0% found this document useful (0 votes)
763 views30 pages

Computer Science Model Paper Questions

Uploaded by

madan01mady
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
763 views30 pages

Computer Science Model Paper Questions

Uploaded by

madan01mady
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

II PU COMPUTER SCIENCE – MODEL PAPER 1

PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
1. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which among the following is the fastest memory in a computer that holds information?
a) Register b) Cache
c) Main memory d) RAM

2. What is Min term ?


a) Sum of all the Literals b) Product of all the literals
c) Subtract of two literals d) None of the above

3. The other name of NOT gate is


(a) Neglect gate (b) Inverter gate
(c) XOR gate (d) XNOR gate

4. The data structure that allows the insertion, as well as the deletion from both the ends, are:
(a) String (b) Linked List data structure
(c) Stack data structure (d) Dequeue data structure

5. is an instance of a class
(b) Data members (b) Member functions
(c) Objects (d) Access specifiers

6. Function overloading also known as


(a) Run time polymorphism (b) Abstraction
(c) Encapsulation (d) Compile time polymorphism

7. Constructor is used to initialize automatically


(a) Member functions (b) objects
(c) Data members (d) All the above

8. Capability of one class acquiring properties from another class is called


(a) Polymorphism (b) Abstraction
(c) Overloading (d) Inheritance

9. Pointer is used to store


(a) Memory address (b) Value
(c) Data (d) Information

10. _______is called information.


(a) Raw fact (b) collection of data
(c) Unprocessed data (d) Processed data

11. SQL is_______ .


(a) Theoretical Language (b) Procedural Language
(c) Structured Language (d) Unstructured Language

01
Use E-Papers, Save Tress
Above Line Hide When Print Out
12. FTP stands for
(a) Final Transistor Protocol (b) File Transformation Protocol
(c) File Transfer Protocol (d) File Transaction Protocol

13. is the messages transmitted from web server to a web browser


(a) Cookies (b) SMS
(c) Chatting (d) None of the above

14. Which type of the following software source code is not freely available?
(a) Proprietary software (b) Free software
(c) Open source software (d) All the above

15. HTML stands for


(a) Hyper Text Makeup Language (b) Hyper Text Markup Language
(c) Hyper Text Marking Language (d) Hyper Text Marker Language

2. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Security, Redundancy, DBMS, Database, Table)
16. Collection of rows and columns is called as Table
17. Data base is a collection of interrelated data.
18. Data duplication is called as Redundancy .
19. DBMS is a software for creating and managing databases.
20. Protection of data is the Security .
PART – B
3. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove X̿ = X.
22. Define tautology and fallacy.
23. Briefly explain classes in OOp’s
24. What is destructor? Give example for destructor.
25. Mention any two functions of ifstream and give their meaning.
26. Give any two advantages of database system.
27. Give the syntax and example for INSERT command in SQL.
28. Write the difference between LAN and WAN.

PART – C
4. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Briefly explain characteristics of mother board.
30. Write the logic diagram and the truth table for XOR gate.

02

Use E-Papers, Save Tress


Above Line Hide When Print Out
31. Give the memory representation of stack data structure.
32. Mention any three advantages of pointers.
33. What is a data file? Differentiate between text and binary files.
34. Give the meaning for any three components of E-R diagram.
35. What is e-commerce? Explain any one type of e-commerce.
36. Explain any three table tags in HTML.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,2,5,7,8,10,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any different operations performed on primitive data structure.
39. Write an algorithm to delete a data element from the queue.
40. Give the advantages of object oriented programming.
41. With an example explain member function inside the class definition.
42. What is a friend function? Mention the characteristics of a friend function.
43. What is a constructor? Write rules for creating a constructor.
44. What is inheritance? Explain any two types of inheritance.
45. Differentiate between manual and electronic data processing.
46. Explain CREATE and UPDATE commands in SQL.
47. Explain the following:
i. SMS ii. E-mail iii. Voice mail iv. Chat v. Video conference

*******************

03
Use E-Papers, Save Tress
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 2
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Name the devices connected to North bridge of the processor
(a) Sound card (b) Video card
(c) USB (d) Memory card

2. Boolean algebra used in the designing of


(a) Softwares (b) Input devices
(c) Output devices (d) Electronic circuits

3. Standard symbol for AND gate is


(a) + (b) ⊙
(c) ~ (d) –

4. Data type of array subscript is


(a) float (b) double
(c) int (d) char

5. Which access specifier is implicitly used in class?


(a) Public (b) Private
(c) Protected (d) None of the above

6. Inline functions should be defined


(a) Before all functions (b) After all functions
(c) Outside class (d) Anywhere in a program

