2nd puc computer science notes pdf (1 mark questions and answers)

2nd puc computer science notes,ii puc computer science notes,2nd puc computer science,2nd puc computer science lab viva questions,2nd puc computer science important questions chapter wise, 12th computer science notes pdf, 2nd puc computer science important questions with answers pdf, 2nd puc computer science important questions chapter wise with answers, 2nd puc computer science important questions with answers, 2nd puc computer science question and answer, 2nd puc computer science passing package, 2nd puc computer science notes pdf

Computer Science Second PUC
2nd puc computer science chapters
Chapter 1 Typical configuration of computer system
Chapter 2 Boolean Algebra
Chapter 3 Logic Gates
Chapter 4 Data Structure
Chapter 5 Review of C++
Chapter 6 Basic concepts of OOP
Chapter 7 Classes and Objects
Chapter 8 Function Overloading
Chapter 9 Constructor and Destructor
Chapter 10 Inheritance (Extending classes)
Chapter 11 Pointers
Chapter 12 Data File Handling
Chapter 13 Database Concepts
Chapter 14 Structured Query Language
Chapter 15 Networking Concepts
Chapter 16 Internet and Open source concepts
Chapter 17 Web designing

2ND PUC COMPUTER SCIENCE NOTES PDF (ONE MARK QUESTIONS AND ANSWERS)


Read the following expansions and definitions for one mark.

ISA - Industry Standards Architecture.

PCI - Peripheral Component Interconnect.

PGA - Pin Grid Array.

SATA - Serial Advanced Technology Attachments.

SCSI - Small Computer System Interface.

BIOS - Basic Input Output System.

CMOS - Complementary Metal Oxide Semiconductor.

AGP - Accelerated Graphic Port.

SIMM - Single Inline Memory Module.

DIMM - Dual Inline Memory Module.

Wi-Fi - Wireless Fidelity.

ATA - Advanced Technology Attachments.

IDE - Integrated Drive Electronics.

EIDE - Enhanced Integrated Drive Electronics.

USB - Universal Serial Bus.

MIDI - Musical Instrument Digital Interface.

DVI - Digital Video Interface.

VGA - Visual Graphics Adapter.

SDRAM - Synchronous Dynamic Random Access Memory.

DDR-SDRAM - Double Data Rate Synchronous Dynamic Random Access Memory.

SMPS - Switch Mode Power Supply.

UPS - Uninterruptible Power Supply.

ARPANET - Advanced Research Projects Agency NETwork.

TCP/IP - Transmission Control Protocol/ Internet Protocol.

HTTP - HyperText Transfer Protocol.

FTP - File Transfer Protocol.

MIME - Multipurpose Internet Mail Extensions.

SLIP/PPP - Serial Line Internet Protocol/Point to Point Protocol.

GSM - Global System for Mobile communications.

CDMA - Code Division Multiple Access.

WLL - Wireless in Local Loop.

GPRS - General Packet Radio Service.

EDGE - Enhanced Data rate for Global Evolution.

SMS - Short Message Service.

 OSS - Open Source Software.

 FLOSS - Free Libre  and Open Source Software.

FSF - Free Software Foundation.



1. What is clock speed?
Ans: the frequency with which a processor executes instructions is called as clock speed.

2. What is microprocessor?
Ans: An integrated circuit that contains all the functions of a central processing unit of a computer.

3. What are slots?
Ans: A slot is an opening in a computer to insert a printed circuit board to enhance the capabilities of the computer.

4. What is BUS?
Ans: a bus is a set of wires and each wire carry one bit of data.

5. What is cache memory?
Ans: The cache memory is a high speed memory available inside CPU to speed up access.

6. Draw Invertor (NOT gate).
Ans:



7. Draw AND gate.
Ans:


8. Draw OR gate.
Ans:


9. Draw NOR gate
Ans:



10. Draw NAND.
Ans:


11. Draw XOR gate or Draw Exclusive OR gate.

Ans:



12. Daw XNOR gate.
Ans:

13. Draw NAND-to-NOT logic.
Ans:

14. Draw NAND-to-AND logic.

Ans:

15. Draw NAND-to-OR logic.
Ans:


16. Realize AND, OR and NOT gates using NOR gate.

Ans: NOR-to-AND logic

NOR-to-OR logic

NOR-to-NOT



17. What is tuple?
Ans: tuple is a single entry in the table.

18. What is Field or attribute?
Ans: each column is identified by a distinct header called attribute or field.

19. What is domain?
Ans: set of values for an attribute in that column.

20. Name DBMS software.
Ans: SQL server, Oracle, DB2, Sybase, Ingres, Informix, MySQL.

21. What is data independence?
Ans: it is an ability of a database to modify a schema definition at one level without affecting a schema in the next higher level.

