Welcome to Scribd!
Academic Documents
Professional Documents
Culture Documents
Hobbies & Crafts Documents
Personal Growth Documents
2nd PUC CS notes
(b) (©) (d) in the blanks choosing the appropriate word/words from those given in brackets. (Repeated answers will not be considered) (Alternate key, Data Model, Foreign key, staging, domain) 16. Key which is not selected as primary key is, 17, key combines two database tables. 18. Set of values for an attribute in each column is 19. describes how data is represented and used. 20. Process of cleaning, standardized and loading data in data warehouse is called PART-B 1. Answer any FOUR questions. Each question carries two marks. 21. Prove xy +N7= x. 22, State and prove commutative las using truth table, 23. List different characteristics of OOP". 24. Mention different types of constructors. 25. What are the advantages of saving data in binary form? 26. Define primary key and foreign key. 27. Mention different logical operators used in SQL. 28. Name different types of networking cables. PART-C Answer any FOUR questions. Each question carries three marks. 3 29. Explain different components of motherboard. 30. Realize AND, OR ,NOT gates using NOR gate31. What is queue? Mention different types of queue. 32. What is dynamic memory allocation? Explain. 33. Give the functions of: (a) eof{ ) (b) seekp() (©) tellp() 34, Explain any three types of keys used in database creation. 35. Write a note on open source software. 36. Explain different types of hosting websites. Shivamurthy's Academy YouTube Chapnel Answer any SIX questions. Each question carries five marks. S5x6= 37. Give the Boolean function F(A,B,C,D) = 2(1,2,3,4,5,7,9,10,11,13,15). Reduce it by using Karnaugh map (K-Map). 38. Write an algorithm to insert and delete an element from an array. 39. Explain operations performed on linked list. 40. Write the advantages of object oriented programming. 41. Describe how objects can be used as function arguments. 42. What is function overloading? Explain the need for overloading 4 44, Explain the visibility modes in inheritance Explain default constructors with syntax and example. 45. What is data warehouse? Explain the components of data warehouse. 4 4 & Explain SQL constraints with example. 4 . Explain any five networking devices. Spesonreeee EEEil L PAPI PART-A Answer all the questions. Each question carries one mark. 1x I. Select the correct answer from the choices given: (Repeated answers will not be considered) 1. Parallel port is used to carry. bytes of data (a) 1 Byte (b) 8 Byte (©) 1 Bit (d) 1 Mega byte 2. Result of any logical expression is always FALSE(0), is called (a) Tautology (b) Fallacy (c) Minterm (d) Maxterm 3. What is the output of the 2 input OR gate for inputs A = 0, B=0? (a) Output 0 (b) Output 1 (c) No output (d) Both (a) and (b) 4, Which of the following is an application of stack? (a) Backtracking (b) Reversing a word (c) Tower of hanoi (d) All the above 5. Array having class type elements is called (a) Array of pointers (b) Array of objects (c) Array of elements (d) Array of variables 6. Friend function must be defined (a) inside class (b) outside class with keyword friend (c) Outside class without keyword friend (d) anywhere in the program 7. Constructor used to copy one object to another object is (a) Default constructor (b) Parameterized constructor (c) Copy constructor (d) None of the above Shivamurthy's Academy YouTube Channel 8. Visibility mode defines (a) Type of derivation (b) Type of data types (c) Type of function (d) None of the above 9. is the collection of addresses (a) Array of objects (b) Array of pointers (c) Array of elements (d) Array of variables. 10. Abstract model the describes how data is represented and used is (a) Data warehouse (b) Data Model (c) Data mining (d) Database u operator used to search for values that are within a set of values (a) ANY (b) BETWEEN (c) ALL (d) EXISTS12. Device that amplifies a signal being transmitted on the network is (a) Hub (b) Modem (©) Repeater (@) Bridge 13. Which of the following is not an example for antivirus software? (a) Kaspersky (b) Norton 360 (©) Quick heal (d) Turbo ¢++ 14. Which of the following is not an advantage of E-commerce? (a) 24X7 service (b) Global participation (0) Free trial before purchasing (d) Home delivery Is refers to the web content that changes each time it is viewed (a) HTML (b) XML (©) DHTML (d) None of the above. IL. (Repeated answers will not be considered) ill in the blanks choosing the appropriate word/words from those given in brackets. (one-tier, Data independence, serial file organization, tuple, Attribute) 16, Each column is identified by distinct header called "7 is the architecture where users direetly sit on DBMS and uses it. 18, Each row ina table is called 19 stores data in serial order in the database. 