INTERMEDIATE EXAMINATION – 2022 (ANNUAL) 328
Model Set
Computer Science
Time :- 3 Hours 15 minutes Full Marks - 70
le; % 3 ?kaVs 15 feuV iq.kkZad & 70
I.A., I.Sc. & I.Com. – (OPT)
Instructions for the candidate :-
1- ijh{kkFkhZ mÙkj&i=d ij viuk iz’u iqfLrdk Øekad ¼10 vadksa dk ½ vo’;
fy[ksaA
Candidates must enter his/her question Booklet Serial No. (10
Digits) in the OMR Answer Sheet.
2- ijh{kkFkhZ ;FkklaHko vius 'kCnksa esa gh mÙkj nsaA
Candidates are required to give their answer in their own words
as far as practicable.
3- nkfguh vksj gkf’k;s ij fn;s gq, vad iw.kkZad fufnZ"V djrs gSaA
Figures in the right hand margin indicate full marks.
4- iz’uksa dks /;kuiwoZd i<+us ds fy, ijh{kkfFkZ;ksa dks 15 feuV dk vfrfjDr
le; fn;k x;k gSA
15 minutes of extra time has been allotted for the candidates to
read the questions and follow the instructions carefully.
5- ;g iz’u iqfLrdk nks [k.Mksa esa gS]
This question paper is divided into two sections : Section-A,
and Section-B.
6- [k.M&v esa 70 oLrqfu"B iz’u gSa] ftuesa ls fdUgha 35 iz’uksa dk mÙkj nsuk
vfuok;Z gSA 35 iz’uksa ls vf/kd mÙkj nsus ij izFke 35 mÙkj dk gh ewY;kadu
1
gksxkA ¼izR;sd ds fy, 1 vad fu/kkZfjr gS½ budk mÙkj nsus ds fy, miyC/k
djk;s x;s OMR&mÙkj i=d esa fn;s x;s lgh fodYi dks dkys@uhys ckWy
isu ls izxk<+ djsaA fdlh Hkh izdkj ds OgkbVuj@rjy inkFkZ@CysM@uk[kwu
vkfn dk OMR mŸkj i=d esa iz;ksx djuk euk gS] vU;Fkk ijh{kk ifj.kke
vekU; gksxkA
In Section-A, there are 70 objective type questions out of which
any 35 questions are to be answered. If more than 35 questions
are answered, then only first 35 will be evaluated. Each carrying
1 mark. Darken the circle with black/blue ball pen against the
correct option on OMR Answer Sheet provided to you. Do not
use Whitener/Liquid/Blade/Nail etc. On OMR Answer Sheet,
otherwise the result will be invalid.
7- [k.M&c esa 20 y?kqmÙkjh; iz’u gSaA izR;sd ds fy, 2 vad fu/kkZfjr gS] ftuesa
ls fdUgha 10 iz’uksa dk mÙkj nsuk vfuok;Z gSA blds vfrfjDr bl [k.M esa 6
nh/kZ mŸkjh; iz’u fn;s x;s gSaA izR;sd ds fy, 5 vad fu/kkZfjr gSa] ftuesa ls
fdUgha 3 iz’uksa dk mŸkj nsuk vfuok;Z gSA
In Section-B, there are 20 Short answer type questions, each
carrying 2 marks, out of which any 10 questions are to be
answered. Apart from this, there are 6 long Answer type
Questions, each carrying 5 marks, out of which any three
Questions are to be Answered.
8- fdlh rjg ds bysDVªkWfud midj.k dk iz;ksx iw.kZr;k oftZr gSA
Use of any type electronic appliances is strictly prohibited.
2
/ SECTION-A
/Objective Type Questions.
iz'u la[;k 1 ls 70 rd ds izR;sd iz’u ds lkFk pkj fodYi fn, x;s gSa] ftuesa
ls ,d lgh gSA vius }kjk pqus x, lgh fodYi dks OMR&’khV ij fpfàr djsaA fdUgha
35 iz’uksa dk mŸkj nsaA
Question No.- 1 to 70 have four options, out of which only one is
correct. You have to mark your selected option, on the OMR Sheet.
