01.
TYPICAL CONFIGURTATION OF COMPUTER SYSTEM (1 MARK & 2 MARKS)
Explain the characteristics of motherboard.
Form factor: It refers to the motherboard is Processor socket: It is a rectangular connector into
geometry, dimensions, arrangement and electrical which the processor is mounted vertically or a
requirements. square shaped connector with many small
Chipset: Chipset controls the majority of connectors into which the processor is directly
resources of the computer. The function of chipset inserted.
is to coordinate data transfer between the various
components of the computer.
Explain the three types of motherboard.
XT Motherboard: Stands for eXtended Baby AT Motherboard: Combination of XT and AT
Technology which is Oldest model motherboard having Slot type and PGA processor sockets, SDRAM
having slot type processor socket with LIF (Low and DDRRAM slots, PCI and ISA slots, 12 pin and 20
Insertion Force) processor socket. DIMM(Dual pin power connector. Ex: Pentium-III & Pentium -IV
Inline Memory Module) RAM slot, ISA( Industry Processors.
standard Architecture) slot for add-on cards. 12 ATX Motherboard: Stands for Advanced
pin power connector with No ports present Ex: Technology eXtended having MPGA (Micro Pin Grid
Pentium-I, Pentium-MMX, Pentium -II Processors. Array) processor sockets, DDRRAM slots, PCI and
AT Motherboard: Stands for Advanced AGP slots, Primary and secondary IDE interfaces.
Technology having PGA (Pin Grid Array) Socket, SATA (Serial Advanced Technology Attachment)
SDRAM slots, PCI slots and ISA slots. & 20 pin connectors, 20 pin and 24 pin ATX power connector.
power connector. Ex: Pentium-III Processors. Ex: Pentium-IV, Dual Core, Core 2 Duo, Quad Core, i3,
i5 and i7 processors etc.
What is UPS? Explain types of UPS.
It is an Uninterrupted Power Supply that includes a Online ups: It supplies power from its own inverter
battery to maintain power in the event of power even when the power line is functioning properly.
failure. It keeps a computer running for several Offline or standby UPS: It monitors the power line
minutes to few hours after a power failure. and switches to battery power as soon as it detects
a problem
What is cache memory? Explain their types.
A cache memory is a high speed memory placed L2 (Level 2): It is situated in the mother board
between RAM and CPU to speed up the processing. having 6 MB.
L1 (Level 1): It is situated in processor having 256 L3 (Level 3): It is separate chip on the mother board
KB having 12 MB.
Write the functions of data bus, address bus and control bus.
Data bus: It provides a path to transfer data Control bus: It is used to control the access and the
between CPU and memory use of the data and address lines
Address bus: It connects CPU and RAM, which
carries address to store and retrieve the data
Explain USB.
Universal Serial Bus gives a single, standardized, USB supports a data speed of 12 megabits per
easy-to-use way to connect a variety of newer second, and support up to 127 devices.
peripherals to a computer. USB is a plug- and-play interface between a
computer and add-on devices.
Explain different components of motherboard.
Processor [CPU]: It is the main component on the Power On Self-Test (POST). It invokes the bootstrap
motherboard which is fabricated as single loader to load the operating system into memory.
integrated circuit (IC) chip and is called the brain of CMOS [ Complementary Metal Oxide
the computer. Semiconductor]: CMOS is a type of memory chip
BIOS [ Basic Input Output System]: It is a small that is powered by small lithium ion battery to store
chip on the motherboard that holds a set of date, time and system setup parameters.
instructions to load the hardware settings required Slots: It is an opening space located on the
to activate various devices of computer. It runs motherboard where we can insert a printed circuit
when the computer is switched ON that performs board.
ISA (Industry Standard Architecture) slot: It is Serial port: It is also known as communication
used to connect modem and input devices. (COM) ports used for connecting
PCI (Peripheral Component Interconnect) slot: communication devices like mouse and
It is used to connect graphics accelerator modem. This port transfers data serially one bit
cards, sound cards, internal modems etc. at a time.
AGP (Accelerated Graphic Port) slot: It is used Parallel port: Parallel ports are used to
to provide faster access to a graphics accelerator connect external input/output devices like
card, printers or scanners. This port facilitates the
RAM slot: It is used to install memory. parallel transfer of data, usually one byte (8-
Processor slot: It is used to insert the processor bits) at a time.
chip PS-2 port (Personal System-2 port): It was
Disk Controller: Disk controller is the circuit that developed by IBM to interface keyboards and
enables the CPU to communicate with a hard disk, pointing devices like mouse, trackballs and
floppy disk or other kind of disk drive. touch pads.
I/O Ports and interfaces: The ports and interfaces BUS: It is a collection of parallel wires that form a
are used to connect external devices like printers, pathway to carry address, data and control signals
keyboards or scanners to the computer, which are
found on the rear side of a computer.
02. BOOLEAN ALGEBRA (1 MARK, 2 MARKS - 2, 5 MARKS-HOTS)
State the principal of duality
It states that Changing each AND sign (⋅) to an OR sign (+)
Changing each OR sign (+) to an AND sign (⋅) Changing each 0 by 1 and each 1 by 0.
Define Minterm and Maxterm.
Minterm is a product of all the literals with or Maxterm is a sum of all the literals with or without
without the bar within the logic system. the bar within the logic system.
Define Tautology and Fallacy.
The result of any compound logical statements or The result of any compound logical statements or
expression is always TRUE (1) for all input expression is always FALSE (0) for all input
combination is called Tautology. combination is called Fallacy.
State and prove Involution Law
It states that “the complement of a variable is
completed again; we get the same variable.” State and prove Complementarity law.
̿=X
𝐗 This law states that
X 𝐗̅ ̿
𝐗 X+ X ̅=1
X⋅X=0̅
0 1 0
1 0 1
Prove algebraically that X + (X ⋅ Y) = X Prove algebraically that X ⋅ X + Y = X
LHS = X + (X ⋅ Y) LHS = X ⋅ X + Y
= X ⋅ (1 + Y) = (X ⋅ X) + (X ⋅ Y)
=X⋅1 {by Properties of 1} = X + X ⋅ Y {by INDEMPOTENCE Law}
=X {by Properties of 1} = X ⋅ (1 + Y)
= RHS = X⋅1 {by Properties of 1}
= X {by Properties of 1}
= RHS
Prove algebraically that X +( 𝐗 ̅⋅Y)=X+Y ̅ + Y )= X ⋅ Y
Prove algebraically that X ⋅ ( 𝐗
LHS = X +( X̅⋅Y) LHS = X ⋅ ( X̅+Y)
= (X + ̅
X) ⋅ (X + Y) = (X ⋅ ̅
X) + (X ⋅ Y)
= 1⋅(X+Y) {by COMPLEMENTARY Law} = 0+(X⋅Y) {by COMPLEMENTARY Law}
= X+Y {by Properties of 1} = X⋅Y {by Properties of 0}
= RHS = RHS
̅) = X
Prove algebraically that (X + Y) ⋅ (X + 𝐘 ̅) = X
Prove algebraically that (X ⋅ Y) + (X ⋅ 𝐘
̅
LHS = (X ⋅ Y) + ( X ⋅ Y ) ̅)
LHS = (X + Y) ⋅ ( X + Y
= X ⋅ ( Y + Y̅ ) {by DISTRIBUTIVE Law} =X+(Y⋅Y) ̅ {by DISTRIBUTIVE Law}
= X⋅1 {by COMPLEMENTARITY Law} = X + 0 {by COMPLEMENTARITY Law}
= X = X
= RHS = RHS
03. LOGIC GATES (1 MARK & 2 MARKS)
Write truth table and logic symbol for AND gate. Write truth table and logic symbol for NAND gate.
