XII Comp Application(Com)Key 2025 Model_hss•com
XII Comp Application(Com)Key 2025 Model_hss•com
16. SUM(), AVG(),MAX() , MIN() , COUNT() (Any4) 29. Cyber crimes against individual
17. Data Definition Language(DDL):-eg: CREATE ,ALTER,. 1. Identity Theft 2. Harassment 3. Impersonation and
Data Manipulation Language(DML): eg:SELECT,INSERT. Cheating 4. Violation of Privacy 5. Dissemination of obscene
18. Short message service ,send text message up to 160 characters material (any3 with note)
5 Marks Answers 30 to 32 ( any 2)
3 Marks Answers 19 to 29 ( any 9) 30.a.initialisation, test_expression, updation , loop body
b. initialization: a=20,sum=0;
19. goto, break,continue, return (any3 with explanation) Test = while(a<=40)
Update = a=a+5;
20.a. An array is a collection of elements of the same type in Loop body = sum+=a;
nearest memory locations. c. Condition is checked as last part of loop,loop executed at least
b. Array can Store 100 integer numbers from index number 0 to 99 once, even if condition is false
21.Modular Programming: The entire program will be 31. Ordered list(<ol><li></li></ol>):- Attributes – start and type
divided into small sub problems(modules) 2).Unordered list(<ul><li></li></ul>):-Attributes -
1)Reduces the size of the program. type(disc,circle,square)
2) Less chance of error occurrence. 3).Definition List(<dl><dt></dt><dd></dd></dl>)[dl-definition
3) Reduces programming complexity list,dt- definition term,dd- definition description]
4) Improves reusability (any2)
b.text,password,checkbox,radio,reset,submit,button(any4)
22. a.cstring b.cstdio c.cctype
. 32.a.DBMS(Database Management System)
b. Components of DBMS:
Hardware, Software, Data, Users ,Procedures
(Any4 with explanation)
Answer Key Prepared By TCA Gafoor , AKM HSS KOTTOOR , for ACT MALAPPURAM Ph: 9847995577