Plus Two Political Science Previous Year Question Paper 2016

Kerala Plus Two Political Science Previous Year Question Paper 2016

Question 1.
Which among the following is a Bangaladesh political party?
a) Seven Party Alliance
b) Awami League
c) Muslim League
d) Republican Party
Answers:
Awami League

Question 2.
Nation-building was a real challenge to the rulers of India immediately after independence. Find out the major challenges and prepare a note on it.
Answers:
independent India faced three kinds of challenges.
a. Integrating India
b. Ensuring the welfare of the people and development
c. Establish the democratic system

a. Integrating India: When India got freedom, it had more than 500 Princely States, The rulers of these places wanted to get back their sovereignty when the British left. The government approached the Princely States keeping three things in mind

a. The majority of people of the Princely States wanted to join Indian Union.
b. Giving some kind of self-rule to some Princely States.
c. In the background of the division, we needed States with precision.

Integration: Except Junagarh, Hyderabad. Kashmir and Manipur, all the Princely States signed in the Instrument of Accession and joined the Indian Union. Then through a referendum, Junagarh joined Indian Union. Because of popular uprising in Hyderabad against the Nizam, the Indian army took some action and got Hyderabad also into the Union. The Congress Group in Manipurwanted to join the Union, but other parties objected. However, the Manipur king was persuaded and he too joined the Union. Kashmir King also signed the Instruction of Accession to save himself from the attacks of Pakistan and thus Kashmirtoo became part of India.

The division of the country into States on linguistic basis showed that it could accommodate all the diversities. The people can accept the diversities and live in unity. This is the strength of a country. The Telungana protest and the martyrdom of Potti Sriramulu should be remembered here.

Ensuring the welfare of people: India was a poor country. The country has included provisions in the Constitution to ensure protection to the socially backward people, to religious and cultural minorities and to give all the people equality. Through Directive Principles, the Constitution shows us the way to eradicate poverty and to make the marginalized people come into mainstream society.

Five Year Plans: The country has a development model based on socialist principles. We have adopted a mixed economy accommodating both public and private sector enterprises.

Establishing democratic system: Democracy was a discovery of foreigners. But the big thing was that we chose democracy in spite of the fact that India is a poor country and there are many illiterates here. The first election was called the greatest gamble in history by foreign media. A British member of the Civil Service said that the future generations would condemn this democratic process as a foolish enterprise. The first Election Commission was formed with Dr. Sukumar Sen as the Commissioner. Illiterate Indians were supposed to think in terms of caste and creed. But by making a voters’ list based on our secular system and equality, we succeeded in conducting a fair election and we were successful in our democratic experiment Even after 70 years of Independence, we still face some challenges to our democracy. There are new demands for regional autonomy. There is the Maoist threat. There is intolerance, following the integration of Manipur. There is the Kashmir problem. In spite of all these we have been able to maintain our democratic tradition. After the 1975 Emergency, our rulers have been able to maintain the democratic order without any interruption.

Question 3.
The Cold War was not simply a matter of the balance of power between the superpowers. These were accompanied by a real ideological conflict.’ Examine the ideological conflict. (4)
Answers:

Cold War was not merely mattered of balance of power struggle between the Super Powers. It was also a clear conflict of ideologies.

After WW II, America and Russia became the world’s two super powers. Their ideologies were different. Russia supported Communist Socialist ideology whereas America backed Liberalism and Capitalism. Both had stockpiled destructive nuclear weapons. They could have shown their power anywhere in the world. But their rivalry was limited to the Cold War. Without actually going into any active war, they both tried to extend their spheres of influence. After WWII they became bitter rivals and were poles apart.

Question 4.
Name the first Election Commission of Independent India. (1)
Answers:
Sukumar Sen

Question 5.
The first General Election in India was the first big test of democracy.’ Why is it said so? Identify any three major reasons behind this. (4)
Answers:
a) The first election on the basis of Constituencies, after the Constitution came into effect, was the first experiment in a country which had different regions, language, and religions.
b) It was the election after India’s division and the Hindu Muslim riots.
c) It was an election that would determine the relevance and validity of parliamentary democracy. Because of all this, the first election was really a test of Indian democracy.

Question 6.
The disintegration of Soviet Union had profound con-sequences over world politics. Make a summary of the consequences. (4)
Answers:
The failure of the Soviet Union made many of its constituent countries abandon Communism and follow democratic ways. Russia, Asian countries, Easer European countries etc were attracted to wards organizations like the World Bank and IMF.

  • The main purpose was to make communist countries follow the capitalist model.
  • Private capital would be very important.
  • Cooperative farming will give way to private farming.
  • Foreign investment, open market system, and currency exchange would be possible,
  • The countries of the erstwhile Soviet Union will have the facility to have contact with Western countries and trade with them.
  • Using all these, the Western countries made the member countries of the erstwhile Soviet Union come close to them.

Results:

  • Many big industries under government control collapsed.
  • 90% industries were sold to individuals or private companies.
  • The Russian Currency Rouble was devalued.
  • Because of inflation people lost the value of their savings.
  • In Cooperative farming, people had food security. But now it was not there. Russia had to import food grains,
  • In Russia, the GDP in 1999 was less than that of 1989.
  • The social welfare schemes were abandoned.
  • As subsidies were withdrawn, many people experienced poverty.
  • Educational and intellectual human resources were scattered and many people emigrated.
  • Privatization made economic’inequality among people.

Question 7.
The opposition parties in India criticize “our Prime Minister is a frequent visitor of America and is making friendship with America. It is a strong deviation of India’s independent foreign policy”. What do you feel about the criticism? Do you accept it or not? Express your views.
Answers:
India had always followed an independent, neutral foreign policy. It was such a stand that Nehru started by giving leadership to the Non-Aligned Group of Nations. But slowly this attitude got changed, and our foreign policy began to lean in favour of America. There yvere also instances of criticism against this. Showing preference to a particular Nation is against our neutral stand. The best policy is to keep equidistance from all.

Question 8.
Name the following:
a) The new name of Planning Commission in India,
b) The strategy adopted by the Government of India to ensure food sufficiency. (1)
Answers:
a. Niti Ayog
b. Food Safety Scheme

Question 9.
China has been the fastest-growing economy and is the driver of the East Asian growth’. Analyse the statement and find out the policies adopted for this. (8)
Answers:
China became the fastest growing economy in the world. It is the development model in China’s planning that helped it to succeed. Heavy investment in the area of production made China grow. The biggest consumer market in the world today is China. In 2001, China became a member of the WTO. China has independent trade treaties with Australia, South Korea, ASEAN, Switzerland and Pakistan.

Question 10.
Do you think that land reforms are essential in Indian conditions? Why or why not? Express your views. (4)
Answers:
I think so. Although India tried to introduce land reforms, only in very States like Kerala, they became successful. In the North Indian States, the ownership of the land is still with the rich landlords. This condition must change. The agriculturist and those who actually work on the land should own the land. The landlord-tenant system must go. The land of those who have excess beyond a certain limit should be taken away from them and distributed among the poor for agriculture. To make this happen, land reforms are a must.

Question 11.
Recently our Prime Minister Sri. Narendra Modi de-manded the restructuring of UN and India’s permanent membership in the Security Council. Based on this demand examine India’sstrengh and weakness for the membership. (5)
Answers:
The demand of India to be a Permanent Member of the Security Council is quite a logical and legitimate one. India fulfills all the criteria to be a permanent member. It demands permanent membership on the following grounds:

  • It has the world’s second-largest population.
  • It is the largest democracy in the world.
  • India has participated in the UN activities since its inception.
  • It has long relations with the UN Peacekeeping force.
  • India’s economic situation is improving.
  • India gives regularly to the UN budget. It has never defaulted cn any payment.

The above reasons are good enough for India to get a permanent membership in the UN Security Council. Permanent membership has its own significance. India’s importance will increase in world matters. Our foreign policy will influence others.

Question 12.
Nehru has been treated as the ‘Architect of Modern India’. Examine his vision in the formation of India’s foreign policy. (4)
Answers:
The world was going through very difficult circumstances when India got her freedom. This situation has influenced our foreign policy. Five factors have influenced our foreign policy in a greater measure.

  • The II World War and the rebuilding after that.
  • The efforts to form an international organization.
  • The emergence of many small nations at the end of colonialism.
  • The challenges the new Nations faced for democracy and welfare.
  • The Cold War between America and Russia because of ideological differences.

Question 13.
Contemporary world faces new sources of security threats in diversified forms. Identify any two of them and describe the features. (2)
Answers:
Security threats are of a different kind now. They can be categorized as follows:
1. Terrorism: Political attacks make the life of ordinary citizens difficult. The terrorists want the political circumstances to change. They try to bring about changes by threats or armed attacks. By unleashing violence, they make the people restless. They try to make the dislike and discontentment of the people their weapon against governments. Their activities include hijacking planes and bombing trains and markets and other places where people assemble. They attacked and destroyed the World Trade Centre in New York on 11 September 2001. The government and the people are more cautious now against terrorists.

Human Rights: We see that throughout the world there are human right violations. There is no unified thinking in any country about how to protect human rights. Recent incidents of human right violations are the annexation of Kuwait by Iraq, the ethnic cleansing in Ruanda and the mass killings of the people of Eastern Timor by the Indonesian army. All these prompted world leaders to have a talk. The talk was about whether the UN should interfere in such matters. The matter is still unresolved.

3. Global Poverty: This is another factor of security threat. It is believed that the population in the underdeveloped countries will triple in 50 years In countries where the population is low, the per capita income will be high. Therefore the economically advanced countries will prosper further whereas the poor countries will grow poorer. The gap between countries of the North and South will increase. People from the South countries immigrate to the North countries for better life and earning. This also creates a threat for the security of mankind.

4. Contagious Diseases: Contagious diseases are another threat to mankind. AIDS, bird flu, SARS (Severe Acute Respiratory Syndrome) etc. are dangerous contagious diseases. These spread quickly from one country to another. A country’s success or failure in controlling these diseases affects other countries also. Recently swine-flu spread all over the world. It is when a problem becomes a threat to a nation and its people that it becomes an international security threat.

Question 14.
Some of the political leaders and their ideas are given below. Match them correctly;
a) Lai Bahadur Sasthri – Non – Congress
b) Ram Manohar Lohia – Syndicate
c) Indira Gandhi – Jai Jawan Jai Kissan Garibi Hatao (3)
Answers:
a. Lai Bahadur Sastri – Jai Jawan Jai Kisan
b. Ram Manohar Lohia -Non-Congressism
c. Indira Gandhi – Garibi Hatao

Question 15.
The last decade of 2CF Century witnessed some developments that were to make a long-lasting impact on Indian Politics Locate any two of them and examine its impact. (4)
Answers:
Babri Masjid was demolished. This caused religious riots and division. There was administrative instability in the country.
Nuclear Test and the bickering with Pakistan.

Question 16.
The national emergency at once brought out both the strength and weakness of Indian democracy.’ Narrate the strength and weaknesses that you noticed. (4)
Answers:
The following things will show the strength of Indian democracy. First, it was proved that democracy can’t be destroyed in India. Second, the vagueness or ambiguity of this article in the Constitution was removed. Internal Emergency could be declared by the President with the approval of the Cabinet only when there was an armed revolution in the country. Third, it evaluated the freedom of a citizen. After the Emergency, the Court took measures to ensure the fundamental rights of the citizens. Finally many citizens’ right groups were formed.

The Emergency also shows some weaknesses of our Constitution. First, the tensions that happen between the vested interests of the political parties and the running of the government. It was the police and the bureaucrats that implemented the Emergency. They were not able to function independently. Often they had to function as the yes-men of the ruling parties. Even now this problem is persisting.

Question 17.
Now-a days globalisation affected almost all spheres of our daily life. Do you think that it affected the ‘welfare state concept and state sovereignty’? Substantiate your views. (3)
Answers:
The concept of globalization is the exchange of ideas, materials and human resources. Now this exchange is possible among nations without much control. Looked at this way, it assumes different levels of political, economic and cultural meanings. In his sense it has merits and demerits. Some societies may be affected only very little, but some may be affected much more. Let us see how it works: Political results: Politically speaking, the authority of the government gets weaker. It will have to reduce its welfare schemes, instead of social welfare, the stress is on the market. With the coming MNCs (Multi-National Corporations), it becomes difficult for the governments to take independent decisions. According to the advocates of globalization, no political power of the government is lost. The essential things will remain under the authority of the government. Since technology has advanced so much, governments can do a lot. Technology helps governments to know the details of their citizens and make the administration efficient.

Economic Results: Globalization has influenced the economic sphere greatly. World Bank, IMF, WTO etc. play big roles. All these are controlled mainly by America and its allies. The world economy itself has come under their influence. In this, a re-thinking is necessary. It is high time that we found out who the beneficiaries of globalization are.

As a result of globalization, import controls are reduced or removed. The developed nations can now invest their capital in the developing nations. Investing in developing nations is more profitable. Technologies develop without any limits of borders. But regarding the movement of people, the developed nations have made certain rules. Their countries are kept safe from foreign workers through the policy of Visa. Because of the visa rules, the jobs of their citizens are not taken away by emigrants.

There are arguments in favor and against economic globalization. Although the policy is the same, different places get different results. Those who think of social justice can look at the limitations on government only as a demerit of globalization. Those who economically backward need some special security not to suffer from the demerits of globalization. Some people believe that globalization makes poor people poorer and so it must be stopped. But globalization brings about huge economic growth and the social welfare of many. Large scale commerce makes the economy better. It is not easy to prevent globalization in the forward march of history.

Globalization is the exchange of ideas, materials and human resources. Now this exchange is possible among nations without much control. Looked at this way, it assumes different levels of political, economic and cultural meanings. In his sense it has merits and demerits. Some societies may be affected only very little, but some may be affected much more. Let us see how it works. Politically speaking, the authority of the government gets weaker. It will have to reduce its welfare schemes. Instead of social welfare, the stress is on the market. With the coming MNCs (Multi-National Corporations), it becomes difficult for the governments to take independent decisions.

Globalization has influenced the economic sphere greatly. World Bank, IMF, WTO etc. play big roles. All these are controlled mainly by America and its allies. The world economy itself has come under their influence. In this, a re-thinking is necessary. It is high time that we found out Who the beneficiaries of globalization are.

The effects of globalization are not limited to political and economic spheres. It affects our home, food, dress and even thoughts. There is a fear that it would lead to a single world culture. There is the dominance of Western Culture in globalization. There is a danger to traditional cultures. But some people say that culture is not something that stands still. Every culture accepts things from other cultures.

Question 18.
Some of the popular movements in India are given below, Pick out the suitable places from the bracket and match them correctly.

  1. Chipko Movement
  2. Anti-arrack Movement
  3. Bharathiya Kissan Union (Meerut, Gujarat, Andhra Pradesh, Uttarkhand, Madhya Pradesh)

Answers:

  1. Uttarakhand
  2. Meerut
  3. Andhra Pradesh

Question 19.
Kashmir issue is not just a dispute between lndia& Pakistan. The issue has external and internal dimensions. Identify these dimensions and analyse its role.
Answers:
When India got independence, Jammu-Kashmir was a Princely State. Initially, King Raja Hari Singh refused to join either India or Pakistan as he wanted to remain independent. The Pakistani leaders believed that since Jammu-Kashmir had a lot of Muslims, it would join Pakistan. The people there were known as Kashmiris. Under the leadership of Sheikh Abdulla there was an agitation to remove the King from power. •But he also did not want to join Pakistan. National Conference was a secular organization. It was also pro-Congress. In October 1947 Pakistan encouraged some tribal groups to capture Pakistan. Then the King sought assistance from India.

The King signed the “Instrument of Accession” and so the Indian army helped the Jammu-Kashmir King. There was also a condition that when things become normal there would be a referendum. For the welfare of the people Sheikh Abdulla became the Prime Minister. India granted J&K autonomy.

