Reviewing Kerala Syllabus Plus Two Computer Science Previous Year Question Papers and Answers Pdf SAY 2019 helps in understanding answer patterns.
Kerala Plus Two Computer Science Previous Year Question Paper SAY 2019
Time: 2 Hours
Total Score: 60 Marks
Answer any 5 questions from 1 to 6. Each carries 1 score. (5 × 1 = 5)
Question 1.
Which among the following is an object – oriented programming language?
a) Pascal
b) FORTRAN
c) C++
d) C
Answer:
c) C++
Question 2.
Which among the following is known as push operation?
a) Inserting a new data item into a stack.
b) Deleting an element from top of a sack.
c) Inserting an element in a queue.
d) Inserting an element in a linked list.
Answer:
a) lnserting a new data item to the stack
Question 3.
Which among the following does not belong to the group?
a) Drupal
b) Joomla
c) File Zilla
d) WordPress
Answer:
c) File Zilla
Question 4.
Write full form of SMTP.
Answer:
Simple Mail Transfer Protocol
Question 5.
A web page can contain various links that direct to other web pages or specific parts of same web page. In HTML links are created using <A> tag. The attribute of <A>tag which specifies link destination is
Answer:
href
![]()
Question 6.
The year in which IT act came into existence in India is …………………..
Answer:
2000
Answer any 9 questions from 7 to 18. Each carries 2 scores. (9 × 2 = 18)
Question 7.
Structure combines different types of data under a single unit.
Write a structure definition in C++ which includes student details admission number, name, age and weight.
Answer:
struct student{
int admno;
char name[25];
int age;
float weight;
};
Question 8.
Which are the operations that facilitates dynamic memory allocation in C++? What are their functions?
Answer:
New is used to allocate memory during execution of the program. Delete is used to de-allocate the memory during run time.
Question 9.
What is reusability? How is reusability possible through inheritance?
Answer:
Once a class is defined, it can be used in other programs easily, this is called reusability. Inheritance allows the addition of more features to an existing class without modifying it. One can derive a new class from an existing one and add new features to it.
Question 10.
List any two applications of stack.
Answer:
Reversing a string, creating polish strings.
Question 11.
The user name and password of an e-mail account has to be sent securely over the Internet?
(a) Name the technology used to send data to the server securely.
(b) How does this technology support secure data communication?
Answer:
a) https(Hypertext transfer protocol secure)
b) It works using secure sockets layer, which provides a standard security technology for establishing an encrypted connection between computers on net.
![]()
Question 12.
How does browser execute JavaScript code?
Answer:
Every browser has a JavaScript engine. If the code snippet contains JavaScript code, it is passed to the JavaScript engine for processing, the engine executes the code. If there is no script then it processes without the help of script engine. Hence an HTML file without JavaScript is faster than with JavaScript code.
Question 13.
Write the keyword used to declare variables in JavaScript.
List different data types in JavaScript.
Answer:
In JavaScript, variables can be declared by using the keyword var.
Ex: var n;
The three basic data types are Number, String, Boolean.
Question 14.
Cardinality of two relations R1 and R2 are 10 and 8 respectively. They are union compatible.
a) What is the maximum possible cardinality of R1∪R2?
b) What will be the minimum cardinality of R1∩R2?
Answer:
a) 80
b) 0
Question 15.
What is primary key? How does it differ from alternate key?
Answer:
It is a set of one or more attributes used to uniquely identify a row in a relation. But a foreign key is a candidate key other than the primary key.
Question 16.
What are the methods of writing comments in PHP?
Answer:
There are two ways to write comments in PHP.
- Single line comment (//)- The text after // is treated as comment.
- Multi line comment- It starts with I* and ends with /*. The text enclosed between this is treated as comments.
Question 17.
Write any two advantages of parallel computing compared to serial computing.
Answer:
| Serial computing | Parallel computing |
| A single processor is used | Multiple processors are used with shared memory |
| A problem is divided into a series of instructions | A problem is divided into smaller ones that can be solved simultaneously |
| Instructions executed sequentially | Instructions executed simultaneously |
| One instruction is executed on a single processor at any moment | More than one instruction is executed on multiple processors at any moment of time. |
Question 18.
What is e-Governance? List any two challenges to e-Governance.
Answer:
The integration of computers and communication technology for the benefit of Government functions to the public is termed as E-Governance. By this Govt can serve the citizen in a convenient, efficient and transparent manner.
Challenges-
- Due to lack of e-Literacy, there is a difficulty to access the service of E-Governance
- High Security measures are required because of possibility of cyber attack.
- Implementation and maintenance requires huge amount and planning.