22. What is normalization?
Ans: it is a process of organizing a data in database.

23. What is ER diagram?
Ans: Entity Relationship diagram is a visual representation of data that describes how data is related to each other.

24. What is data mining?
Ans: data mining is concerned with the analysis and picking out relevant information.

25. What is network?
Ans: a network is an inter-connection of autonomous computers.

26. What is interspace?
Ans: it is a client/server software program that allows multiple users to communicate online with real-time audio, video and text chat in dynamic 3D environments.

27. Define Local Area Networking.
Ans: A local area network (LAN) is a computer network that interconnects computers within a limited area such as a residence, school, laboratory, university campus or office building.

28. Define the term Topology of computer networks.
Ans: the actual appearance or layout of networking.

29. What is a SIM card?
Ans: Subscriber Identity Module is a tiny computer chip gives a unique phone number. It has memory, a processor and the ability to interact with the user. It has 16 to 64 Kb of memory to store hundreds of personal phone numbers, text messages and other data.

30. What are cookies?
Ans: cookies are the messages that a web server transmits to a web browser so that a web server can keep track of the users activity on a specific website.

31. What is cyber law?
Ans: cyber law refers to all the legal and regulatory aspects of internet and the www.

32. What is computer virus?
Ans: computer virus is a malicious program that requires a host and is designed to make a system sick.

33. What is WWW?
Ans: World Wide Web is a set protocol that allows accessing any document on the net.

34.
What is telnet?

Ans: telnet is an older internet utility that allows you to log on to remote computer systems. It is used to connect thousands of catalogs at libraries around the world.

35. What is web browser?
Ans: a web browser is a www client that navigates through the www and displays web pages. Internet Explorer and Netscape Navigator are the example for web browser.

36. What is web server?
Ans: A web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web.

37. What is web page?
Ans: the documents residing on websites are called web pages.

38. What is e-commerce?
Ans: e-commerce is the trade of goods and services with the help of telecommunications and computers.

39. Name any four formatting tags.
Ans: <b>, <I>, <u>, <big>, <small>, <h1>, <strong>

40. How do you create a link between web pages?
Ans: We can create links between web pages by means of anchor <a> </a> tag.

41. How to insert picture or images in the web page?
Ans: We can insert pictures or images by using <img src=path\image_name.jpg></img> tag.

42. Name number listing.
Ans: plain numbers, capital letters, small letters, capital Roman numbers, small Roman numbers.

43. What is web hosting?
Ans: web hosting is a business of providing storage space and access for websites.

44. What is DHTML?
Ans: Dynamic HyperText Markup Language refers to web content that changes each time it is viewed.

45. What is chatting?
Ans: Chat is a text-based communication that is live or in real-time. For example, when talking to someone in chat any typed text is received by other person immediately.

46. What is a website?
Ans: collection of webpages together is called website.

47. What is logic gate?
Ans: Logic gate is an electronic circuit which operates on one or more input signals to produces an output.

48. What is a record?
Ans: A single entry in a table is called a record.

49. Write any one application of computer network.

Ans: e-mail, file transfer protocol, telnet.

50. What is the use of HTML?
Ans: Hypertext Markup Language (HTML) is the standard markup language for creating web pages and web applications.


51. Expand the term DDRRAM.
Ans: Double Data Rate Random Access Memory.

52. What is Wide Area Network (WAN)?
Ans: the network spread across the countries is known as Wide Area Network.

53. What is ring topology?
Ans: each node is connected to two and only two neighboring nodes or nodes are connected in a circular fashion.

54.What is free hosting?
Ans: hosting web pages with no cost is called free hosting.

