0% found this document useful (0 votes)
6 views6 pages

Hsslive Xii Model Exam Feb 2023 Key Comp App Com Shahija

The document contains the unofficial answer key for the Second Year Model Exam 2023 in Computer Application. It includes questions and answers across various topics such as C++, HTML, JavaScript, SQL, and web hosting. The format allows students to check their answers for a total of 32 questions, categorized by scoring weightage.

Uploaded by

sellugeelu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views6 pages

Hsslive Xii Model Exam Feb 2023 Key Comp App Com Shahija

The document contains the unofficial answer key for the Second Year Model Exam 2023 in Computer Application. It includes questions and answers across various topics such as C++, HTML, JavaScript, SQL, and web hosting. The format allows students to check their answers for a total of 32 questions, categorized by scoring weightage.

Uploaded by

sellugeelu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Join Now: https://join.hsslive.in Downloaded from www.Hsslive.

in ®

Sheet1

Second Year Model Exam 2023


Computer Application
Answer Key ( Unofficial )
Answer any 5 questions from 1 to 6. Each carries 1 Score
1 Which data type in C++ represents an empty set of data?
Ans void 1
2 Which function is used to find the length of a string?
Ans strlen() 1
Which tag is used to partition the browser window into different frame sections in
3
HTML
Ans <FRAMESET> 1
4 The keyword used to declare variables in JavaScript is ……..
Ans var 1
The custom of designing a web site suitable to work o every device and every screen size
5
is known as ………….
Ans responsive web designing 1
6 Analysis and redesign of workflow within an enterprise is called ……….
Ans Bussiness Process Re-engineering ( BPR ) 1
Answer any 9 questions from 7 to 18. Each carries 2 Scores each
7 Write the basic structure of C++ program

Ans 2

8 What are the components of a loop?


Ans initialisation, Test expression, update statement, body of loop 2
9 Name the console input and output functions for string input/output operations.
getchar()
Ans Putchar() 2
10 What is the difference between actual parameter and formal parameter?
actual parameter : argumnets in function call. Eg sum(a,b);
Ans 2
formal argument : arguments in function defenition. Eg int sum (int x, int y)
11 List the mathematicalfunctions in C++.
Ans pow(), sqrt(), abs(), fabs() 2

Page 1
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®

Sheet1
12 Compare container tag and emply tag
Container tags have opening tag and closing tag. Empty tag has only opening
Ans 2
tag.
Write HTML code to display the following:
13 (a) H2SO4
(b) x 3 + y3
(a) H <sub> 2 </sub> SO <sub> 4 </sub>
Ans 2
(b) x <sup>3</sup> + y <sup>3</sup>
14 List the form controls used to collect data using HTML form.
text,password,checkbox,radio button,submit button, reset button, button, text
Ans 2
area, dropdown list
15 Write short notes on datatypes in JavaScript
1. Number : all types of numbers.
Ans 2. String : text data 2
3. Boolean : boolean data (True/False)
16 List the users of database
Database Administrator DBA, Application Programmer, Sophisticated User,
Ans 2
Naive User
17 List any four aggregate functions in SQL
Ans sum(), avg(), max(), min(), count() 2
18 Write short notes on GPS
It is a satellite based navigation system that is used to locate a geographical
Ans position anywhere on earth, using its longitude and latitude. 2

Answer any 9 questions from 19 to 29. Each carries 3 Scores each


(a) Define an array in C++.
19
(b) Declare an array to store 10 register numbers.
Ans a) An array is a collection of elements of the same type placed in contiguous memory locations. 3
(b) int regno[10];
20 Briefly explain any three string functions and their use in C++
a. strlen() : function used to find the number of characters in a string.
strlen(“Computer”); // output : 8
b. strcpy() : function used to copy one string to another.
Eg: strcpy(str1, str2); this copies the value in str2 into str1.
Ans c. strcat() : function used to join one string to another. 3
Eg : strcat(str1,str2); this combines str1 and str2 and is stored in str1.
d. strcmp() : function used to compare to strings.
eg : strcmp (str1, str2)
e. strcmpi(): function used to compare to strings ignoring case.
21 Briefly eplain any 6 text formatting tags with their use.