Write truth table and logic symbol for NOT gate.
Write truth table and logic symbol for OR gate. Write truth table and logic symbol for NOR gate.
Write truth table and logic symbol for XOR gate. Write truth table and logic symbol for XNOR gate.
Realize basic gates using NAND gate only. Realize basic gates using NOR gate only.
04. DATA STRUCTURE (1 MARK ,3 MARKS, 5 MARKS - 2)
What is primitive data structure? Explain different operations performed on primitive data structures.
Data structures that are directly operated upon by machine-level instructions is known as primitive data
structures. Operations performed on primitive data structure are.
Create: Select:
Create operation is used to create a new data Select operation is used by programmers to
structure. access the data within data structure.
This operation reserves memory space for This operation updates or alters data.
the program elements. Example: int x; Example: cout<<a;
Destroy: Update:
Destroy operation is used to destroy or Update operation is used to change data of
remove the data structures from the data structures.
memory space. Example: sum = a+b; Here, a+b is assigned to
Example: destructor member function in sum.
C++.
What is linear data structure? Explain the operations performed on linear data structure.
Linear data structures are a kind of data structure that has homogenous elements.
Operations Performed on Linear Data Structure. Searching: The process of finding the
Traversal: The process of accessing each location of a data item in the given collection
data item exactly once to perform some of data items is called searching.
operations is called traversing. Sorting: The process of arrangement of data
Insertion: The process of adding a new data items in ascending or descending order is
item into the given collection of data items is called sorting.
called insertion. Merging: The process of combining the data
Deletion: The process of removing an items of two structures to form a single
existing data item from the given collection of structure is called merging.
data items is called deletion.
Explain basic operations performed on arrays / One-Dimensional array.
Traversal: Accessing each element of the array Searching: Finding the location of an element in
exactly once to perform some operation. the array.
Insertion: Inserting new element into the array. Sorting: Arranging element of an array in some
Deletion: Removing an existing element from the order.
array. Merging: Combining two or more arrays to form a
single array.
Explain memory representation of One-Dimensional array.
Contiguous memory locations are allocated to the elements of array.
The array elements are stored in sequence one after the other.
The formula to calculate address of an element of an array is:
LOC ( A[P] ) = Base(A) + W(P – LB)
Write an algorithm to traverse a linear array.
Let A be a linear array with LB and UB as lower bound and upper bound of array A.
STEP 1 :for LOC = LB to UB
STEP 2 :Process A[LOC]
End of for
STEP 3 :Exit
Write an algorithm to insert an element in an Write an algorithm to delete an element from an
array. array.
STEP 1 : for I = N-1 down to P STEP 1 : Item = A[P]
A[I+1] = A[I] STEP 2 : for I = P to N-1
End of for A[I] = A[I+1]
STEP 2 : A[P] = ITEM End of for
STEP 3 : N = N+1 STEP 3 : N = N-1
STEP 4 : Exit STEP 4 : Exit
Write an algorithm to search an element in an Write an algorithm to sort elements in an array
array using Linear Search Method. using Insertion Sort.
STEP 1 : LOC = -1 STEP 1 : for I = 1 to N-1
STEP 2 : for P = 0 to N-1 STEP 2 : J = I
if( A[P] = ELE) while ( J >= 1 )
LOC = P if( A[J] < A[J-1])
GOTO 3 TEMP = A[J]
End of if A[J] = A[J-1]
End of for A[J-1] = TEMP
STEP 3 : if(LOC >= 0) if end
PRINT LOC J = J-1
else End of while
PRINT “Search is unsuccessful” End of for
STEP 4 : Exit STEP 3 : Exit
Write an algorithm to search an element in an array using Binary Search Method.
STEP 1 : set B = LB, E = UB , LOC=-1 else
STEP 2 : while (B <= E) B = M+1
M= int(B+E)/2 End of while
if(ELE = A[M] STEP 3 : if(LOC >= 0)
LOC = M PRINT LOC
GOTO 3 else
else PRINT “Search is unsuccessful”
if(ELE <A[M]) STEP 4 : Exit
E = M-1
Explain memory representation of Two- Explain memory representation of Two-
Dimensional array using Row Major Ordering. Dimensional array using Column Major Ordering.
In this method, elements of the first row are stored In this method, elements of the first column are
first, then the elements of second row and so on. stored first, then the elements of second column and
In an array A Having M number of rows and N so on.
number of columns, the address of any A[I][J] In an array A Having M number of rows and N
element in row major order is calculated as, number of columns, the address of any A[I][J]
LOC (A [ I] [ J]) = Base (A) + W [ N (I - LB) + (J – LB)] element in column major order is calculated as,
LOC (A [ I] [ J]) = Base (A) + W [ M (I - LB) + (J – LB)]
What are the Applications of array?
Arrays are used to implement other data structures Arrays are used to implement mathematical vectors
such as heaps, hash tables, queues, stacks and and matrices.
strings etc. Many databases include one-dimensional arrays
whose elements are records.
What are the Advantages of array? What are the Disadvantages of array?
Used to represent multiple data items of same type We must know in advance that how many
by using only single name. elements are to be stored in array.
Used to implement other data structures like linked Array is of fixed size. The memory which is
lists, stacks, queues, trees, graphs etc. allocated to array cannot be increased or reduced.
Two-dimensional arrays are used to represent The elements of array are stored in consecutive
matrices. memory locations. So insertions and deletions are
very difficult and time consuming.
What is Stack? Explain memory representation of stack using One-Dimensional Array.
The stack is an ordered collection of items in which In case the condition TOP = MAXSTK is called
new items are added, or existing items are removed stack full condition or overflow.
from the same end, commonly referred to as the Top The condition TOP = NULL is called underflow
of the stack. condition.
The items into the stack are stored in a sequential
order from the first location of the memory block.
A pointer TOP contains the location of the top
element of the stack.
A variable MAXSTK contains the maximum
number of elements that can be stored in the
stack.
Explain different operations performed on Stack.
stack(): peek():
It creates a new stack that is empty. It returns the top item from the stack but does
It needs no parameters and returns an empty not remove it.
stack. It needs no parameters. The stack is not
push(item): modified.
It adds a new item to the top of the stack. isEmpty():
It needs the item and returns nothing. It tests whether the stack is empty.
pop(): It needs no parameters and returns a Boolean
It removes the top item from the stack. value.
It needs no parameters and returns the item. size():
The stack is modified. It returns the number of items on the stack.
It needs no parameters and returns an integer.
Write an algorithm to perform PUSH and POP operation in stack.
PUSH POP
STEP 1 : If TOP = N -1, then STEP 1 : If TOP = NULL, then
PRINT “Stack is full” PRINT “Stack is empty”
Exit Exit
End of If End of If
STEP 2 : TOP = TOP + 1 STEP 2 : ITEM = STACK[TOP]
STEP 3 : STACK[TOP] = ITEM STEP 3 : TOP = TOP – 1
STEP 4 : Return STEP 4 : Return
What are the different applications of Stack?
To reverse a word. Conversion of infix expression into prefix and
“undo” mechanism in text editors. postfix.
Backtracking To solve tower of Hanoi.
Conversion of decimal number into binary Runtime memory management
Expression evaluation and syntax parsing
What is Queue? Explain different types of Queue.
