0% found this document useful (0 votes)
31 views

11 CS slow learners MATERIAL

This document is a slow learners material for Computer Science for standard XI, covering fundamental concepts of computers, number systems, computer organization, operating systems, and Windows OS. It includes definitions, functions, characteristics, applications, and various components of computers, as well as explanations of algorithms, data representation, and operating system features. The document serves as a comprehensive guide for students to understand basic computer science principles and their applications.

Uploaded by

Vasantha kumar R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views

11 CS slow learners MATERIAL

This document is a slow learners material for Computer Science for standard XI, covering fundamental concepts of computers, number systems, computer organization, operating systems, and Windows OS. It includes definitions, functions, characteristics, applications, and various components of computers, as well as explanations of algorithms, data representation, and operating system features. The document serves as a comprehensive guide for students to understand basic computer science principles and their applications.

Uploaded by

Vasantha kumar R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

KRISHNASAMY MEMORIAL MAT. HR. SEC.

SCHOOL, CUDDALORE -1 PAGE-1


STD – XI COMPUTER SCIENCE
SLOW LEARNERS MATERIAL – 2024-25
CHAPTER 1 - INTRODUCTION TO COMPUTERS
2MARKS
1. What is Computer?
Computer is an electronic device. It gets input from user and it gives output to the user at very fast rate.
2. What are the components of a computer?
a. Input Device b. Output Device and c. CPU(Central Processing Unit)
3. What are the functions of ALU?
ALU (Arithmetic and Logic Unit) performs addition, subtraction, multiplication, division and logical
operations.
4. Distinguish between Primary and Secondary memory?
Primary memory Secondary memory
stores the data temporarily stores the data permanently
Volatile memory Non volatile memory
Eg : RAM Eg : ROM
5. What is the function of control unit?
Controls the flow of data between the CPU, memory and I/O devices.
3MARKS
6. What are the characteristics of computer?
Speed Accuracy Diligence Versatile Stores huge data
7. What are the applications of computer?
Computers are used in
Education Research Entertainment Tours and Travels Medicals
Social networking Weather forecasting etc..
8. What is an input device? Give 3 example
Input device is used to give data (as input) to the computer Eg:
Keyboard,Mouse,Scanner
9. What is output device? Name any 3 output device.
Output device used to get information (as output) from the computer Eg.
Monitor, printer, projector
5MARKS
10. Explain the basic components of computer with neat diagram.
COMPONENTS OF COMPUTER
Input Device : It is used to give data (as input) to the computer. Eg.
Keyboard,Mouse,Scanner
Output Device : It is used to get information(as output) from the computer. Eg:
Monitor,printer,projector
CPU(Central Processing unit) : It process the data and gives information as output
COMPONENTS OF CPU
Control unit : It controls all parts of computer.
ALU (Arithmetic and Logic unit):
It performs addition,subtraction,multiplication,division and logical operations.
Memory : It stores the data for processing. There are two types in memory
Primary memory Secondary memory
stores the data temporarily stores the data permanently
Volatile memory Nonvolatile memory
Eg : RAM Eg : ROM
PAGE-2

