0% found this document useful (0 votes)
783 views62 pages

11th STD Computer Science EM Guide Sample PDF 2024-25

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
783 views62 pages

11th STD Computer Science EM Guide Sample PDF 2024-25

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

www.surabooks.

com

.i n

m
al
COMPUTER SCIENCE

ad

co
k
HIGHER SECONDARY FIRST YEAR

vi

s.
al
.k
e
Based on the Updated New Textbook FreWorkbook

ok
e
Practic with
w
anual
Lab M
w

o Salient Features
w

ab
 Answers for all Textual Questions.

 E
xhaustive Additional MCQs, VSA, SA & LA questions with answers are given in
each chapter.
ovt. Model Question Paper - 2018 (Govt. MQP - 2018), First Mid-Term Test - 2018
 G
ur

(FMT - 2018), Quarterly Exam - 2018, 2019 & '23 (QY - 2018, 2019 & '23), Half
Yearly Exam - 2018, 2019 & 2023 (HY - 2018, 2019 & '23), Instant Supplementary
Exam June 2019, Augsut 2022 & July 2023 (June 2019, Aug-'22 & July-'23),
.s

Public Exam March 2019, 2020, May 2022 , March 2023 & 2024 (Mar.2019, 2020,
May ‘22, Mar. '23& '24 ), Govt. Supplementary Exam September 2020 & 2021
(Sep. 2020 & Sep. 2021) and Common Revision Test (CRT '22) Questions are
w

incorporated in the appropriate sections.


 Public Examination - March 2024 Question Paper is given with answers.
w

SURA PUBLICATIONS
w

Chennai

For Orders Contact


80562 94222 / 81242 01000 / 81243 01000
96001 75757 / 78718 02000 / 98409 26027

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com

Note from Publisher


© Reserved with Publishers It gives me great pride and pleasure in bringing to you

n
Sura’s Computer science Guide for +1 Standard. A deep

.i
understanding of the text and exercises is rudimentary to have an

m
al
insight into Computer Science. The students and teachers have to
Code No : SG 274 carefully understand the topics and exercises.

ad
Sura’s Computer Science +1 Standard Guide encompasses

co
all the requirements of the students to comprehend the text and
Author : the evaluation of the textbook.

k
Mr. Shanmugasundaram

vi
 It will be a teaching companion to teachers and a learning
(Post Graduate Teacher, Chennai) companion to students.

s.
al  Exhaustive Additional MCQs, VSA, SA, LA questions with
answers are given in each chapter.
.k
Our Guides for XI & XII Standard  These features will help students practice and learn

ok
w
✤ RuhÉ‹ jÄœ ciuüš effectively all the sections of the textbook.
✤ Sura’s Smart English Though these salient features are available in our Sura’s
w

✤ Sura’s Mathematics (EM/TM ) Computer Science Guide 11 th Standard, I cannot negate the
indispensable role of the teachers in assisting the student to
✤ Sura’s Physics (EM/TM)
o
w

✤ Sura’s Chemistry (EM/TM) understand the Computer Science.


ab
✤ Sura’s Bio-Botany & Botany (EM/TM) I sincerely believe this guide satisfies the needs of the students
(Short Version & Long Version) and bolsters the teaching methodologies of the teachers.
✤ Sura’s Bio-Zoology & Zoology (EM/TM)
I pray the almighty to bless the students for consummate
(Short Version & Long Version)
✤ Sura’s Computer Science (EM/TM) success in their examinations.
ur

✤ Sura’s Computer Applications (EM/TM)


✤ Sura’s Commerce (EM/TM)  Mr. Subash Raj, B.E., M.S.
✤ Sura’s Economics (EM/TM)  - Publisher
.s

✤ Sura’s Accountancy (EM/TM)


 Sura Publications
✤ Sura’s Business Maths (EM) 
All the Best
w

For Orders Contact


w

Head Office:
Sura Publications 80562 94222
1620, ‘J’ Block, 16th Main Road, 81242 01000
w

Anna Nagar, Chennai - 600 040.


81243 01000
Phone : 044 - 4862 9977, 044 - 4862 7755.
E-mail : orders@surabooks.com
96001 75757
78718 02000
19/03/2024

Website : www.surabooks.com
98409 26027
(ii)

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com

Contents

n
Chapter
No
Title P. No Month

.i

m
al
UNIT I - FUNDAMENTALS OF COMPUTER AND WORKING
WITH A TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX)

ad

co
1. Introduction to Computers 1-18

k
2. Number Systems 19-48 June

vi
3. Computer Organization 49-66

s.
al
4. Theoretical Concepts of Operating System 67-80
5. Working with Windows Operating System 81-98
.k
July
UNIT II - ALGORITHMIC PROBLEM SOLVING

ok
w
6. Specification and Abstraction 99-108
I MID TERM (June, July)
w

7. Composition and Decomposition 109-120


August
o
w

8. Iteration and Recursion 121-126


UNIT III - INTRODUCTION TO C++
ab
9. Introduction to C++ 127-164
September
10. Flow of Control 165-186
QUARTERLY EXAMINATION (June to September)
11. Functions 187-208
ur

12. Arrays and Structures 209-225


October
UNIT IV - OBJECT ORIENTED PROGRAMMING WITH C++
13. Introduction to Object Oriented Programming Techniques 226-233
.s

14. Classes and Objects 234-251


November
15. Polymorphism 252-260
w

II MID TERM (October, November)


16. Inheritance 261-279
UNIT V – COMPUTER ETHICS AND CYBER SECURITY
w

December
17. Computer Ethics and Cyber Security 280-289
18. Tamil Computing 290-292
HALF YEARLY EXAMINATION
w

Public Examination - March 2024 Question Paper with answers 293-300

(iii)

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com

TO ORDER WITH US

n
SCHOOLS and TEACHERS:
We are grateful for your support and patronage to ‘SURA PUBLICATIONS’

.i
Kindly prepare your order in your School letterhead and send it to us.

m
al
For Orders contact: 81242 01000 / 81243 01000
DIRECT DEPOSIT

ad
A/c Name : Sura Publications A/c Name : Sura Publications

co
Our A/c No. : 36550290536 Our A/c No. : 21000210001240

k
Bank Name : STATE BANK OF INDIA Bank Name : UCO BANK

vi
Bank Branch : Padi Bank Branch : Anna Nagar West
IFSC : SBIN0005083 IFSC : UCBA0002100

s.
A/c Name :
al
Sura Publications A/c Name : Sura Publications
Our A/c No. : 6502699356
.k Our A/c No. : 1154135000017684

ok
Bank Name : INDIAN BANK Bank Name : KVB BANK
w
Bank Branch : Asiad Colony Bank Branch : Anna Nagar
IFSC : IDIB000A098 IFSC : KVBL0001154
w

A/c Name : Sura Publications A/c Name : Sura Publications


o
w

Our A/c No. : 13240200032412 Our A/c No. : 50200031530945


Bank Name : FEDERAL BANK Bank Name : HDFC BANK
ab
Bank Branch : Anna Nagar Bank Branch : Cenotaph Road, Teynampet
IFSC : FDRL0001324 IFSC : HDFC0001216

After Deposit, please send challan and order to our address.


ur

email to : orders@surabooks.com / Whatsapp : 81242 01000.


For Google Pay : For PhonePe :
.s

98409 26027 98409 26027

DEMAND DRAFT / CHEQUE


 lease send Demand Draft / cheque in favour of ‘SURA PUBLICATIONS’
P
w

payable at Chennai. The Demand Draft / cheque should be sent with your order
in School letterhead.
STUDENTS :
w

Order via Money Order (M/O) to

Sura Publications
w

1620, ‘J’ Block, 16th Main Road, Anna Nagar, Chennai - 600 040.
Phones : 044-4862 9977, 044-4862 7755.
Mobile : 96001 75757 / 81242 01000 / 81243 01000.
email : orders@surabooks.com Website : www.surabooks.com

(iv)

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com

I UNIT-
Fundamentals Of Computer And Working With A Typical Operating Systems (Windows & Linux)

.i n
Chapter Introduction to Computers

m
al
ad

co
CHAPTER SNAPSHOT

k
 1.1. Introduction to Computers 1.5.2. Central Processing Unit

vi
 1.2. Generations of Computers 1.5.3. Output Unit
 1.3. Sixth Generation Computing 1.5.4. Memory Unit

s.
al
 1.4. Data and Information 1.5.5. Input and Output devices
 1.5. Components of a Computer
1.6. Booting of Computer
.k 
1.5.1. Input Unit

ok
Evaluation
w
w

Section - A o 6. Which one of the following is used to in ATM


machines
w

Choose the Correct Answer (a) Touch Screen (b) Speaker


(c) Monitor (d) Printer
ab
1. First generation computers used  [HY. '19]
 [Ans. (a) Touch Screen]
(a) Vacuum tubes (b) Transistors
(c) Integrated circuits (d) Microprocessors 7. When a system restarts which type of booting is
 [Ans. (a) Vacuum tubes] used.
(a) Warm booting (b) Cold booting
ur

2. Name the volatile memory  [Mar. & July '23]


(c) Touch boot (d) Real boot.
(a) ROM (b) PROM
 [Ans. (a) Warm booting]
(c) RAM (d) EPROM
 [Ans. (c) RAM] 8. Expand POST  [FMT 2018; Sep. 2020; QY. '23]
.s

3. Identify the output device  [Mar. 2020; HY.'23] (a) Post on self Test
(a) Keyboard (b) Memory (b) Power on Software Test
(c) Power on Self Test
w

(c) Monitor (d) Mouse


 [Ans. (c) Monitor] (d) Power on Self Text
 [Ans. (c) Power on Self Test]
4. Identify the input device  [FMT 2018]
w

(a) Printer (b) Mouse 9. Which one of the following is the main memory?
(c) Plotter (d) Projector (a) ROM (b) RAM
 [Ans. (b) Mouse] (c) Flash drive (d) Hard disk
w

 [Ans. (b) RAM]


5. …………… Output device is used for printing
building plan. 10. Which generation of computer used IC’s?
(a) Thermal printer (b) Plotter  [May '22, QY. '23; Mar-'24]
(c) Dot matrix (d) inkjet printer (a) First (b) Second (c) Third (d) Fourth
 [Ans. (b) Plotter]  [Ans. (c) Third]

[1]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
2 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1

Section - B 7. Differentiate Input and Output unit.


Ans. Input Unit Output Unit
Very Short Answers  Input unit is used An output unit is any

n
to feed any form of hardware component
1. What is a computer?

.i
[Sep. 2021; Aug '22] data to the computer, that conveys

m
Ans. (i) A computer is an electronic device that which can be stored in information to users in

al
manipulates information, or data. It has the the memory unit for an understandable form.
ability to store, retrieve, and process data. further processing.

ad
(ii) Computer works faster than human being and

co
Example : Example :
given the values more accuracy and reliable Keyboard, mouse etc. Monitor, Printer etc.

k
2. Distinguish between data and information.

vi
8. Distinguish Primary and Secondary memory.
 [FMT 2018]  [HY. '23; Mar-'24]

s.
al
Ans. Data Information Ans. Primary Memory Secondary Memory
Data is defined as an Information is a It is used to It is used to store the
.k
unprocessed collection collection of facts from temporarily store the data permanently.

ok
of raw facts, suitable which conclusions may programs and data
w
for communication, be drawn. when the instructions
are ready to execute.
w

interpretation or
processing.
o It is volatile, the It is non-volatile, the
content is lost when content is available even
w

(Eg)  (Eg)  the power supply is after the power supply is


134, 16, 'Kavitha', 'C' Kavitha is 16 years old. switched off. switched off. Eg. ROM,
ab
Eg. RAM. CD-ROM, DVD ROM.
3. What are the components of a CPU? [Sep. 2020]
Section - C
Ans. The CPU has three components which are Control
unit, Arithmetic and Logic unit (ALU) and Memory Short Answers
ur

unit. 1. What are the characteristics of a computer?


 [Mar. '23]
4. What is the function of an ALU? [Mar. 2020] Ans. (i) Computer is the powerful machine.
(ii) It can perform large number of tasks.
Ans. (i) The ALU performs arithmetic operations.
.s

(iii) The main capacities of computer are work


(ii) The result of an operation is stored in internal length, speed accuracy, diligence, versatility
memory of CPU. memory and automation and lots of more tasks.
w

(iii) The logical operations of ALU promote the 2. Write the applications of computer.
decision making ability of a computer. Ans. The various applications of computers are,
(i) Business (ii) Education
5. Write the functions of control unit. [Mar. '23]
w

(iii) Marketing (iv) Banking


Ans. The control unit controls the flow of data between the (v) Insurance (vi) Communication
CPU, memory and I/O devices. It also controls the (vii) Health care
(viii) Engineering - Robotics, Nano technology, Bio
w

entire operation of a computer.


Engineering
6. What is the function of memory? [QY.'23] 3. What is an input device? Give two examples.
Ans. The primary memory is used to temporarily store the Ans. Input device is used to feed any form of data to the
programs and data when the instructions are ready to computer, which can be stored in the memory unit
execute. The secondary memory is used to store the for further processing.
E
 xample: Keyboard, Mouse, Scanner, Fingerprint
data permanently.
scanner, Track Ball, Retinal Scanner, Light pen etc.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 3

4. Name any three output devices. (ii) Pictures on a monitor are formed with picture
Ans. (i) Monitor elements called PIXELS.
(ii) Printer (iii) Monitors may either be Monochrome which

n
(iii) Plotter display text or images in Black and White or
can be color, which display results in multiple

.i
(iv) Speaker
colors.

m
al
(v) Multimedia projectors are the output devices. (iv) There are many types of monitors available
5. Differentiate optical and Laser mouse.  [HY. 2018] such as CRT (Cathode Ray Tube), LCD (Liquid

ad
Crystal Display) and LED (Light Emitting
Ans. Optical Mouse Laser Mouse

co
Diodes).
Measures the motion Measures the motion and (v) The video graphics card helps the keyboard to

k
and acceleration of acceleration of pointer. communicate with the screen.

vi
pointer.
(vi) It acts as an interface between the computer and
It uses light source Laser Mouse uses Laser display monitor.

s.
al
instead of ball to Light.
judge the motion of Section - D
the pointer.
.k
Explain in detail

ok
Optical mouse is less Laser Mouse is highly
w
1. Explain the basic components of a computer with
sensitive towards sensitive and able to work a neat diagram. 
surface. on any hard surface.
w

 [Govt. MQP; FMT-2018; Mar. 2019 & '24; July-'23]


6. Write short note on impact printer. [Mar. 2019] Ans. Components of a Computer :
o
w

Ans. Impact printers : 


The computer is the combination of hardware and
software. Hardware is the physical component of
(i) 
These printers print with striking of hammers or
a computer like motherboard, memory devices,
ab
pins on ribbon. These printers can print on multi- monitor, keyboard etc., while software is the set
part (using carbon papers) by using mechanical of programs or instructions. Both hardware and
pressure. For example, Dot Matrix printers and software together make the computer system to
Line matrix printers are impact printers. function. Every task given to a computer follows an
ur

Input-process - output cycle (IPO cycle).


(ii) A Dot matrix printer that prints using a fixed
number of pins or wires.
(iii) Line matrix printers use a fixed print head for
.s

printing.

7. Write the characteristics of sixth generation.


w

 [May '22; QY.'23]


Ans. (i) Parallel and Distributed computing
(ii) Computers have become smarter, faster and
w

smaller (i) 
Input unit : Input unit is used to feed any form
(iii) Development of robotics of data to the computer, which can be stored in
(iv) Natural Language Processing the memory unit for further processing.
w

Example : keyboard, mouse etc.


(v) Development of Voice Recognition Software
(ii) Central Processing Unit : CPU is the major
8. Write the significant features of monitor.[Mar- '24] component which interprets and executes
Ans. Monitor: software instructions. It also control the
operation of all other components such as
(i) Monitor is the most commonly used output
memory, input and output units.
device to display the information. It looks like a TV.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
4 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1
(iii) Arithmetic and Logic Unit : The ALU is a part of the CPU where various computing functions are performed
on data. The ALU performs arithmetic operations such as addition, subtraction, multiplication, division and
logical operations.

n
(iv) Control Unit : The control unit controls the flow of
data between the CPU, memory and I/o devices. It

.i
Control Unit
also controls the entire operation of a computer.

m
al
(v) Output Unit : An output unit is any hardware ALU
Input Unit Output Unit
component that conveys information to users in an

ad
understandable form. Example : Monitor, Printer Internal

co
Memory Data Path
etc. Control Path

k
(vi) Memory Unit : The Memory Unit is of two types Main Memory

vi
which are primary memory and secondary memory.
The primary memory is used to temporarily store Secondary Storage

s.
al
the programs and data when the instructions are Components of a Computer
ready to execute. The secondary memory is used to
.k
store the data permanently. The Primary Memory is volatile, that is, the content is lost when the power supply
is switched off. The Random Access Memory (RAM) is an example of a main memory. The Secondary

ok
w
memory is non volatile, that is, the content is available even after the power supply is switched off. Hard disk,
CD-ROM and DVD ROM are examples of secondary memory.
w

2. Discuss the various generations of computers. 


o [QY. 2018; June 2019; Mar. 2020 & '23; Sep. 2021; Aug '22]
w

Main Component
Ans. S.No Generation Period Merits/ Demerits
used
ab
1 First Generation 1940-1956 Vaccum tubes ‰‰Bigin size
‰‰Consumed more power

‰‰Malfunction due to overheat

‰‰Machine Language was used


ur

First Generation Computer - ENIAC, EDVAC, UNIVAC 1


ENIAC weighed about 27 tons, size 8 feet × 100 feet × 3 feet and consumed around 150 watts of power
2. Second Generation 1956-1964 Transistors ‰‰Smaller
compared to First Generation
.s

‰‰Generated Less Heat

‰‰Consumed less power compared to first


generation
w

‰‰Punched cards were used

‰‰First operating system was developed -


Batch Processing and Multiprogramming
w

Operating System
‰‰Machine language as well as Assembly
language was used.
w

Second Generation Computers - IBM 1401, IBM 1620, UNIVAC 1108


3. Third 1964-1971 Integrated Circuits ‰‰Computers were smaller, faster and more
Generation (IC) reliable
‰‰Consumed less power.
‰‰High Level Languages were used

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 5

Third Generation Computers - IBM 360 series, Honeywell 6000 series


4. Fourth 1971-1980 Microprocessor ‰‰Smaller
and Faster.
Generation Very Large Scale

n
‰‰Microcomputer series such as IBM and
Integrated Circuits APPLE were developed.

.i
(VLSI) ‰‰Portable Computers were introduced.

m
al
5. Fifth 1980-till Ultra Large Scale ‰‰Parallel Processing
Generation date Integration (ULSI) ‰‰Super conductors

ad
‰‰Computers size was drastically reduced.

co
‰‰Can recognize Images and Graphics

k
‰‰Introduction of Artificial Intelligence and
Expert Systems

vi
‰‰Able to solve high complex problems
including decision making and logical

s.
al
reasoning
6. Sixth In future ‰‰Paralleland Distributed computing
.k
Generation ‰‰Computers have become smarter, faster

ok
w
and smaller
‰‰Development of robotics
w

‰‰Natural Language Processing

‰‰Development of Voice Recognition


o
w

Software
ab
3. Explain the following :
a. Inkjet Printer b. Multimedia projector c. Bar code / QR code Reader
Ans. a) Inkjet Printers:
(i) 
Inkjet Printers use colour cartridges which combined Magenta, Yellow and Cyan inks to create color
ur

tones. A black cartridge is also used for monochrome output. Inkjet printers work by spraying ionised
ink at a sheet of paper.
(ii) They use the technology of firing ink by heating it so that it explodes towards the paper in bubbles or by
.s

using piezoelectricity in which tiny electric currents controlled by electronic circuits are used inside the
printer to spread ink in jet speed.
(iii) An Inkjet printer can spread millions of dots of ink at the paper every single second.
w

b) Multimedia Projectors:
(i) Multimedia projectors are used to produce computer output on a big screen.
w

(ii) These are used to display presentations in meeting halls or in classrooms.


c) Bar Code / QR Code Reader:
(i) 
A Bar code is a pattern printed in lines of different thickness. The Bar code reader scans the information
w

on the bar codes transmits to the Computer for further processing.