20. Ability database to modify schema at one level without affecting it on another level is Shivamurthy's Academy YouTube { Channel ILL Answer any FOUR questions. Each question carries two marks. 21, Prove xy +xy= x. 22, State De-Morgans theorems. 23, List different characteristics of OP's 24. Mention different types of constructors, 25. What are the advantages of saving data in binary form? 26, Define primary key and foreign key. 27. Mention different logical operators used in SQL. 28, Name different types of networking cables. PART-C IV. Answer any FOUR questions. Each question carries three marks. 29. What is bus? Mention its types 30. What are derived gates mention different derived gates.31. What is linked list? Mention its types 32. What is static memory allocation? Explain. 33. Explain methods of opening files in C++. 34. Explain logical two tier client server architecture. 35. Write the features of open source softwares, 36. Explain types of web scripting, Shivamurthy's Academy YouTube,Chanpel Answer any SIX questions. Each question carries five marks. 37. Give the Boolean function F(A,B,C,D) = £(0,1,2,3,4,8.9,10,11, 12). Reduce it by using Karnaugh map (K-Map), 38. Write an algorithm to perform PUSH and POP operation in stack. 3 4 S Explain different operations performed on linear array. & |. Explain different characteristics of object oriented programming, 41, What is an object? Explain syntax and example for object definition. 4 4 4 8 Explain the characteristics of friend functions. & . Explain destructor with syntax and example & |. Define the terms:(a) Inheritance (b) Base class (c) Visibility mode (d) Abstract class __(e) Virtual base class 4 4 4 B Explain the features of database system. a Explain ALTER and UPDATE command with syntax and example. 3s What is networking? Explain the applications of networking. Spore E ore1LPU COMPUTER SCIENCE - MODEL PAPER 9 PART Answer all the questions. Each question carries one mark. 1x20 I. Select the correct answer from the choices given: (Repeated answers will not be considered) 1, CMOS is used to store (a) Intermediate data (b) Date and time instructions (©) input data () Output result 2. Result of any logical expression is always TRUE(1), is called (a) Tautology (b) Fallacy (©) Minterm (d) Maxterm 3. What are the inputs to a3 input OR gate if its output is 0? (a) All inputs must be 1 (b) All inputs must be 0 (©) Atleast one input must be 0 (@) Atleast one input must be 1 4, Name the data structure whose relationship between data elements is by means of links (a) Arrays (b) stack (c) Queue (d) linked list 5. Which of the following is the default access specifier? (a) Public (b) Protected (c) Private (d) None of the above 6. Friend function isa. Shivamurthy's Academy YouTube Channel (a) Member function (b) Non member function (c) Main function (d) Recursive function 7. In constructor declaration of object is followed by argument list enclosed in parenthesis is (a) Implicit call (b) Explicit call (©) Initialized at the time of declaration using = (d) None of the above 8. Ifno visibility mode is specified then by default the visibility mode is (a) Public (b) Protected (c) Private (d) None of the above 9. is the built in pointer that hold the address of the object defined for a class (a) this pointer (b) new (c) delete (d) AND 10. Visual representation of data that describes how data is related to each other is (a) ER diagram (b) flowehart (c) Data model (@) None of the above i operator used to compare value to any applicable value in the list (a) ANY (b) AND (ALL (@) NOT12, Which is the system/software application which has internetwork capability of joining dissimilar network?” (a) Gateway (b) Bridge (c) Router (d) Switch 13. Which of the following is the characteristic of virus? (a) Able to replicate (b) Reduce memory space (0) Modification of data (d) All the above 14, Which of the following is not related a service of E-Commerce? (a) E-MAIL (b) E-Banking (c) Electronic fiund transfer (d) Finance 15. Which of the following is HTML tag is used to create table? (a) (b) (c) (d) Fill in the blanks choosing the appropriate word/words from those given in brackets. (Repeated answers will not be considered) (tree, domain, DBMS, entity, Database) 16, Set of values for an attribute in each column is 17. 