0% found this document useful (0 votes)
43 views

Computer Science

The document provides instructions for candidates taking an intermediate examination in computer science. It specifies that the exam is 3 hours and 15 minutes long with 70 total marks. It notes the exam has two sections - Section A contains 70 objective questions where candidates must answer 35, and Section B contains 20 short answer and 6 long answer questions where candidates must answer 10 short and 3 long questions. It reminds candidates not to use electronic devices during the exam.

Uploaded by

Jasmin Pravin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views

Computer Science

The document provides instructions for candidates taking an intermediate examination in computer science. It specifies that the exam is 3 hours and 15 minutes long with 70 total marks. It notes the exam has two sections - Section A contains 70 objective questions where candidates must answer 35, and Section B contains 20 short answer and 6 long answer questions where candidates must answer 10 short and 3 long questions. It reminds candidates not to use electronic devices during the exam.

Uploaded by

Jasmin Pravin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

INTERMEDIATE EXAMINATION – 2022 (ANNUAL) 328

Model Set

Computer Science

Time :- 3 Hours 15 minutes Full Marks - 70


le; % 3 ?kaVs 15 feuV iq.kkZad & 70
I.A., I.Sc. & I.Com. – (OPT)

Instructions for the candidate :-

1- ijh{kkFkhZ mÙkj&i=d ij viuk iz’u iqfLrdk Øekad ¼10 vadksa dk ½ vo’;


fy[ksaA
Candidates must enter his/her question Booklet Serial No. (10
Digits) in the OMR Answer Sheet.
2- ijh{kkFkhZ ;FkklaHko vius 'kCnksa esa gh mÙkj nsaA
Candidates are required to give their answer in their own words
as far as practicable.
3- nkfguh vksj gkf’k;s ij fn;s gq, vad iw.kkZad fufnZ"V djrs gSaA
Figures in the right hand margin indicate full marks.
4- iz’uksa dks /;kuiwoZd i<+us ds fy, ijh{kkfFkZ;ksa dks 15 feuV dk vfrfjDr
le; fn;k x;k gSA
15 minutes of extra time has been allotted for the candidates to
read the questions and follow the instructions carefully.
5- ;g iz’u iqfLrdk nks [k.Mksa esa gS]
This question paper is divided into two sections : Section-A,
and Section-B.
6- [k.M&v esa 70 oLrqfu"B iz’u gSa] ftuesa ls fdUgha 35 iz’uksa dk mÙkj nsuk
vfuok;Z gSA 35 iz’uksa ls vf/kd mÙkj nsus ij izFke 35 mÙkj dk gh ewY;kadu

1
gksxkA ¼izR;sd ds fy, 1 vad fu/kkZfjr gS½ budk mÙkj nsus ds fy, miyC/k
djk;s x;s OMR&mÙkj i=d esa fn;s x;s lgh fodYi dks dkys@uhys ckWy
isu ls izxk<+ djsaA fdlh Hkh izdkj ds OgkbVuj@rjy inkFkZ@CysM@uk[kwu
vkfn dk OMR mŸkj i=d esa iz;ksx djuk euk gS] vU;Fkk ijh{kk ifj.kke
vekU; gksxkA
In Section-A, there are 70 objective type questions out of which
any 35 questions are to be answered. If more than 35 questions
are answered, then only first 35 will be evaluated. Each carrying
1 mark. Darken the circle with black/blue ball pen against the
correct option on OMR Answer Sheet provided to you. Do not
use Whitener/Liquid/Blade/Nail etc. On OMR Answer Sheet,
otherwise the result will be invalid.
7- [k.M&c esa 20 y?kqmÙkjh; iz’u gSaA izR;sd ds fy, 2 vad fu/kkZfjr gS] ftuesa
ls fdUgha 10 iz’uksa dk mÙkj nsuk vfuok;Z gSA blds vfrfjDr bl [k.M esa 6
nh/kZ mŸkjh; iz’u fn;s x;s gSaA izR;sd ds fy, 5 vad fu/kkZfjr gSa] ftuesa ls
fdUgha 3 iz’uksa dk mŸkj nsuk vfuok;Z gSA
In Section-B, there are 20 Short answer type questions, each
carrying 2 marks, out of which any 10 questions are to be
answered. Apart from this, there are 6 long Answer type
Questions, each carrying 5 marks, out of which any three
Questions are to be Answered.
8- fdlh rjg ds bysDVªkWfud midj.k dk iz;ksx iw.kZr;k oftZr gSA
Use of any type electronic appliances is strictly prohibited.

