11th STD Computer Science EM Guide Sample PDF 2024-25
11th STD Computer Science EM Guide Sample PDF 2024-25
com
.i n
m
al
COMPUTER SCIENCE
ad
co
k
HIGHER SECONDARY FIRST YEAR
vi
s.
al
.k
e
Based on the Updated New Textbook FreWorkbook
ok
e
Practic with
w
anual
Lab M
w
o Salient Features
w
ab
Answers for all Textual Questions.
E
xhaustive Additional MCQs, VSA, SA & LA questions with answers are given in
each chapter.
ovt. Model Question Paper - 2018 (Govt. MQP - 2018), First Mid-Term Test - 2018
G
ur
(FMT - 2018), Quarterly Exam - 2018, 2019 & '23 (QY - 2018, 2019 & '23), Half
Yearly Exam - 2018, 2019 & 2023 (HY - 2018, 2019 & '23), Instant Supplementary
Exam June 2019, Augsut 2022 & July 2023 (June 2019, Aug-'22 & July-'23),
.s
Public Exam March 2019, 2020, May 2022 , March 2023 & 2024 (Mar.2019, 2020,
May ‘22, Mar. '23& '24 ), Govt. Supplementary Exam September 2020 & 2021
(Sep. 2020 & Sep. 2021) and Common Revision Test (CRT '22) Questions are
w
SURA PUBLICATIONS
w
Chennai
n
Sura’s Computer science Guide for +1 Standard. A deep
.i
understanding of the text and exercises is rudimentary to have an
m
al
insight into Computer Science. The students and teachers have to
Code No : SG 274 carefully understand the topics and exercises.
ad
Sura’s Computer Science +1 Standard Guide encompasses
co
all the requirements of the students to comprehend the text and
Author : the evaluation of the textbook.
k
Mr. Shanmugasundaram
vi
It will be a teaching companion to teachers and a learning
(Post Graduate Teacher, Chennai) companion to students.
s.
al Exhaustive Additional MCQs, VSA, SA, LA questions with
answers are given in each chapter.
.k
Our Guides for XI & XII Standard These features will help students practice and learn
ok
w
✤ RuhÉ‹ jÄœ ciuüš effectively all the sections of the textbook.
✤ Sura’s Smart English Though these salient features are available in our Sura’s
w
✤ Sura’s Mathematics (EM/TM ) Computer Science Guide 11 th Standard, I cannot negate the
indispensable role of the teachers in assisting the student to
✤ Sura’s Physics (EM/TM)
o
w
Head Office:
Sura Publications 80562 94222
1620, ‘J’ Block, 16th Main Road, 81242 01000
w
Website : www.surabooks.com
98409 26027
(ii)
Contents
n
Chapter
No
Title P. No Month
.i
m
al
UNIT I - FUNDAMENTALS OF COMPUTER AND WORKING
WITH A TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX)
ad
co
1. Introduction to Computers 1-18
k
2. Number Systems 19-48 June
vi
3. Computer Organization 49-66
s.
al
4. Theoretical Concepts of Operating System 67-80
5. Working with Windows Operating System 81-98
.k
July
UNIT II - ALGORITHMIC PROBLEM SOLVING
ok
w
6. Specification and Abstraction 99-108
I MID TERM (June, July)
w
December
17. Computer Ethics and Cyber Security 280-289
18. Tamil Computing 290-292
HALF YEARLY EXAMINATION
w
(iii)
TO ORDER WITH US
n
SCHOOLS and TEACHERS:
We are grateful for your support and patronage to ‘SURA PUBLICATIONS’
.i
Kindly prepare your order in your School letterhead and send it to us.
m
al
For Orders contact: 81242 01000 / 81243 01000
DIRECT DEPOSIT
ad
A/c Name : Sura Publications A/c Name : Sura Publications
co
Our A/c No. : 36550290536 Our A/c No. : 21000210001240
k
Bank Name : STATE BANK OF INDIA Bank Name : UCO BANK
vi
Bank Branch : Padi Bank Branch : Anna Nagar West
IFSC : SBIN0005083 IFSC : UCBA0002100
s.
A/c Name :
al
Sura Publications A/c Name : Sura Publications
Our A/c No. : 6502699356
.k Our A/c No. : 1154135000017684
ok
Bank Name : INDIAN BANK Bank Name : KVB BANK
w
Bank Branch : Asiad Colony Bank Branch : Anna Nagar
IFSC : IDIB000A098 IFSC : KVBL0001154
w
payable at Chennai. The Demand Draft / cheque should be sent with your order
in School letterhead.
STUDENTS :
w
Sura Publications
w
1620, ‘J’ Block, 16th Main Road, Anna Nagar, Chennai - 600 040.
Phones : 044-4862 9977, 044-4862 7755.
Mobile : 96001 75757 / 81242 01000 / 81243 01000.
email : orders@surabooks.com Website : www.surabooks.com
(iv)
I UNIT-
Fundamentals Of Computer And Working With A Typical Operating Systems (Windows & Linux)
.i n
Chapter Introduction to Computers
m
al
ad
co
CHAPTER SNAPSHOT
k
1.1. Introduction to Computers 1.5.2. Central Processing Unit
vi
1.2. Generations of Computers 1.5.3. Output Unit
1.3. Sixth Generation Computing 1.5.4. Memory Unit
s.
al
1.4. Data and Information 1.5.5. Input and Output devices
1.5. Components of a Computer
1.6. Booting of Computer
.k
1.5.1. Input Unit
ok
Evaluation
w
w
3. Identify the output device [Mar. 2020; HY.'23] (a) Post on self Test
(a) Keyboard (b) Memory (b) Power on Software Test
(c) Power on Self Test
w
(a) Printer (b) Mouse 9. Which one of the following is the main memory?
(c) Plotter (d) Projector (a) ROM (b) RAM
[Ans. (b) Mouse] (c) Flash drive (d) Hard disk
w
[1]
n
to feed any form of hardware component
1. What is a computer?
.i
[Sep. 2021; Aug '22] data to the computer, that conveys
m
Ans. (i) A computer is an electronic device that which can be stored in information to users in
al
manipulates information, or data. It has the the memory unit for an understandable form.
ability to store, retrieve, and process data. further processing.
ad
(ii) Computer works faster than human being and
co
Example : Example :
given the values more accuracy and reliable Keyboard, mouse etc. Monitor, Printer etc.
k
2. Distinguish between data and information.
vi
8. Distinguish Primary and Secondary memory.
[FMT 2018] [HY. '23; Mar-'24]
s.
al
Ans. Data Information Ans. Primary Memory Secondary Memory
Data is defined as an Information is a It is used to It is used to store the
.k
unprocessed collection collection of facts from temporarily store the data permanently.
ok
of raw facts, suitable which conclusions may programs and data
w
for communication, be drawn. when the instructions
are ready to execute.
w
interpretation or
processing.
o It is volatile, the It is non-volatile, the
content is lost when content is available even
w
(iii) The logical operations of ALU promote the 2. Write the applications of computer.
decision making ability of a computer. Ans. The various applications of computers are,
(i) Business (ii) Education
5. Write the functions of control unit. [Mar. '23]
w
4. Name any three output devices. (ii) Pictures on a monitor are formed with picture
Ans. (i) Monitor elements called PIXELS.
(ii) Printer (iii) Monitors may either be Monochrome which
n
(iii) Plotter display text or images in Black and White or
can be color, which display results in multiple
.i
(iv) Speaker
colors.
m
al
(v) Multimedia projectors are the output devices. (iv) There are many types of monitors available
5. Differentiate optical and Laser mouse. [HY. 2018] such as CRT (Cathode Ray Tube), LCD (Liquid
ad
Crystal Display) and LED (Light Emitting
Ans. Optical Mouse Laser Mouse
co
Diodes).
Measures the motion Measures the motion and (v) The video graphics card helps the keyboard to
k
and acceleration of acceleration of pointer. communicate with the screen.
vi
pointer.
(vi) It acts as an interface between the computer and
It uses light source Laser Mouse uses Laser display monitor.
s.
al
instead of ball to Light.
judge the motion of Section - D
the pointer.
.k
Explain in detail
ok
Optical mouse is less Laser Mouse is highly
w
1. Explain the basic components of a computer with
sensitive towards sensitive and able to work a neat diagram.
surface. on any hard surface.
w
printing.
smaller (i)
Input unit : Input unit is used to feed any form
(iii) Development of robotics of data to the computer, which can be stored in
(iv) Natural Language Processing the memory unit for further processing.
w
n
(iv) Control Unit : The control unit controls the flow of
data between the CPU, memory and I/o devices. It
.i
Control Unit
also controls the entire operation of a computer.
m
al
(v) Output Unit : An output unit is any hardware ALU
Input Unit Output Unit
component that conveys information to users in an
ad
understandable form. Example : Monitor, Printer Internal
co
Memory Data Path
etc. Control Path
k
(vi) Memory Unit : The Memory Unit is of two types Main Memory
vi
which are primary memory and secondary memory.
The primary memory is used to temporarily store Secondary Storage
s.
al
the programs and data when the instructions are Components of a Computer
ready to execute. The secondary memory is used to
.k
store the data permanently. The Primary Memory is volatile, that is, the content is lost when the power supply
is switched off. The Random Access Memory (RAM) is an example of a main memory. The Secondary
ok
w
memory is non volatile, that is, the content is available even after the power supply is switched off. Hard disk,
CD-ROM and DVD ROM are examples of secondary memory.
w
Main Component
Ans. S.No Generation Period Merits/ Demerits
used
ab
1 First Generation 1940-1956 Vaccum tubes Bigin size
Consumed more power
Operating System
Machine language as well as Assembly
language was used.
w
n
Microcomputer series such as IBM and
Integrated Circuits APPLE were developed.
.i
(VLSI) Portable Computers were introduced.
m
al
5. Fifth 1980-till Ultra Large Scale Parallel Processing
Generation date Integration (ULSI) Super conductors
ad
Computers size was drastically reduced.
co
Can recognize Images and Graphics
k
Introduction of Artificial Intelligence and
Expert Systems
vi
Able to solve high complex problems
including decision making and logical
s.
al
reasoning
6. Sixth In future Paralleland Distributed computing
.k
Generation Computers have become smarter, faster
ok
w
and smaller
Development of robotics
w
Software
ab
3. Explain the following :
a. Inkjet Printer b. Multimedia projector c. Bar code / QR code Reader
Ans. a) Inkjet Printers:
(i)
Inkjet Printers use colour cartridges which combined Magenta, Yellow and Cyan inks to create color
ur
tones. A black cartridge is also used for monochrome output. Inkjet printers work by spraying ionised
ink at a sheet of paper.
(ii) They use the technology of firing ink by heating it so that it explodes towards the paper in bubbles or by
.s
using piezoelectricity in which tiny electric currents controlled by electronic circuits are used inside the
printer to spread ink in jet speed.
(iii) An Inkjet printer can spread millions of dots of ink at the paper every single second.
w
b) Multimedia Projectors:
(i) Multimedia projectors are used to produce computer output on a big screen.
w
n
(a) Computer (b) Analytical Engine
.i
1. How many types of Booting process in system ? (c) Abacus (d) Calculator [Ans. (c) Abacus]
m
(a) 3 (b) 2 [QY. 2018] 13. _____ is the main component of Second Generation
al
(c) 5 (d) 4 [Ans. (b) 2] computers. [Aug '22]
2. Which of the following is a Third generation (a) Vacuum tubes (b) Transistors
ad
computers? [Govt.MQP-2018] (c) Integrated circuits (d) Microprocessors
co
(a) Vacuum tubes (b) Transistor [Ans. (b) Transistors]
(c) Integrated Circuits (d) Microprocessor
k
[Ans. (b) Transistor] 2 Marks
vi
3. Which one of the following is Biometric Device? 1. Expand (i)BIOS (ii)ENIAC (iii)RAM (iv)ALU
[QY. 2018]
s.
[Govt.MQP-2018]
al
(a) Scanner (b) Fingerprint Scanner
Ans. (i) BIOS - Basic Input Output System.
(c) Light Pen (d) Mouse
(ii) ENIAC - Electronic Numerical Integrator
.k
[Ans. (b) Fingerprint Scanner]
And Calculator.
ok
4. Identify the Input device .................. . [FMT 2018]
(iii) RAM - Random Access Memory
w
(a) Printer (b) Mouse
(c) Plotter (d) Projector [Ans. (b) Mouse] (iv) ALU - Arithmetic and Logic unit
w
5. Expansion of GUI is .............. . [QY. 2018] 2. Give examples for Impact and Non impact
(a) Graphics User Interface o printers. [FMT 2018]
w
(b) Graphical User Information Ans. Impact : Dot Matrix printer and line dot matrix printer.