55.Define SMS.
Ans: Short Message Service (SMS) is the transmission of short text messages to and from a mobile phone.

56.define wi-fi.
Ans: Wi- Fi refers to Wireless Fidelity, which lets you connect to the internet without a direct line from your PC to the ISP.

57.Define video conference.
Ans: video conference is two-way interactive communication that is similar to a telephone call but over video.




DATA STRUCUTURE
       58. What is data structure? 
      Ans: a data structure is a specialized format for organizing and storing data
      59. What are primitive data structures? 
     Ans: integer, floating point, character and pointer.
.      60. How are data structures classified? 
    Ans: 

 .       61. Define an array 
      Ans: array is a collection of homogeneous data items under the same name

 .      62. What is traversal? 
     Ans: the process of accessing each data item exactly once to perform some operation is called traversing.

        63. What is searching? Mention any two searching techniques 
     Ans: the process of finding the location of a data item from the given collection of data items is called searching.
Ex: linear search and binary search

 .      64. What is sorting? 
      Ans: the process of arrangement of data items in ascending or descending order is called sorting 

        65. What is merging? 
      Ans: the process of combining the data items of two structures to form a single structure is called merging.
  

        66. What is stack? 
     Ans: a stack is an ordered collection of items where the addition of new items and the removal of existing items always take place at the same end. This technique uses LIFO principle.

 .      67. What are the applications of stacks? 
      Ans: - stack is used to reverse a word.
- It is used in “undo” mechanism in text editors.
- Used in backtracking.
- Used in conversion of decimal number into binary.
- To solve tower of Hanoi.
- Conversion of infix into prefix and postfix expression.


        68. What are prefix and postfix expressions? 
      Ans: if an operator precedes two operands, it is called prefix expression 
      Ex: +ab
      If an operator follows two operands it is called post fix expression 
      Ex: ab+

        69. What is queue? 
      Ans: a queue is an ordered collection of items where an item is inserted at one end called the rear and the existing item is removed at the other end called the front. Queues maintain a FIFO principle.

        70. Specify the types of queues 
      Ans: - Simple queue.
- Circular queue.
- Priority queue.
- Dequeue or double ended queue.


        71. What is linked list? 
     Ans: a linked list is a linear collection of data elements called nodes and the linear order is given by means of pointers. Each node contains two parts fields: the data and reference to the next node.

        72. Mention the types of linked lists 
      Ans: Singly linked list(SLL), Doubly linked list(DLL) and Circular linked list(CLL).

        73. What is garbage collection? 
      Ans: if a node is added from the linked list or if a linked list is deleted, we require the space to be available for future use. The memory space of the deleted nodes is immediately reinserted into the free storage list. The operating system of the computer periodically collects all the deleted space into the free-storage list. This technique of collecting deleted space into free-storage list is called as garbage collection.

        74. What is graph? 
      Ans: a graph is a collection of nodes called vertices and the connections between them called edges.

      75. List the types of graphs. 
      Ans: directed and undirected graphs.




BASIC CONCEPT OF OOP

        76. What are the basic concepts of OOPs? OR what are the major characteristics of OOPs? 
      Ans: - Objects      -Classes        -Data abstraction      -Data encapsulation
-          Inheritance      -Overloading      -Polymorphism      -Dynamic binding
-          Message passing.

        77. What is object? 
      Ans: object is an entity which has physical existence in the real world. An object is a collection of data members and associated member functions. Each object is identified by a unique name.

        78. What is class? 
      Ans: a class is a collection of object of similar type that share some common properties among them.

        79. What is data abstraction? 
      Ans: data abstraction permits the user to use an object without knowing its internal working.

        80. What do you mean by data encapsulation? 
      Ans: data encapsulation will prevent direct access to data. The data can be accessed only through functions present inside the class.

        81. What is inheritance? 
      Ans: inheritance is a process of acquiring properties from parent class to child class.

        82. What is overloading? 
      Ans: two or more functions having the same name but differ in the number of arguments or data type of arguments is called overloading.

        83. What is polymorphism? 
      Ans: a function can take multiple forms based on the type of arguments, number of arguments and data type of return value.

        84. What is Dynamic binding? 
      Ans: it is a process of connecting one program to another at the time of its execution is called dynamic binding.

