INTERMEDIATE EXAMINATION – 2021 (ANNUAL) 328
Model Set
Computer Science
Time :- 3 Hours 15 minutes Full Mark - 70
le; % 3 ?kaVs 15 feuV iq.kkZad & 70
I.A., I.Sc. & I.Com. – (OPT)
Instructions for the candidate :-
1- ijh{kkFkhZ ;FkklaHko vius 'kCnksa esa gh mÙkj nsaA
Candidates are required to give their answer in their own words
as far as practicable.
2- nkfguh vksj gkf’k;s ij fn;s gq, vad iw.kkZad fufnZ"V djrs gSaA
Figures in the right hand margin indicate full marks.
3- bl i= dks /;kuiwoZd i<+us ds fy, 15 feuV dk vfrfjDr le; fn;k x;k
gSA
15 minutes of extra time has been allotted for the candidate to
read the questions carefully.
4- ;g iz’u&i= rhu [k.Mksa esa gS] ,oa
This question paper has three sections : Section-A, Section-B
and Section-C.
5- [k.M&v esa 70 oLrqfu"B iz’u gSa] buesa ls fdlh 35 iz’u dk mÙkj nsa] 35 ls
vf/kd mÙkj nsus dh fLFkfr esa dsoy izFke 35 mÙkj dk gh ewY;kadu fd;k
tk,xkA ¼izR;sd ds fy, 1 vad fu/kkZfjr gS½ budk mÙkj miyC/k djk;s x;s
OMR&mÙkj i=d esa fn;s x;s lgh o`Ùk dks dkys@uhys ckWy isu ls HkjsaA
fdlh Hkh izdkj ds OgkbVuj@rjy inkFkZ@CysM@uk[kwu vkfn dk OMR
’khV esa iz;ksx djuk euk gS] vU;Fkk ijh{kk ifj.kke vekU; gksxkA
1
In Section-A, there are 70 objective type questions in which 35
questions are to be answered. In case of more than 35 answers,
only first 35 will be evaluated. Each carrying 1 marks. Darken
the circle with black/blue ball pen against the correct option on
OMR Sheet provided to you. Do not use
Whitener/Liquid/Blade/Nail on OMR Sheet, otherwise the result
will be treated as invalid.
6- [k.M&c esa 20 y?kqmÙkjh; iz’u gSaA ¼izR;sd ds fy, 2 vad fu/kkZfjr gS½ ftuesa
ls fdUgha 10 iz’uksa ds mÙkj nsaA
In Section-B, there are 20 Short answer type questions (Each
carrying 2 marks), out of which any 10 questions are to be
answered.
7- esa 06 nh?kZ mÙkjh; iz’u fn, x, gSaA ¼izR;sd iz’u ds fy, 05 vad
fu/kkZfjr gSa½] ftuesa ls fdUgha 3 iz’uksa ds mÙkj nsaA
In Section-C, there are 6 Long answer type questions (Each
question carries 5 marks). Out-of which any 3 questions are to
be answered
8- fdlh rjg ds bysDVªkWfud&;a= dk mi;ksx oftZr gSA
Use of any electronic device is prohibited.
iz'u la[;k 1 ls 70 esa pkj fodYi fn, x;s gSa] ftuesa ls dsoy ,d lgh gSA
vkidks OMR&’khV ij p;fur fodYi dks fpfUgr djuk gksxkA fdlh Hkh 35 lokyksa ds
tokc nsaA
Question Nos.- 1 to 70 have four options, out of which only one is
correct. You have to mark selected option, on OMR Sheet. Answer any 35
questions.