(c) Geographical User Information Non - Imapct : Laser printer and Inkjet printer.
ab
(d) Graphical User Interface 3. Write short note on registers. [FMT 2018]
[Ans. (d) Graphical User Interface] Ans. Registers are the high-speed temporary storage
6. Which generation of computer used Transistors? locations in the CPU. Hence, their contents can be
(a) First (b) Second [June 2019] handled much faster than the contents of memory.
(c) Third (d) Fourth [Ans. (b) Second] 4. Write Demerits of Artificial Intelligence. [QY. 2018]
ur
7. Plotter is a _______ device. [QY. 2019] Ans. (i) Machines need repairing and maintenance
(a) storage (b) input which need plenty of cost.
(c) output (d) memory [Ans. (c) output] (ii) The increasing number of machines leading to
8. Line printers are capable of printing much more unemployment and job security issues.
.s
than _______ lines per minute. [QY. 2019] 5. Write notes on fifith generation computers.
(a) 1000 (b) 1200 (c) 1500 (d) 1300 Ans. (i) Parallel Processing [QY. 2019]
[Ans. (a) 1000] (ii) Super conductors
w
9. Which Generations of computer used ULSI? (iii) Computers size was drastically reduced.
(a) Third (b) Fourth [HY. 2018] (iv) Can recognise Images and Graphics
(c) Fifth (d) Sixth [Ans. (c) Fifth] (v) Introduction of Artificial Intelligence and
w
2. Write the sequence of steps in boot process? (or) feature that uses biometric technology. Fingerprint
Explain the types of booting in computer. Reader / Scanner is very safe and convenient device
[Govt.MQP, FMT-2018; HY. 2019; July-'23; QY.'23] for security instead of password, that is vulnerable to
Ans. Booting process is of two types.
n
fraud and is hard to remember.
(i) Cold Booting (ii) Warm Booting
5 Marks
.i
(i) Cold Booting: When the system starts from
m
initial state i.e. it is switched on, we call it cold
al
1. Short answer on the following: [QY. 2018]
booting or Hard Booting. When the user presses a) Data b) Hardware
the Power button, the instructions are read from
ad
c) Natural Language Processing
the ROM to initiate the booting process.
co
(ii) Warm Booting: When the system restarts or d) Types of Memory e) Bit
when Reset button is pressed, we call it Warm Ans. (a) Data : The term data comes from the word
k
Booting or Soft Booting. The system does not datum, which means a raw fact. The data is a
vi
start from initial state and so all diagnostic tests fact about people, places or some objects.
need not be carried out in this case. There are (b) Hardware : Hardware is the physical
s.
al
chances of data loss and system damage as the component of a computer like motherboard,
data might not have been stored properly. memory devices, monitor, keyboard etc.,
.k
3. Write notes on multimedia projector. [QY. 2019] (c) Natural Language Processing : Natural
ok
Ans. (i) Multimedia projectors are used to produce Language Processing is a method used in
w
computer output on a big screen. artificial intelligence to process and derive
(ii)
These are used to display presentations in meaning from the human language.
w
meeting halls or in classrooms. (d) Types of Memory : The memory unit is of two
4. How Finger Print Scanner Working? [QY. 2018] types - Primary memory, Secondary memory.
o
w
Ans. Finger print Scanner: Fingerprint Scanners is a (e) Bit : Machine language is a collection of
fingerprint recognition device used for computer binary digits or bits that the computer reads and
ab
security, equipped with the fingerprint recognition interprets.
2. Differentiate Impact Printers and Non-Impact Printers. [QY. 2019 & '23]
Ans. S.No Impact Printers Non-Impact Printers
1. It uses ribbons / carbon papers to leave the It use ink cartridges and the impressions appear on
ur
4. Faster speeds around 250 words per second, Slower speeds around 1 page per seconds.
5. Example : Dot Matrix printers and line Example : Laser printers and Inkjet printers.
matrix printers
w
3. Explain Data and Information. [CRT & May '22] Information: Information is a collection of facts
Ans. Computer is an electronic device that processes the from which conclusions may be drawn. In simple
w
input according to the set of instructions provided words we can say that data is the raw facts that is
to it and gives the desired output at a very fast processed to give meaningful, ordered or structured
rate. Computers are very versatile as they do a information. For example Kavitha is 16 years old.
lot of different tasks such as storing data, weather This information is about Kavitha and conveys some
w
forecasting, booking airlines, railway or movie meaning. This conversion of data into information is
tickets and even playing games. called data processing.
Data: Data is defined as an un-processed collection of
raw facts, suitable for communication, interpretation
or processing. INPUT PROCESS OUTPUT
n
component that conveys information to users in an (ii) Printers : Printers are used to print the information
understandable form. Example : Monitor, Printer etc.
.i
on papers. Printers are divided into two main
m
Output Devices :
al
categories:
(i) Monitor : Monitor is the most commonly
• Impact Printers
ad
used output device to display the information.
It looks like a TV. Monitors may either be • Non Impact printers
co
Monochrome which display text or images in Impact Printers : These printers print with
k
Black and White or can be color, which display striking of hammers or pins on ribbon.
results in multiple colors. There are many types
vi
For example, Dot Matrix printers and Line
of monitors available such as CRT (Cathode Ray
matrix printers are impact printers.
s.
al
Tube), LCD (Liquid Crystal Display) and LED
(Light Emitting Diodes). The video graphics Non-Impact Printers : These printers do
not use striking mechanism for printing.
.k
card helps the keyboard to communicate with
the screen. It acts as an interface between the For example, Laser printers and Inkjet printers
ok
w
computer and display monitor. are non-impact printers.
o
w
2. In which year the concept of the analytical engine 7. Which generation gave a start to parallel
was invented? computing?
(a) fourth (b) fifth (c) sixth (d) seventh
w
computers belongs?
(a) 1956-1963 (b) 1940-1956 (a) bit level (b) instruction level
(c) 1964-1971 (d) 1980-1990 (c) task parallelism (d) Robotics
w
10. Which unit does the processing of data? 19. Which company developed first digital computer?
(a) CPU (b) Registers (a) Atanasoft Berry Computer
(c) Input unit (d) Output unit (b) AT & T bell (c) IBM
n
[Ans. (a) CPU] (d) Microsoft
.i
11. Which of the following is the heart of the [Ans. (a) Atanasoft Berry Computer]
m
computer?
al
(a) CPU (b) HDD (c) SDD (d) ANN 20. Which of the following are the computer systems
[Ans. (a) CPU]
ad
inspired by the biological neural networks?
(a) NLP (b) IBM
co
12. Which of the following operations of ALU promote
(c) Robotics (d) ANN [Ans. (d) ANN]
decision -making ability of a computer?
k
(a) Logical (b) Relational 21. Which of the following has become the dominant
vi
(c) Arithmetic (d) Binary paradigm in computer architecture?
s.
al
[Ans. (a) Logical] (a) Parallel computing
(b) parallel processing (c) Multi tasking
13. Which of the following is not a non volatile
.k
memory? (d) Multi processing [Ans. (a) Parallel computing]
ok
(a) ROM (b) Hard disk
w
22. In which device the keys are arranged in a cluster?
(c) CD-ROM (d) RAM (a) Keyboard (b) Keyer
w
17. Which of the following device uses CCD Electronic 25. How many classification of memories in memory
chip? unit?
(a) OCR (b) BCR (a) 2 (b) 3
w
(c) Voice Input Systems (d) Digital Camera (c) 4 (d) more than 2
[Ans. (d) Digital Camera] [Ans. (a) 2]
18. Who was the inventor of the electronic digital 26. How many types of Keyboards used to input the
w
computer? data?
(a) John Vincent Atanasoft (a) 3 (b) 2 (c) 4 (d) 5
(b) J. Presper Eckert [Ans. (a) 3]
(c) John Mauchly
27. How many types of pointing device are there?
(d) Charles babbage
(a) 2 (b) 3 (c) 1 (d) Many
[Ans. (a) John Vincent Atanasoft] [Ans. (a) 2]
n
[Ans. (a) Laser] (c) SSD (d) All of these
.i
29. Which printer do not use striking mechanism for [Ans. (d) All of these]
m
printer?
al
38. Who assisted Douglas Engelbart to invent the
(a) Inkjet (b) Laser mouse?
(c) Thermal (d) All of these
ad
(a) Berry (b) Steve Kirsch
[Ans. (d) All of these]
co
(c) Bill English (d) Bill Gates
30. W
hich device is used to produce computer output
k
[Ans. (c) Bill English]
on a big screen?
vi
(a) Monitor (b) LED 39. W hich device is used to enter information directly
(c) Projector (d) Monochrome Monitor into the computer's memory?
s.
al
[Ans. (c) Projector]
(a) Keyboard
(c) Mouse
(b) Scanner
(d) Plotter
.k
31. W
hich of the following is the diagnostic testing [Ans. (b) Scanner]
ok
sequence of the computer hardware?
w
40. Which device used CCD chip?
(a) POST (b) BIOS (c) MAR (d) MBR (a) Light pen (b) Scanner
w
any computer hardware not defected? 41. Which device is used to input by pressing one or
more switches?
(a) BIOS (b) BUS (c) RAM (d) POST
ab
[Ans. (a) BIOS] (a) Keyboard (b) Mouse
(c) Touch Screen (d) Keyer
33. W
hich device produce graphical output on
papers? [Ans. (d) Keyer]
(a) Scanner (b) Touch Screen 42. How many types of monitors are there?
ur
(c) Plotter (d) Track ball (a) 2 (b) 3 (c) 4 (d) Many
[Ans. (b) 3]
[Ans. (c) Plotter]
43. Which of the following is an impact priners
34. W
hich code checks partition table for an active (a) Inkjet (b) Fax
.s
partition in a computer?
(c) Dot Matrix (d) Laser
(a) MBR (b) Marse (c) Binary (d) Object
[Ans. (c) Dot Matrix]
[Ans. (a) MBR]
w
Generation
36. Which of the following devices not stores the date (ii) Batch Processing 2 Fourth
permanently? Generation
(a) HDD (b) SSD (iii) NLP 3 Six Generation
(c) Tape Drives (d) RAM
(iv) Introduction of 4 Fifth Generation
[Ans. (d) RAM]
Laptop
Codes: 4.
List I List II
(i) (ii) (iii) (iv)
(a) 4 1 3 2 (i) Used to feed data to 1 CPU
the computer
n
(b) 1 3 2 4
(ii) Controls the operation 2 ALU
.i
(c) 3 4 1 2
of memory Unit
m
(d) 4 3 1 2
al
[Ans. (a) (i)-4, (ii)-1, (iii)-3, (iv)-2] (iii) Computing functions 3 Control
are performed on data Unit
ad
2.
List I List II (iv) Controls the flow of
co
4 Input Unit
(i) EDVAC 1 Second Generation data between memory
k
Computer unit and I/O Units.
vi
(ii) APPLE 2 Fifth Generation
Computer Codes:
s.
(iii) IBM 1620 3 First Generation
al (i)
(a) 4
(ii)
1
(iii)
2
(iv)
3
.k
Computer
(b) 2 1 4 3
ok
(iv) Expert System 4 Fourth Generation (c) 4 3 1 2
w
Computer
(d) 3 4 1 2
w
possible
(c) 4 3 1 2
(iv) Mass Storage 4 Temporarily stores
(d) 2 3 1 4
Device data
w
(a) 4 1 3 2
(i) Input unit 1 I/o devices
(b) 2 1 4 3
(ii) Memory unit 2 Monitor
(c) 4 3 1 2
(d) 3 4 1 2 (iii) Control unit 3 Rom
[Ans. (b) (i)-2, (ii)-1, (iii)-4, (iv)-3] (iv) Output unit 4 Keyboard
n
(b) 3 4 2 1 [Ans. (d) Fourth]
6. The fifth generation computers belongs to ...........
.i
(c) 4 3 1 2
(a) 1971-1980 (b) 1980- till date
m
(d) 2 3 1 4
al
[Ans. (c) (i)-4, (ii)-3, (iii)-1, (iv)-2] (c) 1964-1971 (d) 1940-1956
[Ans. (b) 1980-till date]
ad
7.
co
List I List II 7. Name the software introduced in fifth generation
computers ................... .
k
(i) Information 1 Motherboard (a) Artificial Neural Networks
vi
(ii) Hardware 2 Set of programs (b) Artificial Intelligence (c) Robotics
(iii) Data 3 Convey some (d) Natural language processing
s.
(iv) Software 4
meaning
al
Set of raw facts
[Ans. (b) Artificial Intelligence]
.k
8. Robotics developed in .................. generation.
ok
Codes: (a) Third (b) Fourth (c) Fifth (d) Sixth
w
(i) (ii) (iii) (iv) [Ans. (d) Sixth]
(a) 1 2 3 4
w
14. Expansion of ALU is .................... . 24. The conversion of data to information is called
(a) Arithmetic Logical Unit ........... .