(ii) The system gives fast and error free entry of information into the computer.
QR (Quick response) Code:
The QR code is the two dimension bar code which can be read by a camera and processed to interpret the
image.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
6 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1

Government Exam questions and Answers


1 Mark 12. _____ is first known Calculating Device. [CRT '22]

n
(a) Computer (b) Analytical Engine

.i
1. How many types of Booting process in system ? (c) Abacus (d) Calculator [Ans. (c) Abacus]

m
(a) 3 (b) 2  [QY. 2018] 13. _____ is the main component of Second Generation

al
(c) 5 (d) 4  [Ans. (b) 2] computers. [Aug '22]
2. Which of the following is a Third generation (a) Vacuum tubes (b) Transistors

ad
computers?  [Govt.MQP-2018] (c) Integrated circuits (d) Microprocessors

co
(a) Vacuum tubes (b) Transistor  [Ans. (b) Transistors]
(c) Integrated Circuits (d) Microprocessor

k
 [Ans. (b) Transistor] 2 Marks

vi
3. Which one of the following is Biometric Device? 1. Expand (i)BIOS (ii)ENIAC (iii)RAM (iv)ALU
 [QY. 2018]

s.
 [Govt.MQP-2018]

al
(a) Scanner (b) Fingerprint Scanner
Ans. (i) BIOS - Basic Input Output System.
(c) Light Pen (d) Mouse
(ii) ENIAC - Electronic Numerical Integrator
.k
 [Ans. (b) Fingerprint Scanner]
And Calculator.

ok
4. Identify the Input device .................. .  [FMT 2018]
(iii) RAM - Random Access Memory
w
(a) Printer (b) Mouse
(c) Plotter (d) Projector [Ans. (b) Mouse] (iv) ALU - Arithmetic and Logic unit
w

5. Expansion of GUI is .............. .  [QY. 2018] 2. Give examples for Impact and Non impact
(a) Graphics User Interface o printers. [FMT 2018]
w

(b) Graphical User Information Ans. Impact : Dot Matrix printer and line dot matrix printer.
(c) Geographical User Information Non - Imapct : Laser printer and Inkjet printer.
ab
(d) Graphical User Interface 3. Write short note on registers.  [FMT 2018]
 [Ans. (d) Graphical User Interface] Ans. Registers are the high-speed temporary storage
6. Which generation of computer used Transistors? locations in the CPU. Hence, their contents can be
(a) First (b) Second [June 2019] handled much faster than the contents of memory.
(c) Third (d) Fourth [Ans. (b) Second] 4. Write Demerits of Artificial Intelligence.  [QY. 2018]
ur

7. Plotter is a _______ device. [QY. 2019] Ans. (i) Machines need repairing and maintenance
(a) storage (b) input which need plenty of cost.
(c) output (d) memory [Ans. (c) output] (ii) The increasing number of machines leading to
8. Line printers are capable of printing much more unemployment and job security issues.
.s

than _______ lines per minute. [QY. 2019] 5. Write notes on fifith generation computers.
(a) 1000 (b) 1200 (c) 1500 (d) 1300 Ans. (i) Parallel Processing [QY. 2019]
 [Ans. (a) 1000] (ii) Super conductors
w

9. Which Generations of computer used ULSI? (iii) Computers size was drastically reduced.
(a) Third (b) Fourth  [HY. 2018] (iv) Can recognise Images and Graphics
(c) Fifth (d) Sixth  [Ans. (c) Fifth] (v) Introduction of Artificial Intelligence and
w

10. Expand ULSI. [Sep. 2021] Expert Systems


(a) Ultra Large Scale Information (vi) Able to solve high complex problems including
(b) Ultra Low Scale Integration decision making and logical reasoning
w

(c) Ultra Low Software Integration 3 Marks


(d) Ultra Large Scale Integration
 [Ans. (d) Ultra Large Scale Integration] 1. Write the mechanism of laser mouse. [FMT 2018]
11. In _______ generation portable computers were Ans. (i) Measures the motion and acceleration of pointer.
introduced. [CRT '22] (ii) Laser mouse uses laser light.
(a) First (b) Second (iii) 
Laser mouse is highly sensitive and able to
(c) Third (d) Fourth [Ans. (d) Fourth] work on any hard surface.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 7

2. Write the sequence of steps in boot process? (or) feature that uses biometric technology. Fingerprint
Explain the types of booting in computer. Reader / Scanner is very safe and convenient device
 [Govt.MQP, FMT-2018; HY. 2019; July-'23; QY.'23] for security instead of password, that is vulnerable to
Ans. Booting process is of two types.

n
fraud and is hard to remember.
(i) Cold Booting (ii) Warm Booting
5 Marks

.i
(i) Cold Booting: When the system starts from

m
initial state i.e. it is switched on, we call it cold

al
1. Short answer on the following:  [QY. 2018]
booting or Hard Booting. When the user presses a) Data b) Hardware
the Power button, the instructions are read from

ad
c) Natural Language Processing
the ROM to initiate the booting process.

co
(ii) Warm Booting: When the system restarts or d) Types of Memory e) Bit
when Reset button is pressed, we call it Warm Ans. (a) Data : The term data comes from the word

k
Booting or Soft Booting. The system does not datum, which means a raw fact. The data is a

vi
start from initial state and so all diagnostic tests fact about people, places or some objects.
need not be carried out in this case. There are (b) Hardware : Hardware is the physical

s.
al
chances of data loss and system damage as the component of a computer like motherboard,
data might not have been stored properly. memory devices, monitor, keyboard etc.,
.k
3. Write notes on multimedia projector. [QY. 2019] (c) Natural Language Processing : Natural

ok
Ans. (i) Multimedia projectors are used to produce Language Processing is a method used in
w
computer output on a big screen. artificial intelligence to process and derive
(ii) 
These are used to display presentations in meaning from the human language.
w

meeting halls or in classrooms. (d) Types of Memory : The memory unit is of two
4. How Finger Print Scanner Working? [QY. 2018] types - Primary memory, Secondary memory.
o
w

Ans. Finger print Scanner: Fingerprint Scanners is a (e) Bit : Machine language is a collection of
fingerprint recognition device used for computer binary digits or bits that the computer reads and
ab
security, equipped with the fingerprint recognition interprets.

2. Differentiate Impact Printers and Non-Impact Printers. [QY. 2019 & '23]
Ans. S.No Impact Printers Non-Impact Printers
1. It uses ribbons / carbon papers to leave the It use ink cartridges and the impressions appear on
ur

impressions on the paper. the paper with the flow of ink.


2. The quality of printing is a draft quality. The quality of printing is a high quality.
3. Striking Mechanism used to produce output. No striking mechanism used to produce output.
.s

4. Faster speeds around 250 words per second, Slower speeds around 1 page per seconds.
5. Example : Dot Matrix printers and line Example : Laser printers and Inkjet printers.
matrix printers
w

3. Explain Data and Information. [CRT & May '22] Information: Information is a collection of facts
Ans. Computer is an electronic device that processes the from which conclusions may be drawn. In simple
w

input according to the set of instructions provided words we can say that data is the raw facts that is
to it and gives the desired output at a very fast processed to give meaningful, ordered or structured
rate. Computers are very versatile as they do a information. For example Kavitha is 16 years old.
lot of different tasks such as storing data, weather This information is about Kavitha and conveys some
w

forecasting, booking airlines, railway or movie meaning. This conversion of data into information is
tickets and even playing games. called data processing.
Data: Data is defined as an un-processed collection of
raw facts, suitable for communication, interpretation
or processing. INPUT PROCESS OUTPUT

For example, 134, 16 ‘Kavitha’, ‘C’ are data. This DATA


will not give any meaningful message. INFORMATION

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
8 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1
4. What is an output unit? Explain any three output (ii) Plotter : Plotter is an output device that is used to
devices. [Mar-'24] produce graphical output on papers. It uses single
Ans. Output Unit : An output unit is any hardware color or multi color pens to draw pictures.

n
component that conveys information to users in an (ii) Printers : Printers are used to print the information
understandable form. Example : Monitor, Printer etc.

.i
on papers. Printers are divided into two main

m
Output Devices :

al
categories:
(i) Monitor : Monitor is the most commonly
• Impact Printers

ad
used output device to display the information.
It looks like a TV. Monitors may either be • Non Impact printers

co
Monochrome which display text or images in Impact Printers : These printers print with

k
Black and White or can be color, which display striking of hammers or pins on ribbon.
results in multiple colors. There are many types

vi
For example, Dot Matrix printers and Line
of monitors available such as CRT (Cathode Ray
matrix printers are impact printers.

s.
al
Tube), LCD (Liquid Crystal Display) and LED
(Light Emitting Diodes). The video graphics Non-Impact Printers : These printers do
not use striking mechanism for printing.
.k
card helps the keyboard to communicate with
the screen. It acts as an interface between the For example, Laser printers and Inkjet printers

ok
w
computer and display monitor. are non-impact printers.

additional questions and Answers


w

o
w

5. Which component used in third generation


Choose the Correct Answers 1 MARK
computers?
ab
I. Choose the Correct options for the (a) Vacuum Tubes (b) Transistors
below Questions. (c) IC (d) Microprocessor
 [Ans. (c) IC]
1. Which of the following led us today to extremely
high speed calculating device? 6. In which generation, the Voice Recognition
ur

(a) Laptop (b) Tabulating Machine software developed?


(c) Abacus (d) ENIAC (a) Sixth (b) Fourth (c) Third (d) Second
 [Ans. (c) Abacus]  [Ans. (a) Sixth]
.s

2. In which year the concept of the analytical engine 7. Which generation gave a start to parallel
was invented? computing?
(a) fourth (b) fifth (c) sixth (d) seventh
w

(a) 1837 (b) 1910 (c) 1991 (d) 1836


 [Ans. (a) 1837]  [Ans. (c) sixth]
3. Which of the following period the first generation 8. Which of the following is not a form of parallel
computing?
w

computers belongs?
(a) 1956-1963 (b) 1940-1956 (a) bit level (b) instruction level
(c) 1964-1971 (d) 1980-1990 (c) task parallelism (d) Robotics
w

 [Ans. (b) 1940-1956]  [Ans. (d) Robotics]


4. Which of the following is not a first generation 9. Which of the following holds the data and
computers? instructions during the processing?
(a) ENIAC (b) EDVAC (a) Input unit (b) output unit
(c) UNIVAC 1 (d) IBM1401 (c) Memory unit (d) Software
 [Ans. (d) IBM1401]  [Ans. (c) Memory unit]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 9

10. Which unit does the processing of data? 19. Which company developed first digital computer?
(a) CPU (b) Registers (a) Atanasoft Berry Computer
(c) Input unit (d) Output unit (b) AT & T bell (c) IBM

n
 [Ans. (a) CPU] (d) Microsoft

.i
11. Which of the following is the heart of the  [Ans. (a) Atanasoft Berry Computer]

m
computer?

al
(a) CPU (b) HDD (c) SDD (d) ANN 20. Which of the following are the computer systems
 [Ans. (a) CPU]

ad
inspired by the biological neural networks?
(a) NLP (b) IBM

co
12. Which of the following operations of ALU promote
(c) Robotics (d) ANN [Ans. (d) ANN]
decision -making ability of a computer?

k
(a) Logical (b) Relational 21. Which of the following has become the dominant

vi
(c) Arithmetic (d) Binary paradigm in computer architecture?

s.
al
 [Ans. (a) Logical] (a) Parallel computing
(b) parallel processing (c) Multi tasking
13. Which of the following is not a non volatile
.k
memory? (d) Multi processing [Ans. (a) Parallel computing]

ok
(a) ROM (b) Hard disk
w
22. In which device the keys are arranged in a cluster?
(c) CD-ROM (d) RAM (a) Keyboard (b) Keyer
w

 [Ans. (d) RAM]


(c) Barcode Reader (d) Touch Screen
14. Who invented the computer mouse?
o
w

 [Ans. (b) Keyer]


(a) Douglas Engelbart (b) Bill English
(c) Apple Lisa (d) Henry Babbage 23. Which of the following concerned with the
ab
 [Ans. (a) Douglas Engelbart] interactions between computers and human
language?
15. Which device works like a xerox machine?
(a) Artificial Neurons (b) Neural network
(a) Retinal scanner (b) OCR
(c) Artificial intelligence
(c) OMR (d) Scanner
(d) Natural language processing
ur

 [Ans. (d) Scanner]  [Ans. (c) Artificial intelligence]


16. Which device is very safe and convenient for 24. Which of the following is the logical machine which
security instead of password? interprets and executes software instructions?
.s

(a) Scanner (b) Fingerprint Scanner (a) CPU (b) ALU


(c) Track ball (d) Retinal Scanner (c) Control Unit (d) Memory Unit
 [Ans. (b) Fingerprint Scanner]  [Ans. (a) CPU]
w

17. Which of the following device uses CCD Electronic 25. How many classification of memories in memory
chip? unit?
(a) OCR (b) BCR (a) 2 (b) 3
w

(c) Voice Input Systems (d) Digital Camera (c) 4 (d) more than 2
 [Ans. (d) Digital Camera]  [Ans. (a) 2]
18. Who was the inventor of the electronic digital 26. How many types of Keyboards used to input the
w

computer? data?
(a) John Vincent Atanasoft (a) 3 (b) 2 (c) 4 (d) 5
(b) J. Presper Eckert  [Ans. (a) 3]
(c) John Mauchly
27. How many types of pointing device are there?
(d) Charles babbage
(a) 2 (b) 3 (c) 1 (d) Many
 [Ans. (a) John Vincent Atanasoft]  [Ans. (a) 2]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
10 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1
28. Which mouse has as many as 12 buttons? 37. Which of the following devices stores the data
(a) Laser (b) Optical permanently?
(c) Mechanical (d) Both a and b (a) HDD (b) Tape drives

n
 [Ans. (a) Laser] (c) SSD (d) All of these

.i
29. Which printer do not use striking mechanism for  [Ans. (d) All of these]

m
printer?

al
38. Who assisted Douglas Engelbart to invent the
(a) Inkjet (b) Laser mouse?
(c) Thermal (d) All of these

ad
(a) Berry (b) Steve Kirsch
 [Ans. (d) All of these]

co
(c) Bill English (d) Bill Gates
30. W
 hich device is used to produce computer output

k
 [Ans. (c) Bill English]
on a big screen?

vi
(a) Monitor (b) LED 39. W hich device is used to enter information directly
(c) Projector (d) Monochrome Monitor into the computer's memory?

s.

al
[Ans. (c) Projector]
(a) Keyboard
(c) Mouse
(b) Scanner
(d) Plotter
.k
31. W
 hich of the following is the diagnostic testing  [Ans. (b) Scanner]

ok
sequence of the computer hardware?
w
40. Which device used CCD chip?
(a) POST (b) BIOS (c) MAR (d) MBR (a) Light pen (b) Scanner
w

 [Ans. (a) POST] (c) Microphone (d) Digital Camera


 [Ans. (d) Digital Camera]
32. W
 hich of the following issue an error message if
o
w

any computer hardware not defected? 41. Which device is used to input by pressing one or
more switches?
(a) BIOS (b) BUS (c) RAM (d) POST
ab
 [Ans. (a) BIOS] (a) Keyboard (b) Mouse
(c) Touch Screen (d) Keyer
33. W
 hich device produce graphical output on
papers?  [Ans. (d) Keyer]
(a) Scanner (b) Touch Screen 42. How many types of monitors are there?
ur

(c) Plotter (d) Track ball (a) 2 (b) 3 (c) 4 (d) Many
 [Ans. (b) 3]
 [Ans. (c) Plotter]
43. Which of the following is an impact priners
34. W
 hich code checks partition table for an active (a) Inkjet (b) Fax
.s

partition in a computer?
(c) Dot Matrix (d) Laser
(a) MBR (b) Marse (c) Binary (d) Object
 [Ans. (c) Dot Matrix]
 [Ans. (a) MBR]
w

35. Which of the following is a type of computation


II. Match List I with List II and Select the
in which many calculations are carried out Correct Answer using the Codes given
simultaneously? below.
w

(a) NLP (b) ANN 1. List I List II


(c) Parallel Processing (d) Parallel Computing
(i) Expert System 1 Second
 [Ans. (d) Parallel Computing]
w

Generation
36. Which of the following devices not stores the date (ii) Batch Processing 2 Fourth
permanently? Generation
(a) HDD (b) SSD (iii) NLP 3 Six Generation
(c) Tape Drives (d) RAM
(iv) Introduction of 4 Fifth Generation
 [Ans. (d) RAM]
Laptop

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 11

Codes: 4.
List I List II
(i) (ii) (iii) (iv)
(a) 4 1 3 2 (i) Used to feed data to 1 CPU
the computer

n
(b) 1 3 2 4
(ii) Controls the operation 2 ALU

.i
(c) 3 4 1 2
of memory Unit

m
(d) 4 3 1 2

al
 [Ans. (a) (i)-4, (ii)-1, (iii)-3, (iv)-2] (iii) Computing functions 3 Control
are performed on data Unit

ad
2.
List I List II (iv) Controls the flow of

co
4 Input Unit
(i) EDVAC 1 Second Generation data between memory

k
Computer unit and I/O Units.

vi
(ii) APPLE 2 Fifth Generation
Computer Codes:

s.
(iii) IBM 1620 3 First Generation
al (i)
(a) 4
(ii)
1
(iii)
2
(iv)
3
.k
Computer
(b) 2 1 4 3

ok
(iv) Expert System 4 Fourth Generation (c) 4 3 1 2
w
Computer
(d) 3 4 1 2
w

 [Ans. (a) (i)-4, (ii)-1, (iii)-2, (iv)-3]


Codes:
o 5.
w

(i) (ii) (iii) (iv)


List I List II
(a) 4 1 3 2
ab
(i) First generation 1 Integrated
(b) 1 3 2 4
Circuits
(c) 4 3 1 2
(ii) Second 2 Microprocessor
(d) 3 4 1 2 generation
 [Ans. (d) (i)-3, (ii)-4, (iii)-1, (iv)-2]
ur

(iii) Third generation 3 Transistors


3. List I List II (iv) Fourth generation 4 Vacuum tubes
(i) Out device 1 Executes Instruction
Codes:
(ii) CPU 2 Delivers the data
.s

(i) (ii) (iii) (iv)


processed by CPU
(a) 1 2 3 4
(iii) Memory 3 R etrieve the data is (b) 3 4 2 1
w

possible
(c) 4 3 1 2
(iv) Mass Storage 4 Temporarily stores
(d) 2 3 1 4
Device data
w

 [Ans. (c) (i)-4, (ii)-3, (iii)-1, (iv)-2]


Codes: 6.
(i) (ii) (iii) (iv) List I List II
w

(a) 4 1 3 2
(i) Input unit 1 I/o devices
(b) 2 1 4 3
(ii) Memory unit 2 Monitor
(c) 4 3 1 2
(d) 3 4 1 2 (iii) Control unit 3 Rom
 [Ans. (b) (i)-2, (ii)-1, (iii)-4, (iv)-3] (iv) Output unit 4 Keyboard

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
12 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1
Codes: 5. Laptops, Notebook, Tablets are belongs to
(i) (ii) (iii) (iv) ............... generation computers.
(a) 1 2 3 4 (a) First (b) Second (c) Third (d) Fourth

n
(b) 3 4 2 1  [Ans. (d) Fourth]
6. The fifth generation computers belongs to ...........

.i
(c) 4 3 1 2
(a) 1971-1980 (b) 1980- till date

m
(d) 2 3 1 4

al
 [Ans. (c) (i)-4, (ii)-3, (iii)-1, (iv)-2] (c) 1964-1971 (d) 1940-1956
 [Ans. (b) 1980-till date]

ad
7.

co
List I List II 7. Name the software introduced in fifth generation
computers ................... .

k
(i) Information 1 Motherboard (a) Artificial Neural Networks

vi
(ii) Hardware 2 Set of programs (b) Artificial Intelligence (c) Robotics
(iii) Data 3 Convey some (d) Natural language processing

s.
(iv) Software 4
meaning
al
Set of raw facts
 [Ans. (b) Artificial Intelligence]
.k
8. Robotics developed in .................. generation.

ok
Codes: (a) Third (b) Fourth (c) Fifth (d) Sixth
w
(i) (ii) (iii) (iv)  [Ans. (d) Sixth]
(a) 1 2 3 4
w

9. ENIAC was invented by ................. .


(b) 3 1 4 2
(a) John Vincent (b) Cliff Berry
(c) 4 3 2 1
o
w

(d) 2 3 1 4 (c) Presper Eckert, John Mauchly


 [Ans. (b) (i)-3, (ii)-1, (iii)-4, (iv)-2] (d) Earl R Johnson and Atanasoff
ab
 [Ans. (c) Presper Eckert, John Mauchly]
III. Choose the Correct Option and Fill in 10. Expand NLP .................. .
the Blanks. (a) National Language Problem
(b) Natural Language Processing
ur

1. The component used in second generation


(c) Network Language Program
computers is ................... .
(d) Network Local Processing
(a) Transistors (b) ICs
 [Ans. (b) Natural Language Processing]
(c) Vacuum tubes (d) Microprocessors
.s

 [Ans. (a) Transistors] 11. NLP is a component of .................. .