1. Which one is not a Data Structure?
2
dkSu&lk MsVk lajpuk ugha gS \
A. Queue B. Tree
C. Clrscr ( ) D. Stack
2. getch ( ) is a/an
getch ( ) ,d ------------- gS
A. Input function B. output function
C. variable D. data type
3. float is a/an
float ,d ------------ gS
A. function B. operator
C. constant D. data type
4. String.h is a/an
String.h ,d ------------- gSA
A. data file B. header file
C. linker D. program block
5. Which one is a DCL command ?
dkSu lk DCL dek.M gS \
A. Roll back B. Insert
3
C. Create D. Update
6. Arrays may be defined with …………
Array………… ds lkFk ifjHkkf"kr fd;k tk ldrk gS
A. Only columns B. Only rows
C. Only one cell D. Both columns and rows
7. Which one is an output function for stack?
LVSd ds fy, dkSu lk vkmViqV QaD’ku gSA
A. POP B. PUSH
C. Binary D. Traversal
8. Changing data type in run time mean ?
ju Vkbe esa MsVk Vkbi cnyus dk vFkZ gS \
A. Summarization B. Elimination
C. hiding D. Casting
9. Functions is a feature of ……………..
Functions ………….. dk ,d fo’ks"krk gS
A. Procedural programming
B. SQL
4
C. Non Procedural Programming
D. Object oriented Programming
10. Classes are source of ……………
d{kk,a ----------------- ds L=ksr gSa \
A. Design of object B. Creation of object
C. instances of object D. Not related with object
11. Identify the incorrect option.
xyr fodYi dks igpkusaA
A. < = size of (bool) < = size of (long)
B. size of (float) < = size of (double) < = size of (long double)
C. size of (char) < = size of (long) < = size of (Wchar-t)
D. size of (N) = size of (signed N) = size of (unsigned N)
12. Base of binary number system is ?
ckbujh uacj flLVe dk vk/kkj gS \
A. 10 B. 8
C. 2 D. 16
13. In Boolean variable A.A represent …………..
5
cqfy;u pj esa A.A …………. dk izfrfuf/kRo djrs gSa \
A. A B. A2
C. 2A D. 1
14. Which one is not a DCL command in SQL ?
SQL esa dkSu lk DCL dekaM ugha gS \
A. REVOKE B. COMMIT
C. DELETE D. GRANT
15. Which of the following SQL command used to change data?
fuEu SQL dek.M ls dkSu MsVk dks cnyus ds fy;s mi;ksx fd;k tkrk gS\
A. CREATE B. INSERT
C. SELECT D. UPDATE
16. Which of the following is valid computer network device?
fuEufyf[kr esa ls dkSu lk ekU; daI;wVj usVodZ fMokbl gS \
A. LAN B. NIC
C. WWW D. MAN
17. Which of the following will not return a value ?
6
fuEufyf[kr esa ls dkSu ,d ewY; okil ugha djsxk \
A. null B. void
C. empty D. free
18. Which of the following is a valid computer network application?
fuEufyf[kr esa ls dkSu lk ekU; daI;wVj usVodZ ,fIyds’ku gS \
A. BUS B. HUB
C. email D. NIC
19. Long is a/an ……….. ?
Long ,d -------------------- gS \
A. Built in data type B. Constant
C. Derived data type D. Variable
20. Queue is a …………… ?
drkj ,d ----------------- gS \
A. Derive data type B. function
C. header file D. Data Structure
21. In which type do the enumerators are stored by the compiler ?
7
dEikbyj fdl izdkj ds ,U;wejsVlZ dks LVksj djrs gSa \
A. String B. Integer
C. Float D. String & float
22. OOP is based on ?
OOP fdl ij vk/kkfjr gS \
A. Program & Process B. Function and Data
C. File and Disk D. Input and Output
23. Pointer is a ?
lwpd ,d ---------------------- gS \
A. Variable
B. Method
C. Data
D. Design of data and methods
24. SOP stands for ?
SOP dk vFkZ gS