7. Which type of constructor do not accept any arguments?


(a) Default constructor (b) Parameterized constructor
(c) Copy constructor (d) None of the above

8. A class which derives properties from another class


(a) Main class (b) Base class
(c) Super class (d) Derived class

9. Memory allocated during runtime is memory allocation


(a) Compile time (b) Dynamic
(c) Static (d) None of the above

10. Set of values in a column is called _


(a) Attribute (b) Domain
(c) Record (d) Field

11. commands described schema and sub schema


(a) DML (b) DQL
(c) DDL (d) DCL

03
Use E-Papers, Save Tress
Above Line Hide When Print Out
12. Which of the following is an example for half duplex communication mode?
(a) Radio (b) Internet
(c) Walkie - Talkie (d) Modern telephone system

13. Virus spreads through


(a) Network (b) E Mail
(c) Foreign disc (d) All the above

14. URL stands for


(a) Uniform Resource Locator (b) Uniform Resource Location
(c) Unique Resource Locator (d) Uniform Research Locator

15. The process of embedding and creating scripts in a webpage is called


(a) Web hosting (b) Web scripting
(c) W e b s i t e (d) Webpage

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(E.F Codd, Hashing, Candidate, Data warehousing, Instances)
16. Candidate keys are the keys which are not currently selected as primary key.
17. Datawarehousing is the repository of organizations electronically stored data.
18. Father of relational algebra is E.F Codd
19. Instances is set of values in each row.
20. Algorithm used in random or direct access file organization is Hashing

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. What is principle of duality? Give one example.
22. State and prove complementary law.
23. Write any two limitations of OOP’s.
24. Mention the features of parameterized constructor.
25. Differentiate between read( ) and write( ).
26. What are the advantages and disadvantages of ISAM?
27. Give the syntax and example for CREATE command in SQL.
28. What is meant by client and server?

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain any three types of motherboard.
30. Write the logic diagram and the truth table for NOR gate.

Use E-Papers, Save Tress


14
Above Line Hide When Print Out
31. Write an algorithm for traversal in a linear array
32. Define: (a) Pointer (b) Static Memory Allocation (c) Dynamic Memory Allocation
33. Give the functions of: (a) get( ) (b) getline( ) (c) read( )
34. Mention any three advantages of random/direct access method.
35. What is meant by shareware? Write its limitations.
36. Explain general structure of HTML.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(1,3,4,5,6,7,9,11,12,13,14,15).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm for insertion sort method.
39. Write applications of stack data structure.
40. Write the difference between procedural and object oriented programming techniques.
41. Explain object definition with syntax and example.
42. When is function overloading is needed? Write any two advantages and restrictions.
43. What is copy constructor? Explain with syntax and example program.
44. Explain different types of inheritance.
45. Differentiate between hierarchical and network data model.
46. What is Data Definition Language? Give its functions.
47. What is computer virus? Write the symptoms(characteristics) of computer virus.

*******************

Use E-Papers, Save Tress


14
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 3
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which of the following device is not an example for USB?
(a) Keyboard (b) Monitor
(c) Printer (d) Mouse

2. A K-Map of n variables is made up of


(a) 2n (b) 3n
(c) 4n (d) 5n

3. Which of the following is a universal gate?


(a) NAND (b) OR
(c) XOR (d) XNOR

4. Which of the following is not an example for linear data structure?


(a) arrays (b) stack
(c) Queue (d) Trees

5. operator used to access members outside the class


(a) :: (b) ;
(c) . (d) :

6. Inline function may not work if function is


(a) too long (b) recursive
(c) have switch or looping (d) All the above

7. If different objects are initialized with different values which type of constructor is preferred?
(a) Default constructor (b) Parameterized constructor
(c) Destructor (d) None of the above

8. Symbol used while defining derived class


(a) :: (b) ;
(c) . (d) :

9. operator is used delete memory created during runtime


(a) new (b) delete
(c) NOT (d) AND

10. Process of organizing data in database is called


(a) Data warehouse (b) Normalization
(c) Data mining (d) Database

11. is a SQL data type


(a) varchar (b) number
(c) char (d) All the above

Use E-Papers, Save Tress


14
Above Line Hide When Print Out
12. In which topology all computers are connected through hub?
(a) Bus topology (b) Ring topology
(c) Star topology (d) Mesh topology

13. CDMA stands for


(a) Common division multiple access (b) Common data multiple access
(c) Code division multiple access (d) Common divide multiple access

14. Which of the following is not related to shareware?


(a) Source code not available (b) Modification to source code is not allowed
(c) Software is completely free of cost (d) All the above