2
/ SECTION-A

/Objective Type Questions.

iz'u la[;k 1 ls 70 rd ds izR;sd iz’u ds lkFk pkj fodYi fn, x;s gSa] ftuesa
ls ,d lgh gSA vius }kjk pqus x, lgh fodYi dks OMR&’khV ij fpfàr djsaA fdUgha
35 iz’uksa dk mŸkj nsaA

Question No.- 1 to 70 have four options, out of which only one is


correct. You have to mark your selected option, on the OMR Sheet.
Answer any 35 questions.

1. dkSu lk ,d non-linear MsVk lajpuk gSA

Which one is a non linear data structure.

A. Queue B. Tree

C. Struct D. Stack

2. baV ih( bl iafDr esa ^P* a/an gSA

int P; in this line ‘P’ is a/an

A. Input function B. output function

C. variable D. data type

3. dSj ,d-------------- gSA

Char is a/an………..

A. function B. operator

C. constant D. data type


3
4. math . h ,d-------------- gSA

math . h is a/an………..

A. data file B. header file

C. linker D. program block

5. DMLdekaM dkSu lk gS ?

Which one is a DML command\

A. Roll back B. Insert

C. Create D. Update

6. ,d vk;keh lj.kh esa gks ldrh gS…………

One dimensional array may have……..

A. Only columns B. Only rows

C. Only one cell D. Both columns and rows

7. LVSd ds fy, dkSu lk bViqV QaD’ku gSA

Which one is an input function for stack?

A. POP B. PUSH

C. Binary D. Traversal

8. ,d=hdj.k dk vFkZ gS\

Aggregation means?

4
A. Summarization B. Elimination

C. hiding D. Casting

9. vksojyksfMax fdldh fo’ks"krk gS\

Overloading is a feature of ?

A. Procedural Programming

B. SQL

C. Non Procedural Programming

D. Object Oriented Programming

10. vuqØe.k gS \

Indexing is ?

A. Design of objects B. Creation of objects

C. instances of objects D. Not related with objects

11. fuEufyf[kr esa ls dkSu ,d ykWftd xsV ls lacaf/kr gS \

Which one of the followings is associated with Logic gate ?

A. AND B. For ( )

C. IFU D. Break

12. la[;k iz.kkyh ---------- dk izfrfuf/kRo djus ds fy, iz;ksx fd;k tkrk gS \

5
Number systems used to represent ?

A. Quantity B. Count

C. Value D. All of the above

13. O;atd Y= AB+BC+AC ………….. vkWijs’ku n’kkZrk gS \

The expression Y=AB+BC+AC shows the …… operation.

A. EX-OR B. SOP

C. POS D. NOR

14. SQL esa dkSu&lk DML dekaM ugha gS\

Which one is not a DML command in SQL ?

A. UPDATE B. SELECT

C. DELETE D. GRANT

15. fuEufyf[kr esa ls dkSu lk ,d SQL dek.M MsVk ntZ djus ds fy, iz;ksx

fd;k tkrk gS \

Which one of the following SQL command is used to enter data ?

A. CREATE B. INSERT

C. SELECT D. UPDATE

16. vkWijsfVax flLVe dkSu lk gS \

6
Which one is an Operating system ?

A. LAN B. NIC

C. WWW D. None of the above

17. fuEu esa ls dkSu ,d ySu ds fy, mi;ksx ugha fd;k tkrk gS \

Which one of the following is not used for LAN ?

A. UPT B. OFC

C. Coaxial D. Copper wire

18. fuEufyf[kr esa ls dkSu ,d daI;wVj usVodZ dh oS/k VksiksykWth gS \

Which one of the following is valid topology of computer

network?

A. CABLE B. HUB

C. STAR D. NIC

19. iw.kkZd ,d--------------- gS \

Integer is a/an ……….. ?

