Reviewing Kerala Syllabus Plus Two Computer Science Previous Year Question Papers and Answers Pdf March 2022 helps in understanding answer patterns.
Kerala Plus Two Computer Science Previous Year Question Paper March 2022
Time: 2 Hours
Total Score: 60 Marks
PART – I
A. Answer any five questions from 1 to 9. Each carries 1 score. (5 × 1 = 5)
Question 1.
The keyword used to define structure data type in C++ is ___________ .
Answer:
struct
Question 2.
Which of the following operator is used for dynamic memory allocation ?
(a) *
(b) &
(c) new
(d) delete
Answer:
new
Question 3.
Identify the type of inheritance that has two base classes and one derived class.
(a) Multi level inheritance
(b) Multiple inheritance
(c) Hierarchical inheritance
(d) Hybrid inheritance
Answer:
Multiple Inheritance
Question 4.
Name the data structure that follows LIFO principle to organize data.
Answer:
stack
Question 5.
Which attribute is used with <A> tag to specify the name of the web page to be linked ?
Answer:
href
![]()
Question 6.
The HTML tag used to specify a data item in a definition list in a web page is ____________ .
Answer:
<dt>and</dt>
Question 7.
Name the keyword used to declare a variable in JavaScript.
Answer:
var
Question 8.
Which of the following data is represented by Boolean data type in JavaScript ?
(a) 1
(b) TRUE
(c) “true”
(d) true
Answer:
d) true
Question 9.
The PHP operator used to join two strings is ____________ .
Answer:
(Dot) operator
B. Answer all questions from 10 to 13 each carries 1 score. (4 × 1 = 4)
Question 10.
The full form of VPS is
(a) Virtual Premium Service
(b) Virtual Private Service
(c) Virtual Premium Server
(d) Virtual Private Server
Answer:
Virtual Private Server
Question 11.
The level of data abstraction in DBMS that is closest to the user is known as __________ .
(a) Physical level
(b) Logical level
(c) View level
(d) Conceptual level
Answer:
View level
Question 12.
If a table STUDENT has 5 columns and another table TEACHER has 3 columns, the Cartesian product STUDENT × TEACHER will have columns.
Answer:
8, the sum of degrees
Question 13.
Variable in PHP begin with ____________ character.
Answer:
$
![]()
PART – II
A. Answer any two questions from 14 to 17 each carries 2 scores. (2 × 2 = 4)
Question 14.
What is polymorphism in Object Oriented Program-ming? Name the two types of polymorphism.
Answer:
Polymorphism is the ability for a message or data to be processed in more than one form. Two types of polymorphism are compile time polymorphism and run time polymorphism.
Question 15.
Explain the situations ‘overflow’ and ‘underflow’ in data structure operations.
Answer:
Overflow happens if we try to insert a new item when the data structure is full. Underflow happens if we try to remove an item from an empty data structure.
Question 16.
Write down the use of any two built-in functions in JavaScript with the help of examples.
Answer:
BUILT IN FUNCTIONS (methods)
1. alert() : This is used to display a message (dialogue box) on the screen.
eg: alert(“Welcome to JS”);
2. isNaN(): To check whether the given value is a number or not. It returns a Boolean value. If the value is not a numberfNaNI then this function returns a true value otherwise it returns a false value.
Eg: isNaN(“BVM”); returns true
3. toUpperCase(): This is used to convert the text to upper case.
Eg:var x=“bvm”;
alert(x.toUpperCase());
4. toLowerCase() This is used to convert the text to lowercase.
Eg: var x= “BVM”;
aiert(x.toLowerCase());
5. charAt(): It returns the character at a particular position.
Syntax: variable.charAt(index);
The index of first character is 0 and the second is T and so on. ,
Eg: var x=“HIGHER SECONDARY”;
alert(x.charAt(4));(anytwo)
Question 17.
Distinguish between serial computing and parallel computing.
Answer:
| Serial computing | Parallel computing |
| A single processor. | Multiple processors with a shared memory. |
| Problem is broken into a series of instructions | Problem is broken into discrete parts that that can be solved concurrently |
| Only one instruction is executed on a single processor at a time. | More than one instruction is executed on multiple processors at a time. |
| Instructions are executed sequentially one after another. | Instructions execute simultaneously on different processors |
![]()
B. Answer any two questions from 18 20 each carries 2 scores. (2 × 2 = 4)
Question 18.
What is meant by self-referential structure ?
Answer:
Self referential structure is a structure in which one of the elements is a pointer to the same structure.