Answer any 35 questions.
1. dkSu lk ,d non-linear MsVk lajpuk gSA
Which one is a non linear data structure.
A. Queue B. Tree
C. Struct D. Stack
2. baV ih( bl iafDr esa ^P* a/an gSA
int P; in this line ‘P’ is a/an
A. Input function B. output function
C. variable D. data type
3. dSj ,d-------------- gSA
Char is a/an………..
A. function B. operator
C. constant D. data type
3
4. math . h ,d-------------- gSA
math . h is a/an………..
A. data file B. header file
C. linker D. program block
5. DMLdekaM dkSu lk gS ?
Which one is a DML command\
A. Roll back B. Insert
C. Create D. Update
6. ,d vk;keh lj.kh esa gks ldrh gS…………
One dimensional array may have……..
A. Only columns B. Only rows
C. Only one cell D. Both columns and rows
7. LVSd ds fy, dkSu lk bViqV QaD’ku gSA
Which one is an input function for stack?
A. POP B. PUSH
C. Binary D. Traversal
8. ,d=hdj.k dk vFkZ gS\
Aggregation means?
4
A. Summarization B. Elimination
C. hiding D. Casting
9. vksojyksfMax fdldh fo’ks"krk gS\
Overloading is a feature of ?
A. Procedural Programming
B. SQL
C. Non Procedural Programming
D. Object Oriented Programming
10. vuqØe.k gS \
Indexing is ?
A. Design of objects B. Creation of objects
C. instances of objects D. Not related with objects
11. fuEufyf[kr esa ls dkSu ,d ykWftd xsV ls lacaf/kr gS \
Which one of the followings is associated with Logic gate ?
A. AND B. For ( )
C. IFU D. Break
12. la[;k iz.kkyh ---------- dk izfrfuf/kRo djus ds fy, iz;ksx fd;k tkrk gS \
5
Number systems used to represent ?
A. Quantity B. Count
C. Value D. All of the above
13. O;atd Y= AB+BC+AC ………….. vkWijs’ku n’kkZrk gS \
The expression Y=AB+BC+AC shows the …… operation.
A. EX-OR B. SOP
C. POS D. NOR
14. SQL esa dkSu&lk DML dekaM ugha gS\
Which one is not a DML command in SQL ?
A. UPDATE B. SELECT
C. DELETE D. GRANT
15. fuEufyf[kr esa ls dkSu lk ,d SQL dek.M MsVk ntZ djus ds fy, iz;ksx
fd;k tkrk gS \
Which one of the following SQL command is used to enter data ?
A. CREATE B. INSERT
C. SELECT D. UPDATE
16. vkWijsfVax flLVe dkSu lk gS \
6
Which one is an Operating system ?
A. LAN B. NIC
C. WWW D. None of the above
17. fuEu esa ls dkSu ,d ySu ds fy, mi;ksx ugha fd;k tkrk gS \
Which one of the following is not used for LAN ?
A. UPT B. OFC
C. Coaxial D. Copper wire
18. fuEufyf[kr esa ls dkSu ,d daI;wVj usVodZ dh oS/k VksiksykWth gS \
Which one of the following is valid topology of computer
network?
A. CABLE B. HUB
C. STAR D. NIC
19. iw.kkZd ,d--------------- gS \
Integer is a/an ……….. ?
A. Built-in data type B. Constant
C. Derived data type D. Variable
20. lwph ,d ------------ gS \
7
List is a/an ……….. ?
A. Derived data type B. function
C. header file D. Builtin data type
21. Object ,d ------------------ gS \
Object is a/an ……….
A. Instance B. Design
C. Data type D. Operator
22. OOP dk mís’; ------------------ ,dhd`r djuk gSA
Aim of OOP is to integrate ……………...
A. Program & Process B. Function and Data
C. File and Disk D. Input and Output
23. OOP esa QaD’ku dks ------------------ dgk tkrk gS \
In OOP function is known as………
A. Actor
B. Method
C. Data
D. Design of data and methods
8
24. ihvks,l dk eryc gS\
POS stands for ?