2. The Second generation computers belongs to (a) Expert systems (b) Robotics
period .................... . (c) Parallel computing
w

(a) 1940-1956 (b) 1956-1964 (d) Artificial Intelligence


(c) 1980-1990 (d) 1964-1971  [Ans. (d) Artificial Intelligence]
 [Ans. (b) 1956-1964] 12. Every task given to a computer-follows a(n)
w

3. The fourth generation belongs to .......... . ............... cycle.


(a) 1940-1956 (b) 1971-1980 (a) BPO (b) IPO
(c) ANN (d) NLP [Ans. (b) IPO]
w

(c) 1964-1971 (d) 1980-1990


 [Ans. (b) 1971-1980] 13. Expansion of CPU is .................. .
4. The component used in fourth generation (a) Control processing unit
computers are ................ . (b) Central processor unique
(a) ICS (b) Transistors (c) Central processing unit
(c) VLSI (d) Vacuum tube (d) Control processor unit
 [Ans. (c) VLSI]  [Ans. (c) Central processing unit]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 13

14. Expansion of ALU is .................... . 24. The conversion of data to information is called
(a) Arithmetic Logical Unit ........... .
(b) Accumulator Logical Unit (a) Data Digitization

n
(c) Arithmetic Language Unit (b) Data Processing

.i
(d) None of these (b) Data Management

m
 [Ans. (a) Arithmetic Logical Unit] (d) All of these

al
 [Ans. (b) Data Processing]
15. The memory unit is of .............. kinds.

ad
(a) 3 (b) 4 (c) 2 (d) 5 25. A set of instructions given to the computer is

co
 [Ans. (c) 2] called ............. .
16. Optical Mouse invented in the year .................. . (a) Information (b) Data

k
(a) 1968 (b) 1973 (c) 1988 (d) 1981 (c) Input (d) Program

vi
 [Ans. (c) 1988]  [Ans. (d) Program]

s.
al
17. Laser mouse has as many as ............... buttons. 26. The mechanical mouse introduced in the year .......
(a) 10 (b) 11 (c) 12 (d) 3 (a) 1978 (b) 1988 (c) 1968 (d) 1958
.k  [Ans. (c) 1968]
 [Ans. (c) 12]

ok
18. Expansion of CCD is ................. 27. T
 he Red, Green or Blue led used mouse in
w
(a) Coupled Changed Device invented by .................
(a) John Mauchly (b) Steve Kirsch
w

(b) Changed Coupled Device


(c) Changed Couple Device
o (c) Henry babbaje
w

(d) Camera changed Divider (d) Presper Eckert  [Ans. (b) Steve Kirsch]
 [Ans. (b) Changed Coupled Device] 28. The expansion of USB is ................
ab
(a) Universal Serial Bus
19. Expansion of CPS is ...................... . (b) Uniform Serial Bus
(a) Character Per Second (b) Copy Per Second (c) Uniform Serious Bus
(c) Code Per Second (d) Character Per Screen (d) Universal Serial BIOS
 [Ans. (a) Character Per Second]  [Ans. (a) Universal Serial Bus]
ur

20. The first computer monitor was released in the 29. The expansion of CRT is ................
year .................. . (a) Cathode Ray Tube
(a) 1980 (b) 1983 (c) 1963 (d) 1973 (b) Cathode Radio Tube
.s

 [Ans. (d) 1973] (c) Cathode Ray Technology


(d) Cathode Radio Technology
21. The expansion of VLSI is .................. .
 [Ans. (a) Cathode Ray Tube]
(a) Verified Logical Scale Integrated Circuits
w

(b) Very Logical Small Integer Circuits 30. The expansion of LCD is ..............
(c) Very Large Scale Integrated Circuits (a) Liquid Cathode Diodes
(d) Volatile Large Scale Integrated Circuits (b) Liquid Cluster Display
w

 [Ans. (c) Very Large Scale Integrated Circuits] (c) Liquid Crytal Display
22. The first digital computer name was ............. . (d) Live Extract Display
(a) EDVAC (b) UNIVACI  [Ans. (b) Liquid Cluster Display]
w

(c) ENIAC (d) IBM 1620 31. The expansion of LED is ...............
 [Ans. (c) ENIAC] (a) Light Extract Display
23. Artificial neurons are organized in ....... . (b) Light Emitting Diodes
(a) Nodes (b) Layers (c) Liquid Emitting Diodes
(c) Signals (d) Units (d) Liquid Extract Display
 [Ans. (b) Layers]  [Ans. (c) Liquid Emitting Diodes]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
14 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1
32. The first computer Monitor was released in the 2. (a) Second generation – Transistors
year .............. (b) Third generation – Integrated circuits
(a) 1974 (b) 1972 (c) 1971 (d) 1973 (c) Fourth generation – Vacuum tubes

n
 [Ans. (d) 1973] (d) Fifth generation – ULSI

.i
[Ans. (c) Fourth generation – Vacuum tubes]
33. The expansion of VGA is ..............

m
al
(a) Visual Graphics Adapter VI. Consider the Following Statement.

ad
(b) Video Graphics Adapter 1. Assertion (A) : Computers have now become an
indispensable part of our lives.

co
(c) Video Graphics Array
Reason (R) : Computers have revolutionized
(d) Voice Graphics Array

k
out lives with their accuracy and
 [Ans. (c) Video Graphics Array]

vi
speed of performing a job, it is
 n error will half the boot process found in ..........
34. A truly remarkable.

s.
al
(a) Both (A) and (R) are true and (R) is the correct
(a) BIOS (b) POST explanation of A.
(c) HDD (d) I/O System
.k
[Ans. (b) POST] (b) Both (A) and (R) are true and (R) is not the
correct explanation of (A).

ok
35. The process of loading an OS in a computer RAM
w
is known as ............ (c) (A) is true, but (R) is false.
(a) POST (b) BIOS (d) (A) is false, but (R) is true.
w

[Ans. (a) Both (A) and (R) are true and (R) is the
(c) Booting (d) All of these
correct explanation of (A)]
o
w

 [Ans. (c) Booting]


2. Assertion (A) : PU is the major component
C
which interprets and executes
ab
IV. Pick the Odd one Out. software instructions.
1. (a) Keyboard (b) Mouse Reason (R) : The ALU is a part of the CPU
where various computing
(c) Track Ball (d) Monitor functions are performed on data.
ur

[Ans. (d) Monitor] (a) Both (A) and (R) are true and (R) is the correct
Reason : Monitor is the most commonly used output explanation of A.
device to display the information. Other three are (b) Both (A) and (R) are true and (R) is not the
examples of input device. correct explanation of A.
.s

(c) (A) is true, but (R) is false.


2. (a) Mechanical Mouse (b) Laser Mouse
(d) (A) is false, but (R) is true.
(c) Plotter (d) Optical Mouse [Ans. (b) Both (A) and (R) are true and (R) is not
w

[Ans. (c) Plotter] the correct explanation of (A)]


Reason : Plotter is an output device that is used to 3. Assertion (A) :  icrophone serves as a voice
M
produce graphical output on papers other three are Input device.
w

types of mouse. Reason (R) : Digital camera uses a CCD


electronic chip.
V. Which one of the Following is Not (a) Both (A) and (R) are true and (R) is the correct
Correctly Matched?
w

explanation of (A).
1. (a) Impact printers – Dot Matrix printer (b) Both (A) and (R) are true and (R) is not the
correct explanation of (A).
(b) Non–Impact printers – Laser printer
(c) (A) is true, but (R) is false.
(c) Hardware – Keyboard
(d) (A) is false, but (R) is true.
(d) Software – CPU [Ans. (b) Both (A) and (R) are true and (R) is not
[Ans. (d) Software – CPU] the correct explanation of (A)]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 15

VII. Choose the Correct Statement. 8. What is the use of Microphone?


Ans. Microphone serves as a voice Input device. It
1. Which of the following statements are true? captures the voice data and send it to the Computer.

n
(i) Machine language programs are done in first
9. Write a note on Digital Camera.

.i
generation
Ans. It captures images / videos directly in the digital form.

m
al
(ii) Third generation computers are not more reliable
It uses a CCD (Charge Coupled Device) electronic
(iii) Voice recognition software developed in fifth chip. When light falls on the chip through the lens, it

ad
generation computer
converts light rays into digital format.

co
(iv) Micro processors are used in fourth generation
10. What is use of VGA?

k
computer
Ans. The screen monitor works with the VGA (Video

vi
(a) Only (i)
(b) Only (i) and (iv) Graphics Array). The video graphics card helps the

s.
al
keyboard to communicate with the screen. It acts as an
(c) Only (iii) and (iv)
interface between the computer and display monitor.
(d) Only (i) (iii) and (iv)
.k
Usually the recent motherboard incorporates built in
 [Ans. (b) Only (i) and (iv)]

ok
video card.
w
Very Short Answers 2 MARKS 11. Write the two main categories of Printer.
w

Ans. Printers are divided into two main categories:


1. Name the first generation computers.
(i) Impact Printers
o
w

Ans. ENIAC, EDVAC, UNIVAC 1.


(ii) Non Impact printers
2. Name the Second generation computers.
ab
Ans. IBM 1401, IBM 1620, UNIVAC 1108. 12. What is booting a computer?
Ans. Booting a computer is to load an operating system
3. Name the Third generation computers. into the computer's main memory or random access
Ans. IBM 360 Series, Honeywell 6000 series. memory (RAM).
ur

4. Name the softwares introduced in fifth generation 13. What makes Charles Babbage the father of
computers. computing?
Ans. (i) Artificial Intelligence Ans. Charles Babbage radical ideas and concept of the
(ii) Expert Systems Analytical Engine (It contained an ALU, basic flow
.s

5. Name the types of computer introduced in Fourth control and integrated memory) makes him the father
generation computers. of computing.
Ans. (i) Microcomputer
w

14. What is the goal of neural network approach?


(ii) Portal Computers.
Ans. The original goal of the neural network approach was
6. Write the developments of Sixth generation to solve problems in the same way that a human brain
computers.
w

would. Over time, attention focused on matching


Ans. (i) Parallel Computing
specific mental abilities, leading to deviations from
(ii) Artificial Neural Networks
biology.
(iii) Robotics
w

(iv) Natural Language Processing 15. Write the tools in which nano technology was
7. What is NLP? born.
Ans. Natural Language Processing is the ability of a Ans. The right tools, such as the scanning tunneling
computer program to understand human language. It microscope (STM) and the atomic force microscope
is a component of artificial intelligence. (AFM), the age of nano-technology was born.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
16 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1
16. Define IPO Cycle. 25. What does reboot mean?
Ans. The functional components of a computer performs. Ans. It means to reload the operating system.
Every task given to a computer follows an Input-
26. Write the limitations of impact printer.

n
Process- Output Cycle (IPO cycle).
Ans. (1) It is slow as compared to non-impact printers

.i
17. Name the different keys available in the keyboard. (2) It is not best suited for graphics

m
al
Ans. There are different set of keys available in the (3) It is not possible to obtain colour output.
keyboard such as character keys, modifier keys,

ad
system and GUI keys, enter and editing keys, Short Answers 3 MARKS

co
function keys, navigation keys, numeric keypad and
lock keys. 1. Write a note Vaccum tube.

k
Ans. (i) Vaccum tubes contain electrodes for controlling
18. Which device is used to draw a lines?

vi
electron flow and were used in early computers
Ans. Light Pen is an input device which is used to draw as a switch or an amplifier.

s.
al
lines or figures on a computer screen. It is touched (ii) Vaccum tubes are big in size and consumed
to the CRT screen where it can detect faster on the more power.
.k
screen as it passes.
2. Define Transistor.

ok
19. Define Pixels.
w
Ans. (i) The transistor ("transfer resistance") is made up
Ans. Pictures on a monitor are formed with picture of semi-conductors.
w

elements called PIXELS. (ii) It is a component used to control the amount


20. Name the types of Monitors available. of current or voltage used for amplification/
o
w

Ans. The types of monitors available such as CRT modulation or switching of an electronic signal.
(Cathode Ray Tube), LCD (Liquid Crystal Display) Define Punched cards.
ab
3.
and LED (Light Emitting Diodes).
Ans. Punch cards also known as Hollerith cards are paper
21. How the date travel through control bus? cards containing several punched or perforated holes
Ans. The date travel in both unidirectional and bidirectional that were punched by hand or machine to represent
due to the internal connection with in the computer data.
ur

architecture. 4. Differentiate Dot Matrix Printer and Laser


22. Name the type of registers are essential for Printer.
instruction execution.
.s

Ans. (i) Program counter Ans. Dot Matrix Printer Laser Printer
(ii) Instruction Register Printing speed is slow. Printing speed is high.
(iii) Memory Address Registers
Suitable for black and Suitable of colour
w

(iv) Memory Buffer Register


white printing. printing.
(v) Accumulator
It makes noise while It is silent while
23. Expand (a) MAR (b) MBR printing. printing.
w

Ans. (a) MAR - Memory Address Register


(b) MBR - Memory Buffer Register 5. What is Integrated circuits?
Ans. (i) IC is short for Integrated Circuit or Integrated
24. Why POST is essential?
w

Chip.
Ans. If the hardware is not detected, a particular pattern
of beeps will inform about the error. An error (ii) The IC is a package containing many circuits,
found in the POST is usually fatal (that is, it causes pathways, transistors, and other electronic
current program to stop running) and will halt the components all working together to perform a
boot process, since the hardware check is absolutely particular function or a series of functions.
essential for the computer's functions.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to Computers 17

6. What is Robotics? (ii) Finger print Scanner: Finger print Scanner is a


Ans. (i) Robot is a term coined by Karel Capek in the fingerprint recognition device used for computer
1921 play RUR (Rossum's Universal Robots). security, equipped with the fingerprint recognition

n
(ii) It is used to describe a computerized machine feature that uses biometric technology. Fingerprint

.i
designed to respond to input received manually Reader / Scanner is a very safe and convenient

m
al
or from its surroundings. device for security instead of using passwords,
7. What is Nano-technology? which is vulnerable to fraud and is hard to

ad
Ans. Nano-technology, is an engineering, science, and remember.

co
technology that develops machines or works with Output Devices :

k
one atom or one molecule that is 100 nanometers or (i) Monitor: Monitor is the most commonly

vi
smaller.
used output device to display the information.
8. Write a note on Touch Screen. It looks like a TV. Monitors may either be

s.
al
Ans. (i) A touch screen is a display device that allows
the user to interact with a computer by using the
Monochrome which display text or images in
Black and White or can be color, which display
.k
finger. results in multiple colors. There are many types

ok
(ii) It can be quite useful as an alternative to a of monitors available such as CRT (Cathode Ray
w
mouse or keyboard for navigating a Graphical
Tube), LCD (Liquid Crystal Display) and LED
User Interface (GUI).
(Light Emitting Diodes). The video graphics
w

(iii) Touch screens are used on a wide variety of


card helps the keyboard to communicate with
devices such as computers, laptops, monitors,
o the screen. It acts as an interface between the
w

smart phones, tablets, cash registers, and


information kiosks. computer and display monitor.
ab
(iv) Some touch screens use a grid of infrared beams (ii) Plotter: Plotter is an output device that is used to
to sense the presence of a finger instead of produce graphical output on papers. It uses single
utilizing touch-sensitive input. color or multi color pens to draw pictures.
9. Define POST. 2. Explain in detail the different types of Mouse.
ur

Ans. (i) POST (Power-On Self-Test) is the diagnostic Ans. (i) Mechanical Mouse :
testing sequence that a computer's basic input/
output system runs to determine if the computer A small ball is kept inside and touches the pad
keyboard, random access memory, disk drives through a hole at the bottom of the mouse.
.s

and other hardware are working correctly. When the mouse is moved, the ball rolls. This
(ii) If the necessary hardware is detected and found movement of the ball is converted into signals
to be operating properly, the computer begins to and sent to the computer.
w

boot. (ii) Optical Mouse:

Long Answers 5 MARKS Measures the motion and acceleration of pointer.


w

It uses light source instead of ball to judge the


1. Explain any two input and output devices. motion of the pointer.Optical mouse has three
Ans. Input Devices : buttons. Optical mouse is less sensitive towards
w

surface.
(i) Scanner: Scanners are used to enter the
information directly into the computer’s memory. (iii) Laser Mouse:
This device works like a xerox machine. The Measures the motion and acceleration of pointer.
scanner converts any type of printed or written Laser Mouse uses Laser Light. Laser Mouse is
information including photographs into a digital highly sensitive and able to work on any hard
format, which can be manipulated by the computer. surface.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
18 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 1
3. Explain Impact Printers with an Example. Laser Printers :
Ans. Impact Printers :  (i) Laser printers mostly work with similar
(i) These printers print with striking of hammers or technology used by photocopiers.

n
pins on ribbon. These printers can print on multi- (ii) It makes a laser beam scan back and forth across

.i
part (using carbon papers) by using mechanical
a drum inside the printer, building up a pattern.

m
pressure.

al
It can produce very good quality of graphic
(ii) For example, Dot Matrix printers and Line
matrix printers are impact printers. images.

ad
(iii) A Dot matrix printer that prints using a fixed Inkjet Printers:

co
number of pins or wires. Each dot is produced (i) Inkjet Printers use colour cartridges which

k
by a tiny metal rod, also called a “wire” or
combined Magenta, Yellow and Cyan inks to

vi
“pin”, which works by the power of a tiny
create color tones.
electromagnet or solenoid, either directly or

s.
al
through a set of small levers. (ii) A black cartridge is also used for monochrome
(iv) It generally prints one line of text at a time. The output. Inkjet printers work by spraying ionised
.k
printing speed of these printers varies from 30 to ink at a sheet of paper.

ok
1550 CPS (Character Per Second). (iii) They use the technology of firing ink by heating
w
4. Explain Non-Impact printers with an examples. it so that it explodes towards the paper in
w

Ans. Non-Impact Printers :  bubbles or by using piezoelectricity in which


(i) These printers do not use striking mechanism tiny electric currents controlled by electronic
o
w

for printing. They use electrostatic or laser circuits are used inside the printer to spread ink
technology. in jet speed.
ab
(ii) Quality and speed of these printers are better (iv) An Inkjet printer can spread millions of dots of
than Impact printers. For example, Laser ink at the paper every single second.
printers and Inkjet printers are non-impact
printers.
ur


.s
w
w
w

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com

n
Chapter Number Systems

.i

m
al
ad
CHAPTER SNAPSHOT

co
k
Part I - Number Systems  2.7 Representing Characters in Memory
2.1 Number Systems - Introduction

vi
 2.7.1 Binary Coded Decimal (BCD)
 2.2 Data Representations 2.7.2 American Standard Code

s.
al
 2.3 Different Types of Number Systems for Information Interchange
2.3.1 Decimal Number System (ASCII)
.k
2.3.2 Binary Number System 2.7.3 Extended Binary Coded

ok
2.3.3 Octal Number System Decimal Interchange Code
w
2.3.4 Hexadecimal Number System (EBCDIC)
 2.4 Number System Conversions
w

2.7.4 Indian Standard Code for


2.4.1 Decimal to Binary Conversion
o Information Interchange (ISCII)
2.4.2 Decimal to Octal Conversion
w

2.7.5 Unicode
2.4.3 Decimal to Hexadecimal
Part II - Boolean Algebra
Conversion
ab
2.4.4 Conversion of fractional Decimal  2.8. Boolean Algebra - Introduction
to Binary 2.8.1 Binary valued quantities
2.4.5 Binary to Decimal Conversion 2.8.2 Logical Operations
2.4.6 Binary to Octal Conversion 2.8.3 Truth Table
ur

2.4.7. Binary to Hexadecimal 2.8.4 AND operator


Conversion
2.8.5 OR operator
2.4.8 Conversion of fractional Binary
to Decimal equivalent 2.8.6 NOT operator
.s

2.4.9. Octal to Decimal Conversion 2.8.7 NAND operator


2.4.10 Octal to Binary Conversion 2.8.8 NOR operator
2.4.11 Hexadecimal to Decimal
Conversion  2.9. Basic Logic Gates
w

2.4.12 Hexadecimal to Binary 2.9.1 AND Gate


Conversion
2.9.2 OR Gate
 2.5  Binary Representation for Signed
w

Numbers 2.9.3 NOT Gate


2.5.1 Signed Magnitude representation 2.9.4 NOR Gate
2.5.2 1’s Complement representation
2.9.5 Bubbled AND Gate
w

2.5.3 2’s Complement representation


2.9.6 NAND Gate
 2.6 Binary Arithmetic
2.9.7 Bubbled OR Gate
2.6.1 Binary Addition
2.9.8 XOR Gate
2.6.2 Binary Subtraction
2.9.9 XNOR Gate

[19]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
20 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 2

Evaluation
Section - A Section - B

n
Very Short Answers

.i
Choose the correct answer:

m
al
1. What is data?
1. Which refers to the number of bits processed by a
Ans. The term data comes from the word datum, which
computer’s CPU? [Mar-'24]

ad
means a raw fact. The data is a fact about people,
(a) Byte (b) Nibble

co
places or some objects.
(c) Word length (d) Bit

k
 [Ans. (c) Word length] 2. Write the 1’s complement procedure.

vi
2. How many bytes does 1 KiloByte contain?[Aug '22] Ans. Step 1: Convert given Decimal number into Binary
(a) 1000 (b) 8 Step 2: Check if the binary number contains 8 bits,

s.
[QY. '23]
(c) 4
al
(d) 1024[Ans. (d) 1024] if less add 0 at the left most bit, to make it
.k as 8 bits.
3. Expansion for ASCII [HY. '23]
Step 3: Invert all bits (i.e. Change 1 as 0 and 0 as 1).

ok
(a) American School Code for Information
w
Interchange 3. Convert (46)10 into Binary number. [Aug '22]
(b) American Standard Code for Information Ans.
w

Interchange
2 46
(c) All Standard Code for Information Interchange
o
w

(d) American Society Code for Information 2 23 – 0


Interchange 2 11 – 1
ab
[Ans. (b) 
American Standard Code for
Information Interchange] 2 5 –1
2 2 –1
4. 2^50 is referred as  [CRT '22]
(a) Kilo (b) Tera 2 1 –0
ur

(c) Peta (d) Zetta 4610 = (101110)2


 [Ans. (c) Peta]
4. We cannot find 1’s complement for (28)10. State
5. How many characters can be handled in Binary
reason.
.s

Coded Decimal System? [QY. 2019]


(a) 64 (b) 255 Ans. (28)10 is positive number. 1’s Complement represent
(c) 256 (d) 128 [Ans. (a) 64] signed numbers (Negative numbers) only. So, (28)10
w

6. For 11012 the equalent Hexadecimal equivalent cannot find 1’s complement.
is? [May ' 22]
(a) F (b) E 5. List the encoding systems that represents
w

(c) D (d) B [Ans. (c) D] characters in memory.  [FMT 2018; July-'23]


7. What is the 1’s complement of 00100110? Ans. (i) BCD – Binary Coded Decimal.
(a) 00100110 (b) 11011001 (ii) EBCDIC – Extended Binary Coded Decimal
w

(c) 11010001 (d) 00101001


Interchange Code.
 [Ans. (b) 11011001]
(iii) ASCII – American Standard Code for
8. Which amongst this is not an Octal number? Information Interchange.
 [Sep. 2020]
(iv) Unicode.
(a) 645 (b) 234 (c) 876 (d) 123
(v) ISCII - Indian Standard Code for Information
[Ans. (c) 876]
Interchange.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Number Systems 21

Section - C 4. Write short note on ISCII.


