You are on page 1of 25

Page | 1

ICS COMPUTER SCIENCE


CHAPTER-1+2 PART -2
Important Question for ICS Computer Science Part-2
Chapter-01+ 02(Data Basics + Basic concepts and Terminologies of Databases)
Q-1: Chose the correct option.
1

1x14=14
The process of arranging data in a logical sequence is called.
Sorting

Summarizing

A collection of related fields is


File
Record

Data capturing

classifying

Database

None

DPMS stands for:


Data business
Management
services

Database
Database
Data business
modeling
Management
model system
system
System
Which of the following is handled by DBMS?
Data integrity

Data security

Data
independence
The major components of DBMS is called

All

Database
manager
SQL is a (n)
Unstructured
language

File manager

Data manager

All

Structured
language

Object
oriented
programming

Software

DBA stands for:

Database
Data basic
Database
Database authority
administrator Administration
Application
A primary key that consists of more than one attribute is called a:
Foreign key

Composite key

Which of the following describes the primary key?


It must be
unique

10

11

Multimedia key Global key

It helps in
indexing of a
large database
An attribute is also known as :

It makes
sorting quicker

All

Table

Row

Field

Relationship

Attribute

Relation

A relation is also known as:


Table

Tuple

The Royal College & Computer


Institute Feroza

Page | 2

12

SQL is used for:


Data
definition

Data
manipulation

Data definition
and
manipulation

Searching records

13

An index can be used to:

14

Improve the
Document the
performance
structure of the
of the
database itself
database
A key that is used strictly for data

Reduce data
All
dependencey
for application
program
retrieval purposes:

Secondary key Candidate key

Composite key

Q-2: Write short answers any TEN, each question carry 2 marks.
i.
Define Database.
ii.
Who is data administrator?
iii.
What you know about foreign key.
iv.
Define Candidate key / alternate key?
v.
What is primary key.
vi.
Write the names of different keys which use in database,
vii.
What is entity? Give an example.
viii.
What is secondary key?
ix.
Write 3 advantages of DBMS.
x.
Define consistency constraints?
xi.
What is DBMS?
xii.
Describe Data manipulation.
xiii.
Define Data processing.

Primary key

2x10=20

Q-3: Write detail answers of the following questions.


2x8=16
i.
What is a key? Describe different types of keys used in databases.
ii.
What is DBMS? Briefly describe the advantages and disadvantages of DBMS.

ICS Computer Science Chapter-3 part-2 BISE


Important Question for ICS Computer Science Part-2
Chapter-03 (Database Design Process)
1.

2.

Data stored data single site is in ____________ database


model. In Centralized database system, all the data is stored at
a single site.
Design
Centralized
Partitionized
Storage
In ERD model, the relationship between two entities is

The Royal College & Computer


Institute Feroza

Page | 3

3.

4.

5.

6.
7.
8.
9.
10.

12.

13.

14.

represented by a:
Diamond
Rectangular
Oval symbol
Line
Symbol
box
A data model is
A logical
Shown as an Transformed
All
representation
entityinto tables and
of the structure relationship
relationship
of the database diagram
An Index may be created on:
Primary Key
Secondary
Foreign Key
All
Key
Which of the following is used to associate entities with one
another?
Entity
Attribute
Relationship
Identifier
A relationship can be:
One to One
One to many Many to many All
In an E-R diagram, a rectangle represents a (n)
Entity
Attribute
Relationship
None
Which of the following are basic data distribution strategies?
Centralized
Partitioned
Replication
All
Which of the following represent the entities?
Teacher
Student
Principal
All
A technique for physically arranging the records of a file on
secondary storage devices is called:
Physical
File
Retrieval
Update
pointer
organization
program
Program
Which of the following is related to Modality?
Optional
Mandatory
Unidirectional
A and B
Which of the following is an example of one to one
relationship?
MotherBike-Record
StudentClientdaughter
RegNo
phone-no
A relationship between countries and capitals is an example of
___________ relationship.
One to many
One to One
Many to many Many to
one
____________ are the basis of usage paterns of the database.
Data volume and Usage analysis are used to estimate the size
or volume and the usage patterns of the database.
Decision
Normalize
Usage
Logical
Tables
Relations
Analysis
Design

Q-2: Write short answers any TEN, each question carry 2 marks.
i. Define maximum cardinality and minimum cardinality.
ii. Distinguish between an entity class and an entity instance.
iii. Define Database integrity.
iv. List major inputs to physical design.
v. State the purpose of Database design process.
vi. Write the use of ER Diagram.
vii. What is the purpose of feasibility study?

2x10=20

The Royal College & Computer


Institute Feroza

Page | 4

viii.
ix.
x.

Why is requirement analysis conducted?


Define an Attribute with example.
Define modality.

Q-3: Write detail answers of the following questions.


i. Explain different components of logical model in detail.
ii. Briefly describe basic data distribution strategies.

2x8=16

ICS Computer Science Chapter-4 part-2 BISE


Important Question for ICS Computer Science Part-2, important notes for ICS computer Science for
all Boards and Federal Board.
Chapter-04(Data Integrity and Normalization)
Redundancy in table can create certain ____________ in
the partial functional dependency.
Anomalies
Possibilities
Integrity
Views
2.

The attributes in two different tables having the same name


are called ____________ .
Acronym
Integrity
Homonym
Independent

3.

Normalization is the process of converting complex data


structures into ____________ .
Neural Data Operation
Access Data
Stable Data
Structure
Data
Structure
Structures
Structure
____________ is created when two different names are
used for the same information.
Expression Synonyms
Consistent
Mutually
Protected
____________ is the process of converting complex data
structures into simple data structures.
Correctnes Filter
Fact
Normalizatio
s
n
Which of the following states that no attribute of a primary
key should contain null value?
Redundant Transitive
Data Security Entity
Information dependency
Integrity
Two or more attributes having different names but same
meaning are called:
Homonyms Aliases
Synonyms
Alternae
attribute
2NF, which form of dependency is removed?

4.

5.

6.

7.

8.

Functional

Partial

Associative

Transitive

The Royal College & Computer


Institute Feroza

Page | 5

9.

Which of the following anomalies result from a transitive


dependency?
Insertion
Mofificatin
Deletion
All

10.

A relation that contains minimal redundency and allows easy


use is called:
Clean
Simple
Complex
Well
Structured
When all the non key attributes are fully dependent on
primary key then the state is known as ____________ .
Entity
Fourth
Second
Functional
Integrity
Normal Form Normal Form
Dependency
A relation R can be in ____________ if all underlying
domains contains atomic values.
Fourth
First Normal
Referential
Consistent
Normal
Form
Integrity
Normal Form
Form
____________ must refer to the PK in another table or it
must be null.
Redundant Simple Data
Transitive
Refrential
Information structure
dependency
Integrity
Which of the following states that no attribute of a primary
key should contain null value?
Redundant Transitive
Data Security Entity
Information dependency
Integrity

11.

12.

13.

14.

The Royal College & Computer


Institute Feroza

Page | 6

Q-2: Write short answers any TEN, each question carry 2 marks.
2x10=20
i.
Write the names of three typical problem in merging relations.
ii.
Compare normal form and normalization.
iii.
Describe transitive dependency.
iv.
Differentiate between partial dependency and transitive dependency.
v.
What is partial dependency?
vi.
What are the database anomalies?
vii.
Describe repeating group.
viii.
Define functional dependency.
ix.
Define Normalization.
x.
Define mutual exclusiveness of data.
xi.
Define the term of redundancy.
xii.
What is meant by entity integrity?
xiii.
Define referential integrity.
xiv.
How is entity integrity attained.

Q-3: Write detail answers of the following questions.


i.
What is functional dependency? Explain with example.
ii.
Apply first normal form on this table.
Dept_No
Dept_Nam Emp_no
Emp_Nam
e
e
20
Stiching
S01
Javid
S02
Bilal
30
Finance
S10
Ali
S11
Abdal
10
Manageme S12
Khan
nt
S13
Usman
20
IT
S09
Asif

2x8=16

ICS Computer Science Chapter-5 part-2 BISE


Important Question for ICS Computer Science Part-2, Important notes for ICS computer Science for
all Boards and Federal Board.

Chapter-05(Introduction to Microsoft Access)


1

Which of the following is the correct association?


File = column

Record = row

Field =
row

Recor
d=
table
A collection of data that consists of name, address and
email of a person is called:
The Royal College & Computer

Institute Feroza

Page | 7

Charact Field
er
The smallest meaningful unit of data in a database is called:

Byte

Record

Byte

Record

Charact Field
er
Each separate piece of information stored in a record is
called a:
Form
Field
Table
Cell

A report may be based on a


Table

Query

Both a
and b

None

At most
three
tables

None

Field

Cell

A database may contain:


Only one table

At most two tables

The comlumn of a table corresponded to:


Table

Record

A database consists of various components called:


Tools

Properties

Entities

Object
s

Report

Query

The output of the query is in the form of a


Table

10

Form

A report is a complete set of _________ field:


Distint
1
1

Related

Designe
d

An MS access table contains:


Records but no Fields but no records
fields

12

13

14

All

Both
records
and
fields
Which of the following is NOT a database object:

None
of
these

Table

MS
Word

Query

Report

Which of the following are objects in an MS Access


database:
Table, forms,
Database,datasheet a Folders
queries and
nd forms views
and
reports
tools
Which option in MS Access is used to create a
new database from scratch:

All of
these

The Royal College & Computer


Institute Feroza

Page | 8

Access templat Blank database


e

Existing
databas
e

New
folder

The Royal College & Computer


Institute Feroza

Page | 9

Q-2: Write short answers any TEN, each question carry 2 marks.
i.
How does a database is differ from a table?
ii.
What is MS Access?
iii.
List some disadvantages of IDE.
iv.
Define IDE.
v.
Define Menu Bar.
vi.
What is database wizard?
vii.
Why Reports are important?
viii.
Define form.
ix.
What are reports?
x.
Define query.
xi.
Define any two database objects.
xii.
What is database object?
xiii.
List some advantages of IDE.

2x10=20

Q-3: Write detail answers any 2 of the following questions.

2x8=16

What is an IDE? Discuss its advantages and disadvantages.

What is database object? Discuss the database objects used to store and retrieve data?

Describe Form and Report. Discuss their advantages and disadvantages.

ICS Computer Science Chapter-6 part-2 BISE


Important Question for ICS Computer Science Part-2, important notes for ICS computer Science
for all Boards and Federal Board.
Chapter-06(Table and Query)
1

A one-to-many relationship is created through:


New
Relationship
Relationshi
Relationships
Relationship
Design
ps Wizard
window
s Command
Command
Which symbol is placed around dates in criterion?
[]
*
()
#
Which row in Design grid determines the records selected
in query:
Show
Criteria
Field
Sort
The result of a query are displayed in a:
Form

Design grid

Report

Dynaset

The Royal College & Computer


Institute Feroza

Page | 10

The graphical query tool is known as:


Query grid
Design grid
Query form
Design form
Which of the following is NOT found in totals function in
query?
If
Average
Sum
Group by
Which query is used to join two tables?
FIND
FIND
CROSSTABL
SELCT
UNMATCHE DUPLICATE
E
D
S
Which type of relationship is most common?
One to
Many to
One to One
Many to One
Many
Many
Which symbol is used at the end of join the line in a
related table to signify many side of a one to many
relationship?
#
M

*
What is Z to A order called:
Ascending
1
1

File Menu

Tool

View Menu

Number

Hyperlink

OLE

Default value

All

Field properties determine:


Field size

14

Alphabetical

Which field type can be indexed?


Memo

13

Condescendi
ng

Find and replace command is found in:


Edit Menu

12

Descending

Input mask

How many types of relationship can be used?