A. Built-in data type B. Constant

C. Derived data type D. Variable

20. lwph ,d ------------ gS \

7
List is a/an ……….. ?

A. Derived data type B. function

C. header file D. Builtin data type

21. Object ,d ------------------ gS \

Object is a/an ……….

A. Instance B. Design

C. Data type D. Operator

22. OOP dk mís’; ------------------ ,dhd`r djuk gSA

Aim of OOP is to integrate ……………...

A. Program & Process B. Function and Data

C. File and Disk D. Input and Output

23. OOP esa QaD’ku dks ------------------ dgk tkrk gS \

In OOP function is known as………

A. Actor

B. Method

C. Data

D. Design of data and methods


8
24. ihvks,l dk eryc gS\

POS stands for ?

A. Sum of Product B. Same on Product

C. Product of sum D. Sample of Program

25. Mksesu izdkj ,d ------------------- gSA

Domain type is a/an ……………

A. Data type B. Column Name

C. Attribute Name D. Entity Name

26. fyadj ,d ----------------- gSA

Linker is a ………..

A. Application B. Protocal

C. Topology D. System software

27. lhMh,e, fdlls lacaf/kr gS \

CDMA is related with ?

A. Computer Network B. Computing System

C. Mobile system D. Internet

28. KHz fdl eki dh bdkbZ gSA


9
KHz is unit measurement for ………….

A. Light waves B. Speed of air craft

C. Water Flow D. Band width

29. ok;jl ,d -------------------- gS A

Virus is a/an…………..

A. Application software B. System software

C. Device D. Process

30. lkbcj dkuwu fdlls lacaf/kr gS \

Cyber law is related with ?

A. Hardware Protection

B. Server Protection

C. Internet access Protection

D. Online Fraud & Crime Control

31. MAX ( ) QaD’ku fjVuZ \

MAX ( ) function returns ?

A. Highest value B. Lowest value

C. Negative value D. Positive value


10
32. ikWbaVj dks ---------- symbol dk mi;ksx djds n’kkZ;k tkrk gS A

Pointer is denoted by using symbol…………

A. # B. /

C. * D. +

33. LIKE % DykWt --------------------------- Vscy MsVk esa enn djrk gS A

LIKE % clause helps to …………… table data.

A. Summarize B. Sort

C. Filter D. List

34. MkWl ,d ------------- gS A

DOS is a/an………….. .

A. Operating system B. Compiler

C. Editor D. Inter preter

35. feu ¼ ½ QaD’ku fjVuZ \

MIN ( ) function returns ?

A. Highest value B. Lowest value

C.Negative value D. Positive value

36. fuEufyf[kr esa ls dkSu lk vkWijsVj ds :i esa cout ds lkFk iz;ksx fd;k tkrk gS \
11
Which one of the following is used with cout as operator ?

A. << B. >>

C. > D. <

37. fuEukafyf[kr esa ls dkSu lk vkWijsVj ds :Ik esa cin ds lkFk iz;ksx fd;k tkrk gS

Which one of the following is used with cin as operator ?

A.<< B. >>

C. > D. <

38. ,d Hkk"kk ftlesa u, MsVk izdkj mRiUu djus dh {kerk gksrh gS -------- dgykrh gS A

A language which has the capability to generate new data types

is called……..

A. Extensible B. Overloaded

C. Encapsulated D. Reprehensible

39. MsVk vkSj mlls lacaf/kr dk;Z dks ,d bdkbZ esa j[kus dks ------------ ds :i esa tkuk tkrk

gSA

Wrapping data and its related functionality into a single entity is

known as………

A. Abstraction

B. Encapsulation

12
C. Polymorphism

D. Modularity

40. ;fn lHkh midj.kksa dks ,d dsUnzh; gc ls tksM+k tkrk gS] rks bl VksiksykWth dks dgk

tkrk gS A

If all devices are connected to a central hub, then this topology

is called

A. Bus topology B. Ring topology

C. Star topology D. Tree topology

41. ------------------------ gesa Vscy esa fof’k"V :i ls ,d Viy dh igpku djus dh vuqefr nsrk

gSA

……… allow us to identify uniquely a tuple in the Table.

A. Superkey B. Domain

C. Attribute D. Scheme

42. , ¼,$ch ½ ¾ \

A (A + B) = ?