A queue is an ordered collection of items where an follows the first node.
item is inserted at one end called the “rear” and an Priority Queue: A priority queue is a queue that
existing item is removed at the other end, called the contains items that
“front”. have some pre-set
Simple Queue: In Simple queue insertion occurs priority. An element
at the rear end of the can be inserted or
list, and deletion occurs removed from any
at the front end of the position depending on some priority.
list. Dequeue (Double Ended Queue): It is a queue in
Circular Queue: A circular queue is a queue in which insertion and deletion takes place at both
which all nodes are treated as circular such that the ends.
the last node
Explain different operations performed on Queue.
queue(): It needs no parameters and returns the
It creates a new queue that is empty. item. The queue is modified.
It needs no parameters and returns an isEmpty():
empty queue. It tests whether the queue is empty.
enqueue(item): It needs no parameters and returns a
It adds a new item to the rear end of the Boolean value.
queue. size():
It needs the item and returns nothing. It returns the number of items in the queue.
dequeue(): It needs no parameters and returns an integer.
It removes the front item from the queue.
Write an algorithm to Insert an element into Rear Write an algorithm to Delete an element from
end of Queue. Front end of Queue.
STEP 1 : if REAR = N-1 Then STEP 1 : if FRONT = NULL Then
PRINT “Overflow” PRINT “Underflow”
Exit Exit
STEP 2 : if FRONT = NULL Then STEP 2 : ITEM = QUEUE[FRONT]
FRONT = 0 STEP 3 : if FRONT = REAR Then
REAR = 0 FRONT = NULL
else REAR = NULL
REAR = REAR + 1 else
STEP 3 : QUEUE[REAR] = ITEM FRONT = FRONT + 1
STEP 4 : Return STEP 4 : Return
What are the different applications of Queue? What is Linked list? What are the different
Simulation operation performed on linked list.
Various features of operating system. A linked list is a linear collection of data elements/
Multi-programming platform systems objects called nodes, in which each nodes contains
data and at least one reference or link to another
Different type of scheduling algorithm
node. Different operations performed on Linked
Round robin technique or Algorithm List are.
Printer server routines Creating a linked list
Traversing a linked list
Inserting an item into a linked list
Deleting an item from the linked list
Searching an item in the linked list
Merging two or more linked lists
06. BASIC CONCEPTS OF OOP (5 MARKS)
Define object oriented programming. Explain the characteristics of OOPs.
Object oriented programming is a programming paradigm that uses “objects” to design applications and computer
programs.
Class: A class is a way of grouping objects having Polymorphism: The ability of using function or data
similar characteristics. to have more than one form in a program.
Object: Object represents data and associated Message passing: The processing sending messages
functions as a single unit. to objects in object oriented programming.
Data encapsulation: Wrapping of data and Data abstraction: The representation of essential
functions into a single unit called class is called features without including the background details.
encapsulation Overloading: Allows the objects to have different
Inheritance: It is the capability of a class to inherit meaning depending upon context.
the properties of another class. There are 2 types of overloading namely
The class that inherits the properties from Operator overloading
another class is known as derived or subclass. Function overloading
The class that provides its properties to Dynamic binding: Binding is the process of
subclass is known as base class. connecting one program to another.
Explain the advantages of object oriented programming.
The programs are modularized based on the allows code reusability by linking code and object.
principle of classes and objects. Data abstraction separates object specification and
OOPS reduces code duplication. object implementation.
Providing data security with data encapsulation. Reduces software development time.
Easier to develop complex software with communication with outside system is very simple
inheritance. with message passing
Write the limitations of object oriented programming.
OOP software is not having set standards. Includes more lines of codes.
To convert real life problem into OOP is difficult. Classes are overly generalized.
Difficult to adopt flow diagrams.
Write the real time applications of OOP.
Computer graphic applications Real-time systems
CAD/ CAM Software Simulation and Modelling
Object -Oriented Database Artificial intelligence and expert systems
User Interface design such as Windows
Give the difference between procedural oriented programming and object oriented programming.
Procedural Oriented programming Object Oriented Programming
Large programs are divided into smaller programs Programs are divided into objects and methods
known as functions Data is hidden and cannot be accessed by external
Data is not hidden and can be accessed by external functions
functions Object may communicate with each other through
Data may communicate with each other through functions
functions It follows bottom-up approach in the program
It follows top-down approach in the program design design
It emphasizes on procedure rather than data It emphasizes on data rather than procedure
Executed through function call Executed through message passing
Examples: C, Fortran, pascal etc Examples: C++, Java, C# etc
08. FUNCTION OVERLOADING (1 MARK & 5 MARKS)
What is function overloading? explain with example.
Function overloading means two or more functions {
have same name, but differ in the number of arguments return(a + b + c);
or data type of arguments. }
Example: };
class sumcalc void main( )
{ {
public: sumcalc S;
int sum(int a, int b) cout<<"Sum of two numbers = "<<S.sum(10,
{ 20)<<endl;
return(a + b); cout<<"Sum of three numbers = "<<S.sum(2.1, 3.1,
} 4.1)<<endl;
float sum(float a, float b, float c) }
What are the advantages and disadvantages of function overloading?
Advantages / Needs: Easy interface between programs and real world
The code execution is faster objects.
Eliminating the use of different function names for Disadvantages / Restrictions:
the same operation. Each function in a set of overloaded functions
It is easier to understand the flow of information must have different argument list.
and debug. If typedef is used for naming functions, then the
Code maintenance is easy function is not considered as different type.
What is inline function? Write a simple program for it.
Inline function is a short function whose body is Example:
inserted at the place of its call. #include<iostream.h>
Inline functions definition starts with keyword #include<conio.h>
inline. inline int cube(int a)
Syntax: {
inline return-type functionName (arguments) return (a*a*a);
{ }
body of inline function; void main()
} {
cout<<"cube of 5 ="<< cube(5);
getch();
}
What are the advantages and disadvantages of inline function?
Advantages: Very efficient code can be generated.
The inline member functions are compact function The readability of the program increases.
calls. Disadvantages:
The size of the object code is considerably reduced. The size of the executable file increases.
The speed of execution of a program increases. More memory is needed.
What is a friend function? Write the characteristics of a friend function.
Friend function is a non-member function that can access the private and protected data members of a class.
Characteristics:
A friend function has full rights to access the private It can be placed anywhere in the class declaration.
and protected members of the class. Scope resolution operator (: :) is not needed while
The function is declared with keyword friend. defining a friend function.
they are normal external functions that are given It cannot access the member variables directly and
special access privileges has to use an object_name.member_name.
It can be called like any normal function without
using any object.
Explain friend function with syntax and example
Syntax: float square (base ob)
class class-name {
{ return (ob.num*ob.num);
public : }
friend void function (void); void main()
}; {
Example: base b;
#include<iostream.h> b.getdata(8);
#include<conio.h> cout<<"Square ="<<square(b);
class base getch();
{ }
int num;
public:
void getdata (int x)
{
num=x;
}
friend float square (base ob);
};
09. CONSTRUCTOR & DESTRUCTOR (1 MARK, 2 MARKS & 5 MARKS)
What is a constructor? Give the rules for writing a constructor function.
A constructor is a special member function that is used in classes to initialize the objects of a class automatically.
Rules:
A constructor always has name that is same as the class name of which they are the members.
They do not have return types, not even void
The constructor should be declared in the public section.
The constructor is invoked automatically when the objects are created.
Not possible to refer to constructor addresses.
The constructor makes “implicit calls” to the operator new and delete when memory allocation is required.
Constructor can have default arguments.
Explain default constructor.