A. Sum of Product B. Same on Product
C. soft on Process D. Sample of Program
8
25. Domain value is ………….?
Mksesu ewY; gS ------------------
A. Data type B. Data under column
C. Attribute Name D. Entity Name
26. POP is a …………
POP ,d ----------------- gS \
A. Device B. Function
C. Topology D. Language
27. GSM is related with …………..
th,l,e ---------------------- ls lacaf/kr gS
A. Computer Network B. Computing System
C. Mobile system D. Internet
28. Tera byte (TB) is unit of measurement for ?
Vsjk ckbV ¼Vhch½ fdldh eki dh bdkbZ gS \
A. Light waves B. Speed of air craft
C. Computer’s memory D. Band width
29. Typedef is a/an ?
9
Typedef ,d -------------- gS \
A. Keyword B. Constant
C. Variable D. Array name
30. Information security is related with ………… ?
lwpuk lqj{kk ----------------- ls lacaf/kr gS A
A. Hardware Protection
B. Server Protection
C. Internet access Protection
D. Online Fraud & Crime Control
31. SUM() function returns?
SUM() QaD’ku fjVuZ nsrk gS \
A. Highest value B. Lowest value
C. Addition of Number D. Positive value
32. Preprocessor begins with character …………
izhizkslslj izrhd ----------------- ls 'kq: gksrk gSA
A. # B. /
C. * D. +
10
33. GROUP BY clause helps to ……….. the table data.
xzqi ck; DykWt Vscy MsVk ------------- esa enn djrk gSA
A. Summarize B. Sort
C. Group D. List
34. LED monitor is a/an ?
,ybZMh ekWfuVj ,d -------------- gS \
A. Input device B. Output device
C. Memory unit D. Processing unit
35. WLL stands for ?
WLL dk eryc gS \
A. Wireless Low Level B. Wireless Lowest Loop
C. Wireless Local Loop D. Wireless Local Line
36. To which of these enumerators can be assigned ?
buesa ls fdls ,U;wejsVj dks lkSaik tk ldrk gS \
A. integer B. negative
C. enumerator D. all of the mentioned
11
37. Can two functions declare variables (non static) with the same
name ?
D;k nks function ,d gh uke ds lkFk pj ¼xSj fLFkj½ ?kksf"kr dj ldrs gSa \
A. No
B. Yes
C. Yes, but not a very efficient way to write programs
D. No, it gives a runtime error.
38. The operator used for dereferencing or indirection is ……….
De-referencing ;k Indirection ds fy;s mi;ksx gksus okys vijsVj gS --------
A. * B. &
C. - > D. - > >
39. Which one of the following is not a possible state for a pointer ?
fuEu esa ls dkSu ,d ikWbaVj ds fy, ,d laHkkfor fLFkfr ugha gS \
A. hold the address of the specific object
B. point one post of the end of an object
C. zero
D. point to a type
12
40. Which of the following is illegal ?
fuEufyf[kr esa ls dkSu voS/k gS \
A. int*ip; B. string s, *sp=0;
C. int I; double*dp=&I; D. int*pi=0;
41. What is the index number of the last element of an array with 73
elements ?
73 rÙoksa ds lkFk ,d lj.kh ds vafre rÙo dh lwpdkad la[;k D;k gS \
A. 71 B. 72
C. 73 D. Programmer-defined
42. How are the constants declared ?
fLFkjkad dSls ?kksf"kr fd, tkrs gSa \
A. Const Keyword
B. # define preprocessor
C. both const Keyword and # define preprocessor
D. S define
43. The ………….. mode tells C++ to open a file for input
-------------- eksM buiqV ds fy, ,d Qkby [kksyus ds fy, C++ dks crkrk gSA
13
A. add::ios B. in::file
C. ios::app D. ios::in
44. Using the wardrobe structure within the ShopList structure is an
example of a good programming principle, known as ………..
