0% found this document useful (0 votes)
80 views12 pages

Model Question Papers CS

2nd PUC important questions computer science for the mid term exams.

Uploaded by

amppuneela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views12 pages

Model Question Papers CS

2nd PUC important questions computer science for the mid term exams.

Uploaded by

amppuneela
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

MODEL QUESTION PAPER-1

CLASS : II PUC
SUBJECT:COMPUTER SCIENCE(41) MAX MARKS:70
TIME:03:00 hrs NO.OF QUESTIONS:44
Instructions:
(a) The question paper has Five parts namely A,B,C,D and E.
(b) For Part-A questions, only the first written answers will be considered for evaluation.
(c) For question having diagram alternate questions are given at the end of the question paper in a
separate section (Part-E) for visually challenged students.

PART – A
Answer ALL the questions, each question carries ONE mark. 20 x 1 = 20
I.Select the correct answer from the choices given.

1.What type of errors are exceptions in Python?


a) Logical errors b) Syntax errors c) Runtime errors d) Parsing errors

2. In Python, which data type is commonly used to implement a stack?


a) Tuple b)Set c)List d)Dictionary

3. How many passes are required to sort a list of 6 elements using Bubble Sort?
a) 5 b) 6 c) 4 d) 3

4. In which case will linear search make only one comparison?


a) When the key is the middle element b) When the list is sorted
c) When the key is the last element d) When the key is the first element
5. A well organized data represented in a tabular column is_____data.
a.Structured b.Unstructured c.Semi structured d.None of these
6. Assertion (A): A primary key must be unique and NOT NULL.
Reason (R): A primary key is used to link data between unrelated databases.
A. Both A and R are true, and R is the correct explanation of A
B. Both A and R are true, but R is not the correct explanation of A
C. A is true, but R is false
D. A is false, but R is true

7.Choose the DDL command from the following.


a)create b)alter c)drop d)all of these.
8.Choose the command used to know the structure of the table.
a)desc b)show c)view d)all of these.
9.Which among the following is a dbms software?
a)oracle b)mysql c)sybase d)all of these.
10.Modem refers to
a)Moderator b)Modulator c)Demodulator d)both b) & c).
11. What is the primary purpose of data communication?
a)To store data b)To send data c)To exchange data d)all of these.
12. What unit is used to measure bandwidth?
a) Bits per second b) Hertz c) Decibels d) Joules
13. A communication mode that allows data to flow only in one direction is called:
a) Full-duplex b) Half-duplex c) Simplex d) Bidirectional
14.Relationship between tables in a DBMS are created using:
a) Primary Keys b)Constraints c)Foreign Keys d)Data files

15. A set of fields that uniquely identifies a row is called a:


a) Schema b) Query c)Key d)Constraint

II. Fill in the blanks choosing the appropriate word/words from those given in the brackets.
(primary key,Tuple,Instance ,schema,meta data )
16. The actual data in a database at a particular point in time is called the __________.
17.Data about data is_____.
18.A row in a table is also called as_____.
19._________contains complete information about the database.
20.The _______ constraint is used to identify uniquely from the table.

PART-B
III. Answer any FOUR questions. Each question carries TWO marks: 4 x 2 =8

21. Define Stack. Mention the principle it follows.


22. List any two applications of binary search.
23.What is a constraint?Give an example.
24.What is primary key?Write its types.
25.What is duplex communication?Give an example.
26.Write a short note on HTTP.
27.What is a spyware? How does it work?

PART-C
IV. Answer any FOUR questions. Each question carries THREE marks: 4 x 3 = 12
28. Explain the try...except block with an example.
29. Explain the applications of stack in programming.
30.Write the complete Python function to check if a queue is empty or not
31.Differentiate between Bubble Sort and Insertion Sort
32.Differentiate between structured data and unstructured data with examples.
34.What are constraints?Mention any two types.