A constructor which does not accept any arguments is {
called as default constructor or zero argument x=10;
constructor. }
Features: void display()
All the objects of a class are initialized to same set of {
values by the default constructor cout<<"X = "<<x;
For every object created, default constructor is }
automatically called. };
Syntax: void main()
classname::classname() {
{ demo d;
body of constructor d.display();
} }
Example: Disadvantages:
class demo When many objects of the same class are created, all
{ objects are initialized to same set of values by
int x; default constructor
public: It is not possible to initialize different objects with
demo() different initial values using default constructor.
Explain parameterized constructor.
A constructor that takes one or more arguments is int x;
called parameterized constructor. public:
Features: demo(int a)
The parameterized constructors can be overloaded. {
For an object created with one argument, x=a;
}
constructor with only one argument is invoked and
executed.
void display()
The parameterized constructor can have default
{
arguments and default values.
cout<<"\n X = "<<x;
The constructors can be invoked through the following
}
methods: };
Explicit call void main()
Implicit call {
Initialization at declaration with = operator clrscr();
Syntax: demo d1(10);//Implicit call
classname::classname(arg1,arg2, .................... ) demo d2=demo(20);//Explicit call
{ demo d3=30;//Assignment operator
body of constructor d1.display();
} d2.display();
Example: d3.display();
class demo }
{
Explain Copy constructor.
It is a special type of constructor which is used to copy the values of one object into another object of the same
class.
Situation copy constructor is used:
To initialize an object with the values of already existing objects.
When objects must be returned as function values
To state objects as by value parameters of a function.
Features:
Copy constructor is not invoked explicitly.
Copy constructor is invoked automatically when a new object is created and equated to an already existing
object in the declaration statement itself.
Copy constructor is invoked when an object returns a value.
Syntax: void display()
classname::classname(classname&obj) {
{ cout<<"\n X = "<<x; }
body of constructor };
} void main()
Example: {
class demo demo d1(10);
{ demo d2=d1;
int x; cout<<"\nBefore copy :";
public: d1.display();
demo(int a) cout<<"\nAfter copy :";
{ d2.display();
x=a; }
}
Explain destructor with syntax and example.
Destructor is used to destroy the objects that have been created by a constructor.
Symbol used for destructor is tilde (~).
The destructor name is same as that of class preceded by a tilde (~).
Destructors do not have a return value.
Destructor cannot take arguments
Destructors cannot be overloaded.
The destructor is de-allocate memory that was allocated for the object by the constructor.
Destructor should be declared in public.
Syntax:
class classname
{
public:
classname(); //constructor
~classname(); //destructor
};
Example:
class counter
{
int count;
public:
counter() //constructor
{
count=0;
}
~counter() //destructor
{}
};
10. INHERITANCE (1 MARK & 5 MARKS)
What is inheritance? Mention its advantages.
Inheritance is the capability of one class to inherit the properties from another class.
Advantages: Easy to maintain
Reusing existing code Easy to extend
Faster development time Memory utilization
Explain different types of inheritance.
Single Inheritance: If a class is derived from a Hierarchical Inheritance: If a number of classes
single base class is called as single inheritance. are derived from a single base class, it is called as
hierarchical inheritance.
Multilevel inheritance: The classes can also be
derived from the classes that are already derived is
called multilevel inheritance.
Hybrid Inheritance: Hybrid inheritance is
combination of hierarchical and multilevel
inheritance.
Multiple Inheritance: If a class is derived from
more than one base class, it is known as multiple
inheritance.
Write a programming example for single level inheritance.
class num void calculate ()
{ {
int a, b, c; s = n1 + n2 + n3;
public: }
void getdata() void display ()
{ {
cout<<“Enter three numbers”; cout<< “Sum of three numbers = “<<s<<;
cin>>a>>b>>c; }
} };
}; void main ()
class sum : public num {
{ sum x;
int s; x.getdata();
public: x.calculate( )
x.display( );
}
11. POINTERS (1 MARK & 3 MARKS)
Define pointer. Give syntax and example for pointer declaration.
A pointer is a variable that holds the location of Example: int *iptr; iptr is pointer variable of int type.
another variable in memory. float *fptr; fptr is pointer variable of float type.
Syntax: data-type *variable_name; char *cptr; cptr is pointer variable of character type.
What are the advantages of pointers?
Efficient programs can be developed. Establishes communication between program and
Memory is utilized properly. data.
Dynamically allocate and de allocates memory. (Any 3 points)
Easy to deal with hardware components.
What are the operations performed on pointers?
Add an integer value to a pointer Subtract one pointers from another (Both point to
Subtract an integer value from a pointer. the same array)
Compare two pointers (both point to the same Increment a pointer variable
array) Decrement a pointer variable.
Assign one pointer to another (both of same type) (Any 3 points)
What are the operations that cannot be performed on pointers?
Addition of two pointers. Multiplication of two pointers.
Subtraction of one pointer from another pointer Division of two pointers.
when they do not point to the same array. (Any 3 points)
What is array of pointers? Give an example
Array of pointer is an array which stores collection int i=10,j=20,k=30;
of addresses. iptr[0]=&i;
Syntax: datatype *arrayname[size]; iptr[1]=&j;
Example: int *iptr[3]; iptr[2]=&k;
What is pointers to object? Give an example
The pointers pointing to objects are referred to as object pointers.
Syntax: class_name *object_pointer;
Example: student s, *sptr;
Write the differences between static and dynamic allocation of memory.
Static memory allocation Dynamic memory allocation
Memory is allocated during compilation time. Memory is allocated during run time.
Amount of memory to be allocated is pre known. Amount of memory allocated is unknown.
Variables remain permanently allocated. Memory is allocated only when program is active.
No memory is allocated and de allocated during Memory allocation and de allocation takes place
execution of the program. during execution of the program.
Implemented using stacks and heaps. Implemented using data segments.
Wastage of memory. Proper memory utilization
Explain the use of new and delete operators in pointers.
new operator allocate memory dynamically from delete operator de-allocated the memory
the memory pool while programming is running. dynamically when the memory is not in use.
Syntax: pointer = new datatype; Syntax: delete pointer;
Example: data=new int; Example: delete data;
Define: a) free store b) orphaned memory c) memory leak
Free Store: A pool of unallocated memory heap program execution, then these memory blocks are
given to a program that is used by the program for called as orphaned memory blocks.
dynamic allocation during execution. Memory Leak: When orphaned memory blocks
Orphaned Memory: When dynamically allocated increase in number, they bring adverse effect on
memory blocks are not deleted even after the the system this situation is called as memory leak.
12. DATA FILE HANDLING (2 MARKS & 3 MARKS)
What is a stream? Explain C++ ifstream & ofstream
A stream is the general name given to a data flow at lowest level. ifstream, ofstrem, fstream are the streams
used in C++
ifstream ofstream
This steam is used to read from files. This steam is used to write on files.
It creates file object for input operation. It creates file object for output operation.
Member functions belongs to ifstream: Member functions belongs to ofstream:
get(), getline(), read(), seekg() and tellg(). put(), write(), seekp() and tellp().
What is file? Explain the types of data file.
A file is collection of data or information that stored under a specific name on a storage device.
Text File Binary File
It stores information in ASCII characters. It is a file that contains information in the same
Each line of text is terminated with a special format as it is held in memory.
character known as EOL (End of line / delimiter No delimiters are used to terminate line of text.
character). No translation takes place.
Internal translation takes place.
Explain file opening methods in C++.
Opening File Using Constructor Opening File Using open()
This method is preferred when a single file is used This method is preferred for managing multiple
with a stream. files with the same stream.
