Plus One English Previous Year Question Paper 2015

Kerala Plus One English Previous Year Question Paper 2015

General Instructions to Candidates

  • There is a ‘Cool off time’ of 15 minutes in addition to the writing time of 2 V2 hrs.
  • You are neither allowed to write your answers nor to discuss anything with others during the ‘cool off time’.
  • Read the questions carefully before answering.
  • All questions are compulsory and only internal choice is allowed.
  • When you select a question, all the sub-questions must be answered from the same question itself.
  • Electronic devices except nonprogrammable calculators are not allowed in the Examination Hall.

(Question.1 to 3): Read the following excerpt from the story, ‘His First Flight’ and answer the questions that follow.

He waited a moment in surprise, wondering why she did not come nearer and then maddened by hunger, he dived at the fish with a loud scream; he fell outwards and downwards into space. His mother had swooped upwards. As he passed beneath her, he heard the swish of her wings.

Question 1.
Who is‘she’ referred to here? (1)

Question  2.
What prompted the young seagull to fly finally? (2)

Question 3.
Write a paragraph about the role of parents in helping children to attain their goal. (3)

Question 4.
A group of foreigners from France visit your locality. They intend to visit a few tourist destinations in our state. Prepare a short write-up about one or two famous tourist centers in your district.
[Hints : Name -location – major attractions – how to reach there] (4)

Question 5.
Fill in the blanks in the following passage choosing the right words given in the box.
Similarly, in accordance, Moreover, Therefore
In developing countries, only 30% of the buildings are constructed …..(a) with the regulations laid down for ensuring safety and security….(b) the lack of a master plan and the inferior quality of materials used for construction also aggravate the
casualties arising out of disasters ……….(c)….., both private and public buildings should
be constructed according to the guidelines prescribed by law ….(d)…., constructions should strictly adhere to the master plan approved by the authorities. (4)

Question 6.
Your school is conducting a debate on the topic, “Do the social networking sites intrude into ones privacy?” Prepare four arguments in favour of this topic. (4)

(Question 7 to 11): Read the following passage and answer the questions that follow.

Benefits of Yoga

Yoga, developed in India thousands of years ago. Yoga has become an increasingly popular form of exercise all over the world. While there are hundreds of different types of schools of yoga which typically comprise of breathing exercises, meditation and assuming postures that stretch and flex various muscle groups, the main purpose of yoga is to create strength, awareness and harmony in both the mind and body.

Some of the physical benefits of yoga include increased flexibility, muscle strength, improved respiration, energy and vitality, weight reduction, cardio-circulatory health and maintenance of a balanced metabolism. Yoga has a remarkable effect on over mental well-being too. Regular yoga practice creates mental clarity and calmness, increases body awareness, relieves chronic stress patterns, relaxes the mind, centers attention and makes deep-rooted concentration. It is a great way to get in tune with one’s body and inner self.

Choose the right option from the following:

Question 7.
The term,‘ harmony’means in the passage. (1)
a) happiness
b) musical note
c) agreement
d) complete

Question 8.
The word,‘vitality’means (1)
a) important
b) vigour
c) life
d) speciality

Question 9.
What is the main purpose of yoga? (2)

Question 10.
Mention two important benefits of yoga. (2)

Question 11.
Read the previous essay on ‘Benefits of Yoga and write a precise reducing the
passage to its 1/3rd length. (4)

Question 12.
Imagine that you are a tourist guide working with the tourism department of Fiji. Make an introductory speech to a group of tourists from Europe to welcome them to
Namuana (3)

(Question. 13 to 14): The following lines are taken from the poem, ‘Death, The Leveller’. Read the lines and answer the questions that follow.

Your heads must come
To the cold tomb;
Only the actions of the just
Smell sweet and blossom in their dust.

Question 13.
What does the expression, cold tomb’ mean here?

Question 14.
Elaborate on the idea of the above lines.

Question 15.
Captain Jovis was interviewed by a news reporter before the take off of Le-Horla.
There are the few questions that the reporter puts forth. Read the questions and prepare the likely responses. Reporter Captain Jovis Reporter Captain Jovis Reporter Captain Jovis Reporter Captain Jovis
Reporter : Sir, this is your first experience in a hot air balloon.
How do you feel?.
Captain Jovis : Yes, I am really excited as well as nervous.
Reporter : Will you please introduce your supporting crew?
Captain Jovis : 1) …………..
Reporter : What all are the arrangements made for the flight?
Captain Jovis : 2) ………….
Reporter : ¡s guiding a balloon an easy task?
Captain Jovis : 3)…………….

Question 16.
Complete the following report using the correct form of the verbs given in the brackets.
ABCD Higher Secondary School ……….(a) ………(celebrate) Gandhi Jayanthi on 2nd October, 2014. The school principal
……….(b) …………. (welcome) the gathering. The meeting …..(c)……….(preside) over by the RT.A. president and the local freedom
fighter, Appu Asan …(d)………..(inaugurate) the function. (4)
Answer:
(a) celebrated
(b) welcomed
(c) was presided
(d) inaugurated

Question 17.
Silence – a vision of the Serang’s nobility rising before me.
“Yes in a way it was a cage But isn’t it queer, Miss Jope Smith,
the animals were all outside”.
What trait of Serang’s character is evident here?
Sketch the character of Hassan in a short paragraph. (4)

Question 18.
I approached the mothers bedside. The ring was in my hand. Wishing her a good morning I said, ‘Mrs. Clifford, your son is alive. He is Well’. (4)
Do you think, it was proper on the part of Mr. Gupta to tell a lie about Frank to Mrs. Clifford? Justify your answer in a paragraph. (5)
OR
‘What kind of a country is India, Sir?’ asked Mrs. Clifford, as she resumed her cooking.
What impression of India is created by Mr. Gupta in the mind of Mrs. Clifford?

Question 19.
The following information is about the famous person, Dr. APJ Abdul Kalam. Prepare a profile of him.
Birth : 15lh October, 1931, Rameswaram, Tamil Nadu.
Education : Specialized in Aeroengineering from Madras Institute of
Technology.
Career : Joined DRDO in 1958 and ISRO in 1963.
Was Principal Scientific Advisor to Govt, of India.
Scientific Advisor to Defence Ministry. 11th President of india (2002-2007).
Awards : Padmabhushan in 1981, Padmavibhushan in 1990, Bharat Ratna in 1997 (5)

Question 20.
William Wordsworth in his poem, “To Sleep” invites sleep to come and bless
him. He finds it is too difficult to sleep peacefully. So he calls a psychiatrist over the phone. Prepare a telephonic conversation between Wordsworth and the doctor. (4)

Question 21.
Imagine that you got an opportunity to visit Wayanad. Write a travel essay describing your experience. The essay should include a description of the physical features of the area, the practical issues related to the travel and your experiences and personal impressions. (6)
OR
In the extract, ‘The Sacred Turtles of Kadavu’, you read about a Fijian ritual.
Write a short article on a ritual popular in your locality.

Question 22.
Narrate the beauty of Nicholai s estate from the point of view of lvanich. You may begin thus : The fresh air from the gooseberry orchards can be felt here in this time of early morning (6)

Question 23.
Read the poem given, below and write a note of appreciation.

Good Deeds by Sasikanth Nishanth Sarma
The World is a double-edged knife
And we have only one life Enjoy it, live it well.
In good company do dwell.
Always do good -deeds Sow in yourself character s seeds
Cultivate mind with manure of thought For ages, the experiences brought.
Feed your life with good deeds So that there is no place for weeds.
To harm, that oft leads
The decay of characters seeds
The one who wants to succeed
He must always heed
And must seek
The good qualities
And not the quantities
A wise man can only pleads
But you have to pay heed What are you needs?
Then decide what to do
And what not to do

Answers

Answer 1.
The young seagulls mother

Answer 2.
Hunger prompted the young seagull to fly.

Answer 3.
It is the responsibility of parents to help their children attain their goal. As children you may not always take things seriously. Some times the parents will scold their children; sometime they may deny their demands, etc. though it may be thought as cruelty from their part, they do such things out of love for their children. They are always concerned about their childrens future.

Answer 4.
Thusharagiri is a beautiful spot which tourists must visit. Its location is in the western Ghats, below the Wayanadan hills. It is 55 kilometres away from Kozhikode city .There are roads leading to Thusharagiri from Kozhikode, Kappad beach and Wayand. The attractions of Thusharagiri are the three waterfalls, the Thanni Muthassi and the panoramic beauty of the Waynadan forests. Tourists can bath in the cool and pure water. For those who want to enjoy trekking, there is the facility, accompanied by guides. Good food also is available there.

Answer 5.
(a) in accordance with
(b) similarly
(c) therefore
(d) moreover

Answer 6.
Social networking sites intrude into one’s privacy in several ways :

  • Social networking sites give vulgar and explicit sex material.Young people are naturally curious about such things.
  • Students often copy materials as they are from social networking sites for their assignments and projects.
  • Continuous use of such sites will make people addict to them, and this will prevent them from doing their duties.
  • Accepting requests from unknown people on the site can have serious consequences.

Answer 7.
c) agreement

Answer 8.
b) vigour

Answer 9.
The main purpose of yoga is to create strength, awareness and harmony in both the mind and body.

Answer 10.
Yoga makes people physically strong.
Yoga gives deep-rooted concentration of the mind.

Answer 11.
Yoga has become a popular form of exercise. The main purpose of yoga is to create strength, awareness and harmony in both the mind and body. Yoga has many physical benefits. It increases vitality and reduces illnesses. Yoga refreshes the mind and gives it deep-rooted concentration.

Answer 12.
Ladies and gentlemen, you are welcome to this beautiful island. I am guide Fernandex. I wish you all a nice time here. Fiji is a multi-cultured island nation, having the cultural tradition of the people of Oceanic, European, South – Asian, and East Asian origins. It consists of nearly 320 islands in the South West Pacific Ocean. It is 3152 kms away from Sydney, Australia. Nearly a hundred of these islands are inhabited. You can enjoy the little ports and beautiful sea-coasts. You can enjoy boat journeys and also tasty dishes of various kinds of fish. So ladies and gentlemen, let us enjoy ourselves.

Answer 13.
Death

Answer 14.
This is a poem on death. Every one will have to face death at the end. All the earthly joys and achievements will end with death. What will remain are the good actions of the virtuous people. Their fragrance will spread across and will bear fruit for ever.

Answer 15.

  1. Well, this is Lieutenant Mallet, this is M.Etierine Beer, and this is M.Paul Bessant and this is Guy de Maupassant.
  2. The basket for the traveller to sit in was attached to the balloon and barometers were brought. The two trumpets, the eatables, the overcoats and raincoats and all the small articles that could go with the men in the flying basket were arranged.
  3. Guiding the balloon is not an easy task. Winds and storms may change its course.

Answer 16.
(a) celebrated
(b) welcomed
(c) was presided
(d) inaugurated

Answer 17.
Serang’s courage is evident here. Hassan was the serang on Ranaganji. He was not good looking and he did not have a laughed at him. But he was courageous and serviceable. When two sailors contracted smallpox, he volunteered to make a special enclosure in the ship and looked after them.
More people became victims of this deadly disease. He looked after all of them and helped Dr. Cronin in their treatment. When two of them died, he gave them fitting burial in the sea. He being a Muslim Chanted words from the Ramayana as part of the Hindu ritual. Hassan possessed great qualities like courage service-mindedness and religious tolerance. He promised himself to be a self -sacrificing and unselfish young man. Such people are very rare in this world.

Answer 18.
Mrs. Clifford was seriously ill. Her illness aggravated due to her worries about her son. When Maggie requested Mr. Gupta to look into the crystal ring and tell her mother that her son Frank was alive and well even if he saw nothing in the crystal wing, he obliged her. Gupta had no faith in it. He knew it was a superstition. Even then he did it in order to console a sick mother. The words of Mr. Gupta made her recover from her illness. Though it was a lie, it was an innocent he, and it cured the woman’s illness. So it was proper on the part of Mr. Gupta. The recovery of Mrs. Clifford justified Mr. Gupta’s action and words.
OR
Mr. Gupta described to Mrs. Clifford that India was a beautiful country. It is not cold like England, but some what hot. Of course, there are tigers and snakes in India, but they live in the jungles. If they came to places where people live, they would be killed. There are fevers in some places in india. But they differ with places and seasons. This impression of India given by Mr. Gupta removed from her the fear she had about her son’s living conditions in India.

Answer 19.
Dr. API Abdul Kalam
Dr.APJ Abdul Kalam was born on 15 October,1931, at Rameswaran in Tamil Nadu. After his school education he joined Madras Institute of Technology and specialized in Aero engineering. He started his professional career in DRDO in 1958 and in ISRO in 1963. Later he became Principal Scientific Advisor to the Government of India. Then he was appointed as scientific advisor to the Defence Ministry. He was elected the eleventh President of India and remained in that post from 2002 to 2007. He was awarded the Padmabhushan in 1981 the Padmavibhushan in 1990 and the Bharat Ratna in 1997.

Answer 20.
Wordsworth : good morning Dr. Smith. I am William Wordsworth. I want your help, doctor.
Dr. Smith : good morning, Mr.Wordsworth what help can I do for you?
Wordsworth : It is something related to your profession.
Dr. Smith : come on, tell me your problem.
Wordsworth : for the last three nights I did not get any sleep at all. When I lie in bed various thoughts come to my mind. I see flocks
of sheep leisurely passing one after the other, I hear humming of bees and the sounds of the rain. I also hear the fall of rivers, winds and seas.
Dr. Smith: There is nothing to be afraid Mr. Wordsworth you see such things in imagination because you are too much preoccupied with nature and its objects and phenomena.
Wordsworth : It may be so. But what am to do without sleep? I cannot enjoy the beauty of the morning unless I sleep. I expected to get some sleep Last night, which was my third sleepless night.
Dr. Smith : You send someone to me. I shall give some tablets. You take one tablet each before you go to sleep for three days. Then,
give mean call. If you get sleep, you can discontinue the medicine.
Wordsworth : 1 shall send someone now itself you. doctor.
Dr. Smith : It’s my duty.

Answer 21.
My Visit to Wavanad
Wayanad is a green, beautiful piece of land that lies on the north-east borders of Kerala. It is about sixty kiolmeters from Kozhikode. The Kerala- Karnataka highway takes us to Wayanad. The panoramic beauty of the Thamar- assery Ghats provides a feast to the eyes. Thamar- assery Ghats is a hilly highway with nine hairpin curves from Adivaram to Lakkidi. It is known as the Tharachuram. At Lakkidi there is beautiful lake where you can enjoy boat journey. On the way to Lakkidi on either side of the road we can see monkeys sitting in rows as if they are there to welcome the tourists.

They sit there hoping to get eatables like nuts, fruits, etc. The forests around are rich in wild life-elephants, tigers and such other animals are found in plenty. Cash crops such as tea, coffee and pepper are grown here. Paddy also is cultivated. There is a jain temple which is constructed fully in glass. There is also the Thirunelli temple and river which are considered as holy. On the whole, we enjoyed our visit to Wayanad.
OR
The celebration of Onam is based on a legend. Malayalees believe that once upon a time there lived a king in Kerala, named Mahabali. He was a just king and during his rule all people were equal. There was no cheating, no exploitation, and no corruption. All the people were prosperous and happy. But some of the gods became jealous of him. They wanted to overthrow Mahabali. Va mana, one of the gods, came in the form of a poor asectic. He begged three feet of land from Mahabali. He being very kind obliged him and gave him permission to measure the land he had asked for. Vamana began to grow in size and became as tall as the sky.

The god measured two feet and the whole land was over. He asked Mahabali where he would have his third foot of land. The good king bent his head and told him to measure it on his head. The cruel Vamana put his foot on Mahabalis head and he was pushed into the underworld. While going into the underworld Mahabali asked one favour from Vamana, namely, he should be permitted to visit his subjects in Kerala once a year. It was granted and Malayalees celebrate Onam as the day on which Mahabali visits his people. Onam is celebrated as the national festival of Kerala. Flower carpets are arranged infront of every house. Sumptuous meals are prepared in every house. Boat races, tiger dances and such other entertainments are organized during the Onam season.

Answer 22.
The fresh air from the gooseberry orchards can be felt here in this time of early morning. Nicholai called his estate Tchimbarshove Corner, or Himalayskoe. It was full of ditches, fence, hedges, row of young fir-trees, trees everywhere, and it was difficult to cross the yard or where to put your horse. Ivanich went to the house and was met by a red-haired dog, as fat as a pig. He tried to bark but felt too lazy. Out of the kitchen came out the cook who was also as fat as a pig. It was an estate with there hundred areas of land with a farm house, a cottage, and a park, but there was no orchard. Nicholai ordered twenty gooseberry bushes and setded down to a country life. Ivanich was happy to find his brother contented in life.

Answer 23.
Good Deeds – Sasikanth Nishatith Sarma.
As the title of the poem suggests, the poem is about the good deeds that we do and the good results they produce. The world is a mixture of happiness and sorrow. The poet reminds the readers that there is only one life and it should be enjoyed. At the same time we should take care to keep company with good people. We should saw the seeds of virtues and cultivate the mind with healthy thoughts obtained from the experiences for ages. Keep on doing good deeds so that you do not have time to do bad things.

If you do any harm to anyone, it will be a blemish on your character. One, who wants to succeed in life, must always pay attention to acquire good qualities. It is not the quantity but the quality that matters. A wise man can only give advice. But it is you who should know what yours needs are. Then you decide what to do and what not to do.It is a moral poem written in twenty two lines. The poem is written in rhyming couplets. Every two lines rhyme. Knife/ life, well/dwell are examples. The poem is written in simple language.