A. Sum of Product B. Same on Product
C. Product of sum D. Sample of Program
25. Mksesu izdkj ,d ------------------- gSA
Domain type is a/an ……………
A. Data type B. Column Name
C. Attribute Name D. Entity Name
26. fyadj ,d ----------------- gSA
Linker is a ………..
A. Application B. Protocal
C. Topology D. System software
27. lhMh,e, fdlls lacaf/kr gS \
CDMA is related with ?
A. Computer Network B. Computing System
C. Mobile system D. Internet
28. KHz fdl eki dh bdkbZ gSA
9
KHz is unit measurement for ………….
A. Light waves B. Speed of air craft
C. Water Flow D. Band width
29. ok;jl ,d -------------------- gS A
Virus is a/an…………..
A. Application software B. System software
C. Device D. Process
30. lkbcj dkuwu fdlls lacaf/kr gS \
Cyber law is related with ?
A. Hardware Protection
B. Server Protection
C. Internet access Protection
D. Online Fraud & Crime Control
31. MAX ( ) QaD’ku fjVuZ \
MAX ( ) function returns ?
A. Highest value B. Lowest value
C. Negative value D. Positive value
10
32. ikWbaVj dks ---------- symbol dk mi;ksx djds n’kkZ;k tkrk gS A
Pointer is denoted by using symbol…………
A. # B. /
C. * D. +
33. LIKE % DykWt --------------------------- Vscy MsVk esa enn djrk gS A
LIKE % clause helps to …………… table data.
A. Summarize B. Sort
C. Filter D. List
34. MkWl ,d ------------- gS A
DOS is a/an………….. .
A. Operating system B. Compiler
C. Editor D. Inter preter
35. feu ¼ ½ QaD’ku fjVuZ \
MIN ( ) function returns ?
A. Highest value B. Lowest value
C.Negative value D. Positive value
36. fuEufyf[kr esa ls dkSu lk vkWijsVj ds :i esa cout ds lkFk iz;ksx fd;k tkrk gS \
11
Which one of the following is used with cout as operator ?
A. << B. >>
C. > D. <
37. fuEukafyf[kr esa ls dkSu lk vkWijsVj ds :Ik esa cin ds lkFk iz;ksx fd;k tkrk gS
Which one of the following is used with cin as operator ?
A.<< B. >>
C. > D. <
38. ,d Hkk"kk ftlesa u, MsVk izdkj mRiUu djus dh {kerk gksrh gS -------- dgykrh gS A
A language which has the capability to generate new data types
is called……..
A. Extensible B. Overloaded
C. Encapsulated D. Reprehensible
39. MsVk vkSj mlls lacaf/kr dk;Z dks ,d bdkbZ esa j[kus dks ------------ ds :i esa tkuk tkrk
gSA
Wrapping data and its related functionality into a single entity is
known as………
A. Abstraction
B. Encapsulation
12
C. Polymorphism
D. Modularity
40. ;fn lHkh midj.kksa dks ,d dsUnzh; gc ls tksM+k tkrk gS] rks bl VksiksykWth dks dgk
tkrk gS A
If all devices are connected to a central hub, then this topology
is called
A. Bus topology B. Ring topology
C. Star topology D. Tree topology
41. ------------------------ gesa Vscy esa fof’k"V :i ls ,d Viy dh igpku djus dh vuqefr nsrk
gSA
……… allow us to identify uniquely a tuple in the Table.
A. Superkey B. Domain
C. Attribute D. Scheme
42. , ¼,$ch ½ ¾ \
A (A + B) = ?
A. AB B. 1
C.(1 + AB ) D. A
13
43. lh $$ esa vpkud fdlh ywi ls ckgj vkus ;k NksM+us dk rjhdk D;k gS \
What is the way to suddenly come out or quit any loop in C++?
A.Continue; Statement B. Break; Statement
C.Leave; Statement D. Quit; Statement
44. If….. else LVsVesaV dks fdl vkWijsVj }kjk cnyk tk ldrk gS \
If……. else statement can be replaced by which operator?