15. Which of the following is not text layout tag?


(a) <p> (b) <U>
(c) < b r > (d) <Center>

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Alternate key, Data Model, Foreign key, staging, domain)
16. Key which is not selected as primary key is Alternate key
17. Foreign key combines two database tables.
18. Set of values for an attribute in each column is domain
19. Data model describes how data is represented and used.
20. Process of cleaning, standardized and loading data in data warehouse is called staging

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove xy +xy = x.
22. State and prove commutative las using truth table.
23. List different characteristics of OOP’s.
24. Mention different types of constructors.
25. What are the advantages of saving data in binary form?
26. Define primary key and foreign key.
27. Mention different logical operators used in SQL.
28. Name different types of networking cables.

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain different components of motherboard.
30. Realize AND, OR ,NOT gates using NOR gate

Use E-Papers, Save Tress


20
Above Line Hide When Print Out
31. What is queue? Mention different types of queue.
32. What is dynamic memory allocation? Explain.
33. Give the functions of: (a) eof( ) (b) seekp( ) (c) tellp( )
34. Explain any three types of keys used in database creation.
35. Write a note on open source software.
36. Explain different types of hosting websites.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(1,2,3,4,5,7,9,10,11,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm to insert and delete an element from an array.
39. Explain operations performed on linked list.
40. Write the advantages of object oriented programming.
41. Describe how objects can be used as function arguments.
42. What is function overloading? Explain the need for overloading
43. Explain default constructors with syntax and example.
44. Explain the visibility modes in inheritance.
45. What is data warehouse? Explain the components of data warehouse.
46. Explain SQL constraints with example.
47. Explain any five networking devices.

*********

Use E-Papers, Save Tress


Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 4
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Which of the following is not an example for I/O port?
(a) USB (b) MODEM
(c) PCI (d) Serial Port

2. Another name of Boolean algebra is _


(a) Switching algebra (b) Relational algebra
(c) Logical algebra (d) None of the above

3. Which of the following is not a derived gate?


(a) NAND gate (b) AND gate
(c) XOR gate (d) XNOR gate

4. is an example for non-primitive data structure


(a) Arrays (b) int
(c) float (d) pointers

5 Which is the Default Access Specifier in class?


a) Private b) Public
c) Protected d) Friend

6. Function cannot be overloaded when


(a) Function names are same (b) Function names are different
(c) Number of parameters are different (d) Data types of parameters are different

7. Constructor must be declare in section


(a) Private (b) Protected
(c) Public (d) Anywhere inside the class

8. Base class is called


(a) Sub class (b) Super class
(c) Inherited class (d) Built-in class

9. Which of the following is the correct way to declare a pointer?


(a) int *ptr b) int ptr
(c) int &ptr d) All of the above

10. is collection of raw facts, figures, values


(a) Data (b) information
(c) Database (d) Processed data

11. Which of the following is an example for DML command


(a) UPDATE (b) INSERT INTO
(c) DELETE (d) All the above
04
Use E-Papers, Save Tress
Above Line Hide When Print Out
12. Hotspot refers to
(a) Venue offers Wi-Fi access (b) Offers free software
(c) Offers physical connection (d) Offers storage space

13. HTTP stands for


(a) Hyper Text Travel Protocol (b) Hyper Type Transfer Protocol
(c) Hyper Text Transfer Protocol (d) Hyper Text Transmit Protocol

14. Software licensed under exclusive legal rights of the copy right holder
(a) Proprietary software (b) Free software
(c) Open source software (d) All the above

15. is the extension of HTML files.


(a) .xml (b) .html
(c) . t x t (d) .xls

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Tuple, Rectangle, MySQL, ISAM, Schema)
16. The structure of database is called as Schema
17. Rectangle is the symbol used to represent entity.
18. Row of a table is also called as Tuple.
19. MySQL is a software for creating and managing databases.
20. ISAM is a combination of serial and random file organization.

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove X + XY = X.
22. Define minterm and maxterm.
23. Define Abstraction and encapsulation.
24. What is default constructor? Write its features.
25. Mention any two functions of ofstream and give their meaning.
26. Give any two applications of database system.
27. Give the syntax and example for UPDATE command in SQL.
28. Write the difference between simplex and duplex mode.

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is cache memory? Explain its types..
30. Write the logic diagram and the truth table for XNOR gate.

