Computer Science
Computer Science
Model Set
Computer Science
1
gksxkA ¼izR;sd ds fy, 1 vad fu/kkZfjr gS½ budk mÙkj nsus ds fy, miyC/k
djk;s x;s OMR&mÙkj i=d esa fn;s x;s lgh fodYi dks dkys@uhys ckWy
isu ls izxk<+ djsaA fdlh Hkh izdkj ds OgkbVuj@rjy inkFkZ@CysM@uk[kwu
vkfn dk OMR mŸkj i=d esa iz;ksx djuk euk gS] vU;Fkk ijh{kk ifj.kke
vekU; gksxkA
In Section-A, there are 70 objective type questions out of which
any 35 questions are to be answered. If more than 35 questions
are answered, then only first 35 will be evaluated. Each carrying
1 mark. Darken the circle with black/blue ball pen against the
correct option on OMR Answer Sheet provided to you. Do not
use Whitener/Liquid/Blade/Nail etc. On OMR Answer Sheet,
otherwise the result will be invalid.
7- [k.M&c esa 20 y?kqmÙkjh; iz’u gSaA izR;sd ds fy, 2 vad fu/kkZfjr gS] ftuesa
ls fdUgha 10 iz’uksa dk mÙkj nsuk vfuok;Z gSA blds vfrfjDr bl [k.M esa 6
nh/kZ mŸkjh; iz’u fn;s x;s gSaA izR;sd ds fy, 5 vad fu/kkZfjr gSa] ftuesa ls
fdUgha 3 iz’uksa dk mŸkj nsuk vfuok;Z gSA
In Section-B, there are 20 Short answer type questions, each
carrying 2 marks, out of which any 10 questions are to be
answered. Apart from this, there are 6 long Answer type
Questions, each carrying 5 marks, out of which any three
Questions are to be Answered.
8- fdlh rjg ds bysDVªkWfud midj.k dk iz;ksx iw.kZr;k oftZr gSA
Use of any type electronic appliances is strictly prohibited.
2
/ SECTION-A
iz'u la[;k 1 ls 70 rd ds izR;sd iz’u ds lkFk pkj fodYi fn, x;s gSa] ftuesa
ls ,d lgh gSA vius }kjk pqus x, lgh fodYi dks OMR&’khV ij fpfàr djsaA fdUgha
35 iz’uksa dk mŸkj nsaA
A. Queue B. Tree
C. Struct D. Stack
Char is a/an………..
A. function B. operator
math . h is a/an………..
5. DMLdekaM dkSu lk gS ?
C. Create D. Update
A. POP B. PUSH
C. Binary D. Traversal
Aggregation means?
4
A. Summarization B. Elimination
C. hiding D. Casting
Overloading is a feature of ?
A. Procedural Programming
B. SQL
10. vuqØe.k gS \
Indexing is ?
A. AND B. For ( )
C. IFU D. Break
12. la[;k iz.kkyh ---------- dk izfrfuf/kRo djus ds fy, iz;ksx fd;k tkrk gS \
5
Number systems used to represent ?
A. Quantity B. Count
A. EX-OR B. SOP
C. POS D. NOR
A. UPDATE B. SELECT
C. DELETE D. GRANT
15. fuEufyf[kr esa ls dkSu lk ,d SQL dek.M MsVk ntZ djus ds fy, iz;ksx
fd;k tkrk gS \
A. CREATE B. INSERT
C. SELECT D. UPDATE
6
Which one is an Operating system ?
A. LAN B. NIC
17. fuEu esa ls dkSu ,d ySu ds fy, mi;ksx ugha fd;k tkrk gS \
A. UPT B. OFC
network?
A. CABLE B. HUB
C. STAR D. NIC
7
List is a/an ……….. ?
A. Instance B. Design
A. Actor
B. Method
C. Data
Linker is a ………..
A. Application B. Protocal
Virus is a/an…………..
