Skip to content

Class XII – Computer Science – 1 – Sample

SAMPLE QUESTION PAPER (2021-22)

COMPUTER SCIENCE (083)

TERM II

CLASS 12

Time: 2 Hrs                                                                                                                            Max. Marks: 35

GENERAL INSTRUCTIONS

Programming language is Python.

• This question paper is divided into 3 sections A, B and C.

• Section A has 7 Questions (1-7). Each question carries 2 marks.

• Section B has 3 Questions (8-10). Each question carries 3 marks.

• Section C has 3 case-based Questions (11-13). Each question carries 4 marks.

• Internal choices have been given for question numbers 7, 8 and 12.

SECTION A

Q.1 Write a function pop() which remove name from stack named “MyStack”

Q.2. i) Expand the following- HTTP, ARPANET

ii) What is MAC address? Give example also.

Q.3. What is the difference between Primary Key and Foreign Key?

Q.4. Explain the following results retrieval methods with examples. fetchone () rowcount ().

Q.5. Consider the following tables GAMES. Give outputs for SQL queries (i) to (iv). Table: GAMES

(i) SELECT COUNT(DISTINCT Number) FROM GAMES;

(ii) SELECT MAX(ScheduleDate),MIN(ScheduleDate) FROM GAMES;

(iii) SELECT SUM(PrizeMoney) FROM GAMES;

(iv) SELECT * FROM GAMES WHERE PrizeMoney>12000;

Q.6. i) Which keyword is used to remove duplicate records from relation.

ii) A table “Design” in a database has 5 columns and 2records. What is the degree and cardinality of this table?

Q.7. Write SQL query to create a table ‘Inventory’ with the following structure:

OR

Observe the following table and answer the part (i) and (ii) accordingly

(i) Write the names of most appropriate columns, which can be considered as candidate keys.

(ii) What is the degree and cardinality of the above table?

SECTION B

Q.8. Write a function in Python PUSH_IN(L), where L is a list of numbers. From this list, push all even numbers into a stack which is implemented by using another list.

OR

Write a function in Python POP_OUT(Stk), where Stk is a stack implemented by a list of numbers. The function returns the value which is deleted/popped from the stack.

Q.9. i) Why is it not allowed to give string and date type argument for Sum() and Avg() functions?

ii)There is column C1 in a table T1. The following two statements: select count(*) from T1; and select count(C1) from T1; are giving different output. What may be the possible reason?

Q.10. i) Sanghi created two tables with City as Primary Key in Table1 and Foreign key in Table2 while inserting row in Table2 Mr Sanghi is not able to enter value in the column City. What is the possible reason for it?

ii)The Pincode column of table ‘Post’ is given below

Find the output

i) SELECT Pincode from Post where Pincode LIKE ” %1″ ;

ii) SELECT Pincode from Post where Pincode LIKE ” 0%” ;

SECTION C

Q. 11.

i) Display the Trainer Name, City & Salary in descending order of their Hiredate.

ii) To display the TNAME and CITY of Trainer who joined the Institute in the month of December 2001.

iii) To display TNAME, HIREDATE, CNAME, STARTDATE from tables TRAINER and COURSE of all those courses whose FEES is less than or equal to 10000.

iv) To display number of Trainers from each city.

Q.12. i) Identify the type of topology on the basis of the following:

a. Since every node is directly connected to the server, a large amount of cable is needed which increases the installation cost of the network.

b. It has a single common data path connecting all the nodes.

ii) Define the following: (i) RJ-45

(ii) Ethernet

OR

What is protocol? Name 2 commonly used protocols.

Q.13. Riana Medicos Centre has set up its new centre in Dubai. It has four buildings as shown in the diagram given below:

Distances between various buildings are as follows:

A network expert, provide the best possible answer for the following queries:

(i) Suggest the type of network established between the buildings.

(ii) Suggest the most suitable place (i.e., building) to house the server of this organization.

(iii) Suggest the placement of the following devices with justification: (a) Repeater (b) Hub/Switch

(iv) Suggest a system (hardware/software) to prevent unauthorized access to or from the network