External and Internal Squabbles: Because of external and internal problems, J&K is always in the midst of crises. On one side there is Pakistan claiming the Kashmir Valley. After the 1947 War, a part of Kashmir came under Pakistani control. India calls it illegal occupation. Pakistan calls this area Azad Kashmir. Internally also the Kashmir problems . is a headache for the Centre. According to Article 370, Kashmir is given greater autonomy than other States. This Article is applicable only to Jammu and Kashmir. The special congestion causes problems.

Many believe that this autonomy given to Kashmir will adversely affect the unity and indivisibility of the country. They feel that Article 370 should be removed. But the Kashmiris feel that the autonomy they got by Article 370 is not enough. Some Kashmiris put forward 3 complaints.

  1. No referendum has taken place so far.
  2. The status promised by Article 370 is only on paper, not in practice. They need more autonomy.
  3. They also say that the kind of democracy implemented in other States of India is not found in J&K.

Politics since 1948: After Sheikh Abdulla became the Prime Minister of Kashmir, many land reforms and other welfare measures were taken to help the masses. But there was a difference of opinion between him and the Central Government. He wanted Kashmir to be completely free. So the Central Government dismissed him and kept him in jail for some time. His successors did not get popular support but they administered the region with Central support. The Kashmiris slowly started believing in democracy. According to the agreement between India Gandhi and Sheikh Abdullah, in 1974, he became the Prime Minister. He died in 1982.

RESISTANCE AND LATER: In the 1987 election the National Conference won with a huge majority. Farukh Abdulla became the Chief Minister. Many believed that he did some manipulations in the election. From 1980, there have been protests against weak governments there. Some people believed that it was the Centre which made this huge majority possible. It led to the Kashmiri crisis. There was resistance. In 1989, there was an armed struggle for making Kashmir independent. The insurgents were assisted by Pakistan. For many years, J&K was under Presidential rule. Even as there was strong military presence there, from 1990 there have been frequent clashes between the army and the people who resisted Indian rule. Farooq Abdulla’s government also demanded greater autonomy. In 2002, there was another election. Instead of the National Conference, a PDP Coalition Government came to power. Secession Movement And After:

The secessionist movement (1969) appeared in many shapes and it took different stances. Independent Kashmir without joining either India or Pakistan. A group demanding merger with Pakistan. A group demanding greater autonomy.

The demand for greater autonomy attracted the people of Jammu and Ladakh in different ways. Often there were complaints against neglect and backwardness. The Central Government discussed the issue with different groups. The secessionists now say that even as they stay with India, they should be given more autonomy.

Question 20.
Both India and Pakistan became independent nations in the same year. But Pakistan failed to build a stable democracy like India. Describe any three major factors for such failure. (3)
Answers:
Until 1971, Pakistan and Bangf^desh were one country and their experiences were the same. When Pakistan made its first constitution, General Ayub Khan assumed power and through election he became the President. As the people were unhappy, he had to leave office. Again there was military rule under Yahya Khan. It was during his rule that Pakistan faced the Bangladesh crisis. In 1971, after Pakistan’s war with India, Bangladesh was separated and it became an independent country. After the independence of Bangladesh, democracy was restored in Pakistan and Zulfikar Ali Bhutto became the PM. Democracy continued until 1977 when Bhutto was overthrown by Zia-ul-Haq.

In 1988, under Benazir Bhutto democracy came back. Until 1999, democracy existed in Pakistan under the Pakistan People’s Party. Then there was Muslim league rule under Nawaz Sheriff. Again the military under General Musharaf removed Sheriff and Musharaf became the President. He continued until 2008. In 2008, Sheriff and Benazir Bhutto returned to Pakistan. During an election rally, Benazir Bhutto was killed by an extremist. Then a Ministry was formed by a coalition of the Muslim League and PPP. Yusuf Raza Gilani was the PM. Soon they elected Asif Ali Zardari as the President. Now Pakistan has a democratic government.

It is because of the following reasons that Pakistan does not have a stable democracy:

  • Interference by the army, priests and landlords in the administration.
  • Because of the dispute between India and Pakistan, the Pakistani army acquired great power.
  • Lack of international support for the democratic governments often helped the military to come to power.
  • America and some other Western countries prefer a military government in Pakistan. They are afraid that democracy there would make Muslim extremism grow and the extremists might get control over the nuclear weapons in the possession of Pakistan. They think military rule is better for the safety of the Western and Southern Asian regions.

Experience of Bangladesh in Democracy: Until 1971, it was part of Pakistan. During the British rule, Bangladesh was part of Bengal and Assam. Because of the following reasons, they were dissatisfied with West Pakistan:

  • Supremacy of West Pakistan and imposing Urdu ‘ on them.
  • Neglect of Bengali culture and looking at it as inferior.
  • East Pakistan was not given proper representation in the administration and politics.

All these things caused Sheikh Mujibur Rehman to lead a protest against Pakistan. His Party was the Awami League. It won all the seats in East Pakistan. It won majority in the whole of Pakistan’s Constituent Assembly, but West Pakistan was not willing to approve it. Mujibur Rehman was arrested. West Pakistan sowed fear in the minds of East Pakistanis. But in 1971, with the help of India, Bangladesh was freed.

Bangladesh accepted a secular, democratic, socialist constitution. In 1975, Mujibur Rehman brought Presidential rule. He banned all political parties except the Awami League. This caused many disputes and tensions. As a result the army gained power and Mujibur Rehman was assassinated. Under the new army commander Zia-ur-Rehman, a national party was formed. In 1979 that party won the election. But Zia-ur-Rehman was killed. Then military rule came under Lt. General H.M. Ershad. Because of students’ protests, he had to allow some politics. Then he was elected as the President for 5 years. In 1990, because of the opposition of the people, Ershad had to quit office. In 1991, there was election. From then democracy is continuing there in a multi-party system.

Question 21.
Match the following:
a) Global commons – First World
b) Rio Summit – Atlantic Treaty
c) Global South – Agenda 21
Third World
Answers:
a. Global Commons-Atlantic Treaty
b. Rio Summit-Agenda 21
c. Global South – Third World

Plus Two Political Science Previous Year Question Papers and Answers

Plus Two Political Science Previous Year Question Paper 2017

Kerala Plus Two Political Science Previous Year Question Paper 2017

Maximum Score: 80 Scores
Time: 2 1/2 Hours
Cool- Off Time : 15 Minutes

Question 1.
The collapse of the Soviet Union had profound consequences on world politics. Describe the factors responsible for the disintegration of the Soviet Union. (4)
Answer:

  • The control exercised by the Soviet government on its citizens made their life difficult.
  • There was no freedom of expression or democracy.
  • Many institutions needed reforms. But the Communist Party strictly controlled them and reforms were not possible.
  • The Party refused to give people their rights. The Soviet Union was a Union of 15 Republics. They had their own cultures and problems.
  • Although on paper there were 15 Republics, only Russia was allowed to exercise control. Russia dominated the other republics and the people of the other republics were either ignored or suppressed.
  • Although the Soviet Union was able to maintain its equality with the US in an arms race, it was very costly for them. Western technology was better than the Russian technology. The political and economic needs of the Soviet people were not taken care of by the Soviet government.
  • The Soviet Union used most of its resources to develop atomic weapons, to make arms, to increase military facilities and to develop its satellite East European countries,
  • The go-slow policy, refusal to correct mistakes and the closed-door policy quickened the country’s downfall.

Question 2.
Name the political leader who captured the power in Cuba during 1959 and died in November 2016.
Answer:
Fidel Castro

Question 3.
Names of some countries are given below. Arrange them properly in the given table.
Plus Two Political Science Previous Year Question Paper 2017 1
Plus Two Political Science Previous Year Question Paper 2017 2
Answer:

Capitalist Block MovementCommunist BlockNon-Aligned
The USAThe Soviet UnionIndia
BritainChinaBangladesh

Question 4.
Define the concept of Globalization. Discuss different arguments in its economic aspect. (4)
Answer:
Globalization is the process by which the entire world 7 becomes one small village without any boundary restrictions and controls. The basic concept of globalization is the exchange of ideas, materials and human labour. Looked that way, it as political, economic, and cultural implications at different levels. in this sense, it has positive and negative results.

Question 5.
Alliance and counter alliance destructed the world security system in the past. Suggest two traditional conceptions of security and give a brief explanation on them. (4)
Answer:
Security is of two kinds – internal and external. A country may face security threats from inside or ‘ outside the country. Traditionally we think threats from outside are the greater ones. It will affect the sovereignty of the nation. It will affect its freedom
and border security. It will affect the lives of the people.

Such a threat is external. There are many ways for a government to face such treats:

  • Surrender
  • Increase defence expenditure and prevent others from attacking.
  • Once the war starts, defend the country.

Some governments prefer the option of surrender when there is a war. But they will never declare it as a policy. For security there are 4 traditional ways:

  • Prevent the war-this is the first factor.
  • Defence – control the war or end it.
  • Balance of Power

This is a traditional way of ensuring security. Making alliances and counter-alliances, maintaining the country’s strength, intervening and not intervening, leaving a no man’s land between countries, dividing and ruling, etc. are of the traditional ways.

  • Sign Treaties: Nations often form joint alliances.

This is done to prevent any external attack and ’ defend in case of attacks. Almost all alliances are formed by signing written agreements. The member countries will have a clear understanding as to who is the common enemy. Nations are more concerned with external threats than internal ones. Internal security is also essential. Prior to the World War, the internal security of many powerful nations was much less because they did not give it much importance. Because of the Cold War, nations gave preference to external threats. It was in the colonies that there were more internal security problems. It was because of people’s desire for freedom. The newly formed Asian and African countries had to face a lot of internal and external threats. Military attacks by neighbouring countries, army revolts, moves for secession etc. were common. Whenever a nation desires for freedom, such things are common there.

Question 6.
Choose the first Secretary-General of UNO from the following: (1)
a) Kofi A. Annan
b) U Thant
c) Trygve Lie
d) Ban Ki-moon
Answer:
Trygve Lie

Question 7.
UNO stands for International Peace and Security. Name the principal organs of UNO. (3)
Answer:

  • General Assembly
  • SecurityCounc.il
  • Economic and Social Council
  • Secretariat
  • Trusteeship Council

Question 8.
Identify any two objectives of SAARC and list out any four member nations of SAARC. (4)
Answer:
Aims:

  • Ensure the welfare 0 the South Asian Nations/
  • Strengthen cooperation

Member Countries
India, Nepal, Pakistan, Afghanistan, Bhutan, Bangladesh, Sri Lanka, Maldives

Question 9.
Define the concept ‘Global Commons’. Differentiate the approach of North and South on it. (3)
Answer:
Some places or areas do not fall under the sovereignty of any country. In this condition, the UN had to come forward to protect them. These are collectively known as Global Commons. The earth’s atmosphere, Antarctica, the bottom of the seas, space, etc. come in this category.

Global North (Countries of the Northern Hemisphere) represents the developed nations. The Global South represents the developing nations. The approach of both these groups regarding the environment is very different. They are:

a) The Global North says that ail countries are equally responsible for the protection of the environment.
b) But the Global South has a different view. They say that it is the industrial development of the Global North that caused and is causing environmental damage.
c) Developing nations are, on the path of progress. Therefore the restrictions placed on the developed nations should not be made binding on the developing nations.

The developing nations say that keeping their needs in mind, there should be new laws and interpretations This argument was approved in the Earth Summit in 1992. This new principle is called “Common but different responsibility”.

Question 10.
The Indian Independent Act in 1947 divided India into two nations, but the division was very difficult to implement. Try to find out the difficulties of partition. (6)
Answer:
The division of India was carried out on the basis of the Two-Nation Theory put forward by the Muslim League. According to that theory, in India there were two nations – the Hindus and Muslims. Therefore the Muslim League demanded a separate nation, Pakistan, for the Muslims. The formation of Pakistan was based on the majority of the population of an area. Thus the areas which had Muslim majority became Pakistan and the remaining areas remained as Indian Territory. It was not easy to implement such a division. There were three reasons forthat. First of all in British India, there was not a single area which had only Muslims. There were two areas in which the majority was Muslims, one in the West and the other in the East. Therefore Pakistan was formed consisting of two areas – West Pakistan and East Pakistan. Between them there were large areas of Indian Territory.

Secondly, not all areas with majority Muslim population wanted to become part of Pakistan. Khan Abdul Gaffer Khan, who was the leader of the North-Western Province, had objected to the Two-Nation Theory. But ignoring his objection, the North West Province was included in Pakistan.

The third problem was that British India’s Punjab and Bengal were areas with Muslim majority. But in these huge provinces there were very many non-Muslims. Therefore the Provinces were divided into Districts and Panchayats depending on the religious majority of the population there. The result was that on the day of Independence many people did not know to which country they belonged – India or Pakistan. It deeply wounded the people. The problem of the minorities in each country was the worst of all. The Hindus and Sikhs in the Pakistani areas and the Muslims in Punjab and Bengal were unfortunate preys to this division of the country. When the division was decided upon, there was large scale violence against the minorities in both the countries.

Question 11.
‘Second Five Year Plan was the turning point in the industrial history of India.’ Discuss the above statement. (4)
Answer:
Following Independence, India embarked on Five Year Plans, following the model of the Soviet Union. In 1950, the Planning Commission was established. In 1951, the first Five Year Plan was started. The first Five Year Plan gave stress to the Agricultural sector. But the 2nd FYP stressed the industrial sector. The 2nd FYP period was from 1956 to 1961. During this period many industrial undertakings were started in India. Electricity, Railway, Steel Industry, Communication facilities etc. received special attention. The 2nd FYP was capable of letting India make a big fi&p in the industrial sector. The basis of this 2nd Plaiyyas the ideas of P.C. Mahala no b is.

Question 12.
Match the following. (4)
Plus Two Political Science Previous Year Question Paper 2017 3
Answer:
a) Lai Bahadur Sastri-Jai Jawan Jai Kisan
b) Ram Manohar Lohia – Congress-Socialist Party
c) V.V. Giri – Former President of India
d) Indira Gandhi-GaribiHatao

Question 13.
The Mandal Commission report implemented by V.P. Singh Govt was an important landmark in the political rise of Other Backward Classes. Find out the important recommendations of the report. (3)
Answer:
Since the 1960s, the South Indian States had made reservations for Other Backward Classes. But this was not done in the Northern Regions. In the 197779 periods, this demand became very strong throughout the country. In 1978, the Janta Party appointed Mr Bindeswari Mandal to find out the groups which are socially and educationally backward and study about their condition. This Commission is known as the Second Backward Commission. This Commission was appointed with the intention of solving the backwardness of certain sections of the society.

In 1980, this Commission presented its report. According to the Commission, the Backward Sections were to be Backward Classes. Apart from the Scheduled Tribes, there were many other classes which should be considered Backward. According to a survey conducted by this Commission, it was found out that their representation was very low in education and jobs. Therefore it recommended t give 27% reservation to these Backward Classes. With the coming of the land reforms, their condition has become much better.

Question 14.
Jawaharlal Nehru played a key role in making the Foreign Policy of India. Examine the basic principles of the Foreign Policy of India. (6)
Answer:
The role of Nehru: Nehru was the Prime Minister and Foreign Minister of India from 1946 to 1964. He had a big role in the formulation of our foreign policies. He followed a policy which was conducive to the maintenance of our sovereignty, protection of our boundaries, our unity and our economic growth. It was with all these in his mind, he became one of the chief architects of the Non-Aligned Policy.

Keeping equidistance from both the superpowers. As the Cold War was going between the superpowers, we wanted world peace.

For that we:

  • continued with our non-aligned policy.
  • tried to reduce the tension of the Cold War.
  • supplied manpower for the peaceful missions of the United Nations.

As a newly independent country, India could not claim any big political power. Therefore India decided to keep away from the on-going Cold War between the superpowers. The Non-Aligned Policy helped us to do that. It was difficult for India to maintain this non-aligned stance always. When the British attacked Egypt and Russia attacked Hungary, we could not stick with our non-aligned stand. But in many . international problems India maintained an independent stand. India received help both from the „ USA and also Russia on different occasions.