Plus One English Previous Year Question Papers and Answers

Plus One Computer Application Model Question Paper 3

Kerala Plus One Computer Application Model Question Paper 3

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Model Question Papers Paper 3 33

Part A

Answer all questions from 1 to 5
Plus One Computer Application Model Question Papers Paper 3 1

Question 1.
The Least Significant Digit (LSD) of (1234.56)10 is …………
Plus One Computer Application Model Question Papers Paper 3 2

Question 2.
The process of detecting and correcting errors in a program is called …………….
Plus One Computer Application Model Question Papers Paper 3 3

Question 3.
Name any two keywords in C+ +.
Plus One Computer Application Model Question Papers Paper 3 4

Question 4.
The memory size required for the void data type is ……………
Plus One Computer Application Model Question Papers Paper 3 5

Question 5.
Rewrite the expression a = a + 1 using an arithmetic assignment operator.
Plus One Computer Application Model Question Papers Paper 3 6

Part B

Answer any nine questions from 6 to 16
Plus One Computer Application Model Question Papers Paper 3 7

Question 6.
Find the octal and hexadecimal equivalent of (111101 )2.
Plus One Computer Application Model Question Papers Paper 3 8

Question 7.
Write a short note on any two utility software.
Plus One Computer Application Model Question Papers Paper 3 9

Question 8.
Redraw the following flowchart by correcting mistakes.
Plus One Computer Application Model Question Papers Paper 3 10

Question 9.
Classify the followings into valid and invalid literals and give a reason for invalid literals.
Plus One Computer Application Model Question Papers Paper 3 11
33,000 +410. 5.6E 82

Question 10.
Consider a = 5 and b = 2 and find the result of the following expressions.
Plus One Computer Application Model Question Papers Paper 3 12

  1. a > b
  2. a !=b && b > a

Question 11.
Write a short note on any two statements in C+ +
Plus One Computer Application Model Question Papers Paper 3 13

Question 12.
Briefly, explain type promotion with suitable example.
Plus One Computer Application Model Question Papers Paper 3 14

Question 13.
Write the equivalent switch statement for the following.
Plus One Computer Application Model Question Papers Paper 3 15

Question 14.
Define the terms given below.
Plus One Computer Application Model Question Papers Paper 3 16
a. Bandwidth
b. Noise,

Question 15.
Name any four basic elements for data communication.
Plus One Computer Application Model Question Papers Paper 3 17

Question 16.
Write two advantages of Electronic Payment System (EPS).
Plus One Computer Application Model Question Papers Paper 3 18

Part C

Answer any nine questions from 17 to 27
Plus One Computer Application Model Question Papers Paper 3 19

Question 17.
If (X)16 = (Y)10 = (Z)8 = (11111111)2. find the values of X, Y and Z.
Plus One Computer Application Model Question Papers Paper 3 20

Question 18.
What is e-waste? Explain any two e-waste disposal methods.
Plus One Computer Application Model Question Papers Paper 3 21

Question 19.
Write an algorithm to find the sum of numbers from 1 to 10.
Plus One Computer Application Model Question Papers Paper 3 22

Question 20.
Explain any two types of programming errors.
Plus One Computer Application Model Question Papers Paper 3 23

Question 21.
Consider the following diagram and answer the question.
Plus One Computer Application Model Question Papers Paper 3 24
Write the base address (Lvalue), content (Rvalue) and Name of variables,
Plus One Computer Application Model Question Papers Paper 3 25

Question 22.
Write short notes on.
Plus One Computer Application Model Question Papers Paper 3 26
a. Preprocessor directive
b. Header file
c. Main() function

Question 23.
What is the use of type modifiers in C++? List any four type modifiers.
Plus One Computer Application Model Question Papers Paper 3 27

Question 24.
Write a C++ program to input an integer and check whether it is positive, negative or zero.
Plus One Computer Application Model Question Papers Paper 3 28

Question 25.
Compare Dialup connection and wired broadband connection.
Plus One Computer Application Model Question Papers Paper 3 29

Question 26.
a. Consider the following email address and write the username and domain name of it.
Plus One Computer Application Model Question Papers Paper 3 30
b. List any four advantages of email.
Plus One Computer Application Model Question Papers Paper 3 31

Question 27.
Explain any three IT-enabled services.
Plus One Computer Application Model Question Papers Paper 3 32

Part D

Answer any two questions from 28 to 30
Plus One Computer Application Model Question Papers Paper 3 33

Question 28.
“Open source software are getting more popular all over the world today”.
Plus One Computer Application Model Question Papers Paper 3 34
a. Write the full form of FSF.
Plus One Computer Application Model Question Papers Paper 3 35
b. Briefly elaborate four freedoms of open source software.
Plus One Computer Application Model Question Papers Paper 3 36
c. Give four examples of open source softwares.
Plus One Computer Application Model Question Papers Paper 3 37

Question 29.
a. List the four different parts of a loop in C++.
Plus One Computer Application Model Question Papers Paper 3 38
b. Compare while loop and do-while loop with suitable example.
Plus One Computer Application Model Question Papers Paper 3 39

Question 30.
a. Define topology,
Plus One Computer Application Model Question Papers Paper 3 40
b. Explain any two topologies.
Plus One Computer Application Model Question Papers Paper 3 41
c. Differentiate HUB and SWITCH.
Plus One Computer Application Model Question Papers Paper 3 42

Answers

Answer 1.
6

Answer 2.
debugging’

Answer 3.
continue, float

Answer 4.
zero. It does not require any memory space.

Answer 5.
a+ = 1

Answer 6.
(111101)2= 111 → 7, 101 → 5 = (75)8
(111101)= 0011 → 3, 1101 → D
= (3D)16

Answer 7.
a. Compression tools. Large files can be compressed so that they take less storage area. Compression of files is known as zipping and decompression is called unzipping, eg., WinZip, WinRAR.
b. Disk Defragmenter. It is a program that rearranges files on a computer hard disk. This enables the computer to work faster and more efficiently.

Answer 8.

Answer 9.
33,000: Invalid, Use of special character
(.)
+410. : Invalid. Use of special character
(.)
5.6E: Invalid. No exponent part
82: Valid

Answer 10.

  1. True
  2. False

Answer 11.
1. Declaration statement. Variables are identifiers of memory locations add are used in programs to refer to data. They should be declared prior to their use in the program and data types are required for this. The syntax of variable declaration is:

data type <variable1>
[, <variable2>, <variable3 >,...];
eg., int rollno, age;

2. Assignment statement. A specific data is stored in memory locations (variables) using an assignment operator (=). The statement that contains = is known as assign.. ment statement. It is also a binary operator and the operand to the left of = should be a variable. The operand after = may be a numeric constant, a variable or an expression of numeric type.

Answer 12.
In implicit type conversion, compiler is responsible for the conversion. It always converts a lower type into, higher one and hence it is also known as type promotion,
eg., For example, the expression 5 / 2 * 3 + 2.5 which gives the result 8.5. The evaluation steps are as follows:
Step 1: 5/2 gives 2 (Integer division) Step 2: 2 * 3 gives 6 (Integer multiplication)
Step 3: 6 + 2.5 gives 8.5 (Boating point addition, 6 is converted into 6.0)

Answer 13.

switch (ch)
{
case ‘P’: cout<<“Pass”;
break;
case ‘F: cout<<“Failed”;
break;
default: cout<<“No result";
}

Answer 14.
a. Bandwidth. It is the maximum amount of data that can be transmitted by the medium. It can be measured in Hertz.
b. Noise. It is the unwanted electrical or electromagnetic interference that adversely affects the transmitted data signals.

Answer 15.
Message. It is the data/information to be transmitted from one computer to another.
Sender. It is a computer or a device that sends data. It is also called source or transmitter.
Receiver. It is a computer or a device that receives data.
Protocol. The rules and conventions for transmitting data.
Medium. It is the path through which message travels from sender to receiver.

Answer 16.
A system of financial exchange between buyers and sellers in an online environment is called an Electronic Payment System (EPS). The financial exchange is facilitated by a digital financial instrument (such as a credit/debit card, electronic cheque or digital cash) backed by a bank and/or an Intermediary.

Answer 17.
1111 → F, 1111 → F
(11111111)2 = (FF)16 = (X)16
011 → 3, 111 → 7, 111 → 7
(11111111), = (377)e = (Z)8
(11111111 )2 = 1 × 27 + 1 × 26 + 1 × 2s + 1 × 24 + 1 × 23 + 1 × 22 + 1 × 21 + 1 × 2°
= 128 + 64 + 32+ 16 + 8 + 4 + 2 + 1 = 155
,(155)10 = (Y)10

Answer 18.
It is defined as discarded computers, office electronic equipment, entertainment device, mobile phones, television sets, and refrigerators. This global mountain of waste is expected to continue growing at 8% per year.

  1. Reuse: It refers to secondhand use or usage after the equipment has been upgraded or modified.
  2. Incineration: It is a controlled and complete combustion process in which the waste is burned in specialty designed incinerators at a high temperature in the range of 900 to 1000 degree Celsius.
  3. Recycling: It is the process of making or manufacturing new products from a product that has originally served its purpose.
  4. Landfilling: In this method, soil is excavated from the trenches made and waste material is buried in it, which is covered by a thick layer of soil.

Answer 19.

Step 1: Start
Step 2: a = 1, s = 0
Step 3: s = s + a
Step 4: a = a + 1
Step 5: Repeat steps 3 to 4 while a<=10
Step 6: Print M
Step 7: Stop

Answer 20.
1. Syntax errors result when the rules or syntax of the programming language are not followed. Such program errors typically involve incorrect punctuation, incorrect word sequence, undefined term, or illegal use of terms or constructs. In the case of interpreters, the syntax errors will be detected and displayed during execution,

2. The logical error is due to the improper planning of the program’s logic. The language processor successfully translates the source code into machine code if there are no syntax errors. The computer actually follows the program instructions and gives the output as per the instructions. But the output may not be correct. This is known as logical errors. In order to determine whether or not there is a logical error, the program must be tested.

Answer 21.
Base address (Lvalue) 3000
Content (Rvalue) 105
Name of variables NUM

Answer 22.
a. Preprocessor directives. A C++ program starts with preprocessor directives. Preprocessors are the compiler directive
‘ statements which give instruction to the compiler to process the information provided before actual compilation starts. The # include is used to link the header files available in the C++ library. There are some other preprocessor directives such as # define, # undef, etc.

b. Header files. It contains the information about functions, objects and predefined derived data types and they are available along with compiler. The header file ios team contains the information about the objects cin and cout.

c. The main() function. The execution starts at main() and ends within main(). If we use any other function in the program, it is called (or invoked) from main(). The function header main() is followed by its body, which is a set of one or more statements within a pair of braces {}. This structure is known as the definition of the main() function. Each statement is delimited by a semicolon (;).

Answer 23.
C++ provides data type modifiers which help us to alter the size, range or precision. It alters the range of values permitted to a data type by altering the memory size and/or sign of values. Important modifiers are signed, unsigned, long and short.

Name Description Size
char Character or a small integer 1 byte
short int (short) Short Integer 2 bytes
int Integer 4 bytes
long int (long) Long integer 4 bytes
float Floating point number 4 bytes
double Double preci­sion floating-point number 8 bytes
long double Long double-precision floating-point number 10 bytes

Answer 24.

# include <iostream> 
using namespace std; 
int main()
{
int a;
cout<<“Enter an integer:”; 
cin >> a;
if (a > 0) .
cout<<“The number is positive”;
else if (a < 0) *
cout<<“The number is negative”;
else
cout<<“The number is zero”; return 0;
}

Answer 25.
Dial-up connection. The internet connection is established by dialing into an ISP’s computer. If ISP is not busy they verify the username and password if it is valid they will connect our computer to the internet. It uses Serial Line Internet Protocol (SLIP) or Points to Point Protocol (PPP). It is slower and has a higher er rotate.

Wired Broadband Connectivity. In these, there is a permanent wire connection, between your computer and ISP. So it’s an “always on” connection. It uses a broadband modem and we can use telephone lines while using the internet.

Answer 26.
a. Username my school
b. Domain name gmail.com b. The advantages of email are:

  1. Speed is high.
  2. It is cheap.
  3. We can send email to multiple recipients.
  4. Incoming messages can be saved locally.
  5. It reduces the usage of paper.
  6. We can access mailbox anytime and from anywhere. „

Answer 27.
1. Medical equipment. Most of the modern medical equipment work with the help of computers. Scanners like CT, MRI depends on computers to process their data. Computer-guided lasers are used in surgery, even in the removal of brain tumors etc.

2. Electronic Medical Records (EMR). It is possible to store all patient’s records in digital format. This is known as EMR. EMR is used by doctors for diagnostics and treatment.

3. Web-based support/diagnosis. There are a lot of treatments, therapies, medical journals are available on the internet, which can be referred to by patients. Some websites provide facility f&r identifying their diseases without consulting a doctor. This prediction may not be correct in some time.

Answer 28.
a. Free Software Foundation
b. Freedom 0: The freedom to run a program for any purpose.
Freedom 1: The freedom to study how the program works and adapt it to your needs. Access to source code should be provided.
Freedom 2: The freedom to distribute copies of the software.
Freedom 3: The freedom to improve the program and release your improvements to the public, so that the whole community benefits.
c.

  1. GNU / Linux is a computer operating system assembled under the model of free and open source software development and distribution.
  2. GIMP (GNU Image Manipulation’Program) is an image editing software.
  3. Mozilla Firefox is one of the most popular web browsers. It provides added security features for safe browsing.
  4. OpenOffice.org is a complete office software which contains word processor, spreadsheet and presentations.

Answer 29.
a. A looping statement has four components: initialization expression, test expression, update expression, loop body. The loop body is the set of statements for repeated execution. The execution is continued as long as the test expression (condition) is true. The variable used in the test expression, called a loop control variable, gets its initial value through the initialization expression (or statement). Update expression changes the value of the loop control variable. Usually, it takes place after each execution of the loop body.

b. while loop. The condition is checked first and if it is found, True the body of the loop will be executed. That is the body will be executed as long as the condition is True. The syntax of a while loop is, initialization of loop control variable;

while (test expression)
{
body of the loop;
updation of Ipop control variable;
}
eg., int k= 1; while(k<=3)
{
cout << k << `\t’;
++k;
}

do while loop. The condition is checked only after executing the loop body. So it is certain that the loop body will be executed at least once in the case of do while loop.

Syntax is:
initialization of loop control variable; 
do
body of the loop;
updation of loop control variable;
}
while (test expression); 
eg., int k = 1; do {
cout << k << At’;
++k;
}
while (k<=3);

Answer 30.
a. The physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network,
b.
1. Ring topology. All the computers are connected in the shape of a ring and it is a closed-loop. Here also there is no central computer. Here a computer transmits a message, which is tagged along with its destination computer’s Address. The message travels in one direction and each node checks whether the message is for them. If not, it passes to the next node. It requires only short cable length. Its advantages are no signal amplification required because each node do this and requires less cable, so cost-effective. The main disadvantage is if a node fails, the entire network will fail.

2. Bus topology. All the computers are attached to a single cable, called the bus. If anyone node has to send data to another node, it will send the data to the bus. In the bus, the data travels in both directions. The node that needs the data copies it. A small device called terminator connected at both end of the bus removes the data and frees the bus for next transmission. Advantages are added or remove computer is very easy. It requires less cable length and the installation cost is less. A disadvantage is fault detection is very difficult because of no central computer,

c. Hub. It is a small, simple and inexpensive device used to connect computers (devices) to a network. If a computer wants to transmit data to another computer, first it sends to the hub, the hub retransmits this data to all other computers. Each and every computer gets the data and check whether it is for them or not. It increases the network traffic and hence the transmission speed is low.

Switch. It is an expensive device used to connect computers (device) to a network. Unlike a hub, switch transmit data, not to all computers, it retransmits data only to the intended computer. So the traffic is less and the speed is high.

