Computer Science Model Paper Questions
Computer Science Model Paper Questions
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
1. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which among the following is the fastest memory in a computer that holds information?
a) Register b) Cache
c) Main memory d) RAM
4. The data structure that allows the insertion, as well as the deletion from both the ends, are:
(a) String (b) Linked List data structure
(c) Stack data structure (d) Dequeue data structure
5. is an instance of a class
(b) Data members (b) Member functions
(c) Objects (d) Access specifiers
01
Use E-Papers, Save Tress
Above Line Hide When Print Out
12. FTP stands for
(a) Final Transistor Protocol (b) File Transformation Protocol
(c) File Transfer Protocol (d) File Transaction Protocol
14. Which type of the following software source code is not freely available?
(a) Proprietary software (b) Free software
(c) Open source software (d) All the above
2. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)
16. Collection of rows and columns is called as Table
17. Data base is a collection of interrelated data.
18. Data duplication is called as Redundancy .
19. DBMS is a software for creating and managing databases.
20. Protection of data is the Security .
PART – B
3. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove X̿ = X.
22. Define tautology and fallacy.
23. Briefly explain classes in OOp’s
24. What is destructor? Give example for destructor.
25. Mention any two functions of ifstream and give their meaning.
26. Give any two advantages of database system.
27. Give the syntax and example for INSERT command in SQL.
28. Write the difference between LAN and WAN.
PART – C
4. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Briefly explain characteristics of mother board.
30. Write the logic diagram and the truth table for XOR gate.
02
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,2,5,7,8,10,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any different operations performed on primitive data structure.
39. Write an algorithm to delete a data element from the queue.
40. Give the advantages of object oriented programming.
41. With an example explain member function inside the class definition.
42. What is a friend function? Mention the characteristics of a friend function.
43. What is a constructor? Write rules for creating a constructor.
44. What is inheritance? Explain any two types of inheritance.
45. Differentiate between manual and electronic data processing.
46. Explain CREATE and UPDATE commands in SQL.
47. Explain the following:
i. SMS ii. E-mail iii. Voice mail iv. Chat v. Video conference
*******************
03
Use E-Papers, Save Tress
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 2
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Name the devices connected to North bridge of the processor
(a) Sound card (b) Video card
(c) USB (d) Memory card
03
Use E-Papers, Save Tress
Above Line Hide When Print Out
12. Which of the following is an example for half duplex communication mode?
(a) Radio (b) Internet
(c) Walkie - Talkie (d) Modern telephone system
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(E.F Codd, Hashing, Candidate, Data warehousing, Instances)
16. Candidate keys are the keys which are not currently selected as primary key.
17. Datawarehousing is the repository of organizations electronically stored data.
18. Father of relational algebra is E.F Codd
19. Instances is set of values in each row.
20. Algorithm used in random or direct access file organization is Hashing
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. What is principle of duality? Give one example.
22. State and prove complementary law.
23. Write any two limitations of OOP’s.
24. Mention the features of parameterized constructor.
25. Differentiate between read( ) and write( ).
26. What are the advantages and disadvantages of ISAM?
27. Give the syntax and example for CREATE command in SQL.
28. What is meant by client and server?
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain any three types of motherboard.
30. Write the logic diagram and the truth table for NOR gate.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(1,3,4,5,6,7,9,11,12,13,14,15).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm for insertion sort method.
39. Write applications of stack data structure.
40. Write the difference between procedural and object oriented programming techniques.
41. Explain object definition with syntax and example.
42. When is function overloading is needed? Write any two advantages and restrictions.
43. What is copy constructor? Explain with syntax and example program.
44. Explain different types of inheritance.
45. Differentiate between hierarchical and network data model.
46. What is Data Definition Language? Give its functions.
47. What is computer virus? Write the symptoms(characteristics) of computer virus.
*******************
7. If different objects are initialized with different values which type of constructor is preferred?
(a) Default constructor (b) Parameterized constructor
(c) Destructor (d) None of the above
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Alternate key, Data Model, Foreign key, staging, domain)
16. Key which is not selected as primary key is Alternate key
17. Foreign key combines two database tables.
18. Set of values for an attribute in each column is domain
19. Data model describes how data is represented and used.
20. Process of cleaning, standardized and loading data in data warehouse is called staging
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove xy +xy = x.
22. State and prove commutative las using truth table.
23. List different characteristics of OOP’s.
24. Mention different types of constructors.
25. What are the advantages of saving data in binary form?
26. Define primary key and foreign key.
27. Mention different logical operators used in SQL.
28. Name different types of networking cables.
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain different components of motherboard.