PART-D
V. Answer any FOUR questions, each question carries Five marks: 4 x 5 = 20
35.What are the different methods used to read contents from the files give examples.
36. Discuss different types of hackers.
37.Write the working mechanism for binary search on the list of elements.
38.Explain the concept of queue. List and explain any four basic operations on queue.
39.Define key constraint.Explain any four keys.
40.Explain the classification of computer networks based on their geographical area.
41.Define network topology.Exaplain any four.

VI Answer any TWO questions, each question carries FIVE marks 2 x 5 = 10


42. Write an example program to Creating a file and writing data into it.
a)create a fileobject
b)write a statement to open a file ‘practice.txt’ in writing and reading mode
c)repeat to input few lines of data to the opened file till user’s input is ‘no’
d)use the break statement to terminate the loop
e) close the fileobject
43. Explain the working of Bubble Sort with the help of an example. Show all passes and swaps.

44. Write the SQL query for the following questions based on given employee table.

i.Develop the table with above fields


ii.Display the structure of the table
iii. Find total number of employees
iv. Find the sum of all employee’s salary
v. Display all employee records with age>=15

PART-E

(For Visually Challenged Students only)


3.Sorting on a list is__________.
a)Insertion of elements b)arrangement of elements
c)deletion of elements d)None of the above.
MODEL QUESTION PAPER-2
CLASS : II PUC
SUBJECT:COMPUTER SCIENCE(41) MAX MARKS:70
TIME:03:00 hrs NO.OF QUESTIONS:44
Instructions:
(a) The question paper has Five parts namely A,B,C,D and E.
(b) For Part-A questions, only the first written answers will be considered for evaluation.
(c) For question having diagram alternate questions are given at the end of the question paper in a
separate section (Part-E) for visually challenged students.

PART – A
Answer ALL the questions, each question carries ONE mark. 20 x 1 = 20
I.Select the correct answer from the choices given.

1.What is other name for Syntax error?


a) Logical errors b) Semantic errors c) Runtime errors d) Parsing errors

2. Which type of mechanism involved in the implementation of a stack?


a) LIFO b)FILO c)FIFO d)both a) & b)

3. How many passes are required to sort a list of 6 elements using selection Sort?
a) 5 b) 6 c) 4 d) 3

4. In which case will binary search make only one comparison?


a) When the key is the middle element b) When the list is sorted
c) When the key is the last element d) When the key is the first element
5. A randomly organized data collection is______data.
a.Structured b.Unstructured c.Semi structured d.None of these
6. Assertion (A): In a relational database, each attribute must have a unique name.
Reason (R): Unique attribute names help avoid ambiguity during data manipulation.
a) Both A and R are true, and R is the correct explanation of A
b) Both A and R are true, but R is not the correct explanation of A
c) A is true, but R is false
d) A is false, but R is true

7.Choose the command from the following that deletes the structure permanently.
a)create b)alter c)drop d)all of these.
8.Choose the command used to modify the contents of the table.
a)desc b)show c)alter d)all of these.
9.Which among the following is not a dbms software?
a)oracle b)mysql c)sybase d)MS excel.
10.NIC(Network Interface Card) is also refers to
a)Modem b)Ethernet card c)Flash card d)Dongle
11. What are the components of data communication?
a)Sender b)Receiver c)Message d)all of these.
12. What unit is used to measure speed of internet?
a) Bits per second b) Hertz c) Decibels d) Joules
13. A communication mode that allows data to flow bidirection is called:
a) Full-duplex b) Half-duplex c) Simplex d) Bidirectional
14.Conditions applied on tables in a DBMS using:
a) Primary Keys b)Constraints c)Foreign Keys d)Data files

15. The meta data can be found in :


a) Schema b)Data dictionary c)Database d)Files

II. Fill in the blanks choosing the appropriate word/words from those given in the brackets.
(Field,candidate key,schema,Redundancy ,database,)
16.The repeated data in table is called as __________.
17.The large data collection is called as_____.
18.A column in a table is also called as_____.
19.The_______ gives the design of the database.
20.The key which is currently not considered as a primary key is_______ that used to identify
uniquely from the table.

