Computer Science
Computer Science
nh?kZmRrjh;
nh?kZmRrjh;
nh?kZmRrjh;
nh?kZmRrjh;
Yk?kqÙkjkRed
Yk?kqÙkjkRed
Yk?kqÙkjkRed
Yk?kqÙkjkRed
fucU/kRed
fucU/kRed
fucU/kRed
fucU/kRed
oLrqfu"B
oLrqfu"B
oLrqfu"B
oLrqfu"B
vfr-y?kq
vfr-y?kq
vfr-y?kq
vfr-y?kw
1 EXCEPTION HANDLING IN 1(1) 2(2) 1.5(1) 4.5(4)
PYTHON
2 FILE HANDLING IN PYTHON 2(2) 1(1) 1.5(1) 4.5(4)
;ksx %& 13(13) 1.5(1) 3(3) 5(5) 9(6) 1.5(1) 6(4) 6(2) 3(1) 8(2) 56(38)
fodYiksa dh ;kstuk %& iz-la- 19 o 20 esa ,dkfUrd vkarfjd fodYi gS uksV %& dks"Bd esa ckgj dh la[;k vadksa dh rFkk Hkhrj iz'uksa dh |ksrd gSA
funsZ’k %& iz'u i= 01 esa 9 iz'u lekfgr gSA
iz'u i= 02 esa 4 iz'u lekfgr gSA
iz'u i= 03 esa 8 iz'u lekfgr gSA
ekè;fed f'k{kk c¨MZ] jktLFkku vtesj
e‚My ç'u&i= & 2023
d{kk&12
Computer Science
le; % 3 ÄaVk 15 feuV vad % 56
[k.M&v
SECTION-A
1. (i) tc izksxzke dks ju djrs le; error vkrh gS rks Exception gS---------------------------- 1
(v) Created (c) Asserted
(l) Triggered (n) Raised
When an error occurs during the execution of a Program, an exception is said to have been ........................
(a) Created (b) Asserted
(c) Triggered (d) Raised
(ii) Readlines ( ) eSFkM okil nsrk gS-------------------------- 1
(v) String (c) List
(l) Dictionary (n) Tuple
Readlines( ) method return ...................................
(a) String (b) List
(c) Dictionary (d) Tuple
(iii) Stack esa u;s elements dks TOP esa tksM+us dks dgrs gSaA 1
(v) POP (c) PUSH
(l) INSERT (n) (a) (and (b) both
.............. adds a new elements at the TOP of the stack.
(a) POP (b) PUSH
(c) INSERT (d) (a) (and (b) both
(iv) lkekU;r% Storage fMokbl gSA 1
(v) Hard disk (c) SSD
(l) Pen drive (n) all of the above
Commonly used storage devices.
(a) Hard disk (b) SSD
(c) Pen drive (d) all of the above
(v) fuEu esa ls MkVkcsl ds xq.k gS & 1
(v) MkVkcsl okLrfod nqfu;k ds dqN igyw dk izfrfuf/kRo djrk gSaA ftls feuh oYMZ Hkh dgk tkrk gSA
(c) ;g fof'k"V mn~ns'; ds fy, MsVK dks fMtkbu djuk] cukuk vkSj laxzg fd;k tkrk gSA
(l) ;g fdlh Hkh vkdkj vkSj tfVyrk dk gks ldrk gSA
¼n½ mijksDr lHkhA
Which of the following properties belong to the database.
(a) A database is a representation of some aspect of the real world also called mini world.
(b) It is designed, built and populated with data for specific purpose.
(c) It can be of any size and complexity
(d) All of the above.
(vi) SQL esa fdl dek.M ls Vscy laxzg ds xq.kksa dks cnyk tk ldrk gSA 1
(v) Alter Table (c) Modify Table
(l) Change Table (n) Hide Table
In SQL, which command is used to change a tables storage characteristics?
(a) Alter Table (b) Modify Table
(c) Change Table (d) Hide Table
(vii) A computer Network- 1
(v) ;g dEI;wVj ds gkMZos;j vkSj mlds ?kVdksa dk laxzg gSA
(c) ;g lapkj pSuy }kjk ijLij twMs+ gq;s gSA
(l) lalk/kuksa vkSj lwpukvksa dks lk>k djus dh vuqefr nsrk gSA
¼n½ mijksDr lHkhA
A computer Network-
(a) It is a collection of hardware components and Computer?
(b) It is interconnected by communication channels.
(c) Allows sharing of resources and information
(d) All of the above
(viii) Bandwidth dks ekik tkrk gS& 1
(v) Byte per second (c) Bit per second
(l) Hertz (n) Amperes
Bandwidth is measured in –
(a) Byte per second (b) Bit per second
(c) Hertz (d) Amperes
(ix) Malware dh igpku djsa tks fdlh laØe.k ds ek/;e ls izfrd`fr ;k Dyksu ugha cukrk gSA 1
(v) Trojans (c) Worms
(l) Rookits (n) Virus
Identify the malware which does not replicate or clone through an infections
(a) Trojans (b) Worms
(c) Rookits (d) Virus
2. Fill in blanks
(i) ...................... search fdlh Hkh elements dks NksM+s fcuk] ,d ckj esa ,d lwph ds elements dh tkap djrk
gSA 1
...................... search checks the elements of a list, one at a time, without skipping any elements.
(ii) fdlh fo'ks"k Øe esa rRoksa ds laxzg dks iqu% O;ofLFkr djus dh izfØ;k dks ------------------------ dgk tkrk gSA 1
The process of placing or rearranging a collection of elements into a particular order is known as............
(iii) Front vkSj Rear dk mi;ksx ---------------------------------- dh 'kq:vkr ;k var esa fd;k tkrk gSA 1
Front and Rear are used to indicate begining and end of ...............