Ans. (i)  ISCII is the system of handling the character of
Short Answers Indian local languages. This as a 8-bit coding

n
1. What is radix of a number system? Give example. system.
 [Aug '22] (ii) Therefore it can handle 256 (28) characters.

.i
Ans. A numbering system is a way of representing This system is formulated by the department

m
al
numbers. Each number system is uniquely identified of Electronics in India in the year 1986-88
by its base value or radix. Radix or base is the count and recognized by Bureau of Indian Standards

ad
of number of digits in each number system. Radix or (BIS).

co
base is the general idea behind positional numbering (iii) Now this coding system is integrated with
system. Unicode.

k
Example : Add a) -2210+1510 b) 2010+2510

vi
5. [QY '23]
Binary Number System - Radix 2
Octal Number System - Radix 8

s.
Ans. (a) -2210+1510 

al
[Govt.MQP; HY. 2018]
Decimal Number System - Radix 10
Hexadecimal Number System - Radix 16.
.k 2 22 2 15

ok
2. Write note on binary number system. [July-'23] 2 11 – 0 2 7 –1
w
Ans. (i)  There are only two digits in the Binary system,
2 5 –1 2 3 –1
namely, 0 and 1. The numbers in the binary
w

system are represented to the base 2 and the 2 2 –1 2 1 –1


positional multipliers are the powers of 2.
1 –0
o
w

(ii) The left most bit in the binary number is called


as the Most Significant Bit (MSB) and it has the (1111)2 ⇒ (00001111)2
ab
largest positional weight.
(10110)2 ⇒ (00010110)2
(iii) The right most bit is the Least Significant Bit
(LSB) and has the smallest positional weight. 1's complement = 11101001
3. Convert (150)10 into Binary, then convert that 2's complement = 11101010
ur

Binary number to Octal.  [FMT 2018]


(- 22)10 + (15)10 = 11101001
Ans. 15010 = ?
= 00001111
2 150 11111001
.s

2 75 – 0 (b) 2010+2510
2 37 – 1 2 20 2 25
w

2 18 – 1 2 10 – 0 2 12 – 1
2 9 –0 2 5 –0 2 6 –0
2 4 –1
w

2 2 –1 2 3 –0
2 2 –0
1 – 0 1 –1
1 –0
w

= (10100)2 = (11001)2
15010 = (10010110)2
8 bit format of 2010 = 00010100
100101102 = ?
10 010 110 8 bit format of 2510 = 00011001
2010 + 2510 = 00101101
2 2 6
100101102 = 2268. 2010 + 2510 = 001011012

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
22 Sura’s  XI Std - Computer Science ➠ Unit I ➠ Chapter 2

Section - D 2. Find 1’s Complement and 2’s Complement for the


following Decimal number. a) -98 b) -135
Explain in detail  [CRT '22; QY.'23]
Ans. a) -98

n
1. a)   
Write the procedure to convert fractional
Decimal to Binary

.i
[CRT '22; Mar. '23] 2 98

m
b) Convert (98.46)10 to Binary 

al
2 49 – 0

 [FMT 2018 ; Sep.2020; Mar. '23]
2 24 – 1

ad
Ans. a)  he method of repeated multiplication by
T
2 has to be used to convert such kind of 2 12 – 0

co
decimal fractions. The steps involved in the 2 6 –0

k
method of repeated multiplication by 2: 2 3 –0

vi
Step 1: Multiply the decimal fraction by 2 and note 9810 = 1100010
1 –1
the integer part. The integer part is either

s.
al
0 or 1. 8 bit format of 9810 = 01100010
1's complement = 10011101
Step 2: D
 iscard the integer part of the previous
.k
Add 1 bit = +1
product. Multiply the fractional part of the

ok
2's complement = 10011110
w
previous product by 2. Repeat Step 1 until
the same fraction repeats or terminates (0). b) -135
w

Step 3:  The resulting integer part forms a sequence of 2 135


0s and 1s that become the binary equivalent 2 67 – 1
o
w

of decimal fraction.
2 33 – 1
Step 4: T
 he final answer is to be written from first
ab
2 16 – 1
integer part obtained till the last integer part
obtained. 2 8 –0

b) 98.4610 2 4 –0
1. Integer part 2 2 –0
ur

2 98 1 – 0 13510 = 10000111
1's complement = 01111000
2 49 – 0
Add 1 bit = +1
.s

2 24 – 1
2's complement = 01111001
2 12 – 0
3. a) Add 11010102+1011012  [Sep. 2020; July-'23]
2 6 –0
w

b) Subtract 11010112 – 1110102


2 3 –0
Ans. a)  11010102+1011012
1 –1
1101010
w

2. Fractional part
+101101
0.46 × 2 = 0.92 = 0
10010111
0.92 × 2 = 1.84 = 1
w

0.84 × 2 = 1.68 = 1 = 100101112


0.68 × 2 = 1.36 = 1 b) 11010112 – 1110102  [HY. 2018]

0.36 × 2 = 0.72 = 0 1101011


0.72 × 2 = 1.44 = 1 – 111010
98.4610 = (1100010.011101....)2 110001
= 1100012

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to C++ 151

23. Name the operators which is specific to C++. m = true


Ans. : : Scope access / resolution n = 26
(i) Dereference 33. What will be result stored in a after evaluating the

n
(ii) Dereference pointer to class member following expressions?

.i
24. Write a note on comment statement. int a = 4;

m
al
a + = (a++) + (++a) + a;
Ans. All statements that being with // are treated as
Ans. a = 20
comments. Comments are simply ignored by

ad
compilers. i.e., compiler does not execute any 34. What is the difference between '/' and '%'

co
statement that begins with a // operator?

k
25. What is meant by cascading of operator? Ans. (i) The '/' operator results in quotient when a

vi
number is divided by other number.
Ans. The multiple use of input and output operators
(ii) The'%' operator results in remainder when a
such as >> and <<in a single statement is known as

s.
al
number is divided by other number.
cascading of I/O operators.
35. What will be the output of the following code?
.k
26. What is the use of return statement?
int i = 6, j = 10;

ok
Ans. return is a keyword which is used to return the value
w
i+ = i++ - ++ j + i ;
what you specified to a function. Cout <<"i = " << i;
w

27. Name any tour familiar C++ compilers with IDE Cout << "j = " << j;
Ans. Dev C++, Eclipse, Net Beans, Code::blocks, Digital Ans. i = 7
o
w

Mars, Sky IDE, Code Lite j = 11


28. Name the kinds of literals used in C++. 36. What will be the result of following two expressions
ab
Ans. There are different kinds of literals used in C++ if i = 20 initially? a) ++i < = 20 (b) i++ < = 20
(Integer, Float, Character, String) Ans. (a) false (b) true

29. What are punctuators? 37. We have two variable A and B. Write C++
Ans. Punctuators are symbols, which are used as delimiters statements to calculate the result of division of B
ur

in constructing C++ programs. They are also called by A and calculate (a) Quotient of the division (b)
remainder of the division?
as "Separators"
Ans. (a) B/A (b) B%A
30. What do you mean by precedence of operators?
.s

38. Write the output of the following code.


Ans. The hierarchical order in which the operators are used
int i = 20;
for operation is known as precedence of operators. int n = i ++ % 5;
31. Differentiate unary and binary operators. Ans. i = 11
w

n=0
Ans. Unary operators Binary operators 39. What is the value of i of the following code
It performs operation It performs operation on executes?
w

on single operand two operands a) int i = 8; b) int i = 17


(eg) ++, -- (eg) +, -, * int n = i >>=2; i >>=1;
Ans. a) 2
w

32. What are the values of m and n when the following b) 8.


statements are executed?
40. Write a note on Dev C++.
int a = 53, b = 26
Ans. Dev C++ is an open source, cross platform (alpha
boolean m = (a>b) ? a:b;
version available for Linux), full featured Integrated
int (a<b) ? a: b; Development Environment (IDE) distributed GNU
Ans. The statement m = (a >b) ? a: b is wrong. It should be General Public Licence for programming in C and
m = (a > b) ? true : false ; then C++. It is writtern in Delphi.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
152 Sura’s  XI Std - Computer Science ➠ Unit III ➠ Chapter 9
41. Define <iostream.h>. 49. If m = 12, then find n = m++ * 5 + – – m;
Ans. iostream header file contains the definition of its Ans. n = m++ * 5 + – –m
member objects cin and cout. If not included iostream = 12 * 5 + 12

n
in your program, an error message will occur on cin
and cout; and we will not be able to get any input or = 60 + 12 = 72

.i
send any output. 50. If a = 4, b = 3; find the value of

m
al
42. What is the purpose of using preprocess statement c=a++ *6 + ++b*5+10;
in C++? Ans. c = a++ *6 + ++b*5+10

ad
Ans. The C++ programs being with include statements
= 4 * 6 + 4×5 + 10

co
starting with a # (hash / pound). The symbol # is a
directive for the preprocessor. That means, these = 24+20+10 = 54

k
statements are processed before the compilation 51. If a= 12, b=8, find the value of

vi
process begins.
a * = ++a/6 + b ++%3;
43. Write a note on size of () operators.

s.
al
Ans. a* = ++ a/6+ b++ %3;
Ans. It is called as compile time operator. It returns the
= a* (++a/6 + b++%3) = 12*(13/6 + 8% 3)
length of a variable in bytes.
.k
= 12 * (2+2) = 48

ok
44. Write a note on bitwise one's compliment
w
operator? 52. Indicate whether the following statements result
Ans. The bitwise One's compliment operator ~ (Tilde), in True or False?
w

inverts all the bits in a binary pattern, that is, all (i) 5+3 > 7 && 7> = 4+3
1's become 0 and all 0's become 1. This is an unary (ii) 3= = 4 && 5 = = 5
o
w

operator.
(iii) 3 > 0 ¦ ¦ 0 < – 14
45. What is the use of relational operator? Ans. (i) True (ii) false (iii) True
ab
Ans. Relational operators are used to determine the
53. What do you mean by precedence of operators?
relationship between its operands. When the
Ans. The hierarchical order in which the operators are used
relational operators are applied to two operands, the
for operation is known as precedence of operator.
result will be a Boolean value. 1 or 0 represents True
ur

or False respectively. 54. Why do you want to declare an identifier as int


datatype?
46. Write a note on ++ and -- operator?
Ans. Integer data type accepts and returns only integer
Ans. ++ (Plus, Plus) Increment Operator. – –(Minus,
numbers. If a variable is declared as an int, C++
Minus) Decrement operator. An increment or
.s

compiler allows storing only integer values into it.


decrement operator acts upon a single operand and
returns a new value. Thus, these operators are unary 55. Write the use of declaring in identifier as float?
operators. The increment operator adds 1 to its Ans. Float data type is used to produce more accurate
w

operand and the decrement operator subtracts 1 from results. Floating point numbers can also be written in
its operand. exponent notation.

47. What is meant by non-graphical characters? 56. What is use of double data type?
w

Ans. Non-printable characters are also called as non- Ans. The double is also used for handling floating point
graphical characters. Non-printable characters are numbers. But, this type occupies double the space
those characters that cannot be typed directly from a than float type. This means, more fractions can be
w

keyboard during the execution of a program in C++. accommodated in double than in float type. The
double is larger and slower than type of float.
48. If a= 58, find a = a++ + ++a;
57. Name the Modifiers you can use with Integer data
a = a++ + ++a type?
Ans. a = 58 + 60 = 118 Ans. short, unsigned short, signed short, int, unsigned int,
signed int, long, unsigned long

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Introduction to C++ 153

58. How will you declare more than one variable in a 65. Name the classification of datatypes in C++.
single statement? write the syntax example. Ans. In C++, the data types are classified as three main
Ans. Declaration of more than one variable: More than one categories (1) Fundamental data types (2) User-

n
variable of the same type can be declared as a single defined data types and (3) Derived data types.
statement using a comma separating the individual

.i
variables. 66. What is datatypes?

m
al
Syntax : <data type> <var1>, <var2>,<var3>.....<var_n>; Ans. A datatype is a classification of the type of data that a
Example : int num1, num2, sum; variable can hold in computer programming

ad
59. What is known as Access Modifier? 67. Write the advantages of using float datatype?

co
Ans. keyword modifiers / restricts the accessibility of a Ans. There are two advantages of using float data types.

k
variable. So, it is known as Access modifier. (1) They can represent values between the integers

vi
60. Write the Syntax of declaring reference variable. (2) They can represent a much greater range of
Ans. Syntax:

s.
values.

al
<type><&reference_variable> = <original_variable>
68. Write the disadvantages of using float datatype.
.k
61. What are the types of casting show in by the Ans. Floating point operations are slower than integer

ok
following examples? operations. This is a disadvantage of floating point
w
a. double x = 72.5; numbers.
in+y=(int)x;
w

69. Write a note on void datatype.


b. int x =24;
Ans. The literal meaning for void is 'empty space'. Here,
long y = 3;
o
w

Ans. a : Explicit type casting


in C++, the void data type specifiers an empty set of
b : Implicit type casting values. It is used as a return type of functions that do
ab
not return any value.
62. State one difference between floating point literal
and double type literal. 70. What is the reason of declaring variables?
Ans. Floating point literal is a fractional number with Ans. The most important reasons for declaring a variable
ur

sort precision and can range the values from – 3.4 as a particular data type is to allocate appropriate
E+38 to 3.4E+38, where as double type literal is space in memory. As per the stored program concept,
used for dons precisions and can range the values for every data should be accommodated in the main
memory before they are processed. So, C++ compiler
.s

–1.7E+308 to 1.7E+308
allocates specific memory space for each and every
63. State the values of n and ch?
data handled according to the compiler's standards.
char c= 'B';
71. What is the use of modifier?
w

int n = c+1;
Ans. Modifiers are used to modify the storing capacity of
char ch = (char)n;
a fundamental data type except void type. Modifiers
value of
w

can be used to modify (expand or reduce) the memory


Ans. (i) n = 67 (ii) ch = c allocation of any fundamental data type. They are
64. What are fundamental datatypes? Write there also called as Qualifiers.
w

types. 72. Name the four modifiers used in C++.


Ans. Fundamental (atomic) data types are predefined data Ans. There are four modifiers used in C++. They are:
types available with C++. There are five fundamental (1) signed (2) unsigned
data type in C++: char, int, float, double and void. (3) long (4) short
Actually, these are the keywords for defining the data
types.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
154 Sura’s  XI Std - Computer Science ➠ Unit III ➠ Chapter 9
73. What is the use of suffixes for integer and floating 80. What is use of Manipulators?
point numbers? Ans. Manipulators are usd to format the output of any C++
Ans. There are different suffixes for integer and floating program. Manipulators are functions specifically

n
designed to use with the insertion (<<) and extraction
point numbers. Suffix can be used to assign the same

.i
operators.
value as a different type. For example, to store 45 in

m
al
81. Name the commonly used manipulators in C++
an int, long, unsigned int and unsigned long int, use
Ans. The Commonly used manipulators are: endl, setw,
suffix letter L or U (eigther case) with 45 i.e. 45L or

ad
setfill, setprecision and setf.
45U. This type of declaration instructs the compiler

co
to store the given values as long and unsigned. 82. Write the members of iomanip.h.

k
Ans. setw, setfill, setprecision and setf manipulators are
74. What are the two values associated with a

vi
members of iomanip header life.
symbolic variable?
83. Write a note on endl

s.
al
Ans. There are two values associated with a symbolic
Ans. endl is used as a line feeder in C++. It can be used
variable; they are R-value and L-value.
as an alternate to'\n', in other words, endl inserts a
.k
R-value is data stored in a memory location new line and then makes the cursor to point to the

ok
L-value is the memory address in which the
w
beginning of the next line.
R-value is stored.
84. Differentiate endl and '\n'.
w

75. Define variable. o Ans. (i) endl - Inserts a new line and flushes the buffer
Ans. Variables are used-defined names assigned to specific (Flush means - clean).
w

memory location in which the values are stored. (ii) '\n'- Inserts only a new line.
ab
76. What is meant by Declaration? 85. Write a note on setfill() manipulator.
Ans. setfill ( ) : This manipulator is usually used after
Ans. Declaration is a process to instruct the compiler to
setw. If the presented value does not entirely fill the
allocate memory as per the type that is specified
given width, then the specified character in the setfill
along with the variable name.
ur

argument is used for filling the empty fields.


77. What is meant by junk or garbage values? 86. Write a note on setprecision() manipulator.
Ans. Declaring a variable without any initial value, Ans. (i) setprecision ( ) : This is used to display numbers
the memory space allotted to that variable will be with fractions in specific number of digits.
.s

occupied with some unknown value. These unknown (ii) Syntax : setprecision (number of digits);
values are called as "Junk" or "Garbage" values. setprecision can also be used to set the number
w

78. What is Initialization? Give example. of decimal places to be displayed. In order


to do this task, to set an ios flag within setf()
Ans. Assigning an initial value to a variable while that
manipulator. This may be used in two forms:
variable is declared is called as "Initialization"
(i) fixed and (ii) scientific.
w

Examples:
87. What is an expression?
int num = 100;
float pi = 3.14; Ans. An expression is a combination of operators,
w

constants and variables arranged as per the rules of


double price = 231.45;
C++. It may also include function calls which return
79. What is Dynamic Initialization? Give Example. values.
Ans. A variable can be initialized during the execution of 88. What is pointer variable?
a program. It is known as "Dynamic initialization"/ Ans. A Pointer is a variable that holds a memory address.
int sum = num1+num2 Pointer is a variable are declared using (*) smbol.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Classes and Objects 249

18. How the instantiating object is done in C++? 27. Write a note on destructor.
Ans. Instantiating object is done using constructor. Ans. When a class object goes out of scope, a special
19. Why the structure or an array initilization not function called the destructor gets executed. The

n
possible at the time of declaration? destructor has the same name as the class tag but

.i
Ans. The initialization of class type object at the time prefixed with a ~(tilde). Destructor function also

m
return nothing and it does not associated with anydata

al
of declaration similar to a structure or an array is
not possible because the class members have their type.

ad
associated access specifiers (private or protected or 28. What the constructor and Destructor gets executed?
public).

co
20. What is default constructor? Give example. Ans. When an instance of a class comes into scope, a

k
Ans. A constructor that accepts no parameter is called special function called the constructor gets executed.

vi
default constructor. For example in the class data, When an instance of a class comes into scope, a
Data :: Data() is the default constructor. special function called the constructor gets executed.

s.
21. How the default constructor is generated?
al
Ans. If a class does not contain an explicit constructor
Short Answers 3 MARKS
.k
(user defined constructor) the compiler automatically 1. Differentiate implicit call and explicit call of

ok
generate a default constructor implicitly as an inline involving parameterized constructor.
w
public member. Ans. Implicit call : In this method, the parameterized
w

22. Write a note on parameterized constructor. constructor is invoked automatically whenever an


Ans. A constructor which can take arguments is called object is created. For example simple s1(10,20);
o
w

parameterized constructor. This type of constructor in this for creating the object s1 parameterized
helps to create objects with different initial values. constructor is automatically invoked.
ab
This is achieved by passing parameters to the
function. Explicit call : In this method, the name of the
constructor is explicitly given to invoke the
23. What are the two ways of using parameterized
constructor? parameterized constructor so that the object can be
created and initialized
Ans. There are two ways to create an object using
ur

parameterized constructor For example : simple s1=simple(10,20); //explicit call.