Dynamic data structures like linked list, tree etc. can be implemented using self referential structure.
Question 19.
How do the access labels of class data type implement data hiding ?
Answer:
It is called data abstraction(hiding up of data and functions). The access specifiers (labels) usedin C++ are Public,Private and Protected. In, Public all the members will be available to everyone. In private, the data and function can’t be accessed by other classes. In protected, data and functions will only be available to the derived class.
Question 20.
Prepare short note on linked list.
Answer:
Linked list is a dynamic data structure containing a collection of nodes, where each node consists of a data and a link to the next node. Traversing, deletion, insertion etc. are operations on linked list.
PART – III
A. Answer any three questions from 21 to 24 each carries 3 scores. (3 × 3 = 9)
Question 21.
Write an algorithm to perform pop operation in a stack.
Answer:
Algorithm for pop operation is
Start If (top > -1) Then ltem= Stack[top] top = top - 1 Else Print "Stack Underflow” End of If Stop
Question 22.
Distinguish between static web page and dynamic web page.
Answer:
| Static web page | Dynamic web page |
| • Contents and layout is fixed | • Contents and layout may change during run time |
| • Never use databases | • Database is used |
| • Server side application does not require | • Runs Server side application |
| • Easy to develop | • Programming skills is needed |
Question 23.
Explain the merits and demerits of free hosting.
Answer:
Merits : Free hosting provides web hosting services free of cost.lt is very useful for the beginners.
De-merits; There may be restriction on the uploading file size. Free hosting service usually provide either their own sub domain or as a directory service. Free web hosting providers E.g. sites.google.com , blogspot.in
Question 24.
Briefly describe the three cloud service models.
Answer:
Cloud service models (3 major services)
1) Software as a Service (SaaS): A SaaS provider company provides more services on demand*’ such as they allow to access both resources and applications.
Examples are Google Docs, Adobe creative cloud, Microsoft Office 365, Facebook.com etc.
2) Platform as a Service (PaaS): A PaaS provider company provides subscribers access to the components that they require to develop and operate applications over the Internet.
Example : LAMP platform(Linux,Apache Server,MySQL and PHP), ASP.NET, PHP and Python, Google’s App Engine, Microsoft Azure, Force.com, etc.
3) Infrastructure as a Service (laaS) : It provides basic storage devices and computing capabilities as standardized services over the network.
Example: Amazon Web Services, Joyent, AT&T, GoGrid etc.
![]()
B. Answer any two questions from 25 to 27 each carries 3 scores. (2 × 3 = 6)
Question 25.
Write a JavaScript code to display the sum of the first 100 natural numbers.
Answer:
< script > var i, sum=0;
for(i = 1; i <= 100; i + +)
sum = sum + i;
document.write(sum);
< /script >
Question 26.
Explain the use of any three aggregate functions in SQL.
Answer:
SUM() – To find the sum of values
AVG() – To find the average of values
MIN() – To find the smallest value
MAX() – To find the largest value
COUNT() – To count the number of values excluding NULL.
Question 27.
Briefly describe any three ways of protecting Industrial Property Rights.
Answer:
Intellectual property is divided into two categories
1) Industrial Property
2) Copyright
1) Industrial property,
It ensures the protection of industrial inventions, designs, Agricultural products etc from unauthorized copying or creation or use. In India this is done by Controller of Patents Designs and Trademarks.
- Patents: A person or organization invented a product or a creation can be protected from unauthorized copying or creation without the permission of the creator by law. This right is called Patent. In India the validity of the right is up to 20 years. After this anybody can use freely.
- Trademark: This is a unique, simple and memorable sign to promote a brand and hence increase the business and goodwill of a company. It must be registered. The period of registration is for 10 years and can be renewed. The registered trademark under Controller General of Patents Design and Trademarks cannot use or copy by anybody else.
- Industrial designs: A product or article is designed so beautifully to attract the customers. This type of designs is called industrial design. This is a prototype and used as a model for large scale production.
- Geographical indications: Some products are well known by the place of its origin. Kozhikkodan Halwa, Marayoor Sharkkara(Jaggery), Thirupathi Ladoo, etc are the examples.