Use E-Papers, Save Tress


05
Above Line Hide When Print Out
31. Give the memory representation of one dimensional array.
32. Write different operations performed on pointers.
33. Explain different file modes.
34. Mention different database users.
35. Write the advantages of E-Commerce.
36. Explain any three text formatting tags used in HTML.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,4,6,7,8,12,14,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any different operations performed on linear data structure.
39. Write an algorithm to insert a data element from the queue.
40. Give the applications of object oriented programming.
41. With an example explain member function outside the class definition.
42. What is a friend function? Write its syntax and example.
43. What is destructor? Write its characteristics.
44. What is inheritance? Explain any two types of inheritance.
45. Explain data processing cycle.
46. Explain different SQL group functions.
47. What is topology? Explain any two types of topology

*******************

06
Use E-Papers, Save Tress
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 5
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. L1 cache resides in
(a) Motherboard (b) RAM
(c) Processor (d) Main memory

2. Canonical Sum Of Product expression represented using symbol.


(a) $ (b) Π
(c) & (d) Σ

3. Standard symbol for XOR gate is


(a) ⊕ (b) ⊙
(c) + (d) –

4. Name the data structure which is called LIFO list


(a) Arrays (b) Stack
(c) Queue (d) Linked List

5. Member functions can be defined


(a) Inside class (b) Outside class
(c) Inside & Outside class (d) Inside Main function

6. Function can be overloaded when


(a) Function names are same (b) Data types of parameters are different
(c) Number of parameters are different (d) All the above

7. Return type specifier of constructor is


(a) Basic data type (b) Derived data types
(c) User defined data type (d) Do not have any return type

8. Derived class is called


(a) Sub class (b) Super class
(c) Main class (d) First class

9. Which of the following operator is used to declare pointer?


(a) * (b) &
(c) = (d) ~

10. Field in a database is


(a) Table (b) Row
(c) Cell (d) Column

11. Which of the following is an example for DDL command?


(a) UPDATE (b) INSERT INTO
(c) DELETE (d) CREATE

07
Use E-Papers, Save Tress
Above Line Hide When Print Out
12. Which of the following is an example for simplex communication mode?
(a) Radio (b) Internet
(c) Walkie - Talkie (d) Modern telephone system

13. Hardware device used to connect several computers together is


(a) Repeater (b) Modem
(c) Hub (d) Ethernet card

14. Which of the following software is not web browser?


(a) Google Chrome (b) Yahoo
(c) Internet explorer (d) Mozilla Firefox

15. is a page used to present information through text, images, audio, video etc., on web
(a) Word processor (b) Notepad
(c) W o r d p a d (d) Web page

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(View, Diamond, Oracle, Data mining, DBA)
16. View level is also called as external level in data abstraction.
17. Diamond is the symbol used to represent relationship in E-R diagram.
18. Person who have the authorization to access, monitor data base is DBA
19. Oracle is a software for creating and managing databases.
20. Extracting and discovery of knowledge from large amount of data is called Data mining

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove XX + XY = X.
22. What is duality theorem? Find the dual of 1 + X = X.
23. Define base class and derived class.
24. What is parameterized constructor? Write its features.
25. Mention any two functions of fstream and give their meaning.
26. What is data independence? Mention its types.
27. Give the syntax and example for DELETE command in SQL.
28. Mention any two antivirus softwares.

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Expand UPS. Explain its types.
30. Write the logic diagram and the truth table for NAND gate.
Use E-Papers, Save Tress
08
Above Line Hide When Print Out
31. Give the memory representation of two dimensional arrays.
32. Write pointer declaration and initialization.
33. Give the functions of: (a) get( ) (b) getline( ) (c) read( )
34. Explain relational data model with example.
35. Define the term: (a) Web page (b) W.W.W (c) Web browser
36. Explain any three basic HTML tags.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Π(0,4,8,9,10,11,12,13,15).
Reduce it by using Karnaugh map (K-Map).
38. Explain any different operations performed on arrays.
39. Write applications of queue.
40. What is object oriented programming? Write its limitations.
41. Explain class definition with syntax and example.
42. Explain inline functions with programming example.
43. What is destructor? Write its syntax and programming example.
44. Write the advantages of inheritance.
45. Differentiate between hierarchical and network data model.
46. Explain different logical operators used in SQL.
47. What is networking? Explain the goals of networking.