ShopList lajpuk ds Hkhrj vyekjh lajpuk dk mi;ksx djuk ,d vPNk
izksxzkfeax fl)kar dk ,d mnkgj.k gS] ftls ---------------- ds :Ik esa tkuk tkrk
gSA
A. reusability B. polymorphism
C. redundancy D. recursion
45. When you omit parameter from a function call, value can be
provided by.
tc vki fdlh QaD’ku dkWy ls iSjkehVj dks gVkrs gSa] rks eku -------------- ds
}kjk iznku fd;s tk ldrs gSaA
A. Formal Parameters B. reference parameters
C. Overloaded parameters D. default parameters
46. The first element in a string is
,d fLVªax esa igyk rÙo gSA
A. the name of the string
14
B. the first character in the string
C. the length of the string
D. the name of the array holding the string
47. Variable declared outside a block are called …………
fdlh CykWd ds ckgj ?kksf"kr pj dks -------------- dgk tkrk gS
A. global B. universal
C. stellar D. external
48. The compiler converts your C++ instructions into ………….
ladyu vkids C++ funsZ’kksa dks ------------- esa ifjofrZr djrk gSA
A. edited code B. object code
C. source code D. translated code
49. A fundamental data type such as int or double is a …………
,d ekSfyd MkVk izdkj tSls baV ;k Mcy ------------- gS
A. programmer-defined type B. complex type
C. nonscalar type D. scalar type
50. The returns type you code for all constructors is …………….
lHkh daLVªDVlZ ds fy, vkids }kjk fn;k x;k fjVuZ izdkj ------------- gS
15
A. Void
B. the class type
C. the same type as the first data number defined in the class
D. no type
51. When an object-oriented program detects on error within a
function, the function …..........
tc dksbZ vkWCtsDV&vksfj,aVsM izksxzke fdlh QaD’ku ds Hkhrj ,d =qfV dk irk
yxkrk gS] rks QaD’ku -----------------
A. throws an exception B. throws a fit
C. catches a message D. catches an exception
52. Using a statement at the wrong time or with an inappropriate
object creates a ……………..
xyr le; ij ;k vuqfpr oLrq ds lkFk dFku dk mi;ksx djuk ,d -------------
cukrk gSA
A. logical error B. syntax error
C. compiler error D. language error
53. When you create a derived class and instantiate an object then
………
16
tc vki ,d O;qRiUu oxZ cukrs gSa vkSj fdlh oLrq dks object Rofjr djrs gSa
rks -----------------
A. the parent class object must be constructed first.
B. the child class object must be constructed first.
C. the parent class object must not be constructed.
D. the child class object must not be constructed.
54. A normal C++ operator that acts in special ways on newly
defined data types is said to be …………….
,d lkekU; C++ vkWijsVj tks u, ifjHkkf"kr MsVk izdkjksa ij fo’ks"k rjhds ls
dk;Z djrk gS] dgk tkrk gS -----------------------
A. glorified B. en capsulated
C. classified D. overloaded
55. A function in a derived class that has the same name as a
function in the parent class, then it will …………….
,d O;qRiUu oxZ esa ,d QaD’ku ftldk ewy oxZ esa QaD’ku ds leku uke gS
rks ;g ---------------------
A. will override the base class function.
B. will cause an error message to display.
17
C. will be overridden by the base class function.
D. will execute immediately often the base class function
executes.
56. A constructor always has
,d daLVªDVj ges’kk gksrk gS
A. communicational cohesion B. temporal cohesion
C. logical cohesion D. no cohesion
57. Binary trees with threads are called as ………….
/kkxs ds lkFk ckbujh isM+ksa dks ----------------- dgk tkrk gSA
A. Special trees B. Pointer trees
C. Threaded trees D. None of the above
58. In Binary trees nodes with no successor are called ………..
fcuk mÙkjkf/kdkjh okys ckbujh Vªh uksM~l dgykrs gSa ---------------
A. End nodes B. Final nodes
C. Last nodes D. Terminal nodes
59. Every node N in a binary tree T except the root has a unique
parent called the ………….. of N.
