0% found this document useful (0 votes)
34 views2 pages

11th Computer Science Half Yearly QP EM Thanjavur

Uploaded by

santhiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views2 pages

11th Computer Science Half Yearly QP EM Thanjavur

Uploaded by

santhiya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

https://www.kalvikadal.in 2022 https://material.kalvikadal.

in
EXAMINATION-
YEARLY
HTJ HALF COMPUTER SCIENCE
MARKS: 70
CLASS:11

TIME 3 . 0 0 Hrs
If there is any
for fairness of printing.
Instructions: 1. Check
the Question paper Blue or Black ink to.
immediately. 2. Use
Hall Supervisor
lack of fairness, inform the
to draw diagrams.
u n d e r l i n e and pencil
write and PART-I 15
15 X1
Choose the best answer.

used IC's?
Which generation
of computer c) Third
d) Fourth
1. b) Second
a) First
combination of?
NOR is a
c) NOT(NOT) d) NOT(NOR)
b) NOT(AND)
a) NOT(OR)
memory?
B. Which is the fastest Cache memory d) Blue-Ray disc
a) Hard disk
b) Main memory c)
used by Linux is
The File management system d) NFTS
.
b) NTES c) FAT
3) ext2
to rename a file in windowS
. The shortcut key used d) F6
c) FS
) F2 b)F4
the loop is iterated?

n
. How many times

l.i
i:=0
while i #5
I: = 1 + 1

a) 4 b) 5
da
6 d) o

extraction operator in C++?


the following operator is
ka
Which of
a) >> D)<< c) d)
Which of the following is the exit control loop?
vi

8.
c) do...while d) if...else
a) for b)whilee
al

to reference of a variable?
9. Which operator is used access

a) S b) c) & d)!
.k

10. Which of the following is the scope operator?


d)
w

a) > b)& c)%%


11. int age[]= (6,90,20,18,2); How many elements are there in this array?
w

b) 5 c) 6 d) 4
12.
a)2
Which of the following is a user defined data type?
w

a) class b) float c)int d) object


The member function defined within the class behave like... functions.
13.
a) Inline b) Non inline c)Outline d) Data
14. Which of the following is not a malicious program on computer systems?
a) wormsS b) Trojans c) spyware d) cookies
15. Expand ISCII
a) Indian Software Code for Information Interchange
b) Indian Script Code for Information interchang
c) Infonet Software Code for internet information
d) Indian Software Code for information Information
PART I I
II 6 questions. compulsory) 6X 2 12
16.
Answer any
What are the components of a CPU?
(Q.No.19
17. What is HDMI?
18. Differentiate Save and save As option.?
19. Why is function an abstraction?
20. Write a short note on const keyword with an example?

HTJ 11 EM 66T0lcof Aleuso PAGE


Please send your Materials & Question Papers to kalvikadal.in@gmail.com (or) Whatsapp - 9385336929.
https://www.kalvikadal.in https://material.kalvikadal.in

21. What are importance of void data type.


22. Differentiate classes and objects.
23. List the operators that cannot be overloaded
24. List the search engines Supported by Tamil language.

III Answer any 6 question. (Q.No. 30 Compulsory).


PART-III 6 x3 = 18
25. Write the truth table of fundamental gates?
26. List out the key features of Operating system?
27. What is the difference between assignment operator and equality operator?
28. What is recursive problem solving?
29. Define an What
Array? are the types?
30. What are advantages of declaring constructors and destructor under public accessability?
31. What is difference between the members present in the private visibility mode and the
members present in public visibility mode?
32. Write about encryption and decryption?
Write the syntax and purpose of
33.
switch statement?
PART IV
Answer the following qustions. 5x5 225
34. Discuss the various generations of computers.(OR)
a) Add 11010112+ 10110012. b) Subtract 11010012-1110112

n
35. Explain the characteristics of a microprocessor? (OR)
Write the procedure to create shortcut in Windows OS?

l.i
36. Explain the different types of inheritance. (OR) What is an entry control loop? Explain

37.
any one of the entry controlled loop with suitable example.
Explain scope of variable with example. da
(OR)
ka
Write the output of the following C++ program.
#include<iostream>
vi

#include<stdio>
#include <string>
al

#include<conio>
.k

using namespace std;


_truct books {
w

char name[20], author[20];


a(50);
w

int main)
w

cout< "Details of Book No "<< 1«« "\n";

COute ..\n
coute "Book Name "cstrcpyla[0].name, "Programming) sendl;
cout« "Book Author:"<strcpyla[0] author, "Dromy")<<endi;
coutee"nDetails of Book No "< 2 *< "\n";
coutee "Book Name
"<<strcpylal1].name, "C++programming")scendl;
cout< "Book Author :"<<strcpy(a[1].author, "BjarneStroustrup "<<endl;
coute"\n\n";
COutcE .. ************************ ***********
.n
coute<"S.No\t Book Name\t|author\n";
Coutce ************************************* ************

.\n
for (int i=0; i<2; i++)
cout"\n"<<<i+1 <<"\t" «
al[i).name << "\t" <<
a[i|.author
cout<"\n-
**************************************.** ***********************
return 0

What are the rules for operator overloading?(OR)


38.
differences between constructor and destructor
Mention the
HT
11 EM ssoie
Please send your Materials & Question Papers to kalvikadal.in@gmail.com Sfleiuo
(or) Whatsapp - 9385336929.PAGE-2

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy