Professional Documents
Culture Documents
13. Pentium -I, Pentium-II and Pentium – MMX processors used in type ofmotherboards
a. AT b. ATX
c. XT d. Baby AT
14. Pentium -III Processors are used in type of motherboards
a. ET b. ATX
c. XT d. Baby AT
15. Both Pentium III and Pentium IV processors are supported by motherboards
a. XT b. AT
c. Baby AT d. ATX
16. Processors supported by ATX mother board are
a. Only Pentium-IV, Dual Core
b. Only Dual Core and Core 2 Duo
c. Quad Core, i3, i5 and i7
d. All of the above
17. Which among the following motherboards have slot type and PGA type processorsockets
a. ATX motherboard
b. Baby AT motherboard
c. XT motherboard
d. AT motherboard
18. Choose the component not present in Baby AT motherboard
a. Slot type processor sockets and PGA processor sockets
b. SDRAM slots and DDRRAM slots
c. PCI slots and ISA slots
d. AGP slots
19. Which one of the following has 24-pin Power connector
a. AT motherboard
b. Baby AT motherboard
c. XT motherboard
d. ATX motherboard
20. XT motherboard has power pin connectors
a. 24 b. 12 c. 20 d. 20 and 24
21. MPGA processor sockets are found in type of motherboards
a. Baby AT b. ATX c. AT c. XT
22. Choose the very old motherboard model from the following
a. ATX b. XT c. Baby AT d. AT
23. Which of the following motherboard type consists of SATA connectors
a. AT motherboard
b. Baby AT motherboard
c. ATX motherboard
d. XT motherboard
24. One of the following is the main component of the motherboard
a. BUS b. BIOS c. CMOS d. Processor
25 ------------------ is the frequency with which a processor executes instructions.
a. Bus speed b. Clock speed
c. MHz d. GHz
26. The computers operating speed is linked to the speed of -------------
a. BUS b. Memory access
c. System Clock d. North Bridge
27. CPU’s performance is measured by the per second
a. Number of instructions decoded
b. Number of instructions loaded
c. Number of instructions executed
d. Number of programs executed
28. CPU is fabricated on a single IC chip is known as--------------
a. Multiprocessor c. graphic processor
b. Microprocessor d. microcomputer
29. _________establishes a communication path for movement of data between processor and memory
a. Cache b. Bus c. motherboard d. North Bridge
30. Which one of the following is the alternative name for North Bridge
a. Host Bridge b. south chipset
c. North Chipset d. Both (a) and (c) are correct
31. is responsible for control of high speed components like CPU, RAM and video card
a. South chipset b. south bridge
c. North Chipset d. Both (a) and (b)
********************
Chapter 2 - Boolean Algebra
1. In boolean algebra, the OR operation is performed by which properties?
a) Associative properties b) Commutative properties
c) Distributive propertiesd) d)All of the Mentioned
2. The expression for Absorption law is given by
a) A + AB = A b) A + AB = B c) AB + AA’ = A d) A + B = B + A
3. The involution of A is equal to
a) A b) A’ c) 1 d) 0
4. A(A + B) =?
a) AB b) 1 c) (1 + AB) d) A
5. (A + B)(A’ * B’) =?
a) 1 b) 0 c) AB d) AB’
6. Complement of the expression A’B + CD’ is
a) (A’ + B)(C’ + D) b) (A + B’)(C’ + D) c) (A’ + B)(C’ + D) d) (A + B’)(C + D’)
7. Simplify Y = AB’ + (A’ + B)C.
a) AB’ + C b) AB + AC c) A’B + AC’ d) AB + A
8. The boolean function A + BC is a reduced form of
a) AB + BC b) (A + B)(A + C) c) A’B + AB’C d) (A + C)B
9. The logical sum of two or more logical product terms is called
a) SOP b) POS c) OR operation d) NAND operation
10. The expression Y=AB+BC+AC shows the operation.
a) EX-OR b) SOP c) POS d) NOR
11. The expression Y=(A+B)(B+C)(C+A) shows the operation.
a) AND b) POS c) SOP d) NAND
12. The canonical sum of product form of the function y(A,B) = A + B is
a) AB + BB + A’A b) AB + AB’ + A’B c) BA + BA’ + A’B’ d) AB’ + A’B + A’B’
13. A variable on its own or in its complemented form is known as a
a) Product Term b) Literal c) Sum Term d) Word
14. Canonical form is a unique way of representing
a) SOP b) Minterm c) Boolean Expressions d) POS
15. Boolean algebra is also called
a) switching algebra B. arithmetic algebra C. linear algebra D. Algebra
16. To perform product of max terms Boolean function mustbe broughtinto
a. AND term b. OR terms c. NOT terms d.NAND terms
17. According to the Boolean algebra absorption law, which of the
following iscorrect?
