Kerala Plus One Computer Science Question Paper June 2022 with Answers

Reviewing Kerala Syllabus Plus One Computer Science Previous Year Question Papers and Answers Pdf June 2022 helps in understanding answer patterns.

Kerala Plus One Computer Science Previous Year Question Paper June 2022

Time: 2 Hours
Total Score: 60 Marks

Answer any five questions from 1 to 7. Each carries 1 score. (5 × 1 = 5)

Question 1.
Who is known as the Father of Computer Science as well as Artificial Intelligence?
Answer:
Alan Turing

Question 2.
Write an example for free and open Source Software.
Answer:
GNU Linux/GIMP/Open Office etc.

Question 3.
Write the ternary operator in C++.
Answer:
(Ternary operator needs 3 operands) Conditional operator (?:) Eg. max=x>y?x:y;

Question 4.
In C++ _________ character is known as the string terminator.
Answer:
Null character(\0)

Question 5.
The process of calling a function by itself is known as _________ .
Answer:
Recursive function

Question 6.
To include a mathematical built in functions in a C++ program, we should include _________ header file.
Answer:
cmath

Kerala Plus One Computer Science Question Paper June 2022 with Answers

Question 7.
Write the name of a network protocol.
Answer:
TCP/IP/ HTTP/ HTTPS/FTP/SFTP/SMTP/IMAP/ POP…(Any One)

Answer any 9 questions from 8 to 19. Each carries 2 scores. (9 × 2 = 18)

Question 8.
(507)8 =(__________)2 = (____________)16
Answer:
Conversion from octal to binary-: Write down the 3 bit binary equivalent of each number.
So (507)8 = (101 000111 )2

Conversion from binary to hexadecimal:- Divide the number into groups of four bits (Starting from the right) then insert necessary zeroes in the left side and write the corresponding hexa equivalent.
(101 000 111)2 = ()16
0001->1 0100->4 0111->7
So the answer is 147
So (507)8 = (101 000 111 )2 = (147)16

Question 9.
Differentiate between FtAM and ROM RAM
Answer:

RAM ROM
Read and write memory (Just like our note book) Read only memory (Just like our text book)
Faster Slower
Volatile Non volatile
Stores programs and data Stores BOOT programs

Question 10.
Write the names of registers inside the CPU.
Answer:

  • Accumulator
  • Memory Address Register
  • Memory Buffer Register
  • Program Counter
  • Instruction Register

Question 11.
What are the major functions of an operating system?
Answer:
Major functions are memory management, Process management, File management and device management.

Question 12.
Distinguish between Syntax error and Logical Error.
Answer:
When the programmer violates the syntactical rules then syntax error occurs and it is displayed after compilation. Eg. not using comma for multiple variable declaration, int x y z instead of int x, y, z; If the programmer makes a logical mistake then logical error occurs but it is not displayed at the time of compilation and may not get the correct answer. To find the product (*) of x and y, using + instead of *.

Question 13.
Differentiate between character and string literals.
Answer:

Character literal String literal
Both are constants
Single character enclosed in single quotes Multiple character enclosed in double quotes
Eg. ‘m’ or ‘f or ‘t’ Eg. “BVM HSS Kalparamba”

Question 14.
Write a short note on any two jump statements used in C++.
Answer:
The execution of a program is sequential but we can change this sequential manner by using jump statements. The jump statements are
1. goto statement:- By using goto we can transfer the control anywhere in the program without any condition. The syntax is goto label;

Eg.
#include<iostream>
using namespace std;
intmain()
{
float a,b;
cout<<"Enter 2 numbers";
cin>>a>>b;
if(b==0)
goto end;
cout<<"The quotient is "<<a/b;
return 0;
end:cout<<"Division by zero error";
}

2. break statement:- It is used to skip over a part of the code i.e. we can premature exit from a loop such as while, do-while, for or switch.

Syntax :
while (expression)
{
if (condition)
break;
}
Eg.
#include<iostream>
using namespace std;
main()
{
int i=1;
while(i<10)
{
cout<<i<<endl;
if(i==5)
break;
i++;
}
}
The output is
1
2
3
4
5

3. continue statement:- It bypasses one iteration of the loop.

