0% found this document useful (0 votes)
36 views

Class Xii Model Exam Marks:150 Computer Sciencetime:3Hrs

The document contains a practice exam for Computer Science with 50 multiple choice questions covering topics like function overloading, operator overloading, inheritance, constructors, and destructors. It also includes questions about the applications and uses of information technology in areas like e-learning, e-banking, healthcare, and more. The exam is worth a total of 150 marks and has 3 hours allotted for completion.

Uploaded by

Lakhan Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

Class Xii Model Exam Marks:150 Computer Sciencetime:3Hrs

The document contains a practice exam for Computer Science with 50 multiple choice questions covering topics like function overloading, operator overloading, inheritance, constructors, and destructors. It also includes questions about the applications and uses of information technology in areas like e-learning, e-banking, healthcare, and more. The exam is worth a total of 150 marks and has 3 hours allotted for completion.

Uploaded by

Lakhan Kumar
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CLASS XII MODEL EXAM MARKS:150

COMPUTER SCIENCETIME :3Hrs


PART I
Choose the correct answer: 75 x 1 =75
1) In operator overloading the user forced to use_________ function to concatenate strings.
a) strcpy() b) strncat () c) strcy () d) strcat ()
2) The scope resolution operator is _________
a) @ b) $ c) :: d) :
3) Overload a function with the help of different function definitions having a ______ parameter list.
a) different b) same c) unique d) whole
4) The term _________means a name having two or more distinct meanings.
a) polymorphism b) overloading c) function d) none
5) The return type of _________ function may or may not be the same data type.
a) Formal b) actual c) over loaded d) separate
6) Overloaded operators behave in the same way as the basic operators in terms of their _____
a) objects b) operators c) methods d) operands
7) _______ operators overloaded through a member function takes one explicit arguments
a) unary b) binary c) arithmetic d) relational
8) The ability of the function to process the message or data in more than one form is called as
___ overloading. a) class b) function c) data d) variable
9) The default _____ of overloaded functions are not considered by C++ compiler as part of the
parameter list. a) argument b) method c) variable d) value
10) Each overloaded functions must differ either by the number of its formal __ or their data types.
a) arguments b) parameters c) variables d) methods
11) Integral promotions must differ either by the number of its formal ________or their data types.
a) Computer b) system c) CPU d) complier
12) When binary operators are overloaded the _____ object must be an object of the relevant class.
a) right-hand b) top of the c) left hand d) bottom of the
13) In C++ _________ is achieved through function overloading and operator over loading
a) inheritance b) encapsulation c) polymorphism d) class
14) A ___________is a function that removes the memory of an object which was allocated by the
constructor at the time of creating a object.
a) destructor b) operator c) object d) constructor
15) In the absence of ___________destructor it is generated by the compiler
a) system defined b) user defined c) data defined d) object defined
16) To invoke _________ constructors the object should be declared with constants or variables.
a) functional b) nonfunctional c) non parameter d) parameterized
17) Destructors cannot be ___________
a) created b) edited c) overloaded d) generated
18) A non parameterized constructor is executed when an _________ without parameters is
Declared.
a) object b) method c) member d) class

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
19) The destructor is executed automatically when the control reaches the _______ of class scope.
a) end b) beginning c) starting d) top
20) Destructor carries the same name as the class tag, but with a ___________ as prefix
a) plus(+) b) minus(-) c) slash(/) d) tilde(~)
21) A copy constructor is executed, when a member function ________ an object
a) executive b) delete c) returns d) pass
22) A constructor should have ___________ list.
a) object b) variable c) parameter d) argument
23) The _________ function initializes the class object.
a) destructor b) constructor c) operator d) class
24) A _________ constructor is executed when an object is passed as a parameter to any of the
member function.
a) original b) copy c) actual d) permitted
25) The ___________ of the constructor must be same as that of the class.
a) name b) size c) type d) data

26) Function _____ can be applied for constructor as constructors are special functions of classes.
a) inheritance b) polymorphism c) overloading d) none
27) When a class is derived from a class which is a derived class then that is referred to ______
Inheritance.
a) multiple b) single c) multilevel d) one level
28) There are ___________ types of inheritance.
a) 2 b) 3 c) 4 d) 5
29) when base class is inherited with public mode the protected members of base class will be
inherited as ___________ member.
a) global b) protected c) public d) private
30) The ___________ are executed in the order of inherited class.
a) operators b) constructors c) identifiers d) associators
31) The derive class inherits all the properties of the ___________ class.
a) main b) first c) derived d) base
32) When a derived class inherits only from one base class is known as ___________
a) single b) one level c) base class d) derived class
33) The ___________ nature of inheritance is reflected by multi level form of inheritance
a) associative b) transitive c) transfer d) sortive
34) Access specifier is also referred to as ___________ mode.
a) Enable b) unable c) visibility d) unvisibility
35) Classes used only for deriving other classes are called ___________ classes.
a) abstract b) associative c) transitive d) accessive
36) Constructors are executed first when an instance of the ___________ class is created.
a) base b) existing c) derived d) first
37) A ___________class is a class from which other classes are derived.
a) derived b) main c) sub d) base
38) When a member of a base class can be used by the objects or the member of the derived class
is called ___________
a) accessibility b) inherited c) reusability d) availability
39) When a derived class inherits from ___________base classes is known as multiple inheritance.
a) single b) two c) one d) multiple
40) ___________ that enables on line educational programs leading to degrees and certification.
a) e-learning b) e-banking c) e-shopping d) none
41) introduction of ___________ in books reduced the time required to provides service to a user.
a) UT b) IT c) TT d) WT
42) It is interesting to observe that ___________of computer usage is word processing.
a) 50% b) 60% c) 75% d) 85%
43) ___________ is dominated large amount of data limited financial and human resources and

