Hsslive Xi Comp App Question Bank Thomas

Download as pdf or txt
Download as pdf or txt
You are on page 1of 35

Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.

in ®

Chapter 1 Principles of Data Processing


1. Meaningful and processed form of data is known as.
a. Information
2. If (11011)2 ,=(A)8 =(B)16=(C)10. Find the value of A. B and C.
a. A=33 B=1B C=27
3. "Central Processing Unit (CPU) is the brain of the computer". What is the role of the
Control Unit (CU) in the CPU?
a. Control Unit Controls all other units of a computer.
b. It obtains instructions from the program stored in the memory, interprets the
operation and issues signals to the unit concerned in the system to execute
them.
4. Data processing refers to the activities performed on data to generate information. List
the stages of data processing.
a. Capturing data
b. Input of data
c. Storage of data
d. Processing / manipulating data
e. Output of information
f. Distribution of information
5. CPU has three components. What are they?
a. ALU, CU and Registers
6. If the binary equivalent of 56 is (111000)2 find the 2’s complement form 1's complement
form, and the Sign & Magnitude form of –56 (negative 56) in 8 bits.
a. Sign Magnitude form 10111000
b. One’s Complement form 11000111
c. Two’s Complement form 11001000
7. Convert the number (198)10 into the other three number systems.
a. (11000110)2
b. (606)8
c. (C6)16
8. Fill in the blanks
a. (DA)16 = (11011010)2
b. (25)10= (31)8
9. Represent -35 in the following forms : (Hint : Use 8 bit 'form of representation).
a. Sign and rnagnitude 10100011
b. One's complement. 11011100
c. Two's complement. 11011101
10. The number of symbols used in a number system is called ........
a. Base
11. List down the functional units of a computer by using a diagram.
a. Input Unit
b. Output Unit
c. Central Processing Unit (CPU)

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

i. Arithmetic Logic Unit (ALU)


ii. Control Unit (CU)
d. Memory Unit
12. What are the advantages and Limitations of a computer? (Explain why computers are
considered as the best electronic data processing machines.)
a. Advantages
i. Speed
ii. Accuracy
iii. Diligence
iv. Versalatily
v. Huge Memory
b. Disadvantages
i. Lack of IQ
ii. Lack of decision making power
13. Write full form of JPEG
a. Joint Photographic Experts group
14. The base of hexadecimal number system is
a. 16
15. What are the methods for representing characters in memory?
a. ASCII
b. EBCDIC
c. Unicode
16. Find the two’s complement form of (100010)2
a. 11011101
17. Find the value of x, y, z in the following
a. (10101)2=(x)10 x=21
b. (107)8=(y)2 y=001000111
c. (351)10=(z)16 z=15F
18. Convert as directed
a. (AD5)16 = ( )10 2773
b. (1362)8 = ( )16 2F2
19. There are three methods for representing an integer in computer’s memory. What are
they?
a. Sign and Magnitude Form
b. One’s Complement Form
c. Two’s Complement Form

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 2 Components of Computer Systems


1. Mr. Rajmohan wants to buy a computer. He is an engineer by profession. He wants a
device which can be used to draw directly on the monitor screen
a. Suggest him an input device.
i. Light Pen
b. Suggest him any four practices of green computing.
i. Turn off computer when not in use
ii. Power on the peripherals only when needed
iii. Use power saver mode
iv. Use laptop computers
v. Take printouts only if necesssary
2. Explain any five commonly used secondary or (auxiliary) memory devices.
a. Magnetic Storage devices
i. Hard disk
b. Optical Storage devices
i. CD - Compact Disk
ii. DVD - Digital Versatile Disk
iii. Blu Ray Disk
c. Flash devices
i. Memory cards
ii. Pen drives
3. Given the names of some CPU registers. What are their uses
a. Accumulator
i. Store the data to perform arithmetic and logical operations
ii. Store results of arithmetic and logical operations
b. Instruction register (IR)
i. Store Instruction to be executed by the CPU
c. Memory Address Register (MAR)
i. Store Address of memory location where data has to be stored or read
d. Memory Buffer Register (MBR)
i. Store data that has to be stored or read in memory
e. Program counter (PC)
i. Holds address of next instruction to be performed
4. List E Waste disposal methods
a. Reuse
b. Incineration
c. Recycling of e waste
d. Land filling
5. What do you mean by utility software? List any four utility software with their use.
a. Set of programs which helps in system maintenance tasks and performing tasks
of routine nature
b. Compression tool - large files can be compressed so that they take less space
c. Disk defragmenter - Rearranges files on a computer hard disk to enable fast
efficient working of computer

