Answer all questions from 1 to 5. Each carry 1 score. (5 \u00d7 1 = 5)<\/span><\/p>\nQuestion 1.
\nThe number of symbols used in a number system is ………….
\nAnswer:
\nBase or Radix<\/p>\n
Question 2.
\nSmall and fast memory between processor and RAM is called ………….
\nAnswer:
\nCache memory<\/p>\n
Question 3.
\nWhat is the use of Rhombus symbol in flowchart?
\nAnswer:
\nDecision making or condition checking<\/p>\n
Question 4.
\nTo find the number of characters in a string, …………. function is used.
\nAnswer:
\nstrlen()<\/p>\n
Question 5.
\nTo check an alphabet is lowercase, ………. function can be used.
\nAnswer:
\nislower()<\/p>\n
Answer any 9 questions from 6 to 16. Each carries 2 scores. (9 \u00d7 2 = 18)<\/span><\/p>\nQuestion 6.
\nExpand the following:
\na) ENIAC
\nb) VLSI
\nAnswer:
\na) Electronic Numeric Integrator and Calculator
\nb) Very Large Scale Integrated<\/p>\n
Question 7.
\nState De\u2019Morgan’s theorems.
\nAnswer:
\n(A + B)’ = A’.B’
\n(A.B)’ = A + B\u2019<\/p>\n
Question 8.
\nName any four e-Waste disposal methods.
\nAnswer:
\ne-Waste disposal methods:<\/p>\n
\n- Reuse: Reusability has an important role of e-Waste management and can reduce the volume of e-Waste.<\/li>\n
- Incineration: It is the process of burning e-Waste at high temperature in a chimney<\/li>\n
- Recycling of e-Waste: It is the process of making new products from this e-Waste.<\/li>\n
- Land filling: It is used to level pits and cover by thick layer of soil.<\/li>\n<\/ol>\n
Question 9.
\nCompare Entry Controlled loop with Exit Controlled loop.
\nAnswer:
\nAn entry controlled loop first checks the condition and execute(or enters into) the body of loop only if it is true. But exit control loop first execute the body of the loop once even if the condition is false then check the condition. The for loop and while loop are entry controlled loops but do-while loop is an exit controlled loop.<\/p>\n
Question 10.
\nFind the invalid identifier names from the following: A1, d-w, 999, qwA, Z$, AaA1,8c
\nAnswer:
\nInvalid identifiers
\nd-w(Special characters not allowed)
\n999(Cannot be start with a number)
\nz$($ not allowed)
\n8c(Cannot be start with a number)<\/p>\n
Question 11.
\nList the data type modifiers used in C++.
\nAnswer:
\nWith the help of type modifiers, we can change the sign and range of data with same size. The important modifiers are signed, unsigned, long and short.<\/p>\n
Question 12.
\nWrite the symbols of the following C++ operators.
\na) Conditional operator
\nb) Extraction operator
\nc) Increment operator
\nd) NOT operator
\nAnswer:
\na) ?:
\nb) <<
\nc) ++
\nd) !<\/p>\n
Question 13.
\nWrite the syntax of if ………… else statement.
\nAnswer:
\nif(Test expression)
\n{
\nstatement block 1;
\n}
\nelse
\n{
\nstatement block 2;
\n}<\/p>\n
Question 14.
\nCompare Linear search with Binary search.
\nAnswer:<\/p>\n
\n\n\nLinear<\/td>\n | Binary<\/td>\n<\/tr>\n |
\n1. No need of sorted array<\/td>\n | 1. Need of sorted array<\/td>\n<\/tr>\n |
\n2. Searching is slower for larger array.<\/td>\n | 2. It is faster<\/td>\n<\/tr>\n |
\n3. It starts checking from the first element and checks all elements.<\/td>\n | 3. Divide and conquer method used<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n Question 15. \nWhat do you mean by argument of a function? \nExplain formal arguments. \nAnswer: \nTo invoke a function that requires some data for performing the task, such data is called parameter or argument. \nThe parameters appear in a function definition are formal arguments.<\/p>\n Question 16. \nWrite the advantages of social media. \nAnswer: \nAdvantages of social media.<\/p>\n \n- Bring people together: It allows people to maintain the friendship<\/li>\n
- Plan and organize events: It allows users to plan and organize events.<\/li>\n
- Business promotion: It helps the firms to promote their sales.<\/li>\n
- Social skills: There is a key role of the formation of society.<\/li>\n<\/ul>\n
Answer any 9 questions from 17 to 27. Each carries 3 scores. (9 \u00d7 3 = 27)<\/span><\/p>\nQuestion 17. \nExplain any three generations of computers. \nAnswer: \nThere are five generations of computers from 16th<\/sup>\u00a0century to till date.<\/p>\n\n- First generation computers (1940-1956): Vacuum tubes were used in first generation computers. The input was based on punched cards and paper tapes and output was displayed on printouts.<\/li>\n
- Second generation computers (1956-1963): Transistors, instead of Vacuum tubes, were used in 2nd generation computers hence size became smaller, less expensive, less electricity consumption and heat emission and more powerful and faster.<\/li>\n