2

The Royal College & Computer


Institute Feroza

Page | 11

Q-2: Write short answers any TEN, each question carry 2 marks.
i.
How are records sorted in a query?
ii.
List some advantages of queries.
iii.
Define referential integrity is used?
iv.
List out the types of relationships.
v.
Define sorting.
vi.
Describe the term cascade update.
vii.
Write different options in Find and Replace dialog box.
viii.
What is the use of input mask?
ix.
What are field validation rules?
x.
Write the uses of design view in MS Access.
xi.
Define the term table in Database.
xii.
What is degree of relation.
xiii.
Define the term cardinality.
Q-3: Write detail answers any 2 from the following questions.

2x10=20

2x8=16

What is table? Write detail about different parts of a table.

Define Primary key. What is the procedure of applying primary key in MS Access?

What is relationship? Explain the procedure of defining relationship in MS Access.

ICS Computer Science Chapter-07(Ms Access Forms and Reports) part-2


Important Question for ICS Computer Science Part-2, Important notes for ICS computer Science for all Boards and
Federal Board.

Chapter-07(Ms Access Forms and Reports)


Q-2: Write short answers any TEN, each question carry 2 marks.
i. Define form.
ii. Write some uses of form.
iii. List types of forms in Ms Access.
iv. Write the use of datasheet form.
v. Write the use of combobox.
vi. Describe sub form.
vii. List some standard types of reports in MS Access.
viii. What is linking?
ix. Differentiate between form and report.
x. Which two database object can be used to create a report?
xi. Write the use of switchboard.

Q-3: Write detail answers any 2 from the following questions.

2x10=20

2x8=16

The Royal College & Computer


Institute Feroza

Page | 12

.What is linking? How can an object from other database be linked in MS Access.

Explain the procedure of creating a subform using subform wizard.

What is conditional formatting? Explain with example.

What is form? Explain its uses and advantages.

Discuss different options for editing forms in MS Access.

ICS Computer Science Chapter-08(Getting Started with C) part-2


Important Question for ICS Computer Science Part-2, Important notes for ICS computer Science for all Boards and
Federal Board.

Chapter-08(Getting Started with C)


1

C language was developed in the year:


1969-70

1965-75

1972-88

1955-57

C was developed by..:


VonDr. Abdul
Charles
Denis
Neumann
Slam
Babbage
Ritchie
C language is a
High level
Low level
Assembly
Machine
language
language
language
language
Which of the following language provided the basis for the
development of C?
B
C++
JAVA
PASCAL
An IDE stands for:
Integrated
developmen Input data
Input Data
Internal Disk
t
error
environment
error
Environment
What does the # sign indicate in an instruction of C
language?
Instruction
Instruction
Instruction for Instruction for
for
for user
linker
compiler
programmer
Computer programs are also known as:
Software
Procedure
Hardware
Algorithm
Which one of the following translates source code to object
code as a whole?
The Royal College & Computer
Institute Feroza

Page | 13

11
12
13

14

Interpreter
Compiler
Debugger
Linker
Which of the following language is ideal to write business
application?
Assembly
COBOL
BASIC
None
language
An assembly language uses:
English
Mnemonic
Binary digit
None
words
codes
A programs syntax errors is detected by:
Compiler
Linker
Loader
Debugger
A set of rules that must be followed to develop a program is
called:
Syntax
Preprocessor Bug
Debug
STDIO stands for:
Standard
Symbolic
Simple input
input output input output
output
The extension of Object file is:

String input
output

.c

.h

.txt

.obj

The Royal College & Computer


Institute Feroza

Page | 14

Q-2: Write short answers any TEN, each question carry 2 marks.
i. What do you mean by delimiters?
ii. Why is logical error the most difficult error?
iii. What is difference between bug and debug?
iv. Find out syntax error in following program.
Include <conio.h>
VOID main ()
Printf (Hello)
}
v. What are header files?
vi. Name different types of preprocessor directives.
vii. Write shortcut key to compile C program.
viii. Define object code.
ix. What is compiler
x. Differentiate between compiler and interpreter.
xi. Define assembly language.
xii. What is a programmer?
xiii. What is ANSI in C?
xiv. What is working of this function getch () in C language.

