Reviewing Kerala Syllabus Plus Two Computer Application Previous Year Question Papers and Answers Pdf March 2023 helps in understanding answer patterns.
Kerala Plus Two Computer Application Previous Year Question Paper March 2023
Time: 2 Hours
Total Score: 60 Marks
Answer any 5 questions 1 to 6. Each carries 1 score. (5 × 1 = 5)
Question 1.
_________ operator is the arithmetic assignment operator.
Answer:
+=,-=,*=,/= and %=
Question 2.
Name the Mathematical function which returns the absolute value of an integer number in C++.
Answer:
abs()
Question 3.
_________ tag in HTML used to create a drop-down list.
Answer:
<select>
Question 4.
_________ is a JavaScript function used to include a text in the body section of a webpage.
Answer:
document. write();
Question 5.
DNS stands for _________
Answer:
Domain Name System
![]()
Question 6.
Expand MIS +
Answer:
Management Information System
Answer any 9 questions 7 to 18. Each carries 2 score. (9 × 2 = 18)
Question 7.
Identify the following C++ tokens.
(a) “Morning”
(b) float
(c) >
(d) student
Answer:
a) “Morning” – string literal
b) float – Keyword
c) > – Operator
d) student – Identifier
Question 8.
List the type modifiers of C++
Answer:
short, long .signed and unsigned.
Question 9.
(i) Define Array (1)
(ii) Initialize an integer array with 4 elements. (1)
Answer:
i) Array is a collection of elements of same data type.With the same name we can store many elements.
ii) int arr[]={1, 2, 3, 4};
Question 10.
Explain any two built-in functions in C++ that are used for string manipulation with its syntax.
Answer:
strlen()- It returns the number of characters in the given string.
eg. strlen(“Hello”); – Returns 5.
strcpy(str1 ,str2) – It copies the content of str2 to str1.
eg. strcpy(str1,’’Hello”); – Now the content of str1 is
“Hello”;
Question 11.
Differentiate actual arguments and formal arguments in C++
Answer:
The variables that are used in the function definition as arguments are known as formal arguments. The constants, variables or expressions used in the function call are known as actual arguments.
Question 12.
What are the attributes of <HTML> tag and explain its use.
Answer:
dir – It specifies the direction of the text.(values Left to right is Itr or Right to left is rtl)
lang- Specifies the language(Eg. ml, ar, en.etc)
![]()
Question 13.
What is the use of frame tag in HTML? What is its limitaion?
Answer:
Frame tag is used to specify the name of HTML page which is to be loaded in the frame created by using frameset tag.
Question 14.
(i) Explain any two attributes of <TABLE> tag.(1)
(ii) Name any two tags associated with <TABLE> tag and its use. (1)
Answer:
i) <Table>Attributes
- Border- It specifies the thickness of the border lines.
- Bordercolor – Color for border lines.
- Align – Specifies the table alignment in the window.
- Bgcolor – Specifies background colour.
- Cellspacing – Specifies space between table cells.
- Cellpadding – Specifies space between cell border and content.
- Cols – Specifies number of columns in the table.
- Width – Specifies the table width.
- Frame – Specifies the border lines around the table.
ii) <tr>, <th> and <td>
Question 15.
What is the difference between is NaN() and Number () function in Java Script?
Answer:
isNaN(): It is used to check whether the specified argument is a number or not.
Number(): It converts the given data to number.
Question 16.
Define primary key and alternate key.
Answer:
A primary key is a one or more attributes (columns) that uniquely identifies the tuples(rows) in a relation(table). A candidate key that is not a primary key is called alternate key.
Question 17.
Differentiate between the datatypes’ CHAR and VARCHAR in SQL.
Answer:
char – It is used to store a fixed number of characters.
Eg.-namechar(20)
varchar(variable length)- It is also used to store . characters but it takes only the required memory.
Question 18.
Explain the following terms:
(a) Cyber forensics
(b) Infomania
Answer:
a) Cyber Forensics : Critical evidence of a particular crime is available in electronic format with the help of computer forensics. It helps to identify the criminal with help of blood, skin or hair samples collected from the crime site. DNA, polygraph, finger prints are another effective tool to identify the accused person is the criminal or not.
b) Info mania: Right information at the right time is considered as the key to success. The information must be gathered, stored, managed and processed well. Info mania is the excessive desire(lnfatuation)for acquiring knowledge from various modern sources like Internet, Email, Social media, Instant Message Application (WhatsApp) and Smart Phones. Due to this the person may neglect daily routine such as family, friends, food, sleep etc. hence they get tired. They give first preference to Internet than others. They create their own Cyber World and no interaction to the surroundings and the family.
![]()
Answer any 9 questions 19 to 29. Each carries 3 score. (9 × 3 = 27)
Question 19.
(i) Define Traversal operation in an array. (1)
(ii) How is each element in an array is accessed ? Explain with code segment. (2)
Answer:
i) Accessing all elements in an array at least once is called traversal operation.
ii) By using its index or subscript.
for(i=0;i<10;i++)
cout<<arr[i];
Question 20.