(b) Accumulator Logical Unit (a) Data Digitization
n
(c) Arithmetic Language Unit (b) Data Processing
.i
(d) None of these (b) Data Management
m
[Ans. (a) Arithmetic Logical Unit] (d) All of these
al
[Ans. (b) Data Processing]
15. The memory unit is of .............. kinds.
ad
(a) 3 (b) 4 (c) 2 (d) 5 25. A set of instructions given to the computer is
co
[Ans. (c) 2] called ............. .
16. Optical Mouse invented in the year .................. . (a) Information (b) Data
k
(a) 1968 (b) 1973 (c) 1988 (d) 1981 (c) Input (d) Program
vi
[Ans. (c) 1988] [Ans. (d) Program]
s.
al
17. Laser mouse has as many as ............... buttons. 26. The mechanical mouse introduced in the year .......
(a) 10 (b) 11 (c) 12 (d) 3 (a) 1978 (b) 1988 (c) 1968 (d) 1958
.k [Ans. (c) 1968]
[Ans. (c) 12]
ok
18. Expansion of CCD is ................. 27. T
he Red, Green or Blue led used mouse in
w
(a) Coupled Changed Device invented by .................
(a) John Mauchly (b) Steve Kirsch
w
(d) Camera changed Divider (d) Presper Eckert [Ans. (b) Steve Kirsch]
[Ans. (b) Changed Coupled Device] 28. The expansion of USB is ................
ab
(a) Universal Serial Bus
19. Expansion of CPS is ...................... . (b) Uniform Serial Bus
(a) Character Per Second (b) Copy Per Second (c) Uniform Serious Bus
(c) Code Per Second (d) Character Per Screen (d) Universal Serial BIOS
[Ans. (a) Character Per Second] [Ans. (a) Universal Serial Bus]
ur
20. The first computer monitor was released in the 29. The expansion of CRT is ................
year .................. . (a) Cathode Ray Tube
(a) 1980 (b) 1983 (c) 1963 (d) 1973 (b) Cathode Radio Tube
.s
(b) Very Logical Small Integer Circuits 30. The expansion of LCD is ..............
(c) Very Large Scale Integrated Circuits (a) Liquid Cathode Diodes
(d) Volatile Large Scale Integrated Circuits (b) Liquid Cluster Display
w
[Ans. (c) Very Large Scale Integrated Circuits] (c) Liquid Crytal Display
22. The first digital computer name was ............. . (d) Live Extract Display
(a) EDVAC (b) UNIVACI [Ans. (b) Liquid Cluster Display]
w
(c) ENIAC (d) IBM 1620 31. The expansion of LED is ...............
[Ans. (c) ENIAC] (a) Light Extract Display
23. Artificial neurons are organized in ....... . (b) Light Emitting Diodes
(a) Nodes (b) Layers (c) Liquid Emitting Diodes
(c) Signals (d) Units (d) Liquid Extract Display
[Ans. (b) Layers] [Ans. (c) Liquid Emitting Diodes]
n
[Ans. (d) 1973] (d) Fifth generation – ULSI
.i
[Ans. (c) Fourth generation – Vacuum tubes]
33. The expansion of VGA is ..............
m
al
(a) Visual Graphics Adapter VI. Consider the Following Statement.
ad
(b) Video Graphics Adapter 1. Assertion (A) : Computers have now become an
indispensable part of our lives.
co
(c) Video Graphics Array
Reason (R) : Computers have revolutionized
(d) Voice Graphics Array
k
out lives with their accuracy and
[Ans. (c) Video Graphics Array]
vi
speed of performing a job, it is
n error will half the boot process found in ..........
34. A truly remarkable.
s.
al
(a) Both (A) and (R) are true and (R) is the correct
(a) BIOS (b) POST explanation of A.
(c) HDD (d) I/O System
.k
[Ans. (b) POST] (b) Both (A) and (R) are true and (R) is not the
correct explanation of (A).
ok
35. The process of loading an OS in a computer RAM
w
is known as ............ (c) (A) is true, but (R) is false.
(a) POST (b) BIOS (d) (A) is false, but (R) is true.
w
[Ans. (a) Both (A) and (R) are true and (R) is the
(c) Booting (d) All of these
correct explanation of (A)]
o
w
[Ans. (d) Monitor] (a) Both (A) and (R) are true and (R) is the correct
Reason : Monitor is the most commonly used output explanation of A.
device to display the information. Other three are (b) Both (A) and (R) are true and (R) is not the
examples of input device. correct explanation of A.
.s
explanation of (A).
1. (a) Impact printers – Dot Matrix printer (b) Both (A) and (R) are true and (R) is not the
correct explanation of (A).
(b) Non–Impact printers – Laser printer
(c) (A) is true, but (R) is false.
(c) Hardware – Keyboard
(d) (A) is false, but (R) is true.
(d) Software – CPU [Ans. (b) Both (A) and (R) are true and (R) is not
[Ans. (d) Software – CPU] the correct explanation of (A)]
n
(i) Machine language programs are done in first
9. Write a note on Digital Camera.
.i
generation
Ans. It captures images / videos directly in the digital form.
m
al
(ii) Third generation computers are not more reliable
It uses a CCD (Charge Coupled Device) electronic
(iii) Voice recognition software developed in fifth chip. When light falls on the chip through the lens, it
ad
generation computer
converts light rays into digital format.
co
(iv) Micro processors are used in fourth generation
10. What is use of VGA?
k
computer
Ans. The screen monitor works with the VGA (Video
vi
(a) Only (i)
(b) Only (i) and (iv) Graphics Array). The video graphics card helps the
s.
al
keyboard to communicate with the screen. It acts as an
(c) Only (iii) and (iv)
interface between the computer and display monitor.
(d) Only (i) (iii) and (iv)
.k
Usually the recent motherboard incorporates built in
[Ans. (b) Only (i) and (iv)]
ok
video card.
w
Very Short Answers 2 MARKS 11. Write the two main categories of Printer.
w
4. Name the softwares introduced in fifth generation 13. What makes Charles Babbage the father of
computers. computing?
Ans. (i) Artificial Intelligence Ans. Charles Babbage radical ideas and concept of the
(ii) Expert Systems Analytical Engine (It contained an ALU, basic flow
.s
5. Name the types of computer introduced in Fourth control and integrated memory) makes him the father
generation computers. of computing.
Ans. (i) Microcomputer
w
(iv) Natural Language Processing 15. Write the tools in which nano technology was
7. What is NLP? born.
Ans. Natural Language Processing is the ability of a Ans. The right tools, such as the scanning tunneling
computer program to understand human language. It microscope (STM) and the atomic force microscope
is a component of artificial intelligence. (AFM), the age of nano-technology was born.
n
Process- Output Cycle (IPO cycle).
Ans. (1) It is slow as compared to non-impact printers
.i
17. Name the different keys available in the keyboard. (2) It is not best suited for graphics
m
al
Ans. There are different set of keys available in the (3) It is not possible to obtain colour output.
keyboard such as character keys, modifier keys,
ad
system and GUI keys, enter and editing keys, Short Answers 3 MARKS
co
function keys, navigation keys, numeric keypad and
lock keys. 1. Write a note Vaccum tube.
k
Ans. (i) Vaccum tubes contain electrodes for controlling
18. Which device is used to draw a lines?
vi
electron flow and were used in early computers
Ans. Light Pen is an input device which is used to draw as a switch or an amplifier.
s.
al
lines or figures on a computer screen. It is touched (ii) Vaccum tubes are big in size and consumed
to the CRT screen where it can detect faster on the more power.
.k
screen as it passes.
2. Define Transistor.
ok
19. Define Pixels.
w
Ans. (i) The transistor ("transfer resistance") is made up
Ans. Pictures on a monitor are formed with picture of semi-conductors.
w
Ans. The types of monitors available such as CRT modulation or switching of an electronic signal.
(Cathode Ray Tube), LCD (Liquid Crystal Display) Define Punched cards.
ab
3.
and LED (Light Emitting Diodes).
Ans. Punch cards also known as Hollerith cards are paper
21. How the date travel through control bus? cards containing several punched or perforated holes
Ans. The date travel in both unidirectional and bidirectional that were punched by hand or machine to represent
due to the internal connection with in the computer data.
ur
Ans. (i) Program counter Ans. Dot Matrix Printer Laser Printer
(ii) Instruction Register Printing speed is slow. Printing speed is high.
(iii) Memory Address Registers
Suitable for black and Suitable of colour
w
Chip.
Ans. If the hardware is not detected, a particular pattern
of beeps will inform about the error. An error (ii) The IC is a package containing many circuits,
found in the POST is usually fatal (that is, it causes pathways, transistors, and other electronic
current program to stop running) and will halt the components all working together to perform a
boot process, since the hardware check is absolutely particular function or a series of functions.
essential for the computer's functions.
n
(ii) It is used to describe a computerized machine feature that uses biometric technology. Fingerprint
.i
designed to respond to input received manually Reader / Scanner is a very safe and convenient
m
al
or from its surroundings. device for security instead of using passwords,
7. What is Nano-technology? which is vulnerable to fraud and is hard to
ad
Ans. Nano-technology, is an engineering, science, and remember.
co
technology that develops machines or works with Output Devices :
k
one atom or one molecule that is 100 nanometers or (i) Monitor: Monitor is the most commonly
vi
smaller.
used output device to display the information.
8. Write a note on Touch Screen. It looks like a TV. Monitors may either be
s.
al
Ans. (i) A touch screen is a display device that allows
the user to interact with a computer by using the
Monochrome which display text or images in
Black and White or can be color, which display
.k
finger. results in multiple colors. There are many types
ok
(ii) It can be quite useful as an alternative to a of monitors available such as CRT (Cathode Ray
w
mouse or keyboard for navigating a Graphical
Tube), LCD (Liquid Crystal Display) and LED
User Interface (GUI).
(Light Emitting Diodes). The video graphics
w
Ans. (i) POST (Power-On Self-Test) is the diagnostic Ans. (i) Mechanical Mouse :
testing sequence that a computer's basic input/
output system runs to determine if the computer A small ball is kept inside and touches the pad
keyboard, random access memory, disk drives through a hole at the bottom of the mouse.
.s
and other hardware are working correctly. When the mouse is moved, the ball rolls. This
(ii) If the necessary hardware is detected and found movement of the ball is converted into signals
to be operating properly, the computer begins to and sent to the computer.
w
surface.
(i) Scanner: Scanners are used to enter the
information directly into the computer’s memory. (iii) Laser Mouse:
This device works like a xerox machine. The Measures the motion and acceleration of pointer.
scanner converts any type of printed or written Laser Mouse uses Laser Light. Laser Mouse is
information including photographs into a digital highly sensitive and able to work on any hard
format, which can be manipulated by the computer. surface.
n
pins on ribbon. These printers can print on multi- (ii) It makes a laser beam scan back and forth across
.i
part (using carbon papers) by using mechanical
a drum inside the printer, building up a pattern.
m
pressure.
al
It can produce very good quality of graphic
(ii) For example, Dot Matrix printers and Line
matrix printers are impact printers. images.
ad
(iii) A Dot matrix printer that prints using a fixed Inkjet Printers:
co
number of pins or wires. Each dot is produced (i) Inkjet Printers use colour cartridges which
k
by a tiny metal rod, also called a “wire” or
combined Magenta, Yellow and Cyan inks to
vi
“pin”, which works by the power of a tiny
create color tones.
electromagnet or solenoid, either directly or
s.
al
through a set of small levers. (ii) A black cartridge is also used for monochrome
(iv) It generally prints one line of text at a time. The output. Inkjet printers work by spraying ionised
.k
printing speed of these printers varies from 30 to ink at a sheet of paper.
ok
1550 CPS (Character Per Second). (iii) They use the technology of firing ink by heating
w
4. Explain Non-Impact printers with an examples. it so that it explodes towards the paper in
w
for printing. They use electrostatic or laser circuits are used inside the printer to spread ink
technology. in jet speed.
ab
(ii) Quality and speed of these printers are better (iv) An Inkjet printer can spread millions of dots of
than Impact printers. For example, Laser ink at the paper every single second.
printers and Inkjet printers are non-impact
printers.
ur
.s
w
w
w
n
Chapter Number Systems
.i
m
al
ad
CHAPTER SNAPSHOT
co
k
Part I - Number Systems 2.7 Representing Characters in Memory
2.1 Number Systems - Introduction
vi
2.7.1 Binary Coded Decimal (BCD)
2.2 Data Representations 2.7.2 American Standard Code
s.
al
2.3 Different Types of Number Systems for Information Interchange
2.3.1 Decimal Number System (ASCII)
.k
2.3.2 Binary Number System 2.7.3 Extended Binary Coded
ok
2.3.3 Octal Number System Decimal Interchange Code
w
2.3.4 Hexadecimal Number System (EBCDIC)
2.4 Number System Conversions
w
2.7.5 Unicode
2.4.3 Decimal to Hexadecimal
Part II - Boolean Algebra
Conversion
ab
2.4.4 Conversion of fractional Decimal 2.8. Boolean Algebra - Introduction
to Binary 2.8.1 Binary valued quantities
2.4.5 Binary to Decimal Conversion 2.8.2 Logical Operations
2.4.6 Binary to Octal Conversion 2.8.3 Truth Table
ur
[19]
Evaluation
Section - A Section - B
n
Very Short Answers
.i
Choose the correct answer:
m
al
1. What is data?
1. Which refers to the number of bits processed by a
Ans. The term data comes from the word datum, which
computer’s CPU? [Mar-'24]
ad
means a raw fact. The data is a fact about people,
(a) Byte (b) Nibble
co
places or some objects.