2x10=20

Q-3: Write detail answers any 2 from the following questions.

2x8=16

How many types of error in C language? Write in detail also discus which one error is difficult to find.

What necessary steps are taken to prepare a C program for execution?

Describe language processors or translators and their uses in detail.

ICS computer model paper, ICS computer science guess papers 2014

ICS Computer Science Chapter-09 Elements of C language part-2 BISE


Important Question for ICS Computer Science Part-2, Important notes for ICS computer Science for all Boards and
Federal Board.

Chapter-09(Elements of C language)
1

Which of the following has the highest precedence?


++

&&

||

--

Which operator is used to represent equality in C language?


=

==

><

None

Which of the following is called the modulus operator?


The Royal College & Computer
Institute Feroza

Page | 15

&

Data type int contains types:


10
4
2
16
Which is the name for a word that has a specific meaning in
C?
Keywords
Comments
Token
Operators
To add a value 1 to variable y, you write:
y + =1;

y = y+ 1;

y =1 + y;

All

The expression 0%4 has a value equal to:


3

None

The value of the C expression 13 + 21 % 4 2 is:


0
12
16
14
Which of the following are valid examples of character
constant?
A
9
$
All
Which of the following data types is most appropriate for
storing a name?
Float
Integer
Char
None
11

Variables are created in:


RAM

12

14

Hard Disk

None

a =a+b

b=b+a

a + = b is equalent to:
b+=a

13

ROM
a = +b

Which is numeric data type


Floating
Integer
Both a and b
None
point
The number of bytes used by float data type in C is:
2

12

16

The Royal College & Computer


Institute Feroza

Page | 16

Q-2: Write short answers any TEN, each question carry 2 marks.
i. What is the data type of an expression?
ii. Define comments in C language?
iii. List different types of operators in C language.
iv. What is the use of AND operator?
v. What is compound condition?
vi. What is the use of decrement operator in C language?
vii. Define prefix and postfix increment operator.
viii. Why does cancelation error occur?
ix. How does an arithmetic underflow occur?
x. Define constant.
xi. What is variable initialization?
xii. Define different types of identifiers in C language.
xiii. What is an identifier, explain with example.

2x10=20

Q-3: Write detail answers any 2 from the following questions.

2x8=16

What are logical operators? Discuss different logical operators in C language.

Describe the concept of overflow and underflow with examples.

Write down the rules for naming variables in C language with examples.

ICS Computer Science Chapter-10 Input and output


Important Question for ICS Computer Science Part-2, Important notes for ICS computer Science for all Boards and Federal
Board.

Chapter-10(Input and output)


1

Which of the following is not a valid escape code?


\t
\r
\y
\f
Which character signifies the beginning of an escape
sequence?
{
\
//
/
%f is used for
Double
Float
Integer
Short
Getch() stands for
Go
Give
Get character
All of these
character
character
An ampersand before the name of a variable denotes
Actual
Variable
Address
Data Type
value
name
The Royal College & Computer

Institute Feroza

Page | 17

11

12
13
14

The general form of format specifier for the floating point


value:
%m.nf
m.n%
m%.nf
m.n%f
Which of the following is NOT legal element of control string
in printf statement
Ordinary
Escape
Format
Variables
characters
sequence
specifier
Which of the following format spercifier used for string?
%f
%d
%c
%s
Format specifier is started with symbol
?
%
&
None
Which of the following is displayed by printf function?
Constant or
Text
values of
A and B
None
variables
The format specifier %u is used for:
Unsigned
Unsigned
Integer
Unsigned float
short
long int
Which of the following is an input function:
scanf
printf
sqrt()
getch ()
The function that is used to display output on screen is
called:
printf
scanf
pow
none
The function getche() is defined in:
stdio.h