30. Realize AND, OR ,NOT gates using NOR gate
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(1,2,3,4,5,7,9,10,11,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm to insert and delete an element from an array.
39. Explain operations performed on linked list.
40. Write the advantages of object oriented programming.
41. Describe how objects can be used as function arguments.
42. What is function overloading? Explain the need for overloading
43. Explain default constructors with syntax and example.
44. Explain the visibility modes in inheritance.
45. What is data warehouse? Explain the components of data warehouse.
46. Explain SQL constraints with example.
47. Explain any five networking devices.
*********
14. Software licensed under exclusive legal rights of the copy right holder
(a) Proprietary software (b) Free software
(c) Open source software (d) All the above
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Tuple, Rectangle, MySQL, ISAM, Schema)
16. The structure of database is called as Schema
17. Rectangle is the symbol used to represent entity.
18. Row of a table is also called as Tuple.
19. MySQL is a software for creating and managing databases.
20. ISAM is a combination of serial and random file organization.
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove X + XY = X.
22. Define minterm and maxterm.
23. Define Abstraction and encapsulation.
24. What is default constructor? Write its features.
25. Mention any two functions of ofstream and give their meaning.
26. Give any two applications of database system.
27. Give the syntax and example for UPDATE command in SQL.
28. Write the difference between simplex and duplex mode.
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is cache memory? Explain its types..
30. Write the logic diagram and the truth table for XNOR gate.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,4,6,7,8,12,14,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any different operations performed on linear data structure.
39. Write an algorithm to insert a data element from the queue.
40. Give the applications of object oriented programming.
41. With an example explain member function outside the class definition.
42. What is a friend function? Write its syntax and example.
43. What is destructor? Write its characteristics.
44. What is inheritance? Explain any two types of inheritance.
45. Explain data processing cycle.
46. Explain different SQL group functions.
47. What is topology? Explain any two types of topology
*******************
06
Use E-Papers, Save Tress
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 5
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. L1 cache resides in
(a) Motherboard (b) RAM
(c) Processor (d) Main memory
07
Use E-Papers, Save Tress
Above Line Hide When Print Out
12. Which of the following is an example for simplex communication mode?
(a) Radio (b) Internet
(c) Walkie - Talkie (d) Modern telephone system
15. is a page used to present information through text, images, audio, video etc., on web
(a) Word processor (b) Notepad
(c) W o r d p a d (d) Web page
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(View, Diamond, Oracle, Data mining, DBA)
16. View level is also called as external level in data abstraction.
17. Diamond is the symbol used to represent relationship in E-R diagram.
18. Person who have the authorization to access, monitor data base is DBA
19. Oracle is a software for creating and managing databases.
20. Extracting and discovery of knowledge from large amount of data is called Data mining
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove XX + XY = X.
22. What is duality theorem? Find the dual of 1 + X = X.
23. Define base class and derived class.
24. What is parameterized constructor? Write its features.
25. Mention any two functions of fstream and give their meaning.
26. What is data independence? Mention its types.
27. Give the syntax and example for DELETE command in SQL.
28. Mention any two antivirus softwares.
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Expand UPS. Explain its types.
30. Write the logic diagram and the truth table for NAND gate.
Use E-Papers, Save Tress
08
Above Line Hide When Print Out
31. Give the memory representation of two dimensional arrays.
32. Write pointer declaration and initialization.
33. Give the functions of: (a) get( ) (b) getline( ) (c) read( )
34. Explain relational data model with example.
35. Define the term: (a) Web page (b) W.W.W (c) Web browser
36. Explain any three basic HTML tags.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Π(0,4,8,9,10,11,12,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any different operations performed on arrays.
39. Write applications of queue.
40. What is object oriented programming? Write its limitations.
41. Explain class definition with syntax and example.
42. Explain inline functions with programming example.
43. What is destructor? Write its syntax and programming example.
44. Write the advantages of inheritance.
45. Differentiate between hierarchical and network data model.
46. Explain different logical operators used in SQL.
47. What is networking? Explain the goals of networking.
*******************
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Metadata, Table, Primary key, Eclipse, Physical)
16. Physical level is also called as internal level in data abstraction.
17. Eclipse is the symbol used to represent attributes in E-R diagram.
18. Table is an entity like table.
19. Primary key uniquely identifies each record in a table.
20. Data about data is called Metadata
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove (X + Y)(X +Z)=X + YZ
22. Define sum-of-product and product-of-sum expressions.
23. Define Polymorphism and message passing
24. Mention different types of constructors.
25. What is a stream? Mention any one stream used in C++.
26. Explain database users.
27. Give the syntax and example for INSERT INTO command in SQL.
28. What are communication modes? Explain simplex mode
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is port? Explain serial port.