*******************

Use E-Papers, Save Tress 09


Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 6
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Name the standard used in latest motherboard
(a) XT (b) AT
(c) Baby AT (d) ATX

2. Canonical Product Of Sum expression represented using symbol.


(a) $ (b) Π
(c) & (d) Σ

3. Standard symbol for XNOR gate is


(a) ⊕ (b) ⊙
(c) ~ (d) –

4. Name the data structure which is called FIFO list


(a) Arrays (b) Stack
(c) Queue (d) Linked List

5. Members declared in section are accessible outside the class?


(a) Public (b) Private
(c) Protected (d) None of the above

6. Keyword inline is used to define


(a) Inline functions (b) Friend functions
(c) Constructor (d) Destructor

7. Constructor must be declared in section


(a) Public (b) Private
(c) Protected (d) Anywhere inside the class

8. A class whose properties are inherited by another class is


(a) Sub class (b) Base class
(c) Inherited class (d) Derived class

9. Which of the following operator is used to initialize pointer?


(a) * (b) &
(c) = (d) ~

10. Single entry in a table is called


(a) Attribute (b) Domain
(c) Record (d) Field

11. Which of the following is an example for DDL command


(a) UPDATE (b) INSERT INTO
(c) DELETE (d) CREATE

Use E-Papers, Save Tress


10
Above Line Hide When Print Out
12. Which of the following is an example for duplex communication mode?
(a) Radio (b) Internet
(c) Walkie - Talkie (d) Modern telephone system

13. Hardware device used to convert analog signals to digital is


(a) Repeater (b) Modem
(c) Hub (d) Ethernet card

14. Which of the following software is a web browser?


(a) Google (b) Yahoo
(c) Internet explorer (d) Photoshop

15. Collection of web pages is called


(a) Folder (b) File
(c) W e b s i t e (d) Word document

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Metadata, Table, Primary key, Eclipse, Physical)
16. Physical level is also called as internal level in data abstraction.
17. Eclipse is the symbol used to represent attributes in E-R diagram.
18. Table is an entity like table.
19. Primary key uniquely identifies each record in a table.
20. Data about data is called Metadata

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove (X + Y)(X +Z)=X + YZ
22. Define sum-of-product and product-of-sum expressions.
23. Define Polymorphism and message passing
24. Mention different types of constructors.
25. What is a stream? Mention any one stream used in C++.
26. Explain database users.
27. Give the syntax and example for INSERT INTO command in SQL.
28. What are communication modes? Explain simplex mode

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is port? Explain serial port.
30. Write the logic diagram and the truth table for AND gate.

Use E-Papers, Save Tress


11
Above Line Hide When Print Out
31. Write an algorithm for PUSH operation in stack
32. Differentiate between static and dynamic memory allocation.
33. Give the functions of put( ), get( ) and write( ) functions.
34. Briefly explain one-tier database architecture.
35. What is web browser? Mention any two browsing softwares.
36. What is web hosting? Mention types of web hosting.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,3,4,6,8,9,10,11,12,14).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm for search elements using binary search.
39. Explain different operations performed on stack data structure.
40. Explain different characteristics of OOP’s
41. What is the significance of using access specifiers? Explain different access specifiers.
42. Explain function overloading with syntax and example.
43. What is default constructors? Explain with syntax and example program.
44. Explain single level inheritance with a programming example.
45. Differentiate between Electronic and manual data processing.
46. Explain GROUP BY and ORDER BY commands with syntax and example.
47. What is computer virus? Give measures of preventing computer virus.

*******************

Use E-Papers, Save Tress


12
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 7
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Form factor defines of motherboard.
(a) Functions (b) Geometry and structure
(c) Data coordination (d) Memory

2. Minterm notation of XYZ is


(a) m7 (b) M7
(c) m5 (d) M5

3. Standard symbol for NOT gate is


(a) ⊕ (b) ⊙
(c) + (d) –

4. Which of the following is an example for non-linear data structure?


(a) arrays (b) stack
(c) Queue (d) Trees

5. operator used to access members of a class


(a) :: (b) ;
(c) . (d) “

6. Advantages of inline function includes


(a) Faster execution (b) increasing readability
(c) Generating efficient code (d) All the above

7. In which type of constructors all the objects created initializes to same set of values
(a) Default constructor (b) Parameterized constructor
(c) Copy constructor (d) None of the above

8. Advantages of inheritance is
(a) Reusing existing code (b) Easy to extend
(c) Memory utilization (d) All the above

9. new operator is used to create memory during


(a) Compile time (b)Runtime
(c) Static time (d) None of the above

10. Table with rows and columns is called _


(a) Column (b) Row
(c) Relation (d) Field

11. commands used to define relationship between records.


(a) DML (b) DQL
(c) DDL (d) DCL

Use E-Papers, Save Tress


13
Above Line Hide When Print Out
12. Which of the following is the first computer network?
(a) TCP/IP (b) TELNET
(c) ARPANET (d) INTERNET

13. Which networking device is used to connect two network together?


(a) Hub (b) Modem
(c) Repeater (d) Bridge

14. Which of the following software is provided to user on limited trial basis?
(a) Shareware (b) FLOSS
(c) Freeware (d) Free software

15. In which type of hosting the company rents an entire server from the hosting company?
(a) Free hosting (b) Dedicated hosting
(c) V i r t u a l h o s t i n g (d) Shared hosting

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(Attributes, Data security, Information, Data model, End users)
16. Abstract model that describes how data is represented and used is Data model
17. Attributes describes the characteristics of an entity.
18. The processed for of data is Information
19. End users are the people who access the database for querying, updating, generating repots.
20. Data security is an example for advantages of DBMS.