A. Bit wise operator B. Conditional operator
C.Multiplicative operator D. Additional operator
45. fuEu esa ls dkSu esuw lapkfyr izksxzke ds fy, lcls mi;qDr gS \
Which of the following is most suitable for a menu- driven
program ?
A.For B. While
C. Do - while D. All of the above.
46. fuEufyf[kr esa ls fdl izdkj ds pj ds lkFk ,d fLop fuekZ.k dk mi;ksx fd;k tk
ldrk gS \
A switch construct can be used with which of the following types
of variable ?
A. int B. int, char
14
C. int, float, char D. Any basic data type
47. iqujko`fŸk;ksa dh la[;k Kkr gksus ij dkSu lh ywfiax izfØ;k dk lcls vPNk mi;ksx
fd;k tkrk gS \
Which looping process is best used when the number of
iterations is known ?
A.While loop B. For loop
C. Do while loop
D. All looping process require that the iterations be known.
48. ywi ds vanj czsd LVsVesaV fy[kus dk D;k izHkko gksrk gS \
What is the effect of writing a break statement inside a loop ?
A. It cancels remaining itrations.
B. It skips a particular iteration.
C.The Program terminates immediately.
D. Loop counter is reset.
49. C++, C dk ,d foLrkj gS ftlesa ------------- dh Dykl daLVªD’ku fo’ks"krk dk ,d izeq[k
tksM+ gS A
C++ is an extension of C with a major addition of the class
construct feature of ……….
15
A.Simula 67 B.Simula 57
C. Simula 47 D. Simula 87
50. ------------------------- izksxzkej }kjk cuk, x, pjksa] dk;ksZa] ljf.k;ksa] Dyklsl vkfn ds ukeksa dk
lanHkZ gSA
………. refer to the names of variables, functions, arrays,
classes etc. created by the programmer.
A. Keywords
B. Identifiers
C. Constraints
D. Strings
51. ;fn m vkSj n int izdkj ds pj gSa] rks O;atd dk ifj.kke D;k gksxk \
,e%,u tc ,e¾ 5 vkSj ,u¾ 2 \
If m and n are int type variables, what wil be the result of the
expression m%n when m=5 and n=2 ?
A. 0 B. 1
C. 2 D. None of the above
52. ----------------- MsVk vkSj mlds lacaf/kr dk;ksZa dks ,d lkFk ck¡/kus dk ,d rjhdk
gS tks MsVk vkSj dk;ksaZ dk fNikus dh vuqefr nsrk gS A
16
…………. is a way to bind the data and its associated functions
together which allows the data and functions to be hidden.
A. Structure B. Class
C.Enum D. Both A and B
53. vkWijsVjksa tSls ------------- dks vksojyksM ugha fd;k tk ldrk A
Operators such as …….. cannot be overloaded.
A. + B. ++
C. :: D. ==
54. dkSu lk QaD’ku ckbÍl esa iksbaVj izkIr djus ;k Mkyus dh oŸkZeku fLFkfr
ykSVkrk gS A
Which function return the current position of the get or put
pointer in bytes.
A.tellg ( ) B. tellp ( )
C. tell ( ) D. Both A and B
55. lanHkZ lwpd ds leku D;ksa ugha gS \
Why reference is not same as a pointer
A. A reference can never be null.
17
B. A reference once established cannot be changed
C. Reference doesn’t need an explicit dereferencing mechanism
D. All of the above.
56. C++ fdrus izdkj ds cgq:irkvksa dk leFkZu djrk gS \
How many types of polymorphism are supported by C++.
A.1 B. 2
C.3 D. 4
57. fuEufyf[kr esa ls fdl vo/kkj.kk dk vFkZ izksxzke ds pyus ds nkSjku mles
au, ?kVd tksM+uk gS \
Which of the following concepts means adding new components
to a program as it runs?
A.Data hiding B. Dynamic typing
C.Dynamic binding D. Dynamic loading
58. fuEufyf[kr esa ls dkSu lk n`f"Vdks.k C++ }kjk vuqdwfyr gS \
Which of the following approach is adapted by C++.