a. x+xy=x b. (x+y)=xy c. xy+y=x d.x+y=y
18. The expression for Absorption law is given by
a. A + AB = A b. A + AB = B c. AB + AA' = A d. A + B = B + A
19. X*y = y*x is the
a. commutative law b. inverse property
c. associative law d. identityelement
20. There are minterms for 3 variables(a,b,c)
a. 0 b. 2 c. 8 d. 1
21. expressions are can be implemented using either (1) 2-level AND-OR
LOGIC CIRCUITS (2)2-LEVEL NAND logic circuits.
a. pos b. literals c. sop d. none of the above
22. the output of x-nor gate is 1 which input combination is correct.a.
a=1,b=0 b. a=0 b=1 c. a=0, b=0 d. a=0, b=1
23. odd parity of word can be conviently tested by
a. OR GATE b. AND GATE c. NAND GATE d. X-OR GATE
24. determine the values of a,b,c,d that make the sum term
A+B+C+D
a. a=1 b=0 c=0 d=0
b . a=1 b=0 c=1 d=0
c. a=0 b=1 c=0 d=0
d. a=1 b=0 c=1 d=1
25. which of the following expressions is in the sum-of- product(sop)form.
a. (a+b)(c+d) b. (a)b(cd) c. ab(cd) d. ab+cd
26. For the SOP expression , how many 1s are in the truth table'soutput
column?
a) 1 b) 2 c) 3 d) 5
27. A truth table for the SOP expression has how many input
combinations?
a) 1 b) 2 c) 4 d) 8
28. How many gates would be required to implement the following Booleanexpression
beforesimplification? XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5
29. How many gates would be required to implement the following Boolean expressionaftersimplification?
XY + X(X + Z) + Y(X + Z)
a) 1 b) 2 c) 4 d) 5
30. Determine the values of A, B, C, and D that make the product term equal to 1
a) A = 0, B = 1, C = 0, D = 1
b) A = 0, B = 0, C = 0, D = 1
c) A = 1, B = 1, C = 1, D = 1
d) A = 0, B = 0, C = 1, D = 0
31. What is the primary motivation for using Boolean algebra to simplify logicexpressions?
a) It may make it easier to understand the overall function of the circuit.
b) It may reduce thenumber of gates.
c) It may reduce the number of inputs required.
d) all of the above
32. Use Boolean algebra to find the most simplified SOPexpressionfor F = ABD + CD + ACD + ABC + ABCD.
a) F = ABD + ABC + CD b) F = CD + AD c) F = BC + AB d) F = AC + AD
33. In Boolean algebra the word ‘literal’ means
a. a product term b. all the variables in a Boolean expression
c. the inverse function d. a variable or it’s compliment
34. The truth table for sop expression AB+𝐵 ̅ C has how many input
combinations?
a. 1 b. 2 c. 4 d. 8
35. converting the Boolean expression LM+M(NO+PQ) to sop form , we get
a. LM+ MNOPQ
b. B. L+MNO+MPQ
c. LM+M +NO+MPQ
d. LM+MNO+MPQ
36. the product of sum is basically the oring of anded terms
A. TRUE B. FALSE C. May be both d. None of the above
42. By applying De Morgan's theorem to a NOR gate, two identical truthtables can be produced.
a) True b) False c) may be both d) answer not given
43. The process of reduction or simplification of combinational logic circuitsincreases
thecost of the circuit.
a) True b) False c) may be both d) answer not given
44. Most Boolean reductions result in an equation in only one form
. a) True b) False c) may be both d) answer not given
45. The binary value of 1010 is converted to the product term.
a) True b) False c) may be both d) answer not given
46. In the commutative law, in ORing and ANDing of two variables, the order inwhich thevariables are ORed or
ANDed makes no difference.
a) True b) False c) may be both d) answer not given
48. Determine the binary values of the variables for which the followingstandard POSexpression is equal to 0.
a) (0 + 1 + 0)(1 + 0 + 1) b) (1 + 1 + 1)(0 + 0 + 0) c) (0 + 0 + 0)(1 + 0 + 1)
d) (1 + 1 + 0)(1 + 0 + 0)
49. The expression W(X + YZ) can be converted to SOP form by applying which law?
a) associative law b) commutative law c) distributive law d) none of the above
50. Simplification of the Boolean expression AB + ABC + ABCD + ABCDE +ABCDEF yields which of the
following results?