Syntax: Syntax:
Open file for input only: Open file for input only:
ifstream ifstream_object(“file_name”); ifstream_object.open(“file_name”);
Open file for input only. Open file for input only.
ofstream ofstream_object(“file_name”); ofstream_object.open(“file_name”);
Example: Example:
ifstream ifs(“mytext.txt”); //input purpose. ifs.open(“mytext.txt”); //input purpose.
ofstream ofs(“mydata.dat”); //output purpose. ofs.open(“mydata.dat”); //output purpose.
Explain file mode parameters in C++.
ios : : in – Belongs to ifstream and used for reading ios : : binary – Belongs to ifstream and ofstream and
the file contents. used for opening abinary file.
ios : : out – Belongs to ofstream and used for writing ios : : ate – Belongs to ifstream and ofstream and
the file. open file for updation and move file pointer to the
ios : : app – Belongs to ofstream and used for end of file.
append to end of the file. ios : : trunc – Belongs to ofstream and It replaces
the existing content with new content.
Explain get(), getline() and put() function of text file.
get( ) getline( ) put( )
This function belongs to the This function belongs to the This function belongs to the
class ifstream. class ifstream. class ofstream.
It reads a single character from It is used to read a whole line of It writes a single character to
the associated stream. text from the associated stream. the associated stream.
Syntax: Syntax: Syntax:
ifstream_object.get(ch); fin.getline(butter, SIZE); ofstream_object.put(ch);
Example: Example: Example:
char ch=’a’; char book[SIZE]; char ch=’a’;
ifstream fin(“text.txt”); fstream fin; ofstreamfout(“text.txt”);
fin.get(ch); fin.getline(book ,SIZE); fout.put(ch);
Explain read() and write() function of binary file.
read(): write():
It belongs to the class ifstream It belongs to the class ofstream
It reads binary data from a file It writes binary data to a file.
Syntax: Syntax:
ifstream_object.read((char *) &var, sizeof(var)); ofstream_object.write((char *) &var, sizeof(var));
Example: fin.read((char*) &s, sizeof(s)); Example: fout.write((char*) &s, sizeof(s));
Explain file pointers in C++.
File pointers are used to traverse the opened file while reading or writing.
Get Pointer Put Pointer
The get pointer allows to read the content of a file The put pointer allows to write the content of a file
when we open the file in read-only mode. when we open the file in write -only mode.
The functions associated with get pointer are The functions associated with put pointer are
seekg(): Move the get pointer to a specified seekp(): Move the put pointer to a specified
location from the beginning of a file. location from the beginning of a file.
Syntax: Syntax:
seekg(long): seekp(long):
seekg(offset,seekdir): seekp(offset,seekdir):
Example: Example:
inf.seekg(20) ; inf.seekp(20) ;
inf.seekg(20, ios::beg); inf.seekp(20, ios::beg);
tellg(): It is used to find out the current tellp(): It is used to find out the current
position of the get pointer in a file. position of the put pointer in a file.
Syntax: Syntax:
int position; int position;
position = file_pointer.tellg(); position = file_pointer.tellp();
Explain the purpose of seek directions in C++ data file handling.
Seek direction are the constants that gives position inside a file which are defined in ios class.
ios::beg - Offset specified from the beginning of ios::end - Offset specified from the end of the
the file file
ios::cur - Offset specified from the current
position of the get pointer
Explain the basic operations on binary files in C++.
Searching. Deleting a record
Appending data. Modifying data
Inserting data in sorted files. (Any 3 points)
13. DATABASE CONCEPT (1 MARK – MCQ & 5 FIB, 2 MARKS & 3 MARKS)
Define the following terms.
Data: Collection of raw facts, figures, that need to be organized in terms of rows and columns.
processed. Records: A single entry in a table is called a Record
Information: Processed data is called information. or Row.
File: File is basic unit of storage in computer system. Tuple: Records are also called the tuple.
Database: A Database is a collection of logically Fields: Each Columns is identified by a distinct
related data organized in a way that data can be header called attribute or field
easily accessed, managed and updated. Domain: Set of values for an attribute in that
DBMS: software that allows creation, definition and column.
manipulation of database. Entity: It is an object such as a table or Form.
Tables: A table is a collection of data elements
Explain the application of Database.
Banking: For customer information, accounts, and Telecommunication: For keeping records of calls
banking transactions. made
Rail and Airlines: For reservations and schedule Sales: For customer, product, and purchase
information. information.
Colleges: For student information, course Manufacturing: For management of supply chain
registrations, and grades. and for tracking production of items in factories.
Credit card transactions: For purchases on credit
cards and generation of monthly statements.
Differences between Manual and Electronic Data processing.
Manual Data processing Electronic Data processing
Volume of Data processed is limited in a given time More data can be processed in given time
Large quantity of paper is required No paper is required
Speed is less Speed is more
Accuracy is limited Always accurate
Storage medium is paper Secondary storage is used.
Mention the steps of Data Processing Cycle.
Data Input, Storage, Communication
Data Processing, Output,
Explain various Datatypes of DBMS.
Integer: Hold whole number without fractions. Strings: Sequence of character more than one.
Single and double precision: Seven significant Currency fields: The currency field accepts data in
value for a number. dollar form by default.
Logical data Type: Store data that has only two Date fields: The date fields accept data entered in
values true or false. date format.
Characters: Include letter, number, spaces, Text fields: Accepts data as an alpha-numeric text
symbols and punctuation. string.
Give the features of Database.
Redundancy can be minimized or controlled Provides variety of Database Security mechanisms.
The data available in the database is reliable data. Ease of application development.
Data stored in the centralized database can be Provides Multiple user interfaces.
accessed at the same time.
Give the Examples for Database.
MySQL, Oracle, Microsoft Access, SQL Server, IBM DB2 etc.
Explain levels of data Abstraction:
It is the system hides certain details of how the data are stored and maintained. It has three levels.
Physical Level: It is the lowest level of abstraction the database and what relationships exist among
that describes how the data are actually stored. those data.
Conceptual Level: It is the next higher level of View Level: It is the highest level of abstraction
abstraction that describes what data are stored in that describes only part of the entire database.
Explain database users.
End Users (Database Users): interact with the programs.
database in order to query and update the database, Database Administrators (DBA): Who has central
and generate reports. control over both data and application.
System Analysts: determine the requirement of end Database Designers: Responsible for choosing
users to create a solution for their need. appropriate structures to represent and store the
Application programmers: Computer professionals data.
who implement and develop the application
What is data independence? Mention its types.
The capacity to change data at one layer does not Two types of data independence are:
affect the data at another layer is called data Physical Data Independence
independence. Logical Data Independence
Explain Serial file organization.
Records are arranged in one after another. Advantages:
Data is stored in chronological order. Fast access to next records
Stored in continuous storage device like magnetic Stored in economical storage media.
tape. Easy to do the file backup facility.
Explain Direct Access file organization.
Allow immediate direct access to individual
000 Data is stored randomly.
records on the file. Stored in the magnetic disks.
Explain ISAM.
The index sequential file organization is a activity ratio is high.
combination of Sequential file organization and an Permits direct access processing of records
Index file. when the activity ratio is low.
Records within a file are stored in sequentially but Disadvantages:
has direct access to individual records using index. Expensive hardware and software resources
Advantages: are required.
ISAM permits efficient and economical use of Access to records may be slower than direct
sequential processing techniques when the file.
Less efficient in the use of storage space.
Explain Random Access Method in file organization.
Records are stored on disk by using a hashing and direct.
algorithm. Transactions need not be stored and placed in
The key field is fed through hashing algorithm and a sequence prior to processing
relative address is created. Best used for online transaction.