‰‰Implicit call
2. What is copy constructor?
‰‰Explicit call
Ans. A constructor having a reference to an already existing
.s

24. Why are the most suitable method of involving


object of its own class is called copy constructor. It
parameterized constructor? Give reason.
is usually of the form Data (Data&), where Data is
Ans. Explicit call method is the most suitable method as
the class name.
w

it creates a temporary object, the chance of data loss


will not arise. A temporary object lives in memory as 3. What is inline and outline member function?
long as it is being used in an expression. After this it
Ans. Inside the class definition : When a member
get destroyed.
w

function is defined inside a class, it behaves like


25. What is the purpose of using destructor?
inline functions. These are called Inline member
Ans. A destructor is a special member function that
functions.
is called when the lifetime of an object ends and
w

destroys the object constructed by the constructor. Outside the class definition : When Member
Normally declared under public. function defined outside the class just like normal
26. How a C++ class supports data hiding? function definition (Function definitions you are
familiar with) then it is be called as outline member
Ans. A class supports Data hiding by hiding the information
from the outside world through private and protected function or non-inline member function.
members.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
250 Sura’s  XI Std - Computer Science ➠ Unit IV ➠ Chapter 14
4. Write a short note on memory allocation of 3. Write the output of the following program.
objects. #include<iostream>
Ans. The member functions are created and placed in using namespace std;

n
the memory space only when they are defined class simple

.i
as a part of the class specification. Since all the {

m
objects belonging to that class use the same member

al
private:
function, no separate space is allocated for member
int a,b;
functions when the objects are created. Memory

ad
public:
space required for the member variable are only

co
allocated separately for each object because the simple(int m, int n)

k
member variables will hold different data values for {
a=m;

vi
different objects.
b=n;

s.
al
Long Answers 5 MARKS cout<<"\nParameterized Constructor of class-
simple"<<endl;
.k
1. Explain the types of access specifiers used in C++. }

ok
Ans. (i) The Public Members : A public member is void putdata()
w
accessible from anywhere outside the class but {
within a program. You can set and get the value cout<<"\nThe two integers are..."<<a<<"\
w

of public data members even without using any


o t'<<b<<endl;
member function.
w

cout<<"\nThe sum of the variables "<< a << " + "


(ii) The Private Members : A private member <<b<<"="<<a+b;
cannot be accessed from outside the class. Only
ab
}
the class member functions can access private };
members. By default all the members of a class int main()
would be private.
{
(iii) The Protected Members : A protected
ur

simple s1(10,20),s2(30,45);//Created two objects


member is very similar to a private member but  with different values created
it provides one additional benefit that they can
cout<<"\n\t\tObject 1\n";
be accessed in child classes which are called
s1.putdata();
derived classes (inherited classes).
.s

cout<<"\n\t\tObject 2\n";
2. Explain the different methods of creating an
s2.putdat();
object in C++
return 0;
w

Ans. Objects can be created in two methods : Global }


object, Local object Ans. Output:
(i) Global Object : If an object is declared outside Parameterized Constructor of class-simple
w

all the function bodies or by placing their names


Parameterized Constructor of class-simple
immediately after the closing brace of the class
Object 1
declaration then it is called as Global object.
The two integers are..10 20
w

These objects can be used by any function in


the program. The sum of the variables 10 + 20 = 30
(ii) Local Object : If an object is declared with Object 2
in a function then it is called local object. It The two integers are..30 45
cannot be accessed from outside the function. The sum of the variables 30 + 45 = 75

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Classes and Objects 251

4. Write the output of the following program. 5. Write the output of the following program.
#include<iostream> #include<iostream>
using namespace std; using namespace std;

n
class simple class simple

.i
{ {

m
al
private: private:
int a,b; int a,b;

ad
public: public:

co
simple(int m, int n=100) //default argument simple() //default constructor

k
{ {
a=m; a=0;

vi
b=n; b=0;

s.
al
cout<<"\n Parameterized Constructor with default cout<<"\n default constructor"<<endl;
argument"<<endl; }
.k
} int getdata();

ok
void putdata() };
w
{ int simple :: getdata()
 cout<<"\nThe two integers are......"<<a<<'\ { int tot;
w

t'<<b<<endl; cout<<"\nEnter two values";


cin>>a>>b;
o
w

cout<<"\nThe sum of the variables"<<a<<"


 +"<<b<<" = "<<a+b; tot=a+b;
return tot;
ab
}
}
};
int sum=0;
int main()
simple s1[3];
{
cout<<"\n\t\tObject 1 with both values \n";
ur

simple s1(10,20), s2(50);


for(int i=0;i<3;i++)
cout<<"\n\t\tObject 1 with both values \n";
sum+=s1[i].getdata();
 s1.putdata();
cout<<"\nsum of all object value is"<<sum;
cout<<"\n\t\tObject 2 with both values \n";
.s

return 0;
 s2.putdata();
}
return 0;
Ans. Output:
}
w

default constructor
Ans. Output:
default constructor
Parameterized Constructor with default argument
default constructor
Parameterized Constructor with default argument
w

Object 1 with both values


Object 1 with both values
Enter two values 10 20
The two integers are...10 20
Enter two values 30 40
The sum of the variables 10 + 20 = 30
w

Enter two values 50 50


Object 2 with one value and one default value sum of all object values is 200
The two integers are...50 100
The sum of the variables 50 + 100 = 150


enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com

15

n
Chapter Polymorphism

.i

m
al
CHAPTER SNAPSHOT

ad

co
 15.1. Introduction

k
 15.2. Function overloading

vi
15.2.1. Need for function overloading

s.

 15.3. al
15.2.2. Rules for function overloading
Constructor overloading
.k

ok
 15.4. Operator overloading
w
15.4.1. Restrictions on operator overloading
w

Evaluation
o
w

ab
Section - A (a) dispchar(); (b) dispchar(ch,size);
Choose the Correct Answer (c) dispchar($,10); (d) dispchar('$',10times);

1. Which of the following refers to a function having  [Ans. (c) dispchar($,10);]


more than one distinct meaning? [Sep. 2021] 4. Which of the following is not true with respect to
ur

(a) Function Overloading function overloading? [Mar. '23]


(b) Member overloading (a) The overloaded functions must differ in their
(c) Operator overloading
(d) Operations overloading signature
.s

 [Ans. (a) Function Overloading] (b) The return type is also considered for overloading
2. Which of the following reduces the number of a function.
comparisons in a program? (c) The default arguments of overloaded functions
w

(a) Operator overloading


(b) Operations overloading are not considered for Overloading
(c) Function Overloading (d) Destructor function cannot be overloaded
(d) Member overloading  [Ans. (b) The return type is also considered for
w

 [Ans. (c) Function Overloading]  overloading a function.]


3. void dispchar(char ch='$';int size=10) [June 2019] 5. Which of the following is invalid prototype for
{ [HY. '23] function overloading  [HY. 2018]
w

for(int i=1;i<=size;i++) (a) void fun (intx); (b) void fun (intx);
cout<<ch; void fun (char ch); void fun (inty);
} (c) void fun (double d); (d) void fun (double d);
How will you invoke the function dispchar()
void fun (char ch); void fun (inty);
for the following input?
 [Ans. (b) void fun (intx);
To print $ for 10 times  void fun (inty);]
[252]
enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Inheritance 273

A B Codes:
(i) (ii) (iii) (iv)
27. (a) 2 1 4 3

n
(b) 1 3 2 4

.i
C (c) 4 3 1 2

m
al
 The order of inheritance by derived class to inherit (d) 3 4 1 2
 [Ans. (a) (i)-2, (ii)-1, (iii)-4, (iv)-3]

ad
the base in the above diagram
2. Match the following.

co
(a) left to right (b) right to left
(c) bottom to top (d) top to bottom (i) A - (1) Multilevel

k
 [Ans. (a) left to right] Inheritance

vi
28. The private members of base class can be accessed B

s.
al
indirectly by the derived class by using base class
public or protected. A
.k
(a) data members (b) access specifiers (ii) - (2) Hierarchical

ok
(c) member functions (d) visibility mode B Inheritance
w
 [Ans. (c) member functions]
C
w

29. If a base class is inherited in protected access


mode then which among the following is true? A B
o
w

(a) Public and protected members of base class (iii) - (3) Single Inheritance
becomes protected members of derived class
C
ab
(b) Only protected members become protected
members of derived class.
(c) Private protected and public all members of base A
case become private of derived class
(iv) - (4) Multiple Inheritance
ur

(d) Only private members of base, become private


of derived class. B C D
[Ans. (a) Public and protected members of base Codes:
 class becomes protected members (i) (ii) (iii) (iv)
.s

 of derived class] (a) 2 1 4 3


II. Match List I with List II and Select the (b) 1 3 2 4
Correct Answer using the Codes given
w

(c) 4 3 1 2
below. (d) 3 1 4 2
 [Ans. (d) (i)-3, (ii)-1, (iii)-4, (iv)-2]
1.
w

List I List II
(i) Multiple 1 A derived class III. Choose the Correct Option and Fill in
Inheritance become a base class the Blanks.
w

(ii) Multilevel 2 O
 ne derived class
Inheritance many base class 1. A class that is used to derive another class is called
............... .
(iii) Hierarchical 3 O
 ne derived class one
Inheritance base class (a) sub class (b) super class
(iv) Hybrid 4 M
 any derived class (c) nested class (d) derived class
Inheritance one base class  [Ans. (b) super class]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
274 Sura’s  XI Std - Computer Science ➠ Unit IV ➠ Chapter 16
2. A class that inherits from a super class is called 11. In multiple inheritance the level of inheritance is
............... . extended upto .............. .
(a) sub class (b) nested class (a) 2 (b) 3

n
(c) super class (d) base class (c) 5 (d) many
 [Ans. (d) many]

.i
 [Ans. (a) sub class]

m
12. Grandfather - father - child relationship is an

al
3. When more than one derived clauses are created
from a single base class called ............... . example of .................... .
(a) Multiple Inheritance

ad
(a) Multiple (b) Multilevel
(b) Hierarchical Inheritance

co
(c) Hybrid (d) Hierarchical (c) Multilevel Inheritance
 [Ans. (d) Hierarchical]

k
(d) Hybrid Inheritance
4. When a derived class inherits from multiple base

vi
 [Ans. (c) Multilevel Inhertance]
classes is known as ............... . 13. The size of the class without any declaration will

s.
al
(a) Multilevel (b) Multiple occupy ................... .
(c) Hierarchical (d) Hybrid (a) 0 byte (b) 1 byte
.k
 [Ans. (b) Multiple] (c) 4 bytes (d) 8 bytes [Ans. (b) 1 byte]

ok
5. When a class derived from a class which it self is
w
14. The accessibility of base class by the derived class
a derived class is called ............... .
is controlled by .......................... .
w

(a) Multiple (b) Hierarchical (a) access specifiers (b) visibility modes
(c) hybrid (d) None of these (c) data members
o
w

 [Ans. (d) None of these]


(d) member functions [Ans. (b) visibility modes]
6. The combination of more than one type of
ab
15. When classes are inherited with all the visibility
inheritance is called ............... .
modes but derived class cannot access the
(a) Hybrid inheritance ............... .
(b) Network inheritance (a) private members (b) protected members
(c) Hierarchical inheritance (c) public members (d) both a and b
ur

(d) Distributed inheritance  [Ans. (a) private members]


 [Ans. (a) Hybrid inheritance]
16. The derived class may inherit the properties of
7. The symbol used to define a derived class is
the base class based on its ...............
............... .
.s

(a) access specifier (b) visibility mode


(a) ; (b) : : (c) members (d) function
(c) : (d) , [Ans. (c) :]  [Ans. (b) visibility mode]
8. The name of base classes separated by ............... .
w

(a) ; (b) : : 17. Which of the following class destructor expires


(c) : (d) , [Ans. (d) ,)] first ............... .
9. The default visibility mode is ............... . (i) base class (ii) derived class
w

(a) public (b) private (a) only (i) (b) only (ii)
(c) protected (d) class (c) both (i) and (ii) (d) none of these
 [Ans. (b) private]  [Ans. (b) only (ii)]
w

10. Which members of the base class will be acquired 18. The base class constructor can called by derived
class? In which of the following definition .......... .
by the derived class is known by ................ .
(a) Base class name : base class constructor( ) ;
(a) inheritance (b) Base class name : : base class constructor ( ) ;
(b) scope resolution operator (c) Base class name ; base class constructor ( );
(c) derived class members (d) Base class name ! base class consctor ( );
(d) visibility modes [Ans. (d) visibility modes] [Ans. (b) Base class name : : base class constructor ( ) ;]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Inheritance 275

19. The size of derived class object = ............... . 26. Answer the following table
(i) Size of all base class data members.
if base And a Base Then, the
(ii) Size of all derived class data members. class access class member derived class

n
(a) only (ii) (b) (i) * (ii) specifier is is member
(c) (i) + (ii) (d) (i) - (ii) access is

.i
 [Ans. (c) (i) + (ii)] (i) Private no acess

m
al
20. A member function all another member function (ii) Public
without using ...................... .

ad
Protected (iii)
(i) dot operator

co
(ii) object (a) (i) Protected, (ii) Private, (iii) Public

k
(a) only (i) (b) only (ii) (b) (i) Public, (ii) Public, (iii) Protected
(c) both (i) and (iii) (d) neither (i) none (ii)

vi
(c) (i) Public, (ii) Public, (iii) Public
 [Ans. (c) both (i) and (iii)]

s.
(d) (i) Public, (ii) Protected, (iii) Public

al
21. Shadowing functions resolved using ............... .
(a) dot operator  [Ans. (b) (i) Public, (ii) Public (iii) Protected]
.k
(b) scope resolution operator 27. Answer the following table

ok
(c) membership operator (d) comma operator
w
 [Ans. (b) scope resolution operator] if base And a Base Then, the
class access class member derived class
22. The derived class member functions have the
w

specifier is is member
same of the base class member functions is called access is
............... .
o
w

Protected (i) No acess


(a) overloading (b) data hiding
(c) data binding (ii) Protected
ab
(d) over riding [Ans. (d) over riding] Protected (iii)
23. Overriding of the members are resolved by using
......................... . (a) (i) Private, (ii) Public, (iii) Protected
(a) . (b) ; (b) (i) Private, (ii) Public, (iii) Public
(c) : : (d) this
(c) (i) Protected, (ii) Public, (iii) Protected
ur

 [Ans. (c) : :]
24. If single inheritance is used, program will contain (d) (i) Private, (ii) Public, (iii) Private
(a) Atleast - 2 classes  [Ans. (a) (i) Private, (ii) Public, (iii) Protected]
(b) At most 2 classes
.s

28. When an object of the derived class is created, the


(c) Exactly 2 classess
compiler first call to the ............. .
(d) Atmost 4 classess [Ans. (a) Atleast - 2 classes]
(a) base class destructor
w

25. Answer the following table


(b) base class members functions
if base And a Base Then, the (c) base class constructor
class access class member derived class
specifier is is member (d) base class data members
w

access is (e) derived class constructor


Private Private (i)  [Ans. (c) base class constructor]
(ii) Private
w

29. This pointer returns


Protected (iii) (a) NLCC
(a) (i) no access, (ii) Private, (iii) Public (b) Object that is accessing the function
(b) (i) no access, (ii) Private, (iii) Private
(c) Address of current variable
(c) (i) no access, (ii) Public, (iii) Private
(d) (i) no access, (ii) Public, (iii) Public (d) Address of overriding operator
 [Ans. (c) (i) no access, (ii) Public (iii) Private]  [Ans. (b) Object that is accessing the function]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
276 Sura’s  XI Std - Computer Science ➠ Unit IV ➠ Chapter 16

IV. Consider the Following Statement. 4. How many bytes will occupy by the class without
any declaration?
1. Assertion(A) : Animals is called the base class,
and Mammals and Birds are called Ans. A class without any declaration will have 1 byte size.

n
derived classes. class x{}; X occupies 1 byte.

.i
Reason(R) :  The derived classes are power 5. Fill the following table

m
al
packed, as they include the Base class Type of Inheritance
functionality of the base class along member access

ad
with their own unique features. specifier Private Protected Public
This process ofacquiring the Base Public Private (ii) Public

co
class properties is what is called (i) Private Protected (iv)

k
inheritance. Private Private (iii) Private

vi
(a) Both (A) and (R) are true and (R) explains (A)
Ans. (i) Protected (ii) Protected
(b) Both (A) and (R) are true and (R) does not
(iii) Private (iv) Protected.

s.
al
explains (A)
(c) (A) is true, but (R) is false. 6. How the size of derived class object is calculated?
.k
(d) (A) is false, but (R) is true. Ans. Size of derived class object=size of all base class data

ok
members + size of all data members in derived class.
 [Ans. (a) Both (A) and (R) are true and (R)
w
 explains (A)] 7. What is this pointer? When it is useful?
Ans. 'this' pointer is a constant pointer that holds the memory
Very Short Answers
w

2 MARKS
address of the current object. .It identifies the currently
1. List the types of inheritance. calling object. It is useful when the argument variable
o
w

Ans. (i) Single Inheritance name in the member function and the data member
(ii) Multiple Inheritance name are same. To identify the datamember it will be
ab
given as this->data member name.
(iii) Multilevel Inheritance
(iv) Hierarchical Inheritance 8. When the constructor of base class will
(v) Hybrid Inheritance automatically invoked?
Ans. Constructors and destructors of the base class are not
2. Write the types of Inheritance for the following inherited but during the creation of an object for derived
ur

statement. class the constructors of base class will automatically


(i) When a derived class inherits from many invoked.
base classes. 9. Write the main advantages of Inheritance (or)
(ii) When more than one derived classes are created Why was the concept of inheritance introduced in
.s

from a single base class. objected oriented language?