![]()
Answer any 9 questions from 19 to 30. Each carries 3 scores. (9 × 3 = 27)
Question 19.
Write differences between array and structure. (At least three differences.)
Answer:
| Structure | Array |
| Differences 1. It is a user defined data type |
Predefined data type |
| 2. It is a collection of different types of logically related data under one name. | Collection of data elements of same data type having a common name. |
| 3. Elements referenced using dot operator (.) | Elements reference using its subscripts (position value) |
| 4. When an element of a structure becomes another structure nested structure and complex structures are formed. | When an element of another becomes another array, multidimensional arrays are formed. |
| 5. Structure contains array as its elements | Array of structure can be formed. |
Question 20.
Write any three advantages of object oriented programming compared to procedural programming.
Answer:
Advantages of OOP are
- OOP allows modularity
- It is good for defining abstract data types
- It allows data abstraction
- fallows code reusability
- ft supports to create new data type.
Question 21.
Write short notes about any six operations on data structures.
Answer:
Operations on data structures
a) Traversing: Accessing or visiting or reading all elements of a data structure is called Traversal.
b) Searching: Searching is the process of finding elements in a data structure
c) Inserting: It is the process of adding new data at particular location is called insertion.
d) Deleting: It is the process of removing a particular element from the data structure
e) Sorting: Arranging elements in a particular orderfascending or descending) is called sorting. Examples are bubble sort and selection sort.
f) Merging: This is the process of combining two sorted data structure and form a new one.
Question 22.
What is a data centre? What are the basic facilities required to set up a data centre?
Answer:
A data centre is a place where huge amount of data is stored by the organisations. The main objective of data centers are storing, processing, dispensing data to the clients. A data center requires huge memory, uninterrupted power supply, cooling system, high speed internet and high security.
Question 23.
(a) Which HTML tag is used to partition the browser window?
(b) Write HTML code to partition the browser window into two equal vertical partitions and load two
HTML documents sample 1.html and sample2.html in them.
Answer:
a) <frameset>
b) <framesetcols=”50%,*”>
<framesrc=”sample1.htmr>
<framesrc=”sample2.htmr>
</frameset>
Question 24.
Write built-in functions or properties in JavaScript to perform the following:
a) To display a message on the screen.
b) To check whether a value is number or not.
c) To get upper case form of a string.
d) To get lower case form of a string.
e) To get character at a particular position in a string.
f) To get number of characters in a string.
Answer:
a) alert()
b) isNaN()
c) toUpperCase()
d) toLoweCase()
e) charAt()
f) x.length();
Question 25.
What is web hosting? List different types of web hosting. What are the factors, to be considered while choosing web hosting?
Answer:
Buying or renting storage space to store website in a web server and provide sen/ice to all the computers connected to the internet. This is called web hosting.
Types of web hosting
- Shared hosting
- Dedicated hosting
- Virtual Private Server
Following factors to be considered while choosing web hosting
a) Buying sufficient amount of memory space for storing our website files.
b) If web page contain programming contents supporting technology must be consider.
c) Based upon the programs select Windows or Linux hosting.
![]()
Question 26.
List advantages (any six) of database management system compared to traditional file management system.
Answer:
1) Data Redundancy: Duplication of data is known as redundancy, i.e., the same data may be repeated in many files. It leads to higher storage and access cost. So data redundancy should be eliminated
2) Inconsistency can be avoided: If data redundancy exist, it may lead to data inconsistency. If redundancy is removed then inconsistency can be avoided.
3) Data can be shared: If the computers are connected to a network, the data stored in the database can be shared among several users or programs.
4) Standards can be enforced: There is a standard BIS (Bureau of Indian Standards) in the field of Gold and ISBN (International Standard Book Number) in the field of publication. Similarly here is also some standards like ANSI(American National Standards Institute), ISO (International Organization for standardization), etc.. For example a filed “Name” should have 40 characters is a standard.
5) Security restrictions can be applied: The database is of great value to a company or organization. Data security means protection of data against accidental or intentional disclosure or unauthorized destruction or modification by unauthorized persons.
6) Integrity can be maintained: It ensures that the data entered in the database is correct. The data may contain in fcorrect information for example a date of birth can be 30/30/2001. To avoid this DBMS defines integrity check.
Question 27.
Write SQL commands for the following:
a) To remove a column from a table.
b) To remove a row from a table.
c) To modify data in a table.
Answer:
a) alter table <table name> drop <column name>;
b) delete from <tablename> where <condition>;
c) update <tablename> set <column name>=<new
value> [where <condition>];
Question 28.
