Array Identifier arsort Function Assignment Operators

More information

KENDRIYA VIDYALAYA SANGATHAN

KENDRIYA VIDYALAYA SANGATHAN KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION CLASS: XII SESSION: - 17 SPLIT-UP SYLLABUS COMPUTER SCIENCE MONTH PORTION TO BE COVERED THEORY PRACTICAL April-May UNIT-1 REVIEW: C++ covered In Class - XI, Object

More information

Sri Vidya College of Engineering & Technology

Sri Vidya College of Engineering & Technology UNIT I INTRODUCTION TO OOP AND FUNDAMENTALS OF JAVA 1. Define OOP. Part A Object-Oriented Programming (OOP) is a methodology or paradigm to design a program using classes and objects. It simplifies the

More information

Computer Science & Engineering. Second Year

Computer Science & Engineering. Second Year 18 Second Year 19 Second Year (P.C. 311/71) Subject : OOPS & JAVA Paper - I Time : 3 Hours Max. Marks : 50 Section - I ( 1 x 40 = 40 Marks) 1. (a) Write a simple Java program to print a line of text. (b)

More information

Introduction to Query Processing and Query Optimization Techniques. Copyright 2011 Ramez Elmasri and Shamkant Navathe

Introduction to Query Processing and Query Optimization Techniques. Copyright 2011 Ramez Elmasri and Shamkant Navathe Introduction to Query Processing and Query Optimization Techniques Outline Translating SQL Queries into Relational Algebra Algorithms for External Sorting Algorithms for SELECT and JOIN Operations Algorithms

More information

CHAPTER 1 Introduction to Computers and Programming CHAPTER 2 Introduction to C++ ( Hexadecimal 0xF4 and Octal literals 031) cout Object

CHAPTER 1 Introduction to Computers and Programming CHAPTER 2 Introduction to C++ ( Hexadecimal 0xF4 and Octal literals 031) cout Object CHAPTER 1 Introduction to Computers and Programming 1 1.1 Why Program? 1 1.2 Computer Systems: Hardware and Software 2 1.3 Programs and Programming Languages 8 1.4 What is a Program Made of? 14 1.5 Input,

More information

Kapil Sehgal PGT Computer. Science Ankleshwar Gujarat Chapter 6 Inheritance Extending a Class

Kapil Sehgal PGT Computer. Science Ankleshwar Gujarat Chapter 6 Inheritance Extending a Class Chapter 6 Inheritance Extending a Class Introduction; Need for Inheritance; Different form of Inheritance; Derived and Base Classes; Inheritance and Access control; Multiple Inheritance Revisited; Multilevel

More information

Tables, Priority Queues, Heaps

Tables, Priority Queues, Heaps Tables, Priority Queues, Heaps Table ADT purpose, implementations Priority Queue ADT variation on Table ADT Heaps purpose, implementation heapsort EECS 268 Programming II 1 Table ADT A table in generic

More information

Object-Oriented Programming

Object-Oriented Programming Object-Oriented Programming 1. What is object-oriented programming (OOP)? OOP is a technique to develop logical modules, such as classes that contain properties, methods, fields, and events. An object

More information

Chapter 6 Introduction to Defining Classes

Chapter 6 Introduction to Defining Classes Introduction to Defining Classes Fundamentals of Java: AP Computer Science Essentials, 4th Edition 1 Objectives Design and implement a simple class from user requirements. Organize a program in terms of

More information

Pace University. Fundamental Concepts of CS121 1

Pace University. Fundamental Concepts of CS121 1 Pace University Fundamental Concepts of CS121 1 Dr. Lixin Tao http://csis.pace.edu/~lixin Computer Science Department Pace University October 12, 2005 This document complements my tutorial Introduction

More information

MID TERM MEGA FILE SOLVED BY VU HELPER Which one of the following statement is NOT correct.

MID TERM MEGA FILE SOLVED BY VU HELPER Which one of the following statement is NOT correct. MID TERM MEGA FILE SOLVED BY VU HELPER Which one of the following statement is NOT correct. In linked list the elements are necessarily to be contiguous In linked list the elements may locate at far positions

More information

CS301 - Data Structures Glossary By

CS301 - Data Structures Glossary By CS301 - Data Structures Glossary By Abstract Data Type : A set of data values and associated operations that are precisely specified independent of any particular implementation. Also known as ADT Algorithm

More information

1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices.

