0% found this document useful (0 votes)
39 views

Scheme of Valuation - April - 2022: Subject: Computer Science CODE: 41 Version: English

The document provides a scheme of valuation for the Computer Science subject with multiple choice and descriptive questions. It covers topics like data abstraction, object-oriented programming concepts like classes and inheritance, data structures like linked lists, computer hardware components like motherboards, logic gates, and memory allocation techniques. The questions assess a variety of concepts through definitions, explanations with examples, and identifying advantages or disadvantages.

Uploaded by

Rahil Hassan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Scheme of Valuation - April - 2022: Subject: Computer Science CODE: 41 Version: English

The document provides a scheme of valuation for the Computer Science subject with multiple choice and descriptive questions. It covers topics like data abstraction, object-oriented programming concepts like classes and inheritance, data structures like linked lists, computer hardware components like motherboards, logic gates, and memory allocation techniques. The questions assess a variety of concepts through definitions, explanations with examples, and identifying advantages or disadvantages.

Uploaded by

Rahil Hassan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

SCHEME OF VALUATION – APRIL - 2022

SUBJECT : COMPUTER SCIENCE CODE : 41 VERSION : ENGLISH

QN.NO. ANSWER MARKS


PART – A

I
1. Complementary Metal Oxide Semiconductor. 1m

2. If a variable is complemented twice we get the same variable. 1m

OR

X=X
1m
3. 0.1=0

4. 1m
x x

5. Trees OR Graphs
1m
6. The process of presenting the essential features without including background details or
explanation is called Data Abstraction. 1m

1m
7. .(dot) operator
1m
8. Private access specifier is implicitly used in a class.

9. A constructor is a special member function that is used in a class to initialize the objects
automatically. 1m

10. ‘new’ operator is used to allocate memory for the objects during runtime. 1m

11. Processed data with some meaning is called information. 1m

12. Analysis and picking out relevant information is called data mining. 1m

13. The actual appearance or layout of the network is called as network topology. 1m

14. Telnet is the internet utility that allows to log on to the remote computer system. 1m

15. XML is eXtended Markup Language for documents containing structured information. 1m

II PART – B

16. (i) Online UPS 1m


(ii) Standby UPS ( Offline UPS) 1m

17. X(X+Y)=X
LHS =X(X+Y)
=X.X+X.Y
=X+X.Y (X.X=1)

Use E-Papers, Save Tress


Above line hide when print out
=X(1+Y)
=X(1) (1+Y=1) 2m
=X = RHS (X.1=X)

18. A

B A B 1m

Standard symbol

A B A B
0 0 0
0 1 1 1m
1 0 1
1 1 0
Truth table

19. Advantages of inline function :


(i) Inline member functions are compact function calls.
(ii) Size of the object code is considerably reduced.
(iii) The speed of execution of a program increases.
(iv) Very efficient code can be generated.
(v) The readability of the program increases Any two (each -1m) 2m

20. Disadvantages of default constructor :


(i) All the objects created are initialized with same set of values.
(ii) It is not possible to initialize different objects with different initial values using
default constructor.
(iii) It is not possible to overload default constructor. Any two (each -1m) 2m

21. Pointer : Pointer is a variable which stores the address of another variable. 1m

Declaration syntax : data_type *pointer_variable ; 1m

22. Data file : Files are used to store data or information permanently for future use on secondary
1m
storage devices.

Text file : Information is stored in ASCII characters. Each line of text is terminated with EOL or
delimiter character. Internal translations take place.

Binary file : Information is stored in binary form. No delimiter is used. No translation occur
1m
here. Any one type of file

23. Primary key :


A key that uniquely identifies a record in a table is called primary key. 1m

Foreign key :
A non key attribute of one table which acts as a primary key in another table is called as a
foreign key. 1m

Use E-Papers, Save Tress


Above line hide when print out
24. Web browsers :
(i) Google chrome
(ii) Mozilla firefox
(iii) Internet explorer
(iv) Opera
(v) Safari Any two (each -1m) 2m

25. Web scripting :


The process of creating and embedding scripts in a web page is known as web scripting. 1m
Types of web scripting :
(i) Client-side scripts
(ii) Server-side scripts Any one
1m