(iii) Multilevel + Multiple Inheritance Ans. The main advantage of inheritance is
(iv) The transitive nature of Inheritance (i) It represents real world relationships well
w

(v) Class student {public : int roll no;}; (ii) It provides reusability of code
(iii) It supports transitivity.
Class dstudent : public student {public : int
10. If a base class and a derived class each include
marks}; is an example of
a member function with the same name and
w

Ans. (i) Multiple Inheritance arguments, which member function will be called
(ii) Hierarchical Inheritance by the object of the derived class if the scope
(iii) Hybrid Inheritance resolution operator is not used?
w

(iv) Single Inheritance. Ans. The member function of derived class will be called if
the scope resolution is not used.
3. Write the syntax of creating derived class. 11. Can private members of the base class be accessed
Ans. class derived_class_name :visibility_mode base_ by the derived class? If yes, how?
class_name Ans. Yes. It can be indirectly accessed by the derived class
{ using the public or protected member function of the
// members of derived class base class since they have the access privilege for the
}; private members of the base class.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Inheritance 277

12. Differentiate containership and Inheritance. 4. Can a derived class get access privilege for a
Ans. Containership Inheritance private member of the base class? If yes, how?
Sol: A derived class does not get direct access privilege for
When a class contains Inheritance lets you

n
a private member of its base class, however, it always
objects of another class create or define a
can access(indirectly) the private members of its base

.i
as its members, this specialized instance of
a class that shares the class through an inherited function that is accessing these

m
kind of relationship is

al
properties of the class members.
called containership. and at the same time
adds new feature on it. Long Answers 5 MARKS

ad
1. Write the output of the following program.

co
Short Answers 3 MARKS
#include <iostream>

k
1. Why do you need for inheritance? using namespace std;
Ans. (i) Inheritance is an important feature of object

vi
class Container {
oriented programming used for code reusability. public:
It is a process of creating new classes called

s.
al
// Constructor definition
derived classes, from the existing or base Container(double l = 2.0, double b = 2.0, double
classes.
.k h= 2.0) {
(ii) Inheritance allows us to inherit all the code
cout<<"Constructor called." << endl;

ok
(except declared as private) of one class to
length = l;
w
another class. The class to be inherited is called
base class or parent class and the class which breadth = b;
height = h;
w

inherits the other class is called derived class or


child class. }
double Volume() {
o
w

(iii) The derived class is a power packed class, as it return length * breadth * height;
can add additional attributes and methods and }
ab
thus enhance its functionality. int compare(Container container)
{
2. Explain the uses of private, protected and public
return this->Volume() >Container.Volume();
inheritance.
}
Ans. (i) Private inheritance should be used when you
private:
ur

want the features of the base class to be available


double length; // Length of a Container
to the derived class but not to the classes that are
double breadth; // Breadth of a Container
derived from the derived class.
double height; // Height of a Container
(ii) Protected inheritance should be used when
};
features of base class to be available only to the
.s

derived class members but not to the outside int main(void) {


world.  Container Container1(3.3, 1.2, 1.5); // Declare
Container1
(iii) Public inheritance can be used when features
 Container Container2(8.5, 6.0, 2.0); // Declare
w

of base class to be available the derived class


members and also to the outside world. Container2
if(Container1.compare(Container2)) {
3. In what situation shadowing base class function cout << "Container2 is smaller than Container1"
inderived class arises? How will you resolve the
w

<<endl;
situation?
} else {
Ans. In case of inheritance there are situations where the cout << "Container2 is equal to or larger than
member function of the base class and derived classes  Container1" <<endl;
w

have the same name. If the derived class object calls }


the overloaded member function it leads confusion to
return 0;
the compiler as to which function is to be invoked. The
}
derived class member function have higher priority
Ans. Output:
than the base class member function. This shadows the
member function of the base class which has the same Constructor called.
name like the member function of the derived class. The Constructor called.
scope resolution operator resolves this problem. Container2 is equal to or larger than Container1

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
278 Sura’s  XI Std - Computer Science ➠ Unit IV ➠ Chapter 16
2. Write the output of the following program. Ans. Output :
# include <iostream> My profession is : Teacher
class person My age is : 24

n
{ I can walk
Public : I can talk

.i
string profession; I can teach Maths.

m
al
int age; My profession is : football
 Person( ) : Profession ("unemployed"), My age is 21

ad
age (16) {} I can walk.
void display ( )

co
I can talk.
{ I can play football.

k
 cout-<<"My profession is :
3. Consider the following and answer the questions

vi
"<<profession<<enal;
cout-<< "My age is : "<< age<<end1; given below:
class MNC

s.
al
walk ( );
talk ( ); {
} char Cname[25] ; //Company name
.k
void walk( ) protected :

ok
{ cout<< "I can walk" <<end1; char Hoffice[25]; // Head office
w
} public :
void talk ( ) MNC( ) ;
w

{cout-<< "I can talk" <<end1; char Country [25];


} void EnterData ( ) ;
o
w

}; void DisplayData ( ) ;
Class Teacher : Public Person };
ab
{ class Branch : public MNC
Public : }
void teachmaths ( ) long NOE [Number of employees
{cout-<< "I can teach Maths" <<end; \\country char Ctry [25];
} protected :
ur

}; void Association ( ) ;
Class Player : Public Person public :
{ Branch ( ) ;
Public : void add ( ) ;
.s

void play football ( ) void Show ( ) ;


{ cout-<< "I can play football" <<end1; };
} class Outlet : public Branch
w

int main ( ) char State [25];


{ public :
Teacher t1; Outlet ( ) ;
void Enter ( ) ;
w

t1.profession = "Teacher"
t1. age = 24 ; void Output ( ) ;
t1. display ( ) ; };
t1. teachmaths( ); (i) Which class constructor will be called first at
w

Player f1; the time of declaration of an object Outlet?


f1. profession -= "footballer" (ii) How many types of on object belonging to
f1. age = 21 class output require?
f1. display ( ) ; (iii) 
Name the number functional which are
f1. play football ( ) ; accessed from the objects of class Outlet.
return 0; (iv) 
Name the data numerical, which are
} accessible from the object(s) of class Outlet.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Inheritance 279

Ans. (i) First of all constructor of class MNC will be (i)  Mention the member names which are
called then of Branch and then at last of Outlet. accessible by MyPrinter declared in main( )
(ii) 129 function.

n
(iii) MNC : EnterData( ); MNC : : DisplayData (), (ii) What is the size of Myprinter in bytes?
(iii) Mention the names of functions accessible

.i
Branch : : Add() Branch : : show () Outlet Enter ().
from the member function Read_pri-details

m
Outlet : : Output ( ).

al
( ) of class printer.
(iv) MNC : Country.
Ans. (a)  Multiple Inheritance: It is the inheritance

ad
4.(a) Define Multilevel and Multiple inheritance hierarchy wherein one derived class inherits from

co
in context of object Oriented Programming multiple base class(es).
Code suitable example to illustrate the same.  Multilevel Inheritance: It is the inheritance

k
(b) Answer the questions (i) to (iii) based on the hierarchy wherein a sub class acts as a base class

vi
following code : for other classes.
 Example of Multiple Inheritance : Class

s.
al
class stationery
{ GL(Group Leader) inherits from classes Employee
and Leader.
.k
char Type ;

ok
char manufacturer [10] ; Employee Leader
w
public :
stationery ( ) ;
w

void Read_Sta_details ( );
o
w

void Disp_sta_details( ) ; GL
};
Example of Multilevel Inheritance : Class student
ab
class office : public stationery inherits from person and GraduatesStudent inherits
} from student.
int no_of types ; Person
float cost_of_sta ;
ur

public :
Student
void Read_off_details( );
void Disp_off details( ) ;
}; GraduatesStudents
.s

class printer : private office (b) (i) Data Members - None


{ Member Functions - Read_pri_details ( ),
int no_of users ;
w

Disp_pri_details ( )
char delivary_date[10];
(ii) 29 Bytes
public :
void Read_pri_details( ); (iii) Member Functions - Read_sta_details ( ),
w

void Disp_pri_details( ) ; Disp_sta_details ( ),


}; Read_off_details ( ),
w

void main( ) Disp_off_details ( ),


{ printer Myprinter ; Read_pri_details ( ),
} Disp_pri_details ( ),



enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com

UNIT- V Computer Ethics and


Cyber Security

n
17 C

.i

m
al
Chapter omputer Ethics and Cyber Security

ad

co
k
CHAPTER SNAPSHOT

vi
 17.1. Introduction

s.
al
 17.2. Ethical Issues
.k
 17.3. Cyber Security and Threats

ok
 17.4. Introduction to Information Technology Act
w

Evaluation
w

Section - A
o
w

5. Which of the following is not a malicious program


Choose the Correct Answer on computer systems? [June 2019]
ab
(a) Worms
1. Which of the following deals with procedures, (b) Trojans
practices and values? [Mar. 2020; Sep. 2021; May'22] (c) Spyware
(a) piracy (b) programs (d) Cookies
(c) virus (d) computer ethics  [Ans. (d) Cookies]
ur

 [Ans. (d) computer ethics]


6. A computer network security that monitors and
2. Commercial programs made available to the controls incoming and outgoing traffic is
public illegally are known as [Mar. '23] (a) Cookies  [Mar. 2019; HY. 2019]
.s

(a) freeware (b) warez (b) Virus


(c) free software (d) software (c) Firewall
 [Ans. (b) warez] (d) Worms [Ans. (c) Firewall]
w

3. Which one of the following are self-repeating and 7. The process of converting cipher text to plain text
do not require a computer program to attach is called
themselves? [Sep. 2020]
w

(a) Encryption (b) Decryption


(a) viruses (b) worms (c) key (d) proxy server
(c) spyware (d) Trojans  [Ans. (b) Decryption]
 [Ans. (b) worms]
w

8. e-commerce means
4. Which one of the following tracks a user visits a
(a) electronic commerce
website?
(b) electronic data exchange
(a) spyware (b) cookies
(c) electric data exchange
(c) worms (d) Trojans
(d) electronic commercialization
 [Ans. (b) cookies]
 [Ans. (a) electronic commerce]
[280]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Computer Ethics and Cyber Security 281

9. Distributing unwanted e-mail to other is called. (ii) Decryption : Decryption is the reverse process
 [July-'23; Mar-'24] of converting the cipher-text back to plaintext.
(a) scam (b) spam Encryption and decryption are done by cryptography.

n
(c) fraud (d) spoofing In cryptography a key is a piece of information

.i
 [Ans. (b) spam] (parameter) that determines the functional output

m
al
10. Legal recognition for transactions are carried out by of a cryptographic algorithm.
(a) Electronic Data Interchange [Mar-'24]
Basic Encryption & Decryption

ad
(b) Electronic Data Exchange
Plain text Cipher text Plain text

co
(c) Electronic Data Transfer
(d) Electrical Data Interchange encryption decryption

k
 [Ans. (a) Electronic Data Interchange]

vi
Section - B 3. Explain about proxy server.
Very Short Answers Ans. A proxy server acts as an intermediary between the

s.
1. What is harvesting?
al
[Mar. 2019; Aug '22] end users and a web server. A client connects to the
.k
Ans. A person or program collects login and password proxy server, requesting some service, such as a file,
information from a legitimate user to illegally gain connection, web page, or other resources available from

ok
w
access to others, account(s). a different server. The proxy server examines the request,
2. What are Warez? [July-'23; Mar-'24] checks authenticity and grants the request based on
w

Ans. Commercial programs that are made available to the that. Proxy servers typically keep the frequently visited
public illegally are often called warez. site addresses in its cache which leads to improved
o
w

3. Write a short note on cracking. [Mar. '23] response time.


Ans. "Cracking" means trying to get into computer systems
ab
4. What are the guidelines to be followed by any
in order to steal, corrupt, or illegitimately view data.
computer user? [Sep. 2020]
4. Write two types of cyber attacks.
Ans. Generally, the following guidelines should be observed
Ans. (i) Virus (ii) Worms.
by computer users :
5. What is a Cookie? [Sep. 2020]
ur

(i) Honesty : Users should be truthful while using


Ans. A cookie (also called HTTP cookie, web cookie, Internet
cookie, browser cookie, or simply cookie) is a small the internet.
piece of data sent from a website and stored on the (ii) Confidentiality: Users should not share any
user's computer memory (Hard drive) by the user's web important information with unauthorized people.
.s

browser while the user is browsing Internet. (iii) Respect: Each user should respect the privacy
Section - C of other users.
Short Answers (iv) Professionalism: Each user should maintain
w

professional conduct.
1. What is the role of firewalls?
(v) Obey The Law: Users should strictly obey the
Ans. A firewall is a computer network security based system
cyber law in computer usage.
w

that monitors and controls incoming and outgoing


network traffic based on predefined security rules. A (vi) Responsibility: Each user should take ownership
firewall commonly establishes a block between a trusted and responsibility for their actions
w

internal computer network and entrusted computer


5. What are ethical issues? Name some. [May '22]
outside the network.
Ans. An Ethical issue is a problem or issue that requires a
2. Write about encryption and decryption.
person or organization to choose between alternatives that
 [HY. 2019; Mar. '23]
must be evaluated as right (ethical) or wrong (unethical).
Ans. (i) Encryption : Encryption is the process of translating
These issues must be addressed and resolved to have
the plain text data (plaintext) into random and
managed data (called cipher-text). a positive influence in society.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
282 Sura’s  XI Std - Computer Science ➠ Unit V ➠ Chapter 17
Some of the common ethical issues are listed below:
(i)  Cyber crime (ii) Software Piracy
(iii) Unauthorized Access (iv) Hacking

n
(v) Use of computers to commit fraud (vi) Sabotage in the form of viruses

.i
(vii) Making false claims using computers.

m
Section - D

al
Explain in detail

ad
1. What are the various crimes happening using computer?

co
Ans. Cybercrime is an intelectual, white -collar crime. Those who commit such crimes generally manipulate the computer

k
system is an intelligent manner. For example - Illegal money transfer via Internet.

vi
Crime Function
Hacking, threats, and blackmailing towards a

s.
al
Crime Function
business or a person.
.k
Cyber stalking Harassing through online.

ok
Malicious programs that can perform a variety of functions including
w
stealing, encrypting or deleting sensitive data, altering or hijacking core
Malware
computing functions and monitoring user's computer activity without
w

their permission.
Overloading a system with fake requests so that it cannot serve normal
o
w

Denial of service attack


legitimate requests.
Manipulating data, for example changing the banking records to transfer
ab
Fraud
money to an unauthorized account.
A person or program collects login and password information from a
Harvesting
legitimate user to illegally gain access to others, account(s).
It is a crime where the criminals impersonate individuals, usually for
Identity theft
ur

financial gain.
Intellectual Stealing practical or conceptual information developed by another person
property theft or company
.s

Salami slicing Stealing tiny amounts of money from each transaction.


Scam Tricking people into believing something that is not true.
w

Spam Distribute unwanted e-mail to a large number of internet users.


It is a malicious practice in which communication is send from unknown
Spoofing
source disguised as a source known to the receiver.
w

2. What is piracy? Mention the types of piracy? How (ii) In simple words, Software Piracy is "unauthorized
can it be prevented? copying of software' The following show as a
Ans. (i) Software Piracy is about the copyright violation diagrammatical representation of software piracy.
w

of software created originally by an individual


Software Piracy
or an institution. It includes stealing of codes/ (iii) Most of the commercial
programs and other information illegally and software is licensed for
use at a single computer
creating duplicate copies by unauthorized means site or for use by only Duplicating Downloading
and utilizing this data either for one's own benefit one user at any time. and selling software
illegally
or for commercial profit. When a user buys any copyrighted
programs through
network

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Computer Ethics and Cyber Security 283

software, he becomes a licensed user for that trying to stop people from copying software and
software. He is allowed to make copies of the instead relies on people's honesty.
program for backup purposes, but it is against the (v) Shareware publishers encourage users to give
law to distribute duplicate copies to others. Such copies of programs to friends and colleagues but

n
illegal copying and distribution of commercial ask everyone who uses that program regularly

.i
software should not be practiced to pay a registration fee to the program's author
directly. Commercial programs that are made

m
(iv) An entirely different approach to software piracy

al
available to the public illegally are often called
is called shareware, acknowledges the futility of warez.

ad

co
3. Write the different types of cyber attacks. [June 2019; Mar. '23]

k
Ans. Cyber Attack Function

vi
A virus is a small piece of computer code that can repeat itself and spreads from one
computer to another by attaching itself to another computer file. One of the most

s.
Virus
Trojan
al
common virus is Trojan.
.k
A Trojan virus is a program that appears to perform one function (for example, virus

ok
removal) but actually performs malicious activity when executed.
w
Worms are self- repeating and do not require a computer program to attach
Worms themselves. Worms continually look for vulnerabilities and report back to the author
w

of the worm when weaknesses are discovered.


o
w

Spyware can be installed on the computer automatically when the attachments are
Spyware open, by clicking on links or by downloading infected software.
ab
Ransomware is a type of malicious program that demands payment after launching
Ransomware a cyber-attack on a computer system. This type of malware has become increasingly
popular among criminals and costs the organizations millions each year.
ur

Government Exam questions and Answers


.s

1 Mark 2 Marks
1. The crime stealing tiny amounts of money from 1. What is cyber crime? Give an example. [Sep. 2021]
w

Ans. Cybercrime is an intellectual, white-collar crime. Those


transaction is  [HY. 2018]
who commit such crimes generally manipulate the
(a) Salami Slicing (b) Spyware computer system in an intelligent manner.
w

(c) Malware (d) Spam Eg : Illegal money transfer via internet


 [Ans. (a) Salami Slicing]
3 Marks
w

2. Which one of the following is Harass through


1. What is meant by computer Ethics? [Aug '22]
online? [Aug '22]
Ans. Computer ethics deals with the procedures, values
(a) Cyber terrorism (b) Scam
and practices that govern the process of consuming
(c) Cyber stalking (d) Fraud computer technology and its related disciplines without
 [Ans. (c) Cyber stalking] damaging or violating the moral values and beliefs of
any individual, organization or entity.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
284 Sura’s  XI Std - Computer Science ➠ Unit V ➠ Chapter 17

5 Marks
additional questions and Answers
1. Explain the function of digital signature.
Choose the Correct Answers 1 MARK

n
Ans. Digital signature :  [HY. 2018]
(i) Digital signatures are based on asymmetric cryptography

.i
I.  C
 hoose the Correct options for the

m
and can provide assurances of evidence to origin,

al
below Questions.
identity and status of an electronic document, transaction

ad
or message, as well as acknowledging informed by 1. Which of the following is a communication media

co
the signer. which is easily accessible and open to all?
(ii) To create a digital signature, signing software (email) (a) TV (b) Mobile

k
creates a one-way hash of the electronic data to be (c) Radio (d) Internet

vi
signed.  [Ans. (d) Internet]

s.
al
(iii) The user's private key to encrypt the hash, returning a 2. Which of the following is a cirme which involves
value that is unique to the hashed data. The encrypted computer and network?
.k
hash, along with other information such as the hashing (a) Phishing (b) Pharming

ok
(c) Hacking (d) Piracy
w
algorithm, forms the digital signature. Any change
in the data, even to a single bit, results in a different (e) All of these [Ans. (e) All of these]
w

hash value. 3. Which presents a major challenge to the ethical


use of information technologies?
o
w

(a) Cyber-crime (b) Crime by area


Message, Digital Signature
and Sender X.509 (c) Corruption (d) Crime one time
ab
Message Message
 [Ans. (a) Cyber-crime]
Sender Create Signature Verify Signature Recipient 4. Which of the following is not a cyber - crime?
(a) Phishing (b) Piracy
(c) Virus (d) Crime by area
ur

 [Ans. (d) Crime by area]


5. Which of the following is a set of moral principles that
rule the behavior of individuals who use computers?
(a) Cyber Crime (b) Ethics
.s

Sender Private Key Sender Public Key


(c) Values (d) Mannerism
(iv) This attribute enables others to validate the integrity  [Ans. (b) Ehics]
of the data by using the signer's public key to 6. Which of the following statement is time according
w

decrypt the hash. If the decrypted hash matches a to cyber world?


second computed hash of the same data, it proves (i) Do not use priated software
that the data hasn't changed since it was signed. (ii) Do not use unauthorized user a accounts
w

(iii) Do not steal others password


(v) If the two hashes don't match, the data has either
(a) only (i) (b) only (ii)
been tampered with in some way (indicating a (c) only (iii) (d) All of these
w

failure of integrity) or the signature was created  [Ans. (d) All of these]
with a private key that doesn't correspond to the 7. Which of the following is not the common ethical
public key presented by the signer (indicating a issues?
failure of authentication). (a) Cyber crime (b) Authorized access
(c) Hacking (d) Piracy
 [Ans. (b) Authorized access]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Computer Ethics and Cyber Security 285

8. Which of the following is an intellectual white-collar 17. Which of the following acts as an intermediary
crime? between the end user and a web server?
(a) Cyber crime (b) Crime over area (a) Website (b) Web client

n
(c) Crime over time (d) Organized crime (c) Proxyserver (d) Network
 [Ans. (c) Proxyserver]

.i
 [Ans. (a) Cyber crime]
18. Which of the following keep the frequently visited

m
9. Which of the following crime that tricking people

al
into believing something is not true? site addresses in its cache which improves response
time?

ad
(a) Spam (b) Spoofing
(a) Web server (b) Web client
(c) Scam (d) Harvesting

co
(c) Web browser (d) Proxy server
 [Ans. (c) Scam]

k
 [Ans. (d) Proxy server]
10. Which of the following is not used to prevent

vi
unauthorized access? 19. Which of the following used to protect data in
(a) Firewalls (b) IDS communication system?

s.
(c) Malware

al
(d) Virus Scanners
[Ans. (c) Malware]
(a) Encryption
(c) Decryption
(b) Cipher-text
(d) Spyware
.k
11. Which of the following is not a cyber attack?  [Ans. (a) Encryption]

ok
w
(a) Virus (b) Worms
20. Which type of encryption use the same key for both
(c) Firewalls (d) spyware encryption and description?
w

 [Ans. (c) Firewalls]


(a) Public Key (b) Private Key
12. Which of the following program that demands payment
(c) Asymmetric Key (d) Symmetric Key
o
w

after launching a cyber-attack on a computer system?  [Ans. (d) Symmetric Key]


(a) Spyware (b) Ransomware
ab
(c) Shareware (d) Moneyware II. Match List I with List II and Select the
 [Ans. (b) Ransomware] Correct Answer using the Codes given
13. Which of the following programs are self-repeating below.
and do not require a computer program to attach
1. Match the following.
ur

themselves?
(a) Virus (b) Spyware Function Crime
(c) Ransomware (d) Worms (i) Harassing 1 Spam
 [Ans. (d) Worms] through online
.s

14. Which of the following can lead to fraud or identity (ii) Distribute unwanted 2 Cyber stalking
theft? e-mail
(a) Phishing (b) Pharming (iii) Manipulating data 3 identity theft
w

(c) Cookies (d) both a and b transfer money to an


(e) MITM [Ans. (d) both a and b] unauthorized account
15. Which of the following also used to remember arbitrary (iv) Criminals 4 Fraud
w

pieces of information that the user previously entered impersonate


individuals usually
into form fields?
for financial gain
(a) Phishing (b) Pharming
w

Codes:
(c) Cookie (d) Malware (i) (ii) (iii) (iv)
 [Ans. (c) Cookie] (a) 4 1 3 2
16. Which can not be used to spread viruses? (b) 1 3 2 4
(a) Programs (b) Trojan (c) 2 1 4 3
(c) Worms (d) Cookies (d) 3 4 1 2
 [Ans. (d) Cookies]  [Ans. (c) (i)-2, (ii)-1, (iii)-4, (iv)-3]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
286 Sura’s  XI Std - Computer Science ➠ Unit V ➠ Chapter 17

III. Choose the Correct Option and Fill in 10. "Phishing without a trop" called .................. .
the Blanks. (a) Hacking (b) Cracking
1. Harassing through online, the crime called ......... . (c) Pharming (d) Warehouse

n
(a) Malware (b) Cyber Stalking  [Ans. (c) Pharming]

.i
(c) Fraud (d) Salami slicing 11. MITM also called .................. .

m
al
 [Ans. (b) Cyber Stalking] (a) Malware attack (b) Janus attack
2. Distribute unwanted email to a large number of (c) Virus attack (d) Spyware attack

ad
internet users .................. .
 [Ans. (b) Janus attack]

co
(a) Scam (b) inbox (c) BCC (d) Spam
 [Ans. (d) Spam] 12. Encryption and decryption are done by .................. .

k
3. "unauthorized copying of software" is called ...... . (a) GUI (b) Cryptography

vi
(a) virus (b) worms (c) Cipher-text (d) Compiler
(c) Hacking (d) software piracy  [Ans. (b) Cryptography]

s.
4.

