Class Xii Model Exam Marks:150 Computer Sciencetime:3Hrs
Class Xii Model Exam Marks:150 Computer Sciencetime:3Hrs
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
19) The destructor is executed automatically when the control reaches the _______ of class scope.
a) end b) beginning c) starting d) top
20) Destructor carries the same name as the class tag, but with a ___________ as prefix
a) plus(+) b) minus(-) c) slash(/) d) tilde(~)
21) A copy constructor is executed, when a member function ________ an object
a) executive b) delete c) returns d) pass
22) A constructor should have ___________ list.
a) object b) variable c) parameter d) argument
23) The _________ function initializes the class object.
a) destructor b) constructor c) operator d) class
24) A _________ constructor is executed when an object is passed as a parameter to any of the
member function.
a) original b) copy c) actual d) permitted
25) The ___________ of the constructor must be same as that of the class.
a) name b) size c) type d) data
26) Function _____ can be applied for constructor as constructors are special functions of classes.
a) inheritance b) polymorphism c) overloading d) none
27) When a class is derived from a class which is a derived class then that is referred to ______
Inheritance.
a) multiple b) single c) multilevel d) one level
28) There are ___________ types of inheritance.
a) 2 b) 3 c) 4 d) 5
29) when base class is inherited with public mode the protected members of base class will be
inherited as ___________ member.
a) global b) protected c) public d) private
30) The ___________ are executed in the order of inherited class.
a) operators b) constructors c) identifiers d) associators
31) The derive class inherits all the properties of the ___________ class.
a) main b) first c) derived d) base
32) When a derived class inherits only from one base class is known as ___________
a) single b) one level c) base class d) derived class
33) The ___________ nature of inheritance is reflected by multi level form of inheritance
a) associative b) transitive c) transfer d) sortive
34) Access specifier is also referred to as ___________ mode.
a) Enable b) unable c) visibility d) unvisibility
35) Classes used only for deriving other classes are called ___________ classes.
a) abstract b) associative c) transitive d) accessive
36) Constructors are executed first when an instance of the ___________ class is created.
a) base b) existing c) derived d) first
37) A ___________class is a class from which other classes are derived.
a) derived b) main c) sub d) base
38) When a member of a base class can be used by the objects or the member of the derived class
is called ___________
a) accessibility b) inherited c) reusability d) availability
39) When a derived class inherits from ___________base classes is known as multiple inheritance.
a) single b) two c) one d) multiple
40) ___________ that enables on line educational programs leading to degrees and certification.
a) e-learning b) e-banking c) e-shopping d) none
41) introduction of ___________ in books reduced the time required to provides service to a user.
a) UT b) IT c) TT d) WT
42) It is interesting to observe that ___________of computer usage is word processing.
a) 50% b) 60% c) 75% d) 85%
43) ___________ is dominated large amount of data limited financial and human resources and
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
need for a accountability of those resources.
a) entertainment b) learning c) health care d) family welfare
44) ___________ permits banking from the comfort of the home by using internet facilities.
a) web b) IT c) Multimedia d) e-banking
45) ___________ facilities remote diagnostics.
a) radio b) hospital c) television d) internet
46) To reach out the benefits of IT to the common man we need at least _ technical elements.
a) 2 b) 3 c) 4 d) 5
47) You can purchase any product, any brand, any quantity from any where through ___________
a) E-BANKING b) IT c) Internet d) e-shopping
48) Advance machines like ___________ enable withdrawal of money from the accounts in a
particular bank any time and any where.
a) computer b) internet c) ATM d) SMS
49) CBT means ______ a) computer based tutorials b) common based tutorials
c) compute bank tutorials d) common bank transaction
50) ___________ and other impressive packages for graphics are adding value to the work done.
a) desktop publishing b) word processing c) Word stard) spread sheet
51) Word processing, Data base, spread sheets and multimedia presentation packages have
increased the ___________ at work.
a) speed b) accuracy c) efficiency d) electricity
52) One can easily transfer of information through ____________ internet and other electronic
media by using digitization
a) web site b) CD-ROM c) documents d) computers
53) BFSI stands for ____ a) banking financial service and insurance sector
b) banking facility service interest c) banking format service interpreterd) none
54) BPO stands for ____a) business process outsourcing
b) business performance outstanding c) business perfect objective d)none
55) Medical transcription facilities communication and support the ____________
a) hospitals b) trainees c) doctors d) insurance claim
56) ____________ refers to the conversion of non-digital material to digital form
a) documentation b) digitization c) digital work d) web design
57) ___________ is a category of IT enabled services pertaining to collection, digitization and
processing of data coming from various sources.
a) spread sheet b) word processor c) web design d) data management
58) The customers are in need of a facility that ensures communication services on all days of the
year all round the clock ___________
a) 36 x125 b) 36 x250 c) 24 x 250 d) 24 x 365
59) A ___________ is sometimes defined as a telephone based shared service center for specific
customer activities.
a) telephone b) Call center c) telecenter d) web center
60) A call center has ___________ telecom facilities, trained consultant, access to wide database,
internet and other online information.
a) appropriate b) approximate c) adequate d) accurate
61) Information technology that helps in improving the quality of service to the user is called
___________ (ITES) a) IT enabled services b) IT effective services
c) IT effective structure d) IT evaluate systems
62) Which of the following traditional service is IT enabled?
a) internet b) paint c) spread sheet d) CD-ROM
63) ____________is critical for the success of ITES
a) Internet b) service provider c) computer ethics d) data security
64) ___________ known virus programs are in existences.