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Write truth table and logic symbol for NOT gate
22. State and prove idempotance law.
23. Explain classes with example.
24. Mention the features of copy constructor.
25. Differentiate between get( ) and getline( ).
26. Differentiate between data and information.
27. Mention different data types used in SQL.
28. Give any two applications of computer networks.

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. Explain any three slots present in motherboard.
30. Realize AND, OR ,NOT gates using NAND gate

Use E-Papers, Save Tress


17
Above Line Hide When Print Out
31. Write an algorithm for POP operation in stack
32. What is the purpose of new and delete operator?
33. Give the functions of: (a) seekg( ) (b) tellg( ) (c) put( )
34. Explain different components of E-R diagram.
35. What is E-commerce? Explain any two types.
36. What is web scripting? Explain its types.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = m1+m2 +m3+m4+m5+m7+m8+m9 +m11+m12+m13+m15
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm to search elements using linear search
39. Explain operations performed on queue data structure.
40. Write application of object oriented programming.
41. Explain array of objects with syntax and programming example..
42. What is inline function? Write its advantages and disadvantages
43. What is constructor? Write an example program.
44. Explain different types of inheritance.
45. Explain DBS architecture.
46. Explain different comparison operators used in SQL.
47. Explain different types of switching techniques.

*******************

Use E-Papers, Save Tress


18
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 8
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. Parallel port is used to carry bytes of data
(a) 1 Byte (b) 8 Byte
(c) 1 Bit (d) 1 Mega byte

2. Result of any logical expression is always FALSE(0), is called


(a) Tautology (b) Fallacy
(c) Minterm (d) Maxterm

3. What is the output of the 2 input OR gate for inputs A = 0, B=0?


(a) Output 0 (b) Output 1
(c) No output (d) Both (a) and (b)

4. Which of the following is an application of stack?


(a) Backtracking (b) Reversing a word
(c) Tower of hanoi (d) All the above

5. Array having class type elements is called


(a) Array of pointers (b) Array of objects
(c) Array of elements (d) Array of variables

6. Friend function must be defined


(a) inside class (b) outside class with keyword friend
(c) Outside class without keyword friend (d) anywhere in the program

7. Constructor used to copy one object to another object is


(a) Default constructor (b) Parameterized constructor
(c) Copy constructor (d) None of the above

8. Visibility mode defines


(a) Type of derivation (b) Type of data types
(c) Type of function (d) None of the above

9. is the collection of addresses


(a) Array of objects (b) Array of pointers
(c) Array of elements (d) Array of variables.

10. Abstract model the describes how data is represented and used is _ _
(a) Data warehouse (b) Data Model
(c) Data mining (d) Database

11. operator used to search for values that are within a set of values
(a) ANY (b) BETWEEN
(c) ALL (d) EXISTS

Use E-Papers, Save Tress


19
Above Line Hide When Print Out
12. Device that amplifies a signal being transmitted on the network is
(a) Hub (b) Modem
(c) Repeater (d) Bridge

13. Which of the following is not an example for antivirus software?


(a) Kaspersky (b) Norton 360
(c) Quick heal (d) Turbo c++

14. Which of the following is not an advantage of E-commerce?


(a) 24 X 7 service (b) Global participation
(c) Free trial before purchasing (d) Home delivery

15. refers to the web content that changes each time it is viewed
(a) HTML (b) XML
(c) D H T M L (d) None of the above.

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(one-tier, Data independence, serial file organization, tuple, Attribute)
16. Each column is identified by distinct header called Attribute
17. One-tier is the architecture where users directly sit on DBMS and uses it.
18. Each row in a table is called tuple
19. Serial file organization stores data in serial order in the database.
20. Ability database to modify schema at one level without affecting it on another level is Data independence

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Prove xy +xy = x.
22. State De-Morgans theorems.
23. List different characteristics of OOP’s.
24. Mention different types of constructors.
25. What are the advantages of saving data in binary form?
26. Define primary key and foreign key.
27. Mention different logical operators used in SQL.
28. Name different types of networking cables.

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is bus? Mention its types
30. What are derived gates mention different derived gates.