30. Write the logic diagram and the truth table for AND gate.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,3,4,6,8,9,10,11,12,14).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm for search elements using binary search.
39. Explain different operations performed on stack data structure.
40. Explain different characteristics of OOP’s
41. What is the significance of using access specifiers? Explain different access specifiers.
42. Explain function overloading with syntax and example.
43. What is default constructors? Explain with syntax and example program.
44. Explain single level inheritance with a programming example.
45. Differentiate between Electronic and manual data processing.
46. Explain GROUP BY and ORDER BY commands with syntax and example.
47. What is computer virus? Give measures of preventing computer virus.
*******************
7. In which type of constructors all the objects created initializes to same set of values
(a) Default constructor (b) Parameterized constructor
(c) Copy constructor (d) None of the above
8. Advantages of inheritance is
(a) Reusing existing code (b) Easy to extend
(c) Memory utilization (d) All the above
14. Which of the following software is provided to user on limited trial basis?
(a) Shareware (b) FLOSS
(c) Freeware (d) Free software
15. In which type of hosting the company rents an entire server from the hosting company?
(a) Free hosting (b) Dedicated hosting
(c) V i r t u a l h o s t i n g (d) Shared hosting
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Attributes, Data security, Information, Data model, End users)
16. Abstract model that describes how data is represented and used is Data model
17. Attributes describes the characteristics of an entity.
18. The processed for of data is Information
19. End users are the people who access the database for querying, updating, generating repots.
20. Data security is an example for advantages of DBMS.
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Write truth table and logic symbol for NOT gate
22. State and prove idempotance law.
23. Explain classes with example.
24. Mention the features of copy constructor.
25. Differentiate between get( ) and getline( ).
26. Differentiate between data and information.
27. Mention different data types used in SQL.
28. Give any two applications of computer networks.
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain any three slots present in motherboard.
30. Realize AND, OR ,NOT gates using NAND gate
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = m1+m2 +m3+m4+m5+m7+m8+m9 +m11+m12+m13+m15
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm to search elements using linear search
39. Explain operations performed on queue data structure.
40. Write application of object oriented programming.
41. Explain array of objects with syntax and programming example..
42. What is inline function? Write its advantages and disadvantages
43. What is constructor? Write an example program.
44. Explain different types of inheritance.
45. Explain DBS architecture.
46. Explain different comparison operators used in SQL.
47. Explain different types of switching techniques.
*******************
10. Abstract model the describes how data is represented and used is _ _
(a) Data warehouse (b) Data Model
(c) Data mining (d) Database
11. operator used to search for values that are within a set of values
(a) ANY (b) BETWEEN
(c) ALL (d) EXISTS
15. refers to the web content that changes each time it is viewed
(a) HTML (b) XML
(c) D H T M L (d) None of the above.
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(one-tier, Data independence, serial file organization, tuple, Attribute)
16. Each column is identified by distinct header called Attribute
17. One-tier is the architecture where users directly sit on DBMS and uses it.
18. Each row in a table is called tuple
19. Serial file organization stores data in serial order in the database.
20. Ability database to modify schema at one level without affecting it on another level is Data independence
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove xy +xy = x.
22. State De-Morgans theorems.
23. List different characteristics of OOP’s.
24. Mention different types of constructors.
25. What are the advantages of saving data in binary form?
26. Define primary key and foreign key.
27. Mention different logical operators used in SQL.
28. Name different types of networking cables.
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is bus? Mention its types
30. What are derived gates mention different derived gates.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,1,2,3,4,8,9,10,11,12).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm to perform PUSH and POP operation in stack.