Expansion of IDS is .................. .
al
[Ans. (d) software piracy] 13. Decrypted text is also called .................. .
.k (a) Cryptography text (b) Plain text
(a) Identification Detection Systems (c) Cipher - text (d) GUI text

ok
(b) Intrusion Detection Software
w
 [Ans. (c) Cipher-text]
(c) Intrusion Digital Systems 14. Public Key encryption is also called .................. .
w

(d) Intrusion Detection Systems (a) Symmetric key (b) asymmetric


 [Ans. (d) Intrusion Detection Systems] (c) synchronous (d) all of these
o
w

5. The act of gaining illegal access to a computer is  [Ans. (b) asymmetric]


called .................. . 15. Expansion of EDI is .................. .
ab
(a) Hacking (b) Cracking (a) Electronic Data Interlink
(c) Phising (d) Piracy (b) Electronic Data Information
 [Ans. (a) Hacking] (c) Electronic Data Interchange
6. Hacking can be protected by .................. . (d) Electronic Digital Information
ur

 [Ans. (c) Electronic Data Interchange]


(a) Malware (b) Virus
(c) Firewalls (d) Piracy
 [Ans. (c) Firewalls] IV. Point out the Wrong Statement in the
following.
.s

7. Who breaks into someone else's computer system


called .................. .
1. Which of the following statement is false?
(a) Hacker (b) Cracker
(i) Users should not be truthful while using Internet
w

(c) Breaker (d) Cipher


(ii) Each should respect the privacy of other users.
 [Ans. (b) Cracker] (iii) Users should strictly obey the cyber lay in computer
8. Expansion of IRC .................. . usage.
w

(a) Internet Relay Chat (iv) Users should share any information with
(b) Internet Religions Chat unauthorized people.
(c) Intenational Relay Chat (a) only (iv) (b) Both (i) and (iii)
w

(d) Internet Relay Cyber (c) Both (i) and (iv) (d) only (i)
 [Ans. (c) both (i) and (iv)]
 [Ans. (a) Internet Relay Chat]
2. Which of the following statement is false?
9. Phishing and pharming and examples of ............. . (i) Duplicating and selling copy righted programs is
(a) Social Engineering (b) Social Media called software piracy.
(c) Malware (d) firewalls (ii) Downloading software illegally through network
is called software piracy.
 [Ans. (a) Social Engineering]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Computer Ethics and Cyber Security 287

(iii) Unauthorized copying of software is called software 8. Write the types of software piracy?
piracy Ans. (i) Duplicating and selling copyrighted programs
(a) only (i) (b) only (ii)
(ii) Downloading software illegally through network.

n
(c) only (iii) (d) both (i) and (iii)
 [Ans. (a) only (i)] 9. What is meant by unauthorized access?

.i

m
Ans. Unauthorized access is when someone gains access

al
Very Short Answers 2 MARKS
to a website, program, server, service, or other system

ad
1. Write few accepted standards in cyber world. by breaking into a legitimate user account.

co
Ans. (i) Do not use pirated software. 10. How will you prvent unauthorized access of a system?
Ans. To prevent unauthorized access, Firewalls, Intrusion

k
(ii) Do not use unauthorized user accounts.
Detection Systems (IDS), Virus and Content Scanners,

vi
(iii) Do not steal others' passwords.
Patches and Hot fixes are used.
(iv) Do not hack.

s.
al
11. Which may be done in pursuit of criminal activity
2. What is Malware? or hobby?
.k
Ans. Malicious programs that can perform a variety of Ans. Hacking.
functions including stealing, encrypting or deleting

ok
12. What is hacking leads to?
w
sensitive data, altering or hijacking core computing
Ans. Hacking leads to Identity theft or gaining personal
functions and monitoring user's computer activity information. Firewalls, passwords and user Id's, anti
w

without their permission. hacking software.


3. What is Salami Slicing?
o
w

13. Who is called black hat or dark side hacker? Why?


Ans. Stealing tiny amounts of money from each transaction. Ans. (i) A cracker (also called a black hat or dark side
hacker) is a malicious or criminal hacker.
ab
4. What is spoofing?
(ii) A cracker is someone who breaks into someone
Ans. It is a malicious practice in which communication is send else's computer system, often on a network, by
from unknown source disguised as a source known to passing passwords or licenses in computer programs.
the receiver.
14. Name the types of cracking.
ur

5. Name the crime for the following function. Ans. (i) Software Cracking
(i) Overloading a system with fake requests. (ii) Password Cracking.
(ii) Distributing unwanted e-mail to a large number 15. What is software cracking and password cracking?
.s

of Internet users. Ans. Software cracking is the most often used type of
(iii) Stealing conceptual information developed by cracking which is nothing but removing the encoded
another person. copy protection. Password cracking can be perform
w

Ans. (i) Denial of Service Attack either by using an automated program or can be manually
(ii) Scam realized.
(iii) Spam. 16. What is meant by social engineering?
w

Ans. Social Engineering is a method of getting passwords


6. What does software piracy includes?
and information using human weakness. These crackers
Ans. It includes stealing of codes/ programs and other trick people, not software. They can use just the phone
information illegally and creating duplicate copies by
w

for getting information, they can pretend being your


unauthorized means and utilizing this data either for friend and talk to you on Internet Relay Chat(IRC) or
one's own benefit or for commercial profit. by Instant messenger.
7. Define cyber law. 17. What is Malware?
Ans. Cyber law or Internet law is a term that encapsulates Ans. Malware is a type of software designed through which
the legal issues related to use of the Internet. the criminals gain illegal access to software and cause
damage.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
288 Sura’s  XI Std - Computer Science ➠ Unit V ➠ Chapter 17
18. Name the types of cyber security threats. 27. Explain the working of proxy server.
Ans. (i) Social Engineering (ii) Man In the Middle Ans.
(iii) Cookies.

n
web browser web browser
19. What is virus? sends request request forwarded

.i
Ans. A virus is a small piece of computer code that can

m
Users computer Proxy server web server

al
repeat itself and spreads from one computer to another
web server web servers send back
by attaching itself to another computer file.

ad
response to proxy server
20. What is Trojan?

co
Ans. A Trojan virus is a program that appears to perform 28. Explain the uses of encryption.

k
one function (for example, virus removal) but actually Ans. Encryption has been used by militaries and governments

vi
performs malicious activity when executed. to facilitate secret communication. It is now commonly
used in protecting information within many kinds

s.
al
21. Define worms. of civilian systems. It is also used to protect data in
Ans. Worms are self- repeating and do not require a computer communication system.
.k
program to attach themselves. Worms continually look 29. Give an example of encryption.

ok
for vulnerabilities and report back to the author of the Ans. Data being transferred via networks (e.g. the Internet,
w
worm when weaknesses are discovered. e-commerce), mobile telephones, wireless microphones,
wireless intercom systems, Bluetooth devices and bank
w

22. What is meant by Ransomware?


automatic teller machines.
Ans. Ransomware is a type of malicious program that demands
30. Write the disadvantage of the symmetric key
o
w

payment after launching a cyber-attack on a computer encryption.


system. This type of malware has become increasingly
Ans. The main disadvantage of the symmetric key encryption
ab
popular among criminals and costs the organizations is that all authorized persons involved, have to exchange
millions each year. the key used to encrypt the data before they can decrypt
23. How proxy servers improves response time? it. If anybody intercepts the key information, they may
read all message.
Ans. Proxy servers keep the frequently visited site addresses
ur

in its cache which leads to improved response time. 31. Write a note on Asymmetric encryption.
24. Which determines the functional output of cryptographic Ans. Public Key Encryption :
algorithm? (i) Public key encryption is also called Asymmetric
encryption. It uses the concept of a key value
.s

Ans. In cryptography a key is a piece of information (parameter) pair, a different key is used for the encryption and
that determines the functional output of a cryptographic decryption process. One of the keys is typically
algorithm. known as the private key and the other is known
w

as the public key.


25. Difference between encryption and decryption.
(ii) The private key is kept secret by the owner and
Ans. Encryption Decryption the public key is either shared amongst authorized
recipients or made available to the public at large.
w

Encryption is the Decryption is the


process of translating reverse process of (iii) The data encrypted with the recipient's public key
can only be decrypted with the corresponding
the plain text data converting the cipher- private key.
w

(plain text) into random text back to plaintext.


32. What are the forms asymmetric encryption used?
and mangled data
Ans. In the form of
(called cipher-text),
(i) Digital certificates
26. Which can be done by cryptography? (ii) Digital signature.
Ans. (i) Encryption
33. What is authenticity?
(ii) Decryption. Ans. The quality of being real or true.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Computer Ethics and Cyber Security 289

34. What is IT Act 2000? 41. Write a note on Janus attack.


Ans. IT Act 2000 is an act to provide legal recognition Ans. Man-in-the-middle attack (MITM; also Janus attack) is
for transactions carried out by means of Electronic an attack where the attacker secretly relays and possibly

n
Data Interchange(EDI) and other means of electronic alters the communication between two parties who
believe they are directly communicating with each other.

.i
communication. It is the primary law in India dealing
42. Who is called perpetrator?

m
al
with cybercrime and electronic commerce(e-Commerce).
Ans. A person who carriers out a harmful, illegal, or immoral
35. What are the points to be noted to protect the network

ad
act.
information?

co
Ans. To protect the information the following points to be Long Answers 5 MARKS

k
noted :
1. Explain social engineering with an example.
(i) Complex password setting can make your surfing

vi
secured. Ans. (i) Social engineering : A misuse of an individual’s
weakness, achieved by making them to click

s.
al
(ii) When the internet is not in use, disconnect it.
malicious links, or by physically accessing the
(iii) Do NOT open spam mail or emails that have an computer through tricks. Phishing and pharming
.k
unfamiliar sender. are examples of social engineering.

ok
(iv) When using anti-virus software, keep it up-to- (ii) Phishing : Phishing is a type of computer crime
w
date. used to attack, steal user data, including login
name, password and credit card numbers. It occurs
w

36. Define Hacking.


when an attacker targets a victim into opening an
Ans. Hacking is gaining unauthorized access to computer
o e-mailor an instant text message. The attacker uses
w

system without the owner's permission. phishing to distribute malicious links or attachments
37. Define cracking. that can perform a variety of functions. including
ab
the extraction of sensitive login credentials from
Ans. Cracking is gaining unauthorized access to computer victims.
systems to commit a crime, such as stealing the code (iii) Pharming : Pharming is a scamming practice in
to make a copy-protected program run thus denying which malicious code is installed on a personal
ur

service to legitimate users. computer or server, misdirecting users to fraudulent


web sites without their knowledge or permission.
38. Differentiate freeware and shareware. Pharming has been called "phishing without a trap':
Ans. Freeware Shareware It is another way hackers attempt to manipulate
.s

Freeware is a Shareware is a software that users on the Internet. It is a cyber-attack intended


software available is distributed free of charge to redirect a website's traffic to a fake site.
free of charge. on a trial basis for a limited 2. Write the reasons now websites typically use cookies.
w

time.
Ans. Web sites typically use cookies for the following reasons:
39. Define Phishing. (i) To collect demographic information about who
Ans. Phishing is a term used to describe a malicious individual has visited the Web site.
w

or group of individuals who scam users by sending (ii) Sites often use this information to track how often
e-mails or creating web pages that are designed to visitors come to the site and how long they remain
collect an individual's online bank, credit card, or other on the site.
w

login information. (iii) It helps to personalize the user's experience on


the Web site.
40. Define firewall. (iv) Cookies can help store personal information about
Ans. Afirewall is a network security system that monitors users so that when a user subsequently returns
and controls incoming and outgoing network traffic to the site, a more personalized experience is
based on predetermined security rules. provided.

enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
290 Sura’s  XI Std - Computer Science ➠ Unit V ➠ Chapter 18

Chapter
18 Tamil computing

.i n

m
al
CHAPTER SNAPSHOT

ad
 18.1. Introduction

co
 18.2. Tamil in Internet

k
 18.3. Search Engines in Tamil

vi
 18.4. e-Governance

s.
al
 18.5. e-Library
 18.6. Tamil Typing and Interface Software
.k
18.6.1. Familiar Tamil Keyboard Interface

ok
w
 18.7. Tamil Office Automation Applications
 18.8. Tamil Translation Applications
w

 18.9. Tamil Programming Language


o
w

 18.10. Tamil Information Interchange Coding Systems


 18.11. Tamil Operating System
ab
 18.12. Organisation and Projects to develop Tamil

Evaluation
ur

Very Short Answers  4. What is TSCII? [HY. 2019; Mar. 2020; May '22]

1. List the search engines supported by Tamil Ans. TSCII (Tamil Script Code for Information
language. [Mar-'24] Interchange) is the first coding system to handle our
.s

Ans. (i) Google (ii) Bing (iii) y ahoo. Tamil language in an analysis of an encoding scheme
2. What are the keyboard layouts used in Android? that is easily handled in electronic devices, including
Ans. Sellinam and Ponmadal – are familiar Tamil keyboard non-English computers. This encoding scheme was
w

layouts that works on Android operating system in registered in IANA (Internet Assigned Numbers
Smart phone using phonetics. Authority) unit of ICANN.
3. Write a short note about Tamil Programming
w

5. Write a short note on Tamil Virtual Academy.


Language.
 [Mar. '23]
Ans. Programming languages to develop software to
computers and smart phones are available only Ans. With the objectives of spreading Tamil to the entire
w

in English. Now, efforts are taken to develop world through internet, Tamil Virtual University was
programming languages in Tamil. Basedon Python established on 17th February 2001 by the Govt. of
programming language,the first Tamil programming Tamilnadu. Now, this organisation functions with the
language "Ezhil" (vÊš) is designed. With the help name of "Tamil Virtual Academy': It offers different
of this programming language, you can write simple courses in Tamil language, Culture, heritage etc.,
programs in Tamil. from kindergarten to under graduation level.
[290]
enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
Sura’s  XI Std - Computer Science ➠ Tamil Computing 291

Government Exam questions and Answers


2. Getting Government services through internet is
1 Mark

n
known as ..................... . [Sep. 2021]
(a) e-commerce (b) e-book

.i
1. Which of the following is the first Tamil programming
(c) e-library (d) e-governance

m
Language? 

al
[Sep. 2020; July-'23]
 [Ans. (d) e-governance]
(a) Kamban (b) Azhagi 3. Which is not a search engine? [May '22]

ad
(c) Tamil Open Office (d) Ezhil (a) Android (b) Bing (c) Yahoo

co
 [Ans. (a) Ezhil] (d) Google [Ans. (a) Android]

k

additional questions and Answers

vi
I. Choose the Correct Which of the following provide searching facilities

s.
options for the 8.
below Questions.
al in Tamil?
(a) Google (b) Bing
.k
1. Which of the following plays a vital role in ever (c) Safari (d) both a and b

ok
man's life?  [Ans. (d) both a and b]
w
(a) Mobile (b) Computer 9. Which of the following is not provide searching
(c) Internet (d) Laptop facilities in Tamil?
w

 [Ans. (c) Internet]


o (a) Yahoo (b) Safari
2. Which of the following is the best informatikon
w

(c) Bing (d) Google


technological device?  [Ans. (b) Safari]
(a) Computer (b) Internet 10. Which of the following search engine gives Tamil
ab
(c) Mobile (d) Notebook Computer virtual keyboard?
 [Ans. (b) Internet] (a) Bing (b) Yahoo
3. How many percentage of people using Internet (c) Safari (d) Google
is Tamil?  [Ans. (d) Google]
ur

(a) 40% (b) 43% (c) 50% (d) 42% 11. Which country provides all their services through
 [Ans. (d) 42%)] the official website in Tamil?
4. In India, Which is the most widely language in (a) Srilanka (b) America
Internet? (c) Singapore (d) Malaysia
.s

(a) Tamil (b) Hindi  [Ans. (a) Srilanka)]


(c) Kannada (d) Malayalam 12. Which of the following are portal or website of
 [Ans. (a) Tamil] books collection?
w

5. How many percentage of Internet users consider (a) E-Papers (b) E-Commere
local language digital content to be more reliable (c) E-languages (d) E-libraries
than english?  [Ans. (d) E-libraries]
w

(a) 42% (b) 52% (c) 68% (d) 48% 13. Which of the following is not a familiar Tamil
 [Ans. (c) 68%] keyboard interfaces software?
6. Which year onwards, 74% if people in India will (a) NHM Writer (b) Ponmadal
access Internet using Tamil? (c) E-Kalappai (d) Lippikar
w

(a) 2019 (b) 2021 (c) 2023 (d) 2030  [Ans. (b) Ponmadal]
 [Ans. (b) 2021] 14. In white OS, Sellinam Tamil keyboard layout
7. Which of the following are used to search any works?
information from the cyberspace? (a) windows (b) linux
(a) Operating System (b) Compiler (c) Android (d) iOS
(c) Search engines (d) Web clients
 [Ans. (c) Search engines]  [Ans. (c) Android]

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
292 Sura’s  XI Std - Computer Science ➠ Unit V ➠ Chapter 18
15. Which of the following Tamil keyboard layout not Very Short Answers 2 MARKS
used by Android OS?
(a) NHM Wirter (b) E-Kalappai 1. What is e-governance?
Ans. Getting Government services through internet is known

n
(c) Lippikar (d) All of these
 [Ans. (d) All of these] as e-Governance. Govt. of Tamilnadu has been giving

.i
its services through Internet.
16. Which of the following application have more

m
2. What is the use of e-libraries?

al
than 30000 Tamilwords equivalent to enlglish
Ans. E-Libraries are portal or website of collection of e-books.
words?
Tamil e-Library services provide thousands of Tamil

ad
(a) Kamban (b) Thamizpori Books as e-books mostly at free of cost. It is the most
(c) Vani (d) Ponmozhi

co
useful service to Tamil people who live far away from
 [Ans. (b) Thamizpori] their home land.

k
17. Which of the following language used to design 3. What is the use of Tamil interfaces software?

vi
''Ezhil''? Tamil programming language? Ans. Tamil interface software is the familiar one among the
(a) C (b) C++ (c) Java (d) Python different. Methods of typing. This is the simplest method

s.
al
 [Ans. (d) Python] of typing Tamil in both Computer and Smart phones.
18. Which of the following coding systems specially 4. What are the familier keyboard used for Tamil
designed for Indian languages?
.k typing?
(a) ASCII (b) TSCII Ans. (i) NHM Writer, E-Kalappai and Lippikar - are familiar

ok
Tamil keyboard interfaces software thai is used for
w
(c) ISCII (d) EBCDIC
 [Ans. (c) ISCII] Tamil typing which works on Tamil Unicode, using
phonetics.
w

19. Which encoding scheme is suitable to handle


Tamil? (ii) Sellinam and Ponmadal - are familiar Tamil Keyboard
layouts that works on Android operating system in
o
w

(a) ASCII (b) ISCII


smart phone using phonetics.
(c) Unicode (d) BCD 5. List some Tamil Automation softwares.
 [Ans. (c) Unicode]
ab
Ans. Tamil Libra Office, Tamil Open Office, Azhagi Unicode
20. In India, 42% of users mostly used language in Editor, Ponmozhi, Menthamiz, Kamban, Vani are office
india? automation software working exclusively for Tamil.
(a) Tamil (b) Kannada 6. Write a short note on "Thamizpori".
(c) Malayalam (d) Telugu Ans. Thamizpori (jÄœbgh¿) is a Tamil translation application
ur

 [Ans. (a) Tamil] having more than 30000 Tamil words equalent to English
words. Using this application. we can transalte small English
III. Choose the Correct Option and Fill in sentences into Tamil.
the Blanks. 7. Expand
.s

1. The first programming language "Ezhil" is (i) TSCII (ii) ISCII (iii) ASCII
designed by ....................... . Ans. (i) Tamil Script Code for Information Interchange
(a) C++ (b) Java (ii) Indian Script Code for Information Interchange
(c) Python (d) Visual Basic (iii) Ameircan Standard Code for Information Interchange.
w

 [Ans. (c) Python] 8. Write a short note on Madurai project.


Ans. Project Madurai is an open and voluntary initiative to
2. The ASCII encoding system is applicable only for
collect and publish free electronic editions of ancient
handling the language ..................... .
w

tamil literary classics. This means either typing-in or


(a) English (b) Hindi scanning old books and archiving the text in one of the
(c) Tamil (d) All of these most readily accessible formats for use on all popular
 [Ans. (a) English] computer platforms.
w

3. The first version of Unicode is ................... . 9. Write a note on Unicode.


(a) 1.0.0 (b) 1.0.1 Ans. Unicode is an encoding system, designed to handle various
(c) 0.0.1 (d) 0.1.1 [Ans. (a) 1.0.0] world languages, including Tamil. Its first version 1.0.0
4. The first version of Unicode introduced in the was introduced on October 1991. While introduction of
year ................ . this scheme, can be able to handle nearly 23 languages
(a) 1990 (b) 1998 (c) 1991 (d) 1981 including Tamil. Among the various encoding scheme,
 [Ans. (c) 1991] Unicode is the suitable to handle Tamil.


enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com

11th
STD
PUBLIC EXAMINATION MARCH - 2024
PART - III
Reg. No.

n
Time Allowed : 3.00 Hours] COMPUTER SCIENCE (with Answers) [M aximum Marks : 70

.i

m
Instructions :

al
1) Check the question paper for fairness of printing. If there is any lack of fairness, inform the Hall Supervisor
immediately.

ad
2) Use Blue or Black ink to write and underline and pencil to draw diagrams.

co
PART - I 10. #include<iostream>

k
Note : (i) Answer all the questions.  15 × 1 = 15 using namespace std;

vi
(ii) Choose the most appropriate answer from the int main()
given four alternatives and write the option {

s.
al
code and the corresponding answer. int i=1, sum=0;
while(i<=10)
1. Which generation of computer used IC's?
.k
{
(a) Third generation (b) First generation

ok
sum = sum+i;
w
(c) Fourth generation (d) Second generation
i++;
2. Omitting details inessential to the task and }
w

representing only the essential features of the task is


cout<<sum;
known as :
return 0;
o
w

(a) Composition (b) Specification


}
(c) Decomposition (d) Abstraction
The output for the above snippet is:
ab
3. How many times the loop is iterated? (a) 55 (b) 54 (c) 51 (d) 50
i:=0
11. The shortcut key used to rename a file in Windows.
while i ≠ 5
i ; = i +1 (a) F5 (b) F2 (c) F6 (d) F4
ur

(a) 6 (b) 4 (c) 0 (d) 5 12. Which of the following constructor is executed for
4. Which of the following is the scope operator? the following prototype?
(a) > (b) : : (c) & (d) % add display (add &); // add is a class name
5. Distributing unwanted e-mail to others is called ____. (a) Copy Constructor
.s

(a) scam (b) fraud (c) spoofing (d) spam (b) Default Constructor
(c) Non-Parameterized Constructor
6. In C++ ______ is used for pointer to a variable.
(d) Parameterized Constructor
(a) −
w

(b) + (c) ÷ (d) *


13. Which refers to the number of bits processed by a
7. Which of the following is the Entry Control loop?
computer's CPU?
(a) if (b) for
(a) Word length (b) Byte
w

(c) do-while (d) switch


(c) Bit (d) Nibble
8. Legal recognition for transactions are carried out by :
(a) Electronic Data Transfer 14. Interactive Operating System provides :
w

(b) Electronic Data Interchange (a) Real Time Processing


(c) Data Interchange (b) Data Distribution
(d) Electronic Data Exchange (c) Security Management
(d) Graphics User Interface
9. The mechanism by which the data and function are
bound together into a single unit is known as : 15. Which of the following is a CISC processor?
(a) Abstraction (b) Polymorphism (a) Pentium III (b) Intel P6 
(c) Inheritance (d) Encapsulation (c) Pentium IV (d) AMD K6
[293]
enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
294 Sura’s ➠ 11th Std - Computer Science  Public Examination March - 2024 Question Paper with Answers

PART - II 35. (a) Perform binary addition for the follwoing.


Note: A
 nswer any six questions. Question No. 24 is (i) (−21)10 + (5)10
Compulsory. 6 × 2 = 12
(ii) (−12)10 + (15)10

n
16. Distinguish Primary and Secondary Memory.
(OR)

.i
17. (1324)8 - convert to equivalent Decimal number. (b) What is function overloading? What are the rules

m
al
18. What is Multi user operating system? for function overloading?
19. Write a short note on const keyword with example.

ad
36. (a) Explain about the types of ROM.
20. What are the importance of void data type?

co
(OR)
21. What are Warez? (b)  Write the differences between if-else and switch

k
22. List the search engines supported by Tamil Language. statement.

vi
23. Define an algorithm. 37. (a) What is an output unit? Explain any three output
24. Write the output of the following program.

s.
devices.
#include<iostream>
al (OR)
using namespace std;
.k
(b) Write the output of the following program:

ok
int main() #include<iostream>
w
{ using namespace std;
int i; class student
w

for(i=0;i<8;i++) {
cout<<i<<endl; int rno, marks;
o
w

return 0; public:
} student(int r,int m)
ab
PART - III {
Note : Answer any six questions. Question No. 33 is cout<<"Constructor "<<endl;
Compulsory. 6 × 3 = 18 rno=r;
marks=m;
25. Write a note on Recycle bin.
ur

}
26. What are the points to be noted while deriving a class? void printdet()
27. How is state represented in algorithms? {
28. Give the Truth Table of XOR gate. marks=marks+30;
.s

29. What is the difference between isupper( ) and cout<<"Roll no : "<<rno<<"\n";


toupper( ) functions? cout<<"Marks : "<<marks<<endl;
30. Differentiate - CD and DVD. }
w

};
31. Write the significant features of monitor.
int main()
32. What is an array? Write its types. {
33. Write a C++ program to display number from 5 to 1
w

student s(14,70);
using do-while loop. s.printdet();
PART - IV cout<< "Back to Main";
return 0;
w

 nswer all the questions.


Note : A 5 × 5 = 25 }
34. (a) Explain the basic components of a computer
38. (a) Explain the different types of inheritance.
with a neat diagram.
(OR)
(OR)
(b) Debug the following C++ program.
(b) Explain the concept of a Distributed Operating
Output :
System along with its advantages.
Total area : 35

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s ➠ 11th Std - Computer Science  Public Examination March - 2024 Question Paper with Answers 295

Program: 7. (b) for


%include<iostream> 8. (b) Electronic Data Interchange
using namespace std: 9. (d) Encapsulation

n
CLASS Shape
10. (a) 55

.i
{
11. (b) F2

m
Private ( )

al
int count 12. (a) Copy Constructor
Protected; 13. (a) Word length

ad
int width; 14. (d) Graphics User Interface

co
int height; 15. (a) Pentium III

k
PUBLIC;
PART - II

vi
Void setwidth [int w]
{ 16.

s.
al
width=w; Primary Memory Secondary Memory
}; It is used to temporarily It is used to store the
.k
void setheight (int h) store the programs data permanently.

ok
{ and data when the
w
height=h; instructions are ready to
} execute.
w

} It is volatile, the content It is non-volatile, the


Class rectangle : : Public Shape
o is lost when the power content is available even
w

{ supply is switched off. after the power supply is


Public Eg. RAM. switched off. Eg. ROM,
ab
int getarea [ ] CD-ROM, DVD ROM.
{
17. (1324)8 Equivalent Decimal number:
return (width * height);
}; Weight 512 64 8 1
ur

}
Positional notation 83 82 81 80
int MAIN( )
{ Given number 1 3 2 4
rectangle rect :
.s

(1324)8 = 512 × 1 + 64 × 3 + 8 × 2 + 1 × 4
rect. setwidth(5);
rect.setheight(7); = 512 + 192 + 16 + 4
cout>>"Total area : "<<rect.getarea( ) (1324)8 = (724)10
w

<<endl;
18. Multi-user Operating Systems :
return 0;
(i) It is used in computers and laptops that allow
};
w

same data and applications to be accessed by


Answers multiple users at the same time.
(ii) The users can also communicate with each
PART - I other. Windows, Linux and UNIX are examples
w

1. (a) Third generation for multi-user Operating System.


2. (d) Abstraction 19. Const Keyword: Const is the keyword used to declare
3. (d) 5 a constant. const keyword modifies / restricts the
4. (b) :: accessibility of a variable. So, it is known as Access
5. (d) spam modifier.
6. (d) * Example: int num = 100;

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
296 Sura’s ➠ 11th Std - Computer Science  Public Examination March - 2024 Question Paper with Answers

20. Void type has two important purposes: (iv) The type of derivation (the visibility mode),
(i) To indicate the function does not return a namely private, public or protected. If no
value visibility mode is specified ,then by default the

n
(ii) To declare a generic pointer. visibility mode is considered as private.

.i
21. Warez : Commercial programs that are made (v) The names of all base classes(parent classes)
available to the public illegally are often called warez.

m
separated by comma.

al
22. (i) Google
27. (i) State is a basic and important abstraction.
(ii) Bing

ad
(iii) yahoo. (ii) 
Computational processes have state. A

co
computational process starts with an initial
23. An algorithm is a sequence of instructions to

k
state. As actions are performed, its state changes.
accomplish a task or solve a problem.
Its ends with a final state.

vi
24. Output :
(iii) The state at any point of execution is simply the
0

s.
al
values of the variables at that point.
1
28. Truth Table of XOR gate:
.k
2

ok
3 A B A⊕B
w
4 0 0 0
w

5 o 0 1 1
6 1 0 1
w

7 1 1 0
ab
PART - III 29. 
25. Recycle bin is a special folder to keep the files or isupper() toupper()
folders deleted by the user, which means you still
This function is used to This function is used to
have an opportunity to recover them. The user cannot
ur

check the given character convert the given character


access the files or folders available in the Recycle bin
without restoring it. To restore file or folder from the is upper case. into its uppercese.
Recycle Bin This function will return This function will return the
.s

(i) Open Recycle bin. 1 if true otherwise 0. uppercase equivalent of the


(ii) Right click on a file or folder to be restored and given character.
select Restore option from the pop-up menu. Example : Example :
w

(iii) To restore multiple files or folders, select Restore isupper('a') will return 0 toupper('a') will return 'A'
all items.
(iv) To delete all files in the Recycle bin, select Empty 30.
w

the Recycle Bin. CD DVD


26. While defining a derived class, the derived class (i) Expansion is Expansion is Digital
should identify the class from which it is derived.The Compact-Disk Versatile Disc.
w

following points should be observed for defining the (ii) A standard CD can store A standard DVD can
derived class. about 700 MB of Data. hold 4.7 GB of data.
(i) The keyword class has to be used (iii) CD players cannot play DVD players can play
(ii) The name of the derived class is to be given after DVDs. CDs.
the keyword class. (iv) It stores upto 80 min of It can range from 4.7
(iii) A single colon(:) audio. GB to 17.08 GB.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s ➠ 11th Std - Computer Science  Public Examination March - 2024 Question Paper with Answers 297

31. Significant features of monitor: Both hardware and software together make the
(i) Monitor is the most commonly used output computer system to function. Every task given
device to display the information. It looks like a to a computer follows an Input-process - output

n
TV. cycle (IPO cycle).

.i
(ii) Pictures on a monitor are formed with picture
elements called PIXELS.

m
al
(iii) Monitors may either be Monochrome which
display text or images in Black and White or

ad
can be color, which display results in multiple

co
colors.

k
(iv) There are many types of monitors available
such as CRT (Cathode Ray Tube), LCD (Liquid

vi
Crystal Display) and LED (Light Emitting
Diodes). (i)  Input unit : Input unit is used to feed any form

s.
al
(v) The video graphics card helps the keyboard to
communicate with the screen.
of data to the computer, which can be stored in
the memory unit for further processing.
.k
(vi) It acts as an interface between the computer and Example : keyboard, mouse etc.

ok
w
display monitor. (ii) Central Processing Unit : CPU is the major
component which interprets and executes
32. "An array is a collection of variables of the same type
w

software instructions. It also control the


that are referenced by a common name".
operation of all other components such as
There are different types of arrays used in C++. They
o
w

memory, input and output units.


are:
(iii) Arithmetic and Logic Unit : The ALU is a
(i) One-dimensional arrays
ab
part of the CPU where various computing
(ii) Two-dimensional arrays
functions are performed on data. The ALU
(iii) Multi-dimensional arrays
performs arithmetic operations such as
33. #include<iostream> addition, subtraction, multiplication, division
using namespace std; and logical operations.
ur

int main ( )
{ Control Unit
int n = 5;
.s

do ALU
Input Unit Output Unit
{ Internal
cout<<n<<", "; Memory Data Path
Control Path
w

n − −;
Main Memory
}while (n>0);
} Secondary Storage
w

Output Components of a Computer


54321
PART - IV (iv) Control Unit : The control unit controls the
w

flow of data between the CPU, memory and I/o


34. (a) Components of a Computer : devices. It also controls the entire operation of
 The computer is the combination of hardware a computer.
and software. Hardware is the physical (v) Output Unit : An output unit is any hardware
component of a computer like motherboard, component that conveys information to users
memory devices, monitor, keyboard etc., while in an understandable form. Example : Monitor,
software is the set of programs or instructions. Printer etc.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
298 Sura’s ➠ 11th Std - Computer Science  Public Examination March - 2024 Question Paper with Answers

Memory Unit : The Memory Unit is of


(vi)  (b) Function overloading: The ability of the function to
two types which are primary memory and process the message or data in more than one form is
secondary memory. The primary memory is called as function overloading.

n
used to temporarily store the programs and Rules for function overloading :
data when the instructions are ready to execute.

.i
The overloaded function must differ in the
(i) 
The secondary memory is used to store the data number of its arguments or data types.

m
al
permanently.
(ii) The return type of overloaded functions are not
(OR)

ad
considered for overloading same data type.
(b) Th
 e Distributed Operating System is used to access

co
(iii) The default arguments of overloaded functions
shared data and files that reside in any machine around are not considered as part of the parameter list

k
the world using internet/intranet. The users can access as in function overloading.
if it is available on their own computer. The advantages

vi
of distributed Operating System are as follows 36. (a) Types of ROM:

s.
al
(i) A user at one location can make use of all the Read-only memory (ROM) :
resources available at another location over the (i) Read only memory refers to special memory
network.
.k
in a computer with pre-recorded data at

ok
(ii) Many computer resources can be added easily manufacturing time which cannot be modified.
w
in the network The stored programs that start the computer
(iii) Improves the interaction with the customers and perform diagnostics are available in ROMs.
w

and clients. (ii) 


ROM stores critical programs such as the
(iv) Reduces the load on the host computer. program that boots the computer. Once the
o
w

data has been written onto a ROM chip, it


35. (a) (i) (–21)10 + (5)10 cannot be modified or removed and can only
ab
– 21 = 101012  2 21 be read.
1's complement = 00010101  2 10 – 1 (iii) 
ROM retains its contents even when the
2 5 –0 computer is turned off. So, ROM is called as a
2's complement = 11101010
2 1 –0 non-volatile memory.
+1
ur

11101011 Programmable Read-Only Memory (PROM) :


510 = 1012 (i) 
Programmable read-only memory is also a
(– 21)10 + (5)10 = 11101011 non-volatile memory on which data can be
written only once. Once a program has been
.s

00000101
written onto a PROM, it remains there forever.
– 1610 Result = 11110000 (ii) PROM is manufactured as a blank memory,
whereas a ROM is programmed during
w

(ii) (– 12)10 + (15)10


the manufacturing process itself. PROM
Binary addition of -12 and 15 programmer or a PROM burner is used to
1210 = 00001100 write data to a PROM chip. The process of
w

1's complement = 11110011 programming a PROM is called burning the


Add 1 to LSB = +1 PROM.
2's complement = 11110100 Erasable Programmable Read-Only Memory
w

(EPROM)
( -12)10 = 11110100 2 15
(i)  Erasable Programmable Read-Only Memory
2 7–1
(15)10 = 00001111 is a special type of memory which serves as
2 3 –1
a PROM. The content can be erased using
= 100000011 1 –1
ultraviolet rays.
(OR) (ii) An EPROM differs from a PROM. PROM can
be written only once and cannot be erased.

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
Sura’s ➠ 11th Std - Computer Science  Public Examination March - 2024 Question Paper with Answers 299

(iii) EPROMs are used widely in personal computers many types of monitors available such as CRT
because they enable the manufacturer to (Cathode Ray Tube), LCD (Liquid Crystal
change the contents of the PROM to replace Display) and LED (Light Emitting Diodes).

n
with updated versions or erase the contents The video graphics card helps the keyboard
before the computer is delivered. to communicate with the screen. It acts as an

.i
Electrically Erasable Programmable Read-Only interface between the computer and display

m
al
Memory (EEPROM) monitor.
(i) Electrically Erasable Programmable Read-Only (ii) Plotter : Plotter is an output device that is used to

ad
Memory can be erased by exposing it to an produce graphical output on papers. It uses single

co
electrical charge. color or multi color pens to draw pictures.

k
(ii) Like other types of PROM, EEPROM retains (ii) Printers : Printers are used to print the

vi
its contents even when the power is turned information on papers. Printers are divided into
off. Comparing with all other types of ROM, two main categories:

s.
al
EEPROM is slower in performance. • Impact Printers
(OR) • Non Impact printers
.k Impact Printers : These printers print with
(b)  striking of hammers or pins on ribbon.

ok
w
S. if-else Switch For example, Dot Matrix printers and Line
No matrix printers are impact printers.
w

1. Expression inside if expression inside switch Non-Impact Printers : These printers do


statement decide whether statement decide which not use striking mechanism for printing. For
o
w

to execute the if block or case to execute. example, Laser printers and Inkjet printers are
under else block. non-impact printers.
ab
2. An if-else statement uses switch statement uses single (OR)
multiple statements for expression for multiple
multiple choices. choices. (b) Output :
Constructor of class student
3. If-else statement checks switch checks only for
Name : Bharathi
for equality as well as for equality.
ur

Roll no : 14
logical expression.
Marks : 100
4. The if statement evaluates switch statement evaluates Back to main
integer, character, pointer only character or a integer
.s

or floating-point type or data type. 38. (a) T


 ypes of Inheritance: There are different types
Boolean type. of inheritance viz., Single Inheritance, Multiple
5. If the condition is false If the condition is false then inheritance, Multilevel inheritance, hybrid inheritance
the else block statements the default statements are
w

and hierarchical inheritance.


will be executed. executed.
A B
37. (a) Output Unit : An output unit is any hardware A
w

component that conveys information to users in an


A C
understandable form. Example : Monitor, Printer B
Multiple Inheritance
etc. Single Inheritance
w

Output Devices : B C
A
(i) Monitor : Monitor is the most commonly
A
used output device to display the information.
D
It looks like a TV. Monitors may either be B
Hybrid Inheritance
Monochrome which display text or images B C D

in Black and White or can be color, which C


Hierarchical Inheritance

display results in multiple colors. There are Multilevel Inheritance

enquiry@surabooks.com Ph: 8124201000 / 8124301000


www.surabooks.com
300 Sura’s ➠ 11th Std - Computer Science  Public Examination March - 2024 Question Paper with Answers

(i) ingle Inheritance : When a derived class


S public:
inherits only from one base class, it is known as void setWidth(int w)
as single inheritance
{

n
(ii) Multiple Inheritance : When a derived class width = w;

.i
inherits from multiple base classes it is known
}

m
as multiple inheritance

al
void setHeight(int h)
(iii) H
 ierarchical inheritance : When more than
{

ad
one derived classes are created from a single base
height = h;

co
class , it is known as Hierarchical inheritance.
(iv) Multilevel Inheritance : The transitive nature }

k
of inheritance is itself reflected by this form of };

vi
inheritance. When a class is derived from a class class Rectangle: public Shape
which is a derived class – then it is referred to as

s.
al
{
multilevel inheritance.
public:
.k
(v) Hybrid inheritance : When there is a
int getArea()

ok
combination of more than one type of
{
w
inheritance, it is known as hybrid inheritance.
Hence, it may be a combination of Multilevel return (width * height);
w

and Multiple inheritance or Hierarchical }


and Multilevel inheritance or Hierarchical, };
o
w

Multilevel and Multiple inheritance. int main()


{
ab
(OR)
Rectangle Rect;
(b)
Rect.setWidth(5);
#include <iostream>
Rect.setHeight(7);
using namespace std;
ur

class Shape // Print the area of theobject.


{ cout<< "Total area: "<<Rect.getArea() <<endl;
private: return 0;
.s

int count; }
protected: Output:
int width, height; Total area: 35.
w


w
w

enquiry@surabooks.com Ph: 8124201000 / 8124301000

You might also like