2) Copyright
The trade mark is ©, copy right is the property right that arises automatically when a person creates a new work by his own and by Law it prevents the others from the unauthorized or intentional copying of this without the permission of the creator for 60 years after the death of the author.
| Attributes | Patent | Trademark | Copyright |
| Items | Product, Process | Name, Logo, Signs | Creativity, artistic |
| Registration Required | Yes | Yes | No(Automatic) |
| Duration | 20 years | 10 years | Upto 60 years after the death of the author |
| Renewable | No | Yes | NA |
PART – IV
A. Answer any three questions from 28 to 31 each carries 4 scores. (3 × 4 = 12)
Question 28.
(a) How does static memory allocation differ from dynamic memory allocation ? (2)
(b) What is memory leak ? (2)
Answer:
a) In the static memory allocation, the amount of memory to be allocated is predicted and preknown. This memory is allocated during the compilation itself. All the declared variables declared normally, are allocated memory statically.
In the dynamic memory allocation, the amount of memory to be allocated is not known before hand. It is allocated during run time as and when re-quired. The memory is dynamically allocated using ‘new’ operator.
The objects that are allocated memory statically have the lifetime as their scope allows, as de¬cided by the compiler. And the objects that are allocated memory dynamically have.the lifetime as decided by the programmer. That is, until the programmer explicify deallocates the memory, such objects live in the memory.
b) Memory leak occurs when programmers allocate memory by using the new operator and forgets to de-allocate the memory by using delete operator.
Question 29.
(a) Distinguish between CHAR and VARCHAR data types of SQL. (2)
(b) What is the use of SELECT command in SQL ? Write down its syntax of usage. (2)
Answer:
a) char : It is used to store fixed number of characters . The memory is not used then it will be wasted.
varchar: It is also used to store characters but it uses only enough memory.
b) SELECT command is used to retrieve rows from a table. The symbol * is used for selecting all the columns in a table.
Its syntax is
SELECT < column “ name > [< column “ name >,< column “ name > ] FROM < table “
name >;
E.g. SELECT “ FROM student;
![]()
Question 30.
(a) Compare echo() and print () functions in PHP. (2)
(b) Write any two string functions in PHP and their uses. (2)
Answer:
a) The difference between echo and print
| echo | |
| take more than one parameter | only one parameter |
| Does not return any value | Returns TRUE or 1 on successful print and FALSE otherwise |
| Faster | slower |
b) String functions
- chr()-: Returns a character corresponding to the ASCII.
Eg. chr(ascii value); - strlen()- Returns the number of characters in a string strlen(string);
- strops()- Returns the position of the first occurrence of a string inside another string. strpos(main string, sub string, start position);
- strcmp()- Compares two stings. strcmp(string1 ,string2);
Eg.
<!DOCTYPE HTML> <html lang=“en”> <head> <title> We are learning PHP </title> </head> <body bgcolor=“cyan”> <?php echo “ASCII 65 is ”.chr(65).”<br>”; echo”The length is “.strien(“ComputerScience”).”<br>”; echo “e is at “.strposf'Computer Science”,’e’,8).”<br>"; if(strcmp(“Science”,’’Commerce”)) echo”Science and Commerce is not same”; else echo”Science and Commerce is same”; ?> </body> </html>
Question 31.
What is e-Governance ? Briefly describe the three components of e-Governance.
Answer:
The integration of computers and communication technology for the benefit of delivering government services to citizens in a convenient, efficient and transparent manner. Three infrastructures (components) are SDC, SWAN and CSC
(a) SDC (State Data Center): – SDC supports e- Governance initiative by providing functions like, keep data repository of the state, secure data storage, online delivery of services, state internet portal, disaster recovery etc.
(b) KSWAN (Kerala State Wide Area Network): – This WAN acts as a backbone of the State Information Infrastructure.
It connects Thiruvananthapuram, Kochi and Kozhikode as its hubs and extends to all 14 districts linking each of the 152 Block Panchayats.
(c) CSC (Common Service Centre): – These are front-end delivery points of the government, private and social sector services for the rural citizens of India. It helps in telephone, electricity and water bill payments, online application, certificate distribution etc. In Kerala, Akshayacenters are working as CSCs.
B. Answer any one question from 32 to 33. Each carries 4 scores. (1 × 4 = 4)
Question 32.
(a) Explain the two types of communication over the web. (2)
(b) Distinguish between Rowspan and Colspan used in the creation of tables in web pages. (2)
Answer:
(a) Two types of communication over the web.
- Client to server communication: This, communication is carried out between client to the web server (shopping site). The technology used to protect data that are transferred from client to web server is https.
- Server to server communication: This communication is usually carried out between web .sever (seller) to another web server (Gateway or bank), for the safe transaction.
