Ans Key Xii CS KV2 Halwara
Ans Key Xii CS KV2 Halwara
Ans Key Xii CS KV2 Halwara
1. No. of parameters
2. Data type of parameters
1 mark for each point
(b) Which C++ header file(s) will be essentially required to run/execute the following C++ code? (1)
void main()
{
int Rno=465;
char SName[]=haskar”;“Ajay B
cout<<setw(6) <<Rno<<setw(25)<<SName<<endl;
}
iostream.h, iomanip.h
(c) Rewrite the following program after removing the syntactical errors (if any). Underline each (2)
correction.
#include<iostream.h>
struct Screen
{ int C, R;};// semicolon
void ShowPoint(Screen P)
{
cout<<P.C<<P.R<<endl; // cascading operator
}
void main()
{
Screen Point1 = {5, 3}; // curly bracket
ShowPoint(Point1);
Screen Point2= point1;
Point1.C+= 2; // accessing
Point1.R = Point1.R + 2;
}
( ½ mark for each error)
(d) Find the output of the following program: (3)
#include<iostream.h>
void ChangetheContent(int Arr[], int Count)
{
for(int C=0; C<Count; C++)
Arr[C]= Arr[Count –C- 1];
}
void main()
{
int A[]= {1, 2, 3}, B[] = {20, 30, 40, 50}, C[]= {100, 200};
ChangetheContent(A,3);
ChangetheContent(B,4);
ChangetheContent(C,2);
Ans: 3#2#3#
50#40#40#50#
200#200# (1 mark for each correct line output)
(e) Give the output of the following program (Assuming that all required header files are (2)
included in the program)
void main()
{
char a[]=-2011“ExamAheAd”;
int i;
for(i=0; a[i] ]!=\0’;i++)‘
{
if(a[i]>= 97 && a[i]<=122)
a[i] --;
Else
if(a[i]>= ‘0’ && a[i]<= ‘9’)
a[i] = a[i -1];
Else
if(a[i]>= ‘A’ && a[i]<= ‘Z’)
a[i]+ = 32;
Else
a[i]= ‘#’;
}
puts(a);
}
Ans: ewal######agdac
(f) Study the following program and select the possible output from it: (2)
#include<iostream.h>
#include<stdlib.h>
const int LIMIT = 4;
void main()
{
randomize();
int Points;
Points= 100 + random(LIMIT);
for(int P=Points; P>=100; P--)
cout<<P<<’#’;
cout<<endl;
}
(i) 103#102#101#100#
(ii) 100#101#102#103#
(iii) 104#103#102#101#
(iv) 103#102#101#100
Ans : (i)
2 (a) What is copy constructor and parameterized constructor? Illustrate with an example. (2)
½ mark for each suitable definition and ½ mark each for example.
(b) Answer the questions (i) and (ii) after going through the following class: (2)
class mammal{
public:
char category[20];
mammal( char xname[]) // function1
{
strcpy(category, xname)
}
mammal(mammal &t); //function2
};
Public members:
Constructor to assign initial valueas 500, Duration 70
A function NewSports() which allows user to enter S_Code, S_Name and Duration.
Also assign the values to Fees as per the following conditions:
S_Name Fees
Table Tennis 2000
Swimming 4000
Football 3000
Fees= 500;
Duration=70;
}
void NewSports();
void DisplaySports();
}
};
void Sports::NewSports()
{
cout<<”\nEnter Sports Code”; cin>> S_Code cout<<”\nSports Name”; gets(S_Name);
cout<<”\nDuration”; cin>>Duration; if(strcmp(S_name, “Table Tennis”)==0)
Fees= 2000;
else if(strcmp(S_name, “Swimming”)==0)
Fees= 4000;
else
Fees= 3000;
}
void Sports::DisplaySports()
{
cout<<”\nSports Code: ”<<S_Code<<endl<<Sp <<Fess<<”\nDuration :”<<Duration;
1 mark for class definition + 1 mark for constructor + 1 ½ mark for NewSport() + ½ mark
for display
(d) Consider the following declarations and answer the questions given below: (4)
class NATION
{
int H;
protected:
int S;
public:
void INPUT();
void OUTPUT();
};
class WORLD: private NATION
{
int T;
protected:
int U;
public:
void INDATA(int, int);
void OUTDATA();
};
class STATE: public WORLD
{
int M;
public:
void DISPLAY(void);
};
(i) Name the base class and derived class of the class WORLD.
NATION- base class, STATE- derived class
(ii) Name the data member(s) that can be accessed from function DISPLAY ().
Data member: U , M
(iii) Name the member function(s) which can be accessed from the objects of class
STATE.
Functions: DISPLAY(), INDATA(), OUTDATA()
(iv) Is the member function OUTPUT() accessible by the objects of the class WORLD.
No, because function is derived privately into child class.
(1 mark each. No mark for partial answer.)
Ans: 1 mark for showing the stack status and 1 mark for correct answer (5800)
4 (a) Observe the program segment given below carefully and fill the blanks marked in statement (1)
1 using seekg( ) or seekp( ) functions for performing the required task.
