Page 1 :
GOVERNMENT OF KARNATAKA, KARNATAKA STATE PRE-UNIVERSITY EDUCATION EXAMINATION BOARD, , II YEAR PUC SUPPLEMENTARY EXAMINATION – JUNE - 2019, , SCHEME OF VALUATION, Subject Code: 41, , PART-A (10×1=10), , Q.No., 1, , Subject: COMPUTER SCIENCE, , Note: Answer all the questions., , Each question carries 1 mark., , Give the purpose of expansion slots., Expansion slots are used to insert an expansion cards, which, provides additional features to a computer., (OR Any relevant point), , 2, , Marks, , 1M, , Write the standard symbol for two input NAND gate., X, , X·Y, , 1M, , Y, 3, , Give an example for primitive data structure., int, float, char, pointer (OR) Any basic data type, , 4, , 5, , (Any one), , 1M, , Data abstraction refers to the process of representing essential, features without including background details or explanations., , 1M, , Define Data abstraction., , What is a pointer?, A pointer is a variable that holds (stores) the memory address of, another variable., , 6, , What is a Record?, Each row of a table is called Record. (OR), A tuple is also called a Record, (OR Any relevant Definition), , 7, , 1M, , What is a star topology?, It is a type of topology in which all the nodes are connected to the, central node (hub), (OR Any relevant definition), , 9, , 1M, , Expand the term FTP., File Transfer Protocol, , 8, , 1M, , 1M, , Mention any one advantage of e-commerce., , , , , , , , , Global participation, Optimization of resource, It helps to perform business transactions 24 hours a day, Reduce time to complete business transaction, Online shopping is more convenient and time saving, Costs related to marketing, customer care, inventory etc can be, reduced., Improved market intelligence., (Any one of the above) OR (Any other relevant point), , 1M
Page 2 :
Q.No., 10, , Marks, What is web-hosting?, Web hosting is a means of hosting (uploading) web server, applications on a computer system through Internet., (OR Any other relevant definition), PART-B (5×2=10), Note: Answer any five questions., Each question carries 2 marks., , 11, , Prove that X +, , 1M, , X = 1 by perfect induction method., , If X =0, consider LHS, = X +X, =0+1, =1, = RHS, If X =1, consider LHS = X +, =1+0, =1, = RHS, , 1M, , X, , 1M, , Thus, for every value of X, X + X = 1., (OR) Truth table method can also be considered, 12, , Prove X ∙ Y = Y ∙ X using truth table., X, , Y, , X∙Y, , Y∙X, , 0, 0, 1, 1, , 0, 1, 0, 1, , 0, 0, 0, 1, , 0, 0, 0, 1, , 2M, , (Proving any two rows – 1M) OR (Proving all the rows – 2M), 13, , Mention any two advantages of OOPS., The programs are modularized based on the principle of classes, and objects., It reduces code duplication., Providing data security with data encapsulation., With the help of inheritance, we can reuse the existing code., Data abstraction separates object specification and object, implementation., With the help of polymorphism, we can easily develop complex, softwares., Reduces software development time., Communication with outside system is very simple with message, passing., (Any two of the above OR Any two other advantages), , 2M
Page 3 :
Q.No., 14, , Marks, Give any two rules for constructors., A Constructor always has a name that is same as the class name., There is no return type for constructors (not even void)., A constructor should be declared in public section., A constructor is invoked (called) automatically when the objects, are created., Constructors can have default arguments., It is not possible to refer to the address of the constructors., The constructors make implicit calls to the operators new and, delete when memory allocation is required, , , , , , (Any two of the above rules), 15, , 2M, , Mention any two ifstream functions., get( ), getline( ), read( ), seekg( ), tellg( )., (Any two functions), , 16, , Define primary key and secondary key., Primary key is a candidate key that uniquely identifies each record, in a table., (OR) Any relevant definition, Secondary key is a candidate key which is not currently selected as, the primary key., (OR) Any relevant definition, , 17, , 1M, 1M, , Write the syntax and example for DROP command in SQL., Syntax:, , drop table table-name;, , Example: drop table student;, 18, , 2M, , 1M, ( OR Any other example ), , 1M, , Mention any two antivirus software., Kaspersky, Quick heal, Avast, McAFee, K7, Norton 360,, Micro trend titanium, AVQ, Panda Software, (Any two of the above) OR (Any other two