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
need for a accountability of those resources.
a) entertainment b) learning c) health care d) family welfare
44) ___________ permits banking from the comfort of the home by using internet facilities.
a) web b) IT c) Multimedia d) e-banking
45) ___________ facilities remote diagnostics.
a) radio b) hospital c) television d) internet
46) To reach out the benefits of IT to the common man we need at least _ technical elements.
a) 2 b) 3 c) 4 d) 5
47) You can purchase any product, any brand, any quantity from any where through ___________
a) E-BANKING b) IT c) Internet d) e-shopping
48) Advance machines like ___________ enable withdrawal of money from the accounts in a
particular bank any time and any where.
a) computer b) internet c) ATM d) SMS
49) CBT means ______ a) computer based tutorials b) common based tutorials
c) compute bank tutorials d) common bank transaction
50) ___________ and other impressive packages for graphics are adding value to the work done.
a) desktop publishing b) word processing c) Word stard) spread sheet
51) Word processing, Data base, spread sheets and multimedia presentation packages have
increased the ___________ at work.
a) speed b) accuracy c) efficiency d) electricity

52) One can easily transfer of information through ____________ internet and other electronic
media by using digitization
a) web site b) CD-ROM c) documents d) computers
53) BFSI stands for ____ a) banking financial service and insurance sector
b) banking facility service interest c) banking format service interpreterd) none
54) BPO stands for ____a) business process outsourcing
b) business performance outstanding c) business perfect objective d)none
55) Medical transcription facilities communication and support the ____________
a) hospitals b) trainees c) doctors d) insurance claim
56) ____________ refers to the conversion of non-digital material to digital form
a) documentation b) digitization c) digital work d) web design
57) ___________ is a category of IT enabled services pertaining to collection, digitization and
processing of data coming from various sources.
a) spread sheet b) word processor c) web design d) data management
58) The customers are in need of a facility that ensures communication services on all days of the
year all round the clock ___________
a) 36 x125 b) 36 x250 c) 24 x 250 d) 24 x 365
59) A ___________ is sometimes defined as a telephone based shared service center for specific
customer activities.
a) telephone b) Call center c) telecenter d) web center
60) A call center has ___________ telecom facilities, trained consultant, access to wide database,
internet and other online information.
a) appropriate b) approximate c) adequate d) accurate
61) Information technology that helps in improving the quality of service to the user is called
___________ (ITES) a) IT enabled services b) IT effective services
c) IT effective structure d) IT evaluate systems
62) Which of the following traditional service is IT enabled?
a) internet b) paint c) spread sheet d) CD-ROM
63) ____________is critical for the success of ITES
a) Internet b) service provider c) computer ethics d) data security
64) ___________ known virus programs are in existences.
a) 48,000 b) 65,000 c) 50,000 d) 57,000
65) Some software runs on an idle computer without the knowledge of the organization is called

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
theft of ___________
a) computer time b) web time c) software d) internet time
66) A ___________ is a replicating program that can cause damage to data and files stored on your
computer.
a) virus b) illegal c) ethick d) crime
67) It must be observe that ___________ of all computer crimes happen from within the company.
a) 80% b) 40% c) 60% d) 50%
68) By the year ___________ a number of social and ethical consequences of information
technology were becoming public issues in America and Europe.
a) 1968 b) 1980 c) 1956 d) 1990
69) India has ___________ laws to prevent computer crimes.
a) crime b) ethic c) cyber d) zero
70) ___________refers to software setups that permit only authorized access to the system.
a) security b) personal security c) rules d) a or b
71) ___________ security refers to the production of hard ware, facilities, magnetic disks and other
items that could be illegally accessed, stolen or destroyed.
a) data b) personal c) physical d) hardware
72) Over ___________ of all crimes go unreported.
a) 20% b) 40% c) 60% d) 80%
73) ___________ security refers to the protecting data and computer system against dishonesty or
negligence of employees.
a) personal b) computer c) data d) personal
74) ___________ is a set of rules for determining moral standards of what is considered as socially
acceptablebehaviours.
a) ethics b) format c) rule d) none

