Sie sind auf Seite 1von 2

ASC Independent PU College

II PUC Science -Computer Science – Model Paper 3


Time: 3 Hrs. 15 Mins. Max. Marks: 70

I Answer ALL of the following. Each question carries ONE mark. 10 x 1 = 10

1. Where is LI cache located?


2. What is the output of 2 input NAND gate for the inputs A  0, B  1.

3. Name the data structures which is called LIFO list.


4. What are data members of a class?
5. What is address operator?
6. What is Data warehouse?
7. What is network protocol?
8. Mention any one communication mode.
9. What is freeware?
10. Which Tag is used for image handling?

II Answer any FIVE of the following. Each question carries TWO marks
5 x 2 = 10

11. State and prove Distributive law.


12. Using Basic gates construct a logic circuit for the Boolean expression
 
X  Y   X  Z   Y  Z  .

13. Differentiate between Procedural Oriented Programming & Object Oriented Programming.
14. Write an example to show the use of parameterized constructor through implicit call.
15. What is the function of seekp()?
16. Write any two disadvantages of Network Model.
17. How do you modify column name & width for an existing table in SQL?
18. What is simcard?

Prepared by SNA Page 1


III Answer any FIVE of the following. Each question carries THREE marks
5 x 3 = 15
19. Write a note on SMPS.
20. Simplify the following logical expression using De Morgan’s theorems.
(a)  A  B   C (b)  A  BC    D  EF 

21. Give the memory representation of a queue using linked list.


22. What arithmetic operations can be performed on pointers. Explain with an example.
23. Explain the following file opening modes
(a) ios :: ate (b) ios :: in (c) ios :: out
24. Explain the components of data warehouse.
25. Write a note on IPR.
26. Explain Web Hosting.
IV Answer any SEVEN of the following. Each question carries FIVE marks
5 x 7 = 35
27. Draw a logical circuit diagram for the following expressions:-
(a) ABC  ABC  ABC  ABC
  
(b)  X  Y  Z X  Y  Z X  Y  Z X  Y  Z 
28. Write a C++ program to find the location of an element using Binary search.
29. Convert the following infix expressions to post fix:
(a)  A  B   C
(b)  A   B  C   D  E  F 
30. Explain inheritance in detail.
31. Explain how objects are passed as function arguments with an example program.
32. What is meant by function overloading. Explain with an example.
33. What are the rules for writing a constructor function?
34. Explain visibility modes.
35. Explain three tier architecture.
36. Explain DDL commands used in SQL.
37. What is a firewall? Explain firewall techniques in detail.



Prepared by SNA Page 2

Das könnte Ihnen auch gefallen