18. Hierarchical model follows, structure s an application software used for creating, updating, managing database 19, is a collection of logically related data 20. is an object like table. Shivamurthy's Academy YouTube Chagnet IIL Answer any FOUR questions. Each question carries two marks. 2x4 21. Find the complement of the expression F= XY + XZ +XY 22. Draw a general K-Map for 3 variables. 23. Define class and object. 24. Write syntax and example for copy constructor. 25. Name the stream classes supported by C++ for file input and output. 26. Define Primary key and Secondary key. 27. What is dual table? Give example. 28, Write advantages of networking, PART-C IV. Answer any FOUR questions, Each question carries three marks. 3x4 29. What is the purpose of ports, bus and disk controllers 30. What are universal gates? Mention different universal gates31. What is stack? Write any two applications of stack. 32. What is self referential structure? Give example 33. Explain any three modes to open a file in C++ 34. Explain any E-R diagram notation and write its purpose... 35. Write advantages and disadvantages of WWW. 36. Give the features of XML. Shivamurthy's Academy YouTube Channel Answer any SIX questions. Each question carries five marks. 5x6 37. Give the Boolean function F(A,B,C,D) = mi+my+my+metmstmytmetmytmitmistmictmis Reduce it by using Karnaugh map (K-Map). 38. What is sorting? Write an algorithm to sort an array using insertion sort. 39. What is queue? Explain different types of queue. 40. Write the difference between procedural and object oriented programming, 41. What are access specifiers? Explain different access specifiers. 42. Explain inline function with syntax and example program 43. Explain destructor and its characteristics 44, What is inheritance? Write its advantages. 48. Differentiate between electronic and manual file organization. 46. Explain DELETE and UPDATE command with syntax and example. 47. Explain different switching techniques. eee11 PU COMPUTER SCIENCE ~ MODEL PAPER 10 PART-A Answer all the questions. Each question carries one mark. 1x20= 2 I. Select the correct answer from the choices given: (Repeated answers will not be considered) 1. The function of BIOS is (a) Stores data (b) Store Date and time instructions (c) Stores input data (4) Stores instructions to load hardware setting 2. Method of simplifying the expression by passing most possible values is, (a) Perfect induction method (b) Algebraic simplification (odes tyvaie Shivamurthy's Acad cademy YouTube Channel 3. NOR gate is a combination of gates (a) NOT AND (b) NOT OR (©) NOT NAND (a) NOT NOR 4, Which of the following is not an application of queue? (a) Simulation (b) Converting infix to postfix expression (©) Scheduling algorithm, (d) Maintenance of printer server 5 is the process of representing essential features without including background details. (a) Data abstraction (b) Inheritance (©) Data hiding (@) Polymorphism 6. Friend function must be defined (a) inside class (b) outside class with keyword friend (c) Outside class without keyword friend (d) anywhere in the program 7. Function which initializes object of a class automatically is (a) Destructor (b) Friend function (©) Constructor (d) Inline function 8. In private inheritance public members of base class becomes. members of derived class. (a) Public (b) Protected (©) Private (d) Allofthe above 9, Pointers pointing to object ofa class called (a) Array of pointers (b) Class pointers (c) Object pointer (d) This pointer 10, Field ina relation that matches the primary key column of another table (a) Primary key (b) Foreign key (c) Secondary key (a) Candidate key ul operator used to search for the presence ofa row in a specified table (a) ANY (b) AND, (©) ALL (d) EXISTS.12, In which type of communication one interface is transmitter and all other interfaces are receivers? (a) Simplex (b) Duplex. (c) Half duplex. (d) All the above 13, SMS stands for__ Shivamurthy's Academy YouTube Channel (a) Small Message System (b) Small Message Service (c) Short Message Service (d) Short Message System 14. is the exchange of services, information or products between two consumers, (a) B2B (b) B2C (CB (d) C20 15, Which of the following is HTML tag is used to create forms? (a) (b) (© (a) IL, Fill in the blanks choosing the appropriate word/words from those given in brackets. (Repeated answers will not be considered) (one-tier, Data independence, serial file organization, network model, Attribute) 16, Each column is identified by distinct header called 17, isa data model that follows graph structure 18, Each row in a table is called 19. stores data in serial order in the database. 20, Ability database to modify schema at one level without affecting it on another level is PART-B II, Answer any FOUR questions. Each question carries two marks. 2x4=8 21, Write the statement for De-Morgans theorem. 22. X+Y = +X evaluate using truth table. 23. Write any two limitations of OOP's. 24, Write syntax and example for parameterized constructor, 25. Write the difference between put( ) and get( ) functions. 26. What is data mining? Mention its components. 27. What is the purpose of GRANT and REVOKE, 28. Explain circuit switching technique. PART-C IV, Answer y FOUR questions. Each question carries three marks. 3x4 29. What is bus? Mention its types. 30, Write truth table and logic symbol for XOR gate.31. What is queue? Write any two applications of queue. 32. What is relationship between object and pointers? Give example, 33. Write the difference between text file and binary file 34. What are the advantages and disadvantages of ISAM? 35. Define E-Commerce. Write its services. 36. Give the features of DHTML, Shivamurthy's Academy YouTube Channel Answer any SIX questions. Each question carries five marks. 5x6=3 37. Give the Boolean function F(A,B,C,D) = £(0,48,9,10,11,12,13). Reduce it by using Karnaugh map (K-Map). 38. Write an algorithm for search elements using binary search. 39. Explain different operations performed on stack data structure. 40, Write the difference between procedural and object oriented programming 41. What are access specifiers? Explain different access specifiers. 42. What is function overloading? Write the needs for function overloading, 43. Explain constructor with syntax and example. 44, What is inheritance? Explain multiple and muttilevel inheritance 45, Explain data processing cycle 46, Explain INSERT INTO and SELECT command with syntax and example. 47. What is network security? Explain different protection methods.ILPU COMPUTER SCIENCE - MODEL PAPER 11 PART-A Answer all the questions. Each question carries one mark. 1x20=2% I. Select the correct answer from the choices given: (Repeated answers will not be considered) 1 is a system designed to transmit information between electronic musical instruments. (a) MIDI (b) VGA. (c) DVI (d) Firewire t 2. Sum of several literals is called_Shivamurthy's Academy YouTube Channel (a) Tautology (b) Fallacy (c) Minterm (d) Maxterm 3. NAND gate is a combination of. _ gates (a) NOT AND (b) NOT OR (c) NOT NAND (d) NOT NOR: 4. Base address is (a) Address of first element (b) Address of last element (c) Address of middle element (d) Address of any element 5. is an ability ofan object to more than one form (a) Data abstraction (b) Inheritance (c) Data hiding (d) Polymorphism 6. Friend keyword is required while function (a) Defining (b) Declaring (c) Both defining and declaring (d) Not needed 7. Constructor overloading is not possible in (a) Default constructor (b) Parameterized constructor (c) Copy constructor (d) Destructor 8. Which of the following is most used visibility mode in inheritance? (a) Public (b) Protected (©) Private (d) None of the above 9 is the structure that include an element that points to another structure of same type (a) Memory heap (b) Self referential structure (c) Structure (d) Memory poo! 10. Application software used to create, update, access and manage data in data structure is (a) DMBS (b) Database (©) File (d) Folder