III PART - C
26. Characteristics of motherboard :
(i) Form factor :
It refers to motherboard geometry, dimensions, arrangements and electrical
requirements.
(ii) Chipset :
Chipset controls the majority of resources of the computer. The function of the
chipset is to co ordinate the data transfer between the various components of the
computer.
(iii) Processor socket :
Used to fix processor on the motherboard, if it is rectangular in shape processor is
fixed vertically, if square in shape , processor is directly inserted.
Each characteristic 1m 3m

27. Basic gates using NAND gate :

Each gate 1m 3m

28. Types of linked lists :


(i) Singly linked lists:
In singly linked list each node contains two parts . The first part contains the
information called data field and the second part contains the address of the next
node in the list, this is also called the link field.

Use E-Papers, Save Tress


Above line hide when print out
start

10 20 30 40 Null

(ii) Circular linked list :


If the link field of the last node contains the address of the first node, such a linked
list is called as circular linked list. In a circular linked list, it is possible to reach any
node from any other node.

start

10 20 30 40

(iii) Doubly linked list :


In doubly linked list each node contains three parts – FORW, BACK and INFO.
BACK: It is a pointer field containing the address of the previous node.
FORW: It is a pointer field that contains the address of the next node.
INFO: It contains the actual data.
Possible to access all the nodes from any node of the linked list.

BACK INFO FORW


Each type 1m 3m

29. Inheritance :
It is the capability of one class to acquire the properties (date and functions ) of another class. 1m
Base class :
The class whose properties are inherited by another class. 1m
Derived class :
The class which inherits the properties from base class. 1m

30. Difference between static and dynamic memory allocations :

STATIC MEMORY ALLOCATION DYNAMIC MEMORY ALLOCATION


1. Memory is allocated during 1. Memory is allocated during run time.
compilation time.

2. Variables remain permanently 2. Memory is allocated only when the


allocated. program is active.

3. No memory is allocated and de 3. Memory allocation and de allocation


allocated during execution of the takes place during execution of the
program. program.

4. Implemented using stacks and heaps. 4. Implemented using data segments.

Use E-Papers, Save Tress


Above line hide when print out
5. Wastage of memory. 5. Proper memory utilization

6. Amount of memory to be allocated is 6. Amount of memory allocated is need


pre known. not be pre known.

Any three differences (each 1m) 3m

31. get() : This function reads a single character from a text file. 1m
getline() : This function reads an entire line of text from a text file. 1m
Read() : This function reads binary data from a binary file. 1m

32. ORDER BY clause is used to sort the data in ascending or descending order, based on one or
more columns. 1m

Syntax:
The basic syntax of ORDER BY clause is as follows:
SELECT column-list FROM table_name
[WHERE condition]
[ORDER BY column1, column2,.. columnN][ASC | DESC]; 1m

Ex :
SELECT Regno, Class, Combination FROM Student ORDER BY Regno ASC; 1m

33. Virus prevention methods :

1.Never use a “Foreign” disk or CD without scanning it for viruses.


2.Always scan files downloaded from the internet or other sources.
3.Never boot your PC from a floppy unless you are certain that it is virus free.
4.Write protect your disks.
5.Use licensed software.
6.Password protect your PC to prevent unattended modification.
7.Install and use antivirus software.
3m
8.Keep antivirus software up to date. Any three ( each 1m)

34. Types of E-Commerce :

1. Business-to-Business (B2B ) : The exchange of services, information and/or products


from one business to another Business partners using computer and communication
system.
Ex Ebay.com
2. Business-to-Consumer (B2C) : The exchange of services, information and/or product
from a business to a consumer using computer and communication system.
3. Consumer-to-Business (C2B) : Customer directly contact with business vendors by
posting their project work with set budge online so that the needy companies review it
and contact the customer directly with bid. The consumer reviews all the bids and

Use E-Papers, Save Tress


Above line hide when print out
selects the company for further processing.
Ex: guru.com, freelancer.com.
4. Consumer-to-consumer (C2C) : Buying and selling of goods and services between
two consumers using computer and communication systems. 3m
Ex : OLX.com Any three ( each 1m)

35. HTML Tags :


(i) <i>___</i>
This tag displays the output italicized.
(ii) <b>___</b>
This tag displays the output in bold letters. 3m
(iii) <u>___</u>
This tag displays the output underlined. Any other three tags (each 1m)