A. AB B. 1

C.(1 + AB ) D. A

13
43. lh $$ esa vpkud fdlh ywi ls ckgj vkus ;k NksM+us dk rjhdk D;k gS \

What is the way to suddenly come out or quit any loop in C++?

A.Continue; Statement B. Break; Statement

C.Leave; Statement D. Quit; Statement

44. If….. else LVsVesaV dks fdl vkWijsVj }kjk cnyk tk ldrk gS \

If……. else statement can be replaced by which operator?

A. Bit wise operator B. Conditional operator

C.Multiplicative operator D. Additional operator

45. fuEu esa ls dkSu esuw lapkfyr izksxzke ds fy, lcls mi;qDr gS \

Which of the following is most suitable for a menu- driven

program ?

A.For B. While

C. Do - while D. All of the above.

46. fuEufyf[kr esa ls fdl izdkj ds pj ds lkFk ,d fLop fuekZ.k dk mi;ksx fd;k tk

ldrk gS \

A switch construct can be used with which of the following types

of variable ?

A. int B. int, char

14
C. int, float, char D. Any basic data type

47. iqujko`fŸk;ksa dh la[;k Kkr gksus ij dkSu lh ywfiax izfØ;k dk lcls vPNk mi;ksx

fd;k tkrk gS \

Which looping process is best used when the number of

iterations is known ?

A.While loop B. For loop

C. Do while loop

D. All looping process require that the iterations be known.

48. ywi ds vanj czsd LVsVesaV fy[kus dk D;k izHkko gksrk gS \

What is the effect of writing a break statement inside a loop ?

A. It cancels remaining itrations.

B. It skips a particular iteration.

C.The Program terminates immediately.

D. Loop counter is reset.

49. C++, C dk ,d foLrkj gS ftlesa ------------- dh Dykl daLVªD’ku fo’ks"krk dk ,d izeq[k

tksM+ gS A

C++ is an extension of C with a major addition of the class

construct feature of ……….

15
A.Simula 67 B.Simula 57

C. Simula 47 D. Simula 87

50. ------------------------- izksxzkej }kjk cuk, x, pjksa] dk;ksZa] ljf.k;ksa] Dyklsl vkfn ds ukeksa dk

lanHkZ gSA

………. refer to the names of variables, functions, arrays,

classes etc. created by the programmer.

A. Keywords

B. Identifiers

C. Constraints

D. Strings

51. ;fn m vkSj n int izdkj ds pj gSa] rks O;atd dk ifj.kke D;k gksxk \

,e%,u tc ,e¾ 5 vkSj ,u¾ 2 \

If m and n are int type variables, what wil be the result of the

expression m%n when m=5 and n=2 ?

A. 0 B. 1

C. 2 D. None of the above

52. ----------------- MsVk vkSj mlds lacaf/kr dk;ksZa dks ,d lkFk ck¡/kus dk ,d rjhdk

gS tks MsVk vkSj dk;ksaZ dk fNikus dh vuqefr nsrk gS A

16
…………. is a way to bind the data and its associated functions

together which allows the data and functions to be hidden.

A. Structure B. Class

C.Enum D. Both A and B

53. vkWijsVjksa tSls ------------- dks vksojyksM ugha fd;k tk ldrk A

Operators such as …….. cannot be overloaded.

A. + B. ++

C. :: D. ==

54. dkSu lk QaD’ku ckbÍl esa iksbaVj izkIr djus ;k Mkyus dh oŸkZeku fLFkfr

ykSVkrk gS A

Which function return the current position of the get or put

pointer in bytes.

A.tellg ( ) B. tellp ( )

C. tell ( ) D. Both A and B

55. lanHkZ lwpd ds leku D;ksa ugha gS \

Why reference is not same as a pointer

A. A reference can never be null.

17
B. A reference once established cannot be changed

C. Reference doesn’t need an explicit dereferencing mechanism

D. All of the above.

56. C++ fdrus izdkj ds cgq:irkvksa dk leFkZu djrk gS \

How many types of polymorphism are supported by C++.

A.1 B. 2

C.3 D. 4

57. fuEufyf[kr esa ls fdl vo/kkj.kk dk vFkZ izksxzke ds pyus ds nkSjku mles

au, ?kVd tksM+uk gS \

Which of the following concepts means adding new components

to a program as it runs?