     85. What is a base class? 
     Ans: the class that inherit its property to another class is called base class or parent class or super class.

      86.  What is a derived class? 
      Ans: a class that get inherited by the other class is called derived class or child class or sub class.

87. What is message passing? 
Ans: a message for an object is request for execution of procedure. Message passing involves specifying the name of object, name of the function and the information to be sent.

      88. What are the applications of OOP? 
      Ans: - Computer graphic applications.
- CAD/CAM software.
- Object oriented data base.
- User interface design such as windows.
- Real time systems.
- Simulation and modeling.
- Artificial intelligence and expert systems.






CLASSES AND OBJECTS

89. Write the syntax of class 
Ans: class class_name

{
private: data member;
            function member;
protected: data member;
            function member;
public: data member;
            function member;
};


90.What are the access specifiers? Mention their types 
Ans: access specifiers are the keywords in C++ that allows access permission of the members of the class.
There are three types of access specifiers
- private   -protected   -public.

91.Where member functions can be defined? 
Ans: member functions can be defined inside the class definition and outside the class definition using scope resolution operator (::).

92.What are the two types of members referenced in a class? 
Ans: data members and function members.

93.Which type of members is accessible outside the class? 
Ans: public.

94.Which access specifier is implicitly used in a class? 
Ans: private.

95.What is meant by an array of objects? 
Ans: it is a collection of object of same class type are called array of objects.




FUNCTION OVERLOADING AND MEMBER FUNCTIONS

        96. Mention the restrictions on overloaded functions 
      Ans: 

- each function in a set of overloaded function must have different argument list.
      - If typedef is used for naming functions, then the function is not considered as different type.

        97. What are inline functions? 
      Ans: inline function makes the compiler to replace a function call with the body of the function.

        98. What are the advantages of inline function? 
      Ans:  -They are compact function calls.
- The size of the object code is considerably reduced.
- The speed of the program execution increases.
- Efficient code can be generated.
- The readability of the program increases.


        99. What is the disadvantage of inline function? 
      Ans: as the body of inline function is substituted in place of a function call, the size of the executable file increases and more memory is needed.

        100. When inline function may not work? 
      Ans: inline function may not work when it is too long or complicated, when it is recursive, when it has looping constructs and when it has a switch or goto statements.

        101. What is friend function? 
      Ans: a friend function is a non-member function that is a friend of a class. The friend function is declared within a class with the prefix friend. This function is used to access private and protected members of the class.



CONSTRUCOTRS AND DESTRUCTORS

        102. What is a constructor? 
      Ans: constructor is a special member function used to initialize the data members of the class.

        103. What are the rules for writing constructors? 
      Ans: - A constructor name is same as that of the class name.
- There is no return type, not even void.
- A constructor should be declared in public section.
- A constructor is invoked automatically when objects are created.
- It is not possible to refer to the address of the constructors.
- The constructors make implicit calls to the operators new and delete when memory allocation is 
   required.


        104. Mention the types of constructors 
      Ans: - Default constructor.
- Parameterized constructor.
- Copy constructor.


        105. What are parameterized constructors? 
      Ans: a constructor that takes one or more arguments is called parameterized constructor.

        106. What is copy constructor? 
      Ans: A copy constructor in which one object can be copied to another object.

        107. What is destructor? 
      Ans: A destructor is a special member function that will be executed automatically when an object is destroyed. It is having same name as that of the class but preceded by a tilde (~).



INHERITANCE

        108. What are the advantages of inheritance? 
      Ans: - Reusing the existing code.
- Faster development time.
- Easy to maintain.
- Easy to extend.
- Memory utilization.


        109. Mention the types of inheritance 
      Ans: - Single inheritance.
- Multilevel inheritance.
- Multiple inheritance.
- Hierarchical inheritance.
- Hybrid inheritance.


        110. What are virtual base classes? 
      Ans: When two or more objects are derived from a common base class, we can prevent multiple copies of the base class being present in an object derived from those objects by declaring the base class as virtual when it is being inherited. Such a base class is known as virtual base class. This can be achieved by preceding the base class name with the word virtual.



 POINTER
        111. What is a pointer? 
      Ans: pointer is a special variable that hold the address of another variable.