This address gives the position on the disk where Disadvantages:
the record is to be stored. Address generation overhead is involved for
Advantages: accessing each record.
The access to, and retrieval of a records is quick Less efficient storage space is used.
Explain DBMS architecture.
The design of DBMS depends on its architecture. The ODBC interfaces provide API that allows
The dividing the system helps to modify, alter, client side program to call the DBMS.
change or replace on independent ‘n’ modules. The Logical one tier architecture:
database architecture is logically classified as 3-tier architecture separates it tier from each
Logical one tier architecture: other on basis of users. It is described as follows:
DBMS is the only entity where DBMS user Database (Data) Tier: Database along with
directly access database and uses it. its query processing languages contains all
Any changes made by the user directly done on relations and their constraints.
DBMS itself. Application (Middle) Tier: the application
Logical two-tier architecture: server and program, which access database,
It is a client/server architecture where user resides.
interface program and application programs run User (Presentation) Tier: An end user sits on
on client side. this tier.
Explain data models of DBMS.
Hierarchical Data Model Advantages:
This data model organizes the data in a tree like It is simple and easy to implement.
structure It can handle many relationships within the
All the nodes are linked to each other with a definite organization.
hierarchy It has better data independence compared to
Advantages: hierarchical model.
The data access is quite predictable in the Disadvantages:
structure. More complex system of database structure
The retrieval and updates can be highly optimized. Lack of structural dependence.
Disadvantages: Relational Data Model
Link is permanently established and cannot be All data are maintained in the form of tables, known
modified. as relations consisting of row and columns.
The hard coding makes the hierarchical model Each row represents an entity and a column
rigid. represents an attribute of the entity.
Network Data Model The relationship between the two tables is
This data model organizes the data in the form of implemented through a common attribute in the
graph tables.
Advantages:
All the nodes are linked to each other without any
Makes the querying much easier
hierarchy.
Programmer friendly
It has one parent node and many child nodes known Easy to maintain the data.
as dependents hence the data access is easier
Write the different symbols used in E-R diagram with their significance.
Entity: An Entity can be any object, Key Attribute: Key attribute
place, person or class and represents the main characteristic of
represented using rectangles. an Entity and represented by ellipse
Weak Entity: An Entity that is with underlying lines.
depend on another entity and Composite Attribute: An attribute
represented using double rectangle. can also have their own attributes.
Attribute: Describes a property or Relationship: Describes relations
characteristic of an entity and between entities and represented
represented using eclipse. using diamonds.
Explain various relational keys.
Primary Key: It is a key that uniquely identify Candidate Key: The minimal set of attributes that
each record in a table. can uniquely identify a tuple.
Foreign Key: The key that matches the primary Super Key: The set of attributes that can uniquely
key column of another table. identify a tuple.
Secondary Key / Alternate Key: A candidate Composite Key: Key that consists of two or more
key which are not currently selected as the attributes that uniquely identify an entity
primary key. occurrence.
What is data warehouse? Mention its components.
A data ware house is a repository of an organization's electronically stored data.
Components of Data Warehouse: Data Sources, Data transformation, Reporting, Metadata, Operations.
What are the advantages and disadvantages of data warehouse?
Advantages Disadvantages
Enhance end-user access to reports and analysis of Extracting, cleaning and loading data could be time
information. consuming.
Increases data consistency. Problems with compatibility with systems already in
Increases productivity and decreases computing place.
costs. Providing training to end-users.
Able to combine data from different sources, in one Security could develop into a serious issue.
place. Not static and maintenance costs are high.
What is Data Mining? Mention its Phases.
Data mining is concerned with the analysis and picking out relevant information.
Phases of data mining: Selection, Pre-processing, Data mining, Interpretation and Evaluation
14. SQL (1 MARK, 2 MARKS - 2 & 5 MARKS-HOTS)
What is SQL? Explain the classifications of SQL commands.
SQL: Structured Query Language is an open industry DML: Data Manipulation Language Used to change
standard language used to query databases. table data (INSERT, UPDATE, DELETE)
DDL: Data Definition Language Used to DQL: Data Query Language (SELECT)
create/modify table structure (CREATE, ALTER, DCL: Data Control Language (GRANT, REVOKE)
DROP)
Explain SQL Datatypes
NUMBER: Used to store a numeric value in a field Example:name CHAR(15)
column. VARCHAR/VARCHAR2: o It is used to store
Syntax: NUMBER(n, d) Variable length non-Unicode data.
Example: marks NUMBER(3), average NUMBER(2, Syntax: VARCHAR(size) / VARCHAR2(size)
3) Example:address VARCHAR2(50)
CHAR:Used to store Fixed length non-Unicode DATE and TIME: It is used to store date and time in
characters in a column. columns.
Syntax: CHAR(size) Example: dob DATE
Explain arithmetic operations in SQL.
Assume a = 10, b = 20, then;
Addition (+): Adds the value either side of operator Division (/): Divides left and operand by right hand
(a + b = 30) side operand (b / a = 2)
Subtraction (-): Subtracts right hand operand from Modulus (%): Divides left hand operand by right
left hand operand (a – b = -10) hand operand and returns remainder. (b % a will
Multiplication (*): Multiplies values on either side of give 0)
the operator (a * b = 200)
Explain relational / Comparison operators in SQL.
= : It checks the values of two operands are equal >= : It checks if the value of left operand is greater
or not. (a = b) than or equal to right. (a >=b)
<>(OR) != : It checks the values of two operands are <= : It checks if the value of left operand is less than
not equal. (a <> b) OR (a! = b) or equal to right. (a <=b)
> : It checks whether the left operand is greater !< : It checks whether the left operand is not less
than the right operand. (a >b) than the right operand. (a! <b)
< : It checks if the value of left operand is less than !> : It checks if the value of left operand is not
the right operand. (a <b) greater than the right operand. (a!>b)
Explain logical operators available in SQL.
ALL: Used to compare a value to all values in IN: Used to compare a value to a list of literal values
another value set. that have been specified.
AND: Allows the existence of multiple conditions in LIKE: Used to compare a value to similar values
an SQL statement's where clause. using wildcard operators.
ANY: Used to compare a value of any applicable NOT: Used to express the logical NOT operation.
value in the list according to the condition. OR: Used to combine multiple conditions in SQL.
BETWEEN: Used to search for values that are within UNIQUE: Searches every row of a table for
a set of values, given the min and max values. uniqueness.
EXISTS: Used to search for the presence of a row in
a specified table that meets certain criteria.
With syntax and example explain DDL commands
CREATE: It is used to create a new table. Syntax: ALTER TABLE <table-name> ADD <col-
Syntax: CREATE TABLE table_name(column1 name> <datatype>[(<size>)] [constraint];
datatype, column2 datatype, …, columnn data type); Example: ALTER TABLE pupil ADD grade varchar
Example: Create table student(id number(4), name (2);
varchar2(25), sub1 number(3), sub2 number(3)); DROP: It is used to delete an entire table as well as
ALTER: It is used to modify or change the table can its structure from database.
be by using the Alter Command. Syntax: DROP TABLE <table-name>;
Example: DROP TABLE flight;
With syntax and example explain DML commands
UPDATE: It is used to modify existing record(s) Example: INSERT INTO stdnt VALUES (‘a101’, ’abc’,
Syntax: UPDATE <table-name> SET <col-name> = 89);
<value> , <col2-name> = <value> , - - - WHERE DELETE: It is used to delete the existing records
<condition>; from a table.