A.Data hiding B. Dynamic typing

C.Dynamic binding D. Dynamic loading

58. fuEufyf[kr esa ls dkSu lk n`f"Vdks.k C++ }kjk vuqdwfyr gS \

Which of the following approach is adapted by C++.

A. Top - down B. Bottom- up

C. Right - left D. Left - right

18
59. cwfy;u O;atd LM+M (NO+ PQ) dks SOP :i esa cnyus ij gesa -------

----- izkIr gksrk gS A

Converting the Boolean expression LM+M (NO+PQ) to SOP

form, we get

A.LM+MNOPQ B. L+MNO+MPQF

C.LM+M+NO+MPQ D. LM+MNO+MPQ

60. O;atd A(B+𝐶̅ +D) esa forj.k fu;e ykxw djus ij] gesa ------------izkIr gksrk gSA

Applying the distributive law to the expression A(B+𝐶̅ +D), we

get…………..

A.AB+AC+AD B. ABD

C.A+B+C+D D. AB+A𝐶̅ +AD

61. fuEufyf[kr esa ls dkSu lk mnkgj.k cwfy;u chtxf.kr ds forj.k fu;e dks

O;Dr djrk gS \

Which of the examples below expresses the distributive law of

Boolean algebra ?

A. (A+B)+C=A+(B+C) B. A(B+C)=AB+AC

C.A+(B+C) = AB+AC D. A(BC) = (AB)+C

62. fuEufyf[kr esa ls dkSu lk mnkgj.k xq.ku ds Øe fofues; fu;e dks O;Dr

djrk gS A
19
Which of the examples below expresses the commutative law of

multiplication.

A. A+B=B+A B. AB=B+A

C. AB=BA D. AB=A*B

63. A……… dk mi;ksx MsVkcsl ds le; fMtkbu dks ifjHkkf"kr djus ds fy,

fd;k tkrk gS A

A ……… is used to define overall design of the database.

A. Schema B. Application progress

C. Data definition language D. Code

64. vuqnku vkSj fujLr gSa ---------- c;ku A

Grant and revoke are …….. statements.

A.DDL B. TCL

C. DCL D. DML

65. rkfydk esa dkWye dks la’kksf/kr djus ds fy, ------------- dekaM dk mi;ksx fd;k

tk ldrk gS A

………. command can be used to modify a column in a table.

A. Alter B. Update

C. Set D. Create

20
66. dkSu lk lkekU; :i 3NF ds leku gS \

Which normal form is similar with 3NF.

A. 1NF B. 2NF

C. BCNF D. 4NF

67. fuEufyf[kr esa ls dkSu ckgjh lqj{kk ds fy, [krjk ugha gS\

Which of the following is not the External security threats.

A. Front-door threats

B. Back-door threats

C. Underground threats

D. Denial of service (DOS)

68. fuEufyf[kr esa ls dkSu lk MsVk fofue; dk laHkkfor rjhdk ugha gS \

Which of the following is not the possible ways of data

exchange?

A. Simplex

B. Multiplex

C. Half- duplex

D. Full duplex

21
69. Vhlhih dusD’ku esa iksVZ uacj D;k fufnZ"V djrk gS \

What does the port number in a TCP connection specify ?

A.It specifies the communication process on the two end

system.

B. It specifies the quality of the data & connection.

C. It specifies the size of data

D. All of the above.

70. fuEufyf[kr esa ls dkSu lk izksVksdkWy VªkaliksVZ ys;j esa ifjHkkf"kr gS@gSa \

Which of the following protocol is/are defined in Transport layer?

A. FTP. B. TCP

C. UDP D. B & C both

Section-B

Short Answer Type Questions

iz’u la[;k 1 ls 20 rd y?kq mÙkjh; gSaA fdUgha 10 iz’uksa ds mÙkj nsaA izR;sd ds fy, 2
vad fu/kkZfjr gSaA

Question no. 1 to 20 are Short Answer Type. Answer any 10 questions.


Each question carries 2 marks.

1. ,udSIlqys’ku vkSj ,ClVªSD’ku dks ifjHkkf"kr djsaA

Define ENCAPSULATION & ABSTRACTION.

