Students can Download 2nd PUC Computer Science Previous Year Question Paper March 2016, Karnataka 2nd PUC Computer Science Model Question Papers with Answers helps you to revise the complete Karnataka State Board Syllabus and score more marks in your examinations.

Karnataka 2nd PUC Computer Science Previous Year Question Paper March 2016

Time: 3 Hrs 15 Min
Max. Marks: 100

PART – A

Answer all the following questions. Each question carries one mark. (10 × 1 = 10)

Question 1.
What is DHTML?
Answer:
DHTML refers to web content that changes each time it is viewed. A DHTML web page can react to user input without sending requests to the webserver.

Question 2.
Define e-commerce.
Answer:
The e-commerce is defined as buying and selling of products or services over electronic systems such as the internet and other computer networks.

Question 3.
Define Local Area Networking.
Answer:
The LAN is defined as a computer network covering a small physical area like a home, office, or small group of buildings such as a school or an airport.

Question 4.
Define the term ‘topology’ of computer networks.
Answer:
It is the geometric arrangement of a computer system in a network. Common topologies include a linear bus, star, ring, and ring.

KSEEB Solutions

Question 5.
Define data mining.
Answer:
It is the process of discovering interesting knowledge, such as patterns, associations, changes, anomalies from large amounts of data stored in databases using pattern recognition technologies as well as statistical and mathematical techniques.

Question 6.
How do you initialize a pointer variable?
Answer:
Ex:
int *intptr, a=10;
intptr = &a;

Question 7.
What is the significance of scope resolution operation in C++?
Answer:
The operator :: known as scope resolution operator helps in defining member function outside the class.

Question 8.
Name any one non-linear data structure.
Answer:
The examples for non-linear data structures are trees and graphs.

KSEEB Solutions

Question 9.
Write the standard symbol of XOR gate.
Answer:
2nd PUC Computer Science Previous Year Question Paper March 2016 part A img 1

Question 10.
Expand ISA.
Answer:
Industry Standard Architecture

PART – B

Answer any five questions. Each question carries two marks. (5 × 2 = 10)

Question 11.
Prove (X+Y) (X+Z) = X + YZ using algebraic method.
Answer:
LHS: = (X+Y) (X+Z)
= XX + XZ + XY + YZ
= X + XZ + XY + YZ
= X + (1 + Z +Y) YZ
= X + YZ
= RHS

Question 12.
Give the general syntax for defining classes and objects.
Answer:
The syntax of a class definition:

2nd PUC Computer Science Previous Year Question Paper March 2016 1
2nd PUC Computer Science Previous Year Question Paper March 2016 2

Syntax:
classname objectname1, objectname2, …. ,objectname……………. n;
For example, Largest ob1,ob2; //object declaration will create two objects ob1 and ob2 of largest class type.

Question 13.
What are minterms and maxterms?
Answer:

  • A minterm is a special product of literals, in which each input variable appears exactly once.
  • A maxterm is a sum of literals, in which each input variable appears exactly once.

Question 14.
Mention any two antivirus software.
Answer:
The two antivirus software are Norton Antivirus and Kaspersky Antivirus.

KSEEB Solutions

Question 15.
Write the syntax for delete and insert commands in SQL.
Answer:
1. Syntax for delete:
DELETE from tablename WHERE condition;

2. Syntax for insert:
INSERT INTO tablename (col1, col2, …) VALUES (val1, val2….);

Question 16.
Write any two rules for constructors.
Answer:
The rules for writing a constructor functions are

  • They should be declared in the public section.
  • They are invoked automatically when the objects are created.
  • They should not have return types, therefore they cannot return values.
  • They cannot be inherited.
  • They can have default arguments.
  • Cannot refer to addresses.
  • These cannot be static.
  • An object of a class with a constructor cannot be used as a member of a union.

Question 17.
Write any two member functions belonging to offstream class.
Answer:
The seekp() and tellp() functions belongs to ofstream class.

KSEEB Solutions

Question 18.
What are the advantages and disadvantages of ISAM?
Answer:
The advantages of disadvantages of index sequential access method are
Advantages:

  • It combines both sequential and direct
  • Suitable for sequential access and random access
  • Provides quick access to records

Disadvantages:

  • It uses special software and is expensive
  • Extra time is taken to maintain index
  • Extra storage for index files
  • Expensive hardware is required

PART – C

Answer any five questions. Each question carries three marks: (5 × 3 = 15)

Question 19.
What is web hosting? Mention various web hosting services.
Answer:
Web hosting is the business of housing, serving and maintaining files for one or more web sites and provide fast connection to the internet. The different web hosting services are shared hosting and free hosting.

Question 20.
What is meant by shareware? Write its limitations.
Answer:
Shareware is software that is distributed free on a trial basis with the understanding that the user may need or want to pay for it later. The limitations are:

  • Source code is not available
  • Modifications are not allowed.