A) ABCDEF B) AB + CD + EF C) A + B + C + D + E + F D) AB
51. Given that F = (A + B'+ C)(D + E), which of the following represents the only correct expression for F'?
a) F' = A'BC'+ D'+ E' b) F' =AB'C + DE c) F' = (A'+ B + C')(D'+ E') d) F' = A'BC' + D'E'
52. The product of sum canonical form also known as
A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
53 are the alternative form of canonical form.
A. SOP B. POS C. BOTH A AND B d. NONE OF THE ABOVE
54. The sum of product canonical form also known as
A. MAXTERM B. MINTERM C. BOTH A AND B D. NONE OF THE ABOVE
55 . One of De Morgan's theorems states that. Simply stated, this means that logicallythere is
nodifference between:
a) a NOR and an AND gate with inverted inputs
b) a NAND and an OR gate with invertedinputs.
c) an AND and a NOR gate with inverted inputs.
d) a NOR and a NAND gate with inverted inputs.
*********************
MCQs Chapter 3 - LOGIC GATES
*********
.
Chapter 8: Function Overloading
1. Function cannot be overloaded when -
(a) Function names are same
(b) Number of parameters are different
(c) Number of parameters are same
(d) Data types of parameters are different
2. Function can be overloaded when
(a) Function names are same (c) The data types of parameters are
(b) Number of parameters are different
different (d) All the above
3. Friend function is a
(a) Non member function of class (c) Both a and b
(b) Can access both private and (d) None of the above
protected members
4. C++ Implements polymorphism through
(a) Inline function
(b) Friend function
(b) The compiler replace function call with (c) Both a and b
function code (d) None of the above
10. The advantages of inline functions are
(a) Inline functions are compact (c) Very efficient code can be
function calls generated
(b) The size of object code is reduced (d) All the above
11. In which type of functions, the compiler replaces the function call statement with thefunction
code is
(a) Friend function b) Inline function c) Function overloading d) Both a and b
12. In which function category two or more function have same name but different in numberof argument
list and their data type.
(a) Function overloading (b)Inline function
(c) Friend function (d) All the above
13. The inline function cannot include the
(a) goto statement (b) looping (c) Recursive function body (d) all the above
14. The keyword to create the inline function is
(a) Friend (b) private (c) Class (d) inline
15. The friend function means
(a) A short function
(b) run little faster
(c) can access private and protected members outside the class.
(d) Both a and b
16. Using friend function members are accessed using following syntax
(a) Objectname.membername (c) Only membername
(b) Only object name (d) All the above
17. While defining friend function it does not use either keryword or __operator.
(a) & or . (b) friend or :: (c) objectname.membername or objectname (d) all theabove
18. How to accesses the member of the friend function
(a) Member are accessed directly using member names
(b) Specifying objectname.membername
(c) Any above method
(d) All the above methods
19. The friend function declaration in the class is of
(a) Only public scope
(b) Only private scope
(c) Only Protected scope
(d) Can be any scope in the class (private, protected, public)
20. A friend function is a of a class
(a) Non member function (c) Inline function
(b) Private function (d) Public function of a class
2. Allocating sufficient memory for data and instructions during compilation is called
a) dynamic memory b) static memory
c) heap memory d) stack memory
5. operator returns the value located at the memory address specified by itsoperand.
a) * b) & c) d) new
42. The orphaned memory blocks when increase in number, bring adverse effect on system
, this situation is called
a) free store c) memory leak
b) Dynamic allocation d) may be a or b
43. The structure that include an element that is a pointer to another structure of the sametype is called
a) array structure c) self referential structure
b) Dynamic structure d) All the above
9. A logical schema
a) is the entire b) is a standard way of c) describes how d) Both (a) and
database organizing data is actually (b)
17. Which of the following operation is used if we are interested in one certain columns of
a table?
a) Projection b) Selection c) Union d) Join
23. A data manipulation commands the combines the records from one or more tables is
called
a) SELECT b) PROJECT c) JOIN d) PRODUCT
27. Which of the following database object does not physically exist?
a) base table b) index c) view d) none of the
above
28. In E-R Diagram relationship type is represented by
a) Ellipse b) Dashed ellipse c) Rectangle d) Diamond
33. Which normal form is considered adequate for relational database design?
a) 2NF b) 3NF c) 4NF d) BCNF
49. Candidate keys which are not currently selected as primary key is called
a) Super key b) Composite key c) Alternate key d) foreign key
II Fill in the blanks choosing the appropriate word/words from those given inbrackets.
(Repeated answers will not be considered)
1. is a collection of facts, figures, statistics. (Data)
2. is processed data with some definite meaning. (Information)
3. A collection of logically related data organised in way that data can be easily accessed
managed and updated is called (Database)
4. A single entry in table is called a (Record or Row)
5. Records are also called the (Tuple).
6. Each column is identified by a distinct header called (Attribute or field)
7. Set of values for an attribute in that column is called (Domain).
8. A is a software that allow creation, definition and manipulation of database.
(DBMS)
9. is a process of hiding unwanted or irrelevant details from the end user.
(Data abstraction)
10. People who require access to the database for querying updating and generating reports is
(End Users)
11. is an ability of a database to modify a schema definition at one level
without affecting a schema in the next higher level. (Data Independence)
12. Database architecture is logically divided into _ types. (Three)
13. architecture is used for user interface program and application programs
that runs on client side. (Two-tier client/server)
14. data model is abstract model that describes how the data is
represented and used. (Data model)
15. The process of applying a data model theory to create a data model instance I
known as (data modelling)
16. is the process of organizing data in a database. (Normalization)
17. An can be any object, place, person or class. (Entity)
18. An describes a property or characteristics of an entity. (Attribute)
19. A describes relation between entities. (Relationship)
20. A is any set of one or more columns whose combined values are unique
among all Occurrences. (Candidate key)
21. is a key that uniquely identify each record in a table. (Primary Key)
22. is a field in a relational table that matches the primary key column ofanother
table. (Foreign key)
23. Key that consists two or more attributes that uniquely identify an entity occurrence
is called (Composite Key)
24. The process of sharing data stored in database is among multiple users.
(data sharing)
25. is a process of analysing and picking out relevant information from data.(Data
Mining)
26. Data about data is . (Metadata)
27. is a set of values for an attribute in a column. (Domain)
28. An entry in a table is a . (Record)
29. Process of extracting knowledge from collected data is called (data
mining)
30. is a repository of an organization electronically stored data. (Data
warehouse)
31. describes how the data is represented and used. (Data model)
32. combines two lower-level entity of from higher level entity.
(Generalization)
33. Records are stored in chronological order in (serial file
organization.
34. refers to the minimum number of relationships in an entity.
(Cardinality)
35. The duplication of data is called . (Data redundancy)
36. Ability of a database to modify a schema definition at one level without affected is
. (Data independence)
37. Data sharing database is easy because of (centralized data
management).
38. Collection of rows and column is called . (table)
39. is a set of values for each column. (Primary Key).
40. is a DBMS software. (Oracle)
************
chapter 14: SQL commands
1. Which of the following attributes can be considered as a choice for primary key?
a) Name b) street c) Roll no d) subject
2. What is the full form of SQL?
a) Structured Query Language c) Simple Query Language?
b) Structured Query List d) none of these
3. What is the full form of DDL
a) Dynamic Data Language. c) Data Definition Language
b) Detailed Data Language d) Data derivation language
4. What does DML stand for?
a) Different Mode Level c) Data Mode Lane
b) Data Model Languahe d) Data Manipulation Language
5. Which of the following keywords will you use in the following query to display the uniquevalues of a
column dept_name! Select dept_name from company:
a) ALL c) Distinct
b) From d) Name
6. The clause of select query allows us to select only those rows in the result satisfy a specified
condition.
a) where c) having
b) from d) like
11. The _constraint provides a default value to column when the Insert into statement does not
provide a specific value.
a) DEFAULT c) CHECK
b) UNIQUE d) NOT NULL
12. The constraint ensure that all values in a column are distinct
a) DEFAULT b)UNIQUE c)CHECK d)NOT NULL
13. Theconstraint ensures that all values in a column satisfy certain condition a)DEFAULT
b)UNIQUE C) CHECK d) NOT NULL
14 ----------- is used to identify each row in a table
a) FOREIGN KEY b) UNIQUE c)CHECK d) PRIMARY KEY
15. To delete some data from tables command is used.
a) DELETE b) SELECT c) UPDATE d)DROP
16. The command lets your drop a table from the database
a) DELETE b)SELECT c) UPDATE d) DROP
17. key is non-key column of a table that draws its values from primary key of another table (parent table)
a) FOREIGN KEY b) UNIQUE c)CHECK d)PRIMARY KEY
9. is a set of protocols that allows to access any document on the net through URLs.
a) WWW b) HTML c) TCP/IP d) open source
10. is an internet utility used earlier to log on to remote computers.
a) web b) browser c) server d) Telnet
11. navigates through the world wide web and displays web pages.
a) web server b) web browser c) shareware d) software
12. responds to the requests made by web browsers.
a) web server b) web browser c) shareware d) software
13. The documents residing on web sites are called
a) web browsers b) web pages c) web server d) web
14. URL stands for
a) Universal reformation level b) uniform resource locator
c) uniform resource level d) uniform remote locator
15. is the trade of goods and services with the help of telecommunications andinternet.