11. Discuss various generation of computers.

GENERATION PERIOD MAIN COMPONENT USED MERITS & DEMERITS


First 1940-1956 Vacuum tubes  Big in size
 Consumes more power
 Machine language was used
Second 1956-1964 Transistors  Comparatively small in size
 Consumes less power
 Machine as well as Assembly
Language was used
Third 1964-1971 Integrated circuits(IC)  Smaller and faster
 High level Languages were used
Fourth 1971-1980 Microprocessor  Microcomputer series – APPLE,IBM
Very Large Scale Integrated developed
circuits(VLSIC)  Portable computers introduced
Fifth 1980- till date Ultra Large Scale Integrated  Parallel processing
Circuits(ULSIC)  Able to solve high complex problem
and logical reasoning
Sixth In Future -  Development of robotics
 Parallel and distributed computing
12. Explain a) inkjet printer b) Multimedia projector c) barcode reader / projector
a) Inkjet Printer:
 Inkjet printer use colour cartridgesto create colour tones.
 A black cartridge is used for monochrome output.
 Inkjet printer works by spraying ionised ink at a sheet of paper.
(b) Multimedia Projector:
1. Multimedia projectors are used to produce computer output on a big screen.
2. These are used to display presentations in meeting halls or in class rooms.
(c) Barcode/ QR code Reader:
 A Bar code is a pattern printed in lines of different thickness
 The Bar code reader scans the information on the bar codes transmits to the computer for further
processing.
Quick response (QR) code:
The QR code is the two dimension bar code which can be read by a camera and processed to interpret the
image.
CHAPTER 2 - NUMBER SYSTEM
2MARKS
1. What is Data?
The term data comes from the word datum.
Data is a fact about people,place or some objects. Eg. Ram,15 etc..
2. Write the 1‘s complement procedure.
Convert all 0‘s to 1(one) and 1‘s to 0(zero) in the binary number.
3. We cannot find 1‘s complement for (28)10. . State reason.
Because 28 is the positive number. 1‘s complement to find only for negative number.
4. List the encoding system that represents character in memory. BCD
– Binary coded decimal
EBCDIC –Extended binary coded decimal interchange code ASCII –
American standard code for information interchange
ISCII – Indian standard code for information interchange Unicode
PAGE-3

3MARKS
5. What is the radix of a number system. Give example
Radix means base , it is the count of number of numbers used in number system.
Number system Base
Binary (it uses 0 and 1 – 2numbers) 2
Decimal ( it uses 0 to 9 – 10 numbers) 10
Octal ( it uses 0 to 7 – 8 numbers) 8
Hexa Decimal (it uses 0 to 15 -16 16
numbers)
6. Write note on Binary number system.
Binary number system uses two bits i.e 0 and 1. It‘s
base is 2. Eg. (1010)2
5 MARKS

1.

2.

2MARKS

1. What are derived gates?


Logic gates like NAND, NOR, XOR, XNOR are derived gates which are derived from the fundamental
gates
2. Write the associative law.
 A+(B+C)=(A+B)+C
 A.(B.C)=(A.B).C
3. Reason out why the NAND and NOR are called universal gates.
 NAND and NOR are called universal gates.
 Because the fundamental logic gates can be realized through them.
PAGE-4

4. Write the DeMorgan‘s law.


 A+B=A.B (A.B)=A+B

5 MARKS
5. How AND and OR can be realized using NAND and NOR gate.

6. Explain the gates with expression and truth table


PAGE-5

CHAPTER 3 - COMPUTER ORGANISATION


2MARKS
1. What are the parameters which influence the characteristics of a microprocessor? Clock
Speed Instruction Set Word Size
2. What is an instruction?
A command given to the computer to perform an operation on data.
3. What is a program counter?
Program counter is a special register in the CPU which keeps the address of the next instruction to be
executed
4. What is HDMI?
High Definition Multimedia Interface is an audio video interface which transfer the uncompressed data
to LCD monitor, projector.
5. Which source is used to erase the content of a EPROM?
Ultraviolet rays
3MARKS
6. Differentiate computer architecture and organization.
Computer organization Computer Architecture
 Deals with the hardware components of a  Deals with the engineering
computer considerations, designing of a computer

7. Classify the microprocessor based on the SIZE of the data.


 8 – Bit Microprocessor
 16 – Bit Microprocessor
 32 – Bit Microprocessor
 64 – Bit Microprocessor
8. Write down the classification of microprocessor based on the INSTRUCTION SET
 CISC – Complex Instruction Set Computer
 RISC – Reduced Instruction Set Computer
9. Write down the interfaces and ports available in a computer.
1.serial port 2. USB port 3.USB 3.0 4.VGA Connector 5. Audio Plugs
6. PS/2 Port 7. SCSI Port 8.HDMI (High Definition Multimedia Interface)
5 MARKS
1. Explain the characteristics of Microprocessor
CLOCK SPEED : It regulates the speed at which the instructions executed
INSTRUCTION SET : It is a Basic set of Machine level instructions executed by Microprocessor. WORD
SIZE : It denotes the number of bits processed by microprocessor
2. Explain the types of ROM
ROM ( READ ONLY MEMORY ) It is the non-volatile memory. We cannot delete the content of this memory ,
only can read.
PROM (PROGRAMMABLE READ It is also a non-volatile memory.
ONLY MEMORY)
EPROM ( ERASABLE It is a special type of memory, it‘s content can be erased by using ultraviolet
PROGRAMMABLE READ ONLY rays
MEMORY)
EEPROM (ELECTRICALLY ERASABLE It is also a special type of memory and it‘s content can be deleted by
PROGRAMMABLE READ ONLY MEMORY) electrical charge.
PAGE-6