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Model Question Paper 2

Kerala Plus One Computer Application Model Question Paper 2

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Model Question Papers Paper 2 33

Part A

Answer all questions from 1 to 5
Plus One Computer Application Model Question Papers Paper 2 1

Question 1.
JPEG stands for
Plus One Computer Application Model Question Papers Paper 2 2

Question 2.
The process of making or manufacturing new products from the product that has originally served its purpose is called
Plus One Computer Application Model Question Papers Paper 2 3

Question 3.
Program errors are known as
Plus One Computer Application Model Question Papers Paper 2 4

Question 4.
Its value does not change during execution. What is it?
Plus One Computer Application Model Question Papers Paper 2 5

Question 5.
The act of breaking into a secure network to destroy data is called hacking.
Plus One Computer Application Model Question Papers Paper 2 6

Part B

Answer any nine questions from 6 to 16
Plus One Computer Application Model Question Papers Paper 2 7

Question 6.
If (x)8 = (101011)2, then find x.
Plus One Computer Application Model Question Papers Paper 2 8

Question 7.
Explain the benefits of a blue-violet laser in BluRay DVD.
Plus One Computer Application Model Question Papers Paper 2 9

Question 8.
When do we use ROM?
Plus One Computer Application Model Question Papers Paper 2 10

Question 9.
What is the runtime error? Explain.
Plus One Computer Application Model Question Papers Paper 2 11

Question 10.
Identify the errors in the following code segments:
Plus One Computer Application Model Question Papers Paper 2 12

a. 
int main()
{
cout<<“Enter two numbers”
cin >> num >> auto
float area = Length * breadth ;
}
b. 
# include <iostream>
using namespace std
void Main()
{
int a, b 
cin<<a <<b 
max=(a > b) a:b 
cout>max
}

Question 11.
Write the working of arithmetic assignment operator? Explain all arithmetic assignment operators with the help of examples.
Plus One Computer Application Model Question Papers Paper 2 13

Question 12.
Checks whether a given character is an alphabet or a digit.
Plus One Computer Application Model Question Papers Paper 2 14

Question 13.
Define resource sharing.
Plus One Computer Application Model Question Papers Paper 2 15

Question 14.
Define network topology.
Plus One Computer Application Model Question Papers Paper 2 16

Question 15.
What are the disadvantages of email?
Plus One Computer Application Model Question Papers Paper 2 17

Question 16.
What are the facilities provided by the IRCTC website?
Plus One Computer Application Model Question Papers Paper 2 18

Part C

Answer any nine questions from 17 to 27
Plus One Computer Application Model Question Papers Paper 2 19

Question 17.
What are the methods of representing integers in computer memory?
Plus One Computer Application Model Question Papers Paper 2 20

Question 18.
What is the role of a computer in problem-solving?
Plus One Computer Application Model Question Papers Paper 2 21

Question 19.
What is a computer program? How do algorithms help to write programs?
Plus One Computer Application Model Question Papers Paper 2 22

Question 20.
Distinguish between identifiers and keywords.
Plus One Computer Application Model Question Papers Paper 2 23

Question 21.
Explain the different types of logical operators in C++.
Plus One Computer Application Model Question Papers Paper 2 24

Question 22.
Explain the memory representation of a variable with the help of an example.
Plus One Computer Application Model Question Papers Paper 2 25

Question 23.
How do the type modifiers affect the size and range of int and char data types?
Plus One Computer Application Model Question Papers Paper 2 26

Question 24.
Write a C++ program to find the biggest number from 3 given numbers.
Plus One Computer Application Model Question Papers Paper 2 27

Question 25.
Briefly explain the working of a for loop along with its syntax. Give an example of for loop to support your answer.
Plus One Computer Application Model Question Papers Paper 2 28

Question 26.
What are the advantages and disadvantages of social media?
Plus One Computer Application Model Question Papers Paper 2 29

Question 27.
Discuss in detail various uses of IT in health care field.
Plus One Computer Application Model Question Papers Paper 2 30

Part D

Answer any two questions from 28 to 30
Plus One Computer Application Model Question Papers Paper 2 31

Question 28.
List and explain various categories of software.
Plus One Computer Application Model Question Papers Paper 2 32

Question 29.
In the following program, some lines are missing. Fill the missing lines and complete it.
Plus One Computer Application Model Question Papers Paper 2 33

# include<iostream.h>
....................................
{ 
int num1, num2, sum; 
cout<< “Enter two numbers:”;
......................................
......................................
cout<< “Sum of numbers are = "<<sum;
}

Question 30.
Which is/are communication channels suitable for the following situations?
Plus One Computer Application Model Question Papers Paper 2 34
a. Setting up a LAN.
Plus One Computer Application Model Question Papers Paper 2 35
b. Transfer of data from a laptop to a mobile phone.
Plus One Computer Application Model Question Papers Paper 2 36
c. Transfer of data from one mobile phone to another.
Plus One Computer Application Model Question Papers Paper 2 37
d. Creating a remote control that can control multiple devices in a home.
Plus One Computer Application Model Question Papers Paper 2 38
e. Very fast communication between two offices in two different countries.
Plus One Computer Application Model Question Papers Paper 2 39
f. Communication in hilly area.
Plus One Computer Application Model Question Papers Paper 2 40
g. Communication within a city and its vicinity where a coast of cabling is too high.
Plus One Computer Application Model Question Papers Paper 2 41

Answers

Answer 1.
Joint Picture Experts Group

Answer 2.
recycling

Answer 3.
bugs

Answer 4.
constant

Answer 5.
unethical

Answer 6.
101 → 5,
011 → 3
x = 53

Answer 7.
The benefit of using a blue-violet laser is that it has a shorter wavelength which makes it possible to focus the laser spot with greater precision. This allows data to be packed more tightly. Therefore it is possible to store more data on the disk. Can hold up to 25 GB on a single-layer disc and 50 GB on a dual-layer disc. ‘

Answer 8.
ROM is nonvolatile; the contents are retained even after the power is switched off. It is used to hold boot up a program known as Basic Input Output System (BIOS). This software runs when the computer is switched on or ‘boots up’. It checks the computer’s hardware and then loads the operating system.

Answer 9.
The error messages may be displayed by the error handling function of the language. These errors are known as a runtime error. These errors can be rectified by providing instruction for checking, the validity of the data before it gets processed by the subsequent instructions in the program.

Answer 10.
a. No header file, no semicolon is used at the end of a second and third statement. Variables did not declare a return value not specified, auto cannot be used here.
b. M is upper case in main(), no semicolon used in any statements. Operators of sin and cout are wrong. Missing in conditional operator?

Answer 11.
A simple arithmetic statement can be expressed in a more condensed form using arithmetic assignment operators.
eg., a=a+10 can be represented as a+=10. Here += is arithmetic assign* meant operator. The arithmetic assignment operators in C++ are +=, =,*=,/=, %=. These are also known as C++ shorthands. These are all binary operators and the first operand should be a variable. The use of these operators makes the two operations (arithmetic and assignment) faster than the usual method.
Plus One Computer Application Model Question Papers Paper 2 42

Answer 12.

# include<iostream> 
using namespace std; 
int main()
{
char ch;
cout << “Enter the character(only small letter): "; 
cin » ch;
if (ch >= ‘a’ && ch <= 'z) 
cout<<“You entered an alphabet”; 
if (ch >= ‘0’ && ch <= ‘9’) 
cout<<“You entered a digit\n”; 
return 0;
}

Answer 13.
It is defined as the sharing of available hardware and software resources in a computer network.

Answer 14.
The physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network.

Answer 15.
1. It requires a computer, a modem, software, and internet connection to check mail.
2. Some emails may contain viruses.
3. Mailboxes are filled with junk mail. So very difficult to find the relevant mail.

Answer 16.
IRCTC provides online booking facilities of railway tickets and offers other services like checking reservation status, train timing, reservation of hotels for the tourists across the country.

Answer 17.
There are three methods for representing an integer number in computer memory. They are:
a. Sign and magnitude representation
b. 1’s complement representation
c. 2’s complement representation

Answer 18.
A computer can solve problems only when we give instructions to it. If it understands the tasks contained in the instructions, it will work accordingly. An instruction is an action-oriented statement. It tells the computer what operation it should perform. A computer can execute (carry out the task contained in) an instruction only if the task is specified precisely and accurately.

Answer 19.
A sequence of instructions written in a language that is understood by a computer is called a computer program.
The algorithm is a step by step procedure to solve a problem. Each step represents a specific task. These steps help the programmer to write instructions in a programming language.

Answer 20.
Identifiers are the user-defined words that are used to name different program elements such as memory locations, statements, functions, objects, classes etc.

The words (tokens) that convey a specific meaning to the language compiler are called keywords. These are also known as reserved words as they are reserved by the language for special purposes and cannot be redefined for any other purposes.

Answer 21.
1. && (logical AND). If two relational expressions E1 and E2 are combined using this ‘operator, the result will be 1 (True) only if both E1 and E2 have values 1 (True). In all other cases, the result will be 0 (False).
2. 11 (logical OR). If two relational expressions E2 and E2 are combined using logical OR (| |) operator, the result will be 0 (False) only if both E1 and E2 are having a value 0 (False), In all other cases, the result will be 1 (True).
3. (logical NOT). This operator is used to negate the result of a relational express

Answer 22.
Plus One Computer Application Model Question Papers Paper 2 43
Memory representation of a variable The variable name is num and it consumes 4 bytes of memory at memory addresses 101, 102, 103 and 104. The content of this variable is 18. That is the Lvalue of num is 101 and the Rvalue is 18.

Answer 23.
C++ provides data type modifiers which help us to alter the size, range or precision. It alters the range of values permitted to a data type by altering the memory size and/or sign of values.

Name Description Size
char Character or a small integer 1 byte
short int (short) Short Integer 2 bytes
int Integer 4 bytes
long int (long) Long integer 4 bytes

Answer 24.

# include<iostream> 
using namespace std; 
int main()
{
int colour;
cout<<“Enter a number between 1 and 4:”;
cin>>colour; 
if (colour==1) 
cout<<“Red”; 
else if (colour==2)
cout<<“Green”; 
else if (colour—3) 
cout<<“Blue”; else
cout<<“Wrong input”; 
return 0;
}

Answer 25.
for loop is an entry controlled loop. All the three loop elements (initialization, test expression, and update statement) are placed together in for a statement. So it Snakes the program compact. The syntax is:

for (initialization; test expression; update statement)
body-of-the-loop;
}
These three steps (test, body, update) are continued until the test expression
is evaluated to False, 
eg., for (n=1; n<= 10; ++n)
{
cout<< “hello”;
}

Answer 26.
Advantages are:

  1. Bring people together; It allows people to maintain the friendship.
  2. Ran and organize events: It allows users to plan and organize events.
  3. Business promotion: It helps the firms to promote their sales.
  4. Social skills: There is a key role in the formation of society.

Disadvantages are:

  1. Intrusiontoprivacy. The personal information (photo, email id, phone number, name, address etc.) posted in such sites can be used for illegal activities.
  2. Addiction. Addiction to such sites wastes our valuable time.
  3. Spread rumors. Social media will spread the news quickly.

Answer 27.
Some of the areas where ICT used in health are the following:
1. Medical equipment. Most of the modern medical equipment work with the help of computers. Scanners like CT, MRI depends on computers to process their data. Computer-guided lasers are used in surgery, even in the removal of brain tumors etc.

2. Electronic Medical Records (EMR). It is possible to store all patient’s records in digital format. This is known as EMR. EMR is used by doctors for diagnostics and treatment.

3. Web-based support/diagnosis. There are a lot of treatments, therapies, medical journals are available on the internet, which can be referred to by patients. Some websites provide a facility for identifying their diseases without consulting a doctor. This predictions, may not be correct in some time.

4. Telemedicine. It helps to monitor and share a patients conditions like body temperature, blood pressure, heartbeats, ECG etc. from a distant place by a doctor. A surgeon in one place of the world can contact an expert from another part of the world while performing a surgery. It reduces cost and time.

5. Research and Development. Various researches are going on to discover new medicines. Use of IT in biotechnology have reduced the cost of drug discovery. Drugs for a specific purpose can be developed with the use of advanced computers.

Answer 28.
The software is a general term used to denote a set of programs that help us to use a computer system and other electronic devices efficiently and effectively. The two types of software are:
1. System software: It is a set of one or more programs designed to control the operations of a computer.

  • Operating system: It is a set of programs that act as an interface between the user and computer hardware.
  • Language processors: The instructions to the computer are written in different languages. Various language processors are:
    • Assembler: It converts languages written in assembly language into machine language.
    • Interpreter: It converts a high-level language into machine language by-line by line.
    • Compiler: It translates a high-level language into machine language by converting all the lines at a time.
  • Utility software: A set of programs which help users in system maintenance tasks and in performing tasks of routine nature. Utility programs are compression tools (WinZip, Win RAR), disk defragmenter (rearranges files on a computer hard disk), backup software.

2. Application software: It is the software developed for a specific application. It includes general purpose software (Word Processing software, spreadsheet software, presentation software, database, multimedia), specific purpose software (designed to handle particular tasks).

Answer 29.

# include<iostream.h> 
void main()
{
int num1, num2, sum;
cout<< “Enter two numbers:”;
cin»num1>>num2;
sum = num1 + num2;
cout<< “Sum of numbers are = ”
<<sum;
}

Answer 30.
a. STP/UTP (Twisted pair cable)
b. Bluetooth or WiFi
c. Bluetooth or infrared
d. Infrared
e. Satellite communication
f. Microwaves
g. WiMax

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Model Question Paper 1

Kerala Plus One Computer Application Model Question Paper 1

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Model Question Papers Paper 1 33

Part A

Answer all questions from 1 to 5
Plus One Computer Application Model Question Papers Paper 1 1

Question 1.
Information may act as data. State True or False.
Plus One Computer Application Model Question Papers Paper 1 2

Question 2.
…………….. register holds the address of the next instruction to be executed by the processor.
Plus One Computer Application Model Question Papers Paper 1 3

Question 3.
A program written in HLL is known as ………..
Plus One Computer Application Model Question Papers Paper 1 4

Question 4.
The unpredictable value assigned to a variable at the time of its declaration is known as
Plus One Computer Application Model Question Papers Paper 1 5

Question 5.
The small text files used by browsers to remember our email IDs, usernames etc. are known as ……………..
Plus One Computer Application Model Question Papers Paper 1 6

Part B

Answer any nine questions from 6 to 16
Plus One Computer Application Model Question Papers Paper 1 7
Plus One Computer Application Model Question Papers Paper 1 8

Question 6.
Find decimal equivalent of (10001)2
Plus One Computer Application Model Question Papers Paper 1 9

Question 7.
What are the advantages of a hard disk?
Plus One Computer Application Model Question Papers Paper 1 10

Question 8.
Differentiate hardcopy and softcopy.
Plus One Computer Application Model Question Papers Paper 1 11

Question 9.
Write the names of two phases that are included in debugging.
Plus One Computer Application Model Question Papers Paper 1 12

Question 10.
What would happen if main () is not present in a program?
Plus One Computer Application Model Question Papers Paper 1 13

Question 11.
Comments are useful to enhance readability and understandability of a program. Justify this statement with examples.
Plus One Computer Application Model Question Papers Paper 1 14

Question 12.
What are the are the requirements to implement a multi-branching using a switch statement?
Plus One Computer Application Model Question Papers Paper 1 15

Question 13.
What is the peer-to-peer network? Peertopeer
Plus One Computer Application Model Question Papers Paper 1 16

Question 14.
Switch and hub are two devices associated with networking. Differentiate them.
Plus One Computer Application Model Question Papers Paper 1 17

Question 15.
Compare intranet and extranet.
Plus One Computer Application Model Question Papers Paper 1 18

Question 16.
What are the advantages of EMR?
Plus One Computer Application Model Question Papers Paper 1 19

Part C

Answer any nine questions from 17 to 27
Plus One Computer Application Model Question Papers Paper 1 20

Question 17.
And the smallest number in the list.
Plus One Computer Application Model Question Papers Paper 1 21
a. (1101 )2
b. (A)16
c. (13)8
d. (15)10

Question 18.
Write an algorithm to find a sum of first 100 odd numbers.
Plus One Computer Application Model Question Papers Paper 1 22

Question 19.
Draw a flowchart to display the first 100 natural numbers.
Plus One Computer Application Model Question Papers Paper 1 23

Question 20.
What is a floating point constant? What are the different ways to represent a floating point constant?
Plus One Computer Application Model Question Papers Paper 1 24

Question 21.
What are the three aspects of variables?
Plus One Computer Application Model Question Papers Paper 1 25

Question 22.
Find out the errors, if any, in the following C++ statements:
Plus One Computer Application Model Question Papers Paper 1 26

  1. cout<< “a=” a;
  2. m=5, n=12; 015
  3. cout << “x” ; <<x;
  4. cin >> y
  5. cout>>\n “abc”
  6. a = b + c
  7. break = x

Question 23.
The following program finds the sum of three numbers. Modify the program to find the average. (Average should display fractional part also).
Plus One Computer Application Model Question Papers Paper 1 27

# include<iostream>
using namespace std;
int main ()
int x, y, z, result;
cout<<“Enter values for x, y, z”;
cin>>x>>y>>z;
result = x + y + z; .
cout<< “The answer is =”<<result; 
return 0;
}

Question 24.
Rewrite the following statement using while and do while loops.
Plus One Computer Application Model Question Papers Paper 1 28
for(i=1; i<=10; i++) cout<<i;

Question 25.
Write the significance of break statement in the switch statement. What is the effect of the absence of a break in a switch statement?
Plus One Computer Application Model Question Papers Paper 1 29

Question 26.
What are the methods for preventing network attacks?
Plus One Computer Application Model Question Papers Paper 1 30

Question 27.
What are the major challenges faced in the implementation of e-Learning?
Plus One Computer Application Model Question Papers Paper 1 31

Part D

Answer any two questions from 28 to 30
Plus One Computer Application Model Question Papers Paper 1 32

Question 28.
Explain any five commonly used secondary or (auxiliary) memory devices.
Plus One Computer Application Model Question Papers Paper 1 33
Plus One Computer Application Model Question Papers Paper 1 34

Question 29.
WHte a C++ program to find the total and percentage of a student in six subjects.
Plus One Computer Application Model Question Papers Paper 1 35

Question 30.
What is network protocol? Explain.
Plus One Computer Application Model Question Papers Paper 1 36

Answers

Answer 1.
True

Answer 2.
Program Counter (PC)

Answer 3.
source code

Answer 4.
garbage value

Answer 5.
cookies

Answer 6.
(10001)2 = 1 × 24 + 0 × 23 + 0 × 22 + 0 × 21 + 1 × 2°
= 16 + 0 + 0 + 0 + 1
= 17
(10001 )2 = (17)10

Answer 7.
Hard disks have very high storage capacity, high data transfer rates, and low access time, it is more durable and less error-prone.

Answer 8.
Hardcopy outputs are permanent outputs which can be used at a later date or when required.
Softcopy outputs are electronic and are available on the screen in a digital form.

Answer 9.
Two phases that included in debugging are debugging of syntax errors during translation and debugging of logical errors during execution.

Answer 10.
The execution starts at main() and ends within main(). If we use any other function in the program, it is called (or invoked) from main().

Answer 11.
Comments are lines in the code that are added to describe the program. They are ignored by the compiler.
i. Single line comment: The characters // (two slashes) is used. The text appearing after II in a line is treated as a comment by the C++ compiler.
ii. Multiline comments: Anything written within /* and */ is treated as a comment so that the comment can take any number of lines.
eg., /* This program displays the message “Smoking is injurious to health” on the monitor */

# include <iostream.h> // To use the cout object
using namespace std; // To access cout 
int main() // program begins here 
{ // The following output statement displays a message
cout << “Smoking is injurious to health"; return 0;
} // end of the program

Answer 12.
The following are the requirements to implement a multi-branching using a switch statement:

  1. Conditions involve only equality checking. In other cases, it should be converted into equality expression.
  2. The first operand in all the equality expressions should be the same variable or expression.
  3. The second operand in these expressions should be integer or character constants.