a) E-commerce b) computerized commerce
c) E-trade d) Internet trade
16. Which of the following is not a service/technology of E-commerce?
a) E-mail
b) Electronic fund transfer (EFT)
c) Electronic Benefit transfer (EBT)
d) FSF
17. Which of the following is not a criteria for OSS?
a) FLOSS b) free redistribution
c) source code available d) distribution of license
18. Which of the following is not a type of E-commerce?
a) B2B b) C2B c) C2C d) C2D
19. IPR stands for
a) internet protocol rights b) international property rights
c) intellectual property rights d) Indian property rights
20)A shareware software is one in which the
a) source code is not available
b) Modifications to the software is not allowed
c) Both a and b
d) Any one above
21) A FLOSS refers to and
a) Free libre and open source software and both free software and open source softwareb)Freelirve and
open source software and both free software and open source software c) Both a and b
d) only a is correct 22).
Expand W3C
a) World wide web Consortium
b) it is world wide web
c) wide three consortium
d) None of the above
23). are founders OSI.
a) Bruce Perens and Erics Raymond
b) timmberners lee
c) Richard Stallman
d) All the above
24). The founder of FSF or Free Software Foundation is
a) Richard Stallman
b) Bruce perens and Erics Raymond
c) Tim berners Lee
d) None of the above
25). The HTTP (hyper text transfer protocol )is used to request and send a document overthe
a) Internet
b) Telnet
c)Browsers
d) servers
26). E-Commerce means
a) The trade of goods and services through Internet
b) Email
c) Digital cash
d) all the above
27). An example for E-commerce service is
a) email
b) Bulletin Boards
c) digital cash
d) All the above
28). An Advantage of E-commerce is
a) Gobal participation
b) Improved market Intelligence and strategic planning
c) optimization of resources
d) All the above
29) IPR related issues in India like patents trademarks, copyright, designs and geographical indications
are governed by the -
a) patent Act 1970 and patent Rules 2003
b) Trademark Act 1999 and the Trademarks Rules 2002
c) Indian copyright Act 1957, design act 2000 and rules 2001
d) all the above
30) The domain Id’s .co and .mil are affiliation for and respectively
a) commerce and mills
b) company and military
c) commercial and military
d) all the above
*****
chapter 17 - Web designing
1. Html tags are surrounded by……………
a. Angle bracket c. Flower bracket
b. Braces d. Brackets
2. Take out the odd one
a. <br> b.<hr> c.<img> d.<ol>
3. The tag which encloses an entire html document
a. Html b. Head c. Title d. body
4. The tag which is having heading information
a. Html b. Head c. Title d. body
5.tag is used to insert the title
a. Html b. Head c. H1 d. title
6.tag is used to adding the document contents
a. <body> b. <title> c.<html> d.<li>
7. The tag which is not executable by html
a. Comment b. Html c.body d. p
8. <h3>describes a …level of heading
a. First b.second c. Third d. Fourth
9. The tag which display the bullets
a. <ul> b.<ol> c. <br> d.<p>
10. The tag which display the number listing.
a. <ul> b.<ol> c. <br> d.<p>
11. The tag which describes the paragraph
a. Html b. Head c. P d.h2
12. Take out the odd one
a. Adobe reader c. Microsoft expression web
b. Coffeecup html d. notepad
13. The html program should save with
a. .html b. html. C./html d.:html
14. The tag which link the address
a. <a> b.<br> c.<img> d.<hr>
15. Html forms contains
a. Text fields b. Checkboxes c. Radio buttons d. All the above
16. The tag which breaks the line
a. <a> b.<br> c.<img> d.<hr>
17. The tag which is used to create the table
a. Table tag b. Tabel tag c. <td> d. <hr>
18. The tag which is used to create the table row
a. <tr> b.<br> c.<td> d.<hr>
19.tag used to create the table data
a. <tr> b.<br> c.<td> d.<hr>
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which among the following is the fastest memory in a computer that holds information?
a) Register b) Cache
c) Main memory d) RAM
2. The other name of Boolean algebra is
a) Switching algebra b) Relational Algebra
c) Digital Algebra d) None of the above
3. The other name of NOT gate is
a) Neglect gate b) Inverter gate
c) XOR gate d) XNOR gate
4. The data structure that allows the insertion, as well as the deletion from both the ends, are:
a) String b) Linked List data structure
c) Stack data structure d) Dequeue data structure
5. What is the other name used for functions inside a class?
a) Member variables b) Member functions
c) Class functions d) Class variables
6. Function cannot be overloaded when
a) Function names are same b) Number of parameters are different
c) Number of parameters are same d) Data types of parameters are different
7. The symbol used with constructor is
a) $ b) &
c) Delta c) ~
8. Base class is
a) a sub class b) inherited class
c) Main class d) First class
9. Which of the following is the correct way to declare a pointer?
a) int *ptr b) int ptr
c) int &ptr d) All of the above
10. is called information.
