0% found this document useful (0 votes)
21 views

Computer Science Xi Model Solution

Uploaded by

Rohit Acharya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
21 views

Computer Science Xi Model Solution

Uploaded by

Rohit Acharya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 19
____|o) speaver —_b) printer ©) monitor, @ mouse -|nthich of the phiowing is not. bus type? -| How to Yepresent | Boolean | F(uye Sy | in logic gate? —— + | Which h Operator “je used to enter the Gprmuta \n Excel xeel cell? oi seen ome Caer) cee _ MODEL ‘QUESTION __Issuéd by CDC Based 0 on new sylabus _ Groupa : Muttiple Choice Questions QicleThe lest alternatives — Which one Oy The Glowing is an input device? a) Address bus &) Data bus Onemory bus 4) Contolbus 9 =p- =>? > spe Which sche dulin y_algorifhan “allocates the cpu ) rsd a > The process Hot Yequests ‘the Cpu Du rst? a _ O 4 ) Brst- come, ist ‘served “scheduling b jority scheduling ic) shortest ach job | scheduling 4) Round. ro! — ———— - a ae ——— eC + | Which looping process Checks the 4est condition Ot ‘the end O% The loop? - 0) Serb) while © do-while 4) Nested loop an —_—___—__—-—___- tagd +| How -fo insert an Image in web page using HTML {joa {2 _b9 @aimg sser--7 ) ayers Oo small agile size? [9 PNG barr og Bmp Ouree -|Ithich o}, the Following te monitors user achrity On Infemel and transmit: That infpreation inthe background +o Jcomeone else 2 Lay Malware © Spyware, ©) Advoare ay Virus Graph [Give short answer -fo the 4gllowing questions. — 1.] Explain diqgerent types o% secone ‘omputer een: PYEM Aypes op secondary memory or computer :|Secondory memory is non-volatile memory whi progroms and instructions permanently. oo holds dafa, __|_Diggerent types a secondary memory of compuler Sysiem ave: 9| Magnetic memory Sf peels elie In Magnetic memory Fhe surgace 1S coaled with magneliesily Computer science