IV PART - D

36. F(A,B,C,D)=∑(0,1,4,5,7,8,9,12,13,15)

CD
AB CD CD CD CD
1 1
AB
0 1 3 2

1 1 1
AB 4
5 7
6

1 1 1
15
AB 12 13 14 2m
1 1
8
9 11 10
AB

Octet Quad
1m
Simplifying Octet : C 1m
Simplifying Quad : BD

1m
Simplified SOP equation : F(A,B,C,D) = C + BD

37. Insertion sort algorithm :

Step 1 : For I = 1 to N - 1
Step 2 : J = I
while (J > = 1)
if ( A[J] < A[J-1] )
temp = A[J]

Use E-Papers, Save Tress


Above line hide when print out
A[J] = A[J-1]
A[J-1] = temp
[ End if ]
J=J–1
[ End of while loop]
5m
[ End of for loop ]
Step 3 : Exit

38.
Stack Operations :
stack() : Creates an empty stack.
push(item) : Inserts a new item to the top of the stack.
Pop() : Removes the top most item from the stack.
peek() : Returns the top most item from the stack.
isEmpty() : Checks whether the stack is empty or not and returns true if the stack is empty.
5m
size() : Returns the number of items in the stack. Any five ( each 1m)

Algorithm for deleting an element from the QUEUE


Step 1 : If FRONT = -1 OR NULL then
39.
print “QUEUE IS EMPTY”
exit
Step 2 : ITEM = QUEUE[FRONT]
Step 3 : If FRONT = REAR then
FRONT = 0
REAR = 0
else
FRONT = FRONT + 1
[end of if]
5m
Step 4 : Return

Advantages of Object Oriented Programming :


40.
(i) Programs are modularized with classes and objects
(ii) Encapsulation provides security for data.
(iii) OOP reduces code duplication. Code reusability is possible because of inheritance.
(iv) Data abstraction separates object specification and object implementation.
(v) Complex software can be easily developed.
(vi) OOP decreases software development time.
(vii) Communication between the functions is very simple with message passing
5m
Any five ( each 1m)

Use E-Papers, Save Tress


Above line hide when print out
41. Functions defined inside the class :
A function defined in a class is treated as inline function. Only small functions are defined inside
class definition.
Syntax :
return_type function_name()
{
Function body
}
Explanation with syntax 3m

Any appropriate example program 2m

42. Friend function :


Friend function is a non member function of the class but has full access rights to private and
protected members of that class. 1m
Characteristics of friend function :
(i) A friend function although not a member function, has full access right to the
private and protected members of the class.
(ii) A friend function cannot be called using the object of that class. It can be invoked
like any normal function.
(iii) They are normal external functions that are given special access privileges.
(iv) It cannot access the member variables directly and has to use an object
name.membername (Here, . is a membership operator).
(v) The function is declared with keyword friend. But while defining friend function it
does not use either keyword friend or :: operator.
Any four characteristics (each 1m) 4m

43. Destructor :
A destructor is a special member function that will be executed automatically when an object is
destroyed. Destroying an object means, de-allocating all the resources such as memory that
was allocated for the object by the constructor. 1m

Syntax:
class classname
{
private:
data variables //method

Use E-Papers, Save Tress


Above line hide when print out
public:
classname(); //constructor
~classname(); //destructor 2m
};

Ex:
class counter
{
private:
int count;
public:
counter( )
{
count = 0;
}
~counter()
{}
}; Any relevant example 2m
44. Types of inheritance :
(i) Single Inheritance :
If a class is derived from a single base class, it is called as single inheritance.

BASE CLASS MATRIX

SQUARE MATRIX
DERIVED CLASS

(ii) Multilevel Inheritance :


The classes can also be derived from the classes that are already derived. This type
of inheritance is called multilevel inheritance.

BASE CLASS MATRIX

DERIVED CLASS 1 SQUARE MATRIX

DERIVED CLASS 2
SYMMETRIC
MATRIX

Use E-Papers, Save Tress


Above line hide when print out
(iii) Multiple Inheritance :
If a class is derived from more than one base class, it is known as multiple
inheritance.