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

d. Backup software - duplicating of disk information so that it can be used in the


event of file loss or disk failure
e. Antivirus software - Scans the computer to identify and remove malwares such
as virus
6. Which port is used to connect a projector to a computer?
a. VGA port
b. HDMI port
7. In an office, various kinds of reports and account statements are to be prepared. Name
the two types of software needed and explain how they satisfy the requirement.
a. Word processor software is used for creating reports
b. Spreadsheets are used to create account statements
8. Briefly describe the different types of memories used in computers.
a. Primary Memory
i. RAM
ii. ROM
b. Secondary Memory
i. Magnetic Storage devices
ii. Optical Storage devices
iii. Flash devices
9. Write the full form of HDMI.
a. High Definition Media Interface
b. High Definition Multimedia Interface
10. Compare RAM and ROM
a. RAM
i. Random Access Memory
ii. Volatile
iii. Store data and instructions of software
b. ROM
i. Read Only Memory
ii. Non volatile
iii. Store data and instruction for Computer start up
11. What do you mean by humanware? Give two examples
a. Humarware refers to human beings using computers
b. Different types of humanware
i. System Administrators
ii. System Managers
iii. System Analysts
iv. Database Administrators
v. Computer Engineers
vi. Computer Programmers
vii. Computer Operators
12. Explain freedoms defined by FSF for computers
a. Freedom 0 - Run program for any purpose

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

b. Freedom 1 - Study the working of a program by accessing source code and


modify it if necessary.
c. Freedom 2 - Freedom to distribute copies of software
d. Freedom 3 - Improve program and release improved versions for community
benefits
13. The program written in High Level Language
a. Source code
14. What are the major functions of operating system?
a. Processor management
b. Memory management
c. File management
d. Device management
15. Compare freeware and shareware
a. Freeware
i. Anyone can download from the Internet and use for free
ii. All features are free
iii. Can be distributed free of cost
b. Shareware
i. Provide users a chance to try software before buying
ii. All features are not available unless purchased
iii. May or may not be distributed depending on the policy of the author
16. Define the following terms
a. Compiler
i. Language processor that converts whole program in high level language
to machine language
b. Interpreter
i. Language processor that converts program in high level language to
machine language instruction by instruction
c. Assembler
i. Language processor that converts whole program in assembly language
to machine language
17. What is the importance of secondary storage devices in computers?
a. Secondary memory is permanent in nature
b. Size is much larger
c. Used for transferring data or programs from computer to computer
d. It acts as backups
18. Categorize the devices given below into input devices and output devices
a. Joystick - Input
b. Scanner - Input
c. Plotter - Output
d. Microphone - Input
e. Printer - Output
f. Mouse - Input
g. VDU - Output

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

h. Speaker - Output
19. Write the expanded for of GIGO
a. Garbage In Garbage Out
20. Which printer is widely used as portable printer? Why?
a. Thermal Printer is widely used as portable printer due to the following reasons
i. Small
ii. Lighter
iii. Consumes less power
21. ______ memory is a small and fast memory between the processor and RAM.
a. Cache
22. Write down the components of System Software.
a. Operating Systems
b. Language Processors
c. Utilities
23. Briefly explain any five input devices.
a. (Refer text for details)
24. Write the full form of MICR.
a. Magnetic Ink Character Reader
25. Write two examples for open source software.
a. GNU/Linux
b. GIMP
c. Mozilla Firefox
d. LibreOffice

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 3 Principles of Programming and Problem Solving


1. An algorithm is a finite sequence of instructions to solve a problem.
a. What are the characteristics of algorithm?
i. It should begin with instruction(s) to accept inputs.
ii. Use variables to refer the data,
iii. Each and every instruction should be precise and unambiguous.
iv. Each instruction must be sufficiently basic such that it can, in principle, be
carried out in finite time by a person with paper and pencil.
v. The total time to carry out all the steps in the algorithm must be finite.
vi. After performing the instructions given in the algorithm, the desired results
(outputs) must be obtained.
b. Pictorial representation of algorithm is called
i. Flowchart
2. Draw a flowchart to find the sum and average of even numbers between 1 and 99.

i.
3. Write short notes on importance of internal documentation
a. We can write comments in the source code as part of documentation. It is known
as internal documentation.
b. It helps the debugging process as well as program modification at a later stage.
c. If the program is documented, it will help to understand the logic we applied, the
reason why a particular statement has been used and so on.
4. Write an algorithm to print the multiples of 5 between 100 and 200 in descending order.
i. Start
ii. k=100
iii. If k mod 5 = 0 then output k
iv. k=k+1
v. If k<=200 go to step iii.
vi. Stop

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

5. Draw a flowchart to input three numbers and display the smallest.

i.
6. Errors may occur in two stages of programming.
a. Name these two stages. Explain the nature of errors in these stages.
i. Syntax errors result when the rules or syntax of the programming
language are not followed. Such program errors typically involve incorrect
punctuation, incorrect word sequence, undefined term, or illegal use of
terms or constructs.
ii. logical error, is due to improper planning of the program's logic.
iii. Run-time error will interrupt the program execution
b. The process of correcting these errors is known as .......
i. Debugging
7. Write short notes on the following
a. Coding
i. Once we have developed the skill to design algorithms and flowcharts,
the instructions are to be expressed in a programming language. The
process of writing program instructions to solve a problem is called
coding.
b. Debugging
i. Debugging is the stage where programming errors are discovered and
corrected. Programming errors are known as 'bugs' and the process of
detecting and correcting these errors is called debugging.
8. Explain two documentations in types of programming
a. Internal Documentation - We can write comments in the source code as part of
documentation. It is known as internal documentation.
b. External documentation - User manuals are hard copy documents that contain
functioning of the system, its requirements etc. and the procedure for installing
and using the programs. While developing software for various applications,