ML. operator used to search for values that are within a set of values (a) BETWEEN (b) AND (c) ALL. (d) EXISTS12, In which type of communication each interface works as transmitter and receiver alternatively. (a) Simplex (b) Duplex. (c) Half duplex (d) All the above 13, The legal and regulatory aspects of internet and WWW is (a) Protocols (b) Cyber law (c) Cyber crime (a) Crackers 4 is the exchange of services, information or products between two business partners. (a) BB (b) B2C (0) CB (aac 15. Type of web hosting which hosts web pages free of cost (a) Free hosting (b) Colocation hosting (c) Dedicated hosting (d) Virtual hosting IL Fill in the blanks choosing the appropriate word/words from those given in brackets. (Repeated answers will not be considered) (Heirarchical model, Number, random file organization, tuple, G-sat) 16, is an example for data mining software. 17, is a data model that follows tree structure. 18. Each row ina table is called 19. stores data in random order in the database. 20. An example for data types used is DBMS is Shivamurthy's Academy YouTube Channel PART-B IIL, Answer any FOUR questions. Each question carries two marks. 2xd= 21. Prove algebraically XX + XY =X 22. Write the logic circuit diagram for (X + YX +Z) =X +¥Z 23. Write any two characteristics of OP'S. 24. Write rules for naming constructors, 25. Write the difference between ifstream and ofstream class. 26. What is data mining? Mention its components, 27. Classify various SQL operators. 28, What are the advantages of networking, PART-C IV. Answer any FOUR questions. Each question carries three marks. 3xd= 29, Explain cache memory. 30. Realize AND, OR gate using NOR gate.31. What is linked list? Mention its types. 32, Define a pointer. Write its declaration and initialization 33. Write the difference between text file and binary file 34, Explain any three types of keys. 35. Give the advantages and disadvantages of E-Commerce. 36. Give the advantages of web designing. PART-D s. Each question carries five marks. 5x6=30 Answer any SIX questi 37. Give the Boolean function F(A,B,C,D) = 3(1,2,3,4,5,7,9,11,12,13,15). Reduce it by using Karnaugh map (K-Map). 38, What is an array? Write an algorithm to insert an element into an array. 39, Write an algorithm to insert and delete an element from stack. 40. Write the applications of OOP’s. 41. What are member functions? Write an example program to define member functions outside elas. 42, What is inline function? Write an example program. 43, Explain destructor with syntax and example. 44, What is inheritance? Explain single and multilevel inheritance 45. Explain three level DBMS architecture. 46. What is data definition language? Explain SELECT and UPDATE command. 47. What is network topology? Explain star and ring topology. seseneseneneneneeeeI PU COMPUTER SCIENCE - MODEL PAPER 12 PART—A Answer all the questions. Each question carries one mark. 1x20 I. Select the correct answer from the choices given: (Repeated answers will not be considered) 1. L2 cache is present in (a) Along with CPU (b) Between CPU and RAM (c) Along with RAM (d) On the motherboard 2. Product of several literals is called (a) Tautology (b) Fallacy (c) Minterm (d) Maxterm AL Shivamurthy's Academy YouTube Channel logic gate is an (a) Electronic circuit works on signals (b) Table with values (c) Device which gives result (d) None of the above 4, Subscript of first element ofan array is (1 (0 ()N (d) N-l 5. Access specifiers used to implement (a) Data abstraction (b) Inheritance (©) Data hiding (d) Polymorphism 6. Friend function must use to access class members. (a) Object (b) dot operator (c) Both (a) and (b) (d) Scope resolution operator 7. A class can have how many destructors? (a1 (b)2 (c) Any number (a) Cannot have destructor 8. Which of the following is most used inheritance? (a) Public (b) Protected (c) Private (d) Allof the above 9. Dynamically allocated memory not deleted remains occupied called (a) Orphaned memory (b) Memory poo! (©) Stream (d) Structure 10. Which of the following is not an example for DBMS software? (a) MS Access (b) Oracle (c) IBM DB2 (d) MS Excel M. operator used to searches every row of a specified table for uniqueness. (a) BETWEEN (b) AND (c) UNIQUE (4) EXISTS12. isa high speed computer which facilitates services