Syntax :
while (expression)
{
if (condition)
break;
}
Eg.
#include<iostream>
using namespace std;
main()
{
int i=0;
while(i<10)
{
i++;
if(i==5) continue;
cout<<i<<endl;
}
}
The output is
1
2
3
4
6
7
8
9
10

4. exit(0) function:- It is used to terminate the program. For this the header file cstdlib must be included.

Kerala Plus One Computer Science Question Paper June 2022 with Answers

Question 15.
Compare switch and if else if ladder statements used in C++.
Answer:

else if ladder switch
Evaluate condition with any relational or logical expression Evaluate expression with equality operator(==) only
It can handle floating values It cannot(only integer or character)
If the test expression contains more variable If else is used It cannot
When no match is found then else block is executed Here default block is executed
Program control automatically goes out Sometimes break statement is needed

Question 16.
Write C++ statement to declare an array which can store 5 integer values and explain about the memory allocation of the array.
Answer:
int n[5]; An integer requires 4 bytes so 5*4=20 bytes of memory is allocated for this array.

Question 17.
Differentiate between linear and binary search algorithms.
Answer:

Linear Search Binary Search
The elements need not be in an order The elements must be in a sorted order
It may be visit all the elements Never visit all the elements
Suitable for small sized array Suitable for large sized array
Slower- Takes more time Faster- Takes less time

Question 18.
Briefly explain about any two string built in function in C++.
Answer:
String functions
a) strlen()- to find the number of characters in a string(i.e. string length).
Syntax: strlen(string);
Eg. cout<<strlen(“Computer”); It prints 8.

b) strcpy()- It is used to copy second string into first string.
Syntax: strcpy(string 1, string2);
Eg. strcpy(str,”BVM HSS”);
cout<<str; It prints BVM HSS.

c) strcat()- It is used to concatenate second string into first one.
Syntax: strcat(string1,string2)
Eg.strcpy(str1,’’Hello”);
strcpy(str2,” World”);
strcat(str1 ,str2);
cout<<str1; It displays the concatenated string
“Hello World”

Question 19.
Write a short note about the following C++ statement: int sum(int.int);
Answer:
int sum(int.int); -: It is a function proto type ; This tells the compiler that there is a function namely sum with two integer arguments and its return type is also an integer. It is compulsory when the function definition is after the main function.

Answer any 9 questions from 20 to 32. Each carries 3 scores. (9 × 3 = 27)

Question 20.
Compare First and Second Generations of Computers.
Answer:

First Second
Component Vacuum Tubes Transistor
Period 1940 – 56 1956 – 63
Size Larger Smaller
Speed Slower Faster

Question 21.
Find the 1 ‘s Compliment and 2’s Compliment form of(-78)10.
Answer:
+78 in 8 bits is (01001110)2
To find 1’s complement change all ones to Zeroes and vice versa.
So -78 in 1’s complement form is 10110001 To find 2’ complement, add 1 to the 1 ’s complement. So-78 in 2’s complement form is 10110001 + 1 =10110010 So the answer is (10110010)2

Question 22.
What is e-Waste? Briefly explain about any two e-Waste disposal methods.
Answer:
e-Waste(electronic waste): It refers to the mal functioning electronic products such as faulty computers, mobile phones, tv sets, toys, CFL etc.

e-Waste disposal methods
a) Reuse: Reusability has an important role of e-Waste management and can reduce the volume of e-Waste
b) Incineration: It is the process of burning e Waste at high temperature in a chimney
c) Recycling of e-Waste: It is the process of making new products from this e-Waste.
d) Land filling: It is used to level pits and cover by thick layer of soil.

Kerala Plus One Computer Science Question Paper June 2022 with Answers

Question 23.
What are the different phases in programming?
Answer:

  1. Problem identification
  2. Algorithm and flowchart
  3. Coding
  4. Translation
  5. Debugging
  6. Execution
  7. Documentation

Question 24.
Identify the invalid identifiers from the following and write reason for that:
A20bc, if, 5 sum, adm_no, student age, classno
Answer:

  1. If – It is a keyword
  2. 5sum – It can’t start with a digit
  3. student age-Space cannot be used

Question 25.
Briefly explain about the structure of a C++ Program.
Answer:

#include<iostream>
using namespace std;
intmain()
{
Body of the program
return 0;
}