a) Raw fact b) collection of data
c) Unprocessed data d) Processed data
11. SQL is .
a) Theoretical Language b) Procedural Language
c) Structured Language d) Unstructured Language
PART – C
*****
Model Question Paper-2
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. CPU’s working memory is
a) Cache memory b) Register
c) Primary memory d) Secondary memory
2. Minterm of X̅ ̅Y=
a) m3 b) m2
c) m1 d) m0
3. The standard symbol represnts
a) OR gate b)AND gate
c) NAND gate d) NOR gate
4. is an example for non-primitive data structure
a) Integer b) Float
c) Stack d) Pointer
5. Which access specifier is implicitly used in class?
a) Private b) Public
c) Protected d) Friend
6. is although not a member function has full access right to the private andprotected members
of the class.
a) Overloaded function b) Inline function
c) Friend function d) Recursive function
7. In constructor, declaration of an object is followed by assignment operator, constructorname and argument list
enclosed in parenthesis is
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. The class that inherits properties from another class is
a) Base class b) Derived class
c) Virtual class d) Abstract class
9. Which of the following is the address operator?a) :: b)
.
c) * d) &
10. Set of values for an attribute in that table is
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DDL command:
a) Create b) Alter
c) Drop d) Delete
12. A hardware device used to connect several computers together is
a) Router b) Bridge
c) Switch d) Hub
13. CDMA stands for
a) Code Data Multiple Access
b) Code Division Multiple Access
c) Common Division Multiple Access
d) Common Data Multiple Access
14. The Software that is neither open nor freely available is called is
a) Free software b) Freeware
c) Proprietary software d) Open source software
15. is a text-based markup language.
a) HTML b) XML
c) DHTML d) PHP
II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
(ISAM, Database, Data mining, Key, Schema)
16. is a collection of logically related data organized in a way that data canbe easily accessed,
managed & updated.
17. is a set of one or more columns whose combined values are unique amongall occurrences in a given table.
18. is the hybrid between sequential and direct access file organization.
19. Database objects that contain data govern or perform operation on data is
20. A technique which is concerned with the analysis & picking out relevant informationis called
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X22.State
De Morgan’s theorems.
23. Write a note on polymorphism. Give an example.
24. Write any two features of parameterized constructors.
25. Differentiate between seekg( ) and seekp( ).
26. What is a candidate key & alternate key (secondary key)?
27. Write the syntax & example for alter command.
28. List the different applications of networking.
PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12 29.Explain the different types of
Motherboard.
30. Write the logic diagram and the truth table for XOR gate.
31. What are the advantages of arrays?
32. What is a pointer? Give the declaration and initialization of a pointer.
33. Mention different operations basic operation on binary file in C++.
34. Explain any three data types supported by DBMS.
35. Explain the technologies & services used in e-commerce.
36. What is web scripting? Mention the types.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30 37. Given
Boolean function F(A, B, C, D)= Σ(0,3,4,6,8,9,10,11,12,14).
***********
Model Question Paper-3
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The CPU is fabricated as a single Integrated Circuit (IC) chip and is
a) Motherboard b) Microprocessor
c) Register d) Circuit board
2. Maxterm of X + Y + Z =
a) M3
Y +Z
b) M2
c) M1 d) M0
3. Standard symbol for XOR gate is
a) + b)
c) . d) x
4. is an ordered collection of items where the addition of newitems and the
removal of an existing item always takes place at the same end.
a) Queue b) Linked list
c) Stack d) Tree
5. operator is used to define the member function outside the class.
a) . b) ::
c) * d) &
6. Function Overloading is also known as
a) Compile time polymorphism b) Run time polymorphism.
c) Compile time encapsulation d) Run time encapsulation
7. In constructor, the declaration of the object is followed by argument list enclosed inparentheses.
a) Implicit call b) Explicit call
c) Function call d) Initialized at the time of declaration using =
8. class prevent multiple copies of the base class being present in anobject derived
from those objects.
a) Base class b) Derived class
c) Virtual base class d) Abstract class
9. is the collection of addresses.
a) Array of objects b) Array of address
c) Array of variables d) Array of pointers
10. A single entry in a table is
a) Tuple b) Entity
c) Attribute d) Domain
11. Following is not a DML command:
a) Create b) Insert
c) Update d) Delete
12. is an example for half duplex communication mode.
a) Radio b) Television
c) Walkie-Talkie d) Modern telephone system
13. is consists of a central node to which all other nodes are connectedby a single path.
a) Bus topology b) Star topology.
c) Ring topology d) Tree topology
14. URL stands for
a) Unique Resource Location b) Uniform Resource Location
c) Unique Resource Locator d) Uniform Resource Locator
15. refers to web content that changes each time it is viewed
a) HTML b) XML
c) DHTML d) PHP
II. Fill in the blanks choosing the appropriate word/words from those givenin brackets. (Repeated answers will
not be considered
(Physical data independence, Hierarchical data model, DBMS, One-tier architecture, ER Diagram)
16. allows creation, definition & manipulation of database.