Answer 13.
In this configuration, all the computers have equal priority. That means each computer can function as both a client and a server. There is no dedicated server.

Answer 14.
A switch is an expensive device used to connect computers (device) to a network. Unlike a hub, switch transmit data, not to all computers, it retransmits data only to the intended computer. So the traffic is less and the speed is high.

Answer 15.
Intranet: A private network inside a company or organization is called intranet.
Extranet: It allows vendors and business partners to access the company resources.

Answer 16.
It is a more economical way of storing data. Medical history of patients will be accessible to patients easier and quicker. Transfer of records’ of patients between doctors/hospitals is much easier. A medical condition of a patient can be examined.

Answer 17.
a: (1101)= 1 × 23 + 1 × 22 + 0 × 21 + 1 × 2°
= 8 + 4 + 1
= 13
b. (A)16 = 10
c. (13)8 = 1 × 81 + 3 × 8°
= 8 + 3 = 11
d. (15)10 = 15
The smallest value is (A)16 = 10

Answer 18.

Step 1: Start
Step 2: Sum = 0, count = 1
Step 3: If count/2==1 then go to Step 4
Step 4: Sum = Sum + count
Step 5: count = count + 1
Step 6: If count<=100 then go to Step 3
Step 7: Print Sum
Step 8: Stop

Answer 19.
Plus One Computer Application Model Question Papers Paper 1 37

Answer 20.
Rotating point literals or real constants are numbers having fractional parts. These can be written in one of the two forms called fractional form or exponential form. A fractional form consists of signed or unsigned digits including a decimal point between digits. A real constant in exponent form has two parts: a mantissa and an exponent.

Answer 21.

  1. Variable name. It is a symbolic name (identifier) given to the memory location through which the content of the location is referred to.
  2. Memory address. Every cell (or byte) in RAM will be assigned a unique address to refer it. The address is also called the Lvalue of a variable.
  3. Content. It is the value stored in the location. This is also called the Rvalue of the variable. Type and size of the content depending on the data type of the variable.

Answer 22.

  1. After “a=” an operator << is missing.
  2. The data type is missing, the variable name of 015 is missing.
  3. The first semicolon is an error.
  4. The semicolon is missing at the end.
  5. The semicolon is missing at the end. << should be used after cout. \n must be in double quote.
  6. The semicolon is missing at the end. A data type is missing.
  7. The semicolon is missing at the end. a break is a keyword.

Answer 23.

# include<iostream> 
using namespace std;
int main ( )
int x, y, z; float result;
cout<< “Enter values for x, y, z”; 
cin>>x>>y>>z; 
result = (x + y + z)/3.0; 
cout<< “The answer is =”<<result; 
return 0;
}

Answer 24.

while: 
i = 1;
while (i<= 10)
{
cout<<i;
i++;
}
do while: 
i = 1; 
do 
{
cout<<i;
i++;
}
while (i<= 10);

Answer 25.
When a break statement is encountered, the program control goes to the statements following the switch statement.
If the break statement is absent, even after finding a match other cases following are also checked. If no match is found, statements in the default block get executed.

Answer 26.
1. Firewall. A firewall is a combination of computer hardware and software that provide security to the computer/network. A firewall checks all the incoming and outgoing data from your computer and determines whether they are allowed or not.

2. Antivirus scanner. Antivirus software scans the files in the computer and removes viruses if they found. When an antivirus found malware in a file, the antivirus stops the file from running and put it into quarantine. Quarantine is a special area for storing files that are infected by a virus.

3. Cookies. These are small text files created when we use a browser to visit a website. Cookies store information like usernames, email address, websites visited, products purchased etc. Cookies help for efficient browsing. Cookies are not viruses, but it is possible for a hacker to use cookies as spyware. Most browsers provide facility to delete cookies.

Answer 27.

  1. Face to face contact between students adds teachers is not possible.
  2. Proper interaction among teachers and students are often limited due to the lack of infrastructural facilities.
  3. Equipment and technology (computer and high speed Internet) requirement restrict the adoption of e-Learning.
  4. Learners who require constant motivation may not be serviced adequately.
  5. Handson on real laboratory scenario is also a constraint in eLearning.

Answer 28.
1. Hard disk. It consists of metal disks coated with magnetic material concealed in dust free containers. Hard disks have very high storage capacity, high data transfer rates and low access time. It is more durable and less error prone. A hard disk may contain one or more platters. Each platter requires two read/write heads, one for each surface.

2. Compact Disc (CD). It is an optical storage medium capable of storing upto 700 MB of data. A CD drive uses red laser beams for reading from and writing data into CD. Two types of CDs are CDR (recordable) and CDRW (Rewritable).

3. USB flash drive. It is a small external storage device which consists of flash memory. These are portable and rewritable. The storage capacity of a USB drive currently varies from 2 GB to 32 GB.

4. Digital Versatile Disk (DVD). In these higher storage capacity is achieved by using smaller spots to record data. Recording and reading of data is done using DVD drive. The capacity of a DVD varies from 4.37 GB to 15.9 GB. There are three major types of DVDs: DVDROM, DVDRW and DVDRAM.

5. Magnetic tape. It is a backup device that can store huge volume of data. The cost per unit volume of a magnetic tape is less compared to other magnetic storage devices. It is a recording medium consisting of a thin tape with a coating of fine magnetic material. It can be used for recording analog or digital data. Data is stored in frames across the width of the
‘tape with a read/ write head.

Answer 29.

# include <iostream> 
using namespace std; 
int main()
{
int i, mark, sum = 0, max; 
float per;
for (i = 0; i<6; i++)
{
cout<<“ Enter the mark: ”;
cin>>mark;
sum = sum + mark; 
}
cout<<“Enter the maximum mark: ”; 
cin>>max;
per = (sum/max)* 100; 
cout<<“Sum of the entered marks:” << sum;
cout<<“ Percentage of the marks in six subjects:” << per; 
return 0;
}

Answer 30.
A protocol is a collection of rules and regulations to transfer data from one location to another. Different types of protocols are:

  1. Transmission Control Protocol (TCP): It uses a set of rules to exchange messages with other internet points at the information packet level.
  2. Internet Protocol (IP): It uses a set of rules to send and receive messages at the internet address level.
  3. File Transfer Protocol (FTP): It is used for transferring files between computers connected to local network or internet.
  4. Hyper Text Transfer Protocol (HTTP): It is a protocol used for WWW for enabling the web browse to access web server and request HTML documents.

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Previous Year Question Paper 2017

Kerala Plus One Computer Application Previous Year Question Paper 2017

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Previous Year Question Papers and Answers 2017 33

Question 1.
Processed data is known as ………….
a. facts
b. figures
c. information
d. raw material
Plus One Computer Application Previous Year Question Papers and Answers 2017 1

Question 2.
USB port stands for ……………..
Plus One Computer Application Previous Year Question Papers and Answers 2017 2
a. Uniform Serial Bus
b. Universal Serial Bus
c. Uninterruptable Serial Bus
d. Updatable Serial Bus

Question 3.
Fill the missing block.
Plus One Computer Application Previous Year Question Papers and Answers 2017 3

Question 4.
Which one of the following is NOT a search engine?
Plus One Computer Application Previous Year Question Papers and Answers 2017 4
a. Google
b. Bing
c. Facebook
d. Ask

Question 5.
In ICT enabled services BPO stands for
Plus One Computer Application Previous Year Question Papers and Answers 2017 5

Question 6.
for, while do while are the three looping statements in C+ +. From these three loops which loop will execute the loop body at least once even though the condition is false?
Plus One Computer Application Previous Year Question Papers and Answers 2017 6
Plus One Computer Application Previous Year Question Papers and Answers 2017 7
a. for loop
b. while loop
c. do while loop
d. do for loops

Question 7.
HTTP stands for a ………………. protocol.
Plus One Computer Application Previous Year Question Papers and Answers 2017 8

Question 8.
IDE stands for …………..
Plus One Computer Application Previous Year Question Papers and Answers 2017 9
a. Integrated Development Environment
b. Information Development Environment
c. Inheritance Development Environment
d. Interactive Development Environment

Question 9.
Let X and Y are two variables of int data type, then correct the following input statement.
Plus One Computer Application Previous Year Question Papers and Answers 2017 10

Question 10.
In a flowchart, the terminal (an ellipse) symbol is used to indicate the ……………… and …………… in the program logic.
Plus One Computer Application Previous Year Question Papers and Answers 2017 11

Question 11.
A ……………….. is a computer peripheral that allows you to connect and communicate with other computers via telephone lines.
Plus One Computer Application Previous Year Question Papers and Answers 2017 12

Question 12.
Differentiate or define the terms Hardware (h/w) and software (s/w) in a computer system. Give one example for each.
Plus One Computer Application Previous Year Question Papers and Answers 2017 13

Question 13.
a. Convert (1010.11)2 to decimal.
b. Find the missing terms in the following series. (18)16, (1A)16, (1C)16 ………………., ……………….
Plus One Computer Application Previous Year Question Papers and Answers 2017 14

Question 14.
Predict the output of the following operations. x = – 5 and y = 3 initially,
Plus One Computer Application Previous Year Question Papers and Answers 2017 15
Consider the following statement.
Plus One Computer Application Previous Year Question Papers and Answers 2017 16
int Length;
Then what is the difference between (a) and (b)?
Plus One Computer Application Previous Year Question Papers and Answers 2017 17
a. Length = 50
b. Length ==50

Question 15.
Arrange the following memory or storage devices on the base of their operation speed in ascending order.
Plus One Computer Application Previous Year Question Papers and Answers 2017 18
a. Hard disk
b. Cache
c. RAM
d. Registers

Question 16.
List the different stages in programming.
Plus One Computer Application Previous Year Question Papers and Answers 2017 19

Question 17.
Classify the following identifiers valid or invalid. If invalid, give a reason.
Plus One Computer Application Previous Year Question Papers and Answers 2017 20
a. Length_l
b. _Lengthl
c. Length 1
d. 1 Length

Question 18.
A part of biodata of a student is given. Identify the data types which we can use to store and process these data.
Plus One Computer Application Previous Year Question Papers and Answers 2017 21
RolIJMumber : 34
Age : 17
Sex : M
Mob_Number : 8181818181
Height_in_Cm : 152.8
Rncode : 690601

Question 19.
State whether the following statements are true or false. If false, give a reason.
Plus One Computer Application Previous Year Question Papers and Answers 2017 22
a. break statement is essential in a switch.
b. for loop is an entry controlled loop.
c. do while loop is an entry controlled loop.
d. the switch is a selection statement.

Question 20.
URL stands for Uniform Resource Locator. Every resource on the internet has a unique URL. Then classify the following URL on the basis of
Plus One Computer Application Previous Year Question Papers and Answers 2017 23
http://www.dhsekerala.gov.in/index.html
a. Network protocol
b. Domain name
c. Filename

Question 21.
How is a WAN different from a LAN?
Plus One Computer Application Previous Year Question Papers and Answers 2017 24

Question 22.
If a = 5, b = 4, c = 3, d = 4, then what is the result in X after the following operation ?
Plus One Computer Application Previous Year Question Papers and Answers 2017 25

Plus One Computer Application Previous Year Question Papers and Answers 2017 26

Is there any difference between (a) and (b) by considering the following statement?
Plus One Computer Application Previous Year Question Papers and Answers 2017 27
a. Gender = ‘M’;
b. Gender = ‘M’;

Question 23.
Your friend Ravi purchased a new PC for his personal use. Mention the components required to connect this PC to the internet.
Plus One Computer Application Previous Year Question Papers and Answers 2017 28

Question 24.
Compare the advantages and disadvantages of implementing eBusiness.
Plus One Computer Application Previous Year Question Papers and Answers 2017 29

Question 25.
Compare Dot Matrix Printer (DMP), inkjet printer, laser printer, and thermal printer on the basis of their working speed, quality of printing and expense for printing.
Plus One Computer Application Previous Year Question Papers and Answers 2017 30
Dot Matrix Printer (DMP), inkjet printer, laser printer, thermal printer.

Question 26.
Rewrite the following code using else if ladder.
Plus One Computer Application Previous Year Question Papers and Answers 2017 30

Plus One Computer Application Previous Year Question Papers and Answers 2017 32

# include<iostream> 
using namespace std; 
int main()
{
int colour;
cout«“Enter a number between 1 and 4 : ";
cin»colour;
switch(colour)
{
case 1:
cout<<“Red”; 
break; case 2:
cout<<“ Green"; 
break; case 3:
cout<<“Blue”;
break;
default:
cout<<“Wrong input”;
}
}

OR

Write a C++ program to find the biggest number from 3 given numbers.

Answers

Answer 1.
c. Information

Answer 2.
b. Universal Serial Bus

Answer 3.
Compiler / interpreter / assembler /language processors

Answer 4.
c. Facebook

Answer 5.
Business Process Outsourcing

Answer 6.
c. do while loop

Answer 7.
Hyper Text Transfer Protocol

Answer 8.
a. Integrated Development Environment

Answer 9.

cin>>X>>Y;

Answer 10.
Start and Stop

Answer 11.
MODEM

Answer 12.
Hardware is the tangible and visible parts of a computer, which consists of some electromechanical components, eg., keyboard, mouse. The software is a set of programs that help us to use the computer system for our needs, eg., Operating system, language processors.

Answer 13.
a. (1010.11)2 = 1 × 23 + 0 × 22 + 1 × 21
+ 0 × 2°+ 1 x 21 + 1 × 22
= 8 + 0 + 2 + 0 + 1/2 + 1/4
= 10 + 0.75
= 10.75
b (1E)16, (20)16

Answer 14.
a. 5
b.1
c.2
d. 2

OR

a. The value 50 will be stored in the variable Length (ie., assignment operation).
b. The value 50 and the value of Length will be compared.

Answer 15.
Hard disk, RAM, Cache, Registers

Answer 16.

  1. Problem identification: During this phase, you will be able to identify the data involved in processing, its type and quality, a formula to be used, activities involved and the output to be obtained.
  2. Preparing algorithms and flowcharts: Once the problem is identified, it is necessary to develop a precise step-by-step procedure to solve the problem.
  3. Coding the program: The process of writing program instructions to solve a problem is called coding. The program written in any HLL is known as source code.
  4. Translation: It is the process of converting a program written in the high-level language into its equivalent version in machine language. The compiler or interpreter is used for this purpose.
  5. Debugging: In this stage, programming errors are discovered and corrected. Programming errors are known as ‘bugs’ and the process of detecting and correcting these errors is called debugging.

Answer 17.
a. Valid
b. Valid
c. Invalid; White space is used.
d. Invalid; the First letter is a digit.

Answer 18.
Roll_Number: int
Age: int
Sex: char
Mob_Number: long int
Height_in_Cm: float
Pincode: int/long int

Answer 19.
a. True
b. True
c. False; do while loop is an exit controlled loop
d. True

Answer 20.
a. http
b. dhsekerala.gov.in
c. index.html

Answer 21.
Wide Area Network (WAN). This is used to connect computers over a large geographical area. It is a network\of network. Here the computers are connected using telephone lines or microwave station or satellites. The error rate in data transmission is high, eg., internet. Local Area Network (LAN). This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial cable. Data transfer rate is high and an error rate is less.

Answer 22.
-3
OR
a. It is true. The variable is a type of char and the value assigned is a character value.
b. This statement is wrong. The variable is a type of char and the value assigned is a string.

Answer 23.
The following are the requirements for connecting a computer to the Internet:
1. (NIC) and an operating system that supports TCP/IP.
2. Modem
3. Telephone connection
4. Internet account of any ISP (Internet Service Provider)
5. Software for browsing.

Answer 24.
The major advantages of using e-Business applications are:

  • With e-Business, you can buy and sell products from anywhere.
  • eBusiness reduces the operational cost.
  • It minimizes travel time and cost. Challenges to eBusiness:
  • Most of the people are unaware of online business and its possibilities or they do not know how to conduct this.
  • Most of the people from rural areas do not have plastic money (debit card, credit card) which is necessary for eBusiness.
    If not used with caution your valuable information like credit card no., password etc. may lose.

Answer 25.

  1. Dot matrix printers use small electromagnetically activated pins in the print head and an inked, to produce images by an impact. These printers are slow and noisy.
  2. Inkjet printers form the image on the page by spraying tiny droplets of ink from the printed head. The printer needs several colors of ink. These are inexpensive, but the cost of ink cartridge makes it a costly.
  3. Laser printer produces good quality output. The image to be printed is transferred to a drum using a laser beam. The toner powder from the toner cartridge is then sprayed on the drum. The toner powder sticks onto the portions traced the drum by the laser beam. It is transferred to a paper by rolling the paper on the drum. Through heating, the powder is fused on to the paper. Laser printers are faster and their speed is in page per minute (ppm).
  4. The thermal printer produces a printed image by selectively heating heat-sensitive when it passes over the thermal print head.

Answer 26.

# include<iostream>
using namespace std;
int main()
{
int colour;
cout<<“Enter a number between 1 and 4:";
cin»colour; if (colour==1)
cout<<“Red”;
else if (colour==2)
cout<<“Green”; 
else if (colour==3) cout«“Blue";
else
cout«“Wronginput”; 
return o;
}

OR

#include<iostream> using namespace std; 
int main() 
{
int a, b, c;
cout<<“Enter three different numbers:”; 
cin >> a >> b >> c ; 
if (a > b)
{
if (a > c)
cout<<“The largest number is:”« a; 
else
cout<<“The largest number is:”<<c;
}
else
{
if (b > c)
cout<<“The largest number is:”«b; 
else
cout<<“The largest number is: ”<<c;
}
return O;
}

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Previous Year Question Paper 2018

Kerala Plus One Computer Application Previous Year Question Paper 2018

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Previous Year Question Papers and Answers 2018 33

Part A
Answer all questions from 1 to 5
Plus One Computer Application Previous Year Question Papers and Answers 2018 1

Question 1.
The meaningful and processed form of data is known as ……………….
Plus One Computer Application Previous Year Question Papers and Answers 2018 2

Question 2.
Write the full form of USB.