conio.h

string.h

math.h

The Royal College & Computer


Institute Feroza

Page | 18

Q-2: Write short answers any TEN, each question carry 2 marks.
2x10=20
i. Differentiate between printf and scanf functions.
ii. Differentiate between gets and puts functions.
iii. Write output of the following program.
Char Word1, Word2, Word3;
Wor1= A;
Word2= B;
Word3= C;
Printf(%c %c Word3, Word1, Word2);
iv. Write a C statement to print the value of unsigned long y.
v. List out the names of different functions used for character input.
vi. Explain clscr.
vii. Explain getch.
viii. List out different types of format specifiers.
ix. Which symbol is used to start format specifiers?
x. List some important functions for input.
xi. Define standard input.
xii. What is control string in printf functions?
xiii. State the purpose of %d format specifier.
Q-3: Write detail answers any 2 from the following questions.

Define and explain with example printf and scanf.

Write programs. 2x4=8

2x8=16
1x8=8

(a) Write a program that displays average marks using field width of 5 characters and precision of 2 characters,
(b) Write a program that displays the ASCII code of the character typed by the user.

ICS Computer Science Chapter-11 Decision Constructs


Important Question for ICS Computer Science Part-2, Important notes for ICS computer Science for all Boards
and Federal Board.

Chapter-11(Decision Constructs)
1

If x = 10 and y = 5, what will the output of the


following expression? x > y ? x * y : x + y;
5
10
15
50
Conditional operator is an alternative of:
If
If-else
Nested if
None
Which of the following is used for making two way
decision:
If-else
If
Nested if
Switch
The Royal College & Computer

Institute Feroza

Page | 19

Conditional operator takes:


Three
Two
One
None
operands
operands
operands
The case block ends with:
End Select
End Case
break;
else
In if statement, true is represented by:
0
1
2
3
Which of the following statements is the simplest
form of a decision structure?
If
Try catch
Select.case
Nested if
statement finally
When a relational expression is false,it has the
value .
Zero
One
Less than 0
None
Which programming structure executes program
statements in order?
Relation
Decision
Sequence
Repetition
Another term for a computer making a decision is:
Sequential
Selection
Repetition
Iteration
11 Relational operators allow you to numbers.
Compare
Add
Multiply
Divide
12
Which of the following is equalent to (p > = q)?
p<q
!(p<q)
p>q
!p<q
Which of the following are valid case statements in
13
a switch?
case 1:
case x<4: case ab;
case 1.5:
14
In statement, false is represented by:
0

The Royal College & Computer


Institute Feroza

Page | 20

Q-2: Write short answers any TEN, each question carry 2 marks.
2x10=20
i.
Define control structure.
ii.
Write the names of control structure.
iii.
Describe types of selection strure.
iv.
Draw the flow char of if statement.
v.
Which is the basic control structures for writing a program?
vi.
What is output of the following code?
if (5/2==1)
printf (My Program is running\n);
else
printf(My Program is running????\n);
vii.
Write three selection and three repetition statements.
viii.
Describe sequence structure.
ix.
Write the syntax of if-else statement.
x.
Write the alternative of if-else statement.
xi.
Why break statement is used in a switch () structure?
xii.
Write three advantages of switch statements.
xiii.
Explain if statement.
Q-3: Write detail answers any 2 from the following questions.
2x8=16

Write a program the inputs radius. It calculates area of a circle. Is user enters 1 as choice. It calculates
circumference if the user enters 2 as choice.

Write a detail note on types of control structure in C language.

What is nested if statements? Explain its working with example.

I C S C o m p u t e r S c i e n c e p a r t - 2 C h a p t e r- 1 2 L o o p
Constructs
Important Question for ICS Computer Science Part-2, Important notes for ICS
computer Science for all Intermediate Boards.