CHAPTER 4 – THERORETICAL CONCEPTS OF OPERATING SYSTEM


2MARKS
1. List out any 2 uses of operating system
 Controlling Input and Output devicesEasy interaction between the users and computer
2. What is multi-user Operating system?
It allows same data and applications to be accessed by multiple users at the same time.
3. What is a GUI?
GUI is GRAPHICAL USER INTERFACE . Its vibrant colours attract the user very easily.
4. What is multi-processing?
It has two or more processors for a single running process (job).
5. What are the security management features available in operating system?
 File Access level system level Network Level
6. What are the different operating system used in computers
 Single user OS Multi user OS Distributed OS
3 MARKS
7. List out the key features of Operating system.
User Interface (UI) File Management Memory Management
Fault Tolerance Process management Security Management
8. What is multi-processing?
 It has two or more processors for a single running process (job).
 Processing takes place in parallel is known as parallel processing.
5 MARKS
9. Explain the process management algorithms in Operating System.
FIFO (First In First Out) Scheduling:
This algorithm is based on queuing technique. The processes are executed in the order of the queue (row).
SJF (Shortest Job First) Scheduling:
This algorithm works based on the size of the job, smaller size job executed first.
Round Robin Scheduling:
It is designed especially for time sharing systems. ❖Jobs (processes) are assigned and processor time in
a circular method.
Based On Priority:
The job which has higher priority is executed first.

CHAPTER 5 – WORKING WITH WINDOWS OPERATING SYSTEM


2 MARKS
1. What is known as Multitasking?
Multiple applications can execute at the same time in Windows is known as ―Multitasking‖.
2. What are called standard icons?
The icons which are available on desktop by default while installing Windows OS are called standard
icons. Eg. My Computer, Recycle Bin.
3. Differentiate Files and Folders.
Files Folders
All types of information are stored in the computer are files Folders are containers of files that is usedto organize files.
4. Differentiate Save and save As option.
Save Save As
Used to save a file for only one time Used to save a file by two or more than two names
Short cut :ctrl+s Short cut :shift+ctrl+s
PAGE-7

5. How will you Rename a File?


 Select the File you wish to Rename.
 Click File→ Rename.
 Type the new name.
 Press Enter key SHORTCUT KEY is F2
3 MARKS
6. Write a note on the elements of window?
Title bar – Displays the name of the application and document opened
Menu bar – used to access menus in the menu bar
The work space – used to type the text in the document
Scroll bar – used to scroll the workspace horizontally and vertically
Corners and borders – Helps to drag and resize the windows
7. Write a note on Recycle bin.
Recycle bin is a special folder to keep the files or folders deleted by the user. We
cannot use that files without restoring it.
5 MARKS
8. Explain the different ways of finding a file or folder.
To find a file or folder:
* Click the Start button, the search box appears at the bottom of the start menu.
* Type the name of the file or the folder you want to search.
* The files or the folders with the specified names will appear, if you click that file, it will
directly open that file or the folder.
Searching Files or folders using Computer icon:
Click Computer Icon from desktop or from Start menu.
* The computer disk drive screen will appear and at the top right corner of that screen,
there is a searchox option.
* Type the name of the file or the folder you want to search.
* Just click and open that file or the folder.
9. Explain the versions of Windows Operating System.
VERSIONS YEAR FEATURES
WINDOWS 1.X 1985  Mouse was introduced
 Introduction of GUI IN 16 -bit processor
WINDOWS 2.X 1987  Supports to minimize and maximize windows
 Control panel feature was introduced
WINDOWS 3.X 1992  Introduced Multitasking
 Supported 256 colours
WINDOWS NT 1993  Designed to act as servers us network
WINDOWS 95 1995  Introduced start button and start menu
 Introduced 32- bit processor and focused on multitasking
WINDOWS 98 1998  Plug and play feature was introduced
WINDOWS Me 2000  Introduced automated system and recovery tools.
WINDOWS 2000 2000  Served as an OS for business desktop and laptop system
WINDOWS XP 2001  Introduced 64- bit processor
 Improved windows appearance with themes and stable version
WINDOWS Vista 2006  Updated the look and feel of windows
WINDOWS 7 2009  Booting time was improved
 Introduced pinning programs to taskbar
WINDOWS 8 2012  Start button was removed
 Served as common platform for mobile and computer
WINDOWS 10 2015  Multiple desktop
 Cortana voice activated personal assistant
PAGE-8

