Wednesday, April 27, 2022

Class 12 computer science paper solve of Oxford Secondary School by Tukus Technology

 Class 12 computer science 2079 paper solutions of Oxford Secondary School by Tukus Technology 

                                    GROUP ‘ A ’

Multiple Choice Questions

1 . Which of the following is correct format for declaration of function ?

     a . return-type function-name(argument type);

     b . return-type function-name(argument type){

     c . return-type (argument type)function name;

     d . all of the mentioned

2 . What is the basic characteristics of WAN ?

     a . Simple and Mostly Private                b . Complex and Mostly Private

     c . Simple and Mostly Public                  d . Complex and Mostly Public

3 . ……………. of the system gives long life to the new system .

     a . Implementation                                  b . Maintenance

     c . Testing                                                  d . None of the above

4 . Which keyword is use to declare variable in JavaScript ?

     a . var                                                           b . $

     c . let                                                            c . int

5 . With SQL, how do you select all the records from a table named “Persons”   where the value of the column “First Name” ends with an “b” ?

     a . SELECT * FROM Persons WHERE FirstName = ‘b’ 

     b . SELECT * FROM Persons WHERE FirstName LIKE‘b%’

     c . SELECT * FROM Persons WHERE FirstName LIKE‘%b’ 

     d . SELECT * FROM Persons WHERE FirstName LIKE‘%b%’

6 . CREATE TABLE employee (name VARCHAR , id INTEGER ) What type of statement is this ?

     a . DML                                                                         b . DDL

     c . View                                                                         e.Integrity constraint

7. Which is an unguided transmission media ?

     a . Co-axial Cable                                                         b . Satellite

     c . STP                                                                             d . Fiber optic

8 . Artificial Intelligence is about ……….. .

     a . Playing a game on Computer

     b . Making a machine Intelligent

     c . Programming on Machine with your own Intelligence

     d . Putting your intelligence in Machine

9 . Which of the following statement is not a type of lopping statement ?

      a . do while           b . for        c . switch case         d . while

 

 

                                                  GROUP ‘ B’

    Give short answers of any five questions .

1 ) What is client side scripting ? Write a program to find product of two number using POST method in PHP .

Answers :

A client-side scripting is a program that is processed within the client browser which scripting are small programs which are downloaded, compiled and run by the browser. Client side scripting , like JavaScript, can be embedded into the page on the client’s browser. This script will allow the client’s browser to alleviate some of the burden on your web server when running a web application. Client-side scripting is source code that is executed on the client’s browser instead of the web-server, and allows for the creation of faster and more responsive web applications. Examples : JavaScript , Python , Dart ,etc.

Now at first writing code in Kshitiz.html page

<html>

<head>

<title>PHP Program To calculate Multiplication and Division of two numbers</title>

</head>

<body>

<form method="post" action = “Kshitiz.php”>

<table border="0">

<tr>

<td><input type="text" name="num1" value="" placeholder="Enter a value"/></td>

</tr>

<tr>

<td><input type="text" name="num2" value="" placeholder="Enter b value"/></td>

</tr>

<tr>

<td><input type="submit" name="submit" value="Submit"/></td>

</tr>

</table>

</form>

</body>

</html>          

Now html is closed then we need to start php code in Kshitiz.php which is linked in Kshitiz.html

<?php

if(isset($_POST['submit']))

{

$a = $_POST['num1'];

$b = $_POST['num2'];

$mul = $a * $b;

echo "Multiplication of two numbers : $a * $b = ".$mul;

}

?>


2 ) What is recursive function ? WAP a program to find factorial of given number using recursive function .

Answers:

                A recursive function is a function that calls itself during its execution. The process may repeat several times, outputting the result and the end of each iteration.

Program to find the factorial of given number using recursive function is shown below :

#include<stdio.h>

 int main()

 {

            int num ,fact;

            printf("\n Enter a number : ");

            scanf("%d",&num);

            fact=factorial(num);

            printf("\n factorial of %d = %d",num,fact);

           

            return 0;

 }

 

 int factorial(int num)

 {

            int fact;

            if(num==1)

             {

                        return 1;

             }

             else

             {

                        fact=num*factorial(num-1);

                        return fact;

             }

 }


3) Write a program to find sum of given ‘n’ numbers in array using function

Answers:

               #include <stdio.h>

 #include <conio.h>

 

 int sumofarray(int a[],int n)

 {

            int i,sum=0;

 

    for(i=0; i<n; i++)

    {

         sum+=a[i];

        

    }

            return sum;

 }

int main()

{

    int a[1000],i,n,sum;

  

    printf("Enter size of the array : ");

    scanf("%d", &n);

 

    printf("Enter elements in array : ");

    for(i=0; i<n; i++)

    {

        scanf("%d",&a[i]);

    }

 

    sum=sumofarray(a,n);

    printf("sum of array is :%d",sum);

}

4 ) Explain the types of communication mode ?

Answers :

                  The mechanism of transferring of data between two devices connected over a network is called Communication Mode. These modes direct the direction of flow of information. There are three types of transmission modes.