Question 3.
…………….. is a step by step procedure to solve a problem.
Plus One Computer Application Previous Year Question Papers and Answers 2018 3

Question 4.
What is the name of files created to support C++ programs and kept in the standard library?
Plus One Computer Application Previous Year Question Papers and Answers 2018 4

Question 5.
Find out the odd one from the following:
Plus One Computer Application Previous Year Question Papers and Answers 2018 5
a. DOS
c. ISDN
b. DSL
d. FTTH

Answer any nine questions from 6 to 16
Plus One Computer Application Previous Year Question Papers and Answers 2018 6

Question 6.
Despite the high speed and accuracy, computers are said to be the slaves of human beings. Why?
Plus One Computer Application Previous Year Question Papers and Answers 2018 7
Plus One Computer Application Previous Year Question Papers and Answers 2018 8

Question 7.
Name the four waste disposal methods.
Plus One Computer Application Previous Year Question Papers and Answers 2018 9

Question 8.
What are the features of RAM?
Plus One Computer Application Previous Year Question Papers and Answers 2018 10

Question 9.
Problem-solving by computer proceeds through different stages. Name the stages in the correct order.
Plus One Computer Application Previous Year Question Papers and Answers 2018 11

Question 10.
Write the output of the following C++ expressions.
Plus One Computer Application Previous Year Question Papers and Answers 2018 12

Let a = 7, b = 2 ’
a. a + b * 3 / ++b;
b. a < = 7 && b > 1;

Question 11.
Detect and correct the errors in the following C++ code.
Plus One Computer Application Previous Year Question Papers and Answers 2018 13

# include<iostream> 
using name space std; 
int main ( );
int a, b;
cout<< “Enter two numbers”; 
cin>>a and b; a + b = c;
cout<< “Sum =”<<c; 
return 0;
}

Question 12.
Rewrite the following code using a switch case statement.
Plus One Computer Application Previous Year Question Papers and Answers 2018 14

if(Lan==‘M’)
cout<<‘i prefer Malayalam”;
else if (Lan == ‘E’)
cout<<“l prefer English”;
else cout<<“l prefer neither Malayalam
nor English”;

Question 13.
There are many advantages of using networked computers instead of standalone computers. Write any four advantages of them.
Plus One Computer Application Previous Year Question Papers and Answers 2018 15

Question 14.
What is the importance of the TCP/IP protocol in computer networks?
Plus One Computer Application Previous Year Question Papers and Answers 2018 16

Question 15.
Write any two drawbacks in using social media.
Plus One Computer Application Previous Year Question Papers and Answers 2018 17

Question 16.
eBusiness has many possibilities in the business world, but it faces some challenges. Write about any two challenges in e-Business.
Plus One Computer Application Previous Year Question Papers and Answers 2018 18

Answer any nine questions from 17 to 27
Plus One Computer Application Previous Year Question Papers and Answers 2018 19

Question 17.
If (M)8 = (96)10 = (N)2 , find M and M.
(M)8 = (96)10 = (N)2
Plus One Computer Application Previous Year Question Papers and Answers 2018 20Plus One Computer Application Previous Year Question Papers and Answers 2018 21

Question 18.
Following is a flowchart to find the sum of the first 50 natural numbers.
a. Correct the flowchart if there are errors.
b. Redraw the flowchart to find the sum of even numbers between 1 and 50.
Plus One Computer Application Previous Year Question Papers and Answers 2018 22
Plus One Computer Application Previous Year Question Papers and Answers 2018 23

Question 19.
What is debugging? Which are the different types of errors that may occur in a program?
Plus One Computer Application Previous Year Question Papers and Answers 2018 24

Question 20.
a. What is a token in C++?
Plus One Computer Application Previous Year Question Papers and Answers 2018 25
b. Distinguish between keywords and identifiers.
Plus One Computer Application Previous Year Question Papers and Answers 2018 26

Question 21.
Data types are necessary to declare variables in C++.
a. What is a data type?
b. Write the classification of fundamental data types in C++.
Plus One Computer Application Previous Year Question Papers and Answers 2018 27

Question 22.
Write a short note on arithmetic and logical operators in C++.
Plus One Computer Application Previous Year Question Papers and Answers 2018 28

Question 23.
a. Write the equivalent arithmetic operations for the given C++ shorthands.
Plus One Computer Application Previous Year Question Papers and Answers 2018 29
b. What is the difference between a=20 and a==20?
Plus One Computer Application Previous Year Question Papers and Answers 2018 30

Question 24.
Write a C++ program to find the sim pie interest of an amount (P) deposited with a rate of interest (R) for a period of years (N). A rate of interest = 7% if deposit amount P is less than 1 lakh. A rate of interest = 8% if deposit amount P is between 1 lakh and 5 lakhs. A rate of interest = 9% if the deposit amount P is above 5 lakhs. (Hint: Simple interest = P × N × R/100)
Plus One Computer Application Previous Year Question Papers and Answers 2018 31

Question 25.
a. Give the output of the following code.
Plus One Computer Application Previous Year Question Papers and Answers 2018 32

for(i= 10; i<30; i+ = 3)
{
cout<<i<<“\t”;
}

b. Rewrite the code using while loop, while
Plus One Computer Application Previous Year Question Papers and Answers 2018 33

Question 26.
Explain briefly about the wireless broadband connectivity methods used for internet connection.
Plus One Computer Application Previous Year Question Papers and Answers 2018 34

Question 27.
e-Leaming allows us to overcome many limitations of the conventional teaching-learning process.
a. Name any three eLearning tools for enhancing the e-Learning process.
b. Write any three advantages of eLearning.
Plus One Computer Application Previous Year Question Papers and Answers 2018 35

Answer any two questions from 28 to 30
Plus One Computer Application Previous Year Question Papers and Answers 2018 36

Question 28.
a. Write a detailed classification of software.
b. Some programming languages use compiler whereas some use interpreter. What makes them different?
c. What do you mean by free software?
Plus One Computer Application Previous Year Question Papers and Answers 2018 37

Question 29.
a. What is a type conversion ? Which are the two ways of type conversion?
Plus One Computer Application Previous Year Question Papers and Answers 2018 38
b. Define type casting.
Plus One Computer Application Previous Year Question Papers and Answers 2018 39
c. Consider the C++ code.
Plus One Computer Application Previous Year Question Papers and Answers 2018 40
p = 7, q = 2; float a, b;
a = p/q;
b = (a+q)/q;
Find the values of’a and b.

Question 30.
a. Define the term topology.
b. Consider that, your principal has decided to network your computer lab. Which topology will you suggest? Justify your answer.
c. Differentiate between LAN and WAN.
Plus One Computer Application Previous Year Question Papers and Answers 2018 41

Answers

Answer 1.
information

Answer 2.
Universal Serial Bus

Answer 3.
Algorithm

Answer 4.
Header files

Answer 5.
a. DOS

Answer 6.
Yes. Many people think that the computer has superhuman capabilities. However, this is not true. A computer does not have natural intelligence as humans have. A computer cannot decide on its own.

Answer 7.

  1. Reuse: It refers to second-hand use or usage after the equipment has been upgraded or modified.
  2. Incineration: It is a controlled and complete combustion process in which the waste is burned in specially designed incinerators at a high temperature in the range of 900 to 1000 degree Celsius.
  3. Recycling: It is the process of making or manufacturing new products from a product that has originally served its purpose.
  4. Landfilling: In this method, the soil is excavated from the trenches made and waste material is buried in it, which is covered by a thick layer of soil.

Answer 8.
The microprocessor can read from and write to RAM. Data can be stored and retrieved at random from anywhere within the RAM, no matter where the data is. The contents of RAM are lost when power is switched off. Therefore, RAM is a volatile memory. The speed of a RAM refers to how fast the data in memory is accessed and expressed in MegaHertz (MHz).

Answer 9.
Problem identification, preparing algorithms and flowcharts, coding the program, translation, debugging.

Answer 10.
a. 9
b. True / 1

Answer 11.

# include<iostream> 
using namespace std; 
int main ()
int a, b, c;
cout<< “Enter two numbers"; 
cin>>a>>b; c = a + b;
cout<< “Sum =”<<c; return 0;
}

Answer 12.

switch (Lan)
{
case‘M’: cout<<“I prefer Malayalam";
break;
case ‘E’: cout<<“l prefer English”; break;
default:cout<<“l prefer neither Malayalam nor English";
}

Answer 13.
The advantages of networks are:

  1. Resource sharing: All the computers in a network can share software.
  2. Reliability: If one computer fails, the other computer can perform the work without any delay.
  3. Price Vs Performance: Instead of a main frame 10 personal computers are used with less cost and same performance.
  4. Communication medium: It has a powerful communication medium. We can exchange information between computers in a network.
  5. Scalable: System performance can be increased by adding computers to a network.

Answer 14.
Transmission Control Protocol (TCP) uses a set of rules to exchange\messages with other internet points at time information packet level. When data is to be sent from one computer to another over the internet, it is first broken into smaller packets by TCP and then sends. When these packets are received by the receiving computer, TCP submits a request for retransmission else packets are assembled into the original message according to the rules specified in the TCP protocol. Delivery of each packet to the right destination is done by Internet Protocol (IP).

Answer 15.

  1. Intrusiontoprivacy.The personal information (photo, e-mail id, phone number, name, address etc.) posted on such sites can be used for illegal activities.
  2. Addiction to such sites wastes our valuable time.
  3. Spread rumors. Social media will spread the news quickly.

Answer 16.

  1. A good percentage of the population is unaware of IT applications and its uses. Most of the regular Internet users also lack knowledge about online business and its possibilities.
  2. Most of the customers, especially to the rural population, do not possess plastic money such as credit card, debit card and net banking system, which is necessary for e-Business.
  3. If not Used with caution, customers may lose valuable information like their credit card number, passwords, etc.
  4. Products like apparel, handicrafts, jewelry, etc are often purchased after examining physically. But in online shopping, customers don’t have this touch and feel advantage.
  5. For the success of e-Business of any organization or company perfect and efficient shipment service is a necessity.

Answer 17.
Plus One Computer Application Previous Year Question Papers and Answers 2018 42
Plus One Computer Application Previous Year Question Papers and Answers 2018 43

Answer 18.
Plus One Computer Application Previous Year Question Papers and Answers 2018 44

Answer 19.
It is the stage where programming errors are discovered and corrected, programming errors are known as ‘bugs’and the process of detecting and correcting these errors is called debugging.

The error messages may be displayed by the error-handling function of the language. These errors are known as a runtime error. These errors can be rectified by providing instruction for checking the validity of the data before it gets processed by the subsequent instructions in the program.

The logical error is due to the improper planning of the program’s logic. The language processor successfully translates the source code into machine code if there are no syntax errors. The computer actually follows the program instructions and gives the output as per the instructions. But the output may not be correct. This is known as logical errors.

The error messages may be displayed by the error-handling function of the language. These errors are known as a runtime error. These errors can be rectified by providing instruction for checking the validity of the data before it gets processed by the subsequent instructions in the program.

Answer 20.
a. Tokens or lexical units are the fundamental building blocks of the program. C++ has five types of tokens. They are keywords, identifiers, literals, punctuators, and operators.
b. Identifiers are the user-defined words that are used to name different program elements such as memory locations, statements, functions, objects, classes etc.
The words (tokens) that convey a specific meaning to the language compiler are called keywords. These are also known as reserved words as they are reserved by the language for special purposes and cannot be redefined for any other purposes.

Answer 21.
a. The data type specifies the nature of
data we have to store, the set of operations that can be performed on the data. Predefined data types in C++ are char, int, float, double and void, b. int data types; Integers are whole numbers without a fractional part: They can be positive, zero or negative. The keyword int represents integer numbers. It allows 4 bytes of memory.

char data types. All letters, digits, special symbols, punctuations, etc. come under this category. When these characters are used as data they are considered as char type data in C+ +. The keyword char represents character type data, void data type. The data type void is a keyword and it indicates an empty set of data. It does not require any memory space, float data types.

Numbers with a fractional part are called floating point numbers. The keyword float is used to denote such numbers. It allows 4 bytes of memory, double data type. It is used to store large real numbers. It uses 8 bytes of memory. It can be represented as double.

Answer 22.
Arithmetic operators: These are defined to perform basic arithmetic operations such as addition, subtraction, multiplication, and division. The symbols used for this are +,* and / respectively. It provides a special operator, % (modulus operator) for getting remainder during division.
Logical operators: Used to combine relational operations and it gives either true or false.

Answer 23.
a. i. x = x % 20;
ii. a = a + 2;
iii. p = p/5;
b. A specific data is stored in memory lo-cations (variables) using assignment op-erator (=). Here the value 20 is stored in the variable
a. == (equal to) is a relational operator used for comparing numeric data. Here the value 20 is compared with the value stored in the variable a.

Answer 24.

# include <iostream>'
using namespace std; 
int main()
{ 
int P, N, R; 
float SI;
cout << “Enter the values of P and N:”; cin >> P>>N; 
if (P< 100000)
{
SI = (P*N*7)/100;
cout << “Simple Interest is”<<SI;
}
else if (P>100000 && P<500000)
{
SI = (P*N*8)/100;
cout << “Simple Interest is”<<SI;
}
else if (P>500000)
{
SI = (P*N*9)/100;
cout << “Simple Interest is"<<SI;
}
return 0;
}

Answer 25.
a. 10, 13, 16, 19, 22, 25, 28 b. i = 10;

while (i<30)
{
cout<<i<<“\t”;
i+=3;
} '

Answer 26.
Satellite Broadband. Here the internet connectivity is provided through a satellite. A VSAT (Very Small Aperture Terminal) dish antenna and a transceiver (transmitter-receiver) required at the user’s side. Speed up to 1 Gbps. Used in banks, stock exchange etc.

Mobile broadband is wireless internet access using mobile phones, tablets, USB modems etc. The modems are built inside the mobile phones, tablets. You can use the internet when you are in traveling. The mobile technologies use here are 2G, 3G, and 4G.

Wimax (World Wide Interoperability for Microwave Access). The whole area of a city can be provided with wireless internet using WiMax. It uses the base station for transmitting WiMAX signals and Wimax receivers for receiving the signal. Speed ‘ up to 70 Mbps.

Answer 27.
a. Online chat, Educational TV channels, Electronic books reader (e-Books) b. 1. eLearning has the ability to offer courses on a variety of subjects to a large number of students from a distant location.
2. In e-Learning, a cost for learning is much less. It saves journey time and money, instructor fees, etc.
3. People with limited financial resources are very much supported by the lower cost of e-Learning.

Answer 28.
a. Software is a general term used to denote a set of programs that help us to use a computer system and other electronic devices efficiently and effectively. The two types of softwares are:
1. System software: It is a set of one or more programs designed to control the operations of a computer.

  • Operating system: It is a set of programs that acts as an interface between the user and computer hard ware.
  • Language processors: The instructions to the computer are written in different languages. Various language processors are:

a. Assembler: It converts languages written in assembly language into machine language.
b. Interpreter: It converts a high-level language into machine language by-line by line.
c. Compiler: It translate a high level language into machine language by converting all the lines at a time.

  • Utility software: A set of programs which help users in system maintenance tasks and in performing tasks of routine nature. Utility programs are compression tools (WinZip, Win RAR), disk defragmenter (rearranges files on a computer hard disk), backup software.

2. Application software: It is tHe software developed for a specific application. It ineludes general purpose software\(Word Processing software, spreadsheet sbftware, presentation software, database, multimedia), specific purpose software (designed to handle particular tasks).
b. Compiler: It translate a high level lan-guage into machine language by converting all the lines at a time. The errors are provided at the end of the compilation. The programming language that have a compiler are C, C++, Pascal, etc.

Interpreter: It converts a high level language into machine language by line by line. If there is an error in one line, it reports and the execution is terminated. It will continue the translation only after the correction of the error, eg., BASIC is an inter-preted language.
c. It gives the user the freedom to use, copy, distribute, examine, change and improve the software.

Answer 29.
a. Type conversion is the process of con-verting the current data type of a value into another type. It may be implicitly and explicitly converted.
It can be done in two ways:
1. Implicit type conversion: It is performed by C++ compiler internally. In expressions where different types of data are involved, C++ converts the lower sized operands to the data type of the highest sized operand. Since the conversion is always from lower type to higher, it is also known as type promotion.

2. Explicit type conversion: Sometimes the programmer may decide the data type of the result of an evaluation. This is done by the programmer by specifying the data type within parentheses to the left of the operand. Since the programmer explicitly casts a data to the desired type, it is also known as type casting. Usually, type casting is applied on the variables in the expressions.
b. Sometimes the programmer may decide the data type of the result of an evaluation.

This is done by the programmer by sSpecitying the data type within parentheses to the left of the operand. Since the programmer explicitly casts a data to the desired type, it is also known as type casting.
c. a = 3.0 or 3
b = 2.5

Answer 30.
a. Physical or logical arrangement of computers on a network is called structure or topology.
b. Bus topology. All the computers are at-tached to a single cable called the bus. Here one computer transmits all other computers listen. Therefore it is called the broadcast bus. The transmission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not. Advantages are add or remows computer is very easy. It requires less cable length and the installation cost is less,
c. Local Are Network (LAN): This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial cable. Data transfer rate is high and an error rate is less.

Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a network of networks. Here the computers are connected using telephone lines or Microwave station or satellites. The error rate in rate in data transmission is high, eg., internet.