C. Device D. Process
A. Hardware Protection
B. Server Protection
A. # B. /
C. * D. +
A. Summarize B. Sort
C. Filter D. List
DOS is a/an………….. .
36. fuEufyf[kr esa ls dkSu lk vkWijsVj ds :i esa cout ds lkFk iz;ksx fd;k tkrk gS \
11
Which one of the following is used with cout as operator ?
A. << B. >>
C. > D. <
37. fuEukafyf[kr esa ls dkSu lk vkWijsVj ds :Ik esa cin ds lkFk iz;ksx fd;k tkrk gS
A.<< B. >>
C. > D. <
38. ,d Hkk"kk ftlesa u, MsVk izdkj mRiUu djus dh {kerk gksrh gS -------- dgykrh gS A
is called……..
A. Extensible B. Overloaded
C. Encapsulated D. Reprehensible
39. MsVk vkSj mlls lacaf/kr dk;Z dks ,d bdkbZ esa j[kus dks ------------ ds :i esa tkuk tkrk
gSA
known as………
A. Abstraction
B. Encapsulation
12
C. Polymorphism
D. Modularity
40. ;fn lHkh midj.kksa dks ,d dsUnzh; gc ls tksM+k tkrk gS] rks bl VksiksykWth dks dgk
tkrk gS A
is called
41. ------------------------ gesa Vscy esa fof’k"V :i ls ,d Viy dh igpku djus dh vuqefr nsrk
gSA
A. Superkey B. Domain
C. Attribute D. Scheme
42. , ¼,$ch ½ ¾ \
A (A + B) = ?
A. AB B. 1
C.(1 + AB ) D. A
13
43. lh $$ esa vpkud fdlh ywi ls ckgj vkus ;k NksM+us dk rjhdk D;k gS \
What is the way to suddenly come out or quit any loop in C++?
44. If….. else LVsVesaV dks fdl vkWijsVj }kjk cnyk tk ldrk gS \
45. fuEu esa ls dkSu esuw lapkfyr izksxzke ds fy, lcls mi;qDr gS \
program ?
A.For B. While
46. fuEufyf[kr esa ls fdl izdkj ds pj ds lkFk ,d fLop fuekZ.k dk mi;ksx fd;k tk
ldrk gS \
of variable ?
14
C. int, float, char D. Any basic data type
47. iqujko`fŸk;ksa dh la[;k Kkr gksus ij dkSu lh ywfiax izfØ;k dk lcls vPNk mi;ksx
fd;k tkrk gS \
iterations is known ?
C. Do while loop
tksM+ gS A
15
A.Simula 67 B.Simula 57
C. Simula 47 D. Simula 87
50. ------------------------- izksxzkej }kjk cuk, x, pjksa] dk;ksZa] ljf.k;ksa] Dyklsl vkfn ds ukeksa dk
lanHkZ gSA
A. Keywords
B. Identifiers
C. Constraints
D. Strings
51. ;fn m vkSj n int izdkj ds pj gSa] rks O;atd dk ifj.kke D;k gksxk \
If m and n are int type variables, what wil be the result of the
A. 0 B. 1
52. ----------------- MsVk vkSj mlds lacaf/kr dk;ksZa dks ,d lkFk ck¡/kus dk ,d rjhdk
16
…………. is a way to bind the data and its associated functions
A. Structure B. Class
A. + B. ++
C. :: D. ==
54. dkSu lk QaD’ku ckbÍl esa iksbaVj izkIr djus ;k Mkyus dh oŸkZeku fLFkfr
ykSVkrk gS A
pointer in bytes.
A.tellg ( ) B. tellp ( )
17
B. A reference once established cannot be changed
A.1 B. 2
C.3 D. 4
57. fuEufyf[kr esa ls fdl vo/kkj.kk dk vFkZ izksxzke ds pyus ds nkSjku mles
to a program as it runs?