Question 21.
Explain relational data model with an example.
Answer:
Relational Database Model:
Dr. E.F.Codd first introduced the Relational Database Model in 1970. This model allows data to be represented in a ‘simple row-column format’.

Properties of the relational database model:

  • Data is presented as a collection of relations.
  • Each relation is depicted as a table.
  • Columns are attributes that belong to the entity modeled by the table (ex. In a student table, you could have a name, address, student ID, major, etc.).
  • Each row (“tuple”) represents a single entity.
  • Every table has a set of attributes that taken together as a “key” (technically, a superkey”) uniquely identifies each entity.

Question 22.
Give the functions of the following:
Answer:

  1. get ()
  2. getline()
  3. read()

1. get() function is used to read a single character from the associated stream.
2. getline () function is a string I/O function that is used to read a whole line of text to text files.
3. read() function is used to read binary data from a file.

KSEEB Solutions

Question 23.
Explain the use of new and delete operators in pointers.
Answer:
a. The new operator in C++ is used for dynamic storage allocation. This operator can be used to create an object of any type.
General syntax of the new operator in C++:
The general syntax of a new operator in C++ is as follows:
pointer variable = new datatype; In the above statement, new is a keyword and the pointer variable is a variable of type datatype.

For example:
int * a = new int;
In the above example, the new operator allocates sufficient memory to hold the object of datatype int and returns a pointer to its starting point. The pointer variable holds the address of memory space allocated.

b. The delete operator in C++ is used for releasing memory space when the object is no longer needed.
General syntax of delete operator in C++:
delete pointer_variable;
For example, delete cptr;
In the above example, delete is a keyword and the pointer variable cptr is the pointer that points to the objects already created in the new operator.

Question 24.
What is stack? Write an algorithm for POP operation.
Answer:
stack is an ordered collection of items in which items may be inserted and deleted at one end.
Algorithm for POP operation
PUSH(STACK, TOP, ITEM)
Step 1: if TOP = 0 then
PRINT “stack is empty”
Exit
End of if
Step 2: ITEM = STACK[POP]
Step 3: TOP = TOP -1
Step 4: Return

Question 25.
Draw the logic diagram and truth table for 2 input XOR gate.
Answer:
2nd PUC Computer Science Previous Year Question Paper March 2016 part C img 2
Truth table:
2nd PUC Computer Science Previous Year Question Paper March 2016 part C img 3

KSEEB Solutions

Question 26.
Expand UPS. Explain the types of UPS.
Answer:
Uninterruptible Power Supply. There are two types of UPS namely offline UPS and online UPS.

1. Offline UPS:
This type of UPS have module to switch between using battery or using bypass main power source. When main power source is off, then the UPS will switch from main power source to the battery source in less than 4 ms delay time.

2. Online UPS:
This type of UPS is better than Offline, because no matter main power source is on or off, output always come from battery source.

PART – D

Answer any seven of the following questions. Each question carries Five marks: (7 × 5 = 35)

Question 27.
Write an algorithm to insert an element into a queue.
Answer:
Step 1: if REAR >= N -1 then
Print “Queue is overflow”
Exit
End of if
Step 2: REAR = REAR+ 1
Step 3: QUEUE [REAR] = element
Step 4: if FRONT =-1 then
FRONT = 0.

Question 28.
Write an algorithm for insertion sort method.
Answer:
Step 1: for i = 1 to n-1 Repeat step 2
Step 2: for j = i downto 1 Repeat step 3
Step 3: is ( a[j] < a[j-1])? then
temp = a[j]
A[j] = a[j-1]
A[j-1] = temp [ end of j loop]
[ end of i loop]

Question 29.
Using K map, simplify the following expression in four variables:
F(A,B,C,D) = m1 + m2 + m4 + m5 + m9 + m11 + m12 + m13
Answer:
2nd PUC Computer Science Previous Year Question Paper March 2016 part D img 4
The simplified boolean function is BC’ + C’D + AB’CD + A’B’CD’

Question 30.
Write the rules to be followed in writing the constructor function in C++.
Answer:
The rules for writing a constructor functions are

  • They should be declared in the public section.
  • They are invoked automatically when the objects are created.
  • They should not have return types, therefore they cannot return values.
  • They cannot be inherited.
  • They can have default arguments.
  • Cannot refer to addresses.
  • These cannot be static.
  • An object of a class with a constructor cannot be used as a member of a union.