(c) Word length (d) Bit
k
[Ans. (c) Word length] 2. Write the 1’s complement procedure.
vi
2. How many bytes does 1 KiloByte contain?[Aug '22] Ans. Step 1: Convert given Decimal number into Binary
(a) 1000 (b) 8 Step 2: Check if the binary number contains 8 bits,
s.
[QY. '23]
(c) 4
al
(d) 1024[Ans. (d) 1024] if less add 0 at the left most bit, to make it
.k as 8 bits.
3. Expansion for ASCII [HY. '23]
Step 3: Invert all bits (i.e. Change 1 as 0 and 0 as 1).
ok
(a) American School Code for Information
w
Interchange 3. Convert (46)10 into Binary number. [Aug '22]
(b) American Standard Code for Information Ans.
w
Interchange
2 46
(c) All Standard Code for Information Interchange
o
w
6. For 11012 the equalent Hexadecimal equivalent cannot find 1’s complement.
is? [May ' 22]
(a) F (b) E 5. List the encoding systems that represents
w
n
1. What is radix of a number system? Give example. system.
[Aug '22] (ii) Therefore it can handle 256 (28) characters.
.i
Ans. A numbering system is a way of representing This system is formulated by the department
m
al
numbers. Each number system is uniquely identified of Electronics in India in the year 1986-88
by its base value or radix. Radix or base is the count and recognized by Bureau of Indian Standards
ad
of number of digits in each number system. Radix or (BIS).
co
base is the general idea behind positional numbering (iii) Now this coding system is integrated with
system. Unicode.
k
Example : Add a) -2210+1510 b) 2010+2510
vi
5. [QY '23]
Binary Number System - Radix 2
Octal Number System - Radix 8
s.
Ans. (a) -2210+1510
al
[Govt.MQP; HY. 2018]
Decimal Number System - Radix 10
Hexadecimal Number System - Radix 16.
.k 2 22 2 15
ok
2. Write note on binary number system. [July-'23] 2 11 – 0 2 7 –1
w
Ans. (i) There are only two digits in the Binary system,
2 5 –1 2 3 –1
namely, 0 and 1. The numbers in the binary
w
2 75 – 0 (b) 2010+2510
2 37 – 1 2 20 2 25
w
2 18 – 1 2 10 – 0 2 12 – 1
2 9 –0 2 5 –0 2 6 –0
2 4 –1
w
2 2 –1 2 3 –0
2 2 –0
1 – 0 1 –1
1 –0
w
= (10100)2 = (11001)2
15010 = (10010110)2
8 bit format of 2010 = 00010100
100101102 = ?
10 010 110 8 bit format of 2510 = 00011001
2010 + 2510 = 00101101
2 2 6
100101102 = 2268. 2010 + 2510 = 001011012
n
1. a)
Write the procedure to convert fractional
Decimal to Binary
.i
[CRT '22; Mar. '23] 2 98
m
b) Convert (98.46)10 to Binary
al
2 49 – 0
[FMT 2018 ; Sep.2020; Mar. '23]
2 24 – 1
ad
Ans. a) he method of repeated multiplication by
T
2 has to be used to convert such kind of 2 12 – 0
co
decimal fractions. The steps involved in the 2 6 –0
k
method of repeated multiplication by 2: 2 3 –0
vi
Step 1: Multiply the decimal fraction by 2 and note 9810 = 1100010
1 –1
the integer part. The integer part is either
s.
al
0 or 1. 8 bit format of 9810 = 01100010
1's complement = 10011101
Step 2: D
iscard the integer part of the previous
.k
Add 1 bit = +1
product. Multiply the fractional part of the
ok
2's complement = 10011110
w
previous product by 2. Repeat Step 1 until
the same fraction repeats or terminates (0). b) -135
w
of decimal fraction.
2 33 – 1
Step 4: T
he final answer is to be written from first
ab
2 16 – 1
integer part obtained till the last integer part
obtained. 2 8 –0
b) 98.4610 2 4 –0
1. Integer part 2 2 –0
ur
2 98 1 – 0 13510 = 10000111
1's complement = 01111000
2 49 – 0
Add 1 bit = +1
.s
2 24 – 1
2's complement = 01111001
2 12 – 0
3. a) Add 11010102+1011012 [Sep. 2020; July-'23]
2 6 –0
w
2. Fractional part
+101101
0.46 × 2 = 0.92 = 0
10010111
0.92 × 2 = 1.84 = 1
w
n
(ii) Dereference pointer to class member following expressions?
.i
24. Write a note on comment statement. int a = 4;
m
al
a + = (a++) + (++a) + a;
Ans. All statements that being with // are treated as
Ans. a = 20
comments. Comments are simply ignored by
ad
compilers. i.e., compiler does not execute any 34. What is the difference between '/' and '%'
co
statement that begins with a // operator?
k
25. What is meant by cascading of operator? Ans. (i) The '/' operator results in quotient when a
vi
number is divided by other number.
Ans. The multiple use of input and output operators
(ii) The'%' operator results in remainder when a
such as >> and <<in a single statement is known as
s.
al
number is divided by other number.
cascading of I/O operators.
35. What will be the output of the following code?
.k
26. What is the use of return statement?
int i = 6, j = 10;
ok
Ans. return is a keyword which is used to return the value
w
i+ = i++ - ++ j + i ;
what you specified to a function. Cout <<"i = " << i;
w
27. Name any tour familiar C++ compilers with IDE Cout << "j = " << j;
Ans. Dev C++, Eclipse, Net Beans, Code::blocks, Digital Ans. i = 7
o
w
29. What are punctuators? 37. We have two variable A and B. Write C++
Ans. Punctuators are symbols, which are used as delimiters statements to calculate the result of division of B
ur
in constructing C++ programs. They are also called by A and calculate (a) Quotient of the division (b)
remainder of the division?
as "Separators"
Ans. (a) B/A (b) B%A
30. What do you mean by precedence of operators?
.s
n=0
Ans. Unary operators Binary operators 39. What is the value of i of the following code
It performs operation It performs operation on executes?
w
n
in your program, an error message will occur on cin
and cout; and we will not be able to get any input or = 60 + 12 = 72
.i
send any output. 50. If a = 4, b = 3; find the value of
m
al
42. What is the purpose of using preprocess statement c=a++ *6 + ++b*5+10;
in C++? Ans. c = a++ *6 + ++b*5+10
ad
Ans. The C++ programs being with include statements
= 4 * 6 + 4×5 + 10
co
starting with a # (hash / pound). The symbol # is a
directive for the preprocessor. That means, these = 24+20+10 = 54
k
statements are processed before the compilation 51. If a= 12, b=8, find the value of
vi
process begins.
a * = ++a/6 + b ++%3;
43. Write a note on size of () operators.
s.
al
Ans. a* = ++ a/6+ b++ %3;
Ans. It is called as compile time operator. It returns the
= a* (++a/6 + b++%3) = 12*(13/6 + 8% 3)
length of a variable in bytes.
.k
= 12 * (2+2) = 48
ok
44. Write a note on bitwise one's compliment
w
operator? 52. Indicate whether the following statements result
Ans. The bitwise One's compliment operator ~ (Tilde), in True or False?
w
inverts all the bits in a binary pattern, that is, all (i) 5+3 > 7 && 7> = 4+3
1's become 0 and all 0's become 1. This is an unary (ii) 3= = 4 && 5 = = 5
o
w
operator.
(iii) 3 > 0 ¦ ¦ 0 < – 14
45. What is the use of relational operator? Ans. (i) True (ii) false (iii) True
ab
Ans. Relational operators are used to determine the
53. What do you mean by precedence of operators?
relationship between its operands. When the
Ans. The hierarchical order in which the operators are used
relational operators are applied to two operands, the
for operation is known as precedence of operator.
result will be a Boolean value. 1 or 0 represents True
ur
operand and the decrement operator subtracts 1 from results. Floating point numbers can also be written in
its operand. exponent notation.
47. What is meant by non-graphical characters? 56. What is use of double data type?
w
Ans. Non-printable characters are also called as non- Ans. The double is also used for handling floating point
graphical characters. Non-printable characters are numbers. But, this type occupies double the space
those characters that cannot be typed directly from a than float type. This means, more fractions can be
w
keyboard during the execution of a program in C++. accommodated in double than in float type. The
double is larger and slower than type of float.
48. If a= 58, find a = a++ + ++a;
57. Name the Modifiers you can use with Integer data
a = a++ + ++a type?
Ans. a = 58 + 60 = 118 Ans. short, unsigned short, signed short, int, unsigned int,
signed int, long, unsigned long
58. How will you declare more than one variable in a 65. Name the classification of datatypes in C++.
single statement? write the syntax example. Ans. In C++, the data types are classified as three main
Ans. Declaration of more than one variable: More than one categories (1) Fundamental data types (2) User-
n
variable of the same type can be declared as a single defined data types and (3) Derived data types.
statement using a comma separating the individual
.i
variables. 66. What is datatypes?
m
al
Syntax : <data type> <var1>, <var2>,<var3>.....<var_n>; Ans. A datatype is a classification of the type of data that a
Example : int num1, num2, sum; variable can hold in computer programming
ad
59. What is known as Access Modifier? 67. Write the advantages of using float datatype?
co
Ans. keyword modifiers / restricts the accessibility of a Ans. There are two advantages of using float data types.
k
variable. So, it is known as Access modifier. (1) They can represent values between the integers
vi
60. Write the Syntax of declaring reference variable. (2) They can represent a much greater range of
Ans. Syntax:
s.
values.
al
<type><&reference_variable> = <original_variable>
68. Write the disadvantages of using float datatype.
.k
61. What are the types of casting show in by the Ans. Floating point operations are slower than integer
ok
following examples? operations. This is a disadvantage of floating point
w
a. double x = 72.5; numbers.
in+y=(int)x;
w
sort precision and can range the values from – 3.4 as a particular data type is to allocate appropriate
E+38 to 3.4E+38, where as double type literal is space in memory. As per the stored program concept,
used for dons precisions and can range the values for every data should be accommodated in the main
memory before they are processed. So, C++ compiler
.s
–1.7E+308 to 1.7E+308
allocates specific memory space for each and every
63. State the values of n and ch?
data handled according to the compiler's standards.
char c= 'B';
71. What is the use of modifier?
w
int n = c+1;
Ans. Modifiers are used to modify the storing capacity of
char ch = (char)n;
a fundamental data type except void type. Modifiers
value of
w
n
designed to use with the insertion (<<) and extraction
point numbers. Suffix can be used to assign the same
.i
operators.
value as a different type. For example, to store 45 in
m
al
81. Name the commonly used manipulators in C++
an int, long, unsigned int and unsigned long int, use
Ans. The Commonly used manipulators are: endl, setw,
suffix letter L or U (eigther case) with 45 i.e. 45L or
ad
setfill, setprecision and setf.
45U. This type of declaration instructs the compiler
co
to store the given values as long and unsigned. 82. Write the members of iomanip.h.
k
Ans. setw, setfill, setprecision and setf manipulators are
74. What are the two values associated with a
vi
members of iomanip header life.
symbolic variable?
83. Write a note on endl
s.
al
Ans. There are two values associated with a symbolic
Ans. endl is used as a line feeder in C++. It can be used
variable; they are R-value and L-value.
as an alternate to'\n', in other words, endl inserts a
.k
R-value is data stored in a memory location new line and then makes the cursor to point to the
ok
L-value is the memory address in which the
w
beginning of the next line.
R-value is stored.