a) 48,000 b) 65,000 c) 50,000 d) 57,000
65) Some software runs on an idle computer without the knowledge of the organization is called
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
theft of ___________
a) computer time b) web time c) software d) internet time
66) A ___________ is a replicating program that can cause damage to data and files stored on your
computer.
a) virus b) illegal c) ethick d) crime
67) It must be observe that ___________ of all computer crimes happen from within the company.
a) 80% b) 40% c) 60% d) 50%
68) By the year ___________ a number of social and ethical consequences of information
technology were becoming public issues in America and Europe.
a) 1968 b) 1980 c) 1956 d) 1990
69) India has ___________ laws to prevent computer crimes.
a) crime b) ethic c) cyber d) zero
70) ___________refers to software setups that permit only authorized access to the system.
a) security b) personal security c) rules d) a or b
71) ___________ security refers to the production of hard ware, facilities, magnetic disks and other
items that could be illegally accessed, stolen or destroyed.
a) data b) personal c) physical d) hardware
72) Over ___________ of all crimes go unreported.
a) 20% b) 40% c) 60% d) 80%
73) ___________ security refers to the protecting data and computer system against dishonesty or
negligence of employees.
a) personal b) computer c) data d) personal
74) ___________ is a set of rules for determining moral standards of what is considered as socially
acceptablebehaviours.
a) ethics b) format c) rule d) none
75) A commonly cited reference is the ___________ commandments of computer ethics written by
the computer ethics institute.
a) five b) four c) six d) ten
PART II
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
{ private :
int x;
simple()
{x =y} };
void main()
{simple s;}
14. Write the technical elements to reachout the benefit of IT to the common man?
15. What is the use of emotion containers?
16. What is the use of ATM?
17. What is cracking?
18. What do you mean by theft of computer time?
19. What is virus?
20. What is piracy?
21. What is physical security?
22. What is the use of medical transcription?
23. What is the use of call centre?
24. What is personal security?
25. What is ITES?
PART III
ANSWER ANY SEVEN OF THE FOLLOWING 7 x 5 = 35
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
cout<<”\n Destructor of base class ... “
}
};
classderived:public base
{
public:
derived()
{
cout<<”\nConstructor of derived ... “
}
~derived()
{
cout<<”\n Destructor of derived ... “
}
};
class derived2:public base
{
public:
derived2()
{
cout<<”\nConstructor of derived2 class ... “
}
~derived()
{
cout<<”\n Destructor of derived 2 class... “
}
};
void main()
{
derived2 x;
)
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
Protected ;
Add()
(
num1=num2=sum=0;
cout<<”\n Add constructor..”;
}
accept()
{
Cout<<”\n Enter two numbers ... “;
cin<<num1>>num2;
}
plus()
{
Sum=num1+num2;
cout<<”\nThe sum of two numbers is ..”<<sum;
}
}
class subtract::public add
{
Int sub;
Public:
subtract()
{
sub=0;
Cpit<<”\n Subtract constructor ...”;
}
minus()
{
add: accept();
sub=num1-num2;
cout<<”\nThe difference of two numbers are...”;
}
};
voidmani()
{
subtract s;
int choice =5;
cout<<”\n Enter your choice”;
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
Cin>>choice;
Switch (choide)
{
Case 1:
s.accept();
s.plus();
break();
case 2:
s.minus();
break;
}
}
}
9. Find the output of the following:
#include<iostream.h>
#include<conio.h>
class distance
{
intfeet,inches;
public:
voiddistance_assign(intf,inti)
{
Feet = f;
Inches = i;
}
void display()
{
cout<<”\n Feet : “<<feet
<<”\tInches :”<<inches;
}
distance operator+(distance d2)
{
distance d3;
d3.feet=feet +d2.feet;
d3.inches=(inches +d2.inches)%12;
d3.feet+=(inches +d2.inches)/12;
)
);
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
void main()
{
clrscr();
distance dist_1,dist_2;
dist_1.distance_assign(2,11);
dist_2.distance_assign(24,1);
distance dist_3=dist_1+dist_2;
dist_1.display();
dist_2.display();
dist_3.display();
getch();
}
10. Debug the following program?
#include<Iostream.h>
@include<conio.h>
Class add
{
int num1,num2;sum;
public;
addd()
{
cout<<”\nConstructor without parameters....;
num1=0;
num2=0;
sum=0;
}
Add (int s1,int s2)
{
cout>>”\nParameterized Constructor...”;
num1=s1;
num2=a2;
sum=NULL;
}
add (add &a)
{
cout<<”\nCopy constructor..”;
num1=a.num1;
num2=a.num2;
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
sum =NULL;
}
Void getdata()
{
cout<<”Enter data..”;
cint>>num1>>num2;
}
void addition
{
sum=num1+num2;
}
vdoidputdata()
{
Cout<<”\nThe numbers are ...”;
cout<<num1<<’\t’ <<num2;
cut<<\n The sum of the numbers are ... “<<sum;
}
}.
void main{}
{
Add a,b(10,20),c(b)
a.getdata();
a.addition();
b.addition()
c.addition();
cout<<”\n Object a :”’
a.putdata();
cout<<”\n Object b:”’
b.putdata();
cout<<”\n Object c:”’
a.putdata();
};
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in
Reqd. Office: 40, G.S.T. Road, St. Thomas Mount, Chennai - 600016 Ph: +91-44-22342508 / 22341389
Campus: Post Box No. 1, Rajiv Gandhi Salai (OMR), Padur, Chennai - 603103 Ph:+91-44-27474395 / 27474262 www.hindustanuniv.ac.in