(iv) ------------------------------ ,d Python object gS tks ,d error dks crkrk gSA 1
....................... is a python object that represents an error.
3.
(i) Python esa ID Error Exception dSls idM+sA 1
How to catch ID Error Exception in Python.
(ii) Python esa ge Open ( ) dk mi;ksx dc djrs gSA 1
When we use open( ) methods in Python.
(iii) Data file ls Data ds Bytes (n) dh fufnZ"V la[;k dks i<+us ds fy, fdl QaD'ku dk mi;ksx fd;k tkrk
gSA 1
Which Method is used to read a specified numbers of bytes (n) of data from a data file.
(iv) fdlh d{kk esa Nk=ksa dh ÅpkbZ ls-eh- esa nh xbZ gS [90, 20,0,5,85, 90, 00, 0, 0]. Nk=ksa dh ÅapkbZ dk vkSlr
;k Mean Kkr dhft,A 1
Assume that height (in cm) of Students in a class are as follows [90, 20,0,5,85, 90, 00, 0, 0]. Find Mean or
average height of the Class.
(v) Database schema D;k gS\ 1
What is Database schema?
(vi) SQL esa ge update statement dc iz;ksx esa ysrs gSA
When we use Update statement in SQL.
(vii) Computer network ds dksbZ ikap Hkkx fyf[k,A 1
Write any five components of computer network.
(iv) Transmission Media D;k gksrk gSA 1
What is transmission Media?
[k.M& c
SECTION-B
4. Catching an exception dks le>kb;sA 1½
Define the term Catching an exception.
5. uhps fy[ks dFku (a) o (b) esa D;k vUrj gSA 1½
(a) p =open("Practice. txt", "r")
p. read (0)
(b) With open("Practice. txt", "r") as p:
x = p.read( ).
What is the diffence between the following set of statements (a) and (b).
(a) p =open("Practice. txt", "r")
p. read (0)
(b) With open("Practice. txt", "r") as p:
x = p.read( ).
6. LVSd ij fd, tk ldus okys cqfu;knh vkWijs'ku D;k gS\ 1½
What are the basic operations that can be performed on the stack?
7. D;w MhD;w MsVk Vkbi fdl izdkj ls MhD;w MsVk Vkbi ls vyx gSA 1½
How is queue deque data type different from deque data type?
8. ,d fyLV dks vojksgh Øe esa Øec) djus ds fy, ccy lkWVZ ,YxksfjFke fy[ksA 1½
Write a bubble sort algorithm to sort a list in descending order?
9. Collision D;k gS\ 1½
What is collision?
10. Structured data vkSj unstructured data esa vUrj fyf[k,A 1½
Differentiate between Structured data and unstructured data.
11. ,d lIrkg ds lkr fnu dk rkiueku ¼lsfY;;l esa½ 34, 34, 27, 28, 27, 34, 34 fn;k x;k gSA bu rkieku dk s
tandard deviation Kkr dhft,A 1½
Consider the temperature (in Celsius) of 7days of a week as 34, 34, 27, 28, 27, 34, 34. Find the standard deviation
temperature.
12. Single Row Function vkSj Aggregate Function esa dksbZ nks vUrj fyf[k,A 1½
Write any two difference between Single Row Function and Aggregate Function.
13. fn;s x;s SQL Statement dk vkmViqV fyf[k,A 1½
(a) SELECT POW (3,4) (b) SELECT LENGTH ("INDIA")
Write the output produced by the following SQL Statement.
(a) SELECT POW (3,4) (b) SELECT LENGTH ("INDIA")
14. HTTP ij fVIi.kh fyf[k,A 1½
Write short Note on HTTP.
15. Dos vkSj DDos vVSd esa vUrj fyf[k,A 1½
Differentiate between Dos and DDoS attack.
[k.M& l
SECTION- C
16. Stack dk mi;ksx djds ,d fLVªax dks fjolZ esa fy[kus dk ,d izksxzke fyf[k,A 3
Write A program to reverse a string using stack.
17 Python esa ,d izksxzke fyf[k, ftles fLVaªx gS Palindrome ;k ughaA 3
Write a Python program to check whether the given string a palindrome or not using deque.
18. ,d dkslZ esa izos'k ds le; Nk= dk uke Mkyk tkrk gSA ,d izksxzke fy[ks tks izR;sd uke dks vkjksgh Øe esa
LVksj djsaA 3
During admission in a course, the name of the students are inserted in ascending order. Thus performing the sorting
operation at the time of inserting elements in a list.
[k.M& n
SECTION- D
19. LinearlpZ izksxzke dk mi;ksx djrs gq, MqIyhdsV oSY;w 8 dks nh xbZ List [42, -2,32, 8, 7, 9, 42, 3, 8, 44] [kkstsA
;g dkSulh Position fn[kk;sxk vkSj bldk D;k vFkZ gksxk\ 4
Use the Linear search program to search the key with value 8 in the list having duplicate values such as [42, -2,32,
8, 7, 9, 42, 3, 8, 44]. What is the position returned? What does this mean?
OR
,d Num List esa 7 elements gS [8, -4, 7, 7,0,2,9] bl Num Lisy esa gesa 17 [kkstuk gSA Linear lpZ ,yxksfjFke dk
iz;ksx djrs gq;s blds LVsi fy[ksA
Assume that the num List has seven elements [8, -4, 7, 7,0,2,9] so n=7. We need to search for the key num List =7.
Write The step by step process of Linear search using Algorithm.
20 DBMS ds eq[; vo/kkj.kk dk o.kZu dhft,A 4
Describe Key Concepts of DBMS.
OR
Relation ds rhu egRoiw.kZ xq.kksa dk o.kZu dhft,A
Describe Three important Properties of a Relation.