Reviewing Kerala Syllabus Plus Two Computer Science Previous Year Question Papers and Answers Pdf Board Model Paper 2022 helps in understanding answer patterns.
Kerala Plus Two Computer Science Board Model Paper 2022 with Answers
Time: 2 Hours
Total Score: 60 Marks
PART – I
A. Answer any five questions from 1 to 9. Each carries 1 score. (5 × 1 = 5)
Question 1.
Keyword used to create structure is ___________ .
Answer:
struct
Question 2.
Write the Syntax to declare a pointer variable.
Answer:
Data_type *variable_name;
Question 3.
Object of the class is called ___________ .
Answer:
instance
Question 4.
Define ‘Data Structure’.
Answer:
It is a specialised format for organising .processing, retrieving and storing data
Question 5.
The tag used to create a hyperlink is ___________ .
Answer:
<a> tag
![]()
Question 6.
Write an attribute of <OL>tag.
Answer:
type or start
Question 7.
Keyword used to create variable in Java Script is ___________ .
Answer:
var
Question 8.
Which operator is used to add two strings in Java Script?
Answer:
+
Question 9.
In PHP, Variable name starts with ___________ Sign.
Answer:
$ symbol
B. Answer all questions from 10 to 13 each carries 1 score. (4 × 1 = 4)
Question 10.
Write the full form of CMS.
Answer:
Content Management System
Question 11.
A candidate key that is not the primary key is called ___________ .
Answer:
Alternate key
![]()
Question 12.
Data about data is called ___________ .
Answer:
Meta data
Question 13.
Write the name of the function used in PHP to display both data type and value of variables.
Answer:
var_dump()
PART – II
A. Answer any two questions from 14 to 17 each carries 2 scores. (2 × 2 = 4)
Question 14.
What is polymorphism? What are the two types of polymorphism in OOP?
Answer:
Polymorphism is the ability for a message or data to be processed in more than one form. Two types of polymorphism are compile time polymorphism and run time polymorphism.
Question 15.
What is “queue” in data structure?
Answer:
Queue is a linear data structure, its working principle is FIFO (First-In-First-Out) manner.
Question 16.
Write the name of Java Script functions to perform the following:
(a) To display a message “Computer Science”.
(b) To print the length of the string “Hello”.
Answer:
a. alert(“Computer Science”);
b. alert(“Hello”.length);
Question 17.
Write any two advantages of Parallel Computing.
Answer:
A problem is divided into smaller ones that can be solved simultaneously. More than one instruction is
executed on multiple processors at any moment of time.
B. Answer any two questions from 18 20 each carries 2 scores. (2 × 2 = 4)
Question 18.
What is dynamic array? Write the syntax.
Answer:
An array created during run time by using the operator new is known as dynamic array.
Its syntax is
Pointer = new data_type [ size];
![]()
Question 19.
What is Programming Paradigm? Write the name of any two programming paradigms.
Answer:
A programming paradigm is the way in which a program is organized. Two types of programming paradigms are procedure oriented paradigm and object-oriented paradigm.
Question 20.
Define Linked List. Write any two operations on Linked List.
Answer:
Linked list is a dynamic data structure containing a collection of nodes, where each node consists of a data and a link to the next node. Traversing, deletion, insertion etc. are operations on linked list.
PART – III
A. Answer any three questions from 21 to 24 each carries 3 scores. (3 × 3 = 9)
Question 21.
What is Stack? Write algorithm to perform PUSH operation on stack.
Answer:
Stack is a linear data structure working on the principle of
LIFO (Last-In-First-Out).
Algorithm for PUSH operation is
Start
If (top < N – 1) Then
top = top + 1
STACK [top] = item
Else
Print “Stack Overflow”
End of If
Stop
Question 22.
Differentiate static and dynamic webpage.
Answer:
| Static web page | Dynamic web page |
| • Contents and layout is fixed | • Contents and layout may change during run time |
| • Never use databases | • Database is used |
| • Server side application does not require | • Runs Server side application |
| • Easy to develop | • Programming skills is needed |
Question 23.
Briefly explain the different types of Webhosting.
Answer:
Types of web hosting : Various types of web hosting services are available. We can choose the web hosting services according to our needs depends upon the storage space needed for hosting, the number of visitors expected to visit, etc.
1) Shared Hosting : This type of hosting sharing resources, like memory , disk space and CPU hence the name shared. Several websites share the same server. This is suitable for small websites that have less traffic and it is not suitable for large websites that have large bandwidth, large storage space and have large volume of traffic.
Eg: Shared hosting is verisimilar to living in an Apartment(Villas) complex. All residents are in the same location and must share the available resources(Car parking area, Swimming pool, Gymnasium, play ground, etc) with every one.
2) Dedicated Hosting : A web server and its resources are exclusively for one website that have large volume of traffic means large volume of requests by the visitors. Some Govt, departments or large organizations require uninterrupted services for that round the clock power supply is needed. It is too expensive but it is more reliable and provide good service to the public.
Eg: It is similar to living in an Our own house. All the resources in your house is only for you. No one else’s account resides on the computer and would not be capable of tapping into your resourses.
3) Virtual Private Server (VPS): A VPS is a virtual machine sold as a service by an Internet hosting Service. A VPS runs its own copy of an OS (Operating System) and customers have super level access to that OS instance, so they can install almost any s/w that runs on that OS. This type is suitable for websites that require more features than shared hosting but less features than dedicated hosting.
Eg: It is similar to owning a Condo
Question 24.