CHAPTER – 6 SPECIFICATION AND ABSTRACTION


2 MARKS
1. Define an Algorithm.
Algorithm is a sequence of instruction to perform a task or solve a problem.
2. Distinguish between Algorithm and a process
ALGORITHM PROCESS
 Algorithm is a sequence of instruction to  When the algorithms are executed, a process
perform a task or solve a problem. evolves which accomplishes the intended task or
solves the given problem.
3. How is state represented in Algorithms?
The state of a process can be represented by a set of variables in an algorithm The state at
any point of execution is simply the values of variables at that point As the values of the
variables are changed the state changes
4. What is abstraction?
Ignoring or hiding unnecessary details and modeling an entity only its essential properties.
5. What is the difference between assignment and equality operator?
Assignment operator Equality operator
Assignment operator : = Equality operator ==
Used to assign value to the variable Used to compare the values of the variable
Eg: U:=5 Eg: U=V

CHAPTER – 7 COMPOSITION AND DECOMPOSITION


2 MARKS
1. Why is function an abstraction?
 After an algorithmic problem is decomposed into sub problems, we can abstract the sub
problems as functions.
 A function can also be specified by its input property, and its input-output relation.
2. How do refine a statement?
 Each sub problem can be expanded into more detailed steps.
 Each step can be further expanded to still finer steps, and so on.
3. What is case analysis?
 Case analysis statement generalizes it to multiple cases.
 Case analysis splits the problem into an exhaustive set of disjoint cases.
 Case analysis splits the problem into an exhaustive set of disjoint cases.
EXAMPLE:
1. case C1
2. S1
3. case C2
4. S2
5. else
6. S3
PAGE-9

CHAPTER-8 ITERATION AND RECURSION


2 MARKS
1. What is an invariant?
An expression involving variables, which remains unchanged by an assignment to variables is called an
invariant.
2. Define a loop invariant.
An invariant for the loop body (or)
An unchanging property of the variables during loop execution
3. Does testing the loop condition affect the loop invariant? Why? No,
the loop conditions do not affect the loop invariant.
Because each time the loop body is executed repeatedly, the variables are updated.
4. What is recursive problem solving?
 Recursion step breaks the problem into sub-problems of smaller size and
constructs solution to the given problem.

CHAPTER- 9 INTRODUCTION TO C++


2 MARKS
1. What is meant by a token or lexical unit ? Name the token available in C++.
 The smallest individual unit in a program
 C++ has the following tokens:
 Keyword
 Identifiers
 Literals
 Operators
 Punctuators
2. What are keywords? Can keywords be used as identifiers?
 Keywords are the reserved words which convey specific meaning to the C++ compiler.
 Reserved words or keywords cannot be used as an identifier name.

3 MARKS
3. Describe the differences between keywords and identifiers?
Keywords Identifiers
 Keywords are the reserved words which  Identifiers are the user-defined names given to the
convey specific meaning to the C++ variables
compiler.
 They are the elements to construct C++  These are the fundamental building blocks of a
programs. program.
 Example: Switch, for, if, etc.,  Example: name, age, class, etc.,
4. Is C++ case sensitive? What is meant by the term “case sensitive”?
 Yes, C++ is case sensitive as it treats upper and lower-case characters differently.
 All the keywords must be in lowercase
5. What is the use of a header file?
 #include<iostream> statement tells the compiler‘s to include the header file in the
program
 To implement input/output functionalities.
 ―iostream‖contains the definition of its member objects cin and cout.
6. Why is main function special?
 The main( ) function in the C++ program is the starting point.
 All the programs begin their execution in main().
PAGE-10