75) A commonly cited reference is the ___________ commandments of computer ethics written by
the computer ethics institute.
a) five b) four c) six d) ten

PART II

ANSWER ANY TWENTY OF THE FOLLOWING 20 x 2 = 40

1. What do you mean by function overloading?


2. How are funcions invoked in funcion overloading?
3. Write the rules for function overloading?
4. What is operator overloading?
5. Write the functions of constructor?
6. What is constructor overloading?
7. When a copy constructor gets executed?
8. Write the advantages of inheritance?
9. What is accessibility?
10. How constructor and destructor get executed?
11. What do you mean by abstract class?
12. How will you define a derived class from the base class?
13. Why do the following snippets throw error?
class simple

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
{ private :
int x;
simple()
{x =y} };
void main()
{simple s;}
14. Write the technical elements to reachout the benefit of IT to the common man?
15. What is the use of emotion containers?
16. What is the use of ATM?
17. What is cracking?
18. What do you mean by theft of computer time?
19. What is virus?
20. What is piracy?
21. What is physical security?
22. What is the use of medical transcription?
23. What is the use of call centre?
24. What is personal security?
25. What is ITES?
PART III
ANSWER ANY SEVEN OF THE FOLLOWING 7 x 5 = 35

1. Explain types of inheritance?


2. Write the rules for overloading operators?
3. Explain operator overloading with example?
4. Explain scope and access of base members in the derived class?
5. Write the constructor definition and usage?
6. Write the destructor definition and usage?
7. Find the output of the following:
#include<iostream.h>
#include<conio.h>
cass base
{
public:
base()
{
cout<<”\nConstructor of base class ... “
}
~base()
{

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
cout<<”\n Destructor of base class ... “
}
};
classderived:public base
{
public:
derived()
{
cout<<”\nConstructor of derived ... “
}
~derived()
{
cout<<”\n Destructor of derived ... “
}
};
class derived2:public base
{
public:
derived2()
{
cout<<”\nConstructor of derived2 class ... “
}
~derived()
{
cout<<”\n Destructor of derived 2 class... “
}
};
void main()
{
derived2 x;
)

8. Debug the following program?


##include<iostream.h>
#include<conio ,h>
Class add
{
Intsum ;

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
Protected ;
Add()
(
num1=num2=sum=0;
cout<<”\n Add constructor..”;
}
accept()
{
Cout<<”\n Enter two numbers ... “;
cin<<num1>>num2;
}
plus()
{
Sum=num1+num2;
cout<<”\nThe sum of two numbers is ..”<<sum;
}
}
class subtract::public add
{
Int sub;
Public:
subtract()
{
sub=0;
Cpit<<”\n Subtract constructor ...”;
}
minus()
{
add: accept();
sub=num1-num2;
cout<<”\nThe difference of two numbers are...”;
}
};
voidmani()
{
subtract s;
int choice =5;
cout<<”\n Enter your choice”;

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
Cin>>choice;
Switch (choide)
{
Case 1:
s.accept();
s.plus();
break();
case 2:
s.minus();
break;
}
}
}
9. Find the output of the following:
#include<iostream.h>
#include<conio.h>
class distance
{
intfeet,inches;
public:
voiddistance_assign(intf,inti)
{
Feet = f;
Inches = i;
}
void display()
{
cout<<”\n Feet : “<<feet
<<”\tInches :”<<inches;
}
distance operator+(distance d2)
{
distance d3;
d3.feet=feet +d2.feet;
d3.inches=(inches +d2.inches)%12;
d3.feet+=(inches +d2.inches)/12;
)
);

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
void main()
{
clrscr();
distance dist_1,dist_2;
dist_1.distance_assign(2,11);
dist_2.distance_assign(24,1);
distance dist_3=dist_1+dist_2;
dist_1.display();
dist_2.display();
dist_3.display();
getch();
}
10. Debug the following program?
#include<Iostream.h>
@include<conio.h>
Class add
{
int num1,num2;sum;
public;
addd()
{
cout<<”\nConstructor without parameters....;
num1=0;
num2=0;
sum=0;
}
Add (int s1,int s2)
{
cout>>”\nParameterized Constructor...”;
num1=s1;
num2=a2;
sum=NULL;
}
add (add &a)
{
cout<<”\nCopy constructor..”;
num1=a.num1;
num2=a.num2;

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
sum =NULL;
}
Void getdata()
{
cout<<”Enter data..”;
cint>>num1>>num2;
}
void addition
{
sum=num1+num2;
}
vdoidputdata()
{
Cout<<”\nThe numbers are ...”;
cout<<num1<<’\t’ <<num2;
cut<<\n The sum of the numbers are ... “<<sum;
}
}.
void main{}
{
Add a,b(10,20),c(b)
a.getdata();
a.addition();
b.addition()
c.addition();
cout<<”\n Object a :”’
a.putdata();
cout<<”\n Object b:”’
b.putdata();
cout<<”\n Object c:”’
a.putdata();
};

Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389

Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in

You might also like