Chapter-12(Loop Constructs)

What is the final value of x after executing the following


code:

The Royal College & Computer


Institute Feroza

Page | 21

for (int x=0; x <10; x++)


10

What is the value of a after execution of the following


code?
Int a = 25;
for (int c =0; c<4; c++)
a = a -1;
a = a +3;
23

24

25

20

The body of while loop with multiple statements ends


with:
Right
bracket]

Right
braces}

Comma,

Semi
colon;

Which is a loop statement?


if

if-else

switch

None

Semicolon is placed at the end of condition in:


While loop

Do-while
loop

For loop

All

Counter loop

None

While loop is also called:


Conditional Wend
loop
loop

This means to increase a value by one:


Modulus

Increment Decrement

None

This statement may be used to stop a loops current


iteration and begin next one;
Continue

Break

Terminate

None

A for statement contains three expressions:


initialization , test, __________ .

The Royal College & Computer


Institute Feroza

Page | 22

Null

Validation

Increment/decremen
t

None

A special value that marks the end of a list of input data


is called:
Terminal
value

Sentinel
value

Loop control value

Input
value

11 One execution of a loop is known as a (n).


Cycle

Duration

Iteration

Test

12 How many types of loop are available in c language?


2

13 While loop structure always executes at least once?


Do-while
14

For

While

None

Which of the following loop is called counter control


loop?
For

While

Do while

None

The Royal College & Computer


Institute Feroza

Page | 23

Q-2: Write short answers


i. Define loop.
ii. Write two advantages of loop.
iii. Define while loop.
iv. Define do-while loop.
v. Describe the syntax of do-while loop with example.
vi. Describe the syntax of for loop.
vii. What is for loop.
viii. What is counter controlled loop?
ix. What is sentinel controlled loop.
x. Define sentinel value.
xi. Describe nested loop.
xii. Define infinite loop.
xiii. How many times will the following loop display ORIAL ACADEMY.
for (int i =20; i > 0; i++)
{
printf(Akram Bhatti);
}
Q-3: Write detail answers
Write a program that uses a while loop to enter a number from the user and then display it. The loop is
terminated when the user enters -1.
Explain for loop? Explain its working.

ICS Computer Science part-2 Chapter-13 Functions in C


Important Question for ICS Computer Science Part-2, Important notes for ICS computer Science for all
Intermediate Boards.

Chapter-13(Functions in C)
1

A type of functions written by the programmer is known as:


User
Built in
Subprograms Sub functions
defined
functions
Local variables are also called:
Automatic

Normal

Global

None

A variable declaration outside any function is known as:


Global
Local variable External
Static
The Royal College & Computer
Institute Feroza

Page | 24

variable

variable

The scope of a variable refers to its:


Length

Name

Accessibility

Data type

The parameters in function declaration are called:


Formal
Actual
Both A and B
None
parameters parameters
What is the variable name that is used by a function to receive
passed values?
Function
Parameter
Expression
Constant
The first line of function definition is known as:
Function
Function
Invoking a
None
header
output
function
The process of sending an argument to a function is called:
Sending

11

12

13

14

Filtering

Delivering

Passing

In a C program, two functions can have:


Same name
Same name
Same
Same name
and same
but different
parameters
parameters
parameters
Function declaration consists of:
Number and
Function
Function
types of
All
name
return type
parameters
A built in function:
Cant be
Can be
Cant be return Can be return
redefine
redefine
a value
a value
The name of actual and formal parameters:
May or may
Must be
Must be in
Must be same
not be same
different
lower case
Memory is allocated to a local variable at the time of its:
First
Declaration Destruction
Definition
reference
Global variables are created in:
RAM

ROM

Hard Disk

Cache

Q-2: Write short answers


i.

Define global variable.


The Royal College & Computer

Institute Feroza

Page | 25

ii.

Compare local and global variable.

iii.

Define local variable.

iv.

State the use of formal parameters.

v.

How does a function return value?

vi.

How does a function return value?

vii.

What is function call?

viii.

What is function definition?

ix.

Define function body.

x.

Define function header.

xi.

Describe built in function.

xii.

How does a function make programming easier?

Q-3: Write detail answers

Briefly explain the benefits of using functions.

Write a program that inputs a number in main function and passes the number to a function. The

function displays table of that number.

The Royal College & Computer


Institute Feroza

You might also like