#include<fstream.h>
class FILE
{ int Num;
char Name[30];
public:
void GO_Record(int); }; //function to read Nth record from the file
void FILE::GO_Record(int N)
{
FILE Rec;
Fstream File;
File.open(“STOCK”,ios::binary|ios::in)
______________________________ //statement 1
File.read((char*)&Rec,sizeof(Rec));
cout<<Rec.Num<<Rec.Name<<endl;
File.close( );
}
Ans. : File.seekg(-1)*sizeof(FILE),ios::CUR);
(b) Write a function to count and print the number of “TO” coming (2)
in a text file “ESSAY.TXT”.
void CWORDS( )
{ ifstream fin(“ESSAY.TXT”);
char st[80];
}
cout<<”\nTotal ‘to’ & ‘are’ words = “<<count;
fin.close( ); }
(c) Write a function in C++ to display object from the binary file “PR (3) price is more than Rs 200. Assuming that
binary file is containing the objects of the following class:
class PRODUCT
{
int PRODUCT_no;
char PRODUCT_name[20]; float
PRODUCT_price; public:
void enter( )
{
cin>> PRODUCT_no ; gets(PRODUCT_name) ; cin >>
PRODUCT_price;
}
void display()
{
cout<< PRODUCT_no ; cout<<PRODUCT_name ;cout<< PRODUCT_price;
}
int ret_Price( )
{
return PRODUCT_price;
}
};
void Rec_display()
{
Product P;
ifstream ifile(“PRODUCT.Dat”, ios::binary); if(!ifile)
{
cout<<”\nFile doesn’t exist”; exit(0);
}
else
{ while(ifile.read((char *)&P, sizeof(P)))
{
if (P.ret_Price()>200)
P.display();
}
}
}
5 (a) What do you understand by the terms Alternate key and Foreign Key of a relation? (2)
ADMIN
CODE GENDER DESIGNATION
1001 MALE VICE PRINCIPAL
1009 FEMALE COORDINATOR
1203 FEMALE COORDINATOR
1045 MALE HOD
1123 MALE SENIOR TEACHER
1167 MALE SENIOR TEACHER
1215 MALE HOD
i) To display TEACHERNAME, PERIODS of all teachers whose periods less than 25.
Select TEACHERNAME, PERIODS from SCHOOL where PERIODS<25;
ii) To display TEACHERNAME, CODE and DESIGNATION from tables SCHOOL and ADMIN
whose gender is male.
Select TEACHERNAME, SCHOOL.CODE, DESIGNATION from SCHOOL , ADMIN where
SCHOOL.CODE=ADMIN.CODE and GENDER=”
VICE PRINCIPAL 1
viii) SELECT COUNT (DISTINCT SUBJECT) FROM SCHOOL;
(X’.Y) + (X.Y’)=(Y+X)(X’.(Y+X)Y’).(X’+Y’)//Distributi
= 1. (X’+Y’).(Y+X).1
=(X’+Y’).(X+Y)= R.H.S
(b) Convert the following Boolean expression into its equivalent Canonical Product of Sum (1)
form:
X Y Z F
0 0 0 0
0 0 1 0
0 1 0 1
0 1 1 1
1 0 0 0
1 0 1 1
1 1 0 0
1 1 1 0
(X+Y+Z). (X+Y+Z’). (X’+Y+Z). (X’+Y’+Z)
(c) Write the equivalent Boolean Expression F for the following circuit diagram : (2)
A B
F= (A’.B)+(A.B)+(B’.C)
(d) Reduce the following Boolean Expression using K-map: (3)
F (X, Y, Z, W) = )
Z’ Z’ ZW ZW
X’ 1 1 1
X’ 1 1 1
XY 1 1
XY 1 1 1
F= W+X’Z’+XY’Z
7 (a) Define the term Bandwidth. Give any one unit of Bandwidth. (1)
In electronic communication bandwidth is the width of the range of frequencies that an
electronic signal uses on a given transmission medium.
Bps(Bytes per second)
(b) Difference between PAN and LAN. (1)
Personal Area Network: Network within a small area
Local Area Network: Network in a localized area.
(c) What is iMAP? Internet Message Access Protocol. Protocol for accessing e-mail from local (1)
server.
(d) Compare VB Script and ASP. VB Script- client side scripting. ASP- Server side scripting. (1)
(e) Ease and West Public Ltd has decided to network all its offices spread in five building as (4)
shown below:
Building 1
Building 4
Building 5
The distance between various buildings is as follows:
(ii) Suggest the most suitable building to install the server of the organization with a
suitable reason.
Building3. According to the 80:20 rule, building having more number of
computers should be selected for installing server.
(iii) Building 3 is used for many critical operations. It is tried that PC gets maximum
possible bandwidth. Which network device is/should be used for this?
Switch
(iv) The organization also has another office in same city but at a distant location
about25-30 Km away. How can link be established with building1. (Suggest the
transmission media).
(v)
(f) Difference between Virus and Trojan (1)
A computer virus is a computer program that can replicate itself and spread from one
computer to another. Trojan horse is virtually a harmless program in itself, but at backend
these programs perform some malicious activities like upload some security files and
information from the computer.
(g) Expand FSF and GNU. (1)
Free Software Foundation.
GNU’s Not Unix.