PART-B
III. Answer any FOUR questions. Each question carries TWO marks: 4 x 2 =8

21. Define Stack. Mention two basic operations.


22. Which type of situations can use linear search.
23.What is a not null constraint?Give an example.
24.What is foreign key?Write its purpose.
25.What is simplex communication?Give an example.
26.Write a short note on HTTPS.
27.What is Malware? Mention its types.

PART-C
IV. Answer any FOUR questions. Each question carries THREE marks: 4 x 3 = 12
28. Explain the try... multiple except block with an example.
29. Explain the applications of stack in general.
30.What is Deque?Mention its application in general
31.Differentiate between Bubble Sort and Selection Sort
32.What is unstructured data?Give few examples.
34.Define Cardinality,Degree, & Tuple. With respect to table.

PART-D
V. Answer any FOUR questions, each question carries Five marks: 4 x 5 = 20
35.Write and explain different methods used to perform offset in the file with syntax.
36.Write the methods to prevent malware.
37.Write the working mechanism for linear search on the list of elements.
38.Define queue. Write applications of queue in programming.
39.Write the application of database in different fields.
40.Explain different types of topologies in network.
41.Explain different modes of Malware distribution.

VI Answer any TWO questions, each question carries FIVE marks 2 x 5 = 10


42. Write an example program to writing and reading data to a file.
a)create a data file and assign to fileobject
b)write a statement to open a file ‘practice.txt’ in writing mode assign it to ‘sentence’.
c)write the ‘sentence’ to the fileobject
d)close the fileobject
e)now open the data file using fileobject and print statement.
43. Explain the working of Insertion Sort with the help of an example. Show all passes and swaps.

44. Create a table for house hold Electricity bill with the following fields.

i.Develop the table ebill with above fields.


ii.write the command to insert records into the table .
iii.write the command to check the structure of the table.
iv. write the command to add due_date and amount.
v. write the command to compute the amount.

PART-E

(For Visually Challenged Students only)


3.Searching is__________process.
a)Insertion of elements b)arrangement of elements
c)deletion of elements d)identification.
MODEL QUESTION PAPER-3
CLASS : II PUC
SUBJECT:COMPUTER SCIENCE(41) MAX MARKS:70
TIME:03:00 hrs NO.OF QUESTIONS:44
Instructions:
(a) The question paper has Five parts namely A,B,C,D and E.
(b) For Part-A questions, only the first written answers will be considered for evaluation.
(c) For question having diagram alternate questions are given at the end of the question paper in a
separate section (Part-E) for visually challenged students.

PART – A
Answer ALL the questions, each question carries ONE mark. 20 x 1 = 20
I.Select the correct answer from the choices given.

1.What type of arises while executing a program?


a) Logical errors b) Semantic errors c) Runtime errors d) Parsing errors

2. Which element is the last element to be removed from stack?


a) Last b)First c)Mid d)Any random

3. How many passes are required to sort a list of 6 elements using Insertion Sort?
a) 5 b) 6 c) 4 d) 3

4. In binary search if the search element is less than middle element,Which end changes for next
searching process?
a) beg=mid+1 & last=n-1 b) beg=0 & last=mid-1
c) beg=mid-1 & last=n+1 d) beg=0 & last=mid+1
5. A randomly and partially organized data collection is______data.
a.Structured b.Unstructured c.Semi structured d.None of these
6. Assertion (A): Simplex communication allows data to be sent in both directions simultaneously.
Reason (R): In simplex communication, only one device sends data and the other only receives.
a) Both A and R are true, and R is the correct explanation of A
b) Both A and R are true, but R is not the correct explanation of A
c) A is true, but R is false
d) A is false, but R is true