softwares), , 2M, , PART-C (5×3=15), 19, , 20, , Note: Answer any five questions., Each question carries 3 marks., Write the functions of data bus, address bus and control bus., Data bus: It provides a path to transfer data between CPU and, memory, Address bus: It connects CPU and RAM, which carries address to, store and retrieve the data, Control bus: It is used to control the access and the use of the data, and address lines, (Any relevant points can also be considered), Explain the working of two input NOR gate with symbol and truth, table., NOR gate is a complemented OR gate. It gives output 0 when any one, of its input is 1 and output is 1 when all the inputs are 0., , 1M, 1M, 1M, , 1M
Page 4 :
Q.No., , Marks, Symbol:, X, , 1M, , X+Y, , Y, , Truth table:, , 21, , X, , Y, , F = X+Y, , 0, , 0, , 1, , 0, , 1, , 0, , 1, , 0, , 0, , 1, , 1, , 0, , 1M, , Give the memory representation for two dimensional array using Row, major Order., Row-major order: Let A be the array of order m x n. In row-major, order, all the first-row elements are stored in sequential memory, locations and then all the second-row elements are stored and so on, [0], , [1], , [2], , A[0], A[1], A[2], , OR, , 5, , A[0][0], , 8, , A[0][1], , -3, , A[0][2], , 7, , A[1][0], , 2, , A[1][1], , 4, , A[1][2], , 3, , A[2][0], , 9, , A[2][1], , 6, , A[2][2], , 1M, , First row, , 1M, Second row, , Third row, , The memory address of any element A[I][J] is obtained by the, formula:, LOC(A[I][J]) = Base(A) + W [n(I – LB) + (J – LB) ], , 1M, , (If formula is not written, then give 2 Marks for both the diagrams), 22, , Explain any thee operations performed on pointers., We can add an integer value to a pointer., We can subtract an integer value from a pointer., We can compare two pointers, if they point the elements of the, same array., We can subtract one pointer from another pointer if both point to, the same array., We can assign one pointer to another pointer provided both are, of same type., (Any three of the above), , 3M
Page 5 :
Q.No., 23, , 24, , Marks, What is a data file? Explain text file and binary file supported in C++., Definition: A file which stores data or information permanently in, secondary memory for future use is called data file., Text file:, It is a file that stores information in ASCII characters., In text file, each line of text is terminated with a special, character known as EOL (End Of Line /delimiter character)., Translation is needed to binary form., Binary file:, It is a file that contains information in the same format as it is, stored in the memory., No EOL characters are used here., No translation is needed., (Any two points for each file), Define sequential access, direct access, and indexed sequential, access file organizations., Sequential access: It is a type of file organization in which the, records are arranged one after another in an ascending or, descending order of a particular key field., Direct access: It is a type of file organization in which the records, are stored and accessed directly using a relative record number., Indexed sequential access: This file organization combines the, features of both sequential and direct file organization., OR, Indexed sequential access file organization is a method in which, the records are stored sequentially, but they can be accessed, randomly through an index., , 1M, , 2M, , 1M, , 1M, 1M, , (Each definition – 1M) OR (Any relevant definition), 25, , Explain any three types of e-commerce., (i) Business-to-Business(B2B): This includes the exchange of, services, information and products form one business to another, business partners., Example: E-bay.com, (ii) Business-to-Consumer(B2C): In this, trading of goods / services, takes place between a business organization and a consumer., Example: Buying a computer or mobile from the company., (iii) Consumer-to-Business(C2B): In this, a consumer directly, contact with business vendors by posting their project work with set, budget online and selects best company after reviewing the cost to, complete the project., Example: guru.com, freelancer.com, (iv) Consumer-to-Consumer(C2C): In this, online transaction, between consumers takes place with the help of free sites, auctions, and forums., Example: OLX.com is the recent and mostly used service., (OR Any relevant points can also be considered), (Examples are not compulsory), (Any three of the above), , 3M
Page 6 :
