Hsslive Xi Comp App Question Bank Thomas
Hsslive Xi Comp App Question Bank Thomas
Hsslive Xi Comp App Question Bank Thomas
in ®
h. Speaker - Output
19. Write the expanded for of GIGO
a. Garbage In Garbage Out
20. Which printer is widely used as portable printer? Why?
a. Thermal Printer is widely used as portable printer due to the following reasons
i. Small
ii. Lighter
iii. Consumes less power
21. ______ memory is a small and fast memory between the processor and RAM.
a. Cache
22. Write down the components of System Software.
a. Operating Systems
b. Language Processors
c. Utilities
23. Briefly explain any five input devices.
a. (Refer text for details)
24. Write the full form of MICR.
a. Magnetic Ink Character Reader
25. Write two examples for open source software.
a. GNU/Linux
b. GIMP
c. Mozilla Firefox
d. LibreOffice
i.
3. Write short notes on importance of internal documentation
a. We can write comments in the source code as part of documentation. It is known
as internal documentation.
b. It helps the debugging process as well as program modification at a later stage.
c. If the program is documented, it will help to understand the logic we applied, the
reason why a particular statement has been used and so on.
4. Write an algorithm to print the multiples of 5 between 100 and 200 in descending order.
i. Start
ii. k=100
iii. If k mod 5 = 0 then output k
iv. k=k+1
v. If k<=200 go to step iii.
vi. Stop
i.
6. Errors may occur in two stages of programming.
a. Name these two stages. Explain the nature of errors in these stages.
i. Syntax errors result when the rules or syntax of the programming
language are not followed. Such program errors typically involve incorrect
punctuation, incorrect word sequence, undefined term, or illegal use of
terms or constructs.
ii. logical error, is due to improper planning of the program's logic.
iii. Run-time error will interrupt the program execution
b. The process of correcting these errors is known as .......
i. Debugging
7. Write short notes on the following
a. Coding
i. Once we have developed the skill to design algorithms and flowcharts,
the instructions are to be expressed in a programming language. The
process of writing program instructions to solve a problem is called
coding.
b. Debugging
i. Debugging is the stage where programming errors are discovered and
corrected. Programming errors are known as 'bugs' and the process of
detecting and correcting these errors is called debugging.
8. Explain two documentations in types of programming
a. Internal Documentation - We can write comments in the source code as part of
documentation. It is known as internal documentation.
b. External documentation - User manuals are hard copy documents that contain
functioning of the system, its requirements etc. and the procedure for installing
and using the programs. While developing software for various applications,
i.
a.
13. Write an algorithm to find sum of two numbers
i. Start
ii. Input n1
iii. Input n2
iv. Sum=n1+n2
v. Output Sum
vi. Stop
14. Draw the flowchart to find the sum of two numbers.
i.
a.
16. Write an algorithm to find area of a rectangle (Area=length x breadth)
i. Start
ii. Input length
iii. Input breadth
iv. Area = length x breadth
v. Output area
vi. Stop
a. Data types are the means to identify the nature of the data and the set of
operations that can be performed on the data.
b. C++ data types
i.
ii. Fundamental data types
1. Fundamental data types are defined in C++ compiler.
2. They are also known as built-in data types.
3. They are atomic in nature and cannot be further broken into small
units.
4. The Five fundamental data types in C++ are char , int , float ,
double and void .
5. Among these, int and char come under integral data type as they
can handle only integers.
6. The numbers with fractions (real numbers) are generally known as
floating type and are further divided into float and double based on
precision and range.
iii. User-defined data types
1. C++ is flexible enough to allow programmers to define their own
data types.
iv. Derived data types
1. Derived data types are constructed from fundamental data types
through some grouping or alteration in the size.
13. Which is the keyword used for empty data types?
a. Void
14. Consider the following C++ code. Write output of the code. Justify the answer
int x=5,y=2;
float z;
z=x/y;
cout<<z;
Answer
Output - 2
Since x and y are int data division is also generates int data only.
15. What is variable initilisation ? Write example.
a. Assigning value to a variable while it is declared.