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

these manuals are mandatory. This kind of documentation is known as external


documentation.
9. Write any three advantages of flowcharts
a. Better communication:
b. Effective analysis:
c. Effective synthesis:
d. Efficient coding:
10. Explain any two limitations of flowchart
a. Flowcharts are very time consuming and laborious to draw with proper symbols
and spacing, especially for large complex algorithms.
b. Owing to the symbol-string nature of flowcharting, any change or modification in
the logic of the algorithm usually requires a completely new flowchart.
c. There are no standards determining the amount of detail that should be included
in a flowchart.
11. Consider the following algorithm
i. Start
ii. N=1
iii. Print N
iv. n=n+1
v. If N<=5 goto iii
vi. Stop
b. What is the output of the algorithm?
i. 12345
c. Draw flowchart for the algorithm

i.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

12. What are the stages involved in problem solving?

a.
13. Write an algorithm to find sum of two numbers
i. Start
ii. Input n1
iii. Input n2
iv. Sum=n1+n2
v. Output Sum
vi. Stop
14. Draw the flowchart to find the sum of two numbers.

i.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

15. Draw any two flowchart symbols

a.
16. Write an algorithm to find area of a rectangle (Area=length x breadth)
i. Start
ii. Input length
iii. Input breadth
iv. Area = length x breadth
v. Output area
vi. Stop

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 4 Getting Started with C++


1. In C++ which among the following is NOT a rule for a valid identifier.?
a. The first character must be a Ietter or underscore ( _ ).
b. White space and special characters are not allowed.
c. Keywords can be used as an identifier.
d. Upper and lower case can be treated differently.
i. C. Keywords can be used as an identifier.
2. What are tokens in C++? List types of tokens.
a. Tokens are fundamental building blocks of a program
b. Tokens are
i. Keywords
ii. Identifiers
iii. Literals
iv. Operators
v. Punctuators
3. Which of the following is not a character constant in C++?
a. ‘a’
b. a
c. ‘8’
d. ‘\a’
i. b. a
4. The following are invalid identifiers in C++. Write a reason for each.
a. Id# - Special character used
b. void - keyword
c. 2ab - starting with digit
d. avg hgt- blank space used
5. What is the escape sequence character for new line in C++ program?
a. ‘\n’
6. The starting sYmbol of a preprocessor directive statement is .........
a. #
7. Differentiate between character literal and string literal.
a. Single character enclosed in single quotes that never changes its value during
the program run is a character literal or character constant.
b. A sequence of one or more characters enclosed within a pair of double quotes is
called string constant.
8.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 5 Data Types and Operators


1. Memory requirement of void data type in C++ is .......... byte(s).
a. 0 bytes
2. Explain the different types of logical operators in C++.
a. Explanation of logical and (&&)
b. Explanation of logical or (||)
c. Explanation of logical not (!)
i. Refer notes
3. Distinguish between float and double data type in C++.
a. float
i. Numbers with a fractional part are called floating point numbers.
ii. GCC allows 4 bytes of memory for numbers belonging to float data type.
iii. The numbers of this data type has normally a precision of 7 digits.
b. Double
i. floating point numbers require more precision are represented by double
data type
ii. GCC reserves 8 bytes for storing a double precision value.
iii. The precision of double data type is generally 15 digits.
4. What is a variabie? Differentiate between memory address and content of the variable.
a. Variables are the names given to memory locations.
b. The base address of a variable is the starting address of the allocated memory
space. The address is also called the L-value of a variable.
c. The value stored in the location is called content of the variable. This is also
called the R-value of the variable.
5. Given that x=5 and y=5. What will be the value of expression x>y||y>x
a. 0 or false
6. What is the difference between x=5 and x==5
a. x=5 assigns constant value 5 to variable x
b. x==5 verifies whether variable x contains value 5
7. Write value returned by the following C++ expressions.
a. 60%25
i. 10
b. 22/7
i. 3
8. List the three numeric data types in C++ with an example for each.
a. int → int a=6;
b. float → float b=7.23;
c. double → double c-8.00304;
9. What is statement? Explain statements in C++.
a. Declaration statements
i. Every user-defined word should be defined in the program before it is
used.
ii. The syntax of variable declaration is:

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

data_type <variable1>[, <variable2>, <variable3>, ...] ;


b. Assignment statements
i. When the assignment operator (=) is used to assign a value to a variable,
it forms an assignment statement. It can take any of the following syntax:
1. variable = constant;
2. variable1 = variable2;
3. variable = expression;
c. Input statements
i. allows the user to store data in the memory during the execution of the
program.
ii. get from or extraction operator (>>) specifies the input operation.
iii. cin >> num;
d. Output statements
i. make the results available to the users through any output device.
ii. put to or insertion operator (<<) is used to specify this operation.
iii. Examples
1. cout << num;
2. cout << "hello friends";
3. cout << num+12;
e. Control Statements
i. If
ii. Switch
iii. For
iv. While
v. do-while
10. What is operator? Classify the operators based on number of operands.
a. Operators are tokens constituted by predefined symbols that can trigger
computer to carry out operations. The participants of an operation are called
operands. An operand may be either a constant or a variable.
b. Unary operators - A unary operator operates on a single operand. Commonly
used unary operators are unary+ (positive) and unary- (negative).
c. Binary operators - Binary operators operate on two operands. Arithmetic
operators, relational operators, logical operators, etc. are the commonly used
binary operators.
d. Ternary operator operates on three operands. The typical example is the
conditional operator (?:).
11. Find the output of the following operations if x=-11 and Y=3
a. -x+-y →-14
b. x%-y →2
c. x % -11 →0
d. (x>y) && (x<y) →false
e. ! (x<y) →false
f. x * y →-33
12. Write short notes on data types in C++.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

a. Data types are the means to identify the nature of the data and the set of
operations that can be performed on the data.
b. C++ data types

i.
ii. Fundamental data types
1. Fundamental data types are defined in C++ compiler.
2. They are also known as built-in data types.
3. They are atomic in nature and cannot be further broken into small
units.
4. The Five fundamental data types in C++ are char , int , float ,
double and void .
5. Among these, int and char come under integral data type as they
can handle only integers.
6. The numbers with fractions (real numbers) are generally known as
floating type and are further divided into float and double based on
precision and range.
iii. User-defined data types
1. C++ is flexible enough to allow programmers to define their own
data types.
iv. Derived data types
1. Derived data types are constructed from fundamental data types
through some grouping or alteration in the size.
13. Which is the keyword used for empty data types?
a. Void
14. Consider the following C++ code. Write output of the code. Justify the answer
int x=5,y=2;
float z;
z=x/y;
cout<<z;
Answer
Output - 2
Since x and y are int data division is also generates int data only.
15. What is variable initilisation ? Write example.
a. Assigning value to a variable while it is declared.
b. Example
i. int a=6;

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 6 Introduction to Programming


1. The arithmetic assignment operation Y/=10 is equivalent to …
a. Y=10
b. Y=Y+10
c. Y=Y/10
d. none of these
i. C. Y=Y/10
2. What is implicit type conversion? Why it is called type promotion?
a. In expressions where different types of data are involved, C++ converts the lower
sized operands to the data type of highest sized operand.
b. Since the conversion is always from lower type to higher, it is also known as type
promotion
3. The following program finds the sum of three numbers. Modify the program to find the
average. (Average should dispIay fractional part also).
#include<iostream>
using nalnespace std;
int main ( )
{
int x ,Y , z, result;
cout<<"Enter values f or x ,Y, z" ;
cin>>x>>P>z;
result=x+y+z;
cout<<"The answer is ="<<result;
return 0;
}
Answer
#include<iostream>
using nalnespace std;
int main ( )
{
float x ,Y , z, result, average;
cout<<"Enter values f or x ,Y, z" ;
cin>>x>>P>z;
result=x+y+z;
average=result/3;
cout<<"The answer is ="<<result;
cout<<"The average is ="<<average;
return 0;
}

4. Which one of the following is not a valid C++ component?


a. x=x+10;
b. x+=10;

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

c. x+10=x;
d. x=10+x;
i. c. x+10=x;
5. Comments in a program are ignored by the compiler. Then why we are including
comments in a program? What are the different methods of comments
a. Comments are used as internal documentation of a program
b. Two types of Comments are
i. Single line Comment - Any content after // in a line will be considered as
comment
ii. Multiline comment - Any content within /* and */ are considered as
comments
6. Explain the operations involved in the following C++ expressions and write the output.
a. 5/2+3
i. Integer Division (5/2 → 2) and addition (2+3 →5)
ii. Output → 5
b. (10%3)/2.0
i. Mod (10%3 → 1) and division (1 / 2.0 →0.5)
ii. Output →0.5
7. Write sample statements in C++ for the cascading of input and output operators.
a. Input → cin>>a>>b>>c;
b. Output → cout<<”A = “<<a;
8. Write four different C++ statements to add 1 to the value stored in the variable Num.
a. num=num+1;
b. num+=1
c. num++;
d. ++num;
9. Identify six errors in the following C++ program and give a reason for each.
#include<iostream>
namespace using std;
int main()
{
int a; b;
cin<<a<<b;
a+b=s;
cout>>s;
}
Answer
#include<iostream>
namespace using std; →using namespace std;
int main()
{
int a; b; →int a,b;
cin<<a<<b; →cin>>a>>b;
a+b=s; →s=a+b;