1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices. (DMCA 101) ASSIGNMENT - 1, MAY-2014. PAPER- I : INFORMATION TECHNOLOGY 1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices. 3) What is software?

More information

Constructor - example

Constructor - example Constructors A constructor is a special member function whose task is to initialize the objects of its class. It is special because its name is same as the class name. The constructor is invoked whenever

More information

HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE

HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE VOLUME I Chapter 1 : Introduction to computers and Number Systems 1.1 Introduction to Computers 1.1.1 History of Computers 1.1.2 Data, Information and program

More information

5. Single-row function

5. Single-row function 1. 2. Introduction Oracle 11g Oracle 11g Application Server Oracle database Relational and Object Relational Database Management system Oracle internet platform System Development Life cycle 3. Writing

More information

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring Instructions:

Solution printed. Do not start the test until instructed to do so! CS 2604 Data Structures Midterm Spring Instructions: VIRG INIA POLYTECHNIC INSTITUTE AND STATE U T PROSI M UNI VERSI TY Instructions: Print your name in the space provided below. This examination is closed book and closed notes, aside from the permitted

More information

C++ & Object Oriented Programming Concepts The procedural programming is the standard approach used in many traditional computer languages such as BASIC, C, FORTRAN and PASCAL. The procedural programming

More information

AFN-1255 PCA131 P.G.D.C.A. DIPLOMA EXAMINATION, MAY 2011 First Semester Computer Applications FUNDAMENTALS OF DIGITAL COMPUTER (Non-CBCS 2004 onwards) Time : 3 Hours Maximum : 100 Marks Part A (15 1 =

More information

Weiss Chapter 1 terminology (parenthesized numbers are page numbers)

Weiss Chapter 1 terminology (parenthesized numbers are page numbers) Weiss Chapter 1 terminology (parenthesized numbers are page numbers) assignment operators In Java, used to alter the value of a variable. These operators include =, +=, -=, *=, and /=. (9) autoincrement

More information

Instantiation of Template class

Instantiation of Template class Class Templates Templates are like advanced macros. They are useful for building new classes that depend on already existing user defined classes or built-in types. Example: stack of int or stack of double

More information

OOPS Viva Questions. Object is termed as an instance of a class, and it has its own state, behavior and identity.

OOPS Viva Questions. Object is termed as an instance of a class, and it has its own state, behavior and identity. OOPS Viva Questions 1. What is OOPS? OOPS is abbreviated as Object Oriented Programming system in which programs are considered as a collection of objects. Each object is nothing but an instance of a class.

More information

CS304 Object Oriented Programming Final Term

CS304 Object Oriented Programming Final Term 1. Which of the following is the way to extract common behaviour and attributes from the given classes and make a separate class of those common behaviours and attributes? Generalization (pg 29) Sub-typing

More information

After going through this lesson, you would be able to: store data in a file. access data record by record from the file. move pointer within the file

After going through this lesson, you would be able to: store data in a file. access data record by record from the file. move pointer within the file 16 Files 16.1 Introduction At times it is required to store data on hard disk or floppy disk in some application program. The data is stored in these devices using the concept of file. 16.2 Objectives

More information

CE221 Programming in C++ Part 2 References and Pointers, Arrays and Strings

CE221 Programming in C++ Part 2 References and Pointers, Arrays and Strings CE221 Programming in C++ Part 2 References and Pointers, Arrays and Strings 19/10/2017 CE221 Part 2 1 Variables and References 1 In Java a variable of primitive type is associated with a memory location

More information

Absolute C++ Walter Savitch

Absolute C++ Walter Savitch Absolute C++ sixth edition Walter Savitch Global edition This page intentionally left blank Absolute C++, Global Edition Cover Title Page Copyright Page Preface Acknowledgments Brief Contents Contents

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY OBJECT ORIENTED PROGRAMMING QUESTION BANK UNIT I 2 MARKS

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY OBJECT ORIENTED PROGRAMMING QUESTION BANK UNIT I 2 MARKS RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF INFORMATION TECHNOLOGY OBJECT ORIENTED PROGRAMMING YEAR/SEM:II & III UNIT I 1) Give the evolution diagram of OOPS concept. 2) Give some

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.   Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : 1z0-007 Title : Introduction to Oracle9i: SQL Vendor : Oracle Version : DEMO Get Latest & Valid 1Z0-007 Exam's

More information

CS 231 Data Structures and Algorithms, Fall 2016

CS 231 Data Structures and Algorithms, Fall 2016 CS 231 Data Structures and Algorithms, Fall 2016 Dr. Bruce A. Maxwell Department of Computer Science Colby College Course Description Focuses on the common structures used to store data and the standard