| Embedded CSS fin embedded CSS of Infernal style sheet should be use when a single document has a unique style. Internal styles are degned Inthe head Section with the tag. Nes _| fe exam ~ | ; : 5 | External css fin external CSS is used When entire document aie Took is to be changed. Exjernal css can do i by Just changing one gle. Each page must |nike +o The syle sheet using Theaink> tagrohich goes inside The head section For example: Zhead> < line vel="shylesheet” ‘type sl yext/css! » hrey =" mystyle: css) diferent components | ents multimedia ares - S Text, Th isthe he prittory c ‘component 0 multimedia. io. Mosh the information can be » presented with The [using various pnts, colours, styles or F exgects: J The ext can be combined toith other ynedia to enhance The. _[pesentaton >| Graprvcs : [A yaphic me medium fe a digital represeniation | ay non- yextal | Formation. When in! 4prmation is presented with graphics, 1 becomes more re eqgpctive and ‘interesting which retain For a long time in memory oy viewer. | Audio: [pris also on important Component oy multimedia. may be music, ‘Speech or any sound. Brudio combined with animation mates the ie eens ym F yideo presents tne moving images % real evenk Th the video, bot audio ond pichre are used. ‘the Information etoins in the memory % vi Eres asi 4 Diggerentioke between The do and awhile Soop. | [the do_andawhtle }oop are diqqerentiated below: whileds - }oop do—while Joop | Test - condition is evaluated | i. | Test condition }s evaluated caer the loopis executed | betpre the loop is executed Ini. eet js an entty Conbolled loop.|iijt+ Ig an exit controlled loop. { sii | 34 thas one \eeyword, while. fii] t+ has two Keywords, do and while: loop is not qerminated iv | oop ig ferminated with a with a semicolon. sem) colon for example: ypinclude stdio-h> int main C) i v-f Por example teinclude Zstdio-h> jn main Cd ‘int while (i<3) q print$("Anvpom\bys jtt5 finss| Cyber crime is a criminal activity ‘Tha Involves a | Tris highly recommended +o use di gerent username Suggest the prevention methods os eybererime [USE 25 compuler, nehwork ed device or a network Yr [committing | Megat act: such as stealing identities, violating Privacy, er. 4 is an ) Megalo act and should be prevented. T suggest “everyone to 4p! as prevention methods % cyber: Use Strong passwords: Jond_ password combination Fr digzerent accounts. Make the password stronger by combination a letlers, lew yek. Use > weak and crackable passwords such as names23 » I2LUS6AES , ete. Should be Secure Your “Mobile Devices: Jeol. 2 sol privaciel. a we should be aware i our mobile de ‘Vulnerable td viruses and hackers. Wsjallin “Opps | qrorn unsecured and unfwsied sites should be avoided. Aoi a Dont | ever click on sronge © links. Tg y ou “are, beig scammed asked to auld defails in greed oF mMobile~ liad con, ek, don't Bill it as They 0 are scammers and con Block spyware atlacks i preven) spyware aHacks by “Tnetatling anh - spyware Sofjfwore_on_ computer. Activate 2 step verigication kp ep verijeation Gonajh can cxccess your account: trey to access the account: without 1 your permission, You, wil) also be nohyed Vy someone | Groupe _ [Give Jong answer to the pttowing question *[ Explain computer architechire with block sagem and Gynctions O% Its components. 7 [the | overall |_design and Setup o% di qgerent ports “ports Ca compuley system is called compuser architecture. Tris |The concephial design and Gundamental | Operationa} _ Structure oa _compuier System. > [Registers] control unit f ~ ' frrithmetic £ Lagic | unit ig, Beck digrom of compet a [Components of computer system are: Tnpus vat a . _| She input unit Ie qormed by the input devices attached 4p computer which are used to inieract with compuler system. Keyboard | Mouse, ek. are some input demces- Functions = o inpul units ores a — o| TA accepis data and instruction yown user. Tr converts These data and. inshuction Into computer understan- dable Gprm and supply to The computer system 4pr_processing- | Central Processing unit Ccpu) cpu is the heart and brain o%, compuler: Ty per {pms all ghe processing related achvites, TH istme Compinaion oy three components ALU, CU and | Reaicters- ; a +] feithmeic and Logic unit (ALY) The main 4gynctions Rey ove! Tr accepts operands yom yegisters. Th perprms orithynetic and logical operations and yetur nc Yesuit Fo vegistey or memory: contro) unit (CU) The main Funchions % contol Unit ores Tr perurms data processing operation: | T+ sends control signal ty various porls ay compres | Tt gives command to input data Som input unit 7° memory unit to ALU and qranssprms result Yom ALU to memory unit yo output unit: : iL Tle aivel command 4 store date and insiuction 17 memo iii. | Registers yy Memory Unit (The main unchions _regiclers: are: Tt holds The address’ The active memory jocationg. T+ holds the current inshruction being e executed: Memory unit is used to shoe data or jnstruction dernpo- _ [v2 Primary memory and secondary memory. The Main Functions Op memory unit are: varily or r permaneniiy. Memory ig divided into > hoo types s Pamary memory storel data and inehuctions during processing. «| Secondary memory stores huge. data 4pr a longer period y_ hme. Tt 1s also used - 1 to ty o transger de date rom One corfipuler co another —— | output onit The, outpub unit provid eS the resut aryer Processing tne data to the “users: The output generated by the | compuler is oy two “hypen j-e- sofrcopy and hord copy outpul The main Sunction a output unit are: e | Tt provides yesult % processing to user T+ converfs the ep’ output jnto user understandable Format 7 OR.| Write onpre rom ‘vo input The elements a aK8 nein =a | pein Hs elements Properly using orgy. jaa - Ane: |// 8 pregrom to input the elements 0 4x2 matrix and print iis elements using array, On _ [int mab Cag Es]> prints ( "ENTER THE ELEMENTS OF MATRIX \n”)s 3145 Trt) eB) I prints (Enter data Qos Cadi C74): ”, 4,595 gcang (Wd”, & matrix CiILIT)5 4 print, ("yn The required 1x3 matrix is:\n")s Gp G=05 1645 Ve) : ra ; 3 , or (=05 6355+) 5 print (nat”, maar CILII)5 % i prinkg Cn”); _ Tetun 0; i a - Output * __ ENTER THE ELEMENTS | aS MATRIX. _ Enter data For CoTLoy __ Enter data apr CoyLt] Enter data 4r Toye 2: 3 “Enlerdata fpr [LI [oI : 4 __ Enter data “NT Tate S [Enter dota Fer T27 [1]: 8 lender data pr Ca} C2J: 9 | Enter data Gr (8ILOT: 10 Enter deo pr C3301] sr [Enter data pr C2j(2J 842 The vequired AxZ matrix ie: | | qe | + The given | gates. ave drawn below: _| Draw AND, OR, KOR and XNOR gates with truth table and logic gates. AND Crate Ti is on electronic circuit “which produces high output (1) wren an) inpuls Ove high. Otherwise, the output will be Jow/d). Z Logic Symbol + 9 —————_ A ivan w: r VFB B& Truth Table: a Inputs Output FHAB o — o 0 L 2 Th is on electronica circuit which produces high output wit - oe input te nigh(s cee [Truth Tables Me |XoR Gate (0) This an elechic circult which h produces. low output (0 when both inpuls ore same. otherwise, ‘the e output is high(._ Logic Symbol —— Truth Table _ xnor Gate Ty 3s_an electric civcuit which produces high outpur() then all inputs are either low (0) or highc1. a4 Logic Symbol : Y ja oT Truth Table: output F AB 9.8” BR “Inputs BA THE END

You might also like