17. is a visual representation of data that describes how data is related toeach other.
18. is an ability of a database to modify a schema definition at internal levelwithout affecting a
schema in the next level.
19. organizes the data in a tree like structure in which each child node canhave only one
parent node.
20. In , DBMS is the only entity where user directly sits on DBMS &uses it.
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that 1 + X = 1 using proof by perfect induction method.
22. Write any two basic postulates of Boolean algebra.
23. Write the disadvantages of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Differentiate between tellg( ) and tellp( ).
26. What is the difference between serial & direct access file organization?
27. Write the syntax & example for drop command.
28. List the goals for networking.
PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is a port? Explain serial port.
30. Write the logic diagram and the truth table for NAND gate.
31. What are the disadvantages of an arrays?
32. What is static memory allocation? Explain.
33. Mention the types of file. Explain any one.
34. Explain any three database users.
35. What are the advantages of e-commerce?
36. What is web hosting? Mention different types of web hosting.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= Σ(0, 4, 8, 9, 10, 11, 12, 13,
15) Reduce the function F using K-map.
38. Define: a. Root Node b. Leaf Node c. Height d. Depth e. Internal node.
39. Write an algorithm to insert a data element at the rear end of the queue.
40. Write a difference between procedural oriented programming & object-orientedprogramming (OOP).
41. Explain the class definition and declaration with syntax and example.
42. Define an inline function. Write the advantages & disadvantages of inline functions.
43. What is copy constructor? Explain with programming example.
44. What is single level inheritance? Explain with programming example.
45. Give the difference between manual & electronic file systems.
46. Explain the data types used in SQL.
47. Explain any five networking devices.
***********
Model Question Paper-4
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The parallel port can transfer bit of data at a time.
a) 1 b) 4
c) 8 d) 16
2. The X+XY = X is
a) Associative Law b) Involution law
c) Complementarity law d) Absorption Law
3. A logic gate with only one input signal and one output signal but the output state isalways opposite of the
input state is
a) AND gate b) OR gate
c) NOT gate d) NOR gate
4. is an example for linear data structure.
a) Integer b) Linked list
c) Graph. d) Tree
5. is an instance of a class.
a) Access specifiers b) Data members
c) Member functions d) Objects
6. The functions are compact function calls.
a) Overloaded b) Inline
c) Friend d) All of the above
7. The constructor must be declaring in section.
a) Private b) Public
c) Protected d) None of the above
8. is one that is not used to create objects.
a) Sub class b) Derived class
c) Virtual class d) Abstract class
9. operation can be performed on pointers.
a) Addition of two pointers
b) We can subtract one pointer from another pointer if both point tothe same array.
c) Subtraction of one pointer from another pointer when they do not pointto the same array.
d) Multiplication of two pointers
10. is a field in a one table that uniquely identifies the row of another table.
a) Primary key b) Foreign key
c) Candidate key d) Alternate key
11. Which command is used to modify an existing record in SQL?
a) Update b) Change
c) Modify d) Alter
12. A device that connects dissimilar networks is
a) Router b) Bridge
c) Gateway d) Hub
13. HTTP stands for
a) Hypertext Transistor Protocol b) Hypertext Transfer Protocol
c) Hypertest Transistor Protocol d) Hypertest Transfer Protocol
14. navigates though the world wide web(www) and displays web pages
a) Web browser b) Website
c) Web server d) URL
15. tag is used to create hyperlink.
a)<li> b) <a>
c) <h1> d) <b>
II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
(Specialization, Metadata, Data integrity, Attribute, Relational data model)
16. Each column is identified by a distinct header is called
17. refers to the validity of data & it can be compromised in a number of ways
18. In , there are no physical links.
19. is a top down approach in which one higher level entity can be brokendown into two lower level entities.
20. is used to inform operators and uses of the data warehouses aboutits status.
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove algebraically X (X + Y) = X
22. What is minterm and maxterm?
23. Write any two applications of object-oriented programming (OOP).
24. Write any two features of destructor.
25. Mention the methods of opening file within C++ .
26. Mention the types of data independence.
27. Give the difference between char and varchar datatypes in SQL.
28. Name the different types of twisted pair cable.
PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain the characteristics of motherboard.