More information

Trees (Part 1, Theoretical) CSE 2320 Algorithms and Data Structures University of Texas at Arlington

Trees (Part 1, Theoretical) CSE 2320 Algorithms and Data Structures University of Texas at Arlington Trees (Part 1, Theoretical) CSE 2320 Algorithms and Data Structures University of Texas at Arlington 1 Trees Trees are a natural data structure for representing specific data. Family trees. Organizational

More information

SIR C R REDDY COLLEGE OF ENGINEERING

SIR C R REDDY COLLEGE OF ENGINEERING SIR C R REDDY COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY Course Outcomes II YEAR 1 st SEMESTER Subject: Data Structures (CSE 2.1.1) 1. Describe how arrays, records, linked structures,

More information

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Data Structures and Algorithms. Final Examination T09:00

University of Waterloo Department of Electrical and Computer Engineering ECE 250 Data Structures and Algorithms. Final Examination T09:00 University of Waterloo Department of Electrical and Computer Engineering ECE 250 Data Structures and Algorithms Instructor: Douglas Wilhelm Harder Time: 2.5 hours Aides: none 18 pages Final Examination

More information

MARKING KEY The University of British Columbia MARKING KEY Computer Science 260 Midterm #2 Examination 12:30 noon, Thursday, March 15, 2012

MARKING KEY The University of British Columbia MARKING KEY Computer Science 260 Midterm #2 Examination 12:30 noon, Thursday, March 15, 2012 MARKING KEY The University of British Columbia MARKING KEY Computer Science 260 Midterm #2 Examination 12:30 noon, Thursday, March 15, 2012 Instructor: K. S. Booth Time: 70 minutes (one hour ten minutes)

More information

Padasalai.Net s Model Question Paper

Padasalai.Net s Model Question Paper Padasalai.Net s Model Question Paper STD: XII VOLUME - 2 MARKS: 150 SUB: COMPUTER SCIENCE TIME: 3 HRS PART I Choose the correct answer: 75 X 1 = 75 1. Which of the following is an object oriented programming

More information

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register General Concepts 1. (a) What are combinational circuits? (b) Perform the following: (i) Convert (0.5625) 10 = ( ) 2 (ii) (010010) 2 (100011) 2 = ( ) 2 2. (a) Using truth table prove that A B= A+ B (b)

More information

Intermediate Code Generation

Intermediate Code Generation Intermediate Code Generation In the analysis-synthesis model of a compiler, the front end analyzes a source program and creates an intermediate representation, from which the back end generates target

More information

TeenCoder : Java Programming (ISBN )

TeenCoder : Java Programming (ISBN ) TeenCoder : Java Programming (ISBN 978-0-9887070-2-3) and the AP * Computer Science A Exam Requirements (Alignment to Tennessee AP CS A course code 3635) Updated March, 2015 Contains the new 2014-2015+

More information

NEW PATTERN. Computer Science

NEW PATTERN. Computer Science UGC-NET PAPER III NEW PATTERN OBJECTIVE TYPE QUESTION BANK Computer Science CONTENTS (COMPUTER SCIENCE) Page Nos. PRACTICE SET - 1...1-6 PRACTICE SET - 2...7-12 PRACTICE SET - 3... 13-19 PRACTICE SET

More information

WYSE Academic Challenge Computer Science Test (State) 2014 Solution Set

WYSE Academic Challenge Computer Science Test (State) 2014 Solution Set WYSE Academic Challenge Computer Science Test (State) 2014 Solution Set 1. Correct Answer: D Authentication involves verifying the user that will gain access to a system. The most common form of authentication

More information

FINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 ( Marks: 1 ) - Please choose one The data of the problem is of 2GB and the hard

FINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 ( Marks: 1 ) - Please choose one The data of the problem is of 2GB and the hard FINALTERM EXAMINATION Fall 2009 CS301- Data Structures Question No: 1 The data of the problem is of 2GB and the hard disk is of 1GB capacity, to solve this problem we should Use better data structures

More information

Cpt S 122 Data Structures. Course Review Midterm Exam # 2

Cpt S 122 Data Structures. Course Review Midterm Exam # 2 Cpt S 122 Data Structures Course Review Midterm Exam # 2 Nirmalya Roy School of Electrical Engineering and Computer Science Washington State University Midterm Exam 2 When: Monday (11/05) 12:10 pm -1pm