b. Example
i. int a=6;
c. x+10=x;
d. x=10+x;
i. c. x+10=x;
5. Comments in a program are ignored by the compiler. Then why we are including
comments in a program? What are the different methods of comments
a. Comments are used as internal documentation of a program
b. Two types of Comments are
i. Single line Comment - Any content after // in a line will be considered as
comment
ii. Multiline comment - Any content within /* and */ are considered as
comments
6. Explain the operations involved in the following C++ expressions and write the output.
a. 5/2+3
i. Integer Division (5/2 → 2) and addition (2+3 →5)
ii. Output → 5
b. (10%3)/2.0
i. Mod (10%3 → 1) and division (1 / 2.0 →0.5)
ii. Output →0.5
7. Write sample statements in C++ for the cascading of input and output operators.
a. Input → cin>>a>>b>>c;
b. Output → cout<<”A = “<<a;
8. Write four different C++ statements to add 1 to the value stored in the variable Num.
a. num=num+1;
b. num+=1
c. num++;
d. ++num;
9. Identify six errors in the following C++ program and give a reason for each.
#include<iostream>
namespace using std;
int main()
{
int a; b;
cin<<a<<b;
a+b=s;
cout>>s;
}
Answer
#include<iostream>
namespace using std; →using namespace std;
int main()
{
int a; b; →int a,b;
cin<<a<<b; →cin>>a>>b;
a+b=s; →s=a+b;
cout>>s; →cout<<s;
}
3. Write a C++ program to find the sum of squares of first 10 odd numbers.
#include <iostream>
s=0;
for(i=1;i<=20;i++)
{
if(i%2==0)
cout<<i;
}
}
}
Answer
if(n==5)
cout<<"Excellent";
else if(n==4||n==3)
cout<<"Good";
else if(n==2)
cout<<"Average";
else if(n== 1)
cout<<"Poor"; break;
else
cout<<"Invalid";
10. DifferenTiate between Entry Controlled Loop and Exit controlled loop,
a. an entry-controlled loop. The condition is checked first and if it is found True the
body of the loop will be executed. That is the body will be executed as long as
the condition is True.
b. an exit controlled loop. If the test expression evaluates to False, the loop will be
terminated. Otherwise, the execution process will be continued.
11. Briefly explain conditional operator in C++.
a. Conditional operator (?:) a ternary operator.
b. It consists of symbols ? and : (a question mark and a colon).
c. It requires three operands to operate upon. It can be used as an alternative to
if...else statement.
d. Its general form is:
Test expression ? True_case code : False_case code;
e. The Test expression can be any relational or logical expression and True_case
code and False_case code can be constants, variables, expressions or
statement.
12. Compare switch statement and else if ladder
a. switch statement
i. Permits multiple branching.
ii. Evaluates conditions with equality operator only.
iii. Case constant must be an integer or a character type value.
iv. When no match is found, default statement is executed.
v. break statement is required for exit from the switch statement.
vi. More efficient when the same variable or expression is compared against
a set of values for equality.
b. else if ladder
i. Permits multiple branching.
ii. Evaluate any relational or logical expression.
iii. Condition may include range of values and floating point constants.
iv. When no expression evaluates to True, else block is executed.
v. Program control automatically goes out after the completion of a block.
vi. More flexible and versatile compared to switch.
v. Bridge
vi. Router
vii. Gateway
19. Write three parts of URL with an example
a. Network protocol (also called the scheme)
b. Domain name (Host name or address)
c. File name
d. For example, the URL http://www.dhsekerala.gov.in/index.html
e.
20. What is the full form of URL
a. Uniform Resource Locator.
21. What are the uses of ub, switch and bridge?
a. same network. It is a small, simple, passive and inexpensive device.
Computers/devices are connected to ports of the hub using Ethernet cable.
When NIC of one computer sends data packets to hub, the hub transmits the
packets to all other computers connected to it. Each computer is responsible for
determining its data packets.
b. A switch is an intelligent device that connects several computers to form a
network. It is a higher performance alternative to a hub. It looks exactly like a
hub. Switches are capable of determining the destination and redirect the data
only to the intended node. A switch performs better than a hub on busy networks,
since it generates less network traffic in delivering messages.
c. A bridge is a device used to segmentise a network. An existing network can be
split into different segments and can be interconnected using a bridge. This
reduces the amount of traffic on a network.
22. Name different topologies
a. Bus topology
b. Star topology
c. Ring Topology
d. Mesh Toplogy
23. What is the use of router?
a. A router is a device that can interconnect two networks of the same type using
the same protocol. It can find the optimal path for data packets to travel and
reduce the amount of traffic on a network.
24. Briefly describe TCP/IP Protocol
a. TCP/IP, Transmission Control Protocol/Internet Protocol, is a suite of
communications protocols used to interconnect network devices on the local
networks and the Internet.
b. TCP/IP defines rules for how electronic devices (like computers) should be
connected to the Internet and how data should be transmitted between them.
Figure shows the steps involved in the working of TCP/IP protocol. Delivery of
each of these packets to the right destinations is done by Internet protocol (IP).
Even though different packets of the same message may be routed differently,
they will reach the same destination and get reassembled there.
c. HTTP, FTP and DNS are three sub protocols of TCP/IP protocol
d.