- Third generation computers (1964-1971): Integrated Circuits(IC\u2019s) were used. IC\u2019s or silicon chips were developed by Jack Kilby, an engineer in Texas Instruments. It reduced the size again and increased speed and efficiency.<\/li>\n
- Fourth generation computers (1971 onwards): Microprocessors are used hence computers are called microcomputers.<\/li>\n
- Fifth generation computers (future): Fifth generation computers are based on Artificial Intelligence(AI). Alis the ability to act as human intelligence like speech recognition, face recognition, robotic vision and movement etc.<\/li>\n<\/ol>\n
Question 18. \nDraw the logic circuit of Boolean expression X.Y + \\(\\bar{Y}\\) \nAnswer: \n<\/p>\n Question 19. \nConvert (11011)2<\/sub> to Octal decimal and Hexadecimal number systems. \nAnswer: \na) To octal-for this divide the number into groups of 3 bits starting from the right and. write down the corresponding octal equivalent \n011\u00a0 011 \u2192 33 \n(11011)2<\/sub> = (33)8<\/sub> \nb) To decimal – for this multiply each digit by its corresponding weight and sum it up. \n(11011)2<\/sub> = (27)10<\/sub> \nc) To Hexadecimal – for this divide the number into groups of 4 bits starting from the right and write down the corresponding hexadecimal equivalent \n0001 1011 \u2192 1B \n(11011)2<\/sub> = (1B)16<\/sub><\/p>\nQuestion 20. \nName the steps involved in problem solving. \nAnswer:<\/p>\n \n- Problem identification<\/li>\n
- Deriving the steps to obtain the solution.<\/li>\n
- Coding<\/li>\n
- Translation<\/li>\n
- Debugging<\/li>\n
- Execution and Testing<\/li>\n
- Documentation<\/li>\n<\/ol>\n
Question 21. \nWrite a short note on C++ character set. \nAnswer: \nThe character set of C++ is given below \na) Letters – A to Z and a to z. \nb) Digits – 0 to 9 \nc) Special characters – +,-,*,\/ etc \nd) White spaces(non printable characters) and other characters.<\/p>\n Question 22. \nDescribe three types of C++ expressions with an example. \nAnswer: \nAn expression is composed of operators and operands<\/p>\n \n- Arithmetic – It consists of arithmetic operators and operands eg. a+5, b%10, etc<\/li>\n
- Relational – It consists of relational operators and operands eg. a>5, b==5, etc<\/li>\n
- Logical – It combines two or more relational expressions with logical operators. Eg. x>y && x==z<\/li>\n<\/ul>\n
Question 23. \nWrite an algorithm for selection sort. \nAnswer: \nSelection sort: In selection sort the array is divided into two parts, the sorted part and unsorted part. First smallest element in the unsorted part is searched and exchanged with the first element. Now there is 2 parts sorted part and unsorted part. This process continues.<\/p>\n Algorithm: \nStep 1. Start \nStep 2. Read N(The number of elements) \nStep 3. Read N elements into the Array AR \nStep 4. Repeat steps 5 to 8, (N-1) times \nStep 5. Assume that the first element is the smallest and set into MIN, and its position is POS \nStep 6. Repeat Step 7 until the last element of the list \nStep 7. Compare MIN with the remaining elements and the smaller one is stored in the MIN(Swap) and its position in POS \nStep 8. Revise the list by excluding the first element in the list \nStep 9. Print the Sorted Array AR \nStep 10. Stop.<\/p>\n Question 24. \nDifferentiate between put () and write () with an example. \nAnswer: \nput() – This is used to print a character on the screen. \nEg. pout.put(“A\u201d); \nwrite() – This is used to print a string with specified length on the screen. Eg. cout.write(str,len);<\/p>\n Question 25. \nDescribe the merits of modular programming. \nAnswer: \nMerits of modular programming is<\/p>\n \n- It reduces the size of the program<\/li>\n
- Less chance of error<\/li>\n
- It reduces programming complexity<\/li>\n
- It improves reusability<\/li>\n<\/ul>\n
Question 26. \nWrite short notes on \na) Bluetooth \nb) Wi-Fi \nc) Satellite \nAnswer: \na) Bluetooth: This technology uses radio waves in the frequency range of 2.402 GHz to 2.480 GHz. And transmit data in short distance. Mobile phones, Laptops, tablets etc use Bluetooth technology to transmit data.<\/p>\n b) Wi-Fi(Wireless Fidelity): It uses radio Waves to transmit information across a network in a range 2.4 GHz to 5 GHz in short distance. Nowadays this technology is used to access internet in Laptops, Desktops, tablets, Mobile phones etc.<\/p>\n c) Satellites: By using satellite we can communicate from any part of the world to any other. The ground stations are connected via satellite. The data signals transmitted from earth to satellite (uplink) and from the satellite to the earth (downlink).