Page 2
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®

Sheet1
<B> and <STRONG> :To make the text bold face.
<I> and <EM> :To make the text italics or emphasis.
<U> : To underline the text
<S> and <STRIKE> :To strike through the text
Ans <BIG> : To make the text big sized 3
<SMALL> : To make the text small sized
<SUB> : To make the text subscripted(X2)
<SUP> : To make the text superscripted(X2)
<Q> : To enclose the text in “double quotes”
22 Compare static web page and dynamic web page
Static Webpage
Content and layout is fixed. No Database
Directly runs on browser. Easy To develop

Ans Dynamic Webpage 3


Content and Layout changes during runtime
Database is used. Runs in sever and results send to client. Needs programming
skill to develop
23 Briefly explain the built – in functions in JavaScript.
1.alert() function This function is used to display a messagebox on the screen.
alert(“Welcome to JavaScript”);
2. isNaN() function : This function is used to check whether a value is a number or not. In
this function, NaN stands for Not a Number. The function returns true if the given value is
not a number.
3. toUpperCase() function This function returns the upper case form of the given string.
Look at the following example code:
Ans 4. toLowerCase() function It returns the lower case form of the given string. Look at the 3
following example code.
5. charAt() function It returns the character at a particular position. charAt(0) returns the
first character in the string. charAt(1) returns the second character in the string and so
on.
6. length property : length property returns the length of the string. length means, the
number of characters in the string.
24 Briefly explain the various types of web hosting.
1. Shared Hosting
Different websites are stored in a single webserver.
Most Common type of Web Hosting.
Resources like RAM, CPU etc are shared by websites.
2. Dedicated Hosting
One website is hosted in One webserver.
The website uses the entire server and its resources.
Ans Suitable for big organizations with large number of visitors. 3
3. Virtual Private Server ( VPS )
A physical server is virtually partitioned into several servers using virtualization technology.
VPS provides dedicated bandwidth to each website on the server.
Traffic in one website will not slow down other websites.
Some popular server virtualization softwares are VMware, Virtualbox, FreeVPS,
User-mode Linux, Microsoft Hyper-V, etc.
25 Briefly explain the keys in RDBMS

Page 3
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®

Sheet1
Candidate Key :one or more columns in a relation which can be used as a key
Primary Key: used to uniquely identify a row
Ans Alternate Key and : candidate key which is not used as primary key 3
Foreign Key : column/columns in a table which the primary key of another
table
26 Briefly explain the components of SQL
Data Definition Language (DDL): CREATE, ALTER, DROP
Ans Data Manipulation language (DML):SELECT, INSERT, UPDATE, DELETE 3
Data Control Language (DCL):GRANT, REVOKE
27 Briefly explain column constraints in SQL
NOT NULL:Ensures that a column cannot have NULL value.
AUTO_INCREMENT:Allows a unique number to be generated automatically when a new record is inserted
into a table.
Ans PRIMARY KEY:Uniquely identified each rows/records in a database table. 3
UNIQUE: Ensures that all values in a column are different.
DEFAULT:Provides a default value for a column when none is specified
28 Write short notes about ERP packages.
Oracle
The ERP package from Oracle provides strong finance and accounting module.
SAP
SAP stands for Systems Applications and Products for data processing.
Odoo
Odoo is an open source ERP. In open source ERP the source code can be modified
Ans based on the requirement of organization. 3
Microsoft Dynamics
Microsoft is an American multinational corporation headquartered in
Redmond,Washington. Microsoft Dynamics is part of Microsoft business solutions.
Tally ERP
Tally solutions Pvt Ltd is a Bangalore based Software Company in India. Tally ERP
is a business accounting software for accounting, inventory and payroll.
29 Write short note on any 3 cyber crimes against individuals.