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

cout>>s; →cout<<s;
}

10. C++ program execution starts and ends in …. Function


a. main()
11. Briefly explain any expressions in C++.
a. An expression is composed of operators and operands. The operands may be
either constants or variables. All expressions can be evaluated to get a result.
b. An expression in which only arithmetic operators are used is called arithmetic
expression.
i. If an arithmetic expression contains only integer operands, it is called
integer expression and it produces integer result after performing all the
operations given in the expression.
ii. An arithmetic expression that is composed of only floating point data is
called floating point or real expression and it returns a floating point result
c. When relational operators are used in an expression, it is called relational
expression and it produces Boolean type results like True (1) or False (0).
d. Logical expressions combine two or more relational expressions with logical
operators and produce either True or False as the result. A logical expression
may contain constants, variables, logical operators and relational operators.
12. Consider the structure of C++ program given below and answer the following question.
#include<iostream>
using namespace std;
int main()
{
Statements;
:
}
a. Which is the preprocessor directive statement
i. #include<iostream>
b. Explain The use of header files in a program
i. Header files contain the information about functions, objects and
predefined derived data types and are available along with compiler.
There are a number of such files to support C++ programs and they are
kept in the standard library.
13. List out type modifiers in C++.
a. type modifiers alter the size, range or precision.
b. Important modifiers are signed , unsigned , long and short .
c.
14. What is constant? Write the keyword for constant declaration in C++. Give an example.
a. Constants are values that never changes during program execution
b. const is used declare constants
c. Example
i. const int a=10;

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

15. Rewrite the operation a=a+10; using arithmetic assignment operator


a. a+=10;
16. Explain the importance of main() function in C++.
a. Every C++ program consists of a function named main() .
b. The execution starts at main() and ends within main() .
c. If we use any other function in the program, it is called (or invoked) from main() .
17. Differentiate Type Promotion and Type Casting.
a. Implicit type conversion (Type promotion)
i. Implicit type conversion is performed by C++ compiler internally.
ii. In expressions where different types of data are involved, C++ converts
the lower sized operands to the data type of highest sized operand.
b. Explicit type conversion (Type casting)
i. This is done by the programmer by specifying the data type within
parentheses to the left of the operand.
18. Write a C++ program to find sum of two given numbers.
#include<iostream>
using namespace std;
int main()
{
int a, b;
cin>>a>>b;
s=a+b;
cout<<s;
}

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 7 Control Statements


1. The following code segment prints first 10 natural numbers
int n=1;
while (n<=10)
{
cout<<n<< “ “;
++n;
}
a)Modify the program to print first 100 natural numbers.
int n=1;
while (n<=100)
{
cout<<n<< “ “;
++n;
}

b) Rewrite the above code using for loop.


for(n=1;n<=10;++n)
{
cout<<n<< “ “;
}
2. Write a C++ program to check whether a given year is a leap year or not.
#include <iostream>
using namespace std;
int main()
{
int year ;
cout << "Enter year (in 4-digits): ";
cin >> year;
if (year % 100 == 0)
{
cout << "Leap Year\n" ;
else
cout<< "Not a leap year\n" ;
}
else if (year % 4 == 0)
cout << "Leap Year\n" ;
else
cout<< "Not a leap year\n" ;
}

3. Write a C++ program to find the sum of squares of first 10 odd numbers.
#include <iostream>

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

using namespace std;


Int main()
{
int n,i,s;
s=0;
for(i=1;i<=20;i++)
{
if(i%2==0)
s=s+i*i;
}
cout<<s;
}
4. Rewrite the following C++ statement using if
cout<<(n%2==0?”Even”:”Odd”;
Answer
if(n%2==0)
cout<<”Even”;
else
cout<<”Odd”;
5. Explain Elements of a loop with suitable examples
a. Initialisation: During initialisation, the loop control variable gets its first value. The
initialisation statement is executed only once, at the beginning of the loop.
b. Test expression: It is a relational or logical expression whose value is either True
or False. It decides whether the loop-body will be executed or not. If the test
expression evaluates to True, the loop-body gets executed, otherwise it will not
be executed.
c. Update statement: The update statement modifies the loop control variable by
changing its value. The update statement is executed before the next iteration.
d. Body of the loop: The statements that need to be executed repeatedly constitute
the body of the loop. It may be a simple statement or a compound statement.
e. Example
k=1; //Initialisation
while(k<10) //Test Expression
{
cout<<k; // body of the loop
k++; // update statement
}

6. Write a C++ program to print first 10 even numbers


#include <iostream>
using namespace std;
Int main()
{
int n,i;

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

s=0;
for(i=1;i<=20;i++)
{
if(i%2==0)
cout<<i;
}
}

7. There are three looping statements in C++.


a. Which is the exit-controlled loop?
i. do-while
b. How does it differ from an entry controlled loop?
i. In entry controlled loop the initialisation of the loop control variable takes
place first. Then the test expression is evaluated. If it returns True the
body of the loop is executed.
8. Write a C++ program to input the amount of sales and calculate the discount amount
based on the criteria given in the table.
Amount of sale Discount rate
25,000 and above 10%
10,000 and above,but below 25,000 7%
Below 10,000 No discount
#include<iostream>
using namespace std;
int main()
{
int sales,discount;
cin>>sales;
if(sales>=25000)
discount=sales*10/100;
else if(sales>=10000)
discount=sales*7/100;
else
discount=0;
cout<<discount;
}
9. Rewrite the following switch statement using if – else if statement :
switch (n)
{
case 5 : cout<<"Excellent"; break;
case 4 :
case 3 : cout<<"Good"; break;
case 2 : cout<<"Average"; break:
case 1 : cout<<"Poor"; break;
default : cout<<"Invalid";