5 MARKS
7. Write about Binary operators used in C++.
Binary Operators - Require two operands and one operator
C++ Binary Operators are classified as:
(1) Arithmetic Operators
(2) Relational Operators
(3) Logical Operators
(4) Assignment Operators
(5) Conditional Operator

1) Arithmetic operators
Operator Operation
+ Addition
- Subtraction
* Multiplication
/ Division
% Modulus (To find the
reminder of a division)
Relational operators
Operator Operation
> Greater than
< Less than
>= Greater than or equal to
<= Less than or equal to
== Equal to
!= Not equal
3) logical operators:
Operator Operation
&& AND
|| OR
! NOT
4) Assignment Operators:
Operator Name of Operator
+= Addition Assignment
-= Subtraction Assignment
*= Multiplication Assignment
/= Division Assignment
%= Modulus Assignment
5) Conditional Operator:
 ?: is a conditional Operator which is also known as Ternary Operator.
 an alternate to if ..else statement
PAGE-11

What are the types of Errors?


Type of Error Description
 Syntax is a set of grammatical rules to construct a program and occur
when the rules of C++ are violated.
Syntax Error
 Example: cout << “Welcome to Programming in C++”
 Occur an error
 It may be happened by wrong use of variable / operator / order of
execution etc.
Semantic Error  So, Semantic error is also called as “Logical Error”.
 A run time error occurs during the execution of a program.
Run-time error  Example: If a program tries to open a file which does not exist.

DATA TYPES, VARIABLES AND EXPRESSIONS


1. Write a short note on const keyword with an example.
 const is the keyword used to declare a constant.
 const keyword modifies / restricts the accessibility of a variable.
2. What is the use of setw( ) format manipulator?
 setw manipulator sets the width of the field assigned for the output
 Syntax:setw(number of characters)
3. Why is char often treated as integer data type?
 Character data type accepts and returns all valid ASCII characters.
4. What is a reference variable? What is its use?
 A reference provides an alias for a previously defined variable.
 It is used to assigned the value of a previously declared variable.
Syntax: <type> <& reference_variable> = <original_variable>
5. How relational operators and logical operators are related to one another?
Relational operators are used to determine the relationship between its operands. When the
relational operators are applied on two operands, the result will be a Boolean value 1 or 0
CHAPTER-10 FLOW OF CONTROL 2 MARKS
1. What is selection statement? write it's types?
 Selection statements are executed depending upon the conditional expression
evaluates either true or false.
Types:
 if statement
 if-else statement
 Nested if
 if -else-if ladder
 Alternative to if- else (?:)
2. What is an entry control loop? Explain any one of the entry controlled loop with suitable
example.
Entry Controlled Loop:
 The for loop is an entry- controlled loop.
 It is the easiest looping statement which allows code to be executed repeatedly.
 It contains three different statements (initialization, condition or test-
expression and update expression(s)) separated by semicolons.
Syntax:
for (initialization(s); test-expression; update expression(s))
{
Statement 1;
Statement 2;
………….
}
Statement-x;
PAGE-12

Example Program:
#include<iostream>
using namespace std;
int main ()
{
for(int i = 0; i< 5; i ++ )
cout<< i;
return 0;
}

CHAPTER -11 FUNCTIONS


2 MARKS
1. Define Functions.
 A large program can be split into small sub-programs (blocks) called as functions .
2. Write about strlen() function.
 The strlen() takes a null terminated string as its argument and returns its length.
 The length does not include the null(\0) character.
syntax: strlen(string)
3. What are importance of void data type.
 To indicate the function does not return a value
 To declare a generic pointer.
4. What is Parameter and list its types?
 Arguments or parameters are the values from the calling function to the called function.
Types: Formal Parameters Actual Parameters.
5. Write a note on Local Scope.
A local variable is defined within a block begins and ends with curly braces { }.
6. Write about strcmp() function.
 The strcmp() function takes two arguments: string1 and string2.
 It compares the contents of string1 and string2 lexicographically.
General Form: strcpy(String1, String2)
EXAMPLE: strcmp(“HELLO”,”HELLO”); 0
7. Explain Call by value method with suitable example.
 Call by value method copies the value of an actual parameter into the formal
parameter of the function.
 In this case, changes made to formal parameter within the function will have no effect on
the actual parameter.
 EXAMPLE
#include <iostream> using
namespace std; int sum(int
x,int y)
{
return(x+y);
}
int main()
{
int a=5,b=7;
cout<<"The sum is "<<a+b<<endl; cout<<sum(a,b);
return 0;
}
PAGE-13

8. What is Recursion? Write a program to find the factorial of the given number using recursion. A
function that calls itself is known as recursive function.