Question 15.
Indian National Congress established its domination in the first three general elections in India. Evaluate the performance of Congress Party in 1952, 1957 and 1962 elections. (4)
Answer:
In all the 3 general elections after independence, the Congress won brutal majorities. There were some reasons for that.
1) Congress had led the Independence to struggle.
2) Congress was the only party which had spread all across India.
3) The popularity of Jawaharlal Nehru Because of all these reasons, Congress had expected victory. When the final results came, the astounding success of the Congress Party surprised everyone. It made all other parties lag much behind. It won 364 out of the 489 seats. The same was the case in the States. The exceptions to this were Travancore-Cochin, Madras and Orissa.

In the later two elections (1957,1962) also Congress repeated its success. Some people thought the victory of the Congress Party was because of the system of our election. This system was progress. Although 3 out of 4 seats were won by the Congress, it did not have even the support of 50% of the voters. The votes polled by other parties were more than the votes polled by Congress. Now in this seminar, we examine how the votes and dominance of Congress became a landmark in the history of the country.

The dominant nature of Congress: The dominance of Congress in India was an unusual event in world history. In many other countries, democracy was not allowed to take roots. In countries like China, Cuba and Syria the Constitution envisaged a one-party rule. But in India, the Congress stood firm on the democratic principles and was able to form governments. Although different parties competed in the free and fair elections, Congress came out first. There were some reasons for the unusual success of Congress. It had the leadership in the freedom struggle. Secondly, it was the leaders who fought for freedom that stood as the candidates for election. Thirdly only Congress had a good organizational set up at that time. Only Congress had its presence in all the States of India and all this helped in Congress having the upper hand.

Question 16.
Regionalism is against the unity and integrity of a nation. Find out the factors responsible for the emergence of Regional Parties in India. (4)
Answer:
a) Strengthening of regional demands.
b) Lack of faith in the National Parties.
c) The lack of enthusiasm of the Central Government to solve regional problems.
d) The charisma of the local leaders who led the regional parties.

Question 17.
Explain briefly about the beginning of U.S. hegemony. Analyze the three different notions of U.S.hegemony relate them to contemporary international policies. (6)
Answer:
We know that no country today can match the power of America. But through certain policies we can overcome the hegemony of America, a) China, India and Russia should make a military pact.
b) To resist American hegemony, even as we acknowledge their superiority, get as many benefits from them as possible, c) Keep a safe distance from them. A kind of hide-and-seek will do us good.

Question 18.
First time in India a nor congress government came to power at the centre in 1977 election. Find out the reasons for the development of such a situation. (4)
Answer:
The 1977 election was a referendum after the Emergency. Even before the Emergency, public opinion had turned against the Congress government. Emergency made the people turn against the Party. The people made a slogan asking the Opposition to save democracy. The Opposition Parties joined together and became the Janata Party. They rallied under the leadership of Jay Prakash Narayan.

The Janata Party made the 1977 election a referendum. Their propaganda focused on the violation of people’s fundamental rights, the arrest of thousands of people and censorship imposed on the media. Jay Prakash Narayan became the symbol of democracy. With the coming of the Janata Party, the opposition votes would not get scattered among different parties. Because of these reasons, Congress lost in the election.

Question 19.
Anti Arrack Movement is recognized as one of the women movement in the country identify the issues which led to Anti Arrack Movement. (3)
Answer:
In the 1990s, many women in Nellur in Andhra became literate. In the class, women spoke about the drinking habits of their men-folk. Drinking alcohol causes both physical and mental harm. It also adversely affects the economic situation of the family. Men do not go to work. The manufacturers of various kinds of alcoholic beverages make money by using all sorts of illegal means. It is the women that suffer because of the drinking habit of men.

The women in Nellur protested against alcoholism and forced a wine shop to close down. This news spread like wildfire into some 5000 villages. They held meetings and passed resolutions and sent them to the Collectors. The arrack auction in Nellur had to be postponed 17 times. The protest in Nellur spread to the rest of the State.

Question 20.
ASEAN is one of the prominent regional organizations in South East Asia. Name the three pillars and main objectives of ASEAN. (4)
Answer:
a) ASEAN Security Community.
b) ASEAN Economic Community
c) ASEAN Socio-Cultural Community

Question 21.
Match the following.
Plus Two Political Science Previous Year Question Paper 2017 4
Answer:
a) Varghese Kurian
b) Anti Defection
c) Lai Denga
d) Nam Deo Dasal

Question 22.
Name the founder of Bahujan Samaj Party (BSP) from the following: (1)
a) B.P. Mandal
b) V.P. Singh
c) Kanshi Ram
d) Mulayam Singh Yadav
Answer:
c) Kanshi Ram

Plus Two Political Science Previous Year Question Papers and Answers

Plus Two Political Science Previous Year Question Paper 2011

Kerala Plus Two Political Science Previous Year Question Paper 2011

Question 1.
From the list given below identify the factors that influenced India to frame the foreign policy ideal “peaceful co-existence.” (2)

  1. Influence of Buddhism
  2. Fear of military strength of neighboring countries.
  3. Not to join power blocs.
  4. Influence of Gandhian non-violence.

Answer:

  1. The influence of Buddhism.
  2. Influence Gandhi’s principle of non-violence.

Question 2.
Expand the abbreviations given below: (3)

  1. SALT
  2. START
  3. CTBT

Answer:

  1. Strategic Arms Limitation Talks.
  2. StrategicArms Reduction Treaty
  3. Comprehensive Test Ban Treaty

Question 3.
From the table given below, name the States from which they were carved out. (3)

  1. Chhattisgarh – Maharashtra
  2. Uttaranchal – Andhra Pradesh
  3. Jharkhand – Bihar – Uttar Pradesh – Madya Pradesh

Answer:

  1. Chattisgarh – Madhya Pradesh
  2. Uttaranchal – Uttar Pradesh
  3. Jharkhand – Bihar

Question 4.
If we examine the State Politics in Kerala, Kerala has been practicing Coalition Form of Government successfully since its formation. Find out the factors for the success of a Coalition Government. Do you think that a Coalition is a good Government? Substantiate your arguments. (6)
Answer:
Coalition governments started in Kerala in 1960. In 1957 (CPI) and 1962 (Congress), there were single-party governments. Here are the features of the coalition governments of Kerala:

There is no political party that maintains permanent enmity with any another political party. At one time, Muslim League had worked with Communist groups. Kerala Congress is a regional party. It has many groups and all of them have aligned themselves with both the Left and Right Fronts. It was the Achutha Menon Ministry that completed its fuil term for the first time. Even when some highly useful bills are enacted some parties create problems Tor the majority ruling party making the government collapse. In the 1960s and 70s, there were Ton- political, but influential organizations like the SNDP and NSS trying to help bring stability in the governments. The golden period of Kerala’s coalition governments is the Achutha Menon Ministry of 1970. The various political parties of Kerala do not have a stable and fixed ideological base. The best example of this instable ideological base is the Kerala Congress Groups which come in and go out of Ministries, both Left and Right. Sometimes they are here and sometimes they are there.

Question 5.
“A new balance between environmental concern and industrial needs is needed.”
“Sustainable development is not possible without protecting the environment.”
In light of the above statements, state your arguments for sustainable development without compromising environmental protection. (4)
Answer:
In modern times, ‘development’ should be seen as sustainable development. The traditional concepts of development were based on the growth of industries,, in the statistics about per capita income. But in the 1992 Rio Summit, the UN presented before the world “Agenda-21 ” which is a different development mode!. It is sustainable development Let us see how sustainable development is possible without harming our environment.

a. Give priority to non-traditional energy sources. Here we give stress to wind, waves and solar power to produce energy.
b. Avoid plastic waste and things like plastic bags. Make use of things that can be used again and again.
c. if deforestation is done for the development of roads and industries, plant trees in more places to compensate for the deforested land.
d. Ensure that the marshes and watersheds are maintained and protected.
e. Make sure that common resources of the world like; air and water are not polluted. Enforce anti-pollution laws.

People must realize that this earth belongs to future generations also and therefore steps must be taken to insure that it is not polluted. There should- be awareness programs on the part of the governments.

Question 6.
After the Second World War, nations are grouped under two power blocs – one under USA and other under USSR. List out the factors responsible for this Bipolarity. (4)
Answer:
After the Second World War, nations joined either the Soviet Bloc or the American Bloc. Beyond an ideological grouping, this polarization could be seen as a means of strengthening the economic and military power of the Superpowers, Let us see in which areas they tried to make their supremacy felt:

(a) Taking control of the natural resources: America and Soviet Union competed among themselves to keep developing countries with oil, natural gas, rare minerals and other resources in their group.

(b) The Superpowers wanted venues to store their arms and strategic spots from which they could use them against enemy countries.

(c) The Superpowers wanted friendly countries around from which they could spy on the movements of their enemies.

(d) In a war-like atmosphere, the Superpowers wanted to make huge profits by selling the destructive weapons they manufactured to various countries. All these were the reasons for the polarization,

Question 7.
From the list given below, find out the institutions which are not the principal organs of U.N.O (3)
(1) General Assembly
(2) World Health Organisation
(3) Security Council
(4) Economic and Social Council
(5) United Nations Educational Scientific and Cultural Organization (UNESCO)
(6) United Nations International Children’s Emergency Fund (UNICEF)
Answer:
(a) World Health Organization.
(b) United Nations Educational, Scientific and Cultural Organization
(c) United Nations International Children’s Emergency Fund

Question 8.
Interstate relations in the Post-Cold War era have been subjected to many changes in power relations. Examine them on the basis of the hints below. (4)
(1) Imperialism
(2) Disintegration of Communist Bloc
(3) American Hegemony
(4) Weak ness of Non-Alignment Movement
Answer:
With the end of the Cold War, the dangerous power struggle between the Superpowers ended. Both Paper March – 2011 America and Soviet Union desisted from their desire to bring third-world nations under their control. An internal economic crisis rocked the Soviet Union, In his efforts to find solutions to the pressing problem, Gorbachev tried some reforms known as Glasnost and Perestroika. In fact, these policies led to the disintegration of the Soviet Union and the isolation of Russia as an economic power. The disintegration of the USSR began in March 1885 and by 1991, it was complete. Now it is the American hegemony. Estonia, Latvia and Lithuania came out of the Soviet Union and joined NATO. America has been eyeing at the rich hydrocarbon resources of some Asian countries and it is trying to build its army bases in some of these countries on a lease basis.

America now has three kinds of hegemony or dominance:
1. Dominance as a military power: American military presence is felt almost everywhere In the world and they sell military hardware to many developing nations.

2. Structural dominance: America has its omnipresence in the world through the Internet, the Breton Woods system that controls global economy and non-traditional educational disciplines like MBA and Fashion Technology. 15% of the world trade is done by America.

3. Dominance as a Soft Power: Ideological and cultural dominance is what is meant by soft power. America has been able to westernize consumerism in many countries. Today’s generation that prefers coca-cola to tender coconut water is in the grip of this Western soft power. With the collapse of the Soviet Union many people doubt the relevance of the NAM (Non- Aligned Movement) which was formed under the leadership of Nehru. Tito and Nasser. Today NAM is trying hard to become an economic power, it can make positive contributions in areas like global warming, production of carbon, poverty in Africa, proper utilization of international resources, terrorism and so on.

Question 9.
Identify the Commission which was appointed by the Government to enquire into Emergency Excess in 1977. (1)
Answer:
Shah Commission

Question 10.
Match the Country with the Leaders who are associated with Non-Alignment Movement. (2)
A – B
Ghana – Nehru
India – Nassar
Egypt – Nkrumah
Yugoslavia – Tito, Sukarno
Answer:
1. Ghana – Nkrumah
2. India – Nehru.
3. Egypt – Nasser
4. Yugoslavia – Tito

Question 11.
Independent India faced many challenges in nation-building process. Do you think that we have overcome ail these challenges? You can use the following hints to develop your answer. (7)
(1) Ensure the accommodation of Diversity
(2) Ensure Democracy
(3) Ensure Equality
(4) Ensure Development
Answer:
independent India faced three kinds of challenges.
(a) Integrating India
(b) Ensuring the welfare of the people and development
(c) Establish the democratic system

(a) Integrating India: When India got freedom, it had more than 500 Princely States. The rulers of these places wanted to get back their sovereignty when the British left. The government approached the Princely States keeping three things in mind.

  • The majority of people of the Princely States wanted to join Indian Union.
  • Giving some kind of self-rule to some Princely States.
  • In the background of the division, we needed States with precision.

Integration:
Except for Junagarh, Hyderabad. Kashmir and Manipur, all the Princely States signed in the Instrument of Accession and joined the Indian Union. Then through a referendum, Junagarh joined Indian Union. Because of popular uprising in Hyderabad against the Nizam, the Indian army took some action and got Hyderabad also into the Union. The Congress Group in Manipur wanted to join the Union, but other parties objected. However, the Manipur king was persuaded and he too joined the Union. Kashmir King also signed the Instruction of Accession to save himself from the attacks of Pakistan and thus Kashmirtoo became part of India.

The division of the country into States on linguistic basis showed that it could accommodate all the diversities. The people can accept the diversities and live in unity. This is the strength of a country. The Telangana protest and the martyrdom of Potti Sriramuiu should be remembered here.

Ensuring the welfare of people:
India was a poor country. The country has included provisions in the Constitution to ensure protection to the socially backward people, to religious and cultural minorities and to give all the people equality. Through Directive Principles, the Constitution shows us the way to eradicate poverty and to make the marginalized people come into mainstream society.

Five Year Plans:
The country has a development model based on socialist principles. We have adopted a mixed economy accommodating both public and private sector enterprises.

Establishing democratic system:
Democracy was a discovery of foreigners. But the big thing was that we chose democracy in spite of the fact that India is a poor country and there are many illiterates here. The first election was called the greatest gamble in history by foreign media. A British member of the Civil Service said that the future generations would condemn this democratic process as a foolish enterprise. The first Election Commission was formed with Dr. SukumarSen as the Commissioner. Illiterate Indians were supposed to think in terms of caste and creed. But by making a voters’ list based on our secular system and equality, we succeeded in conducting a fair election and we were successful in our democratic experiment Even after 70 years of Independence, we still face some challenges to our democracy. There are new demands for regional autonomy. There is the Maoist threat. There is intolerance, following the integration of Manipur. There is the Kashmir problem. In spite of all these we have been able to maintain our democratic tradition. After the 1975 Emergency, our rulers have been able to maintain democratic order without any interruption.

Question 12.
Ban Ki-Moon is the present Secretary-General of the United Nations. Identify the nation to which he belongs. (1)
(1) America
(2) South Korea
(3) Japan
(4) North Korea
Answer:
South Korea

Question 13.
From the list given below, find out the ultimate aim of the United Nations Organization. (1)

  1. Ensure international peace and security
  2. To avoid armament race
  3. Ensure economic stability

Answer:

  1. Ensuring international peace and security.

Question 14.
Nations face security threats. They may be traditional and non-traditional. Find out any five major security threats and prepare a brief note. (5)
Answer:
The concept of global security came in the 1990s. Based on this idea, the challenges countries and people face are called non-traditional treats. First, let us see the most important traditional threats:
a. Military attacks and annexations.
b. The presence of nuclear weapons, their testing and possible misuse.
c. Colonialism.

Non-traditional threats challenge even the existence of mankind and their living. Here are some of the important threats of this kind:
a. terrorism
b. contagious diseases
c. human rights violations
d. global warming
e. challenges that global resources face.

Question 15.
“History makes man wise”. Based on the above statement, bring out the lessons we learn from the National Emergency of 1975.
Answer:
The historical events help us to get greater insights. India got her freedom after constant agitations and sacrifices. Our Constitution stresses human rights. But we saw during the Emergency of 1975 that there were some provisions in the Constitution that could make the rights null and void. It was in this period that the people thought of the challenges to democracy and the precautions we should take to preserve our rights.

