You are on page 1of 2

COMPUTER SCIENCE (THEORY)-XII

Time Allowed: 3 hours] [Maximum Marks:60

Candidates are required to give their answers in their own words as far as practicable.
Marks allotted to each question are indicated against it.

Special Instructions:
(i) While answering your questions, you must indicate on Your Answer-book the same question No.
as appears in your Question Paper.
(ii) Do not leave blank page or pages in your Answer-book.
(iii) All questions are compulsory. Internal choices are given.

1. State whether the following statement are true or false :


i) Linux is hierarchical file system.
ii) Firewall does not prevent from unauthorized access.
iii) The kernel cannot be updated.
iv) A comment is an non executable statement.
v) The law governing cyber space is known as cyber law.
vi) An array stores multiple values in one single variable.
vii) PHP is open support database.
viii) A function will execute immediately when a page loads.
ix) A PHP script can be placed anywhere in the document.
x) Kernal is known as core of operating system. 1x10=10

2. (a) What are components of computer networking? 3


Or
What is Shell? Discuss various types of Shell.

(b) What do you mean by vi editor? Explain. 3


Or
What is Linux? Explain the features of Linux.

3. (a) What do you mean by Linux firewall? Explain its types. 3


Or
What is the difference between Linux and window?.

(b) What do you mean by LVM? Explain. 3


Or
What is Mount Point in Linux? Explain.

(c) What is Window NT? Explain. 3

4. (a) What are the difference between while loop and Do while loop in PHP? Explain. 3
Or
What do you mean by WAMP server? Explain.

(b) What are the advantages of PHP? Explain. 3


Or
Write a program in PHP to check whether a person is adult or not.
(c)What do you mean by functions in PHP? Also explain its types. 5

5. (a) Write a program in PHP to check whether a number is even or odd. 5

(b) What is switch statement in PHP? Expalin with Example. 5

6. (a) What do you mean by cyber law? Explain. 4

(b) What are responsibilities of network security specialist? 5

7. Explain Arithmetic operators, Conditional Operators and Assignment Operators 5

You might also like