84. Differentiate endl and '\n'.
w
75. Define variable. o Ans. (i) endl - Inserts a new line and flushes the buffer
Ans. Variables are used-defined names assigned to specific (Flush means - clean).
w
memory location in which the values are stored. (ii) '\n'- Inserts only a new line.
ab
76. What is meant by Declaration? 85. Write a note on setfill() manipulator.
Ans. setfill ( ) : This manipulator is usually used after
Ans. Declaration is a process to instruct the compiler to
setw. If the presented value does not entirely fill the
allocate memory as per the type that is specified
given width, then the specified character in the setfill
along with the variable name.
ur
occupied with some unknown value. These unknown (ii) Syntax : setprecision (number of digits);
values are called as "Junk" or "Garbage" values. setprecision can also be used to set the number
w
Examples:
87. What is an expression?
int num = 100;
float pi = 3.14; Ans. An expression is a combination of operators,
w
18. How the instantiating object is done in C++? 27. Write a note on destructor.
Ans. Instantiating object is done using constructor. Ans. When a class object goes out of scope, a special
19. Why the structure or an array initilization not function called the destructor gets executed. The
n
possible at the time of declaration? destructor has the same name as the class tag but
.i
Ans. The initialization of class type object at the time prefixed with a ~(tilde). Destructor function also
m
return nothing and it does not associated with anydata
al
of declaration similar to a structure or an array is
not possible because the class members have their type.
ad
associated access specifiers (private or protected or 28. What the constructor and Destructor gets executed?
public).
co
20. What is default constructor? Give example. Ans. When an instance of a class comes into scope, a
k
Ans. A constructor that accepts no parameter is called special function called the constructor gets executed.
vi
default constructor. For example in the class data, When an instance of a class comes into scope, a
Data :: Data() is the default constructor. special function called the constructor gets executed.
s.
21. How the default constructor is generated?
al
Ans. If a class does not contain an explicit constructor
Short Answers 3 MARKS
.k
(user defined constructor) the compiler automatically 1. Differentiate implicit call and explicit call of
ok
generate a default constructor implicitly as an inline involving parameterized constructor.
w
public member. Ans. Implicit call : In this method, the parameterized
w
parameterized constructor. This type of constructor in this for creating the object s1 parameterized
helps to create objects with different initial values. constructor is automatically invoked.
ab
This is achieved by passing parameters to the
function. Explicit call : In this method, the name of the
constructor is explicitly given to invoke the
23. What are the two ways of using parameterized
constructor? parameterized constructor so that the object can be
created and initialized
Ans. There are two ways to create an object using
ur
destroys the object constructed by the constructor. Outside the class definition : When Member
Normally declared under public. function defined outside the class just like normal
26. How a C++ class supports data hiding? function definition (Function definitions you are
familiar with) then it is be called as outline member
Ans. A class supports Data hiding by hiding the information
from the outside world through private and protected function or non-inline member function.
members.
n
the memory space only when they are defined class simple
.i
as a part of the class specification. Since all the {
m
objects belonging to that class use the same member
al
private:
function, no separate space is allocated for member
int a,b;
functions when the objects are created. Memory
ad
public:
space required for the member variable are only
co
allocated separately for each object because the simple(int m, int n)
k
member variables will hold different data values for {
a=m;
vi
different objects.
b=n;
s.
al
Long Answers 5 MARKS cout<<"\nParameterized Constructor of class-
simple"<<endl;
.k
1. Explain the types of access specifiers used in C++. }
ok
Ans. (i) The Public Members : A public member is void putdata()
w
accessible from anywhere outside the class but {
within a program. You can set and get the value cout<<"\nThe two integers are..."<<a<<"\
w
cout<<"\n\t\tObject 2\n";
2. Explain the different methods of creating an
s2.putdat();
object in C++
return 0;
w
4. Write the output of the following program. 5. Write the output of the following program.
#include<iostream> #include<iostream>
using namespace std; using namespace std;
n
class simple class simple
.i
{ {
m
al
private: private:
int a,b; int a,b;
ad
public: public:
co
simple(int m, int n=100) //default argument simple() //default constructor
k
{ {
a=m; a=0;
vi
b=n; b=0;
s.
al
cout<<"\n Parameterized Constructor with default cout<<"\n default constructor"<<endl;
argument"<<endl; }
.k
} int getdata();
ok
void putdata() };
w
{ int simple :: getdata()
cout<<"\nThe two integers are......"<<a<<'\ { int tot;
w
return 0;
s2.putdata();
}
return 0;
Ans. Output:
}
w
default constructor
Ans. Output:
default constructor
Parameterized Constructor with default argument
default constructor
Parameterized Constructor with default argument
w
enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
15
n
Chapter Polymorphism
.i
m
al
CHAPTER SNAPSHOT
ad
co
15.1. Introduction
k
15.2. Function overloading
vi
15.2.1. Need for function overloading
s.
15.3. al
15.2.2. Rules for function overloading
Constructor overloading
.k
ok
15.4. Operator overloading
w
15.4.1. Restrictions on operator overloading
w
Evaluation
o
w
ab
Section - A (a) dispchar(); (b) dispchar(ch,size);
Choose the Correct Answer (c) dispchar($,10); (d) dispchar('$',10times);
[Ans. (a) Function Overloading] (b) The return type is also considered for overloading
2. Which of the following reduces the number of a function.
comparisons in a program? (c) The default arguments of overloaded functions
w
for(int i=1;i<=size;i++) (a) void fun (intx); (b) void fun (intx);
cout<<ch; void fun (char ch); void fun (inty);
} (c) void fun (double d); (d) void fun (double d);
How will you invoke the function dispchar()
void fun (char ch); void fun (inty);
for the following input?
[Ans. (b) void fun (intx);
To print $ for 10 times void fun (inty);]
[252]
enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
Sura’s XI Std - Computer Science ➠ Inheritance 273
A B Codes:
(i) (ii) (iii) (iv)
27. (a) 2 1 4 3
n
(b) 1 3 2 4
.i
C (c) 4 3 1 2
m
al
The order of inheritance by derived class to inherit (d) 3 4 1 2
[Ans. (a) (i)-2, (ii)-1, (iii)-4, (iv)-3]
ad
the base in the above diagram
2. Match the following.
co
(a) left to right (b) right to left
(c) bottom to top (d) top to bottom (i) A - (1) Multilevel
k
[Ans. (a) left to right] Inheritance
vi
28. The private members of base class can be accessed B
s.
al
indirectly by the derived class by using base class
public or protected. A
.k
(a) data members (b) access specifiers (ii) - (2) Hierarchical
ok
(c) member functions (d) visibility mode B Inheritance
w
[Ans. (c) member functions]
C
w
(a) Public and protected members of base class (iii) - (3) Single Inheritance
becomes protected members of derived class
C
ab
(b) Only protected members become protected
members of derived class.
(c) Private protected and public all members of base A
case become private of derived class
(iv) - (4) Multiple Inheritance
ur
(c) 4 3 1 2
below. (d) 3 1 4 2
[Ans. (d) (i)-3, (ii)-1, (iii)-4, (iv)-2]
1.
w
List I List II
(i) Multiple 1 A derived class III. Choose the Correct Option and Fill in
Inheritance become a base class the Blanks.
w
(ii) Multilevel 2 O
ne derived class
Inheritance many base class 1. A class that is used to derive another class is called
............... .
(iii) Hierarchical 3 O
ne derived class one
Inheritance base class (a) sub class (b) super class
(iv) Hybrid 4 M
any derived class (c) nested class (d) derived class
Inheritance one base class [Ans. (b) super class]
n
(c) super class (d) base class (c) 5 (d) many
[Ans. (d) many]
.i
[Ans. (a) sub class]
m
12. Grandfather - father - child relationship is an
al
3. When more than one derived clauses are created
from a single base class called ............... . example of .................... .
(a) Multiple Inheritance
ad
(a) Multiple (b) Multilevel
(b) Hierarchical Inheritance
co
(c) Hybrid (d) Hierarchical (c) Multilevel Inheritance
[Ans. (d) Hierarchical]
k
(d) Hybrid Inheritance
4. When a derived class inherits from multiple base
vi
[Ans. (c) Multilevel Inhertance]
classes is known as ............... . 13. The size of the class without any declaration will
s.
al
(a) Multilevel (b) Multiple occupy ................... .
(c) Hierarchical (d) Hybrid (a) 0 byte (b) 1 byte
.k
[Ans. (b) Multiple] (c) 4 bytes (d) 8 bytes [Ans. (b) 1 byte]
ok
5. When a class derived from a class which it self is
w
14. The accessibility of base class by the derived class
a derived class is called ............... .
is controlled by .......................... .
w
(a) Multiple (b) Hierarchical (a) access specifiers (b) visibility modes
(c) hybrid (d) None of these (c) data members
o
w
(a) public (b) private (a) only (i) (b) only (ii)
(c) protected (d) class (c) both (i) and (ii) (d) none of these
[Ans. (b) private] [Ans. (b) only (ii)]
w
10. Which members of the base class will be acquired 18. The base class constructor can called by derived
class? In which of the following definition .......... .
by the derived class is known by ................ .
(a) Base class name : base class constructor( ) ;
(a) inheritance (b) Base class name : : base class constructor ( ) ;
(b) scope resolution operator (c) Base class name ; base class constructor ( );
(c) derived class members (d) Base class name ! base class consctor ( );
(d) visibility modes [Ans. (d) visibility modes] [Ans. (b) Base class name : : base class constructor ( ) ;]
19. The size of derived class object = ............... . 26. Answer the following table
(i) Size of all base class data members.
if base And a Base Then, the
(ii) Size of all derived class data members. class access class member derived class
n
(a) only (ii) (b) (i) * (ii) specifier is is member
(c) (i) + (ii) (d) (i) - (ii) access is
.i
[Ans. (c) (i) + (ii)] (i) Private no acess
m
al
20. A member function all another member function (ii) Public
without using ...................... .
ad
Protected (iii)
(i) dot operator
co
(ii) object (a) (i) Protected, (ii) Private, (iii) Public
k
(a) only (i) (b) only (ii) (b) (i) Public, (ii) Public, (iii) Protected
(c) both (i) and (iii) (d) neither (i) none (ii)
vi
(c) (i) Public, (ii) Public, (iii) Public
[Ans. (c) both (i) and (iii)]
s.
(d) (i) Public, (ii) Protected, (iii) Public
al
21. Shadowing functions resolved using ............... .
(a) dot operator [Ans. (b) (i) Public, (ii) Public (iii) Protected]
.k
(b) scope resolution operator 27. Answer the following table
ok
(c) membership operator (d) comma operator
w
[Ans. (b) scope resolution operator] if base And a Base Then, the
class access class member derived class
22. The derived class member functions have the
w
specifier is is member
same of the base class member functions is called access is
............... .
o
w
[Ans. (c) : :]
24. If single inheritance is used, program will contain (d) (i) Private, (ii) Public, (iii) Private
(a) Atleast - 2 classes [Ans. (a) (i) Private, (ii) Public, (iii) Protected]
(b) At most 2 classes
.s
IV. Consider the Following Statement. 4. How many bytes will occupy by the class without
any declaration?
1. Assertion(A) : Animals is called the base class,
and Mammals and Birds are called Ans. A class without any declaration will have 1 byte size.
n
derived classes. class x{}; X occupies 1 byte.
.i
Reason(R) : The derived classes are power 5. Fill the following table
m
al
packed, as they include the Base class Type of Inheritance
functionality of the base class along member access
ad
with their own unique features. specifier Private Protected Public
This process ofacquiring the Base Public Private (ii) Public
co
class properties is what is called (i) Private Protected (iv)
k
inheritance. Private Private (iii) Private
vi
(a) Both (A) and (R) are true and (R) explains (A)
Ans. (i) Protected (ii) Protected
(b) Both (A) and (R) are true and (R) does not
(iii) Private (iv) Protected.
s.
al
explains (A)
(c) (A) is true, but (R) is false. 6. How the size of derived class object is calculated?
.k
(d) (A) is false, but (R) is true. Ans. Size of derived class object=size of all base class data
ok
members + size of all data members in derived class.
[Ans. (a) Both (A) and (R) are true and (R)
w
explains (A)] 7. What is this pointer? When it is useful?
Ans. 'this' pointer is a constant pointer that holds the memory
Very Short Answers
w
2 MARKS
address of the current object. .It identifies the currently
1. List the types of inheritance. calling object. It is useful when the argument variable
o
w
Ans. (i) Single Inheritance name in the member function and the data member
(ii) Multiple Inheritance name are same. To identify the datamember it will be
ab
given as this->data member name.
(iii) Multilevel Inheritance
(iv) Hierarchical Inheritance 8. When the constructor of base class will
(v) Hybrid Inheritance automatically invoked?
Ans. Constructors and destructors of the base class are not
2. Write the types of Inheritance for the following inherited but during the creation of an object for derived
ur
(v) Class student {public : int roll no;}; (ii) It provides reusability of code
(iii) It supports transitivity.
Class dstudent : public student {public : int
10. If a base class and a derived class each include
marks}; is an example of
a member function with the same name and
w
Ans. (i) Multiple Inheritance arguments, which member function will be called
(ii) Hierarchical Inheritance by the object of the derived class if the scope
(iii) Hybrid Inheritance resolution operator is not used?
w
(iv) Single Inheritance. Ans. The member function of derived class will be called if
the scope resolution is not used.
3. Write the syntax of creating derived class. 11. Can private members of the base class be accessed
Ans. class derived_class_name :visibility_mode base_ by the derived class? If yes, how?
class_name Ans. Yes. It can be indirectly accessed by the derived class
{ using the public or protected member function of the
// members of derived class base class since they have the access privilege for the
}; private members of the base class.