Chapter 9 Internet
1. Pick the odd one out
a. Virus
b. Trojan Horse
c. Wikis
d. Worm
■ Answer : Wikis - All others are threat to computer devices
2. Explain various broadband connectivities available in the market. Suggest suitable web
browser.
a. Various broadband connectivies
■ Integrated Services Digital Network (ISDN)
■ Cable Internet
■ Digital Subscriber Line (DSL)
■ Leased Line
■ Fibre To The Home (FTTH)
b. Various web browsers are Google Chrome, Internet Explorer, Mozilla Firefox,
Opera, Safari
3. Which one of the following statements is not true for email
a. Email is environment friendly as it does not use paper.
b. Email will not spread any kind of virus
c. Email can be used to send same message simultaneously to many recipients
d. Email provides provision for attaching files like text, image, video or audio.
■ Answer : Email will not spread any kind of virus
4. List the bad effects if any in using social media.
a. Intrusion to privacy:
b. Addiction
c. Spread rumours
5. The small text files used by browsers to remember e-mail id, user name, etc. are known
as ..........
a. Cookies
6. Internet offers a variety of services and they are used widely around the world. a) One of
these services requires an address like [email protected]. Name this service and
write the reasons for the wide use of this service.
a. Email.
b. Advantages of using e-mail
■ Speed:
■ Easy to use:
■ Provision of attachments:
■ Environment friendly:
■ Reply to an
■ Cost-effective:
■ Available anywhere anytime:
7. Name the service which provides a list of websites containing information about a word
or a phrase.
a. Search Engine
8. List the hardware and software requirements for connecting computer to the Internet.
a. A computer with Network Interface Card (wired/wireless) facility and an operating
system that supports TCP/IP protocol
b. Modem
c. Telephone connection
d. An Internet account given by an Internet Service Provider (ISP)
e. Software like browser, client application for e-mail, chat, etc.
9. Find the odd one from the following :
a. Google Chrome
b. Android
c. Opera
d. Safari
■ Android is operating system. All others are web browsers
10. Define the terms :
a. Phishing - Phishing is an attempt to acquire information such as usernames,
passwords and credit card details by posing as the original website, mostly that
of banks and other financial institutions.
b. Hacking - hacking is a technical effort to manipulate the normal behavior of
network connections and connected systems. Hacking is performed both by
computer security experts and by computer criminals.
11. Explain cc and bcc sections of email
a. Cc (Carbon copy) – Write the e-mail addresses of the secondary recipients to
whom the message has to be sent.
b. Bcc (Blind carbon copy) – Write the e-mail addresses of the tertiary recipients
who receive the message. When the message is received the primary and
secondary recipients cannot see the email addresses of the tertiary recipients in
the message.
12. What is search engine? Write examples
a. Search engines select a list of URLs where the particular topic is found from the
index and displays it as the result.
b. Some of the most popular web search engine sites are Google, Bing, Yahoo
Search, Ask, etc
13. Who developed the idea of World Wide Web?
a. Tim Berners-Lee
14. Distinguish dial-up and wired broadband connection
a. Dial-up connection
■ Slow connection, speed upto 56 kbps
■ Requires dialing to connect to ISP
■ Uses telephone line exclusively
■ Uses dial-up modem
b. Wired broadband connection
Chapter 10 IT Applications
1. What is CSC ?
a. Common Service Centre
b. Front end delivery point that offers web enabled e-governance service in rural
area
2. Write types of interactions in e-governance.
a. G2G - Government to Government
b. G2C - Government to Citizens
c. G2B - Government to Business
d. G2E - Government to Employees
3. What is e-learning ? Write any two e-learning tools.
a. The use of electronic media and ICT in learning
i. Electronic Book reader
ii. E text
iii. Online chat
iv. E content
v. Educational TV Channel
4. Define e-Governance.
a. The application of ICT for delivering Government services to citizens in a
convenient, efficient and transparent manner
5. Write any three benefits of e-governance.
a. Leads to automation of government services, Strengthens democracy
b. More transparency in functioning by avoiding corruption
c. Makes every government department responsible
d. Saves unnecessary visits of the public to offices
6. Explain how ICT helps in business field
a. Overcomes geographical limitations
b. Reduces operational cost
c. Minimizes travel time and cost
d. It remains open all the time
e. We can locate the product quicker from a wider range of choices
7. Define the term teleconferencing
a. Meeting or conference held between two or more parties in remote locations by
the use of IT infrastructure and services
8. Write any two challenges for implementing e governance
a. Existing digital divide
b. Prone to cyber attack
c. Need huge initial investment
d. Resistance of people in sharing persona; details
e. Integrity of different Government departments
9. Explain advantages of e learning
a. Offers variety of courses from distant locations