Q.No., 26, , 27, , Marks, Explain any three re-sizing text tags in HTML., <Big> : This tag increases the size by one., <Big> Text </Big>, <Small> : This tag decreases the size by one., <Small> Text </Small>, <h1> : This tag writes the text in biggest heading., <h1> Text </h1>, <h6> : This tag writes the text in smallest heading., <h6> Text </h6>, <font size=”1”> : This tag writes the text in smallest font size. (8 pt), <font size=”1”> Text </font>, <font size=”7”> : This tag writes the text in biggest font size. (36 pt), <font size=”7”> Text </font>, (Examples are not compulsory), (Any 3 of the above), PART-D (7×5=35), Note: Answer any seven questions., Each question carries 5 marks., Given Boolean function., F(A, B, C, D) = ∑(0, 1, 2, 3, 5, 6, 9, 10, 13, 14)., Reduce it by using Karnaugh map., , 3M, , CD, AB, , CD, , CD, A B, , 1, , 1, 0, , AB, , 0, , 1, , 0, , AB, , Quad-1, , 1, , 0, , 2M, 6, , 1, 15, , 0, 9, , 2, , 7, , 13, , 1, 8, , Quad-2, , 0, , 1, , 0, , 1, 3, , 5, , 12, , CD, , 1, 1, , 4, , AB, , CD, , 14, , 1, 11, , 10, , Quad-3, , From Quad 1 : A B, From Quad 2 : C D, , 2M, , From Quad 3 : C D, Final reduced function F(A, B, C, D) = A B + C D + C D, 28, , Write an algorithm to insert an element into the QUEUE data, structure., Step 1: If REAR = N-1 Then, PRINT “Overflow”, Exit, , 1M, , 1M
Page 7 :
Q.No., , Marks, Step 2: If FRONT = NULL (or) -1 Then, FRONT = 0, REAR = 0, Else, REAR = REAR + 1, , 2M, 1M, 1M, , Step 3: QUEUE[REAR] = ITEM, Step 4: Return, 28, , Explain the different operations performed on STACK data structure., stack( ): Creates a new stack that is empty., push(item): Adds a new item to the top of the stack., pop( ): Removes the top item from the stack., peek( ): Returns the top item from the stack., isEmpty( ): Tests whether the stack is empty or not., size( ): Returns the number of items on the stack., (Each operation – 1M), , 30, , (Any five of the above), , 5M, , Mention any FIVE application areas of OOP., , , , , , , , , , 31, , Computer graphics applications, CAD / CAM software, Object - Oriented Relational Database Management System, User Interface design such as windows, Real-time systems, Simulation and Modeling, Artificial intelligence and expert systems, Parallel programming, (Any five of the above), What are member functions in a class? Write any four characteristics, of member functions., Definition: The functions declared inside a class, which are the set of, operations performed on the objects of a class are known as member, functions., Characteristics of Member functions:, Member functions have their declaration inside the class and, have their definition either inside or outside the class., Member function’s definition inside the class is like a normal, function., Member function’s definition outside the class should be done, with scope resolution operator., Only Member functions can access private data of a class., (Definition – 1M) + (Any four characteristics – 4M), , 5M, , 1M, , 4M
Page 8 :
Q.No., 32, , Marks, Define function overloading. Mention its advantages., Definition: Function overloading means two or more functions, having same name, but differ in the number of arguments or data, types of arguments., Advantages of function overloading:, Code execution is fast., It is easier to understand the flow of information and debug., Code maintenance is easy., Easier interface between programs and real world objects., Reduces complexity of program., , 1M, , 4M, , (Definition – 1M) + (Any four advantages – 4M), 33, , What is a constructor? Mention different types of constructors and, explain any one constructor in brief., Definition: A constructor is a special member function that is used to, initialize the objects of a class automatically., Different types of constructors:, 1. Default constructor, 2. Parameterized constructor, 3. Copy constructor, Explanation of any one:, 1. Default constructor : A constructor which does not accept any, arguments is called as default constructor., All the objects of a class are initialized to same set of values by, the default constructor, For every object created, default constructor is automatically, called., Syntax:, (a), , classname( ), { }, , Example:, class sum, {, private:, int a, b;, public:, sum( ), {, a= 10;, b=20;, }, };, , 1M, , 1M
Page 9 :