Question 16.
Match the following. (4)
A                 –            B
1. Chipko Movement – Agrarian struggles
2. Dalit Movement – Social Justice
3. Kissah Movement – Gender equality
4. Women Movement – Environmental Issues, Educational Issues
Answer:
a. Chipko Movement – Environmental Problems
b. Dalit Movement – social justice
c. Kisan Movement – agriculture protests
d. Women Movement – Gender equality

Question 17.
We have experienced several agitations for social justice by the marginalized sections. Do you think these agitations can ensure social justice? Express your opinion. (4)
Answer:
The protests of the marginalized people become relevant in light of the demands they make. Problems that are not
high lighted or rejected by the mainstream political organizations are often brought up by organizations of the marginalized people. Overcoming the narrow vote-bank politics, there have been some movements working for various needs of the people. These organizations work for environmental protection (Chipko Movement), for ensuring social justice (Dalit Panthers) and for gender equality (Women Movements). There was the Plachimada Protest (against exploitation of water resources). The Chengara Protest was against the situation in which people had to live on their own land as aliens.

All the above movements were for common public interests. Long before the Rio Summit took place for Environmental Protection, the illiterate women in the Himalayan villages had organized the Chipko Movement for the protection of their environment. It shows the importance of such movements.

It is not protests and movements that should bring social justice, but the government. The protests by various groups have highlighted the problems and governments have been made aware of their significance forcing them to make laws to ensure social justice.

Question 18.
In a class-room discussion, teacher pointed out that new forms of regionalism are emerging in India. Do you agree with this comment? Substantiate your arguments with suitable examples. (3)
Answer:

India, some new kinds of regionalism are coming up. In the name of “Son of the soil some movements have come up in Maharashtra and Coorg (Kutak) area. The statement of Sachin Tendulkar that Mumbai is the city of all Indians should be taken as a fitting reply to all such region-minded people.

The regional demands that took place in Punjab and the North-Eastern States sometimes degenerated into armed struggle and revolts. The Operation Blue Star of June 1984 and the consequent assassination of Indira Gandhi by her Sikh bodyguards can be pointed out in this context.

The long-standing satyagraha protest by Irom Urmila for recalling the soldiers from Manipur is also a proof of regional demands. (Very recently she stopped her satyagraha)

Question 19.
What can we do for the preservation of beautiful Earth for future generations? Suggest measures. (3)
Answer:
We should know that this beautiful earth belongs to future generations, too. The following suggestions may help:
a. Don’t overuse water. Protect the water sources from pollution.
b. Governments should stress sustainable development for prosperity.
c. Create the awareness that social justice is applicable to the environment also.
d. Let the intelligent man realize that just like him the flora and fauna of this earth have a right to survive here. .
e. Never forget that the earth’s resources will one day finish up. This awareness should come to those who exploit them and those who consume them.

Question 20.
After the disintegration of USSR, America became a power to dominate world politics. Examine the reasons for American Hegemony. (3)
Answer:
The most important points that helped American hegemony are:
a. Disintegration of the USSR and the rise of the Baltic countries.
b: The global interests and power of the Breton Woods system.
c. The military moves and attacks America makes to counter-terrorism.

Question 21.
Given below are certain regional groupings. State the purpose for which they are established. (4)
(1) NATO
(2) ASEAN
(3) SEATO
(4) European Union
Answer:
NATO: It is a military alliance that America formed to reduce the power of the Soviet Union and to prevent the spread of Communism.

ASEAN: This is a fellowship of the South East Asian nations. It started with the declaration in Bangkok in 1967. The members of ASEAN are: Indonesia, Malaysia, Philippines, Singapore, Thailand, Myanmar, Cambodia, Vietnam, Lao PDR and Brunei. The aims of ASEAN are: trying to bring about quick economic growth among member countries, progress in social and cultural matters, peace and stability in the region and making opportunities for the members to solve their mutual problems in an amicable manner.

CEATO: This was started in 1954 under the leadership of America with the intention of preventing Communism from spreading. Its headquarters were in Bangkok. On 31 June 1977, this organization was dispersed. Its members were France. Britain, Australia, New Zealand, Pakistan, Philippines and Thailand.

European Union: After the disintegration of the Soviet Union, this organization was started through the Maastricht Treaty. There are 27 members in it. It is considered as an effort to unify the economic and political matters of Europe. It has common currency, common flag, European Commission and European Central Bank, It thus becomes the biggest economic power in the world.

Question 22.
Though there are many regional groupings in the world, European Union is the most powerful one.’ Do you agree with this statement? Substantiate your arguments. (3)
Answer:
It is true that the strongest regional group in the world is the European Union (EU). Here are the reasons:
a. It is the biggest economic power in the world. It has a greater GDP than America. Euro is more valuable in the international currency than the US dollar.
b. Two of the EU members have veto power in the UN Security Council.
c. Britain and France are nuclear powers. After the USA, EU spends the maximum amount of money for defense. At one these countries were in enmity, leading to even World Wars, but now they are on the path of unity and growth.

Question 23.
Globalisation has reached every nook and corner of our society. We are experiencing its merits and demerits. Identify any three evil effects of globalization. (3)
Answer:
Globalization has mainly 3 demerits:

  1. It weakens the traditional concept of sovereignty of nations. The governments that ought to work for social justice withdraw from their responsibilities and this is a defect of globalization.
  2. As soft power, we see how Western Culture is making inroads into traditional cultures of nations. There is a tendency for consumerism to grow and the poor and marginalized people continue to remain so.
  3. The MNCs are ready to trade anything for the growing market. The resources of the earth are mindlessly exploited. As result global warming and the excessive melting of glaciers threaten the very existence of mankind.

Question 24.
Observe the following statements on South East Asia and prepare a seminar paper on ‘Politics of South East Asia’ (4)
(1) Influence of military is very high. Hence the soil of many nations is fertile for military coup.
(2) Economic backwardness of people is not suitable for the success of democracy.
(3) Ethnic issue makes the problem’more complex.
(4) The lack of charismatic leaders accelerates the threat to democracy.
Answer:
South-Eastern Asia has always been a venue of political polarization. This area includes Bangladesh, Bhutan, India, Maldives, Nepal, Pakistan and Sri Lanka.

In Pakistan and Bangladesh democracy comes and goes. Often, there democracy has led to military rule. Ganeral Yahya Khan, Zia-ul-Haq and Parvez Musharaf were military leaders who overthrew democracy and assumed power. Lack of stable political parties and parties working only for selfish interests are the main reasons for the lack of stable democracy in these countries. The 18 constitutions Amend Act was signed by President Asif Ali Zardari on 19 April 2014. It is hoped that the reduction of Presidential power, the increased powers of the PM and the Parliament might make democracy more stable in Pakistan. on Paper March – 2011 The problems in the Sind and Punjab provinces of Pakistan and the question of survival by the Tamils in Sri Lanka have made South East Asia have turmoil. People think it is the lack of leaders like Nehru that brings troubles to democracy in other countries.

The situation in Bangladesh is not different. It has a Constitution upholding secularism and democracy. The bad days for democracy here started in 1975 with the restructuring of its Constitution. From Parliamentary democracy, it went to Presidential rule. This change helped Sheikh Mujibur Rehman to rule the country in an undemocratic manner. In 1975 itself he was killed. Later Zia-ur-Rehman formed the Bangladesh National Party which won the election in 1979. He was also killed. Then the military leader General Ershad came to power. Later he was elected President. The military rulers of Bangladesh used political parties as a camouflage for their military dictatorship. They were afraid of the democratic rights and desires of the people.

In Nepal, we see the dominance of Maoists organizations. The Maldives is slowly coming towards democracy. Rajapakse of Sri Lanka thinks that the racial problem there could be solved with the fall of the LTTE. Economic backwardness does not become a reason for the collapse of democracy. When India got its freedom it was a very poor country. But it has not adversely affected our democracy.

The problems in the Sind and Punjab provinces of Pakistan and the question of survival by the Tamils in Sri Lanka have made South East Asia to have turmoil. People think it is the lack of leaders like Nehru that brings troubles to democracy in other countries.

Plus Two Political Science Previous Year Question Papers and Answers

Plus Two Political Science Previous Year Question Paper 2018

Kerala Plus Two Political Science Previous Year Question Paper 2018

Time: 2 1/2 A Hours
Total Score: 80

Answer all questions from questions 1 to 15 (Total Scores 28)

Question 1.
Identify from the given below the first Summit Conference of Non-Aligned Movement. (1)
a) Yalta Conference
b) Belgrade Conference
c) Bandung Conference
d) Bangkok Conference
Answer:
b) Belgrade Conference

Question 2.
WTO is serving as the successor to which of the following organization?
HSSLive Plus Two Political Science Previous Year Question Paper 2018 4
Answer:
HSSLive Plus Two Political Science Previous Year Question Paper 2018 5

Question 3.
Identify the economist who proposed an alternative blue print that put greater emphasis on rural industrialization.
(а) J.C. Kumarappa
(b) PC. Mahalanobis
(c) K.N. Raj
d) M S. Swaminathan
Answer:
(а) J.C. Kumarappa

Question 4.
Who is the President of Soviet Union at the time of its disintegration?
Answer:
Mikhail Gorbachev

Question 5.
Identify the wrong from the given statements:
a) Chipko Movement was an environmental movement to prevent cutting down of trees.
b) Dalit Panthers was formed in Maharashtra in 1972.
c) The activity of the Mahendra Singh Tikait is related with BKU.
d) The organisation MKSS is related with Narmada BachaoAandolan
Answer:
d) The organisation MKSS is related with Narmada BachaoAandolan

Question 6.
Expand the following abbreviations:
a) NDA
b) UPA
Answer:
a) NDA- National Democratic Alliance
b) UPA-United Progressive Alliance

Question 7.
Fill in the blanks :
a) Tashkent agreement was signed between Lai Bahadur Shastri and
b) The exponents of the slogan Garibi Hatao was
Answer:
a) Mohammed Ayub Khan
b) Indira Gandhi

Question 8.
Identify the name of the leader and party, that led the popular struggle against West Pakistani domination in East Pakistan.
Answer:
a) Shaikh MujiburRehman
b) Awami League

Question 9.
Co-operation is an important aspect of traditional security. Point out two forms of co-operation, (2)
Answer:
a) Disarmament
b) Arms Control

Question 10.
Write a note on Bandwagon strategy. (2)
Answer:
Bandwagon Strategy is a tactic by which instead of opposing the dominant power cooperating with it and getting some gains.

Question 11.
Write any two political consequences of Globalization. (2)
Answer:
Globalization weakens the strength of the nation. It prevents the government from taking action of its own choice. Globalization colonizes the mind and thoughts of the people. It is through the media that this kind of cultural domination is implemented.

Question 12.
List out any two factors that contributed to the dominance of Congress Party’ in the first three General elections in India. (2)
Answer:
(1) The Congress Party had the tradition of the Nationalist Movement. Since that Party led the fight against the British for independence, the voters naturally voted them into power.
(2) Only the Congress Party had a strong organizational chain throughout the country.
(3) The people in the leadership of Congress were famous people like Nehru. He traveled all over India and led the election campaign and thus he played a big role in the success of the Party.

Question 13.
The democracy in Pakistan is not stable like in India. Identify the factors that contributed to Pakistan’s failure in building a stable democracy. (3)
Answer:
There are many reasons why democracy has not; been always successful in Pakistan. Elected governments have been overthrown and military I governments take over power because of the domination of the army, clergy and the nobles who own large areas of landed property. the fights with India made pro-army groups to supported army rule, Although democracy has not completely succeeded there, there is a powerful democratic feeling existing in the country. Bold and comparative free journalism and a powerful human rights organization function in Pakistan.

No strong international support has been received by Pakistan to maintain democracy there. This helped the army to grab power. America and some other western countries encourage military government there. They take such an attitude because there is the global Islamic terrorist threat, and there is the danger of Pakistan’s nuclear weapons reaching the hands of the terrorists. Western countries think that the military government in Pakistan will protest their interests in West and South Asia.

Question 14.
Mandal Commission Report was a milestone in the development of Other backward Classes in India. Evaluate the impact of Mandal Commission Report in strengthening the politics of backward classes in India. (3)
Answer:
Since the 1960s, the South Indian States had made reservations for Other Backward Classes. But this was not done in the Northern Regions. I n the 1977-79 period this demand became very strong throughout the country. In 1978, the Janta Party appointed Mr Bindeswari Mandal to find out the groups which are socially and educationally backward and study about their condition. This Commission is known as the Second Backward Commission. This Commission was appointed with the intention of solving the backwardness of certain sections of the society.

In 1980, this Commission presented its report. According to the Commission, the Backward Sections were to be Backward Classes. Apart from the Scheduled Tribes, there were many other classes which should be considered Backward. According to a survey conducted by this Commission, it was found out that their representation was very low in education and jobs. Therefore it recommended t give 27% .. reservation to these Backward Classes. With the coming of the land reforms, their condition has be come much better.

Question 15.
Match the column A with b and C
HSSLive Plus Two Political Science Previous Year Question Paper 2018 1
Answer:

ABC
Operation Desert StormUN military operation in  Iraq in 1991First Gulf war
Operation Endur­ing freedomUS response to attack of 9/11.Global war on Terror
Operation infinite reachMissile attack in SudanUS response to the attack of US embassies.

Write any four questions 16 to 20. Each question carries 4 scores. (4 x 4 = 16)

Question 16.
Bring out the major difference in the objectives of the First and Second five-year plans.
Answer:
The main difference was in the styles of the Plans. The first Plan envisaged development at a slow pace whereas the second plan wanted development to be fast. The first Plan gave priority to agricultural matters whereas the 2nd Plan gave preference to large scale heavy industries.

The first Plan envisaged at eradicating poverty. According to K.N. Raj, India needed a quick, but also gradual, development. Fast actions would jeopardize democracy itself. Therefore the first half of the Plan devoted attention to dams and irrigation. The inequality in land distribution was harmful to agriculture. So it was thought necessary to make ‘ land reforms. The 2nd Plan stressed industrial development. It was under the leadership of PC.

Mahalanobis The 2nd Plan wanted to implement schemes for the quick development of the industrial base. The Resolution passed at the Avadi Conference of the Congress aimed at social justice. The 2nd Plan reflects this. By imposing import duties, Indian industries were protected from foreign competition. The savings and investments of the people increased.

It made it possible to bring about development in the public sector areas like electricity, railway, steel, heavy instruments, and communication.

Question 17.
Prepare a short note on the concept of Non- Congress’ and Defection’.
Answer:
Before the 4th General Elections, the Indira Gandhi Government had to face many challenges from the Opposition Parties. They were in the forefront in organising protests and to put pressure on the government.

The non-Congress Parties realized that Congress was winning because the non-Congress vote got divided. As they realized that the non-unity among them was the real cause of the success o the Congress, the Opposition parties tried to fight the election by making a common front against the Congress. In some States, some parties made United Fronts against Congress. In other States, they made some adjustments in dividing the Seats.

The Opposition Parties realized that the inexperience of Indira Gandhi and groups in the Congress gave them an opportunity to remove Congress from power. This unified move by the Opposition was called “Non-Congress” by the Socialist leader Ram Manohar Lohia. He also put forward a theoretical argument. He argued that Congress’s rule was undemocratic and against, the interests of the common people. He argued that to bring back democracy to the country there was a need for the non-Congress Parties to unite.

Defection
After the 1967 Elections Defection became an important thing in Indian politics. In the formation of the government and in removing the government from power, defection played a major role.

  • Defection is the name given to an MLA or MP joining another party after winning the election on the ticket of his original party. Just like party candidates, independent candidates also defect.
  • The MLA or M P joins another party just because he is offered either money or the post of a minister or some other kind of bribe. Instead of punishing such selfish people, the voters went on electing such unscrupulous candidates. Therefore defection and ‘horse-trading’ became common in Indian politics.

Question 18.
Resistance to globalization in India has come from different sources. Evaluate the nature arid style of resistance of social groups and political parties in India against globalization.
Answer:
Resistance against globalization is seen in many parts of India. Entry of the MNCs, foreign TV channels, Night Clubs, Valentine’s Day, Western dresses, especially among girls in schools and colleges, etc. are part of globalization.