12. Differentiate containership and Inheritance. 4. Can a derived class get access privilege for a
Ans. Containership Inheritance private member of the base class? If yes, how?
Sol: A derived class does not get direct access privilege for
When a class contains Inheritance lets you
n
a private member of its base class, however, it always
objects of another class create or define a
can access(indirectly) the private members of its base
.i
as its members, this specialized instance of
a class that shares the class through an inherited function that is accessing these
m
kind of relationship is
al
properties of the class members.
called containership. and at the same time
adds new feature on it. Long Answers 5 MARKS
ad
1. Write the output of the following program.
co
Short Answers 3 MARKS
#include <iostream>
k
1. Why do you need for inheritance? using namespace std;
Ans. (i) Inheritance is an important feature of object
vi
class Container {
oriented programming used for code reusability. public:
It is a process of creating new classes called
s.
al
// Constructor definition
derived classes, from the existing or base Container(double l = 2.0, double b = 2.0, double
classes.
.k h= 2.0) {
(ii) Inheritance allows us to inherit all the code
cout<<"Constructor called." << endl;
ok
(except declared as private) of one class to
length = l;
w
another class. The class to be inherited is called
base class or parent class and the class which breadth = b;
height = h;
w
(iii) The derived class is a power packed class, as it return length * breadth * height;
can add additional attributes and methods and }
ab
thus enhance its functionality. int compare(Container container)
{
2. Explain the uses of private, protected and public
return this->Volume() >Container.Volume();
inheritance.
}
Ans. (i) Private inheritance should be used when you
private:
ur
<<endl;
situation?
} else {
Ans. In case of inheritance there are situations where the cout << "Container2 is equal to or larger than
member function of the base class and derived classes Container1" <<endl;
w
n
{ I can walk
Public : I can talk
.i
string profession; I can teach Maths.
m
al
int age; My profession is : football
Person( ) : Profession ("unemployed"), My age is 21
ad
age (16) {} I can walk.
void display ( )
co
I can talk.
{ I can play football.
k
cout-<<"My profession is :
3. Consider the following and answer the questions
vi
"<<profession<<enal;
cout-<< "My age is : "<< age<<end1; given below:
class MNC
s.
al
walk ( );
talk ( ); {
} char Cname[25] ; //Company name
.k
void walk( ) protected :
ok
{ cout<< "I can walk" <<end1; char Hoffice[25]; // Head office
w
} public :
void talk ( ) MNC( ) ;
w
}; void DisplayData ( ) ;
Class Teacher : Public Person };
ab
{ class Branch : public MNC
Public : }
void teachmaths ( ) long NOE [Number of employees
{cout-<< "I can teach Maths" <<end; \\country char Ctry [25];
} protected :
ur
}; void Association ( ) ;
Class Player : Public Person public :
{ Branch ( ) ;
Public : void add ( ) ;
.s
t1.profession = "Teacher"
t1. age = 24 ; void Output ( ) ;
t1. display ( ) ; };
t1. teachmaths( ); (i) Which class constructor will be called first at
w
Ans. (i) First of all constructor of class MNC will be (i) Mention the member names which are
called then of Branch and then at last of Outlet. accessible by MyPrinter declared in main( )
(ii) 129 function.
n
(iii) MNC : EnterData( ); MNC : : DisplayData (), (ii) What is the size of Myprinter in bytes?
(iii) Mention the names of functions accessible
.i
Branch : : Add() Branch : : show () Outlet Enter ().
from the member function Read_pri-details
m
Outlet : : Output ( ).
al
( ) of class printer.
(iv) MNC : Country.
Ans. (a) Multiple Inheritance: It is the inheritance
ad
4.(a) Define Multilevel and Multiple inheritance hierarchy wherein one derived class inherits from
co
in context of object Oriented Programming multiple base class(es).
Code suitable example to illustrate the same. Multilevel Inheritance: It is the inheritance
k
(b) Answer the questions (i) to (iii) based on the hierarchy wherein a sub class acts as a base class
vi
following code : for other classes.
Example of Multiple Inheritance : Class
s.
al
class stationery
{ GL(Group Leader) inherits from classes Employee
and Leader.
.k
char Type ;
ok
char manufacturer [10] ; Employee Leader
w
public :
stationery ( ) ;
w
void Read_Sta_details ( );
o
w
void Disp_sta_details( ) ; GL
};
Example of Multilevel Inheritance : Class student
ab
class office : public stationery inherits from person and GraduatesStudent inherits
} from student.
int no_of types ; Person
float cost_of_sta ;
ur
public :
Student
void Read_off_details( );
void Disp_off details( ) ;
}; GraduatesStudents
.s
Disp_pri_details ( )
char delivary_date[10];
(ii) 29 Bytes
public :
void Read_pri_details( ); (iii) Member Functions - Read_sta_details ( ),
w
n
17 C
.i
m
al
Chapter omputer Ethics and Cyber Security
ad
co
k
CHAPTER SNAPSHOT
vi
17.1. Introduction
s.
al
17.2. Ethical Issues
.k
17.3. Cyber Security and Threats
ok
17.4. Introduction to Information Technology Act
w
Evaluation
w
Section - A
o
w
3. Which one of the following are self-repeating and 7. The process of converting cipher text to plain text
do not require a computer program to attach is called
themselves? [Sep. 2020]
w
8. e-commerce means
4. Which one of the following tracks a user visits a
(a) electronic commerce
website?
(b) electronic data exchange
(a) spyware (b) cookies
(c) electric data exchange
(c) worms (d) Trojans
(d) electronic commercialization
[Ans. (b) cookies]
[Ans. (a) electronic commerce]
[280]
9. Distributing unwanted e-mail to other is called. (ii) Decryption : Decryption is the reverse process
[July-'23; Mar-'24] of converting the cipher-text back to plaintext.
(a) scam (b) spam Encryption and decryption are done by cryptography.
n
(c) fraud (d) spoofing In cryptography a key is a piece of information
.i
[Ans. (b) spam] (parameter) that determines the functional output
m
al
10. Legal recognition for transactions are carried out by of a cryptographic algorithm.
(a) Electronic Data Interchange [Mar-'24]
Basic Encryption & Decryption
ad
(b) Electronic Data Exchange
Plain text Cipher text Plain text
co
(c) Electronic Data Transfer
(d) Electrical Data Interchange encryption decryption
k
[Ans. (a) Electronic Data Interchange]
vi
Section - B 3. Explain about proxy server.
Very Short Answers Ans. A proxy server acts as an intermediary between the
s.
1. What is harvesting?
al
[Mar. 2019; Aug '22] end users and a web server. A client connects to the
.k
Ans. A person or program collects login and password proxy server, requesting some service, such as a file,
information from a legitimate user to illegally gain connection, web page, or other resources available from
ok
w
access to others, account(s). a different server. The proxy server examines the request,
2. What are Warez? [July-'23; Mar-'24] checks authenticity and grants the request based on
w
Ans. Commercial programs that are made available to the that. Proxy servers typically keep the frequently visited
public illegally are often called warez. site addresses in its cache which leads to improved
o
w
browser while the user is browsing Internet. (iii) Respect: Each user should respect the privacy
Section - C of other users.
Short Answers (iv) Professionalism: Each user should maintain
w
professional conduct.
1. What is the role of firewalls?
(v) Obey The Law: Users should strictly obey the
Ans. A firewall is a computer network security based system
cyber law in computer usage.
w
n
(v) Use of computers to commit fraud (vi) Sabotage in the form of viruses
.i
(vii) Making false claims using computers.
m
Section - D
al
Explain in detail
ad
1. What are the various crimes happening using computer?
co
Ans. Cybercrime is an intelectual, white -collar crime. Those who commit such crimes generally manipulate the computer
k
system is an intelligent manner. For example - Illegal money transfer via Internet.
vi
Crime Function
Hacking, threats, and blackmailing towards a
s.
al
Crime Function
business or a person.
.k
Cyber stalking Harassing through online.
ok
Malicious programs that can perform a variety of functions including
w
stealing, encrypting or deleting sensitive data, altering or hijacking core
Malware
computing functions and monitoring user's computer activity without
w
their permission.
Overloading a system with fake requests so that it cannot serve normal
o
w
financial gain.
Intellectual Stealing practical or conceptual information developed by another person
property theft or company
.s
2. What is piracy? Mention the types of piracy? How (ii) In simple words, Software Piracy is "unauthorized
can it be prevented? copying of software' The following show as a
Ans. (i) Software Piracy is about the copyright violation diagrammatical representation of software piracy.
w
software, he becomes a licensed user for that trying to stop people from copying software and
software. He is allowed to make copies of the instead relies on people's honesty.
program for backup purposes, but it is against the (v) Shareware publishers encourage users to give
law to distribute duplicate copies to others. Such copies of programs to friends and colleagues but
n
illegal copying and distribution of commercial ask everyone who uses that program regularly
.i
software should not be practiced to pay a registration fee to the program's author
directly. Commercial programs that are made
m
(iv) An entirely different approach to software piracy
al
available to the public illegally are often called
is called shareware, acknowledges the futility of warez.
ad
co
3. Write the different types of cyber attacks. [June 2019; Mar. '23]
k
Ans. Cyber Attack Function
vi
A virus is a small piece of computer code that can repeat itself and spreads from one
computer to another by attaching itself to another computer file. One of the most
s.
Virus
Trojan
al
common virus is Trojan.
.k
A Trojan virus is a program that appears to perform one function (for example, virus
ok
removal) but actually performs malicious activity when executed.
w
Worms are self- repeating and do not require a computer program to attach
Worms themselves. Worms continually look for vulnerabilities and report back to the author
w
Spyware can be installed on the computer automatically when the attachments are
Spyware open, by clicking on links or by downloading infected software.
ab
Ransomware is a type of malicious program that demands payment after launching
Ransomware a cyber-attack on a computer system. This type of malware has become increasingly
popular among criminals and costs the organizations millions each year.
ur
1 Mark 2 Marks
1. The crime stealing tiny amounts of money from 1. What is cyber crime? Give an example. [Sep. 2021]
w
5 Marks
additional questions and Answers
1. Explain the function of digital signature.
Choose the Correct Answers 1 MARK
n
Ans. Digital signature : [HY. 2018]
(i) Digital signatures are based on asymmetric cryptography
.i
I. C
hoose the Correct options for the
m
and can provide assurances of evidence to origin,
al
below Questions.
identity and status of an electronic document, transaction
ad
or message, as well as acknowledging informed by 1. Which of the following is a communication media
co
the signer. which is easily accessible and open to all?
(ii) To create a digital signature, signing software (email) (a) TV (b) Mobile
k
creates a one-way hash of the electronic data to be (c) Radio (d) Internet
vi
signed. [Ans. (d) Internet]
s.
al
(iii) The user's private key to encrypt the hash, returning a 2. Which of the following is a cirme which involves
value that is unique to the hashed data. The encrypted computer and network?
.k
hash, along with other information such as the hashing (a) Phishing (b) Pharming
ok
(c) Hacking (d) Piracy
w
algorithm, forms the digital signature. Any change
in the data, even to a single bit, results in a different (e) All of these [Ans. (e) All of these]
w
failure of integrity) or the signature was created [Ans. (d) All of these]
with a private key that doesn't correspond to the 7. Which of the following is not the common ethical
public key presented by the signer (indicating a issues?
failure of authentication). (a) Cyber crime (b) Authorized access
(c) Hacking (d) Piracy
[Ans. (b) Authorized access]
8. Which of the following is an intellectual white-collar 17. Which of the following acts as an intermediary
crime? between the end user and a web server?
(a) Cyber crime (b) Crime over area (a) Website (b) Web client
n
(c) Crime over time (d) Organized crime (c) Proxyserver (d) Network
[Ans. (c) Proxyserver]
.i
[Ans. (a) Cyber crime]
18. Which of the following keep the frequently visited
m
9. Which of the following crime that tricking people
al
into believing something is not true? site addresses in its cache which improves response
time?
ad
(a) Spam (b) Spoofing
(a) Web server (b) Web client
(c) Scam (d) Harvesting
co
(c) Web browser (d) Proxy server
[Ans. (c) Scam]
k
[Ans. (d) Proxy server]
10. Which of the following is not used to prevent
vi
unauthorized access? 19. Which of the following used to protect data in
(a) Firewalls (b) IDS communication system?
s.
(c) Malware
al
(d) Virus Scanners
[Ans. (c) Malware]
(a) Encryption
(c) Decryption
(b) Cipher-text
(d) Spyware
.k
11. Which of the following is not a cyber attack? [Ans. (a) Encryption]
ok
w
(a) Virus (b) Worms
20. Which type of encryption use the same key for both
(c) Firewalls (d) spyware encryption and description?
w
themselves?