in network. (a) Server (b) Client (©) Workstation (d) Node 13, Which of the following is an application of computer network? (a) E Mail (b) SMS (c) Sharing of resources (d) All the above 14, WWW stands for (a) World Wide Web (b) World Wild Web (c) Word Wide Web (a) World Width Web 15. Which of the following is HTML tag is not an attribute of tag? (b) (a) IL. Fill in the blanks choosing the appropriate word/words from those given in brackets. (Repeated answers will not be considered) (Think analytics, one-tier, Domain, tuple, Attribute) 16. Each column is identified by distinct header called 17. is the architecture where users directly sit on DBMS and uses it. 18. Each row ina table is called 19. is an example for data mining software. 20. Set of values present in a column is called Shivamurthy's Academy YouTube Channel IIL, Answer any FOUR questions. Each question carries two marks, 2x4=t 21. State and prove involution law. 22. Give the applications / uses of De-Morgan’s theorem, 23, Write any two advantages of OOP's. 24. Write syntax and example for destructors. 25, Write the difference between get( ) and getline( ) functions. 26. What is data warehousing? Mention its components. 27. Whaat is the purpose of COMMIT and ROLLBACK, 28. Explain packet switching technique. PART-C r 29. Explain different components of motherboard. 30. Write truth table and logic symbol for XNOR gate. . Answer any FOUR questions. Each question earries three marks. 3x4131. Give the memory representation of 2-dimensional array in column major order. 32. Give the operations performed on pointers. 33. What isa file? Explain its types. 34. What are the advantages and disadvantages of direct or random access method? 35. Define E-Commerce. Write its disadvantages. 36. Give the general structure of HTML. Shivamurthy's Academy YouTube,Chgnnel Answer any SIX questions. Each question carries five marks. Sxt 37. Give the Boolean function F(A,B,C.D) = 2(1,2,3.4,5,7,9,10,11,15). Reduce it by using Karnaugh map (K-Map) 38. Write an algorithm for search elements using linear search. 39. Explain different operations performed on Queue data structure. 40. Write the advantages of object oriented programming, 41, What are access specifiers? Explain different access specifiers. 42. What is function overloading? Explain with syntax and example. 43, Explain parameterized constructor with syntax and example 44, What is inheritance? Explain hierarchical and hybrid inheritance 45, Explain data base architecture. 46. What are SQL group functions? Explain any five group functions. 47. What is network security? Explain different protection methods. sere e EE ERYou might also likeThe Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good Life From EverandThe Subtle Art of Not Giving a F*ck: A Counterintuitive Approach to Living a Good LifeMark MansonRating: 4 out of 5 stars4/5 (5834)The Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You Are From EverandThe Gifts of Imperfection: Let Go of Who You Think You're Supposed to Be and Embrace Who You AreBrene BrownRating: 4 out of 5 stars4/5 (1093)Never Split the Difference: Negotiating As If Your Life Depended On It From EverandNever Split the Difference: Negotiating As If Your Life Depended On ItChris VossRating: 4.5 out of 5 stars4.5/5 (852)MagazinesPodcastsSheet musicPrinciples: Life and Work From EverandPrinciples: Life and WorkRay DalioRating: 4 out of 5 stars4/5 (612)The Glass Castle: A Memoir From EverandThe Glass Castle: A MemoirJeannette WallsRating: 4.5 out of 5 stars4.5/5 (1720)Grit: The Power of Passion and Perseverance From EverandGrit: The Power of Passion and PerseveranceAngela DuckworthRating: 4 out of 5 stars4/5 (590)Sing, Unburied, Sing: A Novel From EverandSing, Unburied, Sing: A NovelJesmyn WardRating: 4 out of 5 stars4/5 (1194)Hidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space Race From EverandHidden Figures: The American Dream and the Untold Story of the Black Women Mathematicians Who Helped Win the Space RaceMargot Lee ShetterlyRating: 4 out of 5 stars4/5 (903)Shoe Dog: A Memoir by the Creator of Nike From EverandShoe Dog: A Memoir by the Creator of NikePhil KnightRating: 4.5 out of 5 stars4.5/5 (541)The Perks of Being a Wallflower From EverandThe Perks of Being a WallflowerStephen ChboskyRating: 