<\/p>\n Question 27. \nWhat is the role of Firewall and Anti-virus scanner in computer networks? \nAnswer: \nFirewall: It is a system that controls the incoming and outgoing network traffic by analyzing the data and then provides security to the computer network in an organization from other networks (internet).<\/p>\n Antivirus scanners: It is a tool used to scan computer files for viruses, worms and Trojan horses and cure the infected system. If any fault found it stops the file from running and stores the file in a special area called Quarantine(isolated area) and can be deleted later.<\/p>\n Answer any 2 questions from 28 to 30. Each carries 5 scores. (2 \u00d7 5 = 10)<\/span><\/p>\nQuestion 28. \na) Write any two examples of optical storage devices. \nb) Rearrange the following memories in descending order depending on their speed. \n(Hard disk, RAM, Cache Memory, Registers) \nc) List four major functions of operating system. \nAnswer: \na) CD, DVD, Blue Ray Disc \nb) Registers, Cache Memory, RAM, Hard Disk \nc) Process management, Memory handling, Device management and file management<\/p>\n Question 29. \na) Explain any three jump statements with examples. \nb) Read the following C++ statement and rewrite using if……. else. \n(a>b)? cout<<a: \ncout<<b; \nAnswer: \na) 1) goto statement:- By using goto we can transfer the control anywhere in the program without any condition. The syntax is goto label; \nEg. \n#include<iostream> \nusing namespace std; \nint main() \n{ \nfloat a,b; \ncout<<\u201cEnter 2 numbers\u201d; \ncin>>a>>b; \nif(b==0) \ngoto end; \ncout<<\u201cThe quotient is \u201c<<a\/b; \nreturn 0; \nend:cout<<\u201cDivision by zero error\u201d; \n}<\/p>\n 2) break statement:- It is used to skip over a part of the code i.e. we can premature exit from a loop such as while, do-while, for or switch. \nEg. \n#include<iostream> \nusing namespace std; \nmain() \n{ \nint i=1; \nwhile(i<10) \n{ \ncout<<i<<endl; \nif(i==5) \nbreak; \ni++; \n} \n}<\/p>\n 3) continue statement:- It bypasses one iteration of the loop. \nEg. \n#include<iostream> \nusing namespace std; \nmain() \n{ \nint i=0; \nwhile(i<10) \n{ \ni++; \nif(i==5) continue; \ncout<<i<<endl; \n} \n} \nb) if(a>b) \ncout<<a; \nelse \ncout<<b;<\/p>\n Question 30. \nExplain the network topologies with diagrams. \nAnswer: \nThe major topologies developed are star, bus, ring, tree and mesh. \n1) Star Topology: A star topology has a server all other computers are connected to it. If computer A wants to transmit a message to computer B. Then computer A first transmit the message to the server then the server retransmits the message to the computer B. That means all the messages are transmitted through the server. Advantages are add or remove workstations to a star network is easy and the failure of a workstation will not effect the other: The disadvantage is that if the server fails the entire network will fail.<\/p>\n 2) Bus Topology: Here all the computers are attached to a single cable called bus. Here one computer transmits all other computers listen. Therefore it is called broadcast bus. The transmission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not.<\/p>\n Advantages are add or remove computer is very easy. It requires less cable length and the installation cost is less. Disadvantage is fault detection is very difficult because of no central computer.<\/p>\n 3) Ring Topology: Here all the computers are connected in the shape of a ring and it is a closed loop. Here also there is no central computer. Here a computer transmits a message, which is tagged along with its destination computer\u2019s address. The message travels in one direction and each node check whether the message is for them. If not, it passes to the next node.<\/p>\n It requires only short cable length. If a single node fails, at least a portion of the network will fail. To add a node is very difficult.<\/p>\n 4) Hybrid Topology: It is a combination of any two or more network topologies, Tree topology and mesh topology can be considered as hybrid topology.<\/p>\n a) Tree Topology: The structure of a tree topology is the shape of an inverted tree with a central node and branches as nodes. It is a variation of bus topology. The data transmission takes place in the way as in bus topology. The disadvantage is that if one node fails, the entire, portion will fail.<\/p>\n b) Mesh Topology: In this topology each node is connected to more than one node. It is just like a mesh (net). There are multiple paths between computers. If one path fails, we can transmit data through another path.<\/p>\n |