Example: UPDATE pupil SET avgmark = 89.7 , grade Syntax: SYNTAX: DELETE FROM tablename WHERE
= 'B' WHERE admno = 107; condition;
INSERT: It is used to add new rows of data to a table Example: Ex: DELETE FROM employee WHERE
in the database. age>50;
Syntax: INSERT INTO tablename (col1, col2 ,coln)
VALUES(val1,val2, valn);
With syntax and example explain DQL commands
SELECT: It is used to fetch the data from a database table which returns in the form of result table.
Syntax: SELECT column 1, column 2...column n FROM table_name;
Example: Example: SELECT * FROM student; or SELECT * FROM student WHERE Roll_no<=102;
With syntax and example explain SQL ORDER BY and GROUP BY clause?
ORDER BY GROUP BY
Order by clause is used to arrange the records in Group By is used collaboration with SELECT
ascending or descending order based one or more statement to arrange identical data into groups
columns Syntax: SELECT column1, column2 FROM
Syntax: SELECT columnlist FROM table_name table_name WHERE conditions GROUP BY column1,
WHERE condition ORDER BY column1…column_n column2 ORDER BY column1 column2;
[ASC / DESC]; Example: SELECT name, city FROM student GROUP
Example: SELECT name, city FROM student ORDER BY name;
BY name;
Explain Group functions of SQL
COUNT (): This function returns the number of rows MIN (): This function is used to get the minimum
in the table that satisfies the condition specified in value from a column
the WHERE condition. Example: SELECT MIN (Salary) from Employee;
Example: SELECT COUNT (*) from Employee AVG (): This function is used to get the average
WHERE dept = ‘Computer Science’; value of a numeric column.
MAX (): This function is used to get the maximum Example: SELECT AVG (Salary) from Employee;
value from a column SUM (): This function is used to get the sum value of
Example: SELECT MAX (Salary) from Employee; a numeric column.
Example: SELECT sum (Salary) from Employee;
Explain built-in character / text functions in SQL.
LOWER (string): Convert character strings data INITCAP (string): Convert character strings data
into lowercase. into mixed case first letter of a word will be
Example: LOWER (‘Good Morning’) returns good converted to uppercase
morning Example: INITCAP (‘GOOD MORNING’) it returns
UPPER (string): Convert character strings data into Good Morning
Uppercase LENGTH (string): Returns the length of the
Example: UPPER (‘Good Morning’) returns GOOD character string
MORNING Example: LENGTH (‘GOOD MORNING’) returns 12
15. NETWORKING CONCEPTS (1 MARK - 2, 5 MARKS)
What is networking? Explain the goals of networking.
A computer Network is interconnection of two or more independent computers for the purpose of sharing resources
and information.
The main goals of network are:
Resource Sharing: The aim is to make all the Cost Factor: Using network we can reduce cost by
programs, data and peripherals to available to sharing system resources.
anyone on the network. Communication Medium: Using a network, it is
Reliability: A file can have copies on two or more possible for managers working far apart, to prepare
different machines, so if one of them is unavailable financial report of the company.
the other copies could be used.
What are the needs of Networking?
File sharing provides sharing and grouping of data Remote access able to access data and information
files over the network. around the globe.
Printing sharing of computer resources such as hard Sharing the database to multiple users at the same
disk and printers etc. time by ensuring the integrity
E-mail tools for communication with the e-mail
address.
Explain server and its type.
A Server is also a computer that facilitates the sharing of data, software, and hardware resources like printers,
modems etc. on the network. it can be of two types:
Non Dedicated Servers: Dedicated Servers:
On small networks, a workstation that can double On bigger network installation, there is a
as a server is known as non-dedicated server since computer reserved for server’s job and its only job
it is not completely dedicated to the cause of is to help workstations access data, software and
serving. hardware resources.
These computer works as a work station and as These servers are also known as MASTER-SLAVE
well as server. networks.
These servers are also known as PEER-TO-PEER
networks.
Explain LAN, WAN, MAN.
LAN MAN
Local area network. Metropolitan area network. WAN
It links the local areas like It links the metropolitan areas. Wide area network.
schools, organizations, etc. Connected through modem. It covers a large geographical area.
connected through cables. Private or public Ownership. Connected via broadband services.
Ownership is private. Moderate speed, i.e., 44-155 Mbps. Owned by many organizations.
Very high speed i.e., 1000 Mbps. Less speed i.e., 150 Mbps.
What is network topology? Explain briefly.
The actual appearance or layout of inter connection of Advantages: 1. Short cable length. 2. No wiring
different computers in network is called topology. closet space required. 3. Suitable for optical
Star topology: fibres.
Consists of a central node to which all other nodes are Disadvantages: 1. Node failure causes network
connected. failure. 2. Difficult to diagnose faults. 3. Network
Advantages: 1. Ease of service. 2. One device per
reconfiguration is difficult.
connection:
Mesh topology:
Bus or linear topology:
Each communicating device is connected with every
Consists of a single length of the transmission
other device in the network
medium onto which the various nodes are attached.
There is a point-to-point link between each dedicated
It transmits data only in one direction.
node (workstation).
All nodes are connected to single cable.
Each node is capable to send and receive information
Advantages: 1. Short cable length and simple wiring
to and from another node.
layout. 2.decreases the installation cost. 3. Easy to
If a node gets down, it does not cause any break in the
maintain wiring layout. 4. Easy to extend
transmission of data between other nodes.
Disadvantages: 1. Cables fails then whole network
Tree or hybrid topology:
fails. 2. Fault diagnosis is difficult. 3. Fault isolation is
difficult. 4. Node must be intelligent. It is a hierarchical topology, in which there are
multiple branches and each branch can have one or
Ring (circular) topology: more basic topologies.
Each node is connected to only two neighbouring These topologies are usually realised in WAN’s where
nodes and all connected nodes form a circular path. multiple LAN’s are connected.
It is unidirectional. After passing through each node,
the data returns to the sending node.
What are communication modes? Explain
Communication mode or Transmission mode defines the Two way or bidirectional communication between
direction of the flow of data between two two devices.
communication devices. There are three modes of data Each devices works as transmitter and receiver, but
transmission: only one device can transmit at a time.
Simplex Example: Walkie-Talkie.
One way or unidirectional communication between Full Duplex
two devices. Two way or bidirectional communication between
Only one device is a transmitter and all other devices two devices.
are a receiver. Example: Radio and television Each devices serving as transmitter and receiver that
broadcasting. can transmit and receive data simultaneously
Half Duplex Example: Mobile and telephone communication.
Explain different switching techniques in details.
Circuit Switching Message Switching: Packet Switching
A dedicated path is identified A message is transferred as a Each information or message to be
between the sender and the complete unit and routed through transmitted between sender and
receiver, before a communication intermediate nodes at which it is receiver is broken down into
starts. stored and forwarded. smaller pieces, called packets.
It setup an end-to-end path No establishment of a dedicated A fixed size of packet which can be
connection between computers path between the sender and transmitted across the network is
before any data can be sent. receiver. specified.
When a telephone call is made, Each and every node stores the Different packets of the same
the switching equipment within entire message and then forward it message may take different routes
the telephone system finds out a to the next node. This type of depending on availability.
physical copper path from sender network is known as store and A channel is occupied in packet
telephone to the receiver’s forward network. switching only during the
telephone. This is an example of transmission of the packet.
circuit switching.
Explain the network devices.
Modem (Modulator Demodulator): Device that Repeater: Device that amplifies and restores signals
enables a computer to transmit data over telephone for long- distance transmission.
lines. Bridge: Device that connects two or more networks
Ethernet card: Also known as Network Interface of same type.