30. Write the logic diagram and the truth table for OR gate.
31. What are the applications of an arrays?
32. What is array of pointers? Give an example.
33. Differentiate between ifstream class and ofstream class.
34. Give the different notations for E-R diagram
35. Write any three criteria of open source software.
36. Give the features of DHTML?
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)= m0 + m1 + m2 + m3 + m4 + m5 + m8 + m9
+ m10 + m11 + m13 + m15. Reduce the function F using K-map.
38. What is primitive data structure? Explain the different operations performed onprimitive data
structure.
39. Write an algorithm to search an element in an array using linear search method.
40. Explain the different characteristics of OOP.
41. Explain how do we define member function inside the class definition. Giveexample.
42. Explain friend functions with example.
43. What is copy constructor? Explain with programming example.
44. What is visibility mode? What is its role with respect to inheritance?
45. Explain ISAM with example.
46. What is data definition language? Explain create and select commands in SQL.
47. Explain the applications of networking?
***********
Model Question Paper-5
Second PUC Computer Science
Time: 3.15 Hours Max marks: 70
PART – A
Answer all the questions. Each question carries one mark. 1x20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. A slot which is used to connect modem and input devices is
a) AGP slot b) PCI slot
c) ISA slot d) Processor slot
2. According to Boolean law: X + 1 =
a) 0 b) 1
c) X d) X̅
3. Universal gates are:
a) AND and OR b)NAND and NOR
c) XOR and XNOR d) None
4. A queue follows:
a) LIFO b) FIFO
c) Linear tree d) Ordered array
5. Data members are accessed only by the member functions, friends of the class andalso by the member
functions derived from this class is
a) Private b) Public
c) Protected d) Friend
6. The inline function may not work some times for one of the following reasons:
a) The inline function definition is too long or too complicated
b) The inline function is recursive
c) The inline function has looping constructs
d) All of the above
7. A constructor that accepts parameters is called the default constructor.
a) No b) One
c) Two d) Three
8. The class whose properties are inherited by another class is
a) Base class b) Derived class
c) Virtual class d) Abstract class
9. Which of the following is the pointer operator?
a) :: b) .
c) * d) &
10. Each column is identified by a distinct header is
a) Tuple b) Entity
c) Attribute d) Domain
11. Which command is used to modify an existing table in SQL?
a) Update b) Change
c) Modify d) Alter
12. A set of rules and guidelines for communicating data is
a) Protocol b) Packet
c) Data gram d) Data channel
13. TCP/IP stands for
a) Telephone control protocol/Internet protocol
b) Transmission control protocol/Internet protocol
c) Telephone control protocol/ International protocol
d) Transmission control protocol/International protocol
14. The software whose source code is available to customers and it can be modifiedand redistributed
without any limitations is
a) Free software b) Freeware
c) Shareware d) Open source software
15. provides an object-oriented view of a Web page and its elements.
a) HTML b) XML
c) DHTML d) PHP
II. Fill in the blanks choosing the appropriate word/words from those givenin brackets.
(Repeated answers will not be considered)
(Domain, Normalization, Aggregration, Data warehouse, Data processing)
16. is series of actions or operations from input data to generate outputs.17.Set of values
for an attribute in that table is called as
18. A process when relation between two entities is treated as a single entity iscalled
19. The process of organizing the data in a database is called
20. A repository of an organization’s electronically stored data is called
PART – B
Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove that XY+̅XY=X.
22. State the principles of duality theorems.
23. Explain data encapsulation.
24. What is a destructor? Give its syntax.
25. Write the member functions belonging to ifstream class.26.Define primary key & foreign key.
27.Write the syntax & example for delete command.
28.Explain simplex communication mode.
PART – C
Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain cache memory.
30. Write the logic diagram and the truth table for AND gate.
31. Write the memory representation two-dimensional arrays in row-major order.
32. What are the advantages of pointer?
33. Explain any three file modes.
34. Explain any three components of E-R diagram.
35. What is e-commerce? Explain types of e-commerce.
36. Explain the structure of HTML.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Given Boolean function F(A, B, C, D)=Σ(0,1,2,3,4,5,6,7,8,9,10,11).
Reduce the function F using K-map.
38. Explain the different operations performed on linear data structure.
39. Write an algorithm for push and pop operation in stack using array.
40. Write the applications of object oriented programming (OOP).
41. Explain the member functions outside a class with an example.
42. Discuss overloaded functions with syntax and example.
43. What is a constructor? Write the rules for writing a constructor function.
44. What is inheritance? What are the advantages of inheritance?
45. Explain the features of database system.
46. Explain the various group functions in SQL.
47. What is network? Mention different network goals.
***********