Professional Documents
Culture Documents
Passing Package CS
Passing Package CS
By VANITHA Page 1
PU-2 computer science
By VANITHA Page 2
PU-2 computer science
By VANITHA Page 3
PU-2 computer science
• In parallel port more number of wires is used compared to serial port to transfer multiple
streams of data
It has 20pin power It has 12 and 20 pin It has 20 and 24 pin It has 12 pin power
connector power connector power connector connector
and ports
It contains PGA (Pin It is a combination It has MPGA (Mini It has old model
Grid Array) sockets, of XT and AT Pin Grid Array) processor sockets LIF
motherboard with sockets (low insertion force)
PGA sockets sockets
It has SDRAM slots, It has PCI and ISA It is latest ISA (Industry
PCI slots, ISA slots. slots, SDRAM slots motherboard , with standard architecture)
and DDRRAM DDRRAM slots, slots and DIMM (dual
slots. AGP and PCI slots inline memory
module) RAM slots
By VANITHA Page 4
PU-2 computer science
Ans: Purpose of UPS (uninterrupted power supply): it is a battery used to maintain power
supply to computer during power failure. It keeps computer running for several minutes to
few hours after power failure so that the system user can save his work and gracefully
shutdown the computer.
Types of UPS:
Offline UPS: this type of UPS have module. When main power source is off then the module
will switch from main power source to the battery source in less than 4ms delay time and
supply power to the computer.
Online UPS: this type of UPS is better than Offline UPS because no matter main power
source is on or off this online UPS always outputs power from battery, so Online UPS doesn’t
have delay time. Online UPS is expensive than Offline UPS.
By VANITHA Page 5
PU-2 computer science
2. Give the difference between Procedural programming and Object Oriented Programming.
Ans:
Procedure Oriented Programming Object Oriented Programming
1. program is divided into small parts called 1. program is divided into small parts called
function objects
2. Top down approach 2. Bottom up approach
3. Does not have any access specifier 3. Has access specifiers named public, private
and protected
4. Overloading is not possible 4. Overloading is possible.
5. It is not easy to add new data and function 5. It is easy to add new data and function
6. It has less security. 6. It has more security.
By VANITHA Page 6
PU-2 computer science
By VANITHA Page 7
PU-2 computer science
By VANITHA Page 8
PU-2 computer science
2. F(A,B,C,D)=∑(0,2,4,5,6,7,8,10,12,13,14,15)
By VANITHA Page 9
PU-2 computer science
Chapter-10 : Inheritance
Five marks questions:
Multi level inheritance: a class can be derived from another derived class which is known as
multilevel inheritance.
Multiple inheritance : if a class is derived from more than one base class. It is known as multiple
inheritance.
By VANITHA Page 10
PU-2 computer science
Hierarchical inheritance: more than one class derived from a single base class.
By VANITHA Page 11
PU-2 computer science
void display()
{
cout<<”\n roll number=”<< rollnumber;
cout<<”\n student name=”<<name;
}
};
class report: public student
{
private:
int marks1, marks2, total;
public:
void readmarks()
{
cout<<”enter 2 subject marks”<<endl;
cin>>marks1>>marks2;
}
void compute()
{
total= marks1+marks2;
cout<<”\n total marks=”<<total;
}
};
void main()
{
report r;
clrscr();
r. readdata();
r.display();
r.readmarks();
r.compute();
getch();
}
By VANITHA Page 12
PU-2 computer science
OR using NAND
OR using NOR
By VANITHA Page 13
PU-2 computer science
Ans:
• Universal gates are NAND and NOR
• They are less expensive (economical)
• Universal gate can implement any Boolean function without using other gate.
• They are popular.
• They can be used to construct logic gate diagrams in easier way.
• They can be used to design all BASIC gates (AND, OR, and NOT) individually. Hence
they are called as universal gates.
CHAPTER-11:
By VANITHA Page 14
PU-2 computer science
In above example, delete is a keyword and the pointer variable ptr is the pointer that points to
the objects already created in the new operator.
CHAPTER-12:
By VANITHA Page 15
PU-2 computer science
3. What is a data file? Differentiate between text file and binary file in C++
(or)
Mention the types of data files. Explain
Ans: Text file:
▪ it is file in which information is stored in ASCII format.
▪ in text file each line is terminated by EOL (End of Line) character.
▪ translations needed
Binary file:
▪ it is a file stores information in binary format.
▪ translations not needed.
▪ delimiters not used
CHAPTER-13
Five marks questions
1. Write any 2 differences between manual and computerized (electronic) data
processing.
[March-2018, June 2018, March 2016]
Ans:
Manual data processing Computerized data processing
• It requires large quantity of • It requires less quantity of
paper paper
• Labour cost is high • Labour cost is less
• Limited speed and accuracy • Fast speed and accuracy
• Storage medium is paper • Storage medium is secondary
memory
• It processes less amount of • It processes large amount of
data data
By VANITHA Page 16
PU-2 computer science
Data integrity: all information in database is accessible by several users but only
one user can change the same piece of information at a time. This makes
database free from corruptions and failure. Data integrity refers to accuracy and
consistency.
Data security: DBMS does not allow to breach. DBMS provides appropriate
security levels that restrict access to tables, schema and other database objects
with tools like user id’s and password.
Data sharing: the ability to share the same data resource with multiple
applications or users.
By VANITHA Page 17
PU-2 computer science
Bus topology: It consists of a single common data path connecting to all nodes
(workstations). All the data propagates through single cable, can be received by
any node.
Star topology: this topology consists of a central node to which all other nodes are
connected by a single path.
Ring topology: in this topology, each node connects to only 2 neighboring nodes.
The data travels in one direction from one node to another around the ring.
By VANITHA Page 18
PU-2 computer science
Tree topology: this topology, the shape of the network is an inverted tree. It is a
hybrid topology because it is a combination of bus and star topologies.
Mesh topology: in this topology, each node is connected to more than one node to
provide an alternative root in case if host is busy.
(or)
Bridge: it is a device that links 2 networks together, bridges are smart enough to
know which computers are on which side of the bridge. So, they allow only those
messages that need to get on other side of the bridge.
Modem: the modem modulates the signal at the sending end, demodulates at the
receiving end. It is used to provide internet access to computer system via
telephone lines.
Repeater: When signal loses strength while transmitted long distance, then
repeaters are used to boost the signal strength.
By VANITHA Page 19
PU-2 computer science
Reliability: a file and its copies are stored in different machines, so that if one copy
is lost other copy is restored.
Cost factor: personal computers are better in price and performance than
microcomputers.
********************
By VANITHA Page 20