Kerala Plus One Computer Science Previous Year Question Paper 2017
Board | SCERT |
Class | Plus One |
Subject | Computer Science |
Sample Paper Set | 2017 |
Category | Plus One Previous Year Question Papers |
Time Allowed: 2 hours
Cool off time: 15 Minutes
Maximum Marks: 60
General Instructions to Candidates
- There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2
- Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
- Read questions carefully before you answering.
- Read the instructions carefully.
- Calculations, figures, and graphs should be shown in the answer sheet itself.
- Malayalam version of the questions is also provided.
- Give equations wherever necessary.
- Electronic devices except non-programmable calculators are not allowed in the Examination Hall.
Answer all questions from 1 to 5
Question 1.
The number (158)10 can be represented in the Hexadecimal number system as……..
Question 2.
a. Write the following memory devices in the order of their speed, (fastest to g slowest order)
1. Cache
2. RAM
3. Hard disk
4. Registers
b. What do you mean by freeware and shareware?
Question 3.
Pick the odd one out and give a reason for your finding.
Question 4.
(a) Name the type of loop which can be used to ensure that the body of the loop will surely be executed at least once.
(b) Consider the code given below and predict the output.
for (int i = 1; i < = 9; i = i + 2) { if (i = = 5) continue; cout >> i << " "; }
Question 5.
Find the value of score [4] based on the following declaration statement.
score [5] = {98, 87, 92, 79, 85};
Question 6.
Name the built-in function to check whether a character is alphanumeric or not.
Question 7.
a. Different networks with different protocols are connected by a device called
1. Router
2. Bridge
3. Switch
4. Gateway
b. Define Protocol.
Question 8.
Find the best matches from the given definitions for the terms in the given list. (Worm, Hacking, Phishing, Spam)
a. Unsolicited e-mails sent indiscriminately.
b. A technical effort to manipulate the normal behavior of the networked computer system.
c. A stand-alone malware program usually makes the data traffic slow.
d. Attempt to acquire information like usernames and passwords by posing as the original website.
e. Appear to be useful software but will do damage like deleting necessary funds.
Question 9.
Represent -3 8 in 2’s complement form.
Question 10.
Write an algorithm to print the numbers up to 100 in reverse order. That is the output should be as 100, 99, 98, 97,….,
OR
Draw a flowchart to check whether the given number is positive, negative or zero.
Question 11.
Identify the invalid literals from the following and write a reason for each.
a. 2E3.5
b. “9”
c. ‘hello’
d. 55450
Question 12.
The following C++code segment is a part of a program written by Smitha to find the average of 3 numbers.
int a, b, c; float avg; cin>>a>>b>>c; avg = (a+b+c)/3; cout<<avg;
What will be the output if she inputs 1,4 and 5? How can you correct it?
Question 13.
Let M[3][3] be a 2D array that contains the elements of a square matrix. Write C++ statements to find the sum of the diagonal elements.
Question 14.
What are the advantages of using gets() function in C++ program to input string data? Explain with an example.
Question 15.
Read the function definition given below, Predict the output, if the function is called as convert
void convert (int n) { if (n>l) convert (n/2); cout<<n%2; }
Question 16.
Compare any three features of five generations of computers
Question 17.
Draw the logic circuit of Boolean expression:
\((A+\bar { BC)+ } \bar { AB\quad } \)
OR
Using algebraic method, prove that \(\bar { Y } .\bar { Z } +\bar { Y } .Z+Y.Z+Y=1\)
Question 18.
“It is better to give proper documentation within the program”. Give a reason.
Question 19.
Briefly explain the three components in the structure of a C++ program.
Question 20.
Write an algorithm for arranging elements of an array in ascending order using bubble sort.
Question 21.
Explain the difference between the call-by¬value method and the call-by-reference method with the help of examples.
Question 22.
Compare any three types of networks based on the span of geographical area.
Question 23.
Susheel’s e-mail ID is [email protected]. He sends an e-mail to Rani whose e-mail ID is [email protected]. How is the mail sent from Susheel’s computer to Rani’s computer?
Question 24.
With the help of a block diagram, explain the functional units of a computer.
Question 25.
Write a program to check whether the given number is palindrome or not. (5)
OR
Write a program to print the leap years between 2000 and 3000.
(A century year is a leap year only if it is divided by 400 and a non-century year is a leap year only if it is divided by 4.)