39. Explain different operations performed on linear array.
40. Explain different characteristics of object oriented programming.
41. What is an object? Explain syntax and example for object definition.
42. Explain the characteristics of friend functions.
43. Explain destructor with syntax and example.
44. Define the terms:(a) Inheritance (b) Base class (c) Visibility mode
(d) Abstract class (e) Virtual base class
45. Explain the features of database system.
46. Explain ALTER and UPDATE command with syntax and example.
47. What is networking? Explain the applications of networking.
*******************
4. Name the data structure whose relationship between data elements is by means of links
(a) Arrays (b) stack
(c) Queue (d) linked list
6. Friend function is a
(a) Member function (b) Non member function
(c) Main function (d) Recursive function
9. is the built in pointer that hold the address of the object defined for a class
(a) this pointer (b) new
(c) delete (d) AND
10. Visual representation of data that describes how data is related to each other is _
(a) E-R diagram (b) flowchart
(c) Data model (d) None of the above
11. operator used to compare value to any applicable value in the list
(a) ANY (b) AND
(c) ALL (d) NOT
Use E-Papers, Save Tress
25
Above Line Hide When Print Out
12. Which is the system/software application which has internetwork capability of joining dissimilar
network?`
(a) Gateway (b) Bridge
(c) Router (d) Switch
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(tree, domain, DBMS, entity, Database)
16. Set of values for an attribute in each column is domain
17. DBMS is an application software used for creating, updating, managing database
18. Hierarchical model follows tree structure.
19. Database is a collection of logically related data.
20. entity is an object like table.
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Find the complement of the expression F= XY + XZ + XY
22. Draw a general K-Map for 3 variables.
23. Define class and object.
24. Write syntax and example for copy constructor.
25. Name the stream classes supported by C++ for file input and output.
26. Define Primary key and Secondary key.
27. What is dual table? Give example.
28. Write advantages of networking.
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is the purpose of ports, bus and disk controllers
30. What are universal gates? Mention different universal gates
Use E-Papers, Save Tress 26
Above Line Hide When Print Out
31. What is stack? Write any two applications of stack.
32. What is self referential structure? Give example.
33. Explain any three modes to open a file in C++.
34. Explain any E-R diagram notation and write its purpose..
35. Write advantages and disadvantages of WWW.
36. Give the features of XML.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = m1+m2 +m3+m4+m5+m7+m8+m9 +m11+m13+m14+m15
Reduce it by using Karnaugh map (K-Map).
38. What is sorting? Write an algorithm to sort an array using insertion sort.
39. What is queue? Explain different types of queue.
40. Write the difference between procedural and object oriented programming
41. What are access specifiers? Explain different access specifiers.
42. Explain inline function with syntax and example program.
43. Explain destructor and its characteristics
44. What is inheritance? Write its advantages.
45. Differentiate between electronic and manual file organization.
46. Explain DELETE and UPDATE command with syntax and example.
47. Explain different switching techniques.
*******************
27
Use E-Papers, Save Tress
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 10
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The function of BIOS is
(a) Stores data (b) Store Date and time instructions
(c) Stores input data (d) Stores instructions to load hardware setting
8. In private inheritance public members of base class becomes members of derived class.
(a) Public (b) Protected
(c) Private (d) All of the above
10. Field in a relation that matches the primary key column of another table
(a) Primary key (b) Foreign key
(c) Secondary key (d) Candidate key
11. operator used to search for the presence of a row in a specified table
(a) ANY (b) AND
(c) ALL (d) EXISTS
II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(record, Data independence, serial file organization, network model, Attribute)
16. Each column is identified by distinct header called attribute
17. Data model is a data model that follows graph structure.
18. Each row in a table is called record
19. Serial file organization stores data in serial order in the database.
20. Ability database to modify schema at one level without affecting it on another level is Data independence
PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Write the statement for De-Morgans theorem.
22. X + Y = Y + X evaluate using truth table.
23. Write any two limitations of OOP’s.
24. Write syntax and example for parameterized constructor.
25. Write the difference between put( ) and get( ) functions.
26. What is data mining? Mention its components.
27. What is the purpose of GRANT and REVOKE.
28. Explain circuit switching technique.
PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is bus? Mention its types.
30. Write truth table and logic symbol for XOR gate.
29
Use E-Papers, Save Tress
Above Line Hide When Print Out
31. What is queue? Write any two applications of queue.
32. What is relationship between object and pointers? Give example.
33. Write the difference between text file and binary file.
34. What are the advantages and disadvantages of ISAM?
35. Define E-Commerce. Write its services.
36. Give the features of DHTML.
PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) =
Σ(0,4,8,9,10,11,12,13). Reduce it by using Karnaugh
map (K-Map).
38. Write an algorithm for search elements using binary search.
39. Explain different operations performed on stack data structure.
40. Write the difference between procedural and object oriented programming
41. What are access specifiers? Explain different access specifiers.
42. What is function overloading? Write the needs for function overloading.
43. Explain constructor with syntax and example.
44. What is inheritance? Explain multiple and multilevel inheritance.
45. Explain data processing cycle.
46. Explain INSERT INTO and SELECT command with syntax and example.
47. What is network security? Explain different protection methods.
*************