A. Top - down B. Bottom- up
C. Right - left D. Left - right
18
59. cwfy;u O;atd LM+M (NO+ PQ) dks SOP :i esa cnyus ij gesa -------
----- izkIr gksrk gS A
Converting the Boolean expression LM+M (NO+PQ) to SOP
form, we get
A.LM+MNOPQ B. L+MNO+MPQF
C.LM+M+NO+MPQ D. LM+MNO+MPQ
60. O;atd A(B+𝐶̅ +D) esa forj.k fu;e ykxw djus ij] gesa ------------izkIr gksrk gSA
Applying the distributive law to the expression A(B+𝐶̅ +D), we
get…………..
A.AB+AC+AD B. ABD
C.A+B+C+D D. AB+A𝐶̅ +AD
61. fuEufyf[kr esa ls dkSu lk mnkgj.k cwfy;u chtxf.kr ds forj.k fu;e dks
O;Dr djrk gS \
Which of the examples below expresses the distributive law of
Boolean algebra ?
A. (A+B)+C=A+(B+C) B. A(B+C)=AB+AC
C.A+(B+C) = AB+AC D. A(BC) = (AB)+C
62. fuEufyf[kr esa ls dkSu lk mnkgj.k xq.ku ds Øe fofues; fu;e dks O;Dr
djrk gS A
19
Which of the examples below expresses the commutative law of
multiplication.
A. A+B=B+A B. AB=B+A
C. AB=BA D. AB=A*B
63. A……… dk mi;ksx MsVkcsl ds le; fMtkbu dks ifjHkkf"kr djus ds fy,
fd;k tkrk gS A
A ……… is used to define overall design of the database.
A. Schema B. Application progress
C. Data definition language D. Code
64. vuqnku vkSj fujLr gSa ---------- c;ku A
Grant and revoke are …….. statements.
A.DDL B. TCL
C. DCL D. DML
65. rkfydk esa dkWye dks la’kksf/kr djus ds fy, ------------- dekaM dk mi;ksx fd;k
tk ldrk gS A
………. command can be used to modify a column in a table.
A. Alter B. Update
C. Set D. Create
20
66. dkSu lk lkekU; :i 3NF ds leku gS \
Which normal form is similar with 3NF.
A. 1NF B. 2NF
C. BCNF D. 4NF
67. fuEufyf[kr esa ls dkSu ckgjh lqj{kk ds fy, [krjk ugha gS\
Which of the following is not the External security threats.
A. Front-door threats
B. Back-door threats
C. Underground threats
D. Denial of service (DOS)
68. fuEufyf[kr esa ls dkSu lk MsVk fofue; dk laHkkfor rjhdk ugha gS \
Which of the following is not the possible ways of data
exchange?
A. Simplex
B. Multiplex
C. Half- duplex
D. Full duplex
21
69. Vhlhih dusD’ku esa iksVZ uacj D;k fufnZ"V djrk gS \
What does the port number in a TCP connection specify ?
A.It specifies the communication process on the two end
system.
B. It specifies the quality of the data & connection.
C. It specifies the size of data
D. All of the above.
70. fuEufyf[kr esa ls dkSu lk izksVksdkWy VªkaliksVZ ys;j esa ifjHkkf"kr gS@gSa \
Which of the following protocol is/are defined in Transport layer?
A. FTP. B. TCP
C. UDP D. B & C both
Section-B
Short Answer Type Questions
iz’u la[;k 1 ls 20 rd y?kq mÙkjh; gSaA fdUgha 10 iz’uksa ds mÙkj nsaA izR;sd ds fy, 2
vad fu/kkZfjr gSaA
Question no. 1 to 20 are Short Answer Type. Answer any 10 questions.
Each question carries 2 marks.
1. ,udSIlqys’ku vkSj ,ClVªSD’ku dks ifjHkkf"kr djsaA
Define ENCAPSULATION & ABSTRACTION.
22
2. C++ esa ykWftdy vkWijsVjksa dh lwph cuk,¡ vkSj muds dk;ksZsa dh O;k[;k djsaA
List logical operators in C++ and explain their functions.
