SECOND PUC SUPLIMENTARY EXAMINATION JUNE-2016
Subject: Computer Science (41)
Time: 3 hrs. 15 min Max. Marks: 70
Part-A
I Answer all Questions. Each question carries one mark. 10 x 1 = 10
1. What is Cache memory?
2. Write the standard symbol for OR gate.
3. What is Queue?
4. What is an object?
5. Define Pointer.
6. What is database?
7. Define Networking.
8. Give an example for full duplex communication mode.
9. What is telnet?
10. Expand XML.
Part-B
II Answer any five questions. 5x2=10
Each question carries two marks
11. Prove algebraically that ( X+Y) ( X+Y̅) = X.
12. State and prove commutative law using truth table.
13. What is the use of scope resolution operator? Give the symbol.
14. Write any two rules for create constructors.
15. Mention ant two member functions belonging to ifstream class.
16. Define primary and secondary keys.
17. Mention the logical operators used in SQL.
18. Write the difference between LAN and WAN.
Part-C
III Answer any five questions. 5×3=15
Each question carries three marks
19. Explain three types of mother-board.
20. Write the truth table and standard symbol for XOR gate.
21. Write an algorithm for traversal in a linear array.
22. What are the advantages of pointers?
23. Mention the types of data file. Explain.
24. Define hierarchical model. Clive one advantage and disadvantage.
25. Define the term: 1) Web page 2) Web browser 3) www
26. Briefly explain any three HTML tags.
Part – D
IV Answer any five questions. 7×5=35
Each question carries three marks
27. Reduce F(A,B,C,D) = ∑ (1,5,9,10,11,12,13,14) using K-map.
28. What is Linear-data structure? Explain the operations performed on linear data structure.
29. Write an algorithm to search an element in an array using linear search method.
30. Mention the advantages of OOP.
31. Explain member function inside the class definition with syntax and example.
32. What are the advantages and disadvantages of inline functions.
33. Explain default constructor with syntax and example.
34. Mention the advantages of inheritance.
35. Explain any five applications of database.
36. Expand SQL. Give the syntax and example for INSERT and DELETE command in SQL.
37. What is Network Security? Mention and explain protection methods.
Comments
Post a Comment