Hsslive Xii Model Exam Feb 2023 Key Comp App Com Shahija
Hsslive Xii Model Exam Feb 2023 Key Comp App Com Shahija
in ®
Sheet1
Ans 2
Page 1
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®
Sheet1
12 Compare container tag and emply tag
Container tags have opening tag and closing tag. Empty tag has only opening
Ans 2
tag.
Write HTML code to display the following:
13 (a) H2SO4
(b) x 3 + y3
(a) H <sub> 2 </sub> SO <sub> 4 </sub>
Ans 2
(b) x <sup>3</sup> + y <sup>3</sup>
14 List the form controls used to collect data using HTML form.
text,password,checkbox,radio button,submit button, reset button, button, text
Ans 2
area, dropdown list
15 Write short notes on datatypes in JavaScript
1. Number : all types of numbers.
Ans 2. String : text data 2
3. Boolean : boolean data (True/False)
16 List the users of database
Database Administrator DBA, Application Programmer, Sophisticated User,
Ans 2
Naive User
17 List any four aggregate functions in SQL
Ans sum(), avg(), max(), min(), count() 2
18 Write short notes on GPS
It is a satellite based navigation system that is used to locate a geographical
Ans position anywhere on earth, using its longitude and latitude. 2
Page 2
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®
Sheet1
<B> and <STRONG> :To make the text bold face.
<I> and <EM> :To make the text italics or emphasis.
<U> : To underline the text
<S> and <STRIKE> :To strike through the text
Ans <BIG> : To make the text big sized 3
<SMALL> : To make the text small sized
<SUB> : To make the text subscripted(X2)
<SUP> : To make the text superscripted(X2)
<Q> : To enclose the text in “double quotes”
22 Compare static web page and dynamic web page
Static Webpage
Content and layout is fixed. No Database
Directly runs on browser. Easy To develop
Page 3
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®
Sheet1
Candidate Key :one or more columns in a relation which can be used as a key
Primary Key: used to uniquely identify a row
Ans Alternate Key and : candidate key which is not used as primary key 3
Foreign Key : column/columns in a table which the primary key of another
table
26 Briefly explain the components of SQL
Data Definition Language (DDL): CREATE, ALTER, DROP
Ans Data Manipulation language (DML):SELECT, INSERT, UPDATE, DELETE 3
Data Control Language (DCL):GRANT, REVOKE
27 Briefly explain column constraints in SQL
NOT NULL:Ensures that a column cannot have NULL value.
AUTO_INCREMENT:Allows a unique number to be generated automatically when a new record is inserted
into a table.
Ans PRIMARY KEY:Uniquely identified each rows/records in a database table. 3
UNIQUE: Ensures that all values in a column are different.
DEFAULT:Provides a default value for a column when none is specified
28 Write short notes about ERP packages.
Oracle
The ERP package from Oracle provides strong finance and accounting module.
SAP
SAP stands for Systems Applications and Products for data processing.
Odoo
Odoo is an open source ERP. In open source ERP the source code can be modified
Ans based on the requirement of organization. 3
Microsoft Dynamics
Microsoft is an American multinational corporation headquartered in
Redmond,Washington. Microsoft Dynamics is part of Microsoft business solutions.
Tally ERP
Tally solutions Pvt Ltd is a Bangalore based Software Company in India. Tally ERP
is a business accounting software for accounting, inventory and payroll.
29 Write short note on any 3 cyber crimes against individuals.
Identity Theft: someone pretends to be someone else someone uses another person's identifying
information, like their name, credit card number, etc. without their permission to commit fraud or other
crimes.
Harassment : Posting humiliating comments focusing on gender, race, religion, nationality at specific
individuals in chat rooms, social media or e-mail. Using Internet, to harass someone is called cyber
Ans stalking. 3
Impersonation and cheating: Pretending to be another person for the purpose of harming the victim.
They utilise the anonymity of the Internet to commit impersonation online
Violation of privacy: Intrusion into the personal life of another, without a valid reason.
Dissemination of obscene materials: Distribution and posting of obscene material(pornography) is a
cyber crime.
Answer any 2 questions from 30 to 32. Each carries 3 Scores each
30 Explain various tokens in C++.
Page 4
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®
Sheet1
Tokens : Basic building blocks of C++ programs. There are five tokens in C++.
1. Keywords : Reserved words that give special meaning to the language compiler. Eg int, while, switch,
defaut,, continue etc
2. Identifiers : User-defined words to identify memory locations, statements, functions, data types, etc.
3. Literals: Tokens that do not change their value during the program run. They are also known as
constants.
Ans 1. Integer literals are whole numbers without fractional part. Eg : 100, -25, 2014 etc 5
2. Floating point literals are real constants are numbers having fractional parts. Eg : 3.14, -25.03 etc
3. Character literals is a singlec haracter enclosed in single quotes ..Eg : 's' , 'S' , '$' , '\n' , '+' , '9'
4. String literals is a sequence of one or more characters enclosed within a pair of double quotes is
called.
Eg : "Hello friends" , "123" , "C++" , "Baby\'s Day Out"
4. Operators : Symbols that tell the compiler about some operations. Eg : +, -, *, <, >, =, && etc
5. Punctuators : They give semantic and syntactic meaning to the compiler. Eg: #,(,{,[,! Etc.
a) Briefly explain the types of lists in HTML?
b) Write HTML code segment to display the list given below.
Courses after 12th Commerce
31 . Bachelor of Commerce ( B.Com )
. Chartered Accountancy (CA)
. Company Secretary ( CS )
a) List
There are three kinds of lists in HTML
1. Unordered lists
Tag used of making unordered list is <UL> ... </UL>
Its attribute is Type
values for Type attribute are sqaure, disc and circle
Ans 2. Ordered lists
3
Tag used for making unordered list is <OL> ... </OL>
Its attributes are Type and Start
Values of Type attribute are 1, A, a, I and i
3.Definition lists.
Tags used for making definition list is <DL> ... </DL>, <DT> and <DD>
b) <B> Courses after 12<SUP>th</SUP>Commerce </B>
<UL>
<LI>Bachelor of Commerce ( B.Com )</LI>
<LI>Chartered Accountancy (CA)</LI> 2
<LI>Company Secretary ( CS )</LI>
</UL>
a) Define DBMS.
32
b) Explain the advantages of DBMS
Page 5
Join Now: https://join.hsslive.in Downloaded from www.Hsslive.in ®
Sheet1
A Database Management System is defined as the software system that allows users
to define, create, maintain and control access to the database.
Advantages of DBMS.
1. Control data redundancy:In database data is stored in a single place any changes
made will reflects everywhere. There is no chance of duplicate data.
2. Data consistency: Data consistency is ensured in a database because there is no
data redundancy.
Ans 3. Efficient data access: fast andaccurate data access. 5
4. Data integrity: Data integrity refers to the overall completeness, accuracy and
consistency of data in the database.
5. Data security: use of passwords, the information in a database is made available
only to authorized persons.
6. Sharing of data:The data stored in the database can be shared among several users
or programs even simultaneously and each may use it for different purposes.
7. Enforcement of standards: With central control of the database, a Database
Administrator (DBA) defines and enforces the necessary standards.
8. Crash recovery: DBMS provides some mechanism to recover data from the crashes.
Page 6