3. flaVSDl ds lkFk clrscr ( ) & for ( ) ds QaD’ku fyf[k, A
Write the functions of clrscr ( ) & for ( ) with syntax.
4. LVSd vkSj drkj dh O;k[;k djsaA
Explain stack & queue.
5. fdlh ,d [kkst rduhd dks le>kb,A
Explain any one searching technique.
6. mEehnokj dqath vkSj xSj&daqth fo’ks"krkvksa dh O;k[;k djsaA
Explain candidate key and non-key attributes.
7. DML dks ifjHkkf"kr djsa vkSj lHkh DML dekaM dks lwphc) djsaA
Define DML and list all DML commands.
8. esVªksikWfyVu ,fj;k usVodZ ¼ MAN) dks ifjHkkf"kr djsaA
Define Metro Politian Area Network (MAN).
9. izksVksdkWy D;k gS\ usVodZ izksVksdkWy ds izdkjksa dh O;k[;k djsaA
What is protocol ? Explain types of network protocols.
10. vfHkO;fDr ds lkFk ÞvkSjß ykWftd xsV Mªk djsaA
Draw “AND” logic gate with expression.
11. MsVk vfrjsd (redundancy) dh O;k[;k djsaA
23
Explain data redundancy.
12. MsVkcsl lkekU;hdj.k dh O;k[;k djsaA
Explain database normalization.
13. cwfy;u variable dks le>kb,A
Explain Boolean variable.
14. fdlh rkfydk dh dkfMZuSfyVh dks le>kb,A
Explain cardinality of a table.
15. fyaDM fyLV ds mi;ksx dk o.kZu djsaA
Describe use of linked list.
16. izh izkslslj funssZ’k D;k gS \
What is preprocessor directive ?
17. âkby ywi vkSj Mw Ogkby ywi esa D;k varj gS \
What is the difference between while ( ) and Do while ( )
Loop?
18. izksxzke MsoyesaV esa Editor dk D;k ;ksxnku gS \
What is the role of Editor in program development.
19. oa'kkuqØe dks ifjHkkf"kr dhft, A
Define Inheritance.
20. ifCyd baVjQsl D;k gS \
What is public interface ?
24
Long Answer Type Questions
iz’u la[;k 21 ls 26 rd nh?kZ mÙkjh; gSaA fdUgha 3 iz’uksa ds mÙkj nsaA izR;sd ds fy, 5
vad fu/kkZfjr gSaA
Question nos. 21 to 26 are Long Answer Type. Answer any 3 questions.
Each question carries 5 marks.
21. nks vk;keh lj.kh dks ifjHkkf"kr djsa vkSj C++ izksxzke dk mi;ksx djds
blds dk;kZUou dks fn[kk,¡A
Define two dimensional array and show its implementation using
a C++ program.
22. fnu dh la[;k Lohdkj djus ds fy, C++ izksxzke fy[ksa vkSj fQj fnu dk
uke iznf’kZr djsaA
Write a C++ program to accept number of the day then display
name of the day. (e.g. 1- Sun 2- Mon etc.)
23. f=Hkqt ds nks dks.kksa dks ntZ djus vkSj rhljk dks.k [kkstus ds fy, C++ esa
,d izksxzke fy[ksaA
write a program in C++ to enter two angles of a trangle
and find the third angle.
24. ,d oxZ ds {ks=Qy vkSj ifjf/k dh x.kuk vkSj iznf’kZr djus ds fy, C++ esa
,d vkWCtsDV vksfj,aVsM izksxzke fy[ksaA
Write an object oriented program in C++ to calculate
and display the area & perimeter of an square.
25. Dykl bugsfjVsal dks iznf’kZr djus ds fy, C++ esa vkWCtsDV vksfj,aVsM
izksxzke fy[ksaA
25
Write an object oriented program in C++ to demonstrate class
inheritance.
26. KM dks cm vkSj mm esa cnyus vkSj iznf’kZr djus ds fy, C++ esa ,d
izksxzke fy[ksaA
Write a program in C++ to convert & display KM into cm
& mm.
26