Identity Theft: someone pretends to be someone else someone uses another person's identifying
information, like their name, credit card number, etc. without their permission to commit fraud or other
crimes.
Harassment : Posting humiliating comments focusing on gender, race, religion, nationality at specific
individuals in chat rooms, social media or e-mail. Using Internet, to harass someone is called cyber
Ans stalking. 3
Impersonation and cheating: Pretending to be another person for the purpose of harming the victim.
They utilise the anonymity of the Internet to commit impersonation online
Violation of privacy: Intrusion into the personal life of another, without a valid reason.
Dissemination of obscene materials: Distribution and posting of obscene material(pornography) is a
cyber crime.
Answer any 2 questions from 30 to 32. Each carries 3 Scores each
30 Explain various tokens in C++.

Page 4
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®

Sheet1

Tokens : Basic building blocks of C++ programs. There are five tokens in C++.
1. Keywords : Reserved words that give special meaning to the language compiler. Eg int, while, switch,
defaut,, continue etc
2. Identifiers : User-defined words to identify memory locations, statements, functions, data types, etc.
3. Literals: Tokens that do not change their value during the program run. They are also known as
constants.
Ans 1. Integer literals are whole numbers without fractional part. Eg : 100, -25, 2014 etc 5
2. Floating point literals are real constants are numbers having fractional parts. Eg : 3.14, -25.03 etc
3. Character literals is a singlec haracter enclosed in single quotes ..Eg : 's' , 'S' , '$' , '\n' , '+' , '9'
4. String literals is a sequence of one or more characters enclosed within a pair of double quotes is
called.
Eg : "Hello friends" , "123" , "C++" , "Baby\'s Day Out"
4. Operators : Symbols that tell the compiler about some operations. Eg : +, -, *, <, >, =, && etc
5. Punctuators : They give semantic and syntactic meaning to the compiler. Eg: #,(,{,[,! Etc.
a) Briefly explain the types of lists in HTML?
b) Write HTML code segment to display the list given below.
Courses after 12th Commerce
31 . Bachelor of Commerce ( B.Com )
. Chartered Accountancy (CA)
. Company Secretary ( CS )
a) List
There are three kinds of lists in HTML
1. Unordered lists
Tag used of making unordered list is <UL> ... </UL>
Its attribute is Type
values for Type attribute are sqaure, disc and circle
Ans 2. Ordered lists
3
Tag used for making unordered list is <OL> ... </OL>
Its attributes are Type and Start
Values of Type attribute are 1, A, a, I and i
3.Definition lists.
Tags used for making definition list is <DL> ... </DL>, <DT> and <DD>
b) <B> Courses after 12<SUP>th</SUP>Commerce </B>
<UL>
<LI>Bachelor of Commerce ( B.Com )</LI>
<LI>Chartered Accountancy (CA)</LI> 2
<LI>Company Secretary ( CS )</LI>
</UL>
a) Define DBMS.
32
b) Explain the advantages of DBMS

Page 5
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®

Sheet1

A Database Management System is defined as the software system that allows users
to define, create, maintain and control access to the database.

Advantages of DBMS.

1. Control data redundancy:In database data is stored in a single place any changes
made will reflects everywhere. There is no chance of duplicate data.
2. Data consistency: Data consistency is ensured in a database because there is no
data redundancy.
Ans 3. Efficient data access: fast andaccurate data access. 5
4. Data integrity: Data integrity refers to the overall completeness, accuracy and
consistency of data in the database.
5. Data security: use of passwords, the information in a database is made available
only to authorized persons.
6. Sharing of data:The data stored in the database can be shared among several users
or programs even simultaneously and each may use it for different purposes.
7. Enforcement of standards: With central control of the database, a Database
Administrator (DBA) defines and enforces the necessary standards.
8. Crash recovery: DBMS provides some mechanism to recover data from the crashes.

Prepared By : Shahija P V, HSST Computer Application , Anjarakkandi HSS, Kannur

Page 6

You might also like