The Left parties object globalization. The Indian Social Forum is also against it. Trade Union workers oppose MNCs. The acquisition of the patent for trees like Neem by the Americans and Europeans brought a lot of vehement protests.

Great protest was made against the ground water exploitation by foreign monopolies. In Plachimada there was a huge protest against Coca Cola Company and this attracted world attention.

Not only Left parties but also some people in the right-wing political parties also raise their voice against globalization. They are mainly protesting against cultural encroachment. The foreign TV

channels available through cable networks, a celebration of Valentine’s Day, and the great interest is shown especially by our young girls in copying western dresses are the things these people strongly object to.

Question 19.
Find out any two militaries allianced formed during the Cold War. Why did the super powers make alliance with smaller countries?
Answer:
NATO (North Atlantic Treaty Organization) was established for the security of the West European countries. It came into existence in April 1949. It was a military organization of 12 countries. NATO declared that any attack on any member country or North America would be considered an attack on all of them. The members were required to help one : another in case of a military need. Brussels was its capital.

SEATO (South East Asian Treaty Organization): This * is an organization formed by America to prevent the influence of the Soviet Union and Communism in the South East Asian countries and the nearby Pacific regions. It was the progress that Communism was making in South East Asian countries that prompted America to form such an organization. It was formed in September 1954 and its headquarters is in Bangkok.

The question of why these superpowers had nuclear weapons and strong standing armies formed alliances with small countries around the world is very relevant. Even if all the small countries of Asia and Africa stood against the superpowers, they would not prove a threat to them. Even then they made alliances with the smaller countries for the following reasons:

  1. The small countries were rich in things like oil, minerals and raw materials. An alliance with them would allow the superpowers to get these things.
  2. The superpowers used smaller countries to make them their military bases. They also used them as centers for carrying out spy work.
  3. The small countries would be useful to the superpowers even economically. They collected money from smaller countries for military expenses.

Question 20.
A transition from communism to capitalism was not an easy one.’ In light of this statement examine the meaning and consequence of ‘shock therapy’.
Answer:
The failure of the Soviet Union made many of its constituent countries abandon Communism and follow democratic ways. Russia, Asian countries, Easer European countries etc were attracted towards organizations like the World Bank and IMF.

  1. The main purpose was to make communist countries follow the capitalist model.
  2. Private capital would be very important.
  3. Cooperative farming will give way to private farming.
  4. Foreign investment, open market system and currency exchange would be possible
  5. The countries of the erstwhile Soviet Union will have the facility to have contact with Western countries and trade with them.
  6. Using all these, the Western countries made the member countries of the erstwhile Soviet Union come closer to them.

Results:

  1. Many big industries under government control collapsed.
  2. 90% industries were soldto individuals or private SL – companies.
  3. The Russian Currency Rouble was devalued.
  4. Because of inflation people lostthe value of their savings,
  5. in Cooperative farming, people.had food security. But now it was not there. Russia had to import food grains.
  6. In Russia, the GDP in 1999 was less than that of 1989.
  7. The social welfare schemes were abandoned.
  8. As subsidies were withdrawn, many people experienced poverty,
  9. Educational and intellectual human resources were scattered and many people emigrated.
  10. Privatization made economic inequality among

Write any four from the questions 21 to 26. Each question carries 5 scores. (4 x 5 = 20)

Question 21.
The Non- Traditional conceptions of security focus on the changing nature of threats to security. Point out any five new sources of threats and give a brief explanation of each.
Answer:
Security threats are of a different kind now. They can be categorized as follows:

1. Terrorism: Political attacks make the life of ordinary citizens difficult. The terrorists want the political circumstances to change. They try to bring about changes by threats or armed attacks. By unleashing violence, they make the people restless. They try to make the dislike and discontentment of the people their weapon against governments. Their activities include hijacking planes and bombing trains and markets and other places where people assemble. They attacked and destroyed the World Trade Centre in New York’ on 11 September 2001. The government and the people are more cautious now against terrorists.

2. Human Rights: We see that throughout the world there are human rights violations. There is no unified thinking in any country about how to protect human rights. Recent incidents of human rights violations are the annexation of Kuwait by Iraq, the ethnic cleansing in Ruanda and the mass killings of the people of Eastern Timor by the Indonesian army. All these prompted world leaders to have a talk. The talk was about whether the UN should interfere in such matters. The matter is still unresolved.

3. Global Poverty: This is another factor of security threat. It is believed that the population in the under-developed countries will triple in 50 years. In countries where the population is low, the per capita income will be high. Therefore the economically advanced countries will prosper further whereas the poor countries wit! grow poorer. The gap between countries of the North and South will increase. People from the South ‘ countries immigrate to the North countries for a better life and earning This also creates a threat for the security of mankind.

4. Contagious Diseases: Contagious diseases are another threat to mankind. AIDS, bird flu, SARS (Severe Acute Respiratory Syndrome) etc. are dangerous contagious diseases. These spread quickly from one country to another. A country’s success or failure in controlling these diseases affects other countries also. Recently swine-flu spread all over the world it is when a problem becomes a threat to a nation and its people that it becomes an international security threat.

5. Migration: The poverty in the Southern countries led to large scale migrations to the Northern countries. Seeking better life and economic opportunities many people crossed the borders and went to the Northern countries. This created international struggles. International Laws specifically separate refugees and migrants. Migrants are those who live their motherland on their own. But refugees are those who are forced to leave their countries because of war. natural disasters or political persecutions. The norma! understanding is that every country should accept the immigrants. But it is not compulsory that every country should accept them.

Question 22.
Nehru played a crucial role in framing India’s foreign policy. Identify the major objectives of India’s foreign policy and explain the role of Nehru in shaping it.
Answer:
The architect of the Non-Aligned Movement (NAM) is Nehru, the first PM of India. As the PM. he also handled the Foreign Ministry portfolio. He played a major part in formulating and implementing the foreign policy of India from 1946 to 1964. There were 3 aims for his foreign policy:

  1. Maintain and protect the freedom that was got with hard struggle.
  2. Maintain the territorial unity of the country.
  3. Ensure a quick economic growth.

Nehru expected that ali these goals could be realized through the Non-Aligned Policy. Many people wanted India to become friendly with the Power Group led by the US. They argued that US-supported democracy. There were people like Ambedkarwho had such a view. Groups like Bhartiya Jan Sangh and the Swatantra Party, both of which had anti-communist views, also supported a pro-US policy. But Nehru ignored their demands and formulated quite an independent and practically foreign policy.

Question 23.
What was the reason for the emergence of Anti Arrack movement? How did it contribute in increasing overall social awareness about the issues that affect women?
Answer:
It was in a village in Dubagunda in Nellur district in Andhra Pradesh that the Anti-Arrack Movement started. Many women took part in the adult education classes and became literate. In the classroom discussions, they talked about the increasing addition of their men-folk to local arrack. The habit of drinking arrack was widespread in the village. This addiction destroyed the mental and physical abilities of people.

The drinking habit of the people adversely affected the economic well-being of the region. Many families got into the debt trap. Men stopped going to work. There were also clashes between the arrack contractors to get a monopoly over the sales. Their goondas made peaceful life in the village difficult. The real victims of arrack addiction were women. The drinking habit of the men ruined the relations and economic wellbeing of the family Women were often beaten by their men-folk.

Women of Nellur got together to protest against the sale of arrack. They forced some arrack outlets to close down. This news spread like wildfire. Influenced by these actions, women from some 5000 villages held meetings and passed resolutions demanding the ban of arrack. They sent these resolutions to the collector. The arrack auction in Nellur had to be postponed 17 times. This Movement slowly spread to the other areas of the State.

Question 24.
’The process of partition was very difficult to implement and its consequence was painful’. Based on this statement explain the process of partition and its consequences.
Answer:
The division of India was carried out on the basis of the Two-Nation Theory put forward by the Muslim League. According to that theory, in India there were two nations-the Hindus and Muslims. Therefore the Muslim League demanded a separate nation and Pakistan, for the Muslims The formation of Pakistan was based on the majority of the population of an area. Thus the areas which had Muslim majority became Pakistan and the remaining areas remained as Indian territory. It was not easy to implement such a division. There were three reasons for that. First of all in British India, there was not a single area which had only Muslims. There were two areas in which the majority was Muslims, one in the West and the other in the East. Therefore Pakistan was formed consisting of two areas – West Pakistan and East Pakistan. Between them there were large areas of Indian territory.

Secondly, not all areas with majority Muslim population wanted to become part of Pakistan. Khan Abdul Gaffer Khan, who was the leader of the North-Western Province had objected to the Two-Nation Theory. But ignoring his objection, the North-West Province was included in Pakistan.

The third problem was that British India’s Punjab and Bengal were areas with Muslim majority. But in these huge provinces, there were very many non-Muslims. Therefore the provinces were divided into Districts and Panchayats depending on the religious majority of the population there. The result was that on the day of Independence many people did not know to which country they belonged – India or Pakistan, It deeply wounded the people. The problem of the minorities in each country was the worst of all. The Hindus and Sikhs in the Pakistani areas and the Muslims in Punjab and Bengal were unfortunate preys to this division of the country. When the division was decided upon, there was large scale violence against the minorities in both the countries.

Question 25.
‘Reforms and improvement are fundamental to any organisation to serve the needs of changing environment. In light of the above statement examine the need for the reforms in UN structure and processes.
Answer:
There has been a lot of support for the proposal to reform the structure and processes of the UN. The main demand is the expansion of the Security Council. In 1992, the UN General Assembly approved a resolution for this. The resolutions showed three reasons:

  1. The Security Council does not reflect contemporary political realities.
  2. The decisions of the Security Council reflect only the values and interests of the Western nations. A few nations control it.
  3. Countries don’t have adequate representation in the Security Council.

on 1 January 1997, Kofi Annan, the UN Secretary-General, started an inquiry into the need for a reorganization of the UN. Issues of election to the Security Council and reforming it was looked into. In later years also suggestions were given regarding the selection of Permanent members and non-Permanent Members to the Security Council. According to these suggestions, a new member nation should have the following criteria.

  • An important economic power.
  • An important military power.
  • It should contribute significantly to the UN budget.
  • It should be a country with a large population.
  • It should be a country that has due respect for democracy and human rights.
  • It should be a country that should be capable of representing the diversities of the world with regard to geography, economic systems and culture.

there’s a demand to increase the number of members from Asia, Africa and South America. America and other Western countries also demand some progress in the matter of budget and other administrative processes.

Some scholars and countries say that there should also be some reforms with regard to the jurisdiction of the UN. They want the UN to have a greater role in keeping peace and security. But others say the UN should give greater attention to things like humanitarian activities, health, education, environment, birth control, human rights and social justice.

Question 26.
There is difference in the approach to environmental issues between the countries of North and South, Under these circumstances, examine the meaning and the possibility of the implementation of the principle ‘Common but differentiated responsibility’.
Answer:
There are differences in the approach between the Northern and Southern countries regarding the environment. The countries of the North say that environment problems Should be discussed as they are today and everyone should have equal responsibility. But the non-developed nations do not agree with this view.

They differ because:

  1. Most of the damage to the environment was caused by developed nations because of their industrial development.
  2. Since they are more responsible for the harm to the environment, the developed nations should bear more responsibility.
  3. moreover, the developing nations are passing through a stage of development. It is not right to impose the same restrictions on them as imposed on the developed nations.

They argued that whenever the conditions of the international environment laws are made and implemented their special requirements should be taken into consideration. The “Rio Declaration” of the 1992 Earth Summit approved these demands. It is called Common but Differentiated Responsibilities. The Rio Declaration says that all the countries must work together for the restoration of the wellbeing of the environment. When the part each nation has in damaging the environment is taken into consideration, it has common but differentiated responsibilities. The developed nations should recognize that they have a responsibility to help the efforts of the developing nations for sustainable development. The Rio Report points out that the developing nations can’t escape from that responsibility considering the pressure they put on global environment and the resources they have in their custody.

Write any two from the questions 27 to 29. Each question carries 8 scores. (2 x 8 = 16)

Question 27.
‘The Chinese economy has undergone several transformations.’ Identify the developmental strategy adopted by China and explain how it helped to be-‘ come an alternative centre of power.
Answer:
The Growth of Chinese Economy China is the 3rd Centre of Power. In the current political scenario, an important event is the growth of China as an economic power. The success of China was the result of the reforms the Chinese Government started in’the 1970s. After the start of the reforms the growth of that country was fast and surprising. The last decades saw how the world markets were captured by Chinese manufactured goods. It is believed that by 2040, China will become the No 1 economy in the world even leaving the USA behind.

Let us see what the sources of strength are in China’s growth. Amain reason is the-collaboration with other Asian regions. This helped China to become a driving force of the East Asian growth and also a power to exert influence in regional affairs. The strength of the economy, population, large areas of land, resources, and strategic location and the political influence etc. add to the strength of China. However, the main reason for the current growth is the new liberal reforms that China enforced.

Following the 1949 Revolution, the Mao Government of the People’s Republic of China followed economic policies similar to those of the Soviet Union. The Soviet Union had an extremely centralized economy, it was called Command System China accepted this one. China worked with the help and guidance from the Soviet Union and broke all ties with the capitalist world. Naturally, China had.to depend on its own resources t go forward. China followed the policy of using the profit made from agriculture for building heavy industries. China did not have foreign money to buy the machines and technology from the world market. In the. circumstances instead of importing goods from other countries, China depended on its own sources. The Soviet Model helped China to make a base for industrial economy using only local things. It ensured jobs and social” welfare to all the citizens. In giving education and health services to all concerned China reached in the primary position amongst the developing countries. The economy was growing 5-6% annually. To overcome the crises the economy was facing, China took some decisions in the 1970s. China ended its political and economic isolation. In 1972 China established relations with the USA. In 1973, Prime Minister Chou-en-Lai suggested Four Modernizations. They were suggestions to renew agriculture, industry, science and technology and army.

Revolutionary changes happened in China with the coming of Deng Xiaoping as the head of Chinese government. He tried to renew the economy without harming the authority o the Communist Party, in 1978 Deng declared an Open Door policy and economic reforms. Reforms like the liberalization of the economy, changes in the production of goods, market economy, private ownership etc. were included in them The policy aimed at increased production with the help of foreign capital and latest technology.

To bring about the market system, China followed its own policy. Deng and his team were not ready for shock treatment to the Chinese economic system, instead they made the economy slowly and slowly market-friendly. In 1982 agriculture was privatized. In 1998, industries. Trade restrictions and limitations were removed from Special Economic Zones (SEZs). Foreign investors were allowed to start industries there The State played a major role in building a market economy.

The “Market-Friendly Socialism” brought miraculous changes in China. The new economic policies rescued the economy from stagnation. The privatization of agriculture brought significant increases in the production and in agricultural Income. It caused unprecedented growth of village industries. The Chinese economy grew rapidly.

The new trade laws and SEZs led the country to increase its foreign trade greatly. China became the world’s most important venue for foreign investment. China increased its foreign reserves to such an extent that it could invest in other countries. Its foreign exchange reserve also increased. In 2001 China got membership of the World Trade Organization. It was a step in opening the doors of China to foreign traders. It helped China in boosting the collaboration with world economy and to make schemes to be a party to formulate the world economic system.

Thus China became an economic power that cannot be ignored in the regional as well as global level. Its economic relations with other countries developed mutual reliance. Relations with China became inevitable to the outside world. It helped China to exert influence on her trade partners. These economic. considerations have helped in reducing problems China had with Japan, the USA, ASEAN and Russia. The leadership thinks that the problems with Taiwan will be solved by welding its economy with its own. following the 1997 economic crisis, China contributed a lot to help the ASEAN economy. The fears that were created by the growth and supremacy were removed by this gesture. Her goodwill policies towards Latin America and Africa have made China a global power on the side of the third world.