They are: 1. Simplex Mode 2. Half duplex Mode 3. Full duplex Mode

a)Simplex Mode:

In simplex transmission mode, the communication between sender and receiver occurs in only one direction. The sender can only send the data, and the receiver can only receive the data. The receiver cannot reply to the sender. Simplex transmission can be thought of as a one-way road in which the traffic travels only in one direction—no vehicle coming from the opposite direction is allowed to drive through. To take a keyboard / monitor relationship as an example, the keyboard can only send the input to the monitor, and the monitor can only receive the input and display it on the screen. The monitor cannot reply, or send any feedback, to the keyboard.

 

b ) Half duplex Mode :

The communication between sender and receiver occurs in both directions in half duplex transmission, but only one at a time. The sender and receiver can both send and receive the information, but only one is allowed to send at any given time. Half duplex is still considered a one-way road, in which a vehicle traveling in the opposite direction of the traffic has to wait till the road is empty before it can pass through. For example, in walkie-talkies, the speakers at both ends can speak, but they have to speak one by one. They cannot speak simultaneously.

3) Full duplex Mode :

In full duplex transmission mode, the communication between sender and receiver can occur simultaneously. The sender and receiver can both transmit and receive at the same time. Full duplex transmission mode is like a two-way road, in which traffic can flow in both directions at the same time. For example, in a telephone conversation, two people communicate, and both are free to speak and listen at the same time.

 

 

 

5 ) What is network architecture ? Explain different types of network architecture.

Answers :

                  Network architecture refers to how computers are organized in a system and how tasks are allocated between these computers. Two of the most widely used types of network architecture are peer-to-peer and client/server. Client/server architecture is also called 'tiered' because it uses multiple levels .

Network architecture are of two types they are :

a) Peer-to-peer:

These type of network architecture in which all the computers in a network are connected with each other having equal access  and responsibility are known as peer -to-peer network. In this type of network architecture there is no presence of main computer that is server which provides services  to the network. All the jobs and task are carried out by themselves without having authority from other computer. Hence, they are known as peers. Each computer in a network behave itself as a client as well as server. This type of architecture can be used to small work group where security may not be of greater issue .

2) Client server: 

Unlike peer to peer Network, client server architecture has the main computer called server which control and monitors all the computers or client in a network.The server always provides services to the client .In this type of architecture client cannot carry out any operation without the authority of server. Server act as a central computer in a network. Due to presence of server this type of architecture is much more secure.The data and application program are stored on powerful centrally located server.Each workstation or client on the network shares the resources of the server computer. The server computer is high capacity, high speed and large memory capacity. In this architecture user having client computer can access server only when he/she has right to do so. That means , unauthorized person cannot access the server. On this network the client have to request the server for the the data instead of carrying out by themselves.

 

6 ) Define concept of mobile computing and cloud computing .

Answer :

                Cloud computing is the delivery of on-demand computing services over the internet on a pay-as-you-go basis. To put it in simple terms, cloud computing allows you to manage files and services over the internet with remote servers rather than a local server or personal computer.

Mobile computing refers to different devices that allow people to access data and information from any location. Mobile computing carries data, voice, and video over a network through a mobile device. These devices rely on a core operating system which supports various software applications.

Like a filing cabinet with everything out of order, disorganized digital systems can be incredibly frustrating. A cloud computing system keeps your system organized and helps you effectively locate items.

In our fast-paced digital world, mobile computing provides a lot of benefits. Mobile computing facilitates digital communication on the go. It connects people to needed information at all times, all over the globe. Just as with cloud computing, it’s important to keep your company mobile devices safe to ensure that the data shared and stored on them doesn’t get lost or stolen. Information security services for your business’s mobile devices can protect your data from threat actors.

Moving to cloud computing might reduce the cost of managing and maintaining your IT systems. Instead of purchasing expensive systems and equipment for your business, you can reduce costs with the resources of a cloud computing service provider. With a cloud computing service, you only pay for what you need. You can scale your storage up or down based on your needs. By taking advantage of a cloud service provider, you’re saving space on your own server. Cloud service providers are typically more secure than a local server or your own personal computer. Therefore, cloud computing helps protect your company’s sensitive data from being corrupted or lost. 

Cloud computing allows us to store and organize our data and information, whereas mobile computing provides access to data and information through a mobile device. Understanding the roles and security of each allows us to optimize our data use and take advantage of resources that streamline and organize that process.

 

7 ) What is Normalization ? What are 1NF and 2NF normalization principle in Database ?

Answers :

The process of breaking down or decomposing as complex relation into simple relation is called normalization . It reduces redundancy (unnecessary repetition of data) using principle of non-loss decomposition in which table are reduce to smaller tables without loss of information.

There are three normalization principle in database they are : 1NF , 2NF and 3NF

A) 1NF ( First Normal form)

1NF sets the very basic rules for on organized database.It eliminates duplicate columns from the same table.It creates separate tables from each group of related data and identify each row with a unique column called primary key.The objective of 1NF is to divide the base datas into logical units called tables.