7.Choose the command from the following that deletes the contents of table.
a)create b)alter c)drop d)all of these.
8.Choose the command used to describe the structure of the table.
a)desc b)show c)alter d)all of these.
9. The capacity of channel is measured in terms of_____.
a.Frequency b.Bandwidth c.mbps d.kbps
10. In a communication where only one person can send while the receiver only receives.
a.Duplex b.Half duplex c.Multiplex d.simplex
11. In packet switching, each message is broken into:
a. Frames b.Bytes c.Segments d.Packets
12. Optical fibre cables use which principle to transmit data?
a. Scattering b.Reflection c.Refraction d.Absorption
13. The purpose of Unique constraint is
a.To avoid duplicates b.To check duplicates c.To give null d.To make not null

14.Which device is used to regenerate lost signals


a) Modem b)USb c)Amplifier d)Router

15. Which telecommunication technology offers virtual reality :


a)7G b)5G c)4G d)3G

II. Fill in the blanks choosing the appropriate word/words from those given in the brackets.
(Tuple,not null,primary key,Meta data ,table)
16.If __________set to a column,that field cannot be left blank.
17.The arrangement of rows and columns is called as_____.
18.A row in a table is also called as_____.
19.The data about data is_____.
20.The key which is used identify uniquely_________.

PART-B
III. Answer any FOUR questions. Each question carries TWO marks: 4 x 2 =8

21.In which mechanism Stack works. Mention two basic operations.


22.What is search.Mention different algorithms for search.
23.What is a unique constraint?Give an example.
24.What is candidate key?Write its purpose.
25.What is Half duplex communication?Give an example.
26.Write a short note on Bluetooth.
27.What is Adware? How to avoid an adware.

PART-C
IV. Answer any FOUR questions. Each question carries THREE marks: 4 x 3 = 12
28. Explain the try... except and finally block with an example.
29. Explain the applications of stack in programming.
30.What is deque?Mention its application in computer science.
31.Differentiate between Insertion Sort and Selection Sort
32.What is Semistructured data?Give few examples.
34.Define constraints.Give few examples.

PART-D
V. Answer any FOUR questions, each question carries Five marks: 4 x 5 = 20
35.What are the different methods used to read from file.
36.How virus files are detected by antivirus ?
37.Write the working mechanism for binary search on the list of elements.
38.Define queue. Write applications of queue in programming.
39.Explain different types of guided media transmission.
40.Explain different types of networks.
41.Write a note on Hackers.

VI Answer any TWO questions, each question carries FIVE marks 2 x 5 = 10


42. Write an example program to writing and reading data to a file.
a)define a function student
b)open a file ‘practice.txt’ in writing mode assign it to ‘stu’.
c)write statements to receive name and class.
d)write statement to save it on the file ‘practice.txt’
e)close the file.
43. Explain the working of Selection Sort with the help of an example. Show all passes and swaps.

44. Create a table with the following details.

i.Create the table student with above fields.


ii.write the command to insert records into the table .
iii.write the command to check the structure of the table.
iv. write the command to add Parents name and contact.
v. write the command to display all the record.

PART-E

(For Visually Challenged Students only)


3.Sorting is__________process.
a)Insertion of elements b)arrangement of elements
c)deletion of elements d)identification.
MODEL QUESTION PAPER-1
CLASS : II PUC
SUBJECT:COMPUTER SCIENCE(41) MAX MARKS:70
TIME:03:00 hrs NO.OF QUESTIONS:44
Instructions:
(a) The question paper has Five parts namely A,B,C,D and E.
(b) For Part-A questions, only the first written answers will be considered for
evaluation.
(c) For question having diagram alternate questions are given at the end of the
question paper in a separate section (Part-E) for visually challenged students.