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Science Model Question Paper 3

Kerala Plus One Computer Science Model Question Paper 3

Answer all question from 1 to 5
Plus One Computer Science Model Question Papers Paper 1
Question 1.
The computing machine developed by Balaise Pascal is known as ………………………………..
Plus One Computer Science Model Question Papers Paper 3

Question 2.
The conditional operator is ……………… opera­tor.
Plus One Computer Science Model Question Papers Paper 3.2

Question 3.
Write the name of the header file which contains the exit( ) function.
Plus One Computer Science Model Question Papers Paper 3.34

Question 4.
……………. is stored at the end of the string.
Plus One Computer Science Model Question Papers Paper 3.3

Question 5.
A short distance wireless internet ac­cess method is…
Plus One Computer Science Model Question Papers Paper 3.4

Answer any nine questions from 6 to 16
Plus One Computer Science Model Question Papers Paper 3.5

Question 6.
Compare the Roman number system and Mayan’s number system.
Plus One Computer Science Model Question Papers Paper 3.6

Question 7.
If (X)2 – (1o1o)2 = (1ooo)2 then find X.
Plus One Computer Science Model Question Papers Paper 3.35

Question 8.
Describe the use of electronic spread­sheets.
Plus One Computer Science Model Question Papers Paper 3.7

Question 9.
Differentiate between top-down design and bottom-up design in problem solv­ing.
Plus One Computer Science Model Question Papers Paper 3.8

Question 10.
Some of the literals in C++ are given below. How do they differ?
Plus One Computer Science Model Question Papers Paper 3.9

Question 11.
What will be the result of the following if ans is 6 initially?
Plus One Computer Science Model Question Papers Paper 3.10

  1. cout <<ans = 8 ;
  2. cout << ans == 8;

Question 12.
Write a C++ code segment to input val­ues into the array:
Plus One Computer Science Model Question Papers Paper 3.11

Question 13.
Predict the output of the following code segment:
Plus One Computer Science Model Question Papers Paper 3.12

char str[] = “program”;
for (int i=o; str[i] != ‘\o’; ++i)
{
putchar(str[i]);
putchar(‘-’);
}

Question 14.
Write down the output of the following code segment:
Plus One Computer Science Model Question Papers Paper 3.13
puts(“hello”);
puts(“friends”);

Question 15.
How can multimedia content be sent using mobile phones?
Plus One Computer Science Model Question Papers Paper 3.14

Question 16.
What are the functions of the mobile oper­ating system?
Plus One Computer Science Model Question Papers Paper 3.15

Answer any nine questions from 17 to 27
Plus One Computer Science Model Question Papers Paper 3.16

Question 17.
Find dual of following Boolean expressions:
Plus One Computer Science Model Question Papers Paper 3.17

  1. X. Y + Z
  2. C + A.1 + A.C
  3. (A+o).(A.1. A )

Question 18.
Fill in the blanks
Plus One Computer Science Model Question Papers Paper 3.18

  1. (———– )2 = (AB)l6
  2. (__ D__ )l6 = (1010_____ 1ooo)2
  3. 2510 = (______ )2

Question 19.
Differentiate compiler and interpreter.
Plus One Computer Science Model Question Papers Paper 3.19

Question 20.
Draw a flowchart to input ten different numbers and find their average.
Plus One Computer Science Model Question Papers Paper 3.20

Question 21.
Write a C++ program to check whether the given number is prime or not.
Plus One Computer Science Model Question Papers Paper 3.21

Question 22.
In how many ways can a variable be declared in C++?
Plus One Computer Science Model Question Papers Paper 3.23

Question 23.
Write a program to find the largest among the three numbers.
Plus One Computer Science Model Question Papers Paper 3.24

Question 24.
Write a C++ program to find the sum of major diagonal elements of a matrix,
Plus One Computer Science Model Question Papers Paper 3.25

Question 25.
What are the differences between the linear search method and the binary search method?
Plus One Computer Science Model Question Papers Paper 3.36

Question 26.
What are the advantages of the modular style of programming?
Plus One Computer Science Model Question Papers Paper 3.26

Question 27.
Distinguish between exit( ) function and return statement.
Plus One Computer Science Model Question Papers Paper 3.27

Answer any two questions from 28 to 30
Plus One Computer Science Model Question Papers Paper 3.28

Question 28.
Define the term green computing. List and explain the approaches that you can adopt to promote green computing concepts at all possible levels.
Plus One Computer Science Model Question Papers Paper 3.29

Question 29.
Write a program using a nested loop that inputs a number n which generates an output as follows. [Hint: If the value of n is 5, the output will be as]
Plus One Computer Science Model Question Papers Paper 3.31
Plus One Computer Science Model Question Papers Paper 3.30

Question 30.
What is network protocol? Explain.
Plus One Computer Science Model Question Papers Paper 3.32

Answer

Answer 1.
Pascaline

Answer 2.
ternary

Answer 3.
process.h

Answer 4.
The null character ‘\o’

Answer 5.
Wimax

Answer 6.
The Romans used 7 letters (I, V, X, L, C, D, and M) of the alphabet for representing numbers.
The Mayans used a number system with base 20. It is the sum of the number of fingers and toes. This number system could produce very accurate astronomical observations and make measurements with greater accuracy.

Answer 7.
(X)2 – (1o1o)2 = (1ooo)2
(X)2 – 10 = 8
18 – 10 = 8
(18)10= (1oo1o)2 = (X)2

Answer 8.
Spreadsheet software allows users to perform calculations using spreadsheets. eg., Microsoft Excel, Open Office calc, Lotus 1-2-3, and Apple numbers.

Answer 9.
Top-down design: It is the process of breaking the overall procedure or task into component parts (modules) and then subdividing each component module until the lowest level of detail is reached. It is also called top-down decomposition.
Bottom-up design: Once the overall procedure or task is broken down into component parts (modules) and each component module are further subdivided until the lowest level of detail has been reached, we start solving from the low­est module onwards. The solution for the main module will be developed only after designing a specific solution to its submodules.

Answer 10.
5 is an integer literal.
‘5’ is a character literal.
5.0 is floating point literal.
“5” is string literal.

Answer 11.

  1. 8
  2. The result will be o (false) because of 6
  3. is not equal to 8.

Answer 12.

for (int i=o; i<50; i++)
{
cin>>ar[i];
}

Answer 13.
p-r-o-g-r-a-m-

Answer 14.
hello friends

Answer 15.
Multimedia Messaging Service (MMS) is the standard way to send and receive messages consisting of multimedia con­tent using mobile phones.

Answer 16.
It is an OS used in handheld devices such as a smartphone, tablet, etc. It man­ages the hardware, multimedia func­tions, internet connectivity, etc. eg., Android, iOS.

Answer 17.
a. X + Y.Z
b. A + C . A+o . A + C
c. (A . l) + (A + o + \( \bar { A } \))

Answer 18.
a. A → 1010, B → 1011
(1010101l)2
b. (AD8)26 = (1010 1101 1ooo)2
c. (o.o1)2

Answer 19.
Compiler: It translates a high-level language into machine language by converting all the lines at a time. The errors are provided at the end of the compilation. The programming language that has a compiler are C, C++, Pascal, etc.
Interpreter: It converts a high-level language into machine language by-line by line. If there is an error in one line, it reports and the execution is terminated. It will continue the translation only after the correction of the error, eg., BASIC is an interpreted language.

Answer 20.
Plus One Computer Science Model Question Papers Paper 3.33

Answer  21.

#include<iostream>
#include<cstdlib>
using namespace std; int main()
{
int i, num;
cout<<“Enter the number: cin>>num;
for(i=2; i<=num/2; ++i)
}
if(num%i == o)
{
cout<<“Not a Prime Number”; exit(o);
}
}
cout<<“Prime Number”; return 0;
}

Answer 22.
In C+ +, variable can be declared in three ways. They are:

  • Uninitialized variable, eg., int a;
  • Initialised variable, eg., int a = 2;
  • Dynamically initialized variable,
  • eg., int a = b + 10;

Answer 23.

#include <iostream> 
using namespace std;
 int main( )
{
int a, b, c;
cout << “Enter three different num­bers: ”;
cin >>a>>b>>c;
 if (a > b)
{
if (a > c)
cout<<“The largest number is:”<< a; else
cout << “The largest number is:”<<c;
}
else
{
if Ob > c)
cout << “The largest number is:”<<b; else
cout << “The largest number is: ”<<c;
}
return o;
}

Answer 24.

#include <iostream> 
using namespace std; int main( )
{ int mat[io][io], n, i, j, s=o;
cout<<“Enter the rows/columns of square matrix: ”; 
cin> >n;
cout<<“Enter the elements\n”; for(i=o; i<n; i++)
for(j=o; j<n; j++) 
cin> >mat[i][j];
cout<<“Major diagonal elements are\n”;
for(i=o; i<n; i++)
{
cout<<mat[i][i]<<“\t”; 
s = s + mat[i][i];
}
cout<<“\nSum of major diagonal elements is: 
cout<<s; 
return o; 
}

Answer 25.
Linear search method:

  • The elements need not to be in any or­der.
  • Takes more time for the process.
  • May need to visit all the elements.
  • Suitable when the array is small.

Binary search method:

  • The elements should be in sorted or­der.
  • Takes very less time for the process.
  • All the elements are never visited.
  • Suitable when the array is large.

Answer 26.

  • It reduces the size of the program
  • Less chances of error.
  • Modularization reduces program­ming complexity.
  • Improves reusability.

Answer 27.
The return statement returns a value to the calling function and transfers the program control back to the calling function.
The exit( ) function terminates the ex­ecution of the program itself.

Answer 28.
Green computing is the study and prac­tice of environmentally sustainable computing or IT. To promote green computing, there are 4 approaches are used. They are:

  1. Green design: Designing energy effi­cient and eco-friendly computers and devices.
  2. Green manufacturing: Minimising waste during the manufacturing of IT devices.
  3. Green use: Minimising the electric­ity consumption of computers.
  4. Green disposal: Reconstructing used computers or appropriately disposing off or recycling unwanted electronic equipment.

Answer  29.

#include<iostream>
using namespace std;
int main( )
{
int n, i, j, s;
cout<<“Enter the value of n”; cin> >n;
for (i=n; i>=i; i- -)
{
for (j=n; j>=i; j- -)
{
s = j * j;
cout<<s<<“\t”;
}
cout< <“\n”;
}
return o;
}

Answer 30.
A protocol is a collection of rules and regulations to transfer data from one location to another. Different types of protocols are:

  1. Transmission Control Protocol (TCP): It uses a set of rules to exchange mes­sages with other internet points at the information packet level.
  2. Internet Protocol (IP): It uses a set of rules to send and receive messages at the internet address level.
  3. File Transfer Protocol (FTP): It is used for transferring files between comput­ers connected to local network or internet.
  4. Hyper Text Transfer Protocol (HT­TP): It is a protocol used for WWW for enabling the web browser to access the web server and request HTML documents.

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Computer Science Model Question Paper 2

Kerala Plus One Computer Science Model Question Paper 2

Answer all question from 1 to 5
Plus One Computer Science Model Question Papers Paper 1

Question 1.
Abacus was discovered by the ………..
Plus One Computer Science Model Question Papers Paper 2

Question 2.
The name given to a storage location is known as ……………
Plus One Computer Science Model Question Papers Paper 2.1

Question 3.
………………….. statement takes the program out of the loop even though the test expression is true.
Plus One Computer Science Model Question Papers Paper 2.2

Question 4.
Name the header file required for a us­ing console I/O function.
Plus One Computer Science Model Question Papers Paper 2.3

Question 5.
Write the full form of FTTH.
Plus One Computer Science Model Question Papers Paper 2.4

Answer any nine questions from 6 to 16
Plus One Computer Science Model Question Papers Paper 2.5

Question 6.
On what factors, the action of the Turing machine depends?
Plus One Computer Science Model Question Papers Paper 2.6

Question 7.
Express the integer number -39 in sign and magnitude representation.

Plus One Computer Science Model Question Papers Paper 2.7
Plus One Computer Science Model Question Papers Paper 2.8

Question 8.
What is a control unit?
Plus One Computer Science Model Question Papers Paper 2.9

Question 9.
“It is better to give proper documenta­tion within the program”. Give a rea­son.
Plus One Computer Science Model Question Papers Paper 2.10

Question 10.
Mention the purpose of tokens in C++. Write names of any four tokens in C++.
Plus One Computer Science Model Question Papers Paper 2.32

Question 11.
What is a variable? List the two values associated with it.
Plus One Computer Science Model Question Papers Paper 2.11

Question 12.
Declare an array of size 5 and initialize it with the number 8, 7, 2, 4 and 6.
Plus One Computer Science Model Question Papers Paper 2.12

Question 13.
Consider the following C++ statements:
Plus One Computer Science Model Question Papers Paper 2.13
char word [20];
cin>>word;
cout<<word;
gets (word) ;
puts (word) ;
If the string entered is “HAPPY NEW YEAR”, predict the output and justify your answer.
Plus One Computer Science Model Question Papers Paper 2.14

Question 14.
What will be the output of the state­ment?
Plus One Computer Science Model Question Papers Paper 2.15

Question 15.
a. Define Intranet.
Plus One Computer Science Model Question Papers Paper 2.16
b. Write the structure of an email ad­dress.
Plus One Computer Science Model Question Papers Paper 2.17

Question 16.
How does a Trojan horse affect a com­puter?

Answer any nine questions from 17 to 27.
Plus One Computer Science Model Question Papers Paper 2.18
Question 17.
Fill in the blanks:
Plus One Computer Science Model Question Papers Paper 2.19
a. (o.625)10 = (……………. )2
b. (38o)10 = (………. )16
c. (437)8 = (………………………… )2

Question 18.
What are the methods of representing characters in computer memory?
Plus One Computer Science Model Question Papers Paper 2.20

Question 19.
Differentiate between freeware and shareware.
Plus One Computer Science Model Question Papers Paper 2.33

Question 20.
Write a C++ program to accept an in­teger number and print its reverse. (Hint: If 234 is given, the output must be 432).
Plus One Computer Science Model Question Papers Paper 2.21

Question 21.
What are the limitations of a flow-chart?
Plus One Computer Science Model Question Papers Paper 2.34

Question 22.
Raju wants to add value 1 to the vari­able ‘p’ and store the new value in ‘p’ itself. Write four different statements in C++ to do the task.
Plus One Computer Science Model Question Papers Paper 2.22

Question 23.
Compare and discuss the suitability of three loops in different situations.
Plus One Computer Science Model Question Papers Paper 2.23

Question 24.
Define an array. Also, write an algo­rithm for searching an element in the array using any one method that you are familiar with.
Plus One Computer Science Model Question Papers Paper 2.25

Question 25.
Write a program to find the sum and average of elements in a 2D array.
Plus One Computer Science Model Question Papers Paper 2.26

Question 26.
Write a program for swapping the val­ues of two variables.

Answer any two questions from 28 to 30
Plus One Computer Science Model Question Papers Paper 2.27

Question 27.
Write a program to combine two strings if they are different and find its length.

Question 28.
Briefly explain various types of memory
Plus One Computer Science Model Question Papers Paper 2.28

Question 29.
Explain the different jump statements available in C++.
Plus One Computer Science Model Question Papers Paper 2.29

Question 30.
How are computer network classified based on size?
Plus One Computer Science Model Question Papers Paper 2.30

Answer

Answer 1.
Mesopotamians

Answer 2.
variable

Answer 3.
break

Answer 4.
Stdio.h

Answer 5.
Fibre To The Home

Answer 6.
The action of a Turing machine is de­termined by:

  • the current state of the machine.
  • the symbol in the cell currently be­ing scanned by the head.
  • a table of transition rules, which serve as the ‘program’ for the machine.

Answer 7.
The number is negative, so a first bit (MSB) is 1
7-bit binary equivalent of 39
= (100111)2
So -39 can be written as (1100111)2

Answer 8.
Control unit (CU) is responsible for ac­tivating and controlling the operations of the units of the computer. Each of the functional units has its own func­tion, but none of these will perform the function until it is asked to, this task is assigned to the control unit.

Answer 9.
Documentation is an on-going process. that starts in the problem study phase of the system and continues till its implementation and operation. We can write comments in the source code as part of the documentation. It provides suffi­cient information in a program to un­derstand its working. If the program is documented, it helps to understand the logic we applied. It helps the debugging process as well as a program modification at a later stage.

Answer 10.
Tokens or lexical units are the funda­mental building blocks of the program. C++ has five types of tokens. They are keywords, identifiers, literals, punc­tuators, and operators.

Answer 11.
Variables are the names given to memory locations. There are two values associated with a variable. They are R-value and L-value. The R-value represents the data and L­value represents the memory address of the variable.

Answer 12.

int A[5];
A[5] = {8, 7, 2, 4, 6};
OR
int A[5] = {8, 7, 2, 4, 6};

Answer 13.
The output will be,
HAPPY
HAPPY NEW YEAR
Because cin statement reads till a whi­te space. But the function gets( ) is a con­sole input function used to accept a string of characters including white spaces from the standard input device (keyboard).

Answer 14.
It displays ‘a’ on the screen. If an inte­ger value is given as the argument, it will be considered as an ASCII value and the corresponding character will be dis­played.

Answer 15.
a. A private network inside a company or organisation is called intranet.
b. The structure of an e-mail address is, user-name@domainname
eg., vinu@gmail.com Here username is vinu domain name is gmail.com

Answer 16.
It appears as a useful software but it is a harmful software and it will delete useful software or files. They allow malicious user access to confidential and personal information in the computer through the network without the knowledge of the user.

Answer 17.
Plus One Computer Science Model Question Papers Paper 2.31

Answer 18.
Characters are representing as binary codes in computer memory. Various codes are ASCII (American Standard Code for Information Interchange), EB­CDIC (Extended Binary Coded Decimal Interchange Code), ISCII (Indian Stan­dard Code for Information Interchange/ Indian Script Code for Information In­terchange) and Unicode.

Answer 19.
Freeware refers to copyrighted com­puter software which is made available for use free of charge for an unlimited period. In these, all the features are free. Shareware refers to commercial soft­ware that is distributed on a trial basis. It is distributed without payment and with limited functionality. All the fea­tures are not free.