What are the two methods of sending information from a form to web server? How do these two methods differ? (Write any four differences)
Answer:
| Get | Post |
| 1. Faster | Slower |
| 2. To send small volume of data | To send large volume of data |
| 3. Less secure | More secure |
| 4. Data visible during submission | Data not visible during submission |
Question 29.
Write advantages of cluster computing.
Answer:
Cluster means groups. Here a group of Internet connected computers, storage devices, etc are linked together and work like a single computer. It provides computational power through parallel processing. Its cost is less and used for scientific applications.
Advantages
- Price performance ratio: The performance is high and the cost is less.
- Availability: If one group of system fails the other group will do the work.
- Scalability: Computers can be easily added according to the work load increases.
Question 30.
What is e-Business? What are the challenges to e-Business?
Answer:
E business(electronic Business): Providing services or running business through internet is called E business.
Advantages of ebusiness:
- It overcomes geographical limitations
- It reduces the operational cost
- It minimizes the time and cost
- It remains open all the time
- We can locate the product faster from a wider range of choices
Challenges to E business
- Peoples are unaware of IT applications and its uses
- Most peoples don’t have plastic money(credit / debit card) and net banking
- It requires high security measurements otherwise you may lose money
- We can’t touch or smell products through online
- Some companies may not have proper Goods delivery service
Useful e Business websites
Address of website – Purpose / Service
www.irctc.in – Web site of Indian Railway and Tourism Corporation Ltd. to reserve and cancel train tickets and room booking
www.amazon.com – Us based marketing company headquarters in Washington
www.ebay.in – Largest online shopping site in India
www.licindia.com – Website of Life Insurance Corporation of India
www.airindia.com – Website of Air India to book / cancel air tickets
www.makemytrip.com – website for reserving and canceling tickets for journey and room booking www.keralartc.com – Website of KSRTC to book bus tickets
![]()
Answer any 2 questions from 31 to 33. Each carries 5 scores. (2 × 5 = 10)
Question 31.
(a) An HTML documents begins with <HTML> tag.
What are the attributes of <HTML>tag? Specify the values these attributes can take.
(b) Explain basic structure of an HTML document with a simple example.
Answer:
a) Attributes of <HTML>tag
- Dir-: It specifies the direction of text displayed on the webpage, values are Itr and rtl.
- Lang-: It specifies the language, values are En(English),Hi(Hindi),Ar(arabic), etc..
b) HTML page has a well defined structure. The main sections of HTML document are given below. <HTML>_____</HTML>
The entire HTML document is bounded with <HTML> and </HTML>
<Head> __________ </Head> This defines the head section. The head section,includes information such as document title, general style definition etc.
<Title>_________ </Title> This encloses a Title.
Title is given in head section. Text given in
<TITLE> _________ </TITLE>will displayed in the Title Bar.
<Body></Body>. Content of the document is written within <BODY> and </BODY>
Eg. <HTML>
<Head>
<Title>First Page</Title>
</Head>
<Body>
Hello
</BODY>
</HTML>
Question 32.
Explain values (any five) that can be given to type attribute of <INPUT>tag.
Answer:
The ‘type’ attribute of <INPUT> tag is used to create different control. The main values of type attribute is given below.
- Text: Creates a single line Text Box.
Eg. <INPUT Type= “Text”> - Password: creates a password box in which characters are displayed by symbols like asterisk(*)
Eg. <INPUT Type= “Password”> - Check Box: Creates a check box.
Eg. <INPUTType = “Check Box”> - Radio: Creates option button (Radio Button)
Eg. <INPUT Type= “Radio” Name=”sex” Value- ”M”>Male. - Reset: Creates reset button. It is used to clear all the data entered
Eg. <INPUT Type= “Reset”>
Question 33.
Consider the following table CUSTOMER.
| AccNo. | Name | Branch | Amount |
| 1001 | APPU | CALICUT | 40000 |
| 1002. | ARUN | KANNUR | 20000 |
| 1003 | VARUN | CALICUT | 10000 |
| 1004 | THARUN | KOTTAYAM | 30000 |
| 1005 | VARUN | KANNUR | 20000 |
Write output of the following SQL series:
a) Select Name from Customer where Amount>20000;
b) Select Avg(Amount) from Customer where Branch = ‘CALICUT’;
c) Select Name from Customer where Name like ‘A%’.
Write SQL queries for the following:
d) To rename the Table Customer as Customer2020.
e) To delete record with AccNo. 1003 from the table Customer2020.
Answer:
a)
Name
APPU
THARUN
b)
avg(Amount)
25000
c)
Name
APPU
ARUN
d)
alter table Customer rename to Customer2020;
b) delete from Customer2020 where AccNo= 1003