CHAPTER-12 ARRAYS AND STRUCTURE 2MARKS


1. What is Traversal in an Array?
 Accessing each element of an array at least once to perform any operation
2. What is Strings?
 A string is defined as a sequence of characters
 Every string is terminated by a null
3. What is the syntax to declare two – dimensional array.
 The declaration of a 2-D array is
data-type array_name[row-size][col-size];
4. Define structure .What is its use?
 Structure is a user-defined which has the combination of data items with different data types.
 Structure is declared using the keyword ‗struct.
5.What is the error in the following structure
definition. struct employee{
inteno;charename[20];char dept;} Employee
e1,e2;
Answer
struct employee
{
int eno;
char
ename[20];
char dept;
}
employee e1,e2;

3MARKS
1. Define an Array? What are the types?
 An array is a collection of variables of the same type that are referenced by a common name.
 Types Of Arrays :
 One-dimensional arrays
 Two-dimensional arrays
 Multi-dimensional arrays
PAGE-14

2. Write note an Array of strings.


 An array of strings is a two-dimensional character array.
 The size of the first index (rows) denotes the number of strings and the size of the second
index (columns) denotes the maximum length of each string.

CHAPTER-13 INTRODUTION TO OBJECT ORIENTED PROGRAMMINGTECHNIQUES


2 MARKS
1. What is polymorphism?
Polymorphism is the ability of a message or function to be displayed in more than one form.
2. How encapsulation and abstraction is are interrelated?
Abstraction refers to showing only the essential features without revealing background details. They
encapsulate all the essential properties of the object that are to be created.
3. Write the disadvantages of oops?
 Size Speed Effort
4. What is paradigm? Mention the different types of paradigm.
 Paradigm is an approach to organize the principle of a program.
 They are Procedural programming, Modular Programming and Object Oriented
Programming
3MARKS
5. Write a note on the features of procedural programming.
 Programs are organized in the form of sub programs
 All data items are global
 Suitable for small sized software application
 This is time consuming
 Example: FORTRAN and COBOL.
6. List some of the features of modular programming.
 Emphasis on algorithm rather than data
 Programs are divided into individual modules
 Each modules are independent of each other and have their own local data
7. What do you mean by modularization and software reuse?
 Modularisation: Where the program can be decomposed into modules.
 Software re-use: Where a program can be composed from existing and new modules.
8. Define information hiding.
 Data and Functions are bound together into a single unit is known as Encapsulation.
 Encapsulation of data from direct access by the program is called data hiding or
information hiding
5 MARKS
9. Write the differences between Object Oriented Programming and procedural
programming
OBJECT ORIENTED PROCEDURAL
Datas are grouped into single units using Programs are organized in the form of subroutines
classes and objects
Emphasis on data rather than Algorithm Emphasis on doing things
Easy to maintain Difficult to maintain
Example: C++, Java, VB.Net, Python etc Example: FORTRAN and COBOL
10. What are the advantages of OOPs?
 Re-usability: ―Write once and use it multiple times‖
 Redundancy:Inheritance is the good feature for data redundancy.
 Easy Maintenance:It is easy to maintain and modify existing code as new objects
 Security: Data hiding and abstraction provides and maintains the security of data.
PAGE-15

11. Write a note on the basic concepts that supports OOPs? (OR)
Main Features of Object Oriented Programming
Encapsulation: Data and Functions are bound together into a single unit .
Data Abstraction: showing only the essential features without revealing background details.
Modularity : Modularity is designing a system that is divided into a set of functional units that can be
composed into a larger application.
Inheritance:The technique of building new classes (derived class) from an existing Class
(base class).
Polymorphism:The ability of a message or function to be displayed in more than one form.