Question 28.
Issues of regional aspirations are varied and complex in the politics of North East. Identify and explain the various issues of North East region,
Answer:
The North-Eastern States have some geographical peculiarities. It was a region that was not closely linked to the rest of the country. It has long international orders, but communications facilities were less there. Its development was neglected to an extent and the problem was made complex by the emigrants that came from other places. In this complex situation, some complex demands were made:

  1. Demand for autonomy.
  2. Demand for independent nations.
  3. Enmity towards people from other places.

1. Demand for Autonomy: At the time of independence, except Manipur and Tripura, the entire North-Eastern region was just one State. After independence, the non-Assamese felt that Assamese language was imposed on them. Therefore they demanded political self-rule. The Adivasi leaders wanted to keep away from Assam. They formed “Eastern India Tribal Union”. Later it was known as “All Party Hill Leaders Conference”. They demanded one Adivasi State, but more Adivasi States like Meghalaya and Mizoram were formed. Even with this, their demand for self-rule did not end. The Bodos, Karbis and Dimasas etc. demanded their own States, The same area was demanded by more than one community. Because of that the only solution was forming tiny States. Some stayed in Assam and gained their right for self-rule. The Karbis and Dimasas were given self-rule at the District levef The Bodos were given their self-rule council very recently.

2. Secessionist Movement: India faced demands for secession from two North-Eastern States-Mizoram and Nagaland. After independence, Mizoram region within Assam itself was enjoying self-rule. But many of them thought that they were not part of British India and so there was no reason for them to join India. In 1959therewasaser30usfamjneinthe Mizo Hills. But the Assam government could not take appropriate measures to help.the suffering people there. This caused the formation of Mizo National march to the Parliament. It was the biggest rally the capital had ever seen. The Opposition saw in him an alternative to Indira Gandhi. Both the protests were anti-Congress. Voices also rose against the leadership of Mrs. Gandhi. She believed that all this was done to take revenge on her.

Dispute with the Judiciary; Another reason for the declaration of Emergency was Indira Gandhi’s dispute with the Judiciary. The Supreme Court said that some of the things the government did were against the Constitution. Congress argued that the Supreme Court judgment was against democracy and the authority of the Parliament. The Party said that the Court was standing against some welfare measures taken to help the poor people. The dispute was mainly in three things. Firstly, Can the Parliament change-the Fundamental Rights? The Court said no. Secondly, Can the Parliament change ownership of land’ Again the Court said no. Thirdly, the Parliament said that it had the right to reduce fundamental rights. It amended the Constitution. But the Supreme Court objected. All these were the reasons for the dispute between the Government and the Supreme Court.

There were FAD more reasons, in the Kesavananda Bharati case, the Supreme Court judged that the Parliament can’t change the basic structure of the Constitution. Soon the post of the Chief Justice became vacant. Normally the senior-most judge is appointed as the Chief Justice. But keeping aside 3 eligible Judges, the government-appointed A.N. Roy as the Chief Justice. This appointment became controversial. Besides, the Uttar Pradesh High Court declared the election of Indira Gandhi as null and void All these were the reasons for Mrs Gandhi to declare Emergency in June 1975.

Question 29.
Critically evaluate the various reasons for the declaration of National Emergency of 1975.
Hints :
– Economic context
– Gujarat and Bihar movement
– Conflict with Judiciary
– Allahabad High Court verdict and protest from opposition
HSSLive Plus Two Political Science Previous Year Question Paper 2018 2
HSSLive Plus Two Political Science Previous Year Question Paper 2018 3

Plus Two Political Science Previous Year Question Papers and Answers

Plus One Computer Application Model Question Paper 3

Kerala Plus One Computer Application Model Question Paper 3

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Model Question Papers Paper 3 33

Part A

Answer all questions from 1 to 5
Plus One Computer Application Model Question Papers Paper 3 1

Question 1.
The Least Significant Digit (LSD) of (1234.56)10 is …………
Plus One Computer Application Model Question Papers Paper 3 2

Question 2.
The process of detecting and correcting errors in a program is called …………….
Plus One Computer Application Model Question Papers Paper 3 3

Question 3.
Name any two keywords in C+ +.
Plus One Computer Application Model Question Papers Paper 3 4

Question 4.
The memory size required for the void data type is ……………
Plus One Computer Application Model Question Papers Paper 3 5

Question 5.
Rewrite the expression a = a + 1 using an arithmetic assignment operator.
Plus One Computer Application Model Question Papers Paper 3 6

Part B

Answer any nine questions from 6 to 16
Plus One Computer Application Model Question Papers Paper 3 7

Question 6.
Find the octal and hexadecimal equivalent of (111101 )2.
Plus One Computer Application Model Question Papers Paper 3 8

Question 7.
Write a short note on any two utility software.
Plus One Computer Application Model Question Papers Paper 3 9

Question 8.
Redraw the following flowchart by correcting mistakes.
Plus One Computer Application Model Question Papers Paper 3 10

Question 9.
Classify the followings into valid and invalid literals and give a reason for invalid literals.
Plus One Computer Application Model Question Papers Paper 3 11
33,000 +410. 5.6E 82

Question 10.
Consider a = 5 and b = 2 and find the result of the following expressions.
Plus One Computer Application Model Question Papers Paper 3 12

  1. a > b
  2. a !=b && b > a

Question 11.
Write a short note on any two statements in C+ +
Plus One Computer Application Model Question Papers Paper 3 13

Question 12.
Briefly, explain type promotion with suitable example.
Plus One Computer Application Model Question Papers Paper 3 14

Question 13.
Write the equivalent switch statement for the following.
Plus One Computer Application Model Question Papers Paper 3 15

Question 14.
Define the terms given below.
Plus One Computer Application Model Question Papers Paper 3 16
a. Bandwidth
b. Noise,

Question 15.
Name any four basic elements for data communication.
Plus One Computer Application Model Question Papers Paper 3 17

Question 16.
Write two advantages of Electronic Payment System (EPS).
Plus One Computer Application Model Question Papers Paper 3 18

Part C

Answer any nine questions from 17 to 27
Plus One Computer Application Model Question Papers Paper 3 19

Question 17.
If (X)16 = (Y)10 = (Z)8 = (11111111)2. find the values of X, Y and Z.
Plus One Computer Application Model Question Papers Paper 3 20

Question 18.
What is e-waste? Explain any two e-waste disposal methods.
Plus One Computer Application Model Question Papers Paper 3 21

Question 19.
Write an algorithm to find the sum of numbers from 1 to 10.
Plus One Computer Application Model Question Papers Paper 3 22

Question 20.
Explain any two types of programming errors.
Plus One Computer Application Model Question Papers Paper 3 23

Question 21.
Consider the following diagram and answer the question.
Plus One Computer Application Model Question Papers Paper 3 24
Write the base address (Lvalue), content (Rvalue) and Name of variables,
Plus One Computer Application Model Question Papers Paper 3 25

Question 22.
Write short notes on.
Plus One Computer Application Model Question Papers Paper 3 26
a. Preprocessor directive
b. Header file
c. Main() function

Question 23.
What is the use of type modifiers in C++? List any four type modifiers.
Plus One Computer Application Model Question Papers Paper 3 27

Question 24.
Write a C++ program to input an integer and check whether it is positive, negative or zero.
Plus One Computer Application Model Question Papers Paper 3 28

Question 25.
Compare Dialup connection and wired broadband connection.
Plus One Computer Application Model Question Papers Paper 3 29

Question 26.
a. Consider the following email address and write the username and domain name of it.
Plus One Computer Application Model Question Papers Paper 3 30
b. List any four advantages of email.
Plus One Computer Application Model Question Papers Paper 3 31

Question 27.
Explain any three IT-enabled services.
Plus One Computer Application Model Question Papers Paper 3 32

Part D

Answer any two questions from 28 to 30
Plus One Computer Application Model Question Papers Paper 3 33

Question 28.
“Open source software are getting more popular all over the world today”.
Plus One Computer Application Model Question Papers Paper 3 34
a. Write the full form of FSF.
Plus One Computer Application Model Question Papers Paper 3 35
b. Briefly elaborate four freedoms of open source software.
Plus One Computer Application Model Question Papers Paper 3 36
c. Give four examples of open source softwares.
Plus One Computer Application Model Question Papers Paper 3 37

Question 29.
a. List the four different parts of a loop in C++.
Plus One Computer Application Model Question Papers Paper 3 38
b. Compare while loop and do-while loop with suitable example.
Plus One Computer Application Model Question Papers Paper 3 39

Question 30.
a. Define topology,
Plus One Computer Application Model Question Papers Paper 3 40
b. Explain any two topologies.
Plus One Computer Application Model Question Papers Paper 3 41
c. Differentiate HUB and SWITCH.
Plus One Computer Application Model Question Papers Paper 3 42

Answers

Answer 1.
6

Answer 2.
debugging’

Answer 3.
continue, float

Answer 4.
zero. It does not require any memory space.

Answer 5.
a+ = 1

Answer 6.
(111101)2= 111 → 7, 101 → 5 = (75)8
(111101)= 0011 → 3, 1101 → D
= (3D)16

Answer 7.
a. Compression tools. Large files can be compressed so that they take less storage area. Compression of files is known as zipping and decompression is called unzipping, eg., WinZip, WinRAR.
b. Disk Defragmenter. It is a program that rearranges files on a computer hard disk. This enables the computer to work faster and more efficiently.

Answer 8.

Answer 9.
33,000: Invalid, Use of special character
(.)
+410. : Invalid. Use of special character
(.)
5.6E: Invalid. No exponent part
82: Valid

Answer 10.

  1. True
  2. False

Answer 11.
1. Declaration statement. Variables are identifiers of memory locations add are used in programs to refer to data. They should be declared prior to their use in the program and data types are required for this. The syntax of variable declaration is:

data type <variable1>
[, <variable2>, <variable3 >,...];
eg., int rollno, age;

2. Assignment statement. A specific data is stored in memory locations (variables) using an assignment operator (=). The statement that contains = is known as assign.. ment statement. It is also a binary operator and the operand to the left of = should be a variable. The operand after = may be a numeric constant, a variable or an expression of numeric type.

Answer 12.
In implicit type conversion, compiler is responsible for the conversion. It always converts a lower type into, higher one and hence it is also known as type promotion,
eg., For example, the expression 5 / 2 * 3 + 2.5 which gives the result 8.5. The evaluation steps are as follows:
Step 1: 5/2 gives 2 (Integer division) Step 2: 2 * 3 gives 6 (Integer multiplication)
Step 3: 6 + 2.5 gives 8.5 (Boating point addition, 6 is converted into 6.0)

Answer 13.

switch (ch)
{
case ‘P’: cout<<“Pass”;
break;
case ‘F: cout<<“Failed”;
break;
default: cout<<“No result";
}

Answer 14.
a. Bandwidth. It is the maximum amount of data that can be transmitted by the medium. It can be measured in Hertz.
b. Noise. It is the unwanted electrical or electromagnetic interference that adversely affects the transmitted data signals.

Answer 15.
Message. It is the data/information to be transmitted from one computer to another.
Sender. It is a computer or a device that sends data. It is also called source or transmitter.
Receiver. It is a computer or a device that receives data.
Protocol. The rules and conventions for transmitting data.
Medium. It is the path through which message travels from sender to receiver.

Answer 16.
A system of financial exchange between buyers and sellers in an online environment is called an Electronic Payment System (EPS). The financial exchange is facilitated by a digital financial instrument (such as a credit/debit card, electronic cheque or digital cash) backed by a bank and/or an Intermediary.

Answer 17.
1111 → F, 1111 → F
(11111111)2 = (FF)16 = (X)16
011 → 3, 111 → 7, 111 → 7
(11111111), = (377)e = (Z)8
(11111111 )2 = 1 × 27 + 1 × 26 + 1 × 2s + 1 × 24 + 1 × 23 + 1 × 22 + 1 × 21 + 1 × 2°
= 128 + 64 + 32+ 16 + 8 + 4 + 2 + 1 = 155
,(155)10 = (Y)10

Answer 18.
It is defined as discarded computers, office electronic equipment, entertainment device, mobile phones, television sets, and refrigerators. This global mountain of waste is expected to continue growing at 8% per year.

  1. Reuse: It refers to secondhand use or usage after the equipment has been upgraded or modified.
  2. Incineration: It is a controlled and complete combustion process in which the waste is burned in specialty designed incinerators at a high temperature in the range of 900 to 1000 degree Celsius.
  3. Recycling: It is the process of making or manufacturing new products from a product that has originally served its purpose.
  4. Landfilling: In this method, soil is excavated from the trenches made and waste material is buried in it, which is covered by a thick layer of soil.

Answer 19.

Step 1: Start
Step 2: a = 1, s = 0
Step 3: s = s + a
Step 4: a = a + 1
Step 5: Repeat steps 3 to 4 while a<=10
Step 6: Print M
Step 7: Stop

Answer 20.
1. Syntax errors result when the rules or syntax of the programming language are not followed. Such program errors typically involve incorrect punctuation, incorrect word sequence, undefined term, or illegal use of terms or constructs. In the case of interpreters, the syntax errors will be detected and displayed during execution,

2. The logical error is due to the improper planning of the program’s logic. The language processor successfully translates the source code into machine code if there are no syntax errors. The computer actually follows the program instructions and gives the output as per the instructions. But the output may not be correct. This is known as logical errors. In order to determine whether or not there is a logical error, the program must be tested.

Answer 21.
Base address (Lvalue) 3000
Content (Rvalue) 105
Name of variables NUM

Answer 22.
a. Preprocessor directives. A C++ program starts with preprocessor directives. Preprocessors are the compiler directive
‘ statements which give instruction to the compiler to process the information provided before actual compilation starts. The # include is used to link the header files available in the C++ library. There are some other preprocessor directives such as # define, # undef, etc.

b. Header files. It contains the information about functions, objects and predefined derived data types and they are available along with compiler. The header file ios team contains the information about the objects cin and cout.

c. The main() function. The execution starts at main() and ends within main(). If we use any other function in the program, it is called (or invoked) from main(). The function header main() is followed by its body, which is a set of one or more statements within a pair of braces {}. This structure is known as the definition of the main() function. Each statement is delimited by a semicolon (;).

Answer 23.
C++ provides data type modifiers which help us to alter the size, range or precision. It alters the range of values permitted to a data type by altering the memory size and/or sign of values. Important modifiers are signed, unsigned, long and short.

NameDescriptionSize
charCharacter or a small integer1 byte
short int (short)Short Integer2 bytes
intInteger4 bytes
long int (long)Long integer4 bytes
floatFloating point number4 bytes
doubleDouble preci­sion floating-point number8 bytes
long doubleLong double-precision floating-point number10 bytes

Answer 24.

# include <iostream> 
using namespace std; 
int main()
{
int a;
cout<<“Enter an integer:”; 
cin >> a;
if (a > 0) .
cout<<“The number is positive”;
else if (a < 0) *
cout<<“The number is negative”;
else
cout<<“The number is zero”; return 0;
}

Answer 25.
Dial-up connection. The internet connection is established by dialing into an ISP’s computer. If ISP is not busy they verify the username and password if it is valid they will connect our computer to the internet. It uses Serial Line Internet Protocol (SLIP) or Points to Point Protocol (PPP). It is slower and has a higher er rotate.

Wired Broadband Connectivity. In these, there is a permanent wire connection, between your computer and ISP. So it’s an “always on” connection. It uses a broadband modem and we can use telephone lines while using the internet.

Answer 26.
a. Username my school
b. Domain name gmail.com b. The advantages of email are:

  1. Speed is high.
  2. It is cheap.
  3. We can send email to multiple recipients.
  4. Incoming messages can be saved locally.
  5. It reduces the usage of paper.
  6. We can access mailbox anytime and from anywhere. „

Answer 27.
1. Medical equipment. Most of the modern medical equipment work with the help of computers. Scanners like CT, MRI depends on computers to process their data. Computer-guided lasers are used in surgery, even in the removal of brain tumors etc.

2. Electronic Medical Records (EMR). It is possible to store all patient’s records in digital format. This is known as EMR. EMR is used by doctors for diagnostics and treatment.