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

}
Answer
if(n==5)
cout<<"Excellent";
else if(n==4||n==3)
cout<<"Good";
else if(n==2)
cout<<"Average";
else if(n== 1)
cout<<"Poor"; break;
else
cout<<"Invalid";
10. DifferenTiate between Entry Controlled Loop and Exit controlled loop,
a. an entry-controlled loop. The condition is checked first and if it is found True the
body of the loop will be executed. That is the body will be executed as long as
the condition is True.
b. an exit controlled loop. If the test expression evaluates to False, the loop will be
terminated. Otherwise, the execution process will be continued.
11. Briefly explain conditional operator in C++.
a. Conditional operator (?:) a ternary operator.
b. It consists of symbols ? and : (a question mark and a colon).
c. It requires three operands to operate upon. It can be used as an alternative to
if...else statement.
d. Its general form is:
Test expression ? True_case code : False_case code;
e. The Test expression can be any relational or logical expression and True_case
code and False_case code can be constants, variables, expressions or
statement.
12. Compare switch statement and else if ladder
a. switch statement
i. Permits multiple branching.
ii. Evaluates conditions with equality operator only.
iii. Case constant must be an integer or a character type value.
iv. When no match is found, default statement is executed.
v. break statement is required for exit from the switch statement.
vi. More efficient when the same variable or expression is compared against
a set of values for equality.
b. else if ladder
i. Permits multiple branching.
ii. Evaluate any relational or logical expression.
iii. Condition may include range of values and floating point constants.
iv. When no expression evaluates to True, else block is executed.
v. Program control automatically goes out after the completion of a block.
vi. More flexible and versatile compared to switch.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

13. Consider the following C++ code :


int n=1;
while (n<=10)
{
cout<<n<<" ";
++n;
}
a. Write the output of the code.
i. 1 2 3 4 5 6 7 8 9 10
b. Rewrite the above code using for loop.

for (int n=1;n<=10;++n;)


{
cout<<n<<" ";
}

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 8 Computer Networks

1. Client server architecture is an example of centralised software management. Justify


a. When software is loaded on the server and shared among the clients, changes
made to the software in the server will reflect in the clients also. So there is no
need to spend time and energy for installing updates and tracking files
independently on the clients.
2. Compare ring topology and mesh topology
a. In ring topology,
i. all nodes are connected using a cable that loops in a ring or circle.
ii. It is in the form of a circle that has no start and no end
iii. Terminators are not necessary in a ring topology.
iv. Data travels only in one direction in a ring.
v. If one node fails, entire network will fail.
b. In mesh topology,
i. every node is connected to other nodes.
ii. So there will be more than one path between two nodes
iii. If one path fails, the data will take another path and reach the destination.
3. Match the following
4.
A B
Unguided Media Org
Generic domain name Coaxial cable
Guided media Microwave
Protocol http
a. Unguided Media - Microwave
b. Generic Domain Name - org
c. Guided media - Coaxial Cable
d. Protocol - http
5. What is the name of topology where all computers are connected to a central hub/switch
a. Star
6. List any four advantages of forming computer networks
a. Resource sharing
b. Price-performance ratio
c. Communication
d. Reliability
e. Scalability
7. Define the following terms related to computer networks
a. Node -Any device (computer, scanner, printer, etc.) which is directly connected to
a computer network is called a node.
b. Bandwidth - Bandwidth measures the amount of data that can be sent over a
specific connection in a given amount of time

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

c. Noice - Noise is unwanted electrical or electromagnetic energy that lowers


d. the quality of data signals.
8. In a communication system the term source refers to .........
a. Origin / sender / transmitter
9. HTTP stands for ................. Protocol
a. Hypertext Transfer Protocol
10. Name the communication device that allows to connect and communicate with other
computers through telephone line
a. Modem
11. How is a WAN different from LAN?
a. LAN is a network of computing and communicating devices in a room, building,
or campus. It can cover an area of radius with a few meters to a few Kilometers.
A networked office building, school or home usually contains a single LAN, LAN
can be set up using wired media (UTP cables, coaxial cables, etc.) or wireless
media (infrared, radio waves, etc.). If a LAN is setup using unguided media, it is
known as WLAN (Wireless LAN).
b. WAN is a network of computing and communicating devices crossing the limits of
a city, country or continent. It can cover an area of over hundreds of Kilometers in
radius. WAN usually contain a number of interconnected individual computers,
LANs, MANs and maybe other WANs. All types of communication media (guided
and unguided) are used to set up a WAN
12. Choose a data terminal Equipment (DTE) from the following options
a. Bridge
b. Modem
c. Router
d. Gateway
i. Modem
13. Communication media is generally divided into two – wired and wireless media.
a. Give an example of wireless medium
i. radio waves, microwaves or infrared signals
b. Compare the characteristics of three types of wired media.
i. Characteristics of UTP cable
1. • Low cost cable available for setting up small networks.
2. • Thin and flexible cable.
3. • Ease of installation.
4. • Carries data upto a length of 100 m at a stretch.
ii. Characteristics of STP cable
1. • Shielding in STP offers better immunity against noise.
2. • It is more expensive than UTP cable.
3. • Compared to UTP cable, STP cable is difficult to install.
iii. Characteristics of coaxial cable
1. • Carries data to longer distances (185 m - 500 m) at a stretch.
2. • High bandwidth.
3. • Less electromagnetic interference due to the outer shield.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