CHAPTER-14 CLASSES AND OBJECTS

2MARKS
1. Why it is considered as a good practice to define a constructor though compiler can
automatically generate a constructor?
 The constructor is executed automatically when the object is created
 It is a good practice to define a constructor, because it can be used explicitly to create new
object of its class type.
2. Differentiate structure and class though both are user defined data type.
 The only difference is the members of structure are by default public where as it is
private in class.
3. Write down the importance of destructor.
 A destructor function removes the memory of an object which was allocated by the
 constructor at the time of creating a object.
4. What are advantages of declaring constructors and destructor under public accessibility?
 We can initialize the object while declaring it.
 We can explicitly call the constructor.
 We can destroy the objects at the end of class scope automatically .
5 MARKS
5. Mention the differences between constructor and destructor
CONSTRUCTOR DESTRUCTOR
When a class object comes into scope,constructor When a class object goes out of scope, destructor
gets executed. gets executed.
The name of the constructor is same as class name. The name of the constructor is same as class name
prefixed with~
Constructor has no return type. Destructor has no return type.
can have parameter list. cannot have arguments.
They cannot be inherited They cannot be inherited
PAGE-16

CHAPTER – 15 POLYMORPHISM
2 MARKS
1. What is function overloading?
 The ability of the function to process the message or data in more than one form is called
as function overloading.
2. List the operators that cannot be overloaded.
 Scope operator (::) Sizeof
 Member selector (.)
 Member pointer selector (✳)
 Ternary operator (?:)
3. What is the use of overloading function?
 Reduces the number of comparisons and makes the program to execute faster.
4. What are the rules for function overloading?
 The overloaded function must differ in the number of its arguments or data types
 The return type of overloaded functions are not considered for overloading same data
type
5. What is operator overloading? Give some examples of operators which can be overloaded. The
term Operator overloading, refers to giving additional functionality to the normal C++
operators like +,++,-,—,+=,-=,*.<,>.
6. Discuss the benefits of constructor overloading.
 A class can have more than one constructor with different signature.
 Constructor overloading provides flexibility of creating multiple type of objects for a
class.
5 MARKS
7. What are the rules for operator overloading?
 Precedence and Associativity of an operator cannot be changed.
 No new operators can be created, only existing operators can be overloaded.
 Cannot redefine the meaning of an operator‘s procedure. You cannot change how
integers are added. Only additional functions can be given to an operator
 Overloaded operators cannot have default arguments.
 When binary operators are overloaded, the left hand object must be an object of the
relevant class
CHAPTER-16 INHERITANCE
2 MARKS
1. What is inheritance?
 The mechanism of deriving new class from an existing class is called inheritance.
2. What is a base class?
 A class that is used as the basis for creating a new class is called a super class or base class.
3. Why derived class is called power packed class?
 The derived class inherits all the properties of the base class.
 It is a power packed class, as it can add additional attributes and methods and thus enhance
its functionality.
4. In what multilevel and multiple inheritance differ though both contains many base class?
Multilevel Inheritance:
In multilevel inheritance, the constructors will be executed in the order of inheritance.
Multiple Inheritance:
If there are multiple base classes, then it starts executing from the left most base class.
PAGE-17

3MARKS
1. What are the points to be noted while deriving a new class?
i) The keyword class has to be used
ii) The name of the derived class is to be given after the keyword class
iii) A single colon (:)
iv) The type of derivation (the visibility mode), namely private, public or protected.
v) The name of the base class (parent class), if more than one base class, then it can be given
separated by comma.
2. What is the difference between polymorphism and inheritance though are used for reusability
of code?
Polymorphism:
 Reusability of code is implemented through functions (or) methods.
 Polymorphism is the ability of a function to respond differently to different message.
 Polymorphism is achieved through function and operator overloading.
Inheritance:
 Reusability of code is implemented through classes.
 Inheritance is the process of creating derived classes from the base class or classes.
 Inheritance is achieved by various types of inheritances namely single, multiple,
multilevel, hybrid and hierarchical inheritances.
3. What do you mean by overriding?
 When a derived class member function has the same name as that of its base class member
function , the derived class member function shadows/hides the base class‘s inherited function
 This situation is called function overriding and this can be resolved by giving the base
class name followed by :: and the member function name.