Write the name of different cloud service models.
Answer:
Software as a Service, Platform as a Service, Infrastructure as a Service (SaaS, PaaS, IaaS)
![]()
B. Answer any two questions from 25 to 27 each carries 3 scores. (2 × 3 = 6)
Question 25.
What are the different ways to add JavaScript to a Webpage?
Answer:
(a) Inside <BODY>
(b) Inside <HEAD>
(c) External JavaScript file:- The extension .js is used Settle extension for the script file. The src attribute of the <SCRIPT> tag is set as the external JavaScript file name.
Question 26.
Write any three aggregate functions in SQL.
Answer:
SUM (), AVG(), MIN (), MAX () and COUNT () are aggregate functions.
Question 27.
Write any three advantages of e-learning, e-learning
Answer:
- Offers variety of courses from different institutions in the world
- Cost is very less
- Time and place is not an issue in e-Learning
- No need to travel which saves time and cost
PART – IV
A. Answer any three questions from 28 to 31 each carries 4 scores. (3 × 4 = 12)
Question 28.
What are the two methods of memory allocation in C++? Write operators with its use.
Answer:
Static memory allocation and dynamic memory allocation are the two methods of memory allocations in C++, new operator is used for dynamic memory allocation, delete operator is used for releasing the allocated memory.
Question 29.
Define column constraints in SQL. Explain any three column constraints.
Answer:
It ensures the correct data is entered into the database.
(a) NOT NULL :- This specifies that a column can never have NULL values.
(a) AUTO_INCREMENT:- MySQL will assign serial numbers automatically for a column with this constraint.
(b) UNIQUE: – If a column is set with this constraint, then no two rows will have the same value.
Question 30.
Briefly explain any four data types in PHP.
Answer:
(a) Integers: – This include whole numbers. E.g. -45, 129 etc.
(b) Float/Double: – This include fractional numbers. Eg. 3.14
(c) String: – This is used to store text or string data . Eg.”Covid 19″
(d) Boolean: – This can hold two values such as true or false.
Question 31.
Briefly explain any four cyber crimes against individuals.
Answer:
- Identity theft: – This occurs when someone uses another person’s identifying information like name, debit or credit card details , account number, passwords etc. without their permission.
- Harassment: – Posting humiliating comments focusing on gender, race, religion and nationality at specific individuals in social media, e-mail etc. is called harassment.
- Impersonation: – Impersonation is an act of pretending to be another person for the purpose of harming him/her.
- Violation of privacy: – Posting or sharing images and videos in social media without their permission is violation of privacy
![]()
B. Answer any one question from 32 to 33. Each carries 4 scores. (1 × 4 = 4)
Question 32.
(a) Write any two client side scripting languages.
(b) Write any two attributes of <FRAMESET> tag.
Answer:
(a) Write any two client side scripting languages. A: JavaScript, VB Script
(b) Write any two attributes of <FRAME6ET> tag. A: Cols , Rows
Question 33.
Write any four applications of Computational Intelli-gence.
Answer:
- Biometrics
- Robotics
- Computer Vision
- Natural Language Processing
- Automatic Speech Recognition. Etc.
PART – V
Answer any two questions from 34 to 36. Each carries 6 scores. (2 × 6 = 12)
Question 34.
(a) Explain four text formatting tags with its use.(2)
(b) Explain any two attributes of <BODY> tag. (2)
(c) Write HTML code to display the text H2SO4.(2)
Answer:
(a) Explain four text formatting tags with its use.
A: <B> for bold text, <I> for italics , <U> for underline, <S>for strike through.
(b) Explain any two attributes of <BODY> tag.
A: Background – To add a picture, Bgcolor – To change background color.
(c) Write HTML code to display the text H2S04 A: H2SO4
Question 35.
(a) Write HTML code to display the following list:

(b) Write HTML code to display the following table:
|
No. of Students |
|
| Science | 56 |
| Commerce | 58 |
(c) Write any two attributes of <INPUT>tag. (2)
Answer:
(a) <h1 align= “left”> INPUT DEVICES</h1;
<OL>
<LI>MOUSE</LI>
<LI>KEYBOARD<aLI>
<LI>SCANNER</LI>
</OL>
(b) <TABLE Border= “2”>
<TR><th Colspan= “2”>No. of students</th></TR>
<TR><th>Science</th><td>56</td></TR>
<TR><th>Commerce</th><td>58</td></TR>
</TABLE>
(c) Type, Name, Value, Size etc.
![]()
Question 36.
Explain the advantages of DBMS.
Answer:
Advantages of DBMS
- Data Redundancy – It means duplication of data. DBMS eliminates redundancy. DBMS does not store more than one copy of the same data.
- Inconsistency can be avoided – If redundancy occurs there is a chance to inconsistency. If redundancy is removed then inconsistency cannot occur.
- Data can be shared – The data stored in the database can be shared by the users or programs.
- Standards can be enforced – The data in the database follows some standards. Eg : a field ‘Name’ should have 40 characters long. Some standards are ANSI, ISO, etc.
- Security restrictions can be applied – The data is of great value so it must be kept secure and private. Data security means the protection of data against accidental or intentional disclosure or unauthorized destruction or modification by unauthorized person.
- Integrity can be maintained – It ensures that the data is to be entered in the databse Is correct.
- Efficient data access – It stored huge amount of data efficiently and can be retrieved whenever a need arise.
- Crash recovery – Some times all or a portion of the data is lost when a system crashes. A good DBMS helps to recover data after the system crashed.