More information

Jayaram college of Engineering and Technology, Pagalavadi. CS2203 Object Oriented Programming Question Bank Prepared By: S.Gopalakrishnan, Lecturer/IT

Jayaram college of Engineering and Technology, Pagalavadi. CS2203 Object Oriented Programming Question Bank Prepared By: S.Gopalakrishnan, Lecturer/IT CS2203 Object Oriented Programming Question Bank Prepared By: S.Gopalakrishnan, Lecturer/IT Two Mark Questions UNIT - I 1. DEFINE ENCAPSULATION. Encapsulation is the process of combining data and functions

More information

SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL/SPECIAL DEGREE PROGRAMME

SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL/SPECIAL DEGREE PROGRAMME All Rights Reserved No. of Pages - 12 No of Questions - 04 SCHOOL OF ACCOUNTING AND BUSINESS BSc. (APPLIED ACCOUNTING) GENERAL/SPECIAL DEGREE PROGRAMME YEAR I SEMESTER I (Intake IV- Group B) END SEMESTER

More information

calling a function - function-name(argument list); y = square ( z ); include parentheses even if parameter list is empty!

calling a function - function-name(argument list); y = square ( z ); include parentheses even if parameter list is empty! Chapter 6 - Functions return type void or a valid data type ( int, double, char, etc) name parameter list void or a list of parameters separated by commas body return keyword required if function returns

More information

Entrance exam - Informatics

Entrance exam - Informatics Entrance exam - Informatics Name and Surname fill in the field Application No. Test Sheet No. 15 Algorithms and data structures 1 Which of the listed data structures is most suitable (w.r.t. time and memory

More information

INHERITANCE: EXTENDING CLASSES

INHERITANCE: EXTENDING CLASSES INHERITANCE: EXTENDING CLASSES INTRODUCTION TO CODE REUSE In Object Oriented Programming, code reuse is a central feature. In fact, we can reuse the code written in a class in another class by either of

More information

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME

INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME INFORMATION TECHNOLOGY COURSE OBJECTIVE AND OUTCOME CO-1 Programming fundamental using C The purpose of this course is to introduce to students to the field of programming using C language. The students

More information

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE.

Total No. of Questions : 18] [Total No. of Pages : 02. M.Sc. DEGREE EXAMINATION, DEC First Year COMPUTER SCIENCE. (DMCS01) Total No. of Questions : 18] [Total No. of Pages : 02 M.Sc. DEGREE EXAMINATION, DEC. 2016 First Year COMPUTER SCIENCE Data Structures Time : 3 Hours Maximum Marks : 70 Section - A (3 x 15 = 45)

More information

Algorithms for Query Processing and Optimization. 0. Introduction to Query Processing (1)

Algorithms for Query Processing and Optimization. 0. Introduction to Query Processing (1) Chapter 19 Algorithms for Query Processing and Optimization 0. Introduction to Query Processing (1) Query optimization: The process of choosing a suitable execution strategy for processing a query. Two

More information

Page. No. 1/15 CS201 Introduction to Programmming Solved Subjective Questions From spring 2010 Final Term Papers By vuzs Team

Page. No. 1/15 CS201 Introduction to Programmming Solved Subjective Questions From spring 2010 Final Term Papers By vuzs Team Page. No. 1/15 CS201 Introduction to Programmming Solved Subjective Questions From spring 2010 Final Term Papers By vuzs Team Question No: 1 ( Marks: 2 ) Write a declaration statement for an array of 10

More information

THE NAME OF THE CONSTRUCTOR AND DESTRUCTOR(HAVING (~) BEFORE ITS NAME) FUNCTION MUST BE SAME AS THE NAME OF THE CLASS IN WHICH THEY ARE DECLARED.

THE NAME OF THE CONSTRUCTOR AND DESTRUCTOR(HAVING (~) BEFORE ITS NAME) FUNCTION MUST BE SAME AS THE NAME OF THE CLASS IN WHICH THEY ARE DECLARED. Constructor and Destructor Member Functions Constructor: - Constructor function gets invoked automatically when an object of a class is constructed (declared). Destructor:- A destructor is a automatically

More information

Chapter-12 DATA FILE HANDLING

Chapter-12 DATA FILE HANDLING Chapter-12 DATA FILE HANDLING Introduction: A file is a collection of related data stored in a particular area on the disk. Programs can be designed to perform the read and write operations on these files.

More information