Use E-Papers, Save Tress


23
Above Line Hide When Print Out
31. What is linked list? Mention its types
32. What is static memory allocation? Explain.
33. Explain methods of opening files in C++.
34. Explain logical two tier client server architecture.
35. Write the features of open source softwares.
36. Explain types of web scripting.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = Σ(0,1,2,3,4,8,9,10,11,12).
Reduce it by using Karnaugh map (K-Map).
38. Write an algorithm to perform PUSH and POP operation in stack.
39. Explain different operations performed on linear array.
40. Explain different characteristics of object oriented programming.
41. What is an object? Explain syntax and example for object definition.
42. Explain the characteristics of friend functions.
43. Explain destructor with syntax and example.
44. Define the terms:(a) Inheritance (b) Base class (c) Visibility mode
(d) Abstract class (e) Virtual base class
45. Explain the features of database system.
46. Explain ALTER and UPDATE command with syntax and example.
47. What is networking? Explain the applications of networking.

*******************

Use E-Papers, Save Tress


24
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 9
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. CMOS is used to store
(a) Intermediate data (b) Date and time instructions
(c) input data (d) Output result

2. Result of any logical expression is always TRUE(1), is called


(a) Tautology (b) Fallacy
(c) Minterm (d) Maxterm

3. What are the inputs to a 3 input OR gate if its output is 0?


(a) All inputs must be 1 (b) All inputs must be 0
(c) Atleast one input must be 0 (d) Atleast one input must be 1

4. Name the data structure whose relationship between data elements is by means of links
(a) Arrays (b) stack
(c) Queue (d) linked list

5. Which of the following is the default access specifier?


(a) Public (b) Protected
(c) Private (d) None of the above

6. Friend function is a
(a) Member function (b) Non member function
(c) Main function (d) Recursive function

7. In constructor declaration of object is followed by argument list enclosed in parenthesis is


(a) Implicit call (b) Explicit call
(c) Initialized at the time of declaration using = (d) None of the above

8. If no visibility mode is specified then by default the visibility mode is


(a) Public (b) Protected
(c) Private (d) None of the above

9. is the built in pointer that hold the address of the object defined for a class
(a) this pointer (b) new
(c) delete (d) AND

10. Visual representation of data that describes how data is related to each other is _
(a) E-R diagram (b) flowchart
(c) Data model (d) None of the above

11. operator used to compare value to any applicable value in the list
(a) ANY (b) AND
(c) ALL (d) NOT
Use E-Papers, Save Tress
25
Above Line Hide When Print Out
12. Which is the system/software application which has internetwork capability of joining dissimilar
network?`
(a) Gateway (b) Bridge
(c) Router (d) Switch

13. Which of the following is the characteristic of virus?


(a) Able to replicate (b) Reduce memory space
(c) Modification of data (d) All the above

14. Which of the following is not related a service of E-Commerce?


(a) E-MAIL (b) E-Banking
(c) Electronic fund transfer (d) Finance

15. Which of the following is HTML tag is used to create table?


(a) <TABLE> (b) <FORM>
(c) < B O D Y > (d) <HEAD>

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(tree, domain, DBMS, entity, Database)
16. Set of values for an attribute in each column is domain
17. DBMS is an application software used for creating, updating, managing database
18. Hierarchical model follows tree structure.
19. Database is a collection of logically related data.
20. entity is an object like table.

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Find the complement of the expression F= XY + XZ + XY
22. Draw a general K-Map for 3 variables.
23. Define class and object.
24. Write syntax and example for copy constructor.
25. Name the stream classes supported by C++ for file input and output.
26. Define Primary key and Secondary key.
27. What is dual table? Give example.
28. Write advantages of networking.

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is the purpose of ports, bus and disk controllers
30. What are universal gates? Mention different universal gates
Use E-Papers, Save Tress 26
Above Line Hide When Print Out
31. What is stack? Write any two applications of stack.
32. What is self referential structure? Give example.
33. Explain any three modes to open a file in C++.
34. Explain any E-R diagram notation and write its purpose..
35. Write advantages and disadvantages of WWW.
36. Give the features of XML.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) = m1+m2 +m3+m4+m5+m7+m8+m9 +m11+m13+m14+m15
Reduce it by using Karnaugh map (K-Map).
38. What is sorting? Write an algorithm to sort an array using insertion sort.
39. What is queue? Explain different types of queue.
40. Write the difference between procedural and object oriented programming
41. What are access specifiers? Explain different access specifiers.
42. Explain inline function with syntax and example program.
43. Explain destructor and its characteristics
44. What is inheritance? Write its advantages.
45. Differentiate between electronic and manual file organization.
46. Explain DELETE and UPDATE command with syntax and example.
47. Explain different switching techniques.