Name

Roll

Class

Sub_name

Sub_marks

Sub_name

Sub_marks

Ram

1

11

Computer

95

Account

78

Sita

1

12

Computer

98

Account

80

Hari

2

11

Computer

80

Account

82

Shyam

2

12

Computer

92

Account

83

Let us consider it as an unorganized table .

In above table, we can see that column of subject nome and marks are repeated which are eliminated in 1NF.

Name

Roll

Class

Sub_name

Sub_marks

Ram

1

11

Computer

95

Ram

1

11

Account

78

Sita

1

12

Computer

98

Sita

1

12

Account

80

Hari

2

11

Computer

80

Hari

2

11

Account

82

Shyam

2

12

Computer

92

Shyam

2

13

Account

83

 

B ) 2NF (Second Normal form)

It further addresses the concept of remaining duplicate data.It should be in first normal form.It removes the date that applies to multiple row of a table and place them in separate tables.The objective of second NF is to take data i.e. partly dependent upon the primary key and enter the data into another table.

In above table name depends upon roll no and class, subject name only depends upon class, subject marks depends upon name and subject_name. Hence, above table can be decomposed as:

Name

Roll

Class

Ram

1

11

Sita

1

12

Hari

2

11

Shyam

2

12

Subject

Class

Computer

11

Account

11

Computer

12

Account

12

Name

Sub_name

Sub_marks

Ram

Computer

95

Ram

Account

78

Sita

Computer

98

Sita

Account

80

Hari

Computer

80

Hari

Account

82

Shyam

Computer

92

Shyam

Account

83

This is the way how 1NF and 2NF principle works in database normalization .


                                                        GROUP ‘C’

 1 ) What is structure in C ? WAP to enter the 20 employee’s name , age , and  salary using structure and print them .

Answers :

Structure is a user-defined datatype in C language which allows us to combine data of different types together. Structure helps to construct a complex data type which is more meaningful .

#include<stdio.h>

struct emp

{

         char n[100];

            int age;

            int sal;           

};

struct emp e[20];

 

int main()

{           int i;

            printf("Enter employee name age and salary\n");

            for(i=0;i<20;i++){

                        scanf("%s %d %d",e[i].n,&e[i].age,&e[i].sal);

            }

            printf("Name \t Age \t Salary");

            for(i=0;i<20;i++){

                        printf("%s\t %d\t %d\t",e[i].n,e[i].age,e[i].sal);

            }

            return 0;

}


2 ) What is OSI reference model ? Explain the layer of OSI reference model .

Answers :

                The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software. In the OSI reference model, the communications between a computing system are split into seven different abstraction layers: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

1 ) Physical Layer :

The lowest layer of the OSI Model is concerned with electrically or optically transmitting raw unstructured data bits across the network from the physical layer of the sending device to the physical layer of the receiving device. It can include specifications such as voltages, pin layout, cabling, and radio frequencies. At the physical layer, one might find “physical” resources such as network hubs, cabling, repeaters, network adapters or modems.

2 ) Data Link Layer :

At the data link layer, directly connected nodes are used to perform node-to-node data transfer where data is packaged into frames. The data link layer also corrects errors that may have occurred at the physical layer.

The data link layer encompasses two sub-layers of its own. The first, media access control (MAC), provides flow control and multiplexing for device transmissions over a network. The second, the logical link control (LLC), provides flow and error control over the physical medium as well as identifies line protocols.

3 ) Network Layer :

The network layer is responsible for receiving frames from the data link layer, and delivering them to their intended destinations among based on the addresses contained inside the frame. The network layer finds the destination by using logical addresses, such as IP (internet protocol). At this layer, routers are a crucial component used to quite literally route information where it needs to go between networks.

4 ) Transport Layer :

The transport layer manages the delivery and error checking of data packets. It regulates the size, sequencing, and ultimately the transfer of data between systems and hosts. One of the most common examples of the transport layer is TCP or the Transmission Control Protocol.

5 ) Session Layer :

The session layer controls the conversations between different computers. A session or connection between machines is set up, managed, and termined at layer 5. Session layer services also include authentication and reconnections.

6 ) Presentation Layer :

The presentation layer formats or translates data for the application layer based on the syntax or semantics that the application accepts. Because of this, it at times also called the syntax layer. This layer can also handle the encryption and decryption required by the application layer.

7 ) Application Layer :

At this layer, both the end user and the application layer interact directly with the software application. This layer sees network services provided to end-user applications such as a web browser or Office 365. The application layer identifies communication partnersresource availability, and synchronizes communication.

 

       ********Paper solved ******* By Tukus Technology *****************

For paper solve video visit our channel :

 

If you want paper solve pdf then download from this link :

https://drive.google.com/file/d/11nTLF7ZdI9RarOp9rhGENZ5RWzWOHc8s/view?usp=sharing



1 comment:

BCA ENTRANCE RESULT 2079 - CHECK YOUR BCA RESULT

 Hello everyone BCA Entrance result of TU ( 2079 ) is published . You can check your result by downloading pdf , so go on this video and dow...