(a) Define Modular Programming (1)
(b) Explain the merits of Modular Programming. (2)
Answer:
a) The process of converting big and complex programs into smaller programs is known as modularisation. This small programs are called modules or sub programs or functions. C++ supports modularity in programming called – functions.
b)
- It reduces the size of the program
- Less chance of error occurrence
- Reduces programming complexity
- Improves reusability
Question 21.
Compare static webpage and dynamic webpage.
Answer:
Some pages are displaying same content (same text, images,etc) every time. Its content are not changing. This type of web pages are called static page.Conventional wep pages display static pages and has some limitations.
Advanced tools are used to create web pages dynamic, that means pages are more attractive and interactive. For this JavaScript, VBScript, ASP, JSP, PHP, etc are used
Following are the differences
| Static web pages | Dynamic web pages |
| Content and layout is fixed | Content and layout is changed frequently |
| Never use database | Data base is used |
| Run by browser | It runs on the server and result get back to the client(browser) |
| Easy to develop | Not at all easy |
Question 22.
What are the different types of lists in HTML?
Answer:
3 types of Lists in HTML.
1) Unordered List (<UL>) – Items are displayed with square, circle or disc in front.
2) Ordered List (<OL>) – Items are displayed with the following type values.
Type = 1 for 1, 2, 3, …………….
Type = i for i, ii, iii, …………….
Type = I for I, II, III, …………….
Type = a for a, b, c, …………….
Type = A for A, B, C …………….
3) Definition List (<DL>) – It is formed by definitions.
- <LI> – It is used to specify List items.
- <DT>- It is used to specify Definition Term.
- <DD> – Used to specify the description
Question 23.
Write any three built-in-functions in JavaScript and explain its use.
Answer:
BUILT IN FUNCTIONS (methods)
1) alert() : This is used to display a message (dialogue box) on the screen.
eg: alert(“Welcome to JS”);
2) isNaN(): To check whether the given value is a number or not. It returns a Boolean value. If the value is not a number(NaN) then this function returns a true value otherwise it returns a false value.
Eg.
1. isNaN(“BVM”); returns true
2. isNaN(8172); returns false
3. isNaN(“680121”); returns false
4. alert(isNaN(8172); displays a message box as false
3. toUpperCase(): This is used to convert the text to upper case.
Eg.varx-”bvm”;
alert(x.toUpperCase());
4. toLowerCase()-: This is used to convert the text to lower case.
Eg: var x=”BVM”;
alert(x.toLowerCase());
5. charAt(): It returns the character at a particular position.
Syntax: variable.charAt(index);
The index of first character is 0 and the second is 1 and so on.
Eg:varx=”HIGHER SECONDARY”; alert(x.charAt(4));
Eg 2.
var x=”HIGHER SECONDARY”;
alert(“The characters @ first position is “+ x.charAt(O));
6. length property : It returns the number of characters in a string.
Syntax : variable.length;
Eg.
var x=”HIGHER SECONDARY”;
alert(“The number of characters is “+ x.length); Output is as follows(note that space is a character)
(Write any 3)
![]()
Question 24.
Briefly explain different types of web hosting.
Answer:
Types of web hosting
Various types of web hosting services are available. We can choose the web hosting services according to our needs depends upon the storage space needed for hosting, the number of visitors expected to visit, etc.
- Shared Hosting
- Dedicated Hosting
- Virtual Private Server (VPS)
Question 25.
(i) Define the term Data independence. (1)
(ii) Explain different levels of Data independence. (2)
Answer:
Data Independence – It is the ability to modify the scheme definition in one level without affecting the scheme definition at the next higher level.
a) Physical Data Independence – It is the ability to modify the physical scheme without causing application programs to be rewritten.
b) Logical Data Independence – It is the ability to modify the logical scheme without causing application programs to be rewritten.
Question 26.
Explain the differentAlter commands and its various use to modify the structure of a table in SQL.
Answer:
Following are the clauses used with Alter command
- add – Used to add a new column to an existing table
- modify – used to modify the existing columns in an existing table
- drop – remove an existing column in a table
- rename – to rename an existing table.
Question 27.
(i) Define constraint. (1)
(ii) Explain any two column constraints. (2)
Answer:
i) It ensures the correct data is to be entered in the database.
ii) a) NOT NULL: it specifies that a column can
never have null values, i.e., not empty
b) UNIQUE: it ensures that no two rows have same value in the specified column.
c) PRIMARY KEY: it declares a column or a set of columns as the primary key of the table. This constraint makes a column NOT NULL and UNIQUE.
d) DEFAULT: it sets a default value for a column when the user does not enter a value for that column.
e) Auto_increment: This constraint is used to perform autojncrement the values in a column. That is automatically generate serial numbers. Only one autojncrement column per table is allowed.
Question 28.
Explain any three benefits of ERP system.
Answer:
Benefits of ERP system
- Improved resource utilization : Resources such as Men, Money, Material and Machine are utilized maximum hence increase the productivity and profit.