*******************

27
Use E-Papers, Save Tress
Above Line Hide When Print Out
II PU COMPUTER SCIENCE – MODEL PAPER 10
PART – A
Answer all the questions. Each question carries one mark. 1 x 20 = 20
I. Select the correct answer from the choices given: (Repeated answers will not be considered)
1. The function of BIOS is
(a) Stores data (b) Store Date and time instructions
(c) Stores input data (d) Stores instructions to load hardware setting

2. Method of simplifying the expression by passing most possible values is


(a) Perfect induction method (b) Algebraic simplification
(c) Pass by value (d) Call by Value

3. NOR gate is a combination of gates


(a) NOT AND (b) NOT OR
(c) NOT NAND (d) NOT NOR

4. Which of the following is not an application of queue?


(a) Simulation (b) Converting infix to postfix expression
(c) Scheduling algorithm (d) Maintenance of printer server

5. is the process of representing essential features without including background details.


(a) Data abstraction (b) Inheritance
(c) Data hiding (d) Polymorphism

6. Friend function must be defined


(a) inside class (b) outside class with keyword friend
(c) Outside class without keyword friend (d) anywhere in the program

7. Function which initializes object of a class automatically is


(a) Destructor (b) Friend function
(c) Constructor d) Inline function

8. In private inheritance public members of base class becomes members of derived class.
(a) Public (b) Protected
(c) Private (d) All of the above

9. Pointers pointing to object of a class called


(a) Array of pointers (b) Class pointers
(c) Object pointer (d) This pointer

10. Field in a relation that matches the primary key column of another table
(a) Primary key (b) Foreign key
(c) Secondary key (d) Candidate key

11. operator used to search for the presence of a row in a specified table
(a) ANY (b) AND
(c) ALL (d) EXISTS

Use E-Papers, Save Tress 28


Above Line Hide When Print Out
12. In which type of communication one interface is transmitter and all other interfaces are receivers?
(a) Simplex (b) Duplex
(c) Half duplex (d) All the above

13. SMS stands for


(a) Small Message System (b) Small Message Service
(c) Short Message Service (d) Short Message System

14. is the exchange of services, information or products between two consumers.


(a) B2B (b) B2C
(c) C2B (d) C2C

15. Which of the following is HTML tag is used to create forms?


(a) <TABLE> (b) <FORM>
(c) < B O D Y > (d) <HEAD>

II. Fill in the blanks choosing the appropriate word/words from those given in brackets.
(Repeated answers will not be considered)
(record, Data independence, serial file organization, network model, Attribute)
16. Each column is identified by distinct header called attribute
17. Data model is a data model that follows graph structure.
18. Each row in a table is called record
19. Serial file organization stores data in serial order in the database.
20. Ability database to modify schema at one level without affecting it on another level is Data independence

PART – B
III. Answer any FOUR questions. Each question carries two marks. 2x4=8
21. Write the statement for De-Morgans theorem.
22. X + Y = Y + X evaluate using truth table.
23. Write any two limitations of OOP’s.
24. Write syntax and example for parameterized constructor.
25. Write the difference between put( ) and get( ) functions.
26. What is data mining? Mention its components.
27. What is the purpose of GRANT and REVOKE.
28. Explain circuit switching technique.

PART – C
IV. Answer any FOUR questions. Each question carries three marks. 3 x 4 = 12
29. What is bus? Mention its types.
30. Write truth table and logic symbol for XOR gate.
29
Use E-Papers, Save Tress
Above Line Hide When Print Out
31. What is queue? Write any two applications of queue.
32. What is relationship between object and pointers? Give example.
33. Write the difference between text file and binary file.
34. What are the advantages and disadvantages of ISAM?
35. Define E-Commerce. Write its services.
36. Give the features of DHTML.

PART – D
Answer any SIX questions. Each question carries five marks. 5 x 6 = 30
37. Give the Boolean function F(A,B,C,D) =
Σ(0,4,8,9,10,11,12,13). Reduce it by using Karnaugh
map (K-Map).
38. Write an algorithm for search elements using binary search.
39. Explain different operations performed on stack data structure.
40. Write the difference between procedural and object oriented programming
41. What are access specifiers? Explain different access specifiers.
42. What is function overloading? Write the needs for function overloading.
43. Explain constructor with syntax and example.
44. What is inheritance? Explain multiple and multilevel inheritance.
45. Explain data processing cycle.
46. Explain INSERT INTO and SELECT command with syntax and example.
47. What is network security? Explain different protection methods.

*************

Use E-Papers, Save Tress


Above Line Hide When Print Out

You might also like