Question 26.
Write C++ code fragments to print the numbers from 1 to 10 using an exit or enter controlled loop.
Answer:
for(i=1;i<=10;i++)
cout<<i<<endl;

Question 27.
Write the steps to sort the following numbers stored in an array using bubble sort algorithm: 3, 7, 1, 2, 6
Answer:

3 7 1 2 6

Step 1 : Compare 3 and 7, here 7 is the bigger then no change

3 7 1 2 6

Step 2 : Compare 7 and 1, here 7 is the bigger then swap 7 and 1 so we will get as follows

3 1 7 2 6

Step 3 : Compare 7 and 2, here 7 is the bigger then swap 7 and 2 so we will get as follows

3 1 2 7 6

Step 4 : Compare 7 and 6, here 7 is the bigger then swap 7 and 6 so we will get as follows

3 1 2 6 7

After the first phase the largest number is on the right side, Similarly do the remaining

Step 5 : Compare 3 and 1 . here 3 is the bigger then swap 3 and 1 so we will get as follows

1 3 2 6 7

Step 6 : Compare 3 and 2, here 3 is the bigger then swap 3 and 2 so we will get as follows

1 2 3 6 7

Step 7 : Compare 3 and 6, here 6 is the bigger then no change so we will get as follows

1 2 3 6 7

Question 28.
Explain about any three stream functions used in C++.
Answer:
Stream functions for I / O operations :
Somefunctions that are available in the header file iostream.h to perform I / O operations on character and strings(stream of characters). It transfers streams of bytes between memory and objects. Keyboard and monitor are considered as the objects in C++.

Input functions: The input functions like get( )(to read a character from the keyboard) and getline() (to read a line of characters from the keyboard) is used with cin and dot(.) operator.
Kerala Plus One Computer Science Question Paper June 2022 with Answers 1

Eg.
#include<iostream>
using namespace std;
intmain()
{
char str[80],ch=’z’;
cout<<“enter a string that end with z:”;
cin.getline(str,80,ch);
cout<<str;
}

If you run the program you will get the prompt as follows
Enter a string that end with z: Hi I am Jobi. I am a teacherz.My school is BVM HSS
The output will be displayed as follows and the string after ‘z’ will be truncated.
Hi I am Jobi. I am a teacher

Output function: The outputt functions like put() (to print a character on the screen) and write() (to print a line of characters on the screen) is used with cout and dot(.) operator.
Kerala Plus One Computer Science Question Paper June 2022 with Answers 2

Kerala Plus One Computer Science Question Paper June 2022 with Answers

Question 29.
Distinguish between Call by value and Call by reference methods.
Answer:

Call by Value Call by Reference
Ordinary variables are used as formal parameter Reference variables are used as formal parameters
A copy of the original value is passed The original value is passed
Any change made by the function will not affect the original value Any change made by the function will affect the original value
Separate memory location is needed for actual and formal variables Memory of actual arguments is shared by formal arguments.

Question 30.
Prepare a short note about the following:
a) Optical fibre cable
b) NIC
c) Gateway (1 + 1 + 1)
Answer:
a) Optical Fibre Cable – These are made of glass fibres that are enclosed in a plastic jacket. It uses light signals instead of electrical signals. The light sources are LED or ILD.

b) NIC – Network interface card, It enables a computer to connect to a network and transmit information.

c) Gateway – It is used to connect two different networks with different protocols.

Question 31.
What are the major classifications of Social Media?
Answer:
Major classifications are

  1. Internet forums
  2. Social blogs
  3. Micro blogs
  4. Social net works
  5. Content communities
  6. Wikis

Question 32.
Write a short note about:
a) Fibre to Home (FTTH)
b) Phishing
c) Android Operating system (1 + 1 + 1)
Answer:
a) Fibre to Home(FTTH): This uses optical fibres hence the speed is very high. Special type modem is required.

b) Phishing (Fishing): It is an attempt to get others information such as usenames, passwords, bank a/c details etc by acting as the authorized website. Phishing websites have URLs and home pages similar to their original ones and mislead others, it is called spooling.

c) Android Operating System: It is Linux based OS? for touch screen devices such as smart phones and tablets. It was developed by Android Inc. by Andy Rubin and his friends. Now it is owned by Google.