Card (NIC) is a network adapter used to set up a Router: Device that connect two dissimilar networks
wired network. and selects best path for the signals to reach the
Hub: Device that used to connect different computing destination.
devices in a network through wires. Gateway: Device that connects dissimilar networks
Switch: Device that is used to interconnect multiple that serves as an entrance to another network
computers or communicating devices on a network.
What is compute virus? Write the symptoms (characteristics) of computer virus.
A virus is a malicious software program enters into a computer without the knowledge of the user.
Symptoms/ characteristics:
It is able to replicate. Computer reboots on its own.
A Computer may respond slowly. It requires a host program as a carrier.
Disk drives may become in accessible. It is activated by external action.
Expand the terms.
ARPANET: Advanced Research Projects Agency PPP: Point to Point Protocols
Network GSM: Global System for Mobile communications
HTTP: Hyper Text Transfer Protocol SIM: Subscriber Identification Module
WWW: World Wide Web TDMA: Time Division Multiple Access
TCP: Transmission Control Protocol. CDMA: Code Division Multiple Access
IP: Internet Protocol. WLL: Wireless in local loop
MIME: Multipurpose Internet Mail Extensions GPRS: General Packet Radio Service.
FTP: File Transfer Protocol EDGE: Enhanced Data rates for Global Evolution
SLIP: Serial Line Internet Protocol SMS: Short Message Service
What is network security? Explain protection methods.
It is a security where authenticated users access only to those resources that they are entitled to use.
Authorization: Determines whether the service Bio Metric Systems: The most secure level of
provider has granted access to the web service to the authorization that involve some unique aspects of a
requestor that confirms the service requestor’s person‘s body such as finger prints retinal patterns,
certificate. etc. to establish the identity.
Authentication: Involves accepting credentials from Firewall: A system designed to prevent unauthorized
the entity and validating them against an authority. access to or from a private network is called firewal.
Encrypted Smart Cards: Hand held smart card that
can generate a token that a Computer system can
recognize.
Give the measures for prevention virus.
Never use a “Foreign” disk or CD without scanning. Protect the PC with password.
Always scan files downloaded from the internet. Install and use of antivirus software.
Write protect the disks. Keep antivirus software up to date.
Use of licensed software.
Name some antivirus software
Kaspersky, Quick Heal, K7, Norton 360, Micro Trend, Titanium, AVG, Panda, ESET Nod32, Avast, McAfee Etc.,
16. INTERNET AND OPEN SOURCE CONCEPTS (1 MARK & 3 MARKS)
Definitions:
Free software: The software is freely accessible and WWW: It is set of protocols that allows you to access
can be freely used, changed, improved, copied and any documents on the net through a naming system
distributed by all who wish to do so. based on URL’s.
Open Source Software: The software that can be Telnet: It is an internet utility that lets you log on to
freely used but it does not have to be free of charge. remote computer system.
FLOSS: refers to Free Livre/Libre and Open Source Web page: The document residing on websites are
Software, that is software which is both free called web pages.
software as well as open source software. Web browser: It is a WWW client that navigates
FSF: Free Software Foundation is a non-profit through the World Wide Web and displays web
organization created for the purpose of supporting pages. Examples: Netscape Navigator, Internet
free software movement Explorer, Opera, Google Chrome etc,
OSI: Open Source Initiative is an organization Web Portal: It is a web site, which hosts other web
dedicated to cause of promoting open source sites.
software. Website: Collection of webpages located under a
W3C: World Wide Web Consortium is responsible single domain name.
for producing the software standards for World
Web Server: It is a WWW server that responds to
Wide Web.
the requests made by web browsers.
Freeware: The freeware is a software which is
available free of cost and allows copying and further Domain Name: Domain name are used to identify
distribution. one or more ip addressess
Proprietary Software: It is the software that is URL: HTTP uses internet addresses in a special
neither open nor freely available. format called a Uniform Resource Locator or URL
Shareware: Software available with rights of Uniform resource locator.
redistribution of copies for a limited duration of Syntax: Type://address/path/filename
time.
E-Commerce & its types
Ecommerce is the trade of goods and services with Example: Buying a computer or mobile from the
the help of telecommunications and computers. OR company.
Trading of goods or services through an internet is Consumer-to-Business(C2B): The consumer
called e-commerce directly contacts with business vendors by posting
Business-to-Business(B2B): The exchange of their project work with set budget online and
services, information and products form one selects best company after reviewing the cost to
business to another business partners. complete the project.
Example: E-bay.com Example:guru.com, freelancer.com
Business-to-Consumer(B2C): The exchange of Consumer-to-Consumer(C2C): The exchange of
services, information and products takes place services, information and products takes place
between a business organization and a consumer. between two consumers with the help of free sites,
auctions and forums.
Example: OLX.com.
Advantages of e-commerce.
24/7 basis service. No risk of physical cash. Optimization of resources.
More choice for customers. Global participation is easy. Improved market intelligence.
Services of E-commerce.
Electronic Data Interchange Electronic Benefits Electronic forms
(EDI) Transfer(EBT) Digital Cash
Electronic Fund Transfer(EFT) E-Mail
17. WEB DESIGNING (1 MARK & 3 MARKS)
Text Formatting tags: Text Layout Tags:
Tag to make text Bold in the web page: <b> text Tag to defines a paragraph in web page: <p> text
</b> </p>
Tag to make text italics in the web page: <i> text Tag to align text to center in web page: <center>
</i> text </center>
Tag to make text underlined in the web page: <u> Tag to add single line break in web page: <br>
text </u>
Table Tags
Tag to make text superscripted in the web page: <sup>
Tag to define a table in web page:
text </sup>
<table></table>
Tag to make text subscripted in the web page: <sub>
text </sub> Tag to define a table header in web page:
<th></th>
Text Resize tags: Tag to define a table row in web page: <tr></tr>
Tag to increase text size by one in the web page: Tag to define a table cell in web page: <td></td>
<big> text <big> Tag to define a table caption in web page:
Tag to decrease text size by one in the web page: <caption></caption>
<small> text <small>
Tag to make text as biggest heading in the web Other Tags
Tag to produce links from one web page to another
page: <h1> text </h1>
web page: <a href=”www.google.com”> Google
Tag to make text as smallest heading in the web </a>
page: <h6> text </h6> Tag to insert an image in a web page: <img
Tag to write text in smallest font size (i.e 8 pt): src="rainbow.jpg">
<font size=”1”> text </font> Tag to add a background image to web page: <body
Tag to write text in biggest font size (i.e 36 pt): background=”rainbow.jpg” >
<font size=”7”> text </font> Tag to add a background colour to web page: <body
bgcolour=”#333333">
General structure of HTML
<Html>
<Head>
<Title> Any title to HTML document </Title>
</Head>
<Body>
Any Text
</Body>
</HTML>
Web Hosting and Its Types
Hosting web server application on a computer 1) Free hosting
system through which electronic content on the 2) Virtual or shared hosting
internet is readily available to any web browser 3) Dedicated hosting
client. 4) Collocation hosting
Web Scripting and Its Types
The process of creating and embedding scripts in a web page is known as Web Scripting.
Client-Side Scripting Server-Side Scripting
Client-Side scripting enables interaction within a Server-side scripts Server-side scripting enables
web page. the completion or carrying out a task at the server
It is browser dependent. end.
Example: It is not browser dependent.
To get data from user’s screen or browser Example:
Online games. Password protection
Form processing
ALL THE BEST