22
2. C++ esa ykWftdy vkWijsVjksa dh lwph cuk,¡ vkSj muds dk;ksZsa dh O;k[;k djsaA

List logical operators in C++ and explain their functions.

3. flaVSDl ds lkFk clrscr ( ) & for ( ) ds QaD’ku fyf[k, A

Write the functions of clrscr ( ) & for ( ) with syntax.

4. LVSd vkSj drkj dh O;k[;k djsaA

Explain stack & queue.

5. fdlh ,d [kkst rduhd dks le>kb,A

Explain any one searching technique.

6. mEehnokj dqath vkSj xSj&daqth fo’ks"krkvksa dh O;k[;k djsaA

Explain candidate key and non-key attributes.

7. DML dks ifjHkkf"kr djsa vkSj lHkh DML dekaM dks lwphc) djsaA

Define DML and list all DML commands.

8. esVªksikWfyVu ,fj;k usVodZ ¼ MAN) dks ifjHkkf"kr djsaA

Define Metro Politian Area Network (MAN).

9. izksVksdkWy D;k gS\ usVodZ izksVksdkWy ds izdkjksa dh O;k[;k djsaA

What is protocol ? Explain types of network protocols.

10. vfHkO;fDr ds lkFk ÞvkSjß ykWftd xsV Mªk djsaA

Draw “AND” logic gate with expression.

11. MsVk vfrjsd (redundancy) dh O;k[;k djsaA


23
Explain data redundancy.

12. MsVkcsl lkekU;hdj.k dh O;k[;k djsaA

Explain database normalization.

13. cwfy;u variable dks le>kb,A

Explain Boolean variable.

14. fdlh rkfydk dh dkfMZuSfyVh dks le>kb,A

Explain cardinality of a table.

15. fyaDM fyLV ds mi;ksx dk o.kZu djsaA

Describe use of linked list.

16. izh izkslslj funssZ’k D;k gS \


What is preprocessor directive ?
17. âkby ywi vkSj Mw Ogkby ywi esa D;k varj gS \

What is the difference between while ( ) and Do while ( )


Loop?

18. izksxzke MsoyesaV esa Editor dk D;k ;ksxnku gS \


What is the role of Editor in program development.
19. oa'kkuqØe dks ifjHkkf"kr dhft, A
Define Inheritance.
20. ifCyd baVjQsl D;k gS \
What is public interface ?

24
Long Answer Type Questions

iz’u la[;k 21 ls 26 rd nh?kZ mÙkjh; gSaA fdUgha 3 iz’uksa ds mÙkj nsaA izR;sd ds fy, 5
vad fu/kkZfjr gSaA

Question nos. 21 to 26 are Long Answer Type. Answer any 3 questions.


Each question carries 5 marks.

21. nks vk;keh lj.kh dks ifjHkkf"kr djsa vkSj C++ izksxzke dk mi;ksx djds
blds dk;kZUou dks fn[kk,¡A

Define two dimensional array and show its implementation using


a C++ program.

22. fnu dh la[;k Lohdkj djus ds fy, C++ izksxzke fy[ksa vkSj fQj fnu dk
uke iznf’kZr djsaA

Write a C++ program to accept number of the day then display


name of the day. (e.g. 1- Sun 2- Mon etc.)

23. f=Hkqt ds nks dks.kksa dks ntZ djus vkSj rhljk dks.k [kkstus ds fy, C++ esa
,d izksxzke fy[ksaA

write a program in C++ to enter two angles of a trangle


and find the third angle.

24. ,d oxZ ds {ks=Qy vkSj ifjf/k dh x.kuk vkSj iznf’kZr djus ds fy, C++ esa
,d vkWCtsDV vksfj,aVsM izksxzke fy[ksaA
Write an object oriented program in C++ to calculate
and display the area & perimeter of an square.
25. Dykl bugsfjVsal dks iznf’kZr djus ds fy, C++ esa vkWCtsDV vksfj,aVsM
izksxzke fy[ksaA

25
Write an object oriented program in C++ to demonstrate class
inheritance.
26. KM dks cm vkSj mm esa cnyus vkSj iznf’kZr djus ds fy, C++ esa ,d
izksxzke fy[ksaA

Write a program in C++ to convert & display KM into cm


& mm.

26

You might also like