Scheme of Valuation - April - 2022: Subject: Computer Science CODE: 41 Version: English
Scheme of Valuation - April - 2022: Subject: Computer Science CODE: 41 Version: English
I
1. Complementary Metal Oxide Semiconductor. 1m
OR
X=X
1m
3. 0.1=0
4. 1m
x x
5. Trees OR Graphs
1m
6. The process of presenting the essential features without including background details or
explanation is called Data Abstraction. 1m
1m
7. .(dot) operator
1m
8. Private access specifier is implicitly used in a class.
9. A constructor is a special member function that is used in a class to initialize the objects
automatically. 1m
10. ‘new’ operator is used to allocate memory for the objects during runtime. 1m
12. Analysis and picking out relevant information is called data mining. 1m
13. The actual appearance or layout of the network is called as network topology. 1m
14. Telnet is the internet utility that allows to log on to the remote computer system. 1m
15. XML is eXtended Markup Language for documents containing structured information. 1m
II PART – B
17. X(X+Y)=X
LHS =X(X+Y)
=X.X+X.Y
=X+X.Y (X.X=1)
18. A
B A B 1m
Standard symbol
A B A B
0 0 0
0 1 1 1m
1 0 1
1 1 0
Truth table
21. Pointer : Pointer is a variable which stores the address of another variable. 1m
22. Data file : Files are used to store data or information permanently for future use on secondary
1m
storage devices.
Text file : Information is stored in ASCII characters. Each line of text is terminated with EOL or
delimiter character. Internal translations take place.
Binary file : Information is stored in binary form. No delimiter is used. No translation occur
1m
here. Any one type of file
Foreign key :
A non key attribute of one table which acts as a primary key in another table is called as a
foreign key. 1m
III PART - C
26. Characteristics of motherboard :
(i) Form factor :
It refers to motherboard geometry, dimensions, arrangements and electrical
requirements.
(ii) Chipset :
Chipset controls the majority of resources of the computer. The function of the
chipset is to co ordinate the data transfer between the various components of the
computer.
(iii) Processor socket :
Used to fix processor on the motherboard, if it is rectangular in shape processor is
fixed vertically, if square in shape , processor is directly inserted.
Each characteristic 1m 3m
Each gate 1m 3m
10 20 30 40 Null
start
10 20 30 40
29. Inheritance :
It is the capability of one class to acquire the properties (date and functions ) of another class. 1m
Base class :
The class whose properties are inherited by another class. 1m
Derived class :
The class which inherits the properties from base class. 1m
31. get() : This function reads a single character from a text file. 1m
getline() : This function reads an entire line of text from a text file. 1m
Read() : This function reads binary data from a binary file. 1m
32. ORDER BY clause is used to sort the data in ascending or descending order, based on one or
more columns. 1m
Syntax:
The basic syntax of ORDER BY clause is as follows:
SELECT column-list FROM table_name
[WHERE condition]
[ORDER BY column1, column2,.. columnN][ASC | DESC]; 1m
Ex :
SELECT Regno, Class, Combination FROM Student ORDER BY Regno ASC; 1m
IV PART - D
36. F(A,B,C,D)=∑(0,1,4,5,7,8,9,12,13,15)
CD
AB CD CD CD CD
1 1
AB
0 1 3 2
1 1 1
AB 4
5 7
6
1 1 1
15
AB 12 13 14 2m
1 1
8
9 11 10
AB
Octet Quad
1m
Simplifying Octet : C 1m
Simplifying Quad : BD
1m
Simplified SOP equation : F(A,B,C,D) = C + BD
Step 1 : For I = 1 to N - 1
Step 2 : J = I
while (J > = 1)
if ( A[J] < A[J-1] )
temp = A[J]
38.
Stack Operations :
stack() : Creates an empty stack.
push(item) : Inserts a new item to the top of the stack.
Pop() : Removes the top most item from the stack.
peek() : Returns the top most item from the stack.
isEmpty() : Checks whether the stack is empty or not and returns true if the stack is empty.
5m
size() : Returns the number of items in the stack. Any five ( each 1m)
43. Destructor :
A destructor is a special member function that will be executed automatically when an object is
destroyed. Destroying an object means, de-allocating all the resources such as memory that
was allocated for the object by the constructor. 1m
Syntax:
class classname
{
private:
data variables //method
Ex:
class counter
{
private:
int count;
public:
counter( )
{
count = 0;
}
~counter()
{}
}; Any relevant example 2m
44. Types of inheritance :
(i) Single Inheritance :
If a class is derived from a single base class, it is called as single inheritance.
SQUARE MATRIX
DERIVED CLASS
DERIVED CLASS 2
SYMMETRIC
MATRIX
DERIVED CLASS
HARDWARE SOFTWARE
COMPUTER
SCIENCE
DERIVED DERIVED
LIBRARY PLAY
CLASS 1 CLASS 2
GROUND
DERIVED
STUDENTS
CLASS 3
5m
Any relevant answer ( Each type 1m)
(ii) ALTER command : used to alter the table by adding new column, changing the
structure of the column and by deleting the unwanted column.
Syntax :
ALTER TABLE table_name
ADD (column dataype, column2 datatype……..);
Ex :
ALTER TABLE Student
ADD(Address varchar2(25));