        112. How do you declare and initialize pointer?
      Ans:

Declaration:
data type  *pointer_variable, common_variable_name;
Initialization:
Pointer_variable=Address_operator common_ variable_name;
Ex: int *ptr,a;
ptr=&a;


        113. What are the operators that are used with pointers? 
      Ans: - the address of operator (&) and pointer operator (*).

        114. What is memory leak? 
      Ans: if the objects that are allocated memory dynamically are not deleted using delete, the memory block remains occupied even at the end of the program. These memory blocks increase in number; bring adverse effect on the system. This situation is called memory leak.

        115. What is static memory? 
      Ans: it is a memory allocated to the variable during its declaration.

        116. What is dynamic memory? 
      Ans: it is a memory allocated to the variable during execution of a program.

        117. What is free store? 
      Ans: free store is a pool of unallocated memory heap given to a program that is used by the program for dynamic allocation during execution.



SQL COMMANDS

        118. What are DDL commands? 
      Ans: CREATE, ALTER AND DROP.

        119. What are DML commands? 
      Ans: INSERT, UPDATE AND DELETE.

        120. What are the operators used in SQL? 
      Ans: - Arithmetic operator.
- Comparison operator.
- Logical operator.
- Operators used to negate conditions.


        121. What is SQL primary key? 
      Ans: a column or combination of columns which uniquely identifies each row in the table.

        122. What is foreign key? OR what is referential integrity? 
      Ans: this constraint identifies any column referencing the primary key in another table.

        123. What is unique key? 
      Ans: this constraint ensures that a column or a group of columns in each row have a distinct value. A column(s) can have a null value but the values cannot be duplicated.

        124. What are DCL commands? 
      Ans: GRANT and REVOKE.

        125. Expand SQL 
      Ans: Structured Query Language.

        126. What is the use of commit and revoke command? 
      Ans: commit command is used to save the document permanently and it is used to save changes whereas revoke command is used to undone the changes made.


 
WEB DESIGNING
        127. Expand HTML. 
      Ans: HyperText Markup Language.

        128. Name any four tags. 
      Ans: <html>, <body>, <b>, <head>, <p>, <title> etc.

        129. What is web browser? 
      Ans: Web browser is application software that interprets the tags written in html.

        130. What are the types of listing? 
      Ans: Ordered List (<OL>) and Unordered List (<UL>).

        131. What is the tag used to get hyperlink? 
      Ans: Anchor tag <a>.

        132. How to write comment line in HTML? 
      Ans: <! Text here>.

        133. What is the extension of hypertext markup language file? 
      Ans: . (dot) html.

        134. What is XML? 
      Ans: eXtended Markup Langauage (XML) for documents containing structured information.

        135. What is DHTML? 
      Ans: Dynamic  HyperText Markup Language.

      136. Expand URL. 
      Ans: Uniform Resource Locator.

       137. Expand HTTP. 
       Ans: HyperText Tranfer Protocol.

 

2nd puc computer science notes karnataka pdf,2nd puc computer science study material,2nd puc important questions of computer science,2nd puc computer science viva questions,kar 2nd puc computer science viva questions,2nd puc computer science practical viva questions,karnataka 2nd puc computer science practical viva questions,2nd puc computer science chapter wise notes,2nd puc computer science important question with answers,2nd year puc computer science notes,2nd puc computer science chapter wise important questions,2nd puc computer science guide,2nd puc computer science important questions,second puc computer science important questions,puc 2nd year computer science notes, 2nd puc computer science boolean algebra notes, 2nd puc computer science classes and objects notes, 2nd puc computer science chapter 1, 2nd puc computer science chapter 4 notes, 2nd puc computer science data structure notes, 2nd puc computer science function overloading notes, passing package for 2nd puc computer science, 2nd puc computer science logic gates notes, 2nd puc computer science inheritance notes, 2nd puc computer science 1st chapter, 2nd puc computer science 1st chapter notes, 2nd puc computer science 1st chapter important questions,
2nd puc computer science notes pdf (1 mark questions and answers) 2nd puc computer science notes pdf (1 mark questions and answers) Reviewed by Vision Academy on November 10, 2019 Rating: 5

No comments:

CheckOut

Powered by Blogger.