PART A
Answer ALL the questions, each question carries ONE mark. 20X1=20
I. Select the correct answer from the choices given.
1. An exception ZeroDivisionError is raised when
a) Denominator is zero b) numerator is zero
c) Quotient is zero d) remainder is zero
2. Assertion (A): The exception handling codes are different from normal codes used in
the program.
A Reason (R): The keywords namely try, except and finally are used for handling
exception.
a) Both A and R are True and (R) is the correct explanation forA
b) b) Both A and R are True and (R) is not correct explanation for A
c) A is True, R is not correct explanation for
d) A is False, R is correct explanation for A
3. Which of the following situation causes over flow of stack..
a) Inserting an element to a full Stack.
b) A is True and R is False.
c) Deleting an element from full Stack.
d) Deleting an element from empty Stack.
4. Assertion (A): A Stack is a linear data structure that follows FIFO principle.
Reason (R): In Stack, data elements are added and removed from different ends.
a) Both A and R are True and R is the correct explanation for A.
b) A is True and R is False.
c) A is False and R is True.
d) Both A and R are False.
5. Elements A, S, D and F are present in the queue, and they are deleted one at a time,
……….. is the sequence of element received.
a) ASDF b) FDSA c) SDFA d) DSFA
6. The scenario where an algorithm performs minimum amount of work is called
a) worst case b) best case c) average case d) none of these
7. If an algorithm does not have any looping statement, then the time complexity is
………irrespective of data size.
a) O(n) b)O(n2) c)O(n log n) d)1
8. The binary search technique accepts
a) only sorted elements b) only unsorted elements
c)either sorted or unsorted elements d) none of these
9. The average of the numeric values of an attribute is called
a) Mode b)median c)mean d)none of these
10. E-mails., social media posts and videos are examples for
a) unstructured data b) structured data
c) semi-structured data d) none of these
11. The number of attributes in a relation is called
a) Cardinality b) ordinality c)domain d)degree
12. ………….. is an unique address that can be used to identify each node uniquely
in a network.
a)IP address b)DNS c)tcp/ip d)http
13. Which of the following has a high data transfer rate?
a)utp b)stp c)co-axial d)optical fibre
14. Which of the following device that can receive the data, analyse it and transmit
into internal networks?
a) hub b) switch c) router d) bridge
15. The range of frequencies available for transmission of data through a
communication channel is called ………….
a) data transfer rate b) bandwidth c) data transfer speed d) none of these

II. Fill in the blanks choosing the appropriate word/words from those given in the
brackets.
(group by, alter, unique, order by, alter, update, create, where)
16. ………… constraint prevents duplicate values for an attribute. (unique)
17. …………clause is used for arranging the data in an order either ascending or
descending. (order by)
18. ……..command is used for modifying database structure. (alter)
19. ……. command is used for making changes in existing data. (update)
20. …… clause is used for classifying similar kind of data. (group by)
PART B
III. Answer any FOUR questions. Each question carries TWO marks. 4X2=8
21. Give any two real life examples for Stack.
22. What is the use of collision resolution technique?
23. Define: (a) Primary key (b) Foreign key
24. Give the syntax and example for a command which is used for creating a new
database.
25. Define the term topology. What are the popular network topologies?
26. The full form of HTTPand HTTPs.
27. How is a computer worm different from a virus?

PART C
IV.Answer any FOUR questions. Each question carries THREE marks. 4X3=12
28. When following built-in exceptions raised?
a) IO Error b) Indentation Error c) Over Flow Error
29. What is Polish notation? Explain two types of expressions with respect to Polish
notation with an example.
30. Write a Python program to perform enqueue operation for inserting an element
into a Queue.
31. What is time complexity? Discuss best case and worst case with respect to time
complexity.
32. Give the differences between structured and unstructured data.
33. Explain different terminologies used in relational data model.
34. List different DML commands and mention their uses.
PART D
V. Answer any FOUR questions. Each question carries FIVE marks. 4X5=20
35. How is Queue data type is different from deque data type?
36. Write an algorithm of binary search.
37. Why foreign keys are allowed to have NULL values? Explain with an example.
38. What is network topology? Explain various topologies in brief.
39. Write a note on Domain Name System (DNS)
40. Compare wired and wireless media.
41. Briefly explain different modes of malware distribution.
VI. Answer any TWO questions. Each question carries FIVE marks. 2X5=10
42. Define pickling in Python. Explain serialisation and deserialization of Python
object.
43. Write an algorithm of insertion sort for arranging the data elements in an order.
44. Explain various SQL constraints with example.

****************

You might also like