3. Web-based support/diagnosis. There are a lot of treatments, therapies, medical journals are available on the internet, which can be referred to by patients. Some websites provide facility f&r identifying their diseases without consulting a doctor. This prediction may not be correct in some time.

Answer 28.
a. Free Software Foundation
b. Freedom 0: The freedom to run a program for any purpose.
Freedom 1: The freedom to study how the program works and adapt it to your needs. Access to source code should be provided.
Freedom 2: The freedom to distribute copies of the software.
Freedom 3: The freedom to improve the program and release your improvements to the public, so that the whole community benefits.
c.

  1. GNU / Linux is a computer operating system assembled under the model of free and open source software development and distribution.
  2. GIMP (GNU Image Manipulation’Program) is an image editing software.
  3. Mozilla Firefox is one of the most popular web browsers. It provides added security features for safe browsing.
  4. OpenOffice.org is a complete office software which contains word processor, spreadsheet and presentations.

Answer 29.
a. A looping statement has four components: initialization expression, test expression, update expression, loop body. The loop body is the set of statements for repeated execution. The execution is continued as long as the test expression (condition) is true. The variable used in the test expression, called a loop control variable, gets its initial value through the initialization expression (or statement). Update expression changes the value of the loop control variable. Usually, it takes place after each execution of the loop body.

b. while loop. The condition is checked first and if it is found, True the body of the loop will be executed. That is the body will be executed as long as the condition is True. The syntax of a while loop is, initialization of loop control variable;

while (test expression)
{
body of the loop;
updation of Ipop control variable;
}
eg., int k= 1; while(k<=3)
{
cout << k << `\t’;
++k;
}

do while loop. The condition is checked only after executing the loop body. So it is certain that the loop body will be executed at least once in the case of do while loop.

Syntax is:
initialization of loop control variable; 
do
body of the loop;
updation of loop control variable;
}
while (test expression); 
eg., int k = 1; do {
cout << k << At’;
++k;
}
while (k<=3);

Answer 30.
a. The physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network,
b.
1. Ring topology. All the computers are connected in the shape of a ring and it is a closed-loop. Here also there is no central computer. Here a computer transmits a message, which is tagged along with its destination computer’s Address. The message travels in one direction and each node checks whether the message is for them. If not, it passes to the next node. It requires only short cable length. Its advantages are no signal amplification required because each node do this and requires less cable, so cost-effective. The main disadvantage is if a node fails, the entire network will fail.

2. Bus topology. All the computers are attached to a single cable, called the bus. If anyone node has to send data to another node, it will send the data to the bus. In the bus, the data travels in both directions. The node that needs the data copies it. A small device called terminator connected at both end of the bus removes the data and frees the bus for next transmission. Advantages are added or remove computer is very easy. It requires less cable length and the installation cost is less. A disadvantage is fault detection is very difficult because of no central computer,

c. Hub. It is a small, simple and inexpensive device used to connect computers (devices) to a network. If a computer wants to transmit data to another computer, first it sends to the hub, the hub retransmits this data to all other computers. Each and every computer gets the data and check whether it is for them or not. It increases the network traffic and hence the transmission speed is low.

Switch. It is an expensive device used to connect computers (device) to a network. Unlike a hub, switch transmit data, not to all computers, it retransmits data only to the intended computer. So the traffic is less and the speed is high.

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Model Question Paper 2

Kerala Plus One Computer Application Model Question Paper 2

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Model Question Papers Paper 2 33

Part A

Answer all questions from 1 to 5
Plus One Computer Application Model Question Papers Paper 2 1

Question 1.
JPEG stands for
Plus One Computer Application Model Question Papers Paper 2 2

Question 2.
The process of making or manufacturing new products from the product that has originally served its purpose is called
Plus One Computer Application Model Question Papers Paper 2 3

Question 3.
Program errors are known as
Plus One Computer Application Model Question Papers Paper 2 4

Question 4.
Its value does not change during execution. What is it?
Plus One Computer Application Model Question Papers Paper 2 5

Question 5.
The act of breaking into a secure network to destroy data is called hacking.
Plus One Computer Application Model Question Papers Paper 2 6

Part B

Answer any nine questions from 6 to 16
Plus One Computer Application Model Question Papers Paper 2 7

Question 6.
If (x)8 = (101011)2, then find x.
Plus One Computer Application Model Question Papers Paper 2 8

Question 7.
Explain the benefits of a blue-violet laser in BluRay DVD.
Plus One Computer Application Model Question Papers Paper 2 9

Question 8.
When do we use ROM?
Plus One Computer Application Model Question Papers Paper 2 10

Question 9.
What is the runtime error? Explain.
Plus One Computer Application Model Question Papers Paper 2 11

Question 10.
Identify the errors in the following code segments:
Plus One Computer Application Model Question Papers Paper 2 12

a. 
int main()
{
cout<<“Enter two numbers”
cin >> num >> auto
float area = Length * breadth ;
}
b. 
# include <iostream>
using namespace std
void Main()
{
int a, b 
cin<<a <<b 
max=(a > b) a:b 
cout>max
}

Question 11.
Write the working of arithmetic assignment operator? Explain all arithmetic assignment operators with the help of examples.
Plus One Computer Application Model Question Papers Paper 2 13

Question 12.
Checks whether a given character is an alphabet or a digit.
Plus One Computer Application Model Question Papers Paper 2 14

Question 13.
Define resource sharing.
Plus One Computer Application Model Question Papers Paper 2 15

Question 14.
Define network topology.
Plus One Computer Application Model Question Papers Paper 2 16

Question 15.
What are the disadvantages of email?
Plus One Computer Application Model Question Papers Paper 2 17

Question 16.
What are the facilities provided by the IRCTC website?
Plus One Computer Application Model Question Papers Paper 2 18

Part C

Answer any nine questions from 17 to 27
Plus One Computer Application Model Question Papers Paper 2 19

Question 17.
What are the methods of representing integers in computer memory?
Plus One Computer Application Model Question Papers Paper 2 20

Question 18.
What is the role of a computer in problem-solving?
Plus One Computer Application Model Question Papers Paper 2 21

Question 19.
What is a computer program? How do algorithms help to write programs?
Plus One Computer Application Model Question Papers Paper 2 22

Question 20.
Distinguish between identifiers and keywords.
Plus One Computer Application Model Question Papers Paper 2 23

Question 21.
Explain the different types of logical operators in C++.
Plus One Computer Application Model Question Papers Paper 2 24

Question 22.
Explain the memory representation of a variable with the help of an example.
Plus One Computer Application Model Question Papers Paper 2 25

Question 23.
How do the type modifiers affect the size and range of int and char data types?
Plus One Computer Application Model Question Papers Paper 2 26

Question 24.
Write a C++ program to find the biggest number from 3 given numbers.
Plus One Computer Application Model Question Papers Paper 2 27

Question 25.
Briefly explain the working of a for loop along with its syntax. Give an example of for loop to support your answer.
Plus One Computer Application Model Question Papers Paper 2 28

Question 26.
What are the advantages and disadvantages of social media?
Plus One Computer Application Model Question Papers Paper 2 29

Question 27.
Discuss in detail various uses of IT in health care field.
Plus One Computer Application Model Question Papers Paper 2 30

Part D

Answer any two questions from 28 to 30
Plus One Computer Application Model Question Papers Paper 2 31

Question 28.
List and explain various categories of software.
Plus One Computer Application Model Question Papers Paper 2 32

Question 29.
In the following program, some lines are missing. Fill the missing lines and complete it.
Plus One Computer Application Model Question Papers Paper 2 33

# include<iostream.h>
....................................
{ 
int num1, num2, sum; 
cout<< “Enter two numbers:”;
......................................
......................................
cout<< “Sum of numbers are = "<<sum;
}

Question 30.
Which is/are communication channels suitable for the following situations?
Plus One Computer Application Model Question Papers Paper 2 34
a. Setting up a LAN.
Plus One Computer Application Model Question Papers Paper 2 35
b. Transfer of data from a laptop to a mobile phone.
Plus One Computer Application Model Question Papers Paper 2 36
c. Transfer of data from one mobile phone to another.
Plus One Computer Application Model Question Papers Paper 2 37
d. Creating a remote control that can control multiple devices in a home.
Plus One Computer Application Model Question Papers Paper 2 38
e. Very fast communication between two offices in two different countries.
Plus One Computer Application Model Question Papers Paper 2 39
f. Communication in hilly area.
Plus One Computer Application Model Question Papers Paper 2 40
g. Communication within a city and its vicinity where a coast of cabling is too high.
Plus One Computer Application Model Question Papers Paper 2 41

Answers

Answer 1.
Joint Picture Experts Group

Answer 2.
recycling

Answer 3.
bugs

Answer 4.
constant

Answer 5.
unethical

Answer 6.
101 → 5,
011 → 3
x = 53

Answer 7.
The benefit of using a blue-violet laser is that it has a shorter wavelength which makes it possible to focus the laser spot with greater precision. This allows data to be packed more tightly. Therefore it is possible to store more data on the disk. Can hold up to 25 GB on a single-layer disc and 50 GB on a dual-layer disc. ‘

Answer 8.
ROM is nonvolatile; the contents are retained even after the power is switched off. It is used to hold boot up a program known as Basic Input Output System (BIOS). This software runs when the computer is switched on or ‘boots up’. It checks the computer’s hardware and then loads the operating system.

Answer 9.
The error messages may be displayed by the error handling function of the language. These errors are known as a runtime error. These errors can be rectified by providing instruction for checking, the validity of the data before it gets processed by the subsequent instructions in the program.

Answer 10.
a. No header file, no semicolon is used at the end of a second and third statement. Variables did not declare a return value not specified, auto cannot be used here.
b. M is upper case in main(), no semicolon used in any statements. Operators of sin and cout are wrong. Missing in conditional operator?

Answer 11.
A simple arithmetic statement can be expressed in a more condensed form using arithmetic assignment operators.
eg., a=a+10 can be represented as a+=10. Here += is arithmetic assign* meant operator. The arithmetic assignment operators in C++ are +=, =,*=,/=, %=. These are also known as C++ shorthands. These are all binary operators and the first operand should be a variable. The use of these operators makes the two operations (arithmetic and assignment) faster than the usual method.
Plus One Computer Application Model Question Papers Paper 2 42

Answer 12.

# include<iostream> 
using namespace std; 
int main()
{
char ch;
cout << “Enter the character(only small letter): "; 
cin » ch;
if (ch >= ‘a’ && ch <= 'z) 
cout<<“You entered an alphabet”; 
if (ch >= ‘0’ && ch <= ‘9’) 
cout<<“You entered a digit\n”; 
return 0;
}

Answer 13.
It is defined as the sharing of available hardware and software resources in a computer network.

Answer 14.
The physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network.

Answer 15.
1. It requires a computer, a modem, software, and internet connection to check mail.
2. Some emails may contain viruses.
3. Mailboxes are filled with junk mail. So very difficult to find the relevant mail.

Answer 16.
IRCTC provides online booking facilities of railway tickets and offers other services like checking reservation status, train timing, reservation of hotels for the tourists across the country.

Answer 17.
There are three methods for representing an integer number in computer memory. They are:
a. Sign and magnitude representation
b. 1’s complement representation
c. 2’s complement representation

Answer 18.
A computer can solve problems only when we give instructions to it. If it understands the tasks contained in the instructions, it will work accordingly. An instruction is an action-oriented statement. It tells the computer what operation it should perform. A computer can execute (carry out the task contained in) an instruction only if the task is specified precisely and accurately.

Answer 19.
A sequence of instructions written in a language that is understood by a computer is called a computer program.
The algorithm is a step by step procedure to solve a problem. Each step represents a specific task. These steps help the programmer to write instructions in a programming language.

Answer 20.
Identifiers are the user-defined words that are used to name different program elements such as memory locations, statements, functions, objects, classes etc.

The words (tokens) that convey a specific meaning to the language compiler are called keywords. These are also known as reserved words as they are reserved by the language for special purposes and cannot be redefined for any other purposes.

Answer 21.
1. && (logical AND). If two relational expressions E1 and E2 are combined using this ‘operator, the result will be 1 (True) only if both E1 and E2 have values 1 (True). In all other cases, the result will be 0 (False).
2. 11 (logical OR). If two relational expressions E2 and E2 are combined using logical OR (| |) operator, the result will be 0 (False) only if both E1 and E2 are having a value 0 (False), In all other cases, the result will be 1 (True).
3. (logical NOT). This operator is used to negate the result of a relational express

Answer 22.
Plus One Computer Application Model Question Papers Paper 2 43
Memory representation of a variable The variable name is num and it consumes 4 bytes of memory at memory addresses 101, 102, 103 and 104. The content of this variable is 18. That is the Lvalue of num is 101 and the Rvalue is 18.

Answer 23.
C++ provides data type modifiers which help us to alter the size, range or precision. It alters the range of values permitted to a data type by altering the memory size and/or sign of values.

NameDescriptionSize
charCharacter or a small integer1 byte
short int (short)Short Integer2 bytes
intInteger4 bytes
long int (long)Long integer4 bytes

Answer 24.

# include<iostream> 
using namespace std; 
int main()
{
int colour;
cout<<“Enter a number between 1 and 4:”;
cin>>colour; 
if (colour==1) 
cout<<“Red”; 
else if (colour==2)
cout<<“Green”; 
else if (colour—3) 
cout<<“Blue”; else
cout<<“Wrong input”; 
return 0;
}

Answer 25.
for loop is an entry controlled loop. All the three loop elements (initialization, test expression, and update statement) are placed together in for a statement. So it Snakes the program compact. The syntax is:

for (initialization; test expression; update statement)
body-of-the-loop;
}
These three steps (test, body, update) are continued until the test expression
is evaluated to False, 
eg., for (n=1; n<= 10; ++n)
{
cout<< “hello”;
}

Answer 26.
Advantages are:

  1. Bring people together; It allows people to maintain the friendship.
  2. Ran and organize events: It allows users to plan and organize events.
  3. Business promotion: It helps the firms to promote their sales.
  4. Social skills: There is a key role in the formation of society.

Disadvantages are:

  1. Intrusiontoprivacy. The personal information (photo, email id, phone number, name, address etc.) posted in such sites can be used for illegal activities.
  2. Addiction. Addiction to such sites wastes our valuable time.
  3. Spread rumors. Social media will spread the news quickly.

Answer 27.
Some of the areas where ICT used in health are the following:
1. Medical equipment. Most of the modern medical equipment work with the help of computers. Scanners like CT, MRI depends on computers to process their data. Computer-guided lasers are used in surgery, even in the removal of brain tumors etc.

2. Electronic Medical Records (EMR). It is possible to store all patient’s records in digital format. This is known as EMR. EMR is used by doctors for diagnostics and treatment.

3. Web-based support/diagnosis. There are a lot of treatments, therapies, medical journals are available on the internet, which can be referred to by patients. Some websites provide a facility for identifying their diseases without consulting a doctor. This predictions, may not be correct in some time.

4. Telemedicine. It helps to monitor and share a patients conditions like body temperature, blood pressure, heartbeats, ECG etc. from a distant place by a doctor. A surgeon in one place of the world can contact an expert from another part of the world while performing a surgery. It reduces cost and time.

5. Research and Development. Various researches are going on to discover new medicines. Use of IT in biotechnology have reduced the cost of drug discovery. Drugs for a specific purpose can be developed with the use of advanced computers.

Answer 28.
The software is a general term used to denote a set of programs that help us to use a computer system and other electronic devices efficiently and effectively. The two types of software are:
1. System software: It is a set of one or more programs designed to control the operations of a computer.

  • Operating system: It is a set of programs that act as an interface between the user and computer hardware.
  • Language processors: The instructions to the computer are written in different languages. Various language processors are:
    • Assembler: It converts languages written in assembly language into machine language.
    • Interpreter: It converts a high-level language into machine language by-line by line.
    • Compiler: It translates a high-level language into machine language by converting all the lines at a time.
  • Utility software: A set of programs which help users in system maintenance tasks and in performing tasks of routine nature. Utility programs are compression tools (WinZip, Win RAR), disk defragmenter (rearranges files on a computer hard disk), backup software.