18
,d ckbujh Vªh Vh esa izR;sd uksM ,u esa tM+ dks NksM+dj ,d vf}rh;
ekrk&firk gksrs gSa ftUgsa ,u dk --------------- dgk tkrk gSA
A. Predecessor B. Antecedents
C. Precursor D. None of the above
60. The in order traversal of tree will yield a sorted listing of
elements of tree is …………
vkns'k esa isM+ ¼in order tree) ds traversal esa isM+ ds rÙoksa dh ,d Øec)
lwph dk mRiknu gksxk ------------------- A
A. Merging B. AVL Trees
C. Binary trees D. Binary search trees
61. The post order traversal of a binary tree is DEBFCA. Find out
the pre order traversal.
,d ckbujh Vªh dk iksLV vkWMZj VªS olZy DEBFCA gSA iwoZ ds vkns’k ¼Pre
order Traversal) dk irk yxk,aA
A. ABFCDE B. ADBFEC
C. ABDECF D. ABDCEF
62. A technique for direct search is
izR;{k [kkst dh ,d rduhd gS
19
A. Hashing B. Tree search
C. Binary search D. Linear search
63. A full binary tree with 2n + 1 nodes contain.
2 ,u $ 1 uksM~l ds lkFk ,d iw.kZ ckbujh Vªh esa gksrk gS
A. n leaf nodes B. n non-leaf nodes
C. n-1 leaf nodes D. n-1 non-leaf nodes
64. To include integrity constraint in an existing relation use :
ekStwnk laca/k mi;ksx esa v[kaMrk ck/kk 'kkfey djus ds fy, %
A. Modify table B. Drop table
C. Alter table D. Create table
65. Which of the following is not an integrity constraint ?
fuEufyf[kr esa ls dkSu lk v[kaMrk ck/kk ugha gS \
A. Not null B. Positive
C. Unique D. Check predicate
66. When grouping cells within a K-map, the cells must be
combined in groups of ……………..
20
tc K &ekufp= ds Hkhrj dksf’kdkvksa dks lewghd`r fd;k tkrk gS] rks
dksf’kdkvksa dks ------------ ds lewgksa esa tksM+k tkuk pkfg,A
A. 2s B. 1, 2, 4, 8, etc.
C. 4s D. 3s
67. The NAND or NOR gates are referred to as “universal” gates
because any one :
NAND ;k NOR xsV~l dks ^^lkoZHkkSfed** xsV ds :Ik esa tkuk tkrk gS]
D;ksafd dksbZ Hkh %
A. can be found in almost all digital circuits.
B. can be used to build all the other types of gates.
C. are used in all countries.
D. were the first gates to be integrated.
68. Why IP protocol is considered as unreliable ?
vkbZih izksVksdkWy dks vfo’oluh; D;ksa ekuk tkrk gS \
A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be erated
21
D. All of the above
69. What is www.mail.yahoo.com
www.mail.yahoo.com D;k gS \
A. A file B. A network
C. A topoloty D. An email service
70. What is the full form of RAID ?
RAID dk iw.kZ :Ik D;k gS \
A. Redundant Array of Independent Disks.
B. Redundant Array of Important Disks.
C. Random Access of Independent Disks.
D. Random Access of Important Disks.
Section-B (Non-Objective Type Quesitons)
Short Answer Type Questions
iz’u la[;k 1 ls 20 rd y?kq mÙkjh; gSaA ftuesa ls fdUgha 10 iz’uksa ds mÙkj nsuk gSA
izR;sd iz’u ds fy, 2 vad fu/kkZfjr gSaA
Question no. 1 to 20 are Short answer type. Answer any 10 questions.
Each question carries 2 marks.