4. • Thicker than twisted pair.


5. • Less flexible than twisted pair.
6. • Difficult to install than twisted pair cable.
iv. Characteristics of optical fibre cable
1. • High bandwidth for voice, video and data applications
2. • Carries data over a very long distance at a stretch.
3. • Not susceptible to electromagnetic fields, as it uses light for data
transmission.
4. • The most expensive and the most efficient communication media
available for computer networks.
5. • Installation and maintenance are difficult and complex.
14. What is the importance of TCP/IP protocol in computer networks?
a. TCP/IP, Transmission Control Protocol/Internet Protocol, is a suite of
communications protocols used to interconnect network devices on the local
networks and the Internet. TCP/IP defines rules for how electronic devices (like
computers) should be connected to the Internet and how data should be
transmitted between them.
15. Define the term topology
a. The way in which the nodes are physically interconnected to form a network is
called a Topology
16. Consider that your principal has decided to network your computer lab. Which topology
will you suggest?
a. Star / Tree
17. Differentiate hub and switch
a. A hub is a device used in a wired network to connect computers/devices of the
same network. It is a small, simple, passive and inexpensive device.
Computers/devices are connected to ports of the hub using Ethernet cable.
When NIC of one computer sends data packets to hub, the hub transmits the
packets to all other computers connected to it. Each computer is responsible for
determining its data packets.
b. A switch is an intelligent device that connects several computers to form a
network. It is a higher performance alternative to a hub. It looks exactly like a
hub. Switches are capable of determining the destination and redirect the data
only to the intended node. A switch performs better than a hub on busy networks,
since it generates less network traffic in delivering messages.
18. Computer network has an important role in modern communication
a. What is data communication?
i. Data communication is the exchange of digital data between any two
devices through a medium of transmission.
b. List any four data communication devices
i. Network Interface Card (NIC)
ii. Hub
iii. Switch
iv. Repeater

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

v. Bridge
vi. Router
vii. Gateway
19. Write three parts of URL with an example
a. Network protocol (also called the scheme)
b. Domain name (Host name or address)
c. File name
d. For example, the URL http://www.dhsekerala.gov.in/index.html

e.
20. What is the full form of URL
a. Uniform Resource Locator.
21. What are the uses of ub, switch and bridge?
a. same network. It is a small, simple, passive and inexpensive device.
Computers/devices are connected to ports of the hub using Ethernet cable.
When NIC of one computer sends data packets to hub, the hub transmits the
packets to all other computers connected to it. Each computer is responsible for
determining its data packets.
b. A switch is an intelligent device that connects several computers to form a
network. It is a higher performance alternative to a hub. It looks exactly like a
hub. Switches are capable of determining the destination and redirect the data
only to the intended node. A switch performs better than a hub on busy networks,
since it generates less network traffic in delivering messages.
c. A bridge is a device used to segmentise a network. An existing network can be
split into different segments and can be interconnected using a bridge. This
reduces the amount of traffic on a network.
22. Name different topologies

a. Bus topology

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

b. Star topology

c. Ring Topology

d. Mesh Toplogy
23. What is the use of router?
a. A router is a device that can interconnect two networks of the same type using
the same protocol. It can find the optimal path for data packets to travel and
reduce the amount of traffic on a network.
24. Briefly describe TCP/IP Protocol
a. TCP/IP, Transmission Control Protocol/Internet Protocol, is a suite of
communications protocols used to interconnect network devices on the local
networks and the Internet.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

b. TCP/IP defines rules for how electronic devices (like computers) should be
connected to the Internet and how data should be transmitted between them.
Figure shows the steps involved in the working of TCP/IP protocol. Delivery of
each of these packets to the right destinations is done by Internet protocol (IP).
Even though different packets of the same message may be routed differently,
they will reach the same destination and get reassembled there.
c. HTTP, FTP and DNS are three sub protocols of TCP/IP protocol

d.