5 MARKS
1. Explain the different types of inheritance
1. Single Inheritance: When a derived class inherits only from one base class
2. Multiple Inheritance:When a derived class inherits from multiple base classes
3. Hierarchical inheritance: When more than one derived classes are created from a single base
class
4. Multilevel Inheritance: When a class is derived from a class which is a derived class The
transitive nature of inheritance is reflected by this form of inheritance
5. Hybrid inheritance: When there is a combination of more than one type of inheritance
PAGE-18

1. Explain the different visibility mode through pictorial representation


An important feature of Inheritance is to know which member of the base class will be
acquired by the derived class.
The accessibility of base class by the derived class is controlled by visibility modes.
Private Visibility Mode

Protected Visibility Mode

Public Visibility Mode

CHAPTER-17 COMPUTER ETHICS AND CYBER SECURITY


2MARKS
1. What is harvesting?
A person or program collects login and password information of others illegally.
2. What are Warez?
Commercial programs that are made available to the public illegally are often called Warez.
3. Write a short note on cracking.
 ―Cracking‖ means trying to get into computer systems in order to steal, corrupt, or view data illegally.
 A cracker is a malicious or criminal hacker..
4. What is a Cookie?
 A cookie tracks a user visits website
3MARKS
1. What is the role of firewalls?
 A firewall is a computer network security-based system that monitors and controls incoming and
outgoing network traffic based on predefined security rules.
 A firewall commonly establishes a block between a trusted internal computer.
2. Write about encryption and decryption.
 Encryption is the process of translating the plain text data into cipher text
 Decryption is the reverse process of converting the cipher-text back to plaintext.
3. Explain about proxy server.
 A proxy server acts as an intermediary between the end users and a web server.
 The proxy server examines the request, checks authenticity and grants the request based on that.
4. What are the guidelines to be followed by any computer user?
 Honesty: Users should be truthful while using the internet.
 Confidentiality: Users should not share any important information with unauthorized people.
 Respect: Each user should respect the privacy of other users.
 Responsibility: Each user should take ownership and responsibility for their actions
PAGE-19

5. What are ethical issues? Name some.


 An Ethical issue is a problem or issue that requires a person or organization to choose between
alternatives that must be evaluated as right (ethical) or wrong (unethical).

 COMMON ETHICAL ISSUES:


Cyber crime/ Software Piracy/Hacking/Fraud
5 MARKS
1. What are the various crimes happening using computer?
Crime Function
Cyber Terrorism  Hacking, threats, and blackmailing towards abusiness or a person.
Cyber stalking  Harassing through online.
Salami slicing  Stealing tiny amounts of money from each transaction.
Scam  Tricking people into believing something that is not true.
Spam  Distribute unwanted e-mail to a large number of internet users.
2. What is piracy? Mention the types of piracy? How can it be prevented?
 Software Piracy is ―unauthorized copying of software‖.
 It includes stealing of codes / programs and other information illegally

PREVENTION:
 To pretend being your friend and talk to you on Internet Relay Chat(IRC) or by Instant messenger, e-
mail can also be a source for them.
 They may send official e-mail requesting some sensitive information.
3. Write the different types of cyber-attacks.
S.No. Cyber Function
Attack
1. Virus  A small piece of computer code that can repeat itself from one computer to
another Eg: Trojan virus.
2. Worms  Worms are self- repeating and do not require a computer Program to
attach themselves.
3. Spyware  Installed automatically when clicking on links.
4. Ransomware  Ransomware is a type of malicious program that demands payment after
launching.

CHAPTER- 18 TAMIL COMPUTING


1. List the search engines supported by Tamil language.
 Google Bing Yahoo
2. What are the keyboard layouts used in Android?
 Sellinam and Ponmadal .
3. Write a short note about Tamil Programming Language.
 The first Tamil programming language ―Ezhil‖ is designed for python to write simple programs
4. What is TSCII?
TSCII (Tamil Script Code for Information Interchange) is the first coding system to handle our Tamil language.

You might also like