Answer 20.

#include <iostream> 
using namespace std; int main( )
{
int num, c, digit, rev=o; 
cout<<“Enter the number: ";
cin> >num; 
c = num; 
while(num != o)
{
digit = num % 10; 
rev = (rev * 10)+ digit;
num = num/10;
}
cout<<“The reverse of the number is” 
< <rev; 
return o;
}

Answer 21.
1. Flowcharts are very time consum­ing and laborious to draw with proper symbols and spacing.
2. Owing to the symbol-string nature of flowcharting, any change or modifi­cation in the logic of the algorithm usu­ally requires a completely new flow­chart.
3. There are no standards determining the amount of detail that should be in­cluded in a flowchart.

Answer 22.
p = p + 1;
p+ + ;
++p;
p+=i;

Answer 23.
for loop:

  1. Entry controlled loop.
  2. Initialization along with loop defini­tion.
  3. No guarantee to execute the loop body at least once.

while loop:

  1. Entry controlled loop.
  2. Initialization before loop definition.
  3. No guarantee to execute the loop body at least once.

do….while loop:

  1. Exit controlled loop.
  2. Initialization before loop definition.
  3. Will execute the loop body at least once even though the condition is False.

Answer 24.
An array is a collection of elements of the same type placed in contiguous memory locations.
Algorithm for Linear search
Step 1: Start
Step 2: Accept a value in N as the num­ber of elements of the array
Step 3: Accept N elements into the ar­ray AR
Step 4: Accept the value to be searched in the variable ITEM
Step 5: Set LOC = -1
Step 6: Starting from the first position, repeat Step 7 until the last element
Step 7: Check whether the value in ITEM is found in the current position. If found then store the position in LOC and Go to Step 8, else move to the next posi­tion.
Step 8: If the value of LOC is less than o then display “Not Found”, else display the value of LOC + 1 as the position of the search value.
Step 9: Stop

Answer 25.

#include <iostream>
#include <cstdlib> using namespace std; int main()
{
int m, n, i, j, s = o, A[io][io]; float avg;
cout<<“Enter the order of matrix:”;
cin>>m>>n;
cout<<“Enter the elements of matrix\n”;
for (i=o; i<m; i++)
{
for (j=o; j<n; j++) cin > > A[i] [j ];
}
for (i=o; i<m; i++)
{
for (j=o; j<n; j++) s = s + A[i][j];
}
avg = s/(m*n);
cout<<“Sum of the elements of matrix:”<<s;
cout<<“Average of the elements of matrix:”< <avg;
}

Answer 26.

#include <iostream> 
using namespace std; "
void swapfint & x, int & y)
{
int t = x;
x = y;
Y = t;
}
int main()
{
int m, n; m = 10; n = 20;
cout<<“Before swapping m= ”<< m <<“ and n= ”<<n; swap(m, n);
cout<<“\nAfter swapping m= ”<< m <<“ and n= ”<<n; return o;
}

Answer 27.

#include <iostream>
#include <cstring> 
using namespace std; 
int main( )
{
char s1[2o], s2[2o], s3[2o]; 
cout<<“Enter two strings: ”;
cin>>si>>s2; 
int n=strcmp(s1, S2);
if (n= = o)
cout<<“\nThe input strings are same”; 
else	
{	
cout<<“\nThe input strings are not
same”;
strcpy(s3, s1); 
strcat(s3, S2);
cout<<“\nString after concatenation is: ”<<S3;
cout<<“\nLength of the new string is” j 
<<strlen(s3);	
}
return o;
}

Answer 29.
Memory is a place where we can store data, instructions, and results in temporarily or permanently. Memory can be  classified into two:
1. Primary memory: Also refers to the main memory. It holds data, intermediate results and results of ongoing jobs; temporarily. This includes mainly; three types of memory.

i.RAM (Random Access Memory): The microprocessor can read from and write to. The contents of RAM are lost when power is switched off. Therefore, RAM is a volatile memory.

ii. ROM (Read Only Memory): It can perform only read operations and its contents cannot be easily altered. ROM is non-volatile; the contents are retained even after the power is switched off. It is used to hold boot up program is known as Basic Input Output System (BIOS). This software runs when the computer is switched on or ‘boots up’. Different types of ROM are PROM (Programmable ROM), EPROM (Erasable Programmable ROM), EEPROM (Electrically Erasable Programmable ROM)

iii. Cache memory: It is a small and fast memory between the processor and RAM. Frequently accessed data, instructions, intermediate results, etc. are stored in cache memory for quick access. Cache is more expensive than RAM.

iv. Secondary memory: Also known as auxiliary memory. It holds data and information permanently. Various devices in this type are a magnetic storage device (magnetic tape, hard disk), an optical storage device (Compact Disc (CD), Digital Versatile Disk (DVD), Bluray DVD), semiconductor memory (USB flash drive, flash memory cards).2 9. The statements that facilitate the transfer of program control from one place to another are called jump statements.
They are:

  • return statement: It is used to transfer control back to the calling program or to come out of a function.
  • goto statement: It can transfer the program control to anywhere in the function. The target destination of a goto statement is marked by a label, which is an identifier.
  • break statement: When a break statement is encountered in a program, it takes the program control outside the immediately enclosing loop (for, while, do…while) or switch statement. Execution continues from the statement immediately after the control structure.
  • continue statement: It is used for skipping over a part of the code within the loop-body and forcing the next iteration. The break statement forces termination of the loop, but continue statement forces next iteration of the loop.
  • exit() function: It terminates the pro­gram itself. And can be used in a pro­- gram only if we include the header file process.h.

Answer 30.
1. Personal Area Network (PAN): It is used to connect devices situated in a small radius by using guided media or unguided media.

2. Local Area Network (LAN); This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial ca­ble. Data transfer rate is high and the er­ror rate is less.

3. Metropolitan Area Network (MAN): It is a network spread over a city. MAN have lesser speed than LAN and the er­ror rate is less. Here optical fiber cable is used, eg., Cable TV network.

4. Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a network of net­works. Here the computers are con­nected using telephone lines or Micro­wave station or satellites. The error rate in rate in data transmission is high, eg., internet.

We hope the Plus One Computer Science Model Question Papers Paper 2 help you. If you have any query regarding Plus One Computer Science Model Question Papers Paper 2, drop a comment below and we will get back to you at the earliest.

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Computer Science Model Question Paper 1

Kerala Plus One Computer Science Model Question Paper 1

Answer all question from 1 to 5
Plus One Computer Science Model Question Papers Paper 1

Question 1.
Which data type of C++ does not require any memory space?
Plus One Computer Science Model Question Papers Paper 1 .1

Question 2.
Who is regarded as the father of mod­ern Computer Science as well as artifi­cial intelligence?
Plus One Computer Science Model Question Papers Paper 1 .2

Question 3.
In C++, ………. loop will execute at least once even though the condition is false.
Plus One Computer Science Model Question Papers Paper 1 .3

Question 4.
In C++, ………. function is used to input a character or string using cin.
Plus One Computer Science Model Question Papers Paper 1 .4

Question 5.
Expand URL.
Plus One Computer Science Model Question Papers Paper 1 .5

Answer any nine questions from 6 to 16
Plus One Computer Science Model Question Papers Paper 1 .6

Question 6.
What are the advantages of the second gen­eration of computers over first genera­tion computers?
Plus One Computer Science Model Question Papers Paper 1 .7

Question 7.
Find the dual of following boolean equation:
Plus One Computer Science Model Question Papers Paper 1 .8

  1. \(X+\bar { X } =1 \)
  2. \((X+0).(X.1.\bar { X } )=0\)

Question 8.
Which are the various e-waste disposal methods?
Plus One Computer Science Model Question Papers Paper 1 .9

Question 9.
Draw the flowchart to find the simple interest. [Hint : I = P * N * R]
Plus One Computer Science Model Question Papers Paper 1 .10

Question 10.
Explain any two escape sequences used in C++.
Plus One Computer Science Model Question Papers Paper 1 .38

Question 11.
List and correct the errors in the fol­lowing C++ statement
Plus One Computer Science Model Question Papers Paper 1 .12

Question 12.
What are the different ways to write comments in C++?
Plus One Computer Science Model Question Papers Paper 1 .11

Question 13.
Write a brief explanation for the below mentioned C++ statement :
int a[ ]={2,3,5,6,9};
Plus One Computer Science Model Question Papers Paper 1 .13

Question 14.
Explain the memory allocation for the string.
Plus One Computer Science Model Question Papers Paper 1 .14

Question 15.
Which are the various e-waste disposal methods?
Plus One Computer Science Model Question Papers Paper 1 .15

Question 16.
What are the hardware and software requirements for connecting a com­puter to the internet?
Plus One Computer Science Model Question Papers Paper 1 .16

Answer any nine questions from 17 to 27
Plus One Computer Science Model Question Papers Paper 1 .17
Question 17.
Fill in the blanks.

(49)10 = (……………… )2 = (………………. )8 =

Question 18.
a. Write an algorithm to print the even numbers between 1 and 1oo.
Plus One Computer Science Model Question Papers Paper 1 .18
b. Write anyone advantages of using the flowchart.
Plus One Computer Science Model Question Papers Paper 1 .19

Question 19.
Explain different components of CPU.
Plus One Computer Science Model Question Papers Paper 1 .39

Question 20.
Which are the different universal ga­tes? Why they are called so? Draw the logical symbols of these gates.
Plus One Computer Science Model Question Papers Paper 1 .20

Question 21.
Describe the different phases in pro­gramming.
Plus One Computer Science Model Question Papers Paper 1 .21

Question 22.
What will be the output of the follow­ing C++ program?
Plus One Computer Science Model Question Papers Paper 1 .22

#include<iostream> 
using namespace std; int main()
{
int a, b, c;
a = 5; 
b = 8; 
c = a;
cout<<“\n Value of a is” <<++a;
cout<<“\n Value of b is” <<b++;
cout<<“\n Value of c is” <<- -c;
return 0;
}

Question 23.
Differentiate if……… else if and switch statements in C+ +.
Plus One Computer Science Model Question Papers Paper 1 .23

Question 24.
Explain any three array operations.
Plus One Computer Science Model Question Papers Paper 1 .25

Question 25.
Write C++ statements to declare a two-dimensional array of integers having 3 rows and 2 columns and input values to it
Plus One Computer Science Model Question Papers Paper 1 .24

Question 26.
Explain about any three string func­tions in the header file cstring.
Plus One Computer Science Model Question Papers Paper 1 .26

Question 27.
Differentiate call-by-value and call-by-reference methods in function calls.
Plus One Computer Science Model Question Papers Paper 1 .27

Answer any two questions from 28 to 30
Plus One Computer Science Model Question Papers Paper 1 .28

Question 28.
a. What is network topology?
Plus One Computer Science Model Question Papers Paper 1 .29
b. Which are the different types of net­work topologies?
Plus One Computer Science Model Question Papers Paper 1 .31

Question 29.
Explain about any five input or output devices used in a computer.
Plus One Computer Science Model Question Papers Paper 1 .32

Question 30.
Write a C++ program to input an inte­ger and check whether it is Amstrong number or not.
[Hint: Amstrong number is the one in which sum of cubes of digits in that number is the number itself.]

Answer

Plus One Computer Science Model Question Papers Paper 1 .34
Plus One Computer Science Model Question Papers Paper 1 .34
Answer 1.
void data type

Answer 2.
Alan Turing

Answer 3.
do……. while

Answer 4.
4- get()

Answer 5.
Uniform Resource Locator

Answer 6.
The first generation computers were built using vacuum tubes. This genera­tion implemented the stored program concept.
In second generation computers, vacu­um tubes were replaced by transistors. This allowed computers to become smaller and more powerful and faster. They also became less expensive, re­quired less electricity and emitted less heat.

Answer 7.

  1. \(X+\bar { X } =1 \)
  2. \((X+0).(X.1.\bar { X } )=0\)

Answer 8.
1. Reuse: It refers to second-hand use or usage after the equipment has been upgraded or modified
2. Incineration: It is a controlled and 10. C++ represents Octal Number and complete combustion process in which the waste is burned in specially designed incinerators at a high temperature in the range of 900 to 1000 degree Celsius.
3. Recycling: It is the process of making or manufacturing new products from a product that has originally served its purpose.
4. Landfilling: In this method, the soil is excavated from the trenches made and waste material is buried in it, which is covered by a thick layer of soil.

Answer 9.
Plus One Computer Science Model Question Papers Paper 1 .34

Answer 10.
C++ represents Octal Number and Hexadecimal Number with the help of escape sequences. The \on and \xHn represent a number in the octal number system and the hexadecimal number system respectively

Answer 11.
The letter ‘C’ in cout should be in the small letter. Every C++ statement end with a semicolon!;). After cout the << operator should be used. The correct statement is,
cout<<“Computer Science”;

Answer 12.
Comments are lines in the code that are added to describe the program. They are ignored by the compiler.

  1. Single line comment: The characters // (two slashes) is used. The text ap­pearing after // in a line is treated as a comment by the C++ compiler.
  2. Multiline comments: Anything writ­ten within /* and */ is treated as comm­ent so that the comment can take any number of lines.

Answer 13.
It is an integer array with name ‘a’. It is initialised at the time declaration | with values 2, 3, 5, 6, 9.

Answer 14.
The memory required depends upon the number of characters stored. A null character ‘\o’ is stored at the end of the string. This character is used as the string terminator and added at the end automatically. So the memory re­quired to store a string will be equal to the number of characters in the string plus one byte for the null character.
eg., char str[ ] = “Hello”;
Here the size of the array is not speci­fied and hence only 6 bytes will be allo­cated
(5 bytes for the string and 1 for ‘\o’).

Answer 15.
Scope of local variables:

  1. Declared within a function or a block of statements.
  2. Available only within that function or block.
  3. Memory is allocated when the func­tion or block is active and freed when the execution of the function or block is completed.

The scope of global variables:

  1. Declared outside all the functions.
  2. Available to all the functions of the program.
  3. Memory is allocated just before the execution of the program and freed when the program stops the execution.

Answer 16.
The hardware and software require­ment for internet:

  1. A computer with a modem (inter­nal/external).
  2. A telephone connection.
  3. An account with an ISP.
  4. A browser software.

Answer 17.
Plus One Computer Science Model Question Papers Paper 1 .35

Answer 18.
Let i be the variable.
Step 1: Start
Step 2: Let i = 2
Step 3: Print i
Step 4: i = i + 2
Step 5: If i>=1oo, then go to Step 3
Step 6: Stop
b. Better communication: Since a flow­chart is a pictorial representation of a program, it is easier for a programmer to explain the logic of the program to some other programmer through a flow­chart rather than the program itself.

Answer 19.
The CPU consists of three components; Control unit (CU), Arithmetic logic unit (ALU) and registers. All the major calculations and comparisons are made inside ALU. CU is responsible for acti­vating and controlling the operations of the units of the computer. Registers are storage locations inside CPU, whose content can be accessed more quickly by the CPU than other memory. They are temporary storage areas for in­structions or data.

Answer 20.
The NAND and NOR gates are called universal gates. A universal gate is a gate which can implement any Boolean function with­out using any other gate type.
NAND gate: This is an AND gate with its output inverted by a NOT gate.
Plus One Computer Science Model Question Papers Paper 1 .36
NOR gate: This is an OR gate with its output inverted by a NOT gate.
Plus One Computer Science Model Question Papers Paper 1 .37

Answer 21.
1. Problem identification: During this phase, you will be able to identify the data involved in processing, its type and quality, the formula to be used, activities involved and the output to be obtained. This is the challenging phase as it ex­ploits the efficiency of the programmer.

2. Preparing algorithms and flowcha­rts: Once the problem is identified, it is necessary to develop a precise step-by­step procedure to solve the problem. This procedure is not new or confined to computers.

3. Coding the program: The process of writing program instructions to solve a problem is called coding. The program written in any HLL is known as source code.

4. Translation: It is the process of con­verting a program written in a high-level language into its equivalent version in machine language. The compiler or in­terpreter is used for this purpose.

5. Debugging: It is the stage where the project known as ‘bugs’ and the process of de­tecting and correcting these errors is called debugging.

Answer 22.
a = 5
b = 9
c = 4

Answer 23.
Switch:

  1. Permits multiple branching.
  2. Evaluates conditions with equality operator only.
  3. Case constant must be an integer or I a character type value.
  4. When no match is found, the default statement is executed.
  5. the break statement is required to exit from the switch statement.
  6. More efficient when the same vari­able or expression is compared against a set of values for equality.

else if ladder:

  1. Permits multiple branching.
  2. Evaluates any relational or logical expression.
  3. The condition may include a range of values and floating point constants.
  4. When no expression evaluates to  True, else block is executed.
  5. Program control automatically goes out after the completion of a block.
  6. More flexible and versatile compared to switch.

Answer 24.
1. Traversal:  Accessing each element of the array at least once is called tra­versal. We can use this operation to check the correctness of operations dur­ing operations like insertion, deletion etc. Displaying all the elements of an array is an example of traversal,

eg., for (i=o; i,<1o; i++) 
cout<< a[i]<< “\t”;

2. Sorting: It is the process of arrang­ing the elements of the array in some logical order. This logical order may be ascending or descending in case of nu­meric values or dictionary order in case of strings.

3. Searching: It is the process of finding the location of the given element in the array. The search is said to be success­. full if the given element is found, that is the element exists in the array; other­wise unsuccessful. There are basically two approaches to a search operation. They are linear search and binary search.

#include <iostream> 
using namespace std;
int main( )
{
int mat[3][2], i, j; 
cout<<“Enter the elements\n”; 
for(i=o; i<3; i++) 
for(j=o; j<2; j++) 
cin>>mat[i][j]; return o;
}

Answer 26.
1. strlen (): This function is used to find the length of a string, i.e., the number of characters in the string. Its syntax is:
int strlen (string);
eg., n = strlen (“Hello”);
Here returns the number of characters in the string, i.e. 5 to the variable n.

2. strcpy( ): This function is used to copy one string into another. The syntax is: strcpy
(string 1, string 2);
The function will copy string 2 to string 1.
eg., strcpy(s1,s2);

3. strcat( ): This function is used to ap­pend one string to another string. The length of the resultant string is the to­tal length of the two strings. The syn­tax is strcat (string 1, string 2);
The size of the first argument should be able to accommodate both the strings together.
eg., strcat(s1,s2);

Answer 27.
Call by value method:

  1. Ordinary variables are used as for­mal parameters.
  2. Actual parameters may be con­stants, variables or expressions.
  3. The changes made in the formal ar­guments are not reflected in actual ar­guments.
  4. Exclusive memory allocation is re­quired for the formal arguments.

Call by reference method:

  1. Reference variables are used as for­mal parameters.
  2. Actual parameters will be variables only.
  3. The changes made in the formal ar­guments are reflected in actual argu­ments.
  4. The memory of actual arguments is shared by formal arguments.

Answer 28.
1. a. The physical or logical arrangement of computers on a network is called struc­ture or topology. It is the geometrical arrangement of computers in a net­work.
b. Star, ring, mesh, bus, tree, and hy­brid are the different network topolo­gies.
c. Star topology: It has a server all other computers are connected to it. Advan­tages add or remove workstations to a star network is easy and the failure of a workstation will not effect the other. The disadvantages are that if the server fails the entire network will fail.

2. Bus topology: All the computers are attached to a single cable called the bus. Here one computer transmits all other computers listen. Therefore it is called the broadcast bus. The transmission from any station will travel in both the di­rection. The connected computers can hear the message and check whether it is for them or not. Advantages are added or remove computer is very easy. It requires less cable length and the in­stallation cost is less. The disadvantage is fault detection is very difficult because of no central computer.

Answer 29.
Input devices are:
1. A light pen is a pointing device shaped like a pen. The tip of the light pen con­tains a light-sensitive element which when placed against the screen en­abling the computer to identify the lo­cation of the pen on the screen. The ad­vantage is drawing directly on to the screen.

2. The touch screen allows the user to oper­ate by simply touching on the display screen. It can also be operated using a stylus which gives more precision,

3. The joystick is used for playing video games, controlling training simulators and robots. The joystick has a vertical stick which can move in any direction. It has a button on the top that is used to select the option pointed by the cursor.

4. Keyboard: It is the most common in­put device. It allows the user to input alphabets, numbers and other charac­ters, Keyboard detects the key pressed and generates the corresponding ASCII code which can be recognised by the computer. It has a keyboard layout called the QWERTY design.

5. Mouse: It is a small hand-held device used to indicate the position of a cursor or its movement on a computer display screen by rolling it over a mouse pad/ flat surface. A mouse has one or more buttons and possibly a scroll wheel. The scroll wheel is used for scrolling the screen vertically or horizontally.

Output devices are:

1. Visual Display Unit (VDU): It visu­ally conveys text, graphics, and video information. The information shown on a display device is called soft copy because and is displayed for a temporary period of time.

2. Printers: These are used to produce hardcopy output. Based on the technol­ogy used, they can be classified as im­pact printers and non-impact printers.

3. Plotter: It is an output device used to produce hard copies of graphs and designs on the paper.

4. 3D printer: It is a new generation output device used to print 3D objects. The 3D printing process turns the ob­ject to be printed into thousands of horizontal tiny little layer. These tiny layers stick together to form a solid object.

5. Speaker: It produces sound. The speaker produces sound by the move­ment of the diaphragm in the speaker forward and backward according to the electrical signals coming out of the au­dio port.

Answer 30.

include<iostream>
using namespace std;
int main()
{
int n, i = 1, r, cb = o; cout<<“Enter a number: cin>>n; i =n; while (n)
{
r = n%io;
cb = cb + r * r * r;
n = n/10;
}
if (cb==i)
cout<<“The given number is an Arm­strong number 
}
return o; 
}

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Computer Science Previous Year Question Paper 2017

Kerala Plus One Computer Science Previous Year Question Paper 2017

Time Allowed: 2 hours
Cool off time: 15 Minutes
Maximum Marks: 60

General Instructions to Candidates

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Science Previous Year Question Papers and Answers 2018

Answer all questions from l to 5
Plus One Computer Science Previous Year Question Papers and Answers 2018 .1

Question 1.
The number (158)10 can be represented in Hexadecimal number system as……..
Plus One Computer Science Previous Year Question Papers and Answers 2017 .1

Question 2.
a. Write the following memory devices in the order of their speed, (fastest to g slowest order)
1. Cache
2. RAM
3. Hard disk
4. Registers
b. What do you mean by freeware and shareware?
Plus One Computer Science Previous Year Question Papers and Answers 2017 .2

Question 3.
Pick the odd one out and give a reason for your finding.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .3

Question 4.
(a) Name the type of loop which can be used to ensure that the body of the loop will surely be executed at least once.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .4
(b) Consider the code given below and predict the output.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .5

for (int i = 1; i < = 9; i = i + 2)
{
if (i = = 5) continue; 
cout >> i << " ";
}

Question 5.
Find the value of score [4] based on the following declaration statement.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .6
score [5] = {98, 87, 92, 79, 85};

Question 6.
Name the built-in function to check whe­ther a character is alphanumeric or not.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .7

Question 7.
a. Different networks with different proto­cols are connected by a device called
1. Router
2. Bridge
3. Switch
4. Gateway
b. Define Protocol.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .8

Question 8.
Find the best matches from the given definitions for the terms in the given list. (Worm, Hacking, Phishing, Spam)
a. Unsolicited e-mails sent indiscrimi­nately.
b. A technical effort to manipulate the normal behavior of the networked computer system.
c. A stand-alone malware program usually makes the data traffic slow.
d. Attempt to acquire information like usernames and passwords by posing as the original website.
e. Appear to be useful software but will do damage like deleting necessary funds.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .9

Question 9.
Represent -3 8 in 2’s complement form.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .21

Question 10.
Write an algorithm to print the numbers up to 100 in reverse order. That is the output should be as 100, 99, 98, 97,….,
OR
Draw a flowchart to check whether the given number is positive, negative or zero.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .22
Question 11.
Identify the invalid literals from the following and write a reason for each.
a. 2E3.5
b. “9”
c. ‘hello’
d. 55450

Question 12.
The following C++code segment is a part of a program written by Smitha to find the average of 3 numbers.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .23

int a, b, c;                                                        
float avg;                                                         
cin>>a>>b>>c; 
avg = (a+b+c)/3;   
cout<<avg;

What will be the output if she inputs 1,4 and 5? How can you correct it?
Plus One Computer Science Previous Year Question Papers and Answers 2017 .24

Question 13.
Let M[3][3] be a 2D array that contains the elements of a square matrix. Write C++  statements to find the sum of the diagonal elements.

Question 14.
What are the advantages of using gets() function in C++ program to input string data? Explain with an example.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .25

Question 15.
Read the function definition given below, Predict the output, if the function is called as convert
Plus One Computer Science Previous Year Question Papers and Answers 2017 .26
Plus One Computer Science Previous Year Question Papers and Answers 2017 .27

void convert (int n)
{ 
if (n>l) convert (n/2); cout<<n%2;
}

Question 16.
Compare any three features of five gene­rations of computers
Plus One Computer Science Previous Year Question Papers and Answers 2017 .28

Question 17.
Draw the logic circuit of Boolean expre­ssion:
\((A+\bar { BC)+ } \bar { AB\quad } \)
OR
Using algebraic method, prove that
\(\bar { Y } .\bar { Z } +\bar { Y } .Z+Y.Z+Y=1\)
Plus One Computer Science Previous Year Question Papers and Answers 2017 .29

Question 18.
“It is better to give proper documentation within the program”. Give a reason.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .30

Question 19.
Briefly explain the three components in the structure of a C++ program.

Question 20.
Write an algorithm for arranging elements of an array in ascending order using bubble sort.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .31

Question 21.
Explain the difference between call-by-value method and call-by-reference method with the help of examples.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .32

Question 22.
Compare any three types of networks based on span of geographical area.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .33

Question 23.
Susheel’s e-mail ID is susheel@gmail.com. He sends an e-mail to Rani whose e-mail ID is rani@yahoo.com. How is the mail sent from Susheel’s computer to Rani’s computer?
Plus One Computer Science Previous Year Question Papers and Answers 2017 .34

Question 24.
With the help of a block diagram, explain the functional units of a computer.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .35

Question 25.
Write a program to check whether the given number is palindrome or not. (5)
OR
Write a program to print the leap years between 2000 and 3000.
(A century year is a leap year only if it is divided by 400 and a non-century year is a leap year only if it is divided by 4.)
Plus One Computer Science Previous Year Question Papers and Answers 2017 .36

Answer

Answer 1.
9E

Answer 2.
a. Registers, Cache, RAM, Hard disk
b. Freeware refers to copyrighted com­puter software which is made avail­able for use free of charge for a un­limited period.
Shareware refers to commercial software that is distributed on a trial basis. It is distributed without payment and with limited functionality.

Answer 3.
(c) ; Others has only one entry flow and one exit flow.
(b) ; Used for both input and output operations.

Answer 4.
a. do while loop
b. l 3 7 9

Answer 5.
85

Answer 6.
isalpha( )

Answer 7.
a. (iv). Gateway
b. Protocols are rules and conventions for transmitting data.

Answer 8.
a. Spam
b. Hacking
c.Worm
d. phishing

Answer 9.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .37

Answer 10.
Let i be the variable.
Step 1: Start
Step 2: Let i = 100
Step 3: Print i
Step 4: i = i – 1
Step 5: If i>=1, then goto Step 3
Stop 6: Stop
OR
Plus One Computer Science Previous Year Question Papers and Answers 2017 .38

Answer 11.
Invalid literally are:
(a).2E3.5; the fractional number cannot be used as an exponent.
(c). ‘hello’; String literals are enclosed within a pair of double quotes.

Answer 12.
The output will be 3.
(a+b + c)/3.o
or float (a+b+c)/3
or int a, b, c are replaced by float a, b, c or use of typecasting

Answer 13.

#include <iostream> 
using namespace std;
int main( )
{ 
int m[3][3], n, i, j, s=o;
cout<<“Enter the rows/columns of square matrix:
cin> >n;
cout<<“Enter the elements\n”; 
for(i=o; i<n; i++)
for(j=o; j<n; j++)
cin>>m[i][j];
cout<<“Diagonal elements are\n”; for(i=o; i<n; i++)
{
cout<<m[i][i]<<“\t”; s = s + m[i][i];
}
cout<<“\nSum of Diagonal elements is:
cout<<s; return o;
}

Answer 14.
By using gets( ) function we can input string with white space.
cin statement reads till a white space. But the function gets() is used to accept a string of characters including white spaces from the standard input device (keyboard) and store it in a character array.
eg., char str[3o];
gets(str);
puts(str);

Answer 15.
The output will be 111.
This is a recursive function. The pro­cess of calling a function by itself is known as recursion and the function is known as a recursive function.

Answer 16.
First-generation computers (1940-56):
The first generation computers were built using vacuum tubes. This genera­tion implemented the stored program concept, eg., Electronic Numerical Integra­tor and Calculator (ENIAC), Electronic Dis­crete Variable Automatic Computer (EDVAC), Universal Automatic Computer (UNIVAC).

Second-generation computers (1956-63):
In this generation computers, vacuum tubes were replaced by transistors. This allowed computers to become smaller and more powerful and faster. The manufac­turing cost was also less. The concept of programming language was developed. Programming languages FORTRAN and COBOL were introduced, eg., IBM 1401, IBM 1620.

Third generation computers (1964­71):
These are smaller in size due to the use of integrated circuits (IC’s). IC dras­tically reduced the size and increased the speed and efficiency of computing. Keyboards and monitors were intro­duced. The high-level language BASIC was developed during this period, eg., IBM 360, IBM 370.

Fourth-generation computers (1971 onwards):
The computers that we use today belong to this generation. These computers use microprocessors and are called microcomputers use Large Scale of Integration (LSI). These computers are smaller in size and have faster ac­cessing and processing speeds, eg., IBM PC, Apple II.

Fifth-generation computers (future):
These are based on artificial intelli­gence. The fifth-generation computing also aims at developing computing machines that respond to natural lan­guage input and are capable of learn­ing and self-organization.

Answer 17.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .39

Answer 18.
Documentation is an on-going process that starts in the problem study phase of the system and continues till its implementation and operation. We can write comments in the source code as part of the documentation. It provides suffi­cient information in a program to un­derstand its working. If the program is documented, it helps to understand the logic we applied. It helps the debugging process as well as program modification at a later stage.

Answer 19.
1. Preprocessor directives:
A C++ pro­gram starts with preprocessor direc­tives. Preprocessors are the compiler directive statements which give instruction to the compiler to process the information provided before ac­tual compilation starts. The #include is used to link the header files available in the C++ library. There are some other pre-processor direc­tives such as #define, #undef, etc.

2. Header files:
It contains the informa­tion about functions, objects, and pre­defined derived data types and they are available along with compiler. The header file stream contains the information about the objects cin and court.

3. The main( ) function:
The execution starts at main ( ) and ends within main ( ). If we use any other function in the program, it is called (or in­voked) from the main Q. The function header main ( ) is followed by its body, which is a set of one or more statements within a pair of braces { }. This structure is known as the definition of the main f) function. Each statement is delimited by a semicolon (;).

Answer 20.
Step 1: Start
Step 2: Accept a value in N as the num­ber of elements of the array.
Step 3: Accept N elements into the array AR.
Step 4: Repeat Steps 5 to 7, (N -1) times.
Step 5: Repeat Step 6 until the second last element of the list.
Step 6: Starting from the first position, compare two adjacent eleme­nts in the list. If they are not in proper order, swap the elements.
Step 7: Revise the list by excluding the last element in the current list.
Step 8: Print the sorted array AR.
Step 9: Stop

Answer 21.
Call by value method:
1. Ordinary variables are used as formal parameters.
2. Actual parameters may be constants, variables or expressions.
3. The changes made in the formal ar­guments are not reflected in actual arguments.
4. Exclusive memory allocation is required for formal arguments.

eg., void change find n)   
{  
n = n + 1;
cout << “n =” << n << ‘\n’;
}
int main( )
{
int x = 20; 
change( ); 
cout << “x = ” << x;
}

Here only the value of the variable x is passed to the function. Thus the formal parameter n in the function will get the value 20. When we increase the value of n, it will not affect the value of the variable x. The output of the above code is n = 21, x = 20 Call by reference method:

  1. Reference variables are used as formal parameters.
  2. Actual parameters will be variables only.
  3. The changes made in the formal ar­guments are reflected in actual ar­guments.
  4. The memory of actual arguments is shared by formal arguments.
eg., void changefint & n)
{
n = n + 1;
cout << “n = ” << n << ‘\n’;
}
int mainf)
{
int x=20;
change(x);
cout << “x = ” << x;
}
Here the output will be n = 21, x = 21

Answer 22.
The network is classified based upon the amount of geographical area that covers.
1. Personal Area Network (PAN): It is used to connect devices situated .in a small radius by using guided media or unguided media.

2. Local Area Network (LAN): This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial cable,  Data transfer rate is high and the error rate is less.

3. Metropolitan Area Network (MAN): It is a network spread over a city,  MAN have lesser speed than LAN and the error rate is less. Here optical fi- J ber cable is used, eg., Cable TV net­work.

4. Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a net­work of networks. Here the comput­ers are connected using telephone lines or Microwave station or satel­lites. The error rate in data transmis­sion is high, eg., internet.

Answer 23.
When an e-mail is sent from your com­puter, it first reaches the e-mail server of our e-mail service provider. From there the e-mail is routed to the recipi­ents e-mail server through the internet. The recipient’s e-mail server delivers the e-mail to recipients inbox which stores the message. SMTP (Simple Mail Transfer Protocol) is used e-mail com­munication.

Answer 24.
Functional units of a computer are based on a model proposed by John Von Neu­mann. It consists of some functional units namely Input Unit, Central Pro­cessing Unit (CPU), Storage Unit and Output Unit.

1. Input unit. The collected data and the instructions for their processing are entered into the computer through the input unit. They are stored in the memory (storage unit). The data may be in different forms. Keyboard, mouse, scanner, mic, digital cam­era, etc. are some commonly used in­put devices.

2. Central Processing Unit (CPU). The CPU is the brain of the computer. In a computer system, all major computations and comparisons are made inside the CPU. It is also responsible for activating and controlling the operations of other units of the com­puter. The functions of CPU are per­formed by three components; Arith­metic Logic Unit (ALU), Control Unit (CU), Registers.

3. Storage unit. The data and instruc­tions entered in the computer through input unit are stored inside the computer before actual process­ing starts. The information or results produced after processing are also stored inside the computer, before transferring to the output unit. The intermediate results, if any, must also be stored for further processing.

4. Output unit. The information ob­tained after data processing is sup­plied to the outside world through the output unit in a human-readable form. Monitor and printer are the commonly used output devices.

Answer 25.

#include <iostream>
using namespace std; 
int main()
{
int num, c, digit, rev=o; 
cout<<“Enter the number:";
cin> >num; c=num;
while(num != o)
{
digit = num % 10;                                 '
rev = (rev * 10)+ digit; 
num = num/10;
}
cout<<“The reverse of the number is”
<<rev; 
if (rev == c)
cout<<“\nThe given number is a palindrome.";
indrome.”; else
cout<<“\nThe given number is not a
palindrome.”;
return o;
}
OR
#include <iostream> 
using namespace std;
void main()
{
int i;
for (i=2000; i<=3000; i++) {
if (i%4 == o)
{
if (i%400 == o) cout << i;
}
return 0;
}

Plus One Computer Science Previous Year Question Papers and Answers