- Better customer satisfaction : Without spending more money and time all the customer’s needs are considered well. Because customer is the king of the market. Nowadays a customer can track the status of an order by using the docket number through Internet.
- Provides accurate information: Right information at the right time will help the company to plan and manage the future cunningly. A company can increase or reduce the production based upon the right information hence increase the productivity and profit.
- Decision making capability: Right information at the right time will help the company to take good decision.
- Increased flexibility: A good ERP will help the company to adopt good things as well as avoid bad things rapidly. It denotes the flexibility.
- Information integrity: A good ERP integrates various departments into a single unit. Hence reduce the redundancy, inconsistency, etc.
Question 29.
Define the following terms:
(i) copyright
(ii) patent (1)
(iii) infringement (1)
Answer:
i) Copyright: The tradd mark is ©, copy right is the property right that arises automatically when a person creates a new work by his own and by Law it prevents the others from the unauthorized or intentional copying of this without the permission of the creator for 60 years after the death of the author.
ii) Patents: A person or organization invented a product or a creation can be protected from unauthorized copying or creation without the permission of the creator by law. This right is called Patent. In India the validity of the right is up to 20 years. After this anybody can use freely.
iii) Infringement (Violation): Unauthorized copying or use of Intellectual property rights such as Patents, Copy rights and Trademarks are called intellectual property Infringement(violation). It is a punishable offence.
* Patent Infringement: It prevents others from the unauthorized or intentional copying or loop once even if the condition is false then check the condition, do use of Patent without the permission of the creator.
Piracy: It is the unauthorized copying, distribution and use of a creation without the permission of the creator. It is against the copy right act and hence the person committed deserve the punishment.
* Trademark Infringement: It prevents others from the unauthorized or intentional copying or use of Trademark without the permission of the creator.
* Copy right Infringement: It prevents others from the unauthorized or intentional copying or use of Copy right without the permission of the creator.
![]()
Answer any 2 questions 30 to 32. Each carries 5 score. (2 × 5 = 10)
Question 30.
(a) What is looping statements in C++? (1)
(b) Explain different looping statements. (2)
(c) What are the main components of a looping statement? (2)
Answer:
a) Repeat the execution of a specified block of code till specific condition is satisfied or not.
b) Iteration statements : If we have to execute a block of statements more than once then iteration statements are used,
* while statement
It is an entry controlled loop. An entry controlled loop first checks the condition and execute(or enters in to) the body of loop only if it is true. The syntax is given below
Loop variable initialised
while(expression)
{
Body of the loop;
Update loop variable;
}
Here the loop variable must be initialised before the while loop. Then the expression is evaluated if it is true then only the body of the loop will be executed and the loop variable must be updated inside the body. The body of the loop will be executed until the expression becomes false.
for statement
The syntax of for loop is
for(initialization; checking; update loop variable)
{
Body of loop;
}
First part, initialization is executed once, then checking is carried out if it is true the body of the for loop is executed. Then loop variable is updated and again checking is carried out this process continues until the checking becomes false. It is an entry controlled loop.
* do – while statement: It is an exit controlled loop. Exit control loop first execute the body of the
loop once even if the condition is faLse then check the condition.
do
{
Statements
}while(expression);
Here the body executes at least once even if the condition is false. After executing the body it checks the expression if it false it quits the body otherwise the process will be continue.
c) Initialisation, Test expression, Update expression and body of loop.
Question 31.
(i) Differentiate Client side Scripting and Server side scripting. (2)
(ii) Explain two Scripting languages in each Scripting languages of client side and server side Scripting languages. (3)
Answer:
i) Two types of scripts
- Client scripts – These are scripts executed by the browser.
Eg: VB Script, Javascript etc. - Server scripts – These are scripts executed by the server.
Eg: ASP, JSP, PHP, Perl, etc.
* The languages that are used to write scripts are known as scripting languages.
ii) Scripting Languages
a. JavaScript: Java script(developed by Brendan Eich for the Netscape browser) is a platform independent scripting language. Means It does not require a particular browser. That is it runs on any browser hence it is mostly accepted scripting language.
Ajax : It is a technology to take data from the server and filled in the text boxes without refreshing (without reloading the entire page) the web page. Ajax is Asynchronous JavaScript and Extensible Mark up Language (XML). XML is an Extensible Mark up Language, it allows to create our own new tags. This technology uses JavaScript to perform this function. When we turned off JavaScript features in the browser, the Ajax application will not work.
b. VB Script: VB Script(developed by Microsoft) is a platform dependent scripting language. Means it requires a particular browser(MS Internet Explorer) to work that is why it is not widely accepted scripting language.
![]()
Question 32.
(i) Define DBMS. (1)
(ii) Explain any four advantages of DBMS over conventional file system (4)
Answer:
DBMS means Data Base Management System. It is a tool used to store large volume of data, retrieve and modify the data as and when required. DBMS consists of data and programs.
Advantages of DBMS
- Data Redundancy
- Inconsistency can be avoided
- Data can be shared
- Standards can be enforced
- Security restrictions can be applied
- Integrity can be maintained
- Efficient data access
- Crash recovery