2. Application software: It is the software developed for a specific application. It includes general purpose software (Word Processing software, spreadsheet software, presentation software, database, multimedia), specific purpose software (designed to handle particular tasks).

Answer 29.

# include<iostream.h> 
void main()
{
int num1, num2, sum;
cout<< “Enter two numbers:”;
cin»num1>>num2;
sum = num1 + num2;
cout<< “Sum of numbers are = ”
<<sum;
}

Answer 30.
a. STP/UTP (Twisted pair cable)
b. Bluetooth or WiFi
c. Bluetooth or infrared
d. Infrared
e. Satellite communication
f. Microwaves
g. WiMax

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Model Question Paper 1

Kerala Plus One Computer Application Model Question Paper 1

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Model Question Papers Paper 1 33

Part A

Answer all questions from 1 to 5
Plus One Computer Application Model Question Papers Paper 1 1

Question 1.
Information may act as data. State True or False.
Plus One Computer Application Model Question Papers Paper 1 2

Question 2.
…………….. register holds the address of the next instruction to be executed by the processor.
Plus One Computer Application Model Question Papers Paper 1 3

Question 3.
A program written in HLL is known as ………..
Plus One Computer Application Model Question Papers Paper 1 4

Question 4.
The unpredictable value assigned to a variable at the time of its declaration is known as
Plus One Computer Application Model Question Papers Paper 1 5

Question 5.
The small text files used by browsers to remember our email IDs, usernames etc. are known as ……………..
Plus One Computer Application Model Question Papers Paper 1 6

Part B

Answer any nine questions from 6 to 16
Plus One Computer Application Model Question Papers Paper 1 7
Plus One Computer Application Model Question Papers Paper 1 8

Question 6.
Find decimal equivalent of (10001)2
Plus One Computer Application Model Question Papers Paper 1 9

Question 7.
What are the advantages of a hard disk?
Plus One Computer Application Model Question Papers Paper 1 10

Question 8.
Differentiate hardcopy and softcopy.
Plus One Computer Application Model Question Papers Paper 1 11

Question 9.
Write the names of two phases that are included in debugging.
Plus One Computer Application Model Question Papers Paper 1 12

Question 10.
What would happen if main () is not present in a program?
Plus One Computer Application Model Question Papers Paper 1 13

Question 11.
Comments are useful to enhance readability and understandability of a program. Justify this statement with examples.
Plus One Computer Application Model Question Papers Paper 1 14

Question 12.
What are the are the requirements to implement a multi-branching using a switch statement?
Plus One Computer Application Model Question Papers Paper 1 15

Question 13.
What is the peer-to-peer network? Peertopeer
Plus One Computer Application Model Question Papers Paper 1 16

Question 14.
Switch and hub are two devices associated with networking. Differentiate them.
Plus One Computer Application Model Question Papers Paper 1 17

Question 15.
Compare intranet and extranet.
Plus One Computer Application Model Question Papers Paper 1 18

Question 16.
What are the advantages of EMR?
Plus One Computer Application Model Question Papers Paper 1 19

Part C

Answer any nine questions from 17 to 27
Plus One Computer Application Model Question Papers Paper 1 20

Question 17.
And the smallest number in the list.
Plus One Computer Application Model Question Papers Paper 1 21
a. (1101 )2
b. (A)16
c. (13)8
d. (15)10

Question 18.
Write an algorithm to find a sum of first 100 odd numbers.
Plus One Computer Application Model Question Papers Paper 1 22

Question 19.
Draw a flowchart to display the first 100 natural numbers.
Plus One Computer Application Model Question Papers Paper 1 23

Question 20.
What is a floating point constant? What are the different ways to represent a floating point constant?
Plus One Computer Application Model Question Papers Paper 1 24

Question 21.
What are the three aspects of variables?
Plus One Computer Application Model Question Papers Paper 1 25

Question 22.
Find out the errors, if any, in the following C++ statements:
Plus One Computer Application Model Question Papers Paper 1 26

  1. cout<< “a=” a;
  2. m=5, n=12; 015
  3. cout << “x” ; <<x;
  4. cin >> y
  5. cout>>\n “abc”
  6. a = b + c
  7. break = x

Question 23.
The following program finds the sum of three numbers. Modify the program to find the average. (Average should display fractional part also).
Plus One Computer Application Model Question Papers Paper 1 27

# include<iostream>
using namespace std;
int main ()
int x, y, z, result;
cout<<“Enter values for x, y, z”;
cin>>x>>y>>z;
result = x + y + z; .
cout<< “The answer is =”<<result; 
return 0;
}

Question 24.
Rewrite the following statement using while and do while loops.
Plus One Computer Application Model Question Papers Paper 1 28
for(i=1; i<=10; i++) cout<<i;

Question 25.
Write the significance of break statement in the switch statement. What is the effect of the absence of a break in a switch statement?
Plus One Computer Application Model Question Papers Paper 1 29

Question 26.
What are the methods for preventing network attacks?
Plus One Computer Application Model Question Papers Paper 1 30

Question 27.
What are the major challenges faced in the implementation of e-Learning?
Plus One Computer Application Model Question Papers Paper 1 31

Part D

Answer any two questions from 28 to 30
Plus One Computer Application Model Question Papers Paper 1 32

Question 28.
Explain any five commonly used secondary or (auxiliary) memory devices.
Plus One Computer Application Model Question Papers Paper 1 33
Plus One Computer Application Model Question Papers Paper 1 34

Question 29.
WHte a C++ program to find the total and percentage of a student in six subjects.
Plus One Computer Application Model Question Papers Paper 1 35

Question 30.
What is network protocol? Explain.
Plus One Computer Application Model Question Papers Paper 1 36

Answers

Answer 1.
True

Answer 2.
Program Counter (PC)

Answer 3.
source code

Answer 4.
garbage value

Answer 5.
cookies

Answer 6.
(10001)2 = 1 × 24 + 0 × 23 + 0 × 22 + 0 × 21 + 1 × 2°
= 16 + 0 + 0 + 0 + 1
= 17
(10001 )2 = (17)10

Answer 7.
Hard disks have very high storage capacity, high data transfer rates, and low access time, it is more durable and less error-prone.

Answer 8.
Hardcopy outputs are permanent outputs which can be used at a later date or when required.
Softcopy outputs are electronic and are available on the screen in a digital form.

Answer 9.
Two phases that included in debugging are debugging of syntax errors during translation and debugging of logical errors during execution.

Answer 10.
The execution starts at main() and ends within main(). If we use any other function in the program, it is called (or invoked) from main().

Answer 11.
Comments are lines in the code that are added to describe the program. They are ignored by the compiler.
i. Single line comment: The characters // (two slashes) is used. The text appearing after II in a line is treated as a comment by the C++ compiler.
ii. Multiline comments: Anything written within /* and */ is treated as a comment so that the comment can take any number of lines.
eg., /* This program displays the message “Smoking is injurious to health” on the monitor */

# include <iostream.h> // To use the cout object
using namespace std; // To access cout 
int main() // program begins here 
{ // The following output statement displays a message
cout << “Smoking is injurious to health"; return 0;
} // end of the program

Answer 12.
The following are the requirements to implement a multi-branching using a switch statement:

  1. Conditions involve only equality checking. In other cases, it should be converted into equality expression.
  2. The first operand in all the equality expressions should be the same variable or expression.
  3. The second operand in these expressions should be integer or character constants.

Answer 13.
In this configuration, all the computers have equal priority. That means each computer can function as both a client and a server. There is no dedicated server.

Answer 14.
A switch is an expensive device used to connect computers (device) to a network. Unlike a hub, switch transmit data, not to all computers, it retransmits data only to the intended computer. So the traffic is less and the speed is high.

Answer 15.
Intranet: A private network inside a company or organization is called intranet.
Extranet: It allows vendors and business partners to access the company resources.

Answer 16.
It is a more economical way of storing data. Medical history of patients will be accessible to patients easier and quicker. Transfer of records’ of patients between doctors/hospitals is much easier. A medical condition of a patient can be examined.

Answer 17.
a: (1101)= 1 × 23 + 1 × 22 + 0 × 21 + 1 × 2°
= 8 + 4 + 1
= 13
b. (A)16 = 10
c. (13)8 = 1 × 81 + 3 × 8°
= 8 + 3 = 11
d. (15)10 = 15
The smallest value is (A)16 = 10

Answer 18.

Step 1: Start
Step 2: Sum = 0, count = 1
Step 3: If count/2==1 then go to Step 4
Step 4: Sum = Sum + count
Step 5: count = count + 1
Step 6: If count<=100 then go to Step 3
Step 7: Print Sum
Step 8: Stop

Answer 19.
Plus One Computer Application Model Question Papers Paper 1 37

Answer 20.
Rotating point literals or real constants are numbers having fractional parts. These can be written in one of the two forms called fractional form or exponential form. A fractional form consists of signed or unsigned digits including a decimal point between digits. A real constant in exponent form has two parts: a mantissa and an exponent.

Answer 21.

  1. Variable name. It is a symbolic name (identifier) given to the memory location through which the content of the location is referred to.
  2. Memory address. Every cell (or byte) in RAM will be assigned a unique address to refer it. The address is also called the Lvalue of a variable.
  3. Content. It is the value stored in the location. This is also called the Rvalue of the variable. Type and size of the content depending on the data type of the variable.

Answer 22.

  1. After “a=” an operator << is missing.
  2. The data type is missing, the variable name of 015 is missing.
  3. The first semicolon is an error.
  4. The semicolon is missing at the end.
  5. The semicolon is missing at the end. << should be used after cout. \n must be in double quote.
  6. The semicolon is missing at the end. A data type is missing.
  7. The semicolon is missing at the end. a break is a keyword.

Answer 23.

# include<iostream> 
using namespace std;
int main ( )
int x, y, z; float result;
cout<< “Enter values for x, y, z”; 
cin>>x>>y>>z; 
result = (x + y + z)/3.0; 
cout<< “The answer is =”<<result; 
return 0;
}

Answer 24.

while: 
i = 1;
while (i<= 10)
{
cout<<i;
i++;
}
do while: 
i = 1; 
do 
{
cout<<i;
i++;
}
while (i<= 10);

Answer 25.
When a break statement is encountered, the program control goes to the statements following the switch statement.
If the break statement is absent, even after finding a match other cases following are also checked. If no match is found, statements in the default block get executed.

Answer 26.
1. Firewall. A firewall is a combination of computer hardware and software that provide security to the computer/network. A firewall checks all the incoming and outgoing data from your computer and determines whether they are allowed or not.

2. Antivirus scanner. Antivirus software scans the files in the computer and removes viruses if they found. When an antivirus found malware in a file, the antivirus stops the file from running and put it into quarantine. Quarantine is a special area for storing files that are infected by a virus.

3. Cookies. These are small text files created when we use a browser to visit a website. Cookies store information like usernames, email address, websites visited, products purchased etc. Cookies help for efficient browsing. Cookies are not viruses, but it is possible for a hacker to use cookies as spyware. Most browsers provide facility to delete cookies.

Answer 27.

  1. Face to face contact between students adds teachers is not possible.
  2. Proper interaction among teachers and students are often limited due to the lack of infrastructural facilities.
  3. Equipment and technology (computer and high speed Internet) requirement restrict the adoption of e-Learning.
  4. Learners who require constant motivation may not be serviced adequately.
  5. Handson on real laboratory scenario is also a constraint in eLearning.

Answer 28.
1. Hard disk. It consists of metal disks coated with magnetic material concealed in dust free containers. Hard disks have very high storage capacity, high data transfer rates and low access time. It is more durable and less error prone. A hard disk may contain one or more platters. Each platter requires two read/write heads, one for each surface.

2. Compact Disc (CD). It is an optical storage medium capable of storing upto 700 MB of data. A CD drive uses red laser beams for reading from and writing data into CD. Two types of CDs are CDR (recordable) and CDRW (Rewritable).

3. USB flash drive. It is a small external storage device which consists of flash memory. These are portable and rewritable. The storage capacity of a USB drive currently varies from 2 GB to 32 GB.

4. Digital Versatile Disk (DVD). In these higher storage capacity is achieved by using smaller spots to record data. Recording and reading of data is done using DVD drive. The capacity of a DVD varies from 4.37 GB to 15.9 GB. There are three major types of DVDs: DVDROM, DVDRW and DVDRAM.

5. Magnetic tape. It is a backup device that can store huge volume of data. The cost per unit volume of a magnetic tape is less compared to other magnetic storage devices. It is a recording medium consisting of a thin tape with a coating of fine magnetic material. It can be used for recording analog or digital data. Data is stored in frames across the width of the
‘tape with a read/ write head.

Answer 29.

# include <iostream> 
using namespace std; 
int main()
{
int i, mark, sum = 0, max; 
float per;
for (i = 0; i<6; i++)
{
cout<<“ Enter the mark: ”;
cin>>mark;
sum = sum + mark; 
}
cout<<“Enter the maximum mark: ”; 
cin>>max;
per = (sum/max)* 100; 
cout<<“Sum of the entered marks:” << sum;
cout<<“ Percentage of the marks in six subjects:” << per; 
return 0;
}

Answer 30.
A protocol is a collection of rules and regulations to transfer data from one location to another. Different types of protocols are:

  1. Transmission Control Protocol (TCP): It uses a set of rules to exchange messages with other internet points at the information packet level.
  2. Internet Protocol (IP): It uses a set of rules to send and receive messages at the internet address level.
  3. File Transfer Protocol (FTP): It is used for transferring files between computers connected to local network or internet.
  4. Hyper Text Transfer Protocol (HTTP): It is a protocol used for WWW for enabling the web browse to access web server and request HTML documents.

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Previous Year Question Paper 2017

Kerala Plus One Computer Application Previous Year Question Paper 2017

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Previous Year Question Papers and Answers 2017 33

Question 1.
Processed data is known as ………….
a. facts
b. figures
c. information
d. raw material
Plus One Computer Application Previous Year Question Papers and Answers 2017 1

Question 2.
USB port stands for ……………..
Plus One Computer Application Previous Year Question Papers and Answers 2017 2
a. Uniform Serial Bus
b. Universal Serial Bus
c. Uninterruptable Serial Bus
d. Updatable Serial Bus

Question 3.
Fill the missing block.
Plus One Computer Application Previous Year Question Papers and Answers 2017 3

Question 4.
Which one of the following is NOT a search engine?
Plus One Computer Application Previous Year Question Papers and Answers 2017 4
a. Google
b. Bing
c. Facebook
d. Ask

Question 5.
In ICT enabled services BPO stands for
Plus One Computer Application Previous Year Question Papers and Answers 2017 5

Question 6.
for, while do while are the three looping statements in C+ +. From these three loops which loop will execute the loop body at least once even though the condition is false?
Plus One Computer Application Previous Year Question Papers and Answers 2017 6
Plus One Computer Application Previous Year Question Papers and Answers 2017 7
a. for loop
b. while loop
c. do while loop
d. do for loops

Question 7.
HTTP stands for a ………………. protocol.
Plus One Computer Application Previous Year Question Papers and Answers 2017 8

Question 8.
IDE stands for …………..
Plus One Computer Application Previous Year Question Papers and Answers 2017 9
a. Integrated Development Environment
b. Information Development Environment
c. Inheritance Development Environment
d. Interactive Development Environment

Question 9.
Let X and Y are two variables of int data type, then correct the following input statement.
Plus One Computer Application Previous Year Question Papers and Answers 2017 10

Question 10.
In a flowchart, the terminal (an ellipse) symbol is used to indicate the ……………… and …………… in the program logic.
Plus One Computer Application Previous Year Question Papers and Answers 2017 11

Question 11.
A ……………….. is a computer peripheral that allows you to connect and communicate with other computers via telephone lines.
Plus One Computer Application Previous Year Question Papers and Answers 2017 12

Question 12.
Differentