MODEL PAPER -1 PART-A. 3.Define an array? An array is a linear data structure contain homogeneous data elements with a common name.

Size: px
Start display at page:

Download "MODEL PAPER -1 PART-A. 3.Define an array? An array is a linear data structure contain homogeneous data elements with a common name."

Transcription

1 1.Expand PCI? Pheripheral component interconnect MODEL PAPER -1 PART-A 2.What do you understand by the truth function? A truth function is a function formed using set of truth values. 3.Define an array? An array is a linear data structure contain homogeneous data elements with a common name. 4.What are data members? The data members are the variables which can hold the data depending on access control specifier different functions can use them. 5.What is dynamic memory? Allocating the memory at run time is called dynamic memory allocation. 6.What is an entity? A real world object is called entity. 7.What is server? It is high speed computer system where data and applications are stored in a network. 8.Expand 2G? Second generation 9.What is open source software? The open source is a software distributed with the source code that anybody can study,modify for their own needs and redistribute without any capital. 10.What is DHTML? Dynamic hyper text markup language is an extention of html that enables a webpage tp response an user input without sending requests to the web server. PART B 11.What is meant by universal gate? A gate which is used to design all types of logic circuits is called universal gates. 12.State idempotence law. x+x=x and x.x=x 1

2 13.What is the difference between program module and an object? A module is a subproblem or a function.the modular programming model permits the easy extension of functions on non-extensible recursive datatypes.the object model of programming defines a set of recursive datatypes using classes. 14.Why are constructors needed in a program?justify. Constructors are helpful to initialize the objects as they get created. Class getval { int x,y; public: getval(); getval(int a,int b); }; Ex: Getval() { } Getval::getval(int a, int b) { x=a; y=b; } 15.Differentiate between read() and write() Read() is used to read the binary file Syntax: ifstream_object.read((char *)&variable,sizeof(variable)); Write()is used to write the data into binary file Syntax:ofstream_object.write((char *))&variable,sizeof(variable)); PART C 16.Give the features of USB port? It is a plug and play port. Upto 127 devices can be connected to the computer system either directly or by way of USB hubs, It can also be used for power transmission. 17.Explain the working of NAND gate? It reverses the output of AND gate as given below Output is FALSE,when all Inputs are TRUE Output is TRUE,when any one Input is FALSE 18.Mention the various operations performed on data structures. Travesing,insertion,deletion,searching 2

3 19.Explain database users? The different DBMS users are 1.Database administrator(dba)-a super user who creates,alters and uses the database. 2.Database degsigner-as per the layout by the DBA database designer group design the database schema by applying the constraints and specification of data storage. 3.Application programmer-in an organisation user interacts with the database through an application software. 20.What is telnet? telnet is a network protocol used on the internet or local area networks to provide a bidirectional interactive text oriented communication facility using a virtual terminal connection. PART D 21.Write the difference between procedural programming and object oriented programming? There is no rule that one should use a particular method to develop a program. Its upto the discretion of the programmer. The major differences are listed below: In POP, program divided into smaller parts called functions. In OOP, program is divided into parts called objects. In POP, importance is not given to data but to functions as well as sequence of actions to be done. In OOP, importance is given to the data rather than procedures or functions because it works as a real world approach. POP follows top down approach. OOP follows bottom up approach. POP does not have any access specifier. OOP has access specifiers namely public, private and protected. POP does not have any proper way for hiding data so it is less secure. OOP provides data hiding so provides more security. In POP, overloading is not possible. In OOP, overloading is possible in the form of function overloading and operator overloading. 22.Explain friend functions and their characteristics? i) A friend of the class can be member of some other class. ii) A friend of one class can be friend of another class or all the classes in one program, such a friend is known as global friend. iii)a friend can access the private or protected members of the class in which they are declared to be friend but they can use the members for a specific object. iv)the friends are non members hence do not get this pointer. v)the friends can be friend of more than one class hence they can be used for message passing between the classes. 23.Write the rules for writing a constructors function? i)the constructor must have the same name as that of the class name thus a compiler identifies that as a constructor function. 3

4 ii)there is no return type for a constructor because a constructor is designed for the purpose of initialization of objects and it does not return any value to any function. iii)a constructor should be defined under public specifier. iv)a constructor can have default arguments. 24.What are the advantages of inheritance? i)code reuseability ii)testing and debugging is easy iii)coding is easy because similar types of codes and logics are used in inherited classes iv)objects can be represented in different levels that is hierarchical arrangements of objects v)efficient memory utilization vi)faster development of codes and easy to extend vii)easy maintenance etc 25. Explain data processing cycle? i)data collection-the required data may exist in different places and in different forms.all required data items must be gathered together as first step. ii)data input-the mechanism of providing the data into a data processing system. iii)data process-it is depending on what kind of information need to be generated.it uses many functions for successful for data processing.those functions are classification,sorting,verification,calculation,summarization,generating the reports etc. iv)data output-after the successful data processing activity,results are generated.it is important to check the result whether it is according to the requirement or not. v)data storage-the result must be stored in the secondary storage medium for future use. vi)maintenance-depending on significance of information it has to be maintained with possible securities. 26.Write an algorithm to delete an element in an array. A is the array with N elements. item is the element to be deleted in the position p and it is stored into the variable item. Step 1 : item=a[p] Step 2 : for I=p to N-1 A[i] =A[i+1] End of for Step 3: n=n-1 Step 4: Exit 27. What is gateway? Explain? A gateway is a device that connects dissimilar networks. A gateway operates at the highest layer of the network abstraction. It expands the functionality of routers by performing data translation and protocol conversion. It needs to convert Ethernet traffic from the LAN, to SNA(systems network architecture) traffic on a legacy system. It then routes the SNA traffic to the mainframe. when the mainframe answers the reverse process occurs. In enterprises the gateway is the computer that routes the traffic from a workstation to the outside network that is serving the webpages.in homes the gateway is the ISP that connects the user to the internet. 4

5 MODEL QUESTION PAPER 2 PART A 1. Define the clock speed of the CPU Ans: The clock speed of a CPU is defined as the frequency with which a processor executes instructions or the data is processed. 2. Write the standard symbol for NOR Gate. Ans: 3. What is a binary tree? Ans: A binary tree is a tree in which each node has at most two descendants (nodes). 4. What is the significance of scope resolution operator? Ans: Scope resolution operator identifies the function as a member of a particular class. 5. Write the difference between the statements: i. X=&Y ii. X=*Y Ans: x=&x here the address of variable y is assigned to printer variable. X=*y the value of variable Y is assigned to X. 6. What is an attribute? Ans: each column of a table is identified with distinct header called attribute. 7. Expand SLIP? Ans: Serial line internet protocol 8. Expand SIM. Ans: Subscriber Identity Module 9. What is hub in network? Ans: A hub is a hardware device used to connect several computers together. 10. What are hackers? Ans: Hackers are interested in gaining knowledge about computer system and using the knowledge for playing pranks. PART B 11. Prove algebraically that (X+Y+Z)(X +Y+Z)=Y+Z Ans: (X+Y+Z).(X +Y+Z) =XX +XY+XZ+YX +YY+YZ+ZX +ZY+ZZ =0+XY+XZ+YX +Y+YZ+X Z+YZ+Z =Y+XY+YZ+XZ+X Z+Z =Y(1+X+Z)+ Z(X+X +1) =Y+Z 5

6 12. Construct a Boolean function of 3 variables X,Y and Z, that has an output 1 when exactly two of X,Y and Z are having 0 in all other cases. X Y Z F Mention any 2 advantages of Object Oriented Programming over earlier programming methods. Ans: a. OOP can communicate through message passing which makes interface description with outside system very simple. b. The concept of data abstraction separates object specification and object implementation. c. Creation and implementation of OOP code is easy. 14. What is a constructor? Give an example. Ans: It is a special member functiothat is used in a classes to initialize the object of the class automatically. The constructor is a member function of a class with the same name as that of the class. The constructor is invoked when we create the object of the class. Example: class sample { int s; Public: sample() { S=10 } }; 15. Differentiate between read() and write(). Ans: This member function belongs to class ifstream and is used to read binary data from a file. Syntax: ifstream_object.read((char *) &variable, sizeof(variable)); The write() member function belongs to the class ofstream and which is used to binary data file. 16. What is data warehouse? Ans: Data warehouse is a structured repository of historic data. Data ware house are designed to facilitate reporting and supporting data analysis. 17. What is dual table? Ans: To use all single row function we have to use the dummy table DUAL provided by oracle. 18. What is GPRS technology? Ans: GPRS (General Packet Radio Service) is used for wireless communication using mobile device. GPRS is used for wireless communication using mobile device. With this service you can access the interet, send mails and large data, download games and watch movies. 6

7 PART C 19. Explain cache memory. Ans: The cache memory is a high speed memory inside CPU to speed up access of data and instructions stored in RAM memory. Cache memory is expensive. Computers have cache memory of size 256KB and 2MB. 20. What is principle of duality? Give an example. Ans: Duality theorem states that starting with a Boolean relation, another relation can be derived by a. Changing each OR sign to AND sign, b. Changing each And to OR sign,c. Changing 0 s to 1 s and 1 s to Write an algorithm for traversal in a linear array. Ans: 1. For Loc= lb to ub Process a[loc] Endfor 2 exit 22. Explain the use of new operator and delete operator with its syntax and give example. Ans: new operator is used to allocate memory dynamically to objects. 23. Explain relational data model. Ans: A relation is used to get information about any entity and its relationship with other entities in the form of attributes and tuple. The relational model was developed by E.F.codd in In the relational data model, unlike the hierarchical and network models. 24. Explain different types of transmission media used in computer network. Ans: 1. Wired or guided media 2. Wireless or unguided media. In wired it uses cables that have physical existence and are limited by the physical geography. Popular bound transmission media in use are twisted pair cable, co-axial cable and fiber optical cable. Wireless transmission media are the ways of transmitting data without using any cables. These media are not bouded by physical geography. This transmission uses Microwave, Radio wave etc. 25. What is use of PHP files? Ans: a. Password protection b. Browser customization c. Form processing d. dynamically editing or adding content to web page. e. Building and displaying pages created from a database. PART D 26.Given the Boolean function f(w,x,y,z)=π(5,6,7,8,9,12,13,14,15). Use k map to reduce the function of using POS form. (Please refer text book or notes given in the class) 7

8 27. Write an algorithm for binary search method. Let A is the sorted array with LB as lower bound and UB as the upper bound respectively. Let B, E, M denote beginning, end and middle locations of the segments of A. Step1: set B=LB, E=UB Step 2: while(b<=e) M=int(B+E)/2 If(ELE=A[M] Loc=M Goto 4 Else If(ELE<A[M]) B=M-1 Else E=M+1 End of while Step 3: if (loc>=0) Print loc Else Print Search is unsuccessful Step 4: exit 28.Write the advantages of OOPs. 1)The programs are modularized based on the principle of classes and objects. 2)Linking Code and object allows related objects to share common code. This reduces code duplication and code reusability. 3)Data is encapsulated along with functions. Therefore external member function cannot access or modify data. Thus providing data security. 4)Easier to develop complex software. Because complexity can be minimized through inheritance. 5)The concept of data abstraction separated object specification and object implementation. 29.Describe how objects can be used as function arguments. A function can receive an object as a function argument. This is similar to any other data type function argument. An object can be passed to a function in two ways: being sent as (i) (ii) Copy of entire object is passed to function. (Pass by value) Only address of the object is transferred to the function. (Pass by reference) In Pass by Value- a copy of the object is passed to the function. The function creates its own copy of the object and uses it. Therefore changes made to the object inside the function do not affect the original object. In Pass by reference When an address of an object is passed to the function, the function directly works on the original object used in function call. This means changes made to the object inside the function will reflect in the original object, because the function is making changes in the original object itself. Pass by reference is more efficient, since it require only to pass the address of the object and not the entire object. 30. Write a C++ program to insert an element into an array at a given position. Let A is the array with N elements. ITEM is the element to be inserted in the position P. Step 1: for i=n-1 down to P A[i+1]=A[i] 8

9 End of for Step 2: A[P]=ITEM Step 3: N=N+1 Step 4: exit 31. Explain destructor with syntax and example. The destructor will be called automatically when an object is destroyed. It is used to destroy the objects that have been created by a constructor. Like a constructor, the destructor is a member function whose name is the same as the class name but is preceded by a tilde (~). A destructor never takes any argument nor does it return any value. It will be invoked implicitly by the compiler upon exit from the program to clean up storage that is no longer accessible. It is a good practice to declare destructors is a program since it releases memory space for future use. Syntax: class classname { private: //data variables public: classname(); ~classname(); }; Example class account { floatbalance,rate; public: accoubnt(); ~account(); }; 32. Explain network security in detail. Network security makes sure that only legal authorized user and program gain access to information resources like databases. Also certain control mechanisms are setup that properly authenticated users to get access only to those resources that they are centralized to use. Under this type of security mechanisms like authorization, authentication, encrypts, smart card, biometrics and firewalls etc. are implemented. The problem encountered under network security can be summarizes as follows. a)physical security holes- when individuals gain unauthorized physical access to a computer and temper with the files. Hackers do it guessing passwords of various users and then gaining access to the network system. b)software security holes when badly written program. c)inconsistent usage holes. When a system administrator assembles a combination of a hardware and software such that the system is seriously flawed from security point of view. 9

10 MODEL QUESTION PAPER-3 SUBJECT: COMPUTER SCIENCE TIME: 3 Hours 15 mins Max Marks: 70 PART A I. Answer all questions. Each question carries one mark 10 X 1=10 1. Expand FLOSS Free Libre Open Source Software 2. What is meant by plug and play device? Plug and play devices can connect directly to computer and work without using adapter card 3. Define binary tree A binary tree is a tree in which each node has at most 2 descendants 4. How do you declare a pointer? Data type *variable name; 5. What is the use of scope resolution operator Scope resolution operator identifies the function as an member of particular class 6. Define clock speed of a CPU Clock speed of a computer is defined as the frequency with which a processor executes instructions 7. What is an object? Object is an instance of a class 8. What is web-scripting? The process of creating and embedding scripts in a web page is known as web scripting 9. What is meant by universal gates? Universal gate is a gate using which all the basic gates can be designed 10. Which tag is used to insert image in HTML <img> tag 10

11 PART B II. Answer any five questions. Each question carries two marks 5 X 2= Mention any two applications of OOP a. Computer graphics applications b. Real Time Systems c. 12. Differentiate between read() and write() The read () member function belongs ifstream class and used to read binary data and write () member function belongs to ofstream class and used to write binary data 13. Mention different types of inheritance a) Single inheritance b) Multiple inheritance c) Multi level inheritance d) Hierarchical inheritance e) 14. Give any 2 applications of Stack a. Expression Evaluation b. Language Processing 15. What is generalization and specialization Generalization is a bottom up approach where two lower level entities combine to form higher level entity and Specialization is a top-down approach in which one higher level entity is broken down into lower level entities PART C III. Answer any 5 questions. Each question carries three marks 5 X3= Explain cache memory The cache memory is a high speed memory available inside CPU to speed up access of data and instructions stored in RAM memory. Cache memory is expensive Computers have cache memory of size 256KB and 2 MB 17. Explain type of E-commerce applications 1. Business to-business(b2b) : Exchange of service or information or product from one business to another business 2. Business-to-Consumer(B2C) : Exchange of service or information or product from business to consumer 3. Consumer-to-Business(C2B) : Consumer directly contacts the business vendors by presenting their work online 4. Consumer-to Consumer(C2C) :Online business transactions done between two consumers 11

12 18. List different modes of opening a file 1) ios::app mode is used to append the file 2) ios::in mode is used to open the file for reading only 3) ios::out mode is used to open the file for writing 19. Explain any three types of I/O ports 1. Serial port : They are used to connect communication devices like mouse and modem.port transfer data serially one bit at a time 2. Parallel port: Parallel ports are used to connect external input /output devices like printers And scanners. These port transfers 8 bit at a time 3. IDE port: IDE devices like CD-ROM or hard disk drives are connected to motherboard through IDE port 20. Explain new operator with syntax and example The dynamic memory is allocated using new operator. Syntax: Pointer = new type[size]; Eg: int *ptr; ptr = new int[5]; PART D IV. Answer any seven questions. Each question carries five marks 7 X 5= Explain memory representation of queues using one dimensional array Queue is represented in memory as a linear array. Two pointer variables FRONT and REAR are maintained.the pointer variable FRONT contains location of the element to be removed and pointer Variable REAR contains location of the last element to be inserted. The condition FRONT=NULL indicates that queue is empty and condition REAR=N indicates that the queue is full. FRONT REAR A B C Explain characteristics of friend function A friend function is a non member function that is friend of a class A friend function although not a member function, has full access rights to private and protected members of a class 12

13 Friend functions cannot be called using objects of that class Friend function is declared by the class that is granting access They are declared using keyword friend but does not use the keyword for definition 23. Give algorithm for PUSH and POP operations of a stack Algorithm for PUSH Operation STEP1: IF (TOP = N-1) THEN PRINT STACK IS FULL END IF STEP 2: TOP TOP+1 STEP 3: STACK[TOP]=ITEM STEP 4: RETURN Algorithm for POP Operation STEP1: IF (TOP = -1) THEN PRINT STACK IS EMPTY END IF STEP 2: ITEM = STACK [TOP] STEP 3: TOP TOP-1 STEP 4: RETURN 24. Write rules for writing constructor function Constructor always has the name that is same as class name A constructor does not have return type They are invoked automatically when objects are created A class can have more than one constructor but it should have different formal parameter Constructor should always be defined in public section 25. Write algorithm to perform enqueue and dequeue operations on a queue Algorithm for ENQUEUE Operation STEP1: IF REAR=N THEN PRINT QUEUE IS FULL END IF STEP 2: IF FRONT=NULL THEN FRONT=0 REAR=0 ELSE REAR=REAR+1 STEP 3: QUEUE [REAR] =ITEM STEP 4: RETURN Algorithm for DEQUEUE Operation 13

14 STEP1: IF FRONT=NULL THEN PRINT QUEUE IS EMPTY END IF STEP 2: ITEM = QUEUE [FRONT] STEP 3: IF FRONT=REAR THEN [IF QUEUE HAS ONLY ONE ELEMENT] FRONT=REAR=0 ELSE FRONT=FRONT+1 STEP 4: RETURN 26. Explain network security in detail Network security is the process of providing security to the networking devices and the data stored over a network. There are different methods of protection 1) Authorization : It determines whether the service provider has granted access for the web service to the user 2) Authentication: Authentication is password protection where user is asked to enter a valid password to use the service 3) Encrypted smart card: An encrypted smart card is an hand held smartcard that can generate a token that computer can recognize. Different tokens are generated each time so that even if earlier token is hacked it is of no use 4) Biometric System: The biometric system involve some unique aspects of a person s body such as figure prints, retinal patterns etc to establish his or her identity 5) Firewall: Firewall is a software to prevent unauthorized access to or from a private network 27. Explain different types of defining function of a class Method 1: Defining function inside the class Method2: Defining function outside the class class student { private: int regno; char name[20]; public: void getdata() //Function definition inside the class { cout<<endl<< Enter the regno and name ; cin>>regno>>name; } }; 14

15 void student::putdata() //Function definition outside class using scope resolution operator { cout<<endl<< Regno = <<regno; cout<<endl<< Name= <<name; } 15

ONE MARKS QUESTION AND ANSWERS

ONE MARKS QUESTION AND ANSWERS ONE MARKS QUESTION AND ANSWERS Question No 1 Typical Configuration of Computer System: 1. What is a motherboard? The motherboard is the most important circuit board of the computer; all the components

More information

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70 Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 5 min Max. marks : 7 I. Answer ALL the questions x =. Expand the term DDRRAM. Double Data Rate Random Access Memory 2. Write the standard symbol for

More information

SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION

SCIENCE ENTRANCE ACADEMY III PREPARATORY EXAMINATION SCHEME OF VALUATION Computer Science (4) Q.NO Expand SCSI Small computer system interface PART-A Name the gate which produces output 0, if there are even numbers of s in the input XOR What is complete tree? Tree in which

More information

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70

Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70 Answer key SUBJECT : COMPUTER SCIENCE Time : 3 hour 15 min Max. marks : 70 I. Answer ALL the questions 10 x 1= 10 1. What is DHTML? Dynamic HTML is a term used to describe the combination of HTML, style

More information

SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session

SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session SPLIT-UP SYLLABUS ----CHENNAI REGION COMPUTER SCIENCE (Code: 083) Class-XII Academic Session 2008-09 Sr.No. Duration Number of Working Days From To Topic to be Covered Nos. of Periods required CAL/TAL

More information

IMPORTANT QUESTIONS WITH ANSWERS FOR II PU FINAL EXAMINATION

IMPORTANT QUESTIONS WITH ANSWERS FOR II PU FINAL EXAMINATION IMPORTANT QUESTIONS WITH ANSWERS FOR II PU FINAL EXAMINATION Chapter 1: Configuring a computer system ONE mark questions 1. What is a motherboard? Ans.: A Printed Circuit Board (PCB) used to connect all

More information

Government of Karnataka SYLLABUS FOR SECOND PUC - COMPUTER SCIENCE (41) SUB-UNITS

Government of Karnataka SYLLABUS FOR SECOND PUC - COMPUTER SCIENCE (41) SUB-UNITS SL No NAME OF THE UNIT/CHAPTER 1 Typical configuration of Computer system Organisation 5 Hrs/ 4 Marks BOOLEAN ALGEBRA 15 Hrs/ 13 Marks Government of Karnataka SYLLABUS FOR 014-015 SECOND PUC - COMPUTER

More information

KENDRIYA VIDYALAYA SANGATHAN

KENDRIYA VIDYALAYA SANGATHAN KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION Winter Stations CLASS: XII SESSION: 2016-17 SPLIT-UP SYLLABUS Computer Science MONTH PORTION TO BE COVERED THEORY PRACTICAL April May-June 2016 UNIT-1 REVIEW:

More information

4. BOOLEAN ALGEBRA 8 5. NETWORKING AND OPEN SOURCE SOFTWARE 10

4. BOOLEAN ALGEBRA 8 5. NETWORKING AND OPEN SOURCE SOFTWARE 10 SPLIT UP SYLLABUS SUBJECT : COMPUTER SCIENCE (083) SESSION:2014-15 Class XII (Theory) - C++ Duration: 3 hours Total Marks: 70 Unit No. Unit Name MARKS 1 OBJECT ORIENTED PROGRAMMING IN C++. 2. DATA STRUCTURE

More information

3.Constructors and Destructors. Develop cpp program to implement constructor and destructor.

3.Constructors and Destructors. Develop cpp program to implement constructor and destructor. 3.Constructors and Destructors Develop cpp program to implement constructor and destructor. Constructors A constructor is a special member function whose task is to initialize the objects of its class.

More information

KENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083

KENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083 KENDRIYA VIDYALAYA SANGATHAN Regional Office Delhi Split-up Syllabus Session-2017-18 Subject:-Computer Science Subject Code:-083 COMPUTER SCIENCE (083)-Theory CLASS XII Unit wise Weightage of Marks Duration:3

More information

Syllabus for Computer Science General Part I

Syllabus for Computer Science General Part I Distribution of Questions: Part I Q1. (Compulsory: 20 marks). Any ten questions to be answered out of fifteen questions, each carrying two marks (Group A 3 questions, Group B, Group C and Group D 4 questions

More information

KENDRIYA VIDYALAYA SANGATHAN

KENDRIYA VIDYALAYA SANGATHAN KENDRIYA VIDYALAYA SANGATHAN JAMMU REGION CLASS: XII SESSION: - 17 SPLIT-UP SYLLABUS COMPUTER SCIENCE MONTH PORTION TO BE COVERED THEORY PRACTICAL April-May UNIT-1 REVIEW: C++ covered In Class - XI, Object

More information

KENDRIYA VIDYALAYA SANGATHAN, KOLKATA REGION SPLIT-UP SYLLABUS ( ) CLASS XII : COMPUTER SCIENCE (THEORY)

KENDRIYA VIDYALAYA SANGATHAN, KOLKATA REGION SPLIT-UP SYLLABUS ( ) CLASS XII : COMPUTER SCIENCE (THEORY) KENDRIYA VIDYALAYA SANGATHAN, KOLKATA REGION SPLIT-UP SYLLABUS (2017-) CLASS XII : COMPUTER SCIENCE (THEORY) MONTH PORTION TO BE COVERED THEORY PRACTICAL APRIL- MAY Unit 1 Object Oriented Programming in

More information

OBJECT ORIENTED PROGRAMMING USING C++ CSCI Object Oriented Analysis and Design By Manali Torpe

OBJECT ORIENTED PROGRAMMING USING C++ CSCI Object Oriented Analysis and Design By Manali Torpe OBJECT ORIENTED PROGRAMMING USING C++ CSCI 5448- Object Oriented Analysis and Design By Manali Torpe Fundamentals of OOP Class Object Encapsulation Abstraction Inheritance Polymorphism Reusability C++

More information

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register

5. (a) What is secondary storage? How does it differ from a primary storage? (b) Explain the functions of (i) cache memory (ii) Register General Concepts 1. (a) What are combinational circuits? (b) Perform the following: (i) Convert (0.5625) 10 = ( ) 2 (ii) (010010) 2 (100011) 2 = ( ) 2 2. (a) Using truth table prove that A B= A+ B (b)

More information

COMPUTER SCIENCE 2002 (Delhi Board)

COMPUTER SCIENCE 2002 (Delhi Board) COMPUTER SCIENCE 2002 (Delhi Board) Time allowed: 3 hours Max. Marks: 70 Instructions: (i) All the questions are compulsory. (ii) Programming Language: C++ QUESTION l. (a) What the purpose of a header

More information

Department of Computer science and Engineering Sub. Name: Object oriented programming and data structures Sub. Code: EC6301 Sem/Class: III/II-ECE Staff name: M.Kavipriya Two Mark Questions UNIT-1 1. List

More information

Interview Questions of C++

Interview Questions of C++ Interview Questions of C++ Q-1 What is the full form of OOPS? Ans: Object Oriented Programming System. Q-2 What is a class? Ans: Class is a blue print which reflects the entities attributes and actions.

More information

Short Notes of CS201

Short Notes of CS201 #includes: Short Notes of CS201 The #include directive instructs the preprocessor to read and include a file into a source code file. The file name is typically enclosed with < and > if the file is a system

More information

ACADEMIC YEAR PLANNING - F.Y.J.C. ( ) F.Y.J.C. COMPUTER SCIENCE (Theory)

ACADEMIC YEAR PLANNING - F.Y.J.C. ( ) F.Y.J.C. COMPUTER SCIENCE (Theory) ACADEMIC YEAR PLANNING - F.Y.J.C. (2015-16) F.Y.J.C. COMPUTER SCIENCE (Theory) JULY Number Systems & Binary Arithmetic : Binary number, decimal, octal, hexadecimal numbers, BCD,conversion from one number

More information

CS201 - Introduction to Programming Glossary By

CS201 - Introduction to Programming Glossary By CS201 - Introduction to Programming Glossary By #include : The #include directive instructs the preprocessor to read and include a file into a source code file. The file name is typically enclosed with

More information

WYSE Academic Challenge Regional Computer Science 2008 Solution Set

WYSE Academic Challenge Regional Computer Science 2008 Solution Set 1. Correct answer: C. WYSE Academic Challenge Regional 2008 Solution Set 8 bits are sent at each clock cycle and there are 1,000,000 cycles per second, so 8,000,000 bits per second or 1,000,000 bytes per

More information

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low Chapter 15 Networking Concepts 1. Define networking. It is the interconnection of independent computing devices for sharing of information over shared medium. 2. What is the need for networking? / What

More information

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers Router Router is a Microprocessor controlled device that forwards data packets across the computer network. It is used to connect two or more data lines from different net works. The function of the router

More information

Padasalai.Net s Model Question Paper

Padasalai.Net s Model Question Paper Padasalai.Net s Model Question Paper STD: XII VOLUME - 2 MARKS: 150 SUB: COMPUTER SCIENCE TIME: 3 HRS PART I Choose the correct answer: 75 X 1 = 75 1. Which of the following is an object oriented programming

More information

Computer Science Engineering Sample Papers

Computer Science Engineering Sample Papers See fro more Material www.computetech-dovari.blogspot.com Computer Science Engineering Sample Papers 1 The order of an internal node in a B+ tree index is the maximum number of children it can have. Suppose

More information

Data Structures using OOP C++ Lecture 3

Data Structures using OOP C++ Lecture 3 References: th 1. E Balagurusamy, Object Oriented Programming with C++, 4 edition, McGraw-Hill 2008. 2. Robert L. Kruse and Alexander J. Ryba, Data Structures and Program Design in C++, Prentice-Hall 2000.

More information

KENDRIYA VIDYALAYA SANGATHAN BHUBANESWAR REGION SPLITUP SYLLABUS FOR COMPUTER SCIENCE CLASS XII

KENDRIYA VIDYALAYA SANGATHAN BHUBANESWAR REGION SPLITUP SYLLABUS FOR COMPUTER SCIENCE CLASS XII KENDRIYA VIDYALAYA SANGATHAN BHUBANESWAR REGION SPLITUP SYLLABUS FOR COMPUTER SCIENCE 2015-16 CLASS XII MONTH PORTION TO BE COVERED THEORY PRACTICAL April-May 2015 June-July 2015 Aug-2015 REVIEW: C++ covered

More information

Object-Oriented Programming

Object-Oriented Programming Object-Oriented Programming 1. What is object-oriented programming (OOP)? OOP is a technique to develop logical modules, such as classes that contain properties, methods, fields, and events. An object

More information

A linear-list Data Structure where - addition of elements to and - removal of elements from are restricted to the first element of the list.

A linear-list Data Structure where - addition of elements to and - removal of elements from are restricted to the first element of the list. A linear-list Data Structure where - addition of elements to and - removal of elements from are restricted to the first element of the list. the first element of the list a new element to (the Top of)

More information

IS0020 Program Design and Software Tools Summer, 2004 August 2, 2004 in Class

IS0020 Program Design and Software Tools Summer, 2004 August 2, 2004 in Class IS0020 Program Design and Software Tools Summer, 2004 August 2, 2004 in Class Name: A. Fill in the blanks in each of the following statements [Score: 20]: 1. A base class s members can be accessed only

More information

Madhya Pradesh Bhoj (Open) University, Bhopal

Madhya Pradesh Bhoj (Open) University, Bhopal Subject- Optimization Techniques Maximum Marks: 20 Q.1 Explain the concept, scope and tools of O.R. Q.2 Explain the Graphical method for solving Linear Programming Problem. Q.3 Discuss the Two phase method

More information

Introduction to Programming Using Java (98-388)

Introduction to Programming Using Java (98-388) Introduction to Programming Using Java (98-388) Understand Java fundamentals Describe the use of main in a Java application Signature of main, why it is static; how to consume an instance of your own class;

More information

COMPUTER APPLICATION

COMPUTER APPLICATION Total No. of Printed Pages 16 HS/XII/A.Sc.Com/CAP/14 2 0 1 4 COMPUTER APPLICATION ( Science / Arts / Commerce ) ( Theory ) Full Marks : 70 Time : 3 hours The figures in the margin indicate full marks for

More information

12 Abstract Data Types

12 Abstract Data Types 12 Abstract Data Types 12.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: Define the concept of an abstract data type (ADT). Define

More information

(DMCA101) M.C.A. DEGREE EXAMINATION, MAY First Year INFORMATION TECHNOLOGY

(DMCA101) M.C.A. DEGREE EXAMINATION, MAY First Year INFORMATION TECHNOLOGY (DMCA101) M.C.A. DEGREE EXAMINATION, MAY - 2017 First Year INFORMATION TECHNOLOGY Time : 3 Hours Maximum Marks : 70 SECTION - A (3 15 = 45) Answer any three of the following Q1) Discuss business pressures

More information

Darshan Institute of Engineering & Technology for Diploma Studies

Darshan Institute of Engineering & Technology for Diploma Studies 1. Explain different network devices in detail. Or Explain NIC (Network Interface Card) in detail. Network interface cards are add on cards as hardware cards on the motherboard. This is additional hardware

More information

B.Sc II Year Computer Science (Optional)

B.Sc II Year Computer Science (Optional) Swami Ramanand Teerth Marathwad University, Nanded B.Sc II Year Computer Science (Optional) (Semester Pattern) ( W.E.F. June 2010) Paper No VI VII Paper Title Digital Electronics & 8085 Microprocessor

More information

CS6301 PROGRAMMING AND DATA STRUCTURES II QUESTION BANK UNIT-I 2-marks ) Give some characteristics of procedure-oriented language. Emphasis is on doing things (algorithms). Larger programs are divided

More information

ADMINISTRATIVE MANAGEMENT COLLEGE

ADMINISTRATIVE MANAGEMENT COLLEGE First Semester ADMINISTRATIVE MANAGEMENT COLLEGE BACHELOR OF COMPUTER APPLICATION COURSE OUTCOME (CO) Problem solving techniques Using C CO 1: Understand the basic concepts of programming, software and

More information

Object Oriented Design

Object Oriented Design Object Oriented Design Chapter 9 Initializing a non-static data member in the class definition is a syntax error 1 9.2 Time Class Case Study In Fig. 9.1, the class definition is enclosed in the following

More information

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75

M.C.A. DEGREE EXAMINATION, DEC First Year. Time : 03 Hours Maximum Marks : 75 (DMCA 101) M.C.A. DEGREE EXAMINATION, DEC. - 2012 First Year Paper - I : INFORMATION TECHNOLOGY Time : 03 Hours Maximum Marks : 75 Section - A Answer any Three of the following (3 15 = 45) 1) Define the

More information

CS304 Object Oriented Programming Final Term

CS304 Object Oriented Programming Final Term 1. Which of the following is the way to extract common behaviour and attributes from the given classes and make a separate class of those common behaviours and attributes? Generalization (pg 29) Sub-typing

More information

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder

1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder MCA Lateral 1. Which of the following circuits can be used to store one bit of data? A) Encoder B) OR gate C) Flip Flop D) Decoder 2. What would be the output of the following C program? main ( ){ int

More information

COMPUTER SCIENCE (ELECTIVE) Paper-A (100 Marks) Section-I: INTRODUCTION TO INFORMATION TECHNOLOGY Computer and its characteristics, Computer Organization & operation, Components of Computer, Input/Output

More information

CERTIFICATE IN WEB PROGRAMMING

CERTIFICATE IN WEB PROGRAMMING COURSE DURATION: 6 MONTHS CONTENTS : CERTIFICATE IN WEB PROGRAMMING 1. PROGRAMMING IN C and C++ Language 2. HTML/CSS and JavaScript 3. PHP and MySQL 4. Project on Development of Web Application 1. PROGRAMMING

More information

Computer Science (330)

Computer Science (330) Lesson 1 Anatomy of a Digital Computer Sr. Secondary Course (Syllabus) Computer Science (330) 1.3 Functions and Components of a Computer 1.3.1 How the CPU and Memory work 1.4 Input devices 1.4.1 Keyboard

More information

HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE

HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE HIGER SECONDARY FIRST YEAR COMPUTER SCIENCE VOLUME I Chapter 1 : Introduction to computers and Number Systems 1.1 Introduction to Computers 1.1.1 History of Computers 1.1.2 Data, Information and program

More information

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR

MULTIMEDIA COLLEGE JALAN GURNEY KIRI KUALA LUMPUR STUDENT IDENTIFICATION NO MULTIMEDIA COLLEGE JALAN GURNEY KIRI 54100 KUALA LUMPUR FIFTH SEMESTER FINAL EXAMINATION, 2014/2015 SESSION PSD2023 ALGORITHM & DATA STRUCTURE DSEW-E-F-2/13 25 MAY 2015 9.00 AM

More information

15 FUNCTIONS IN C 15.1 INTRODUCTION

15 FUNCTIONS IN C 15.1 INTRODUCTION 15 FUNCTIONS IN C 15.1 INTRODUCTION In the earlier lessons we have already seen that C supports the use of library functions, which are used to carry out a number of commonly used operations or calculations.

More information

5. Give any three parts of the structure of business letter.

5. Give any three parts of the structure of business letter. BCA (Part II) Examination, 2011 Communication Skills Time allowed: Three Hours Max. Marks: 50 Attempt any five questions. All questions carry equal marks. Part - A 1. Write the definition of communication.

More information

Constructors and Destructors. OOC 4 th Sem, B Div Prof. Mouna M. Naravani

Constructors and Destructors. OOC 4 th Sem, B Div Prof. Mouna M. Naravani Constructors and Destructors OOC 4 th Sem, B Div 2016-17 Prof. Mouna M. Naravani A constructor guarantees that an object created by the class will be initialized automatically. Ex: create an object integer

More information

B.V. Patel Institute of Business Management, Computer & Information Technology, Uka Tarsadia University

B.V. Patel Institute of Business Management, Computer & Information Technology, Uka Tarsadia University Unit 1 Programming Language and Overview of C 1. State whether the following statements are true or false. a. Every line in a C program should end with a semicolon. b. In C language lowercase letters are

More information

l Determine if a number is odd or even l Determine if a number/character is in a range - 1 to 10 (inclusive) - between a and z (inclusive)

l Determine if a number is odd or even l Determine if a number/character is in a range - 1 to 10 (inclusive) - between a and z (inclusive) Final Exam Exercises Chapters 1-7 + 11 Write C++ code to: l Determine if a number is odd or even CS 2308 Fall 2016 Jill Seaman l Determine if a number/character is in a range - 1 to 10 (inclusive) - between

More information

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper

IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper IBPS SO Examination 2013 IT Officer Professional Knowledge Question Paper 1. The tracks on a disk which can be accused without repositioning the R/W heads is (A) Surface (B) Cylinder (C) Cluster 2. Which

More information

COURSE OUTLINE & WEEK WISE BREAKAGE

COURSE OUTLINE & WEEK WISE BREAKAGE COURSE OUTLINE & WEEK WISE BREAKAGE Week wise Course outline of Computer Fundamentals & Programming (CE-100) 3+1 (Batch 2018-Electronic Engineering) Dated: 13-12-2017 Course Coordinator: Saeed Azhar WEEK

More information

M.C.A. DEGREE EXAMINATION, MAY First Year. Paper I INFORMATION TECHNOLOGY. SECTION A (3 15 = 45 marks) Answer any THREE of the following.

M.C.A. DEGREE EXAMINATION, MAY First Year. Paper I INFORMATION TECHNOLOGY. SECTION A (3 15 = 45 marks) Answer any THREE of the following. Paper I INFORMATION TECHNOLOGY Answer any THREE of the following. 1. Explain Architecture of computer in detail. 2. Explain in detail about Input and Output technologies. 3. What is MODEM? What factors

More information

Abstract Data Structures IB Computer Science. Content developed by Dartford Grammar School Computer Science Department

Abstract Data Structures IB Computer Science. Content developed by Dartford Grammar School Computer Science Department Abstract Data Structures IB Computer Science Content developed by Dartford Grammar School Computer Science Department HL Topics 1-7, D1-4 1: System design 2: Computer Organisation 3: Networks 4: Computational

More information

CLASSES AND OBJECTS IN JAVA

CLASSES AND OBJECTS IN JAVA Lesson 8 CLASSES AND OBJECTS IN JAVA (1) Which of the following defines attributes and methods? (a) Class (b) Object (c) Function (d) Variable (2) Which of the following keyword is used to declare Class

More information

Code No: R Set No. 1

Code No: R Set No. 1 Code No: R05010106 Set No. 1 1. (a) Draw a Flowchart for the following The average score for 3 tests has to be greater than 80 for a candidate to qualify for the interview. Representing the conditional

More information

ZONAL EDUCATION OFFICE - JAFFNA

ZONAL EDUCATION OFFICE - JAFFNA ZONAL EDUCATION OFFICE - JAFFNA SECOND TERM EXAMINATION - 2014 Information and Communication Technology Grade 10 Time : 3 Hours Answer all the questions Part I 01. Which of the following is correct chronological

More information

Recharge (int, int, int); //constructor declared void disply();

Recharge (int, int, int); //constructor declared void disply(); Constructor and destructors in C++ Constructor Constructor is a special member function of the class which is invoked automatically when new object is created. The purpose of constructor is to initialize

More information

ITEC 3800 Data Communication and Network. Introducing Networks

ITEC 3800 Data Communication and Network. Introducing Networks ITEC 3800 Data Communication and Network Introducing Networks Introduction to Networking Computer network, or simply network Refers to the connection of two or more computers by some type of medium You

More information

Computer Networks Question Bank

Computer Networks Question Bank Computer Networks Question Bank 1. Describe in detail OSI Model ANS: OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network. A reference model is a conceptual

More information

JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY Pagalavadi, Tiruchirappalli (An approved by AICTE and Affiliated to Anna University)

JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY Pagalavadi, Tiruchirappalli (An approved by AICTE and Affiliated to Anna University) Estd: 1994 JAYARAM COLLEGE OF ENGINEERING AND TECHNOLOGY Pagalavadi, Tiruchirappalli - 621014 (An approved by AICTE and Affiliated to Anna University) ISO 9001:2000 Certified Subject Code & Name : CS 1202

More information

! Determine if a number is odd or even. ! Determine if a number/character is in a range. - 1 to 10 (inclusive) - between a and z (inclusive)

! Determine if a number is odd or even. ! Determine if a number/character is in a range. - 1 to 10 (inclusive) - between a and z (inclusive) Final Exam Exercises CS 2308 Spring 2014 Jill Seaman Chapters 1-7 + 11 Write C++ code to: Determine if a number is odd or even Determine if a number/character is in a range - 1 to 10 (inclusive) - between

More information

INTRODUCTION TO ICT.

INTRODUCTION TO ICT. INTRODUCTION TO ICT. (Introducing Basic Network Concepts) Lecture # 24-25 By: M.Nadeem Akhtar. Department of CS & IT. URL: https://sites.google.com/site/nadeemcsuoliict/home/lectures 1 INTRODUCTION TO

More information

«Computer Science» Requirements for applicants by Innopolis University

«Computer Science» Requirements for applicants by Innopolis University «Computer Science» Requirements for applicants by Innopolis University Contents Architecture and Organization... 2 Digital Logic and Digital Systems... 2 Machine Level Representation of Data... 2 Assembly

More information

DEEPIKA KAMBOJ UNIT 2. What is Stack?

DEEPIKA KAMBOJ UNIT 2. What is Stack? What is Stack? UNIT 2 Stack is an important data structure which stores its elements in an ordered manner. You must have seen a pile of plates where one plate is placed on top of another. Now, when you

More information

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory ) Total No. of Printed Pages 12 HS/XII/V/CT/Paper V/14 2 0 1 4 COMPUTER TECHNIQUE ( Vocational Stream ) Paper : V ( Computer Network ) ( Theory ) Full Marks : 100 Time : 3 hours The figures in the margin

More information

STRUCTURING OF PROGRAM

STRUCTURING OF PROGRAM Unit III MULTIPLE CHOICE QUESTIONS 1. Which of the following is the functionality of Data Abstraction? (a) Reduce Complexity (c) Parallelism Unit III 3.1 (b) Binds together code and data (d) None of the

More information

POINTERS - Pointer is a variable that holds a memory address of another variable of same type. - It supports dynamic allocation routines. - It can improve the efficiency of certain routines. C++ Memory

More information

Object Oriented Programming. Assistant Lecture Omar Al Khayat 2 nd Year

Object Oriented Programming. Assistant Lecture Omar Al Khayat 2 nd Year Object Oriented Programming Assistant Lecture Omar Al Khayat 2 nd Year Syllabus Overview of C++ Program Principles of object oriented programming including classes Introduction to Object-Oriented Paradigm:Structures

More information

Dr. Babasaheb Ambedkar Open University

Dr. Babasaheb Ambedkar Open University Enrollment Number : Dr. Babasaheb Ambedkar Open University Term End Examination January - 2015 Course : BCA Numerical Code: 0065 Subject Code : BCA 301 Numerical Code: 0530 Subject : Introduction to Computer

More information

COMPUTER SCIENCE (THEORY) 2016-17 Class XII (Theory) Python Duration : 3 Hours Total Marks : 70 Unit No. Unit Name Marks 1. OBJECT ORIENTED PROGRAMMING WITH PYTHON 24 2. ADVANCE PROGRAMMING WITH PYTHON

More information

OOPS Viva Questions. Object is termed as an instance of a class, and it has its own state, behavior and identity.

OOPS Viva Questions. Object is termed as an instance of a class, and it has its own state, behavior and identity. OOPS Viva Questions 1. What is OOPS? OOPS is abbreviated as Object Oriented Programming system in which programs are considered as a collection of objects. Each object is nothing but an instance of a class.

More information

1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices.

1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices. (DMCA 101) ASSIGNMENT - 1, MAY-2014. PAPER- I : INFORMATION TECHNOLOGY 1) What is the role of information technology in modern organizations? 2) Discuss the memory and storage devices. 3) What is software?

More information

JAVA GUI PROGRAMMING REVISION TOUR III

JAVA GUI PROGRAMMING REVISION TOUR III 1. In java, methods reside in. (a) Function (b) Library (c) Classes (d) Object JAVA GUI PROGRAMMING REVISION TOUR III 2. The number and type of arguments of a method are known as. (a) Parameter list (b)

More information

CHAPTER 1 Introduction to Computers and Programming CHAPTER 2 Introduction to C++ ( Hexadecimal 0xF4 and Octal literals 031) cout Object

CHAPTER 1 Introduction to Computers and Programming CHAPTER 2 Introduction to C++ ( Hexadecimal 0xF4 and Octal literals 031) cout Object CHAPTER 1 Introduction to Computers and Programming 1 1.1 Why Program? 1 1.2 Computer Systems: Hardware and Software 2 1.3 Programs and Programming Languages 8 1.4 What is a Program Made of? 14 1.5 Input,

More information

CGS 2405 Advanced Programming with C++ Course Justification

CGS 2405 Advanced Programming with C++ Course Justification Course Justification This course is the second C++ computer programming course in the Computer Science Associate in Arts degree program. This course is required for an Associate in Arts Computer Science

More information

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Objectives. Learn how computers are connected. Become familiar with different types of transmission media Objectives Learn how computers are connected Become familiar with different types of transmission media Learn the differences between guided and unguided media Learn how protocols enable networking 2 Objectives

More information

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run?

COLLEGEDUNIA MCA. 3. What would be displayed, if the following program is compiled and run? MCA 1. If a 1Gb file is to be transmitted over a 10Mbps link, how much time would it take to complete the transmission? A) 10 seconds B) 100 seconds C) 1000 seconds D) 1024 seconds 2. Which one of the

More information

XII CS(EM) Minimum Question List N.KANNAN M.Sc., B.Ed COMPUTER SCIENCE IMPORTANT QUESTION (TWO MARKS) CHAPTER 1 TO 5 ( STAR OFFICE WRITER)

XII CS(EM) Minimum Question List N.KANNAN M.Sc., B.Ed COMPUTER SCIENCE IMPORTANT QUESTION (TWO MARKS) CHAPTER 1 TO 5 ( STAR OFFICE WRITER) COMPUTER SCIENCE IMPORTANT QUESTION (TWO MARKS) CHAPTER 1 TO 5 ( STAR OFFICE WRITER) 1. Selecting text with keyboard 2. Differ copying and moving 3. Text Editing 4. Creating a bulleted list 5. Creating

More information

Lecture 18 Tao Wang 1

Lecture 18 Tao Wang 1 Lecture 18 Tao Wang 1 Abstract Data Types in C++ (Classes) A procedural program consists of one or more algorithms that have been written in computerreadable language Input and display of program output

More information

M.C.A. DEGREE EXAMINATION, MAY First Year Paper - I : INFORMATION TECHNOLOGY. Time : 03 Hours Maximum Marks : 75

M.C.A. DEGREE EXAMINATION, MAY First Year Paper - I : INFORMATION TECHNOLOGY. Time : 03 Hours Maximum Marks : 75 M.C.A. DEGREE EXAMINATION, MAY - 2013 First Year Paper - I : INFORMATION TECHNOLOGY (DMCA 101) Time : 03 Hours Maximum Marks : 75 Section - A (3 15 = 45) Answer any Three of the following 1) What is the

More information

STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING

STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING OBJECT ORIENTED PROGRAMMING STUDY NOTES UNIT 1 - INTRODUCTION TO OBJECT ORIENTED PROGRAMMING 1. Object Oriented Programming Paradigms 2. Comparison of Programming Paradigms 3. Basic Object Oriented Programming

More information

CONTENTS. Chapter 1 Introduction and Evolution of Computer

CONTENTS. Chapter 1 Introduction and Evolution of Computer CONTENTS Chapter 1 Introduction and Evolution of Computer 1.1 Concept and Characteristics of Computer... 2 1.2 Application of Computers... 6 1.3 History of Computer... 8 Mechanical Calculating Era... 8

More information

PART - I 75 x 1 = The building blocks of C++ program are (a) functions (b) classes (c) statements (d) operations

PART - I 75 x 1 = The building blocks of C++ program are (a) functions (b) classes (c) statements (d) operations OCTOBER 2007 COMPUTER SCIENCE Choose the best answer: PART - I 75 x 1 = 75 1. Which of the following functions will be executed first automatically, when a C++ Program is (a) void (b) Main (c) Recursive

More information

Nepal Telecom Nepal Doorsanchar Company Ltd.

Nepal Telecom Nepal Doorsanchar Company Ltd. Nepal Telecom Nepal Doorsanchar Company Ltd. Syllabus lg=g+= 124 ;+u ;DalGwt cg';'lr - 3_ Part II: (Specialized subject for Computer Engineer Level 7 Tech. - Free and Internal competition) Time: 2 hours

More information

FORTH SEMESTER DIPLOMA EXAMINATION IN ENGINEERING/ TECHNOLIGY- OCTOBER, 2012 DATA STRUCTURE

FORTH SEMESTER DIPLOMA EXAMINATION IN ENGINEERING/ TECHNOLIGY- OCTOBER, 2012 DATA STRUCTURE TED (10)-3071 Reg. No.. (REVISION-2010) Signature. FORTH SEMESTER DIPLOMA EXAMINATION IN ENGINEERING/ TECHNOLIGY- OCTOBER, 2012 DATA STRUCTURE (Common to CT and IF) [Time: 3 hours (Maximum marks: 100)

More information

Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS

Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS Contents Preface... (vii) CHAPTER 1 INTRODUCTION TO COMPUTERS 1.1. INTRODUCTION TO COMPUTERS... 1 1.2. HISTORY OF C & C++... 3 1.3. DESIGN, DEVELOPMENT AND EXECUTION OF A PROGRAM... 3 1.4 TESTING OF PROGRAMS...

More information

AN OVERVIEW OF C++ 1

AN OVERVIEW OF C++ 1 AN OVERVIEW OF C++ 1 OBJECTIVES Introduction What is object-oriented programming? Two versions of C++ C++ console I/O C++ comments Classes: A first look Some differences between C and C++ Introducing function

More information

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers

31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers 31270 Networking Essentials Focus, Pre-Quiz, and Sample Exam Answers CONTENTS Focus Questions... 2 Chapter 1: Explore the Network... 2 Chapter 2: Configure a Network Operating System... 5 Chapter 3: Network

More information

BCA (Part II) EXAMINATION, 2009 C++ PROGRAMMING Time allowed: Three Hours Maximum Marks: 50 Attempt any five questions

BCA (Part II) EXAMINATION, 2009 C++ PROGRAMMING Time allowed: Three Hours Maximum Marks: 50 Attempt any five questions C++ PROGRAMMING Attempt any five questions 1. (a) What is encapsulation? Why is data considered safe if encapsulated? How are the terms abstraction and encapsulation related. 4 (b) What do you understand

More information

This paper consists of 27 pages and the instructions for the completion of a mark-reading sheet.

This paper consists of 27 pages and the instructions for the completion of a mark-reading sheet. This paper consists of 27 pages and the instructions for the completion of a mark-reading sheet. Please complete the attendance register on the back page, tear it off and hand it to the invigilator. Instructions:

More information

COMPUTER SCIENCE (THEORY) Class XII (Theory) - Python

COMPUTER SCIENCE (THEORY) Class XII (Theory) - Python StudyCBSENotes.com 1 COMPUTER SCIENCE (THEORY) Class XII (Theory) - Python Duration: 3 Hours Total Marks: 70 Unit No. Unit Name Marks 1 Object Oriented Programming with Python 24 2 Advances Programming

More information

WYSE Academic Challenge Computer Science Test (State) 2014 Solution Set

WYSE Academic Challenge Computer Science Test (State) 2014 Solution Set WYSE Academic Challenge Computer Science Test (State) 2014 Solution Set 1. Correct Answer: D Authentication involves verifying the user that will gain access to a system. The most common form of authentication

More information

Content: Learning Objectives

Content: Learning Objectives 1 BLOOM PUBLIC CHOOL Vasant Kunj, New Delhi Lesson Plan Class: XII ubject: Computer cience Month : July No of s: 21 Chapter:Data structure: Linked List TTT: 8 WT: 12 Content: Learning Objectives At the

More information

Dept. of Computer Sc., SDP College for Women, Ludhiana

Dept. of Computer Sc., SDP College for Women, Ludhiana Dept. of Computer Sc., SDP College for Women, Ludhiana QUESTION BANK PROBLEM SOLVING THROUGH "C" BCA 1 st semester (2018-19) 1. Structured programming has been called a revolution in programming & is considered

More information