(a) Virus (b) Spyware Function Crime
(c) Ransomware (d) Worms (i) Harassing 1 Spam
[Ans. (d) Worms] through online
.s
14. Which of the following can lead to fraud or identity (ii) Distribute unwanted 2 Cyber stalking
theft? e-mail
(a) Phishing (b) Pharming (iii) Manipulating data 3 identity theft
w
Codes:
(c) Cookie (d) Malware (i) (ii) (iii) (iv)
[Ans. (c) Cookie] (a) 4 1 3 2
16. Which can not be used to spread viruses? (b) 1 3 2 4
(a) Programs (b) Trojan (c) 2 1 4 3
(c) Worms (d) Cookies (d) 3 4 1 2
[Ans. (d) Cookies] [Ans. (c) (i)-2, (ii)-1, (iii)-4, (iv)-3]
III. Choose the Correct Option and Fill in 10. "Phishing without a trop" called .................. .
the Blanks. (a) Hacking (b) Cracking
1. Harassing through online, the crime called ......... . (c) Pharming (d) Warehouse
n
(a) Malware (b) Cyber Stalking [Ans. (c) Pharming]
.i
(c) Fraud (d) Salami slicing 11. MITM also called .................. .
m
al
[Ans. (b) Cyber Stalking] (a) Malware attack (b) Janus attack
2. Distribute unwanted email to a large number of (c) Virus attack (d) Spyware attack
ad
internet users .................. .
[Ans. (b) Janus attack]
co
(a) Scam (b) inbox (c) BCC (d) Spam
[Ans. (d) Spam] 12. Encryption and decryption are done by .................. .
k
3. "unauthorized copying of software" is called ...... . (a) GUI (b) Cryptography
vi
(a) virus (b) worms (c) Cipher-text (d) Compiler
(c) Hacking (d) software piracy [Ans. (b) Cryptography]
s.
4.
Expansion of IDS is .................. .
al
[Ans. (d) software piracy] 13. Decrypted text is also called .................. .
.k (a) Cryptography text (b) Plain text
(a) Identification Detection Systems (c) Cipher - text (d) GUI text
ok
(b) Intrusion Detection Software
w
[Ans. (c) Cipher-text]
(c) Intrusion Digital Systems 14. Public Key encryption is also called .................. .
w
(a) Internet Relay Chat (iv) Users should share any information with
(b) Internet Religions Chat unauthorized people.
(c) Intenational Relay Chat (a) only (iv) (b) Both (i) and (iii)
w
(d) Internet Relay Cyber (c) Both (i) and (iv) (d) only (i)
[Ans. (c) both (i) and (iv)]
[Ans. (a) Internet Relay Chat]
2. Which of the following statement is false?
9. Phishing and pharming and examples of ............. . (i) Duplicating and selling copy righted programs is
(a) Social Engineering (b) Social Media called software piracy.
(c) Malware (d) firewalls (ii) Downloading software illegally through network
is called software piracy.
[Ans. (a) Social Engineering]
(iii) Unauthorized copying of software is called software 8. Write the types of software piracy?
piracy Ans. (i) Duplicating and selling copyrighted programs
(a) only (i) (b) only (ii)
(ii) Downloading software illegally through network.
n
(c) only (iii) (d) both (i) and (iii)
[Ans. (a) only (i)] 9. What is meant by unauthorized access?
.i
m
Ans. Unauthorized access is when someone gains access
al
Very Short Answers 2 MARKS
to a website, program, server, service, or other system
ad
1. Write few accepted standards in cyber world. by breaking into a legitimate user account.
co
Ans. (i) Do not use pirated software. 10. How will you prvent unauthorized access of a system?
Ans. To prevent unauthorized access, Firewalls, Intrusion
k
(ii) Do not use unauthorized user accounts.
Detection Systems (IDS), Virus and Content Scanners,
vi
(iii) Do not steal others' passwords.
Patches and Hot fixes are used.
(iv) Do not hack.
s.
al
11. Which may be done in pursuit of criminal activity
2. What is Malware? or hobby?
.k
Ans. Malicious programs that can perform a variety of Ans. Hacking.
functions including stealing, encrypting or deleting
ok
12. What is hacking leads to?
w
sensitive data, altering or hijacking core computing
Ans. Hacking leads to Identity theft or gaining personal
functions and monitoring user's computer activity information. Firewalls, passwords and user Id's, anti
w
5. Name the crime for the following function. Ans. (i) Software Cracking
(i) Overloading a system with fake requests. (ii) Password Cracking.
(ii) Distributing unwanted e-mail to a large number 15. What is software cracking and password cracking?
.s
of Internet users. Ans. Software cracking is the most often used type of
(iii) Stealing conceptual information developed by cracking which is nothing but removing the encoded
another person. copy protection. Password cracking can be perform
w
Ans. (i) Denial of Service Attack either by using an automated program or can be manually
(ii) Scam realized.
(iii) Spam. 16. What is meant by social engineering?
w
n
web browser web browser
19. What is virus? sends request request forwarded
.i
Ans. A virus is a small piece of computer code that can
m
Users computer Proxy server web server
al
repeat itself and spreads from one computer to another
web server web servers send back
by attaching itself to another computer file.
ad
response to proxy server
20. What is Trojan?
co
Ans. A Trojan virus is a program that appears to perform 28. Explain the uses of encryption.
k
one function (for example, virus removal) but actually Ans. Encryption has been used by militaries and governments
vi
performs malicious activity when executed. to facilitate secret communication. It is now commonly
used in protecting information within many kinds
s.
al
21. Define worms. of civilian systems. It is also used to protect data in
Ans. Worms are self- repeating and do not require a computer communication system.
.k
program to attach themselves. Worms continually look 29. Give an example of encryption.
ok
for vulnerabilities and report back to the author of the Ans. Data being transferred via networks (e.g. the Internet,
w
worm when weaknesses are discovered. e-commerce), mobile telephones, wireless microphones,
wireless intercom systems, Bluetooth devices and bank
w
in its cache which leads to improved response time. 31. Write a note on Asymmetric encryption.
24. Which determines the functional output of cryptographic Ans. Public Key Encryption :
algorithm? (i) Public key encryption is also called Asymmetric
encryption. It uses the concept of a key value
.s
Ans. In cryptography a key is a piece of information (parameter) pair, a different key is used for the encryption and
that determines the functional output of a cryptographic decryption process. One of the keys is typically
algorithm. known as the private key and the other is known
w
n
Data Interchange(EDI) and other means of electronic alters the communication between two parties who
believe they are directly communicating with each other.
.i
communication. It is the primary law in India dealing
42. Who is called perpetrator?
m
al
with cybercrime and electronic commerce(e-Commerce).
Ans. A person who carriers out a harmful, illegal, or immoral
35. What are the points to be noted to protect the network
ad
act.
information?
co
Ans. To protect the information the following points to be Long Answers 5 MARKS
k
noted :
1. Explain social engineering with an example.
(i) Complex password setting can make your surfing
vi
secured. Ans. (i) Social engineering : A misuse of an individual’s
weakness, achieved by making them to click
s.
al
(ii) When the internet is not in use, disconnect it.
malicious links, or by physically accessing the
(iii) Do NOT open spam mail or emails that have an computer through tricks. Phishing and pharming
.k
unfamiliar sender. are examples of social engineering.
ok
(iv) When using anti-virus software, keep it up-to- (ii) Phishing : Phishing is a type of computer crime
w
date. used to attack, steal user data, including login
name, password and credit card numbers. It occurs
w
system without the owner's permission. phishing to distribute malicious links or attachments
37. Define cracking. that can perform a variety of functions. including
ab
the extraction of sensitive login credentials from
Ans. Cracking is gaining unauthorized access to computer victims.
systems to commit a crime, such as stealing the code (iii) Pharming : Pharming is a scamming practice in
to make a copy-protected program run thus denying which malicious code is installed on a personal
ur
time.
Ans. Web sites typically use cookies for the following reasons:
39. Define Phishing. (i) To collect demographic information about who
Ans. Phishing is a term used to describe a malicious individual has visited the Web site.
w
or group of individuals who scam users by sending (ii) Sites often use this information to track how often
e-mails or creating web pages that are designed to visitors come to the site and how long they remain
collect an individual's online bank, credit card, or other on the site.
w
Chapter
18 Tamil computing
.i n
m
al
CHAPTER SNAPSHOT
ad
18.1. Introduction
co
18.2. Tamil in Internet
k
18.3. Search Engines in Tamil
vi
18.4. e-Governance
s.
al
18.5. e-Library
18.6. Tamil Typing and Interface Software
.k
18.6.1. Familiar Tamil Keyboard Interface
ok
w
18.7. Tamil Office Automation Applications
18.8. Tamil Translation Applications
w
Evaluation
ur
Very Short Answers 4. What is TSCII? [HY. 2019; Mar. 2020; May '22]
1. List the search engines supported by Tamil Ans. TSCII (Tamil Script Code for Information
language. [Mar-'24] Interchange) is the first coding system to handle our
.s
Ans. (i) Google (ii) Bing (iii) y ahoo. Tamil language in an analysis of an encoding scheme
2. What are the keyboard layouts used in Android? that is easily handled in electronic devices, including
Ans. Sellinam and Ponmadal – are familiar Tamil keyboard non-English computers. This encoding scheme was
w
layouts that works on Android operating system in registered in IANA (Internet Assigned Numbers
Smart phone using phonetics. Authority) unit of ICANN.
3. Write a short note about Tamil Programming
w
in English. Now, efforts are taken to develop world through internet, Tamil Virtual University was
programming languages in Tamil. Basedon Python established on 17th February 2001 by the Govt. of
programming language,the first Tamil programming Tamilnadu. Now, this organisation functions with the
language "Ezhil" (vÊš) is designed. With the help name of "Tamil Virtual Academy': It offers different
of this programming language, you can write simple courses in Tamil language, Culture, heritage etc.,
programs in Tamil. from kindergarten to under graduation level.
[290]
enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
Sura’s XI Std - Computer Science ➠ Tamil Computing 291
n
known as ..................... . [Sep. 2021]
(a) e-commerce (b) e-book
.i
1. Which of the following is the first Tamil programming
(c) e-library (d) e-governance
m
Language?
al
[Sep. 2020; July-'23]
[Ans. (d) e-governance]
(a) Kamban (b) Azhagi 3. Which is not a search engine? [May '22]
ad
(c) Tamil Open Office (d) Ezhil (a) Android (b) Bing (c) Yahoo
co
[Ans. (a) Ezhil] (d) Google [Ans. (a) Android]
k
additional questions and Answers
vi
I. Choose the Correct Which of the following provide searching facilities
s.
options for the 8.
below Questions.
al in Tamil?
(a) Google (b) Bing
.k
1. Which of the following plays a vital role in ever (c) Safari (d) both a and b
ok
man's life? [Ans. (d) both a and b]
w
(a) Mobile (b) Computer 9. Which of the following is not provide searching
(c) Internet (d) Laptop facilities in Tamil?
w
(a) 40% (b) 43% (c) 50% (d) 42% 11. Which country provides all their services through
[Ans. (d) 42%)] the official website in Tamil?
4. In India, Which is the most widely language in (a) Srilanka (b) America
Internet? (c) Singapore (d) Malaysia
.s
5. How many percentage of Internet users consider (a) E-Papers (b) E-Commere
local language digital content to be more reliable (c) E-languages (d) E-libraries
than english? [Ans. (d) E-libraries]
w
(a) 42% (b) 52% (c) 68% (d) 48% 13. Which of the following is not a familiar Tamil
[Ans. (c) 68%] keyboard interfaces software?
6. Which year onwards, 74% if people in India will (a) NHM Writer (b) Ponmadal
access Internet using Tamil? (c) E-Kalappai (d) Lippikar
w
(a) 2019 (b) 2021 (c) 2023 (d) 2030 [Ans. (b) Ponmadal]
[Ans. (b) 2021] 14. In white OS, Sellinam Tamil keyboard layout
7. Which of the following are used to search any works?
information from the cyberspace? (a) windows (b) linux
(a) Operating System (b) Compiler (c) Android (d) iOS
(c) Search engines (d) Web clients
[Ans. (c) Search engines] [Ans. (c) Android]
n
(c) Lippikar (d) All of these
[Ans. (d) All of these] as e-Governance. Govt. of Tamilnadu has been giving
.i
its services through Internet.
16. Which of the following application have more
m
2. What is the use of e-libraries?
al
than 30000 Tamilwords equivalent to enlglish
Ans. E-Libraries are portal or website of collection of e-books.
words?
Tamil e-Library services provide thousands of Tamil
ad
(a) Kamban (b) Thamizpori Books as e-books mostly at free of cost. It is the most
(c) Vani (d) Ponmozhi
co
useful service to Tamil people who live far away from
[Ans. (b) Thamizpori] their home land.
k
17. Which of the following language used to design 3. What is the use of Tamil interfaces software?
vi
''Ezhil''? Tamil programming language? Ans. Tamil interface software is the familiar one among the
(a) C (b) C++ (c) Java (d) Python different. Methods of typing. This is the simplest method
s.
al
[Ans. (d) Python] of typing Tamil in both Computer and Smart phones.