KSEEB Solutions

Question 31.
Describe briefly the use of friend function in C++ with syntax and example.
Answer:
A friend function is useful when a function to be shared between the two classes bymaking a function as a friend to both the classes, thereby allowing a function to access private and protected data members of both classes.
syntax for declaration of friend function:
class classname
{
public:
friend returntype function name (arguments);
}
2nd PUC Computer Science Previous Year Question Paper March 2016 part D img 5
2nd PUC Computer Science Previous Year Question Paper March 2016 part D img 6

Question 32.
Explain defining objects of a class with syntax and a programming example.
Answer:
The objects are declared after a class is defined. The object declaration create object of that class and memory is allocated for the created object. The object are created using the following syntax:
classname objectname1, objectname2,……………;
for example
student obj1, obj2;
the obj1 and obj2 are the objects of class type student.
The object names are used to access the data members through member functions by invoking member functions.
For example:
obj1.getdata(5, 25);
here, getadata() is the member function of a class student and function call is give using object obj1 which assign the value 5 and 25 to the data members of the class. The memory is allocated separately for data members of each object.

Question 33.
Define object oriented programming. Write the limitations of object oriented programming.
Answer:
Object oriented programming is a programming methodology based on objects, instead of just functions and procedures. These objects are organized into classes, which allow individual objects to be group together.
Limitations:
1. Size:
Object Oriented programs are much larger than other programs. In the early days of computing, space on hard drives, floppy drives and in memory was at a premium. Today we do not have these restrictions.

2. Effort:
Object Oriented programs require a lot of work to create. Specifically, a great deal of planning goes into an object oriented program well before a single piece of code is ever written. Initially, this early effort was felt by many to be a waste of time. In addition, because the programs were larger (see above) coders spent more time actually writing the program.

3. Speed:
Object Oriented programs are slower than other programs, partially because of their size. Other aspects of Object Oriented Programs also demand more system resources, thus slowing the program down.

4. Not suitable for all types of problems:
There are problems that lend themselves well to functional-programming style, logic -programming style, or procedure-based programming style, and applying object-oriented programming in those situations will not result in efficient programs.

5. Not all programs can be modeled accurately by the objects model. If you just want to read in some data, do something simple to.it and write it back out, you have no need to define classes and objects. However, in some OOP languages, you may have to perform this extra step.

6. The objects often require extensive documentation.

KSEEB Solutions

Question 34.
Explain network securities in detail.
Answer:
Network security refers to any activities designed to protect network and related activities. It protects the usability, reliability, integrity, and safety of network and data. Good network security identifies a variety of threats and stops them from entering or spreading on network.

The network security concerns with allowing only legal or authorized users and programs to gain access to information resources like databases. It also ensures that properly authenticated users get access only to those resources that they are supposed to use. Many network security threats today are spread over the Internet. The most common include:

  • Viruses, worms, and Trojan horses
  • Spyware and adware
  • Zero-day attacks also called zero-hour attacks
  • Hacker attacks Denial of service attacks
  • Data interception and theft
  • Identity theft

A network security system usually consists of many components. Ideally, all components work together, which minimizes maintenance and improves security. Network security components include:

  • Anti-virus and anti-spyware.
  • Firewall, to block unauthorized access to your network.
  • Intrusion prevention systems (IPS), to identify fast-spreading threats, such as zero-day or zero-hour attacks.
  • Virtual Private Networks (VPNs), to provide secure remote access.

The network security makes use of a variety of resources like user name, password, encrypted smart cards, biometrics, and firewalls to protect resources.

Question 35.
Describe any five logical operators available in SQL.
Answer:
The five logical operators available in SQL are
2nd PUC Computer Science Previous Year Question Paper March 2016 part D img 7

Question 36.
Write the differences between manual and electronic data processing.
Answer:
The difference between manual and electronic file systems.

Manual File System Electronic File System
1) Process limited volume of data 1) process a large volume of data
2) uses paper to store data 2) use of mass storage devices in the computer itself
3) the speed and accuracy is less 3) more speed and greater accuracy
4) cost of processing is high since more human-oriented 4) cost of processing less because computer performs repetitive task
5) occupies more space 5) little space is sufficient
6) Repetitive tasks reduces efficiency and human feel bore and tiredness 6) Efficiency is maintained throughout and won’t feel bore and tiredness.

KSEEB Solutions

Question 37.
Explain briefly the types of inheritance.
Answer:
1. Single inheritance:
A derived class with only one base class is called single inheritance. For example, If A is base class then class B derive from base class A.

2. Multilevel inheritance:
A class can be derived from another derived class which is known as multilevel inheritance. For example, The derived class C inherit B class whereas B is derived from class A.

3. Hierarchical inheritance:
When the properties of one class are inherited by more than one class, it is called hierarchical inheritance. For example, classes B, C, and D are derived from base class A.

4. Hybrid inheritance:
It is the combination of hierarchical and multilevel inheritance. For example, The derived class D derive from the classes B and C whereas both the classes B and C are derived from base class A.