4.5 out of 5 stars4.5/5 (2105)The Hard Thing About Hard Things: Building a Business When There Are No Easy Answers From EverandThe Hard Thing About Hard Things: Building a Business When There Are No Easy AnswersBen HorowitzRating: 4.5 out of 5 stars4.5/5 (349)Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future From EverandElon Musk: Tesla, SpaceX, and the Quest for a Fantastic FutureAshlee VanceRating: 4.5 out of 5 stars4.5/5 (474)Bad Feminist: Essays From EverandBad Feminist: EssaysRoxane GayRating: 4 out of 5 stars4/5 (1029)The Outsider: A Novel From EverandThe Outsider: A NovelStephen KingRating: 4 out of 5 stars4/5 (1871)Her Body and Other Parties: Stories From EverandHer Body and Other Parties: StoriesCarmen Maria MachadoRating: 4 out of 5 stars4/5 (823)The Sympathizer: A Novel (Pulitzer Prize for Fiction) From EverandThe Sympathizer: A Novel (Pulitzer Prize for Fiction)Viet Thanh NguyenRating: 4.5 out of 5 stars4.5/5 (122)The Emperor of All Maladies: A Biography of Cancer From EverandThe Emperor of All Maladies: A Biography of CancerSiddhartha MukherjeeRating: 4.5 out of 5 stars4.5/5 (271)Angela's Ashes: A Memoir From EverandAngela's Ashes: A MemoirFrank McCourtRating: 4.5 out of 5 stars4.5/5 (443)Brooklyn: A Novel From EverandBrooklyn: A NovelColm TóibínRating: 3.5 out of 5 stars3.5/5 (1948)The Little Book of Hygge: Danish Secrets to Happy Living From EverandThe Little Book of Hygge: Danish Secrets to Happy LivingMeik WikingRating: 3.5 out of 5 stars3.5/5 (405)A Man Called Ove: A Novel From EverandA Man Called Ove: A NovelFredrik BackmanRating: 4.5 out of 5 stars4.5/5 (4772)The World Is Flat 3.0: A Brief History of the Twenty-first Century From EverandThe World Is Flat 3.0: A Brief History of the Twenty-first CenturyThomas L. FriedmanRating: 3.5 out of 5 stars3.5/5 (2259)Steve Jobs From EverandSteve JobsWalter IsaacsonRating: 4.5 out of 5 stars4.5/5 (809)The Art of Racing in the Rain: A Novel From EverandThe Art of Racing in the Rain: A NovelGarth SteinRating: 4 out of 5 stars4/5 (4214)The Yellow House: A Memoir (2019 National Book Award Winner) From EverandThe Yellow House: A Memoir (2019 National Book Award Winner)Sarah M. BroomRating: 4 out of 5 stars4/5 (98)Devil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New America From EverandDevil in the Grove: Thurgood Marshall, the Groveland Boys, and the Dawn of a New AmericaGilbert KingRating: 4.5 out of 5 stars4.5/5 (266)A Tree Grows in Brooklyn From EverandA Tree Grows in BrooklynBetty SmithRating: 4.5 out of 5 stars4.5/5 (1930)Yes Please From EverandYes PleaseAmy PoehlerRating: 4 out of 5 stars4/5 (1905)A Heartbreaking Work Of Staggering Genius: A Memoir Based on a True Story From EverandA Heartbreaking Work Of Staggering Genius: A Memoir Based on a True StoryDave EggersRating: 3.5 out of 5 stars3.5/5 (231)Team of Rivals: The Political Genius of Abraham Lincoln From EverandTeam of Rivals: The Political Genius of Abraham LincolnDoris Kearns GoodwinRating: 4.5 out of 5 stars4.5/5 (234)The Woman in Cabin 10 From EverandThe Woman in Cabin 10Ruth WareRating: 3.5 out of 5 stars3.5/5 (2526)Wolf Hall: A Novel From EverandWolf Hall: A NovelHilary MantelRating: 4 out of 5 stars4/5 (3973)Fear: Trump in the White House From EverandFear: Trump in the White HouseBob WoodwardRating: 3.5 out of 5 stars3.5/5 (738)John Adams From EverandJohn AdamsDavid McCulloughRating: 4.5 out of 5 stars4.5/5 (2409)On Fire: The (Burning) Case for a Green New Deal From EverandOn Fire: The (Burning) Case for a Green New DealNaomi KleinRating: 4 out of 5 stars4/5 (74)The Light Between Oceans: A Novel From EverandThe Light Between Oceans: A NovelM.L. StedmanRating: 4.5 out of 5 stars4.5/5 (789)Manhattan Beach: A Novel From EverandManhattan Beach: A NovelJennifer EganRating: 3.5 out of 5 stars3.5/5 (880)The Constant Gardener: A Novel From EverandThe Constant Gardener: A NovelJohn le CarréRating: 3.5 out of 5 stars3.5/5 (104)The Unwinding: An Inner History of the New America From EverandThe Unwinding: An Inner History of the New AmericaGeorge PackerRating: 4 out of 5 stars4/5 (45)Rise of ISIS: A Threat We Can't Ignore From EverandRise of ISIS: A Threat We Can't IgnoreJay SekulowRating: 3.5 out of 5 stars3.5/5 (137)Little Women From EverandLittle WomenLouisa May AlcottRating: 4 out of 5 stars4/5 (105)