18. Which of the following coding systems specially 4. What are the familier keyboard used for Tamil
designed for Indian languages?
.k typing?
(a) ASCII (b) TSCII Ans. (i) NHM Writer, E-Kalappai and Lippikar - are familiar
ok
Tamil keyboard interfaces software thai is used for
w
(c) ISCII (d) EBCDIC
[Ans. (c) ISCII] Tamil typing which works on Tamil Unicode, using
phonetics.
w
[Ans. (a) Tamil] having more than 30000 Tamil words equalent to English
words. Using this application. we can transalte small English
III. Choose the Correct Option and Fill in sentences into Tamil.
the Blanks. 7. Expand
.s
1. The first programming language "Ezhil" is (i) TSCII (ii) ISCII (iii) ASCII
designed by ....................... . Ans. (i) Tamil Script Code for Information Interchange
(a) C++ (b) Java (ii) Indian Script Code for Information Interchange
(c) Python (d) Visual Basic (iii) Ameircan Standard Code for Information Interchange.
w
enquiry@surabooks.com Ph: 8124201000 / 8124301000
www.surabooks.com
11th
STD
PUBLIC EXAMINATION MARCH - 2024
PART - III
Reg. No.
n
Time Allowed : 3.00 Hours] COMPUTER SCIENCE (with Answers) [M aximum Marks : 70
.i
m
Instructions :
al
1) Check the question paper for fairness of printing. If there is any lack of fairness, inform the Hall Supervisor
immediately.
ad
2) Use Blue or Black ink to write and underline and pencil to draw diagrams.
co
PART - I 10. #include<iostream>
k
Note : (i) Answer all the questions. 15 × 1 = 15 using namespace std;
vi
(ii) Choose the most appropriate answer from the int main()
given four alternatives and write the option {
s.
al
code and the corresponding answer. int i=1, sum=0;
while(i<=10)
1. Which generation of computer used IC's?
.k
{
(a) Third generation (b) First generation
ok
sum = sum+i;
w
(c) Fourth generation (d) Second generation
i++;
2. Omitting details inessential to the task and }
w
(a) 6 (b) 4 (c) 0 (d) 5 12. Which of the following constructor is executed for
4. Which of the following is the scope operator? the following prototype?
(a) > (b) : : (c) & (d) % add display (add &); // add is a class name
5. Distributing unwanted e-mail to others is called ____. (a) Copy Constructor
.s
(a) scam (b) fraud (c) spoofing (d) spam (b) Default Constructor
(c) Non-Parameterized Constructor
6. In C++ ______ is used for pointer to a variable.
(d) Parameterized Constructor
(a) −
w
n
16. Distinguish Primary and Secondary Memory.
(OR)
.i
17. (1324)8 - convert to equivalent Decimal number. (b) What is function overloading? What are the rules
m
al
18. What is Multi user operating system? for function overloading?
19. Write a short note on const keyword with example.
ad
36. (a) Explain about the types of ROM.
20. What are the importance of void data type?
co
(OR)
21. What are Warez? (b) Write the differences between if-else and switch
k
22. List the search engines supported by Tamil Language. statement.
vi
23. Define an algorithm. 37. (a) What is an output unit? Explain any three output
24. Write the output of the following program.
s.
devices.
#include<iostream>
al (OR)
using namespace std;
.k
(b) Write the output of the following program:
ok
int main() #include<iostream>
w
{ using namespace std;
int i; class student
w
for(i=0;i<8;i++) {
cout<<i<<endl; int rno, marks;
o
w
return 0; public:
} student(int r,int m)
ab
PART - III {
Note : Answer any six questions. Question No. 33 is cout<<"Constructor "<<endl;
Compulsory. 6 × 3 = 18 rno=r;
marks=m;
25. Write a note on Recycle bin.
ur
}
26. What are the points to be noted while deriving a class? void printdet()
27. How is state represented in algorithms? {
28. Give the Truth Table of XOR gate. marks=marks+30;
.s
};
31. Write the significant features of monitor.
int main()
32. What is an array? Write its types. {
33. Write a C++ program to display number from 5 to 1
w
student s(14,70);
using do-while loop. s.printdet();
PART - IV cout<< "Back to Main";
return 0;
w
n
CLASS Shape
10. (a) 55
.i
{
11. (b) F2
m
Private ( )
al
int count 12. (a) Copy Constructor
Protected; 13. (a) Word length
ad
int width; 14. (d) Graphics User Interface
co
int height; 15. (a) Pentium III
k
PUBLIC;
PART - II
vi
Void setwidth [int w]
{ 16.
s.
al
width=w; Primary Memory Secondary Memory
}; It is used to temporarily It is used to store the
.k
void setheight (int h) store the programs data permanently.
ok
{ and data when the
w
height=h; instructions are ready to
} execute.
w
}
Positional notation 83 82 81 80
int MAIN( )
{ Given number 1 3 2 4
rectangle rect :
.s
(1324)8 = 512 × 1 + 64 × 3 + 8 × 2 + 1 × 4
rect. setwidth(5);
rect.setheight(7); = 512 + 192 + 16 + 4
cout>>"Total area : "<<rect.getarea( ) (1324)8 = (724)10
w
<<endl;
18. Multi-user Operating Systems :
return 0;
(i) It is used in computers and laptops that allow
};
w
20. Void type has two important purposes: (iv) The type of derivation (the visibility mode),
(i) To indicate the function does not return a namely private, public or protected. If no
value visibility mode is specified ,then by default the
n
(ii) To declare a generic pointer. visibility mode is considered as private.
.i
21. Warez : Commercial programs that are made (v) The names of all base classes(parent classes)
available to the public illegally are often called warez.
m
separated by comma.
al
22. (i) Google
27. (i) State is a basic and important abstraction.
(ii) Bing
ad
(iii) yahoo. (ii)
Computational processes have state. A
co
computational process starts with an initial
23. An algorithm is a sequence of instructions to
k
state. As actions are performed, its state changes.
accomplish a task or solve a problem.
Its ends with a final state.
vi
24. Output :
(iii) The state at any point of execution is simply the
0
s.
al
values of the variables at that point.
1
28. Truth Table of XOR gate:
.k
2
ok
3 A B A⊕B
w
4 0 0 0
w
5 o 0 1 1
6 1 0 1
w
7 1 1 0
ab
PART - III 29.
25. Recycle bin is a special folder to keep the files or isupper() toupper()
folders deleted by the user, which means you still
This function is used to This function is used to
have an opportunity to recover them. The user cannot
ur
(iii) To restore multiple files or folders, select Restore isupper('a') will return 0 toupper('a') will return 'A'
all items.
(iv) To delete all files in the Recycle bin, select Empty 30.
w
following points should be observed for defining the (ii) A standard CD can store A standard DVD can
derived class. about 700 MB of Data. hold 4.7 GB of data.
(i) The keyword class has to be used (iii) CD players cannot play DVD players can play
(ii) The name of the derived class is to be given after DVDs. CDs.
the keyword class. (iv) It stores upto 80 min of It can range from 4.7
(iii) A single colon(:) audio. GB to 17.08 GB.
31. Significant features of monitor: Both hardware and software together make the
(i) Monitor is the most commonly used output computer system to function. Every task given
device to display the information. It looks like a to a computer follows an Input-process - output
n
TV. cycle (IPO cycle).
.i
(ii) Pictures on a monitor are formed with picture
elements called PIXELS.
m
al
(iii) Monitors may either be Monochrome which
display text or images in Black and White or
ad
can be color, which display results in multiple
co
colors.
k
(iv) There are many types of monitors available
such as CRT (Cathode Ray Tube), LCD (Liquid
vi
Crystal Display) and LED (Light Emitting
Diodes). (i) Input unit : Input unit is used to feed any form
s.
al
(v) The video graphics card helps the keyboard to
communicate with the screen.
of data to the computer, which can be stored in
the memory unit for further processing.
.k
(vi) It acts as an interface between the computer and Example : keyboard, mouse etc.
ok
w
display monitor. (ii) Central Processing Unit : CPU is the major
component which interprets and executes
32. "An array is a collection of variables of the same type
w
int main ( )
{ Control Unit
int n = 5;
.s
do ALU
Input Unit Output Unit
{ Internal
cout<<n<<", "; Memory Data Path
Control Path
w
n − −;
Main Memory
}while (n>0);
} Secondary Storage
w
n
used to temporarily store the programs and Rules for function overloading :
data when the instructions are ready to execute.
.i
The overloaded function must differ in the
(i)
The secondary memory is used to store the data number of its arguments or data types.
m
al
permanently.
(ii) The return type of overloaded functions are not
(OR)
ad
considered for overloading same data type.
(b) Th
e Distributed Operating System is used to access
co
(iii) The default arguments of overloaded functions
shared data and files that reside in any machine around are not considered as part of the parameter list
k
the world using internet/intranet. The users can access as in function overloading.
if it is available on their own computer. The advantages
vi
of distributed Operating System are as follows 36. (a) Types of ROM:
s.
al
(i) A user at one location can make use of all the Read-only memory (ROM) :
resources available at another location over the (i) Read only memory refers to special memory
network.
.k
in a computer with pre-recorded data at
ok
(ii) Many computer resources can be added easily manufacturing time which cannot be modified.
w
in the network The stored programs that start the computer
(iii) Improves the interaction with the customers and perform diagnostics are available in ROMs.
w
00000101
written onto a PROM, it remains there forever.
– 1610 Result = 11110000 (ii) PROM is manufactured as a blank memory,
whereas a ROM is programmed during
w
(EPROM)
( -12)10 = 11110100 2 15
(i) Erasable Programmable Read-Only Memory
2 7–1
(15)10 = 00001111 is a special type of memory which serves as
2 3 –1
a PROM. The content can be erased using
= 100000011 1 –1
ultraviolet rays.
(OR) (ii) An EPROM differs from a PROM. PROM can
be written only once and cannot be erased.
(iii) EPROMs are used widely in personal computers many types of monitors available such as CRT
because they enable the manufacturer to (Cathode Ray Tube), LCD (Liquid Crystal
change the contents of the PROM to replace Display) and LED (Light Emitting Diodes).
n
with updated versions or erase the contents The video graphics card helps the keyboard
before the computer is delivered. to communicate with the screen. It acts as an
.i
Electrically Erasable Programmable Read-Only interface between the computer and display
m
al
Memory (EEPROM) monitor.
(i) Electrically Erasable Programmable Read-Only (ii) Plotter : Plotter is an output device that is used to
ad
Memory can be erased by exposing it to an produce graphical output on papers. It uses single
co
electrical charge. color or multi color pens to draw pictures.
k
(ii) Like other types of PROM, EEPROM retains (ii) Printers : Printers are used to print the
vi
its contents even when the power is turned information on papers. Printers are divided into
off. Comparing with all other types of ROM, two main categories:
s.
al
EEPROM is slower in performance. • Impact Printers
(OR) • Non Impact printers
.k Impact Printers : These printers print with
(b) striking of hammers or pins on ribbon.
ok
w
S. if-else Switch For example, Dot Matrix printers and Line
No matrix printers are impact printers.
w
to execute the if block or case to execute. example, Laser printers and Inkjet printers are
under else block. non-impact printers.
ab
2. An if-else statement uses switch statement uses single (OR)
multiple statements for expression for multiple
multiple choices. choices. (b) Output :
Constructor of class student
3. If-else statement checks switch checks only for
Name : Bharathi
for equality as well as for equality.
ur
Roll no : 14
logical expression.
Marks : 100
4. The if statement evaluates switch statement evaluates Back to main
integer, character, pointer only character or a integer
.s
Output Devices : B C
A
(i) Monitor : Monitor is the most commonly
A
used output device to display the information.
D
It looks like a TV. Monitors may either be B
Hybrid Inheritance
Monochrome which display text or images B C D
n
(ii) Multiple Inheritance : When a derived class width = w;
.i
inherits from multiple base classes it is known
}
m
as multiple inheritance
al
void setHeight(int h)
(iii) H
ierarchical inheritance : When more than
{
ad
one derived classes are created from a single base
height = h;
co
class , it is known as Hierarchical inheritance.
(iv) Multilevel Inheritance : The transitive nature }
k
of inheritance is itself reflected by this form of };
vi
inheritance. When a class is derived from a class class Rectangle: public Shape
which is a derived class – then it is referred to as
s.
al
{
multilevel inheritance.
public:
.k
(v) Hybrid inheritance : When there is a
int getArea()
ok
combination of more than one type of
{
w
inheritance, it is known as hybrid inheritance.
Hence, it may be a combination of Multilevel return (width * height);
w
int count; }
protected: Output:
int width, height; Total area: 35.
w
w
w