18
59. cwfy;u O;atd LM+M (NO+ PQ) dks SOP :i esa cnyus ij gesa -------
form, we get
A.LM+MNOPQ B. L+MNO+MPQF
C.LM+M+NO+MPQ D. LM+MNO+MPQ
60. O;atd A(B+𝐶̅ +D) esa forj.k fu;e ykxw djus ij] gesa ------------izkIr gksrk gSA
get…………..
A.AB+AC+AD B. ABD
61. fuEufyf[kr esa ls dkSu lk mnkgj.k cwfy;u chtxf.kr ds forj.k fu;e dks
O;Dr djrk gS \
Boolean algebra ?
A. (A+B)+C=A+(B+C) B. A(B+C)=AB+AC
62. fuEufyf[kr esa ls dkSu lk mnkgj.k xq.ku ds Øe fofues; fu;e dks O;Dr
djrk gS A
19
Which of the examples below expresses the commutative law of
multiplication.
A. A+B=B+A B. AB=B+A
C. AB=BA D. AB=A*B
63. A……… dk mi;ksx MsVkcsl ds le; fMtkbu dks ifjHkkf"kr djus ds fy,
fd;k tkrk gS A
A.DDL B. TCL
C. DCL D. DML
65. rkfydk esa dkWye dks la’kksf/kr djus ds fy, ------------- dekaM dk mi;ksx fd;k
tk ldrk gS A
A. Alter B. Update
C. Set D. Create
20
66. dkSu lk lkekU; :i 3NF ds leku gS \
A. 1NF B. 2NF
C. BCNF D. 4NF
67. fuEufyf[kr esa ls dkSu ckgjh lqj{kk ds fy, [krjk ugha gS\
A. Front-door threats
B. Back-door threats
C. Underground threats
exchange?
A. Simplex
B. Multiplex
C. Half- duplex
D. Full duplex
21
69. Vhlhih dusD’ku esa iksVZ uacj D;k fufnZ"V djrk gS \
system.
70. fuEufyf[kr esa ls dkSu lk izksVksdkWy VªkaliksVZ ys;j esa ifjHkkf"kr gS@gSa \
A. FTP. B. TCP
Section-B
iz’u la[;k 1 ls 20 rd y?kq mÙkjh; gSaA fdUgha 10 iz’uksa ds mÙkj nsaA izR;sd ds fy, 2
vad fu/kkZfjr gSaA
22
2. C++ esa ykWftdy vkWijsVjksa dh lwph cuk,¡ vkSj muds dk;ksZsa dh O;k[;k djsaA
7. DML dks ifjHkkf"kr djsa vkSj lHkh DML dekaM dks lwphc) djsaA
24
Long Answer Type Questions
iz’u la[;k 21 ls 26 rd nh?kZ mÙkjh; gSaA fdUgha 3 iz’uksa ds mÙkj nsaA izR;sd ds fy, 5
vad fu/kkZfjr gSaA
21. nks vk;keh lj.kh dks ifjHkkf"kr djsa vkSj C++ izksxzke dk mi;ksx djds
blds dk;kZUou dks fn[kk,¡A
22. fnu dh la[;k Lohdkj djus ds fy, C++ izksxzke fy[ksa vkSj fQj fnu dk
uke iznf’kZr djsaA
23. f=Hkqt ds nks dks.kksa dks ntZ djus vkSj rhljk dks.k [kkstus ds fy, C++ esa
,d izksxzke fy[ksaA
24. ,d oxZ ds {ks=Qy vkSj ifjf/k dh x.kuk vkSj iznf’kZr djus ds fy, C++ esa
,d vkWCtsDV vksfj,aVsM izksxzke fy[ksaA
Write an object oriented program in C++ to calculate
and display the area & perimeter of an square.
25. Dykl bugsfjVsal dks iznf’kZr djus ds fy, C++ esa vkWCtsDV vksfj,aVsM
izksxzke fy[ksaA
25
Write an object oriented program in C++ to demonstrate class
inheritance.
26. KM dks cm vkSj mm esa cnyus vkSj iznf’kZr djus ds fy, C++ esa ,d
izksxzke fy[ksaA
26