22
1. Define Data member of a class.
,d oxZ ds MsVk lnL; dks ifjHkkf"kr djsaA
2. Define source and object program.
L=ksr vkSj oLrq dk;ZØe dks ifjHkkf"kr djsaA
3. Write the use of structure variable.
lajpuk pj dk mi;ksx fy[ksaA
4. Explain INFIX conversion.
INFIX :ikarj.k dh O;k[;k djsaA
5. Explain circular array.
Circular lj.kh dh O;k[;k djsaA
6. Explain entity and attribute.
bZuVhVh ,VªhC;wV dh O;k[;k djsaA
7. Explain entity constraint.
Entity ck/kk dks Li"V djsaA
8. Define Network switching.
usVodZ fLofpax dks ifjHkkf"kr djsaA
9. What is transmission mode ?
VªkaLfe’ku eksM D;k gS \
10. Explain Boolean operator.
cqfy;u vkWijsVj dks le>k,¡A
11. Explain tautology.
VkWVksykWth dks le>kb,A
12. Explain data types of C++.
23
Lh $$ ds MsVk izdkjksa dh O;k[;k djsaA
13. Explain control structures of C++.
lh$$ dh fu;a=.k lajpukvksa dh O;k[;k djsaA
14. What is database ?
MsVkcsl D;k gS \
15. Describe super class & sub class.
lqij Dykl vkSj lc Dykl dk o.kZu djsaA
16. What is structure of C++ program ?
C++ izksxzke dh lajpuk D;k gS \
17. Describe difference between Declaration and Definition of a
variable.
,d pj dh ?kks"k.kk vkSj ifjHkk"kk ds chp varj crk,saA
18. What are the comments in C++ ?
C++ esa fVIifu;k¡ D;k gS\
19. Explain formatted I/O.
Formatted I/O le>k,¡A
20. Explain C++ stream classes.
C++ LVªhe d{kk,¡ le>k,¡A
Long Answer Type Questions
iz’u la[;k 21 ls 26 rd nh?kZ mÙkjh; gSaA buesa ls fdUgha 3 iz’uksa ds mÙkj nsuk gSA
izR;sd iz’u ds fy, 5 vad fu/kkZfjr gSaA
Question no. 21 to 26 are Long answer type. Answer any 3 questions.
Each question carries 5 marks.
21. Define linked list and show its implemention using a C++
program.
24
fyad dh xbZ lwph dks ifjHkkf"kr djssa vkSj C++ izksxzke dk mi;ksx djds
blds dk;kZUo;u dks fn[kk,aA
22. Write a C++ program to accept a word then check and display
that given word is a palindrome or not.
fdlh 'kCn dks Lohdkj djus ds fy, C++ izksxzke fy[ksa fQj psd djsa vkSj
iznf’kZr djsa fd fn;k x;k 'kCn palindrome gS ;k ugha
23. Write a program in C++ to accept a number then display how
many digits it contains and the sum of its digits. (e.g. 345
contains 3 digits and sum is 12)
,d la[;k dks Lohdkj djus ds fy, C++ esa ,d dk;ZØe fy[ksa] fQj blesa
lfEefyr vad dks iznf’kZr djsa vkSj blds vadks dks sum djsa ¼mnkgj.k 245
esa 3 vad vkSj ;ksx 12 gS½
24. Write an object oriented programe in C++ to generate and
display prime number between 1 to 51.
1 ls 51 ds chp izkbe uacj cukus vkSj iznf’kZr djus ds fy, ,d vkWCtsDV
vksfj,aVsM izksxzke fy[ksa A
25. Write an object oriented program in C++ to demonstrate method
over loading.
Method over yksM djus dh fof/k iznf’kZr djus ds fy, C++ esa vkWCtsDV
vksfj,aVsM izksxzke fy[ksaA
26. Write a progema in C++ to calculate monthly earning of
employee by accepting rate per day and number of working
days. Display the amount for three employees.
nj@fnu vkSj dk;Z fnolksa dh la[;k dks Lohdkj djds deZpkjh dh ekfld
dekbZ dh x.kuk djus ds fy, C++ esa ,d dk;ZØe fy[ksa] rhu deZpkfj;ksa
ds fy, jk’fk iznf’kZr djsa
25
26