Answer any 2 questions from 33 to 36. Each carries 5 scores. (2 × 5 = 10)

Question 33.
a) Draw the logic circuit for the Boolean expression A.B + C.D (3)
b) Find the Dual of the Boolean expression A + 0 = A (2)
Answer:
Kerala Plus One Computer Science Question Paper June 2022 with Answers 3

b) A.1=A

Question 34.
a) What are the advantages of flow charts? (2)
b) Draw a flowchart to check whether the number is even or odd. (3)
Answer:
a) The advantages of flow charts are as follows
a) Better communication
b) Effective analysis
c) Effective synthesis
d) Effective coding
Kerala Plus One Computer Science Question Paper June 2022 with Answers 4

Question 35.
a) Briefly explain about the Fundamental data types used in C++. (3)
b) What are the data type modifiers in C++? (2)
Answer:
Fundamental data types: It is also called built in data type. They are int, char, float, double and void

i) int data type-: It is used to store whole numbers without fractional (decimal point) part. It can be either negative or positive. It consumes 4 bytes (32 bits) of memory.i.e. 232 numbers. That is 231 negative numbers and 231 positive numbers (0 is considered as +ve ) So a total of 232 numbers. We can store a number in between -231 to + 231-1.

ii) char data type :- Any symbol from the key board, eg. ‘A’, ‘?’, ‘9’,…. It consumes one byte ( 8 bits) of memory. It is internally treated as integers, i.e. 28 = 256 characters. Each character is having a ASCII code, ‘a’ is having ASCII code 97 and zero is having ASCII code 48.

iii) float data type:- It is used to store real numbers i.e. the numbers with decimal point. It uses 4 bytes(32 bits) of memory. Eg. 67.89, 89.9 E-15.

iv) double data type:- It is used to store very large real numbers. It uses 8 bytes(64 bits) of memory,

v) void data type void means nothing. It is used to represent a function returns nothing,

b) Type modifiers are long, short, signed and unsigned.

Kerala Plus One Computer Science Question Paper June 2022 with Answers

Question 36.
Write the names of 4 topologies and explain about two topologies.
Answer:
Network topologies: Physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network. The major topologies developed are star, bus, ring, tree and mesh.

1) Star Topology: A star topology has a server all other computers are connected to it. If computer / A wants to transmit a message to computer B. Then computer A/irst transmit the message to the server then the server retransmits the message to the computer B. That means all the messages are transmitted through the server. Advantages are add or remove workstations to a star network is easy and the failure of a workstation will not , effect the other. The disadvantage is that if the server fails the entire network will fail.
Kerala Plus One Computer Science Question Paper June 2022 with Answers 5
2) Bus Topology: Here all the computers are attached to a single cable called bus. Here one computer transmits all other computers listen. Therefore it is called broadcast bus. The transmission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not.

Advantages are add or remove computer is very easy. It requires less cable length and the installation cost is less. Disadvantage is fault detection is very difficult because of no central computer.
Kerala Plus One Computer Science Question Paper June 2022 with Answers 6

3) Ring Topology : Here, all the computers are cbnnected in the shape of a ring and it is s. closed loop. Here also there is no central computer. Here a computer ti^nsmits a message, which is tagged along with its destination computer’s address. The message travels in one direction and each node check whether the message is for them. If not, it passes to the next node.

It requires only short cable length. If a single node fails, at least a portion of the network will fail. To add a node is very difficult.
Kerala Plus One Computer Science Question Paper June 2022 with Answers 7

4) Hybrid Topology: It is a combination of any two or more network topologies. Tree topology and mesh topology can be considered as hybrid topology.
a) Tree Topology : The structure of a tree topology is the shape of an inverted tree with a central node and branches as nodes. It is a variation of bus topology. The data transmission takes place in the way as in bus topology. The disadvantage is that if one node fails, the entire portion will fail.
Kerala Plus One Computer Science Question Paper June 2022 with Answers 8
b) Mesh Topology: In this topology each node is connected to more than one node. It is just like a mesh (net). There are multiple paths between computers. If one path fails, we a transmit data through another path.
Kerala Plus One Computer Science Question Paper June 2022 with Answers 9

Leave a Comment