BASE BASE BASE BASE


CLASS 1 CLASS 2 CLASS 3 CLASS n

DERIVED CLASS

HARDWARE SOFTWARE

COMPUTER

(iv) Hierarchical Inheritance :


If a number of classes are derived from a single base class, it is called as hierarchical
inheritance.
BASE CLASS 1

DERIVED CLASS 1 DERIVED CLASS 2 DERIVED CLASS 3

SCIENCE

PCMB PCMC PCME

(v) Hybrid Inheritance :


Hybrid Inheritance is combination of Hierarchical and Multilevel Inheritance.

BASE CLASS COLLEGE

DERIVED DERIVED
LIBRARY PLAY
CLASS 1 CLASS 2
GROUND

DERIVED
STUDENTS
CLASS 3

5m
Any relevant answer ( Each type 1m)

Use E-Papers, Save Tress


Above line hide when print out
45. Data processing cycle :
(i) Data Input : Data is input to the data processing system in its acceptable form.
(ii) Data processing : The processing is a series of actions or operations from the input
data to generate outputs. some of the operations are classification based on some
condition, calculation, sorting, indexing, accessing data, extracting part of
filed/attribute, substring etc., conversion of data into information.
(iii) Data storage : Processed data to be stored permanently for future use using
secondary storage devices.
(iv) Data output : After processing the data must be presented to the user in user
understandable form. The result may be in form of reports (hardcopy / softcopy).
(v) Communication : With the help of communication system information can be
transmitted to required person . Ex : E – mail.
Each step 1m 5m

46. Features of database system :


(i) Centralized data management :
Data is stored centrally and shared among multiple users.
(ii) Controlled data redundancy :
It eliminates data duplication and saves storage space.
(iii) Data sharing :
The data stored in the database can be shared among multiple users or application
programs.
(iv) Data security:
Since the data is stored centrally, enforcing security constraints is much easier
(v) Backup and recovery :
The RDBMS provides backup and recovery subsystem that is responsible for
recovery from hardware and software failures.
Any 5 appropriate features( each feature 1 m) 5m

47. Logical operations of SQL :


OPERATOR DESCRIPTION
NOT Reverses the meaning of the logical operator with which it is used.
AND Used to combine multiple conditions. Returns true if all the conditions are
true
OR Used to combine the multiple conditions. Returns true if any one
conditions is true.

Use E-Papers, Save Tress


Above line hide when print out
BETWEEN Used to search for values that are within a set of values, given the range of
values.
IS NULL Checks whether the field is null
UNIQUE This operator search every row of a specified table for its uniqueness.

Any 5 operators (each 1m) 5m

48. DDL commands :


DDL commands are used create the table, alter the table and delete the table.
Commands are CREATE, ALTER and DROP 1m

(i) CREATE command : Used to create a table.


Syntax :
CREATE TABLE tablename
(
Column1 data_type,
Column2 data_type,
.
.
.
Column n data_type );
Ex:
CREATE TABLE Student
(
Regno number(5),
Name varchar2(15),
Class varchar2(10)
);

(ii) ALTER command : used to alter the table by adding new column, changing the
structure of the column and by deleting the unwanted column.
Syntax :
ALTER TABLE table_name
ADD (column dataype, column2 datatype……..);
Ex :
ALTER TABLE Student
ADD(Address varchar2(25));

(iii) DROP command : Used to delete a table.

Use E-Papers, Save Tress


Above line hide when print out
Syntax :
DROP TABLE tablename ;
Ex : DROP TABLE Student;
Any two commands
4m

49. Computer Network :


1m
A Computer Network is an inter-connection of two or more autonomous computers.
Goals of Computer Network :
(i) Resource Sharing :
The aim is to make all the programs, data and peripherals available to anyone on
the network irrespective of the physical location of the resources and the user.
(ii) Reliability :
A file can have copies on two or three different machines, so if one of them is
unavailable, the other copies could be used. For military, banking and many other
applications it is great of importance.
(iii) Cost Factor :
Personal computers have better price/performance ratio than micro computers. So
it is better to have PC’s, one per user with data stored on one shared file server
machine.
(iv) Communication Medium:
Using a network, it is possible for managers, working far apart, to prepare financial
report of the company. The changes at one end can be immediately noticed at
another and hence it speeds up cooperation among them.
4m
Each goal 1m

Use E-Papers, Save Tress


Above line hide when print out

You might also like