Q.No., , Marks, 2. Parameterized constructor : A constructor that takes one or more, arguments is called parameterized constructor., Parameterized constructor can initialize different objects with, different set of values., It is called automatically, whenever objects with arguments are, created., Syntax:, classname (argument1, argument2,………………), {, }, Example:, class sum, {, private:, int a, b;, public:, sum (int x, int y), {, a = x;, b = y;, }, };, 3. Copy constructor: It is a special type of constructor which is used, to copy the values of one object into another object of the same class., Copy constructor is used to initialize one object by another object, of the same class., It is used to return objects as function value., Syntax: classname::classname(classname &obj), {, body of constructor, }, Example:, , x::x(x &ptr), , (OR the following example can also be considered), class sum, {, private: int a, b;, public:, sum(int x, int y), {, a=x; b=y;, }, };, void main( ), {, sum obj1(10, 20);, sum obj2=obj1;, }, (Explanation of any one constructor with or without example), , 3M
Page 10 :
Q.No., 34, , Marks, What is a Inheritance? Briefly explain multilevel and multiple, inheritance., Definition: Inheritance is a mechanism by which one class acquires, the properties of another class., OR, Inheritance is the capability of one class to inherit properties, from another class., , 1M, , Multilevel Inheritance: If a class is derived from a class which, already derived is known as multilevel inheritance., Base, Grand Father, Derived class-1, , OR, , 2M, , Father, , Derived class-2, Son, , Derived class-n, , Multiple Inheritance: If a class is derived from more than one base, class, it is known as multiple inheritance., Base-1, , Base2, , King, , Base-n, , Queen, , 2M, , OR, Derived class, , Prince, , (Definition – 1 M + Brief explanation – 4M), 35, , What is a database? Mention any four applications of database., Definition: A database is a collection of logically related data, organized in a way that data easily accessed, managed and updated., Applications of database:, Banking: Customer account information, loan details and other, transactions are done with the help of database software., Railways and airlines: For ticket reservation and knowing the, time schedule, database software is used., Colleges: Storing student information and generating reports like, progress report, late payment of fees etc.,, Credit card transactions: Database is used for credit card, transactions for online banking, online shopping etc.,, Telecommunication: Storing details about calls made,, generating monthly bills etc.,, Sales: Storing the customer product and purchase information in, shopping malls., (Any other applications) OR, (Any four of the above with or without explanation), , 1M, , 4M
Page 11 :
Q.No., 36, , Marks, Explain any five relational / Comparison operators in SQL with, suitable examples., =, It checks the values of two operands are equal or not., Example: (a = b), <>, It checks the values of two operands are not equal., (OR), Example: (a <> b) OR (a != b), !=, >, It checks whether the left operand is greater than the right, operand., Example: (a > b), <, It checks if the value of left operand is less than the right, operand., Example: (a < b), >=, It checks if the value of left operand is greater than or equal to, right., Example: (a >= b)., <=, It checks if the value of left operand is less than or equal to, right., Example: (a <= b), !<, It checks whether the left operand is not less than the right, operand., Example: (a !< b), !>, It checks if the value of left operand is not greater than the, right operand., Example: (a !> b), (Examples are not compulsory), , 37, , (Any five of the above), , 5M, , Define the following network devices., a) MODEM, b) HUB, c) Repeater, d) Bridge, e) Router, a) MODEM : (MOdulator and DEMmodulator) : This device is used to, modulate and demodulate the data between the devices., OR, This device converts digital data to analog form and analog data, to digital form., b) HUB : It is a device used to connect several computers together., c) Repeater : It is a device used in long distance transmission used to, strengthen the signals and retransmit it., d) Bridge: It is a device used to connect two networks of the same type, and it transmits the data to the correct destination., e) Router: It is a device used to connect two dissimilar networks and, it selects the best path for the signals to reach the destination., (OR any other relevant definitions can also be considered), (Each definition – 1M), , _______________, , (Five definitions), , 5M