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 9 Internet
1. Pick the odd one out
a. Virus
b. Trojan Horse
c. Wikis
d. Worm
■ Answer : Wikis - All others are threat to computer devices
2. Explain various broadband connectivities available in the market. Suggest suitable web
browser.
a. Various broadband connectivies
■ Integrated Services Digital Network (ISDN)
■ Cable Internet
■ Digital Subscriber Line (DSL)
■ Leased Line
■ Fibre To The Home (FTTH)
b. Various web browsers are Google Chrome, Internet Explorer, Mozilla Firefox,
Opera, Safari
3. Which one of the following statements is not true for email
a. Email is environment friendly as it does not use paper.
b. Email will not spread any kind of virus
c. Email can be used to send same message simultaneously to many recipients
d. Email provides provision for attaching files like text, image, video or audio.
■ Answer : Email will not spread any kind of virus
4. List the bad effects if any in using social media.
a. Intrusion to privacy:
b. Addiction
c. Spread rumours
5. The small text files used by browsers to remember e-mail id, user name, etc. are known
as ..........
a. Cookies
6. Internet offers a variety of services and they are used widely around the world. a) One of
these services requires an address like [email protected]. Name this service and
write the reasons for the wide use of this service.
a. Email.
b. Advantages of using e-mail
■ Speed:
■ Easy to use:
■ Provision of attachments:
■ Environment friendly:
■ Reply to an
■ Cost-effective:
■ Available anywhere anytime:

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

7. Name the service which provides a list of websites containing information about a word
or a phrase.
a. Search Engine
8. List the hardware and software requirements for connecting computer to the Internet.
a. A computer with Network Interface Card (wired/wireless) facility and an operating
system that supports TCP/IP protocol
b. Modem
c. Telephone connection
d. An Internet account given by an Internet Service Provider (ISP)
e. Software like browser, client application for e-mail, chat, etc.
9. Find the odd one from the following :
a. Google Chrome
b. Android
c. Opera
d. Safari
■ Android is operating system. All others are web browsers
10. Define the terms :
a. Phishing - Phishing is an attempt to acquire information such as usernames,
passwords and credit card details by posing as the original website, mostly that
of banks and other financial institutions.
b. Hacking - hacking is a technical effort to manipulate the normal behavior of
network connections and connected systems. Hacking is performed both by
computer security experts and by computer criminals.
11. Explain cc and bcc sections of email
a. Cc (Carbon copy) – Write the e-mail addresses of the secondary recipients to
whom the message has to be sent.
b. Bcc (Blind carbon copy) – Write the e-mail addresses of the tertiary recipients
who receive the message. When the message is received the primary and
secondary recipients cannot see the email addresses of the tertiary recipients in
the message.
12. What is search engine? Write examples
a. Search engines select a list of URLs where the particular topic is found from the
index and displays it as the result.
b. Some of the most popular web search engine sites are Google, Bing, Yahoo
Search, Ask, etc
13. Who developed the idea of World Wide Web?
a. Tim Berners-Lee
14. Distinguish dial-up and wired broadband connection
a. Dial-up connection
■ Slow connection, speed upto 56 kbps
■ Requires dialing to connect to ISP
■ Uses telephone line exclusively
■ Uses dial-up modem
b. Wired broadband connection

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

■ High speed connection, speed usually higher than 256 kbps


■ Always on connection
■ Simultaneous use of voice and Internet
■ Uses broadband modem
15. Write classification of social media.
a. Internet forums
b. Social blogs
c. Microblogs
d. Wikis
e. Social networks
f. Content communities

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

Chapter 10 IT Applications
1. What is CSC ?
a. Common Service Centre
b. Front end delivery point that offers web enabled e-governance service in rural
area
2. Write types of interactions in e-governance.
a. G2G - Government to Government
b. G2C - Government to Citizens
c. G2B - Government to Business
d. G2E - Government to Employees
3. What is e-learning ? Write any two e-learning tools.
a. The use of electronic media and ICT in learning
i. Electronic Book reader
ii. E text
iii. Online chat
iv. E content
v. Educational TV Channel
4. Define e-Governance.
a. The application of ICT for delivering Government services to citizens in a
convenient, efficient and transparent manner
5. Write any three benefits of e-governance.
a. Leads to automation of government services, Strengthens democracy
b. More transparency in functioning by avoiding corruption
c. Makes every government department responsible
d. Saves unnecessary visits of the public to offices
6. Explain how ICT helps in business field
a. Overcomes geographical limitations
b. Reduces operational cost
c. Minimizes travel time and cost
d. It remains open all the time
e. We can locate the product quicker from a wider range of choices
7. Define the term teleconferencing
a. Meeting or conference held between two or more parties in remote locations by
the use of IT infrastructure and services
8. Write any two challenges for implementing e governance
a. Existing digital divide
b. Prone to cyber attack
c. Need huge initial investment
d. Resistance of people in sharing persona; details
e. Integrity of different Government departments
9. Explain advantages of e learning
a. Offers variety of courses from distant locations

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally


Join Telegram Channel: https://t.me/hsslive Downloaded from www.Hsslive.in ®

b. Saves journey time and money, instruction fees etc


c. Time and place is not a constraint
10. Write names of any ecommerce web sites
a. www.amazon.in
b. www.flipcart.com
c. www.snapdeal.com
d. www.meesho.com

Thomas Varghese, HSST Computer Science, Govt Boys HSS Puthuppally

You might also like