(b) Colspan is used for combining two columns in a table. Rowspan is used for combining two rows in a table. Colspan and Rowspan are used with < TD > or < TH > tag.
Question 33.
(a) Prepare short note on cluster computing. (2)
(b) Write any two advantages of grid computing. (2)
Answer:
a) Cluster means groups. Here a group of Internet connected computers, storage devices, etc are linked together and work like a single computer. It provides computational power through parallel processing. Its cost is less and used for scientific applications.
Advantages
- Price performance ratio: The performance is high and the cost is less.
- Availability: If one group of system fails the other group will do the work.
- Scalability: Computers can be easily added according to the work load increases.
Disadvantages
- Programmability issues: Different computers uses different software and hardware hence the issues.
- Problem in finding fault: Fault detection is very difficult.
b) Advantages of grid computing.
Grid computing.
It is a system in which millions of computers, smart phones, satellites, telescopes, cameras, sensors etc. are connected each other as a cyber world in which computational power (resources, services, data) is readily available like electric power. Any information at any time at any place can be made available in our finger tips. This is used in disaster management, weather forecasting, market forecasting, bio information etc.
PART – V
Answer any two questions from 34 to 36. Each carries 6 scores. (2 × 6 = 12)
Question 34.
(a) Write any two attributes used with <BODY> tag and specify their effects in the webpage. (2)
(b) Name any four text formatting tags in HTML and write down the use of each. (4)
Answer:
(a) Write any two attributes used with < BODY >
tag and specify their effects in the webpage.
Background:- To set a background image.
Bgcolor:- To change background color.
Text:- To set color of text in the webpage.
Link:- To set color of hyperlink not visited. Alink:- To set color of active hyperlink.
Vlink:- To set color of visited hyperlink.
Left/Top margin:- To set margin
(b) <B> - For Bold <I> - For Italicising <U>-For Underline <STRONG> - For Bold Text <BIG> - Big sized text <Small> - Small sized text <SUB> - Subscript <SUP> - Superscript
Question 35.
(a) Write an HTML code to create a table as shown below. (3)
| Year | Computer Science | Comp.Appl.(Commerce) | Comp.Appl. (Humanities) |
| 2021 | 55 | 108 | 57 |
| 2022 | 60 | 120 | 60 |
(b) Explain the three types of lists that can be created in HTML documents. Name the tags required for each. Answer: (a) <html> <head> <title>Table</title> </head> <body bgcolor=”red”> <tableborder=”1"> <tr align=”center”> <th><b>Year</b></th> <th><b>Computer Science</b></th> <th><b>Comp.Appl.<br>(Commerce)</b></th> <th><b>Comp. Appl.<br>(Humanities)</b></th> </tr> <tr align=”center”> <td>2021</td> <td>55</td> <td>108</td> <td>57</td> </tr> <tr align=”center”> <td>2022</td> <td>60</td> <td>120</td> <td>60</td> </tr> </table> </body> </html>
b) 3 types of Lists in HTML.
1) Unordered List (<UL>) – Items are displayed , with square, circle or disc in front.
2) Ordered List (<OL>) – Items are displayed with the following type values.
Type = 1 for 1, 2, 3
Type = i for i, ii, iii,
Type = I for I, II, III
I Type = a for a, b, c
Maximum <Pu6Cishers
Type = A for A,B,C, ………………………..
3) Definition List (<DL>) – It is formed by definitions.
- <U> – It is used to specify List items.
- <DT>- It is used to specify Definition Term.
- <DD> – Used to specify the description
- <A> is used to provide hyperlinks. Two types of linking. Its attribute is HREF.
Question 36.
(a) Explain any four advantages of DBMS. (4)
(b) List the four components of DBMS. (2)
Answer:
a) Advantages of DBMS
- Data Redundancy – It means duplication of data. DBMS eliminates redundancy. DBMS does not store more than one copy of the same data.
- Inconsistency can be avoided – If redundancy occurs there is a chance to inconsistency. If re-dundancy is removed then inconsistency cannot occur.
- Data can be shared – The data stored in the database can be shared by the users or programs.
- Standards can be enforced – The data in the database follows some standards. Eg : a field ‘Name’ should have 40 characters long. Some standards are ANSI, ISO, etc.
b) Components of DBMS
a) Databases – It is the main component.
b) Data Definition Language (DDL) – It is used to define the structure of a table.
c) Data Manipulation Language (DML) – It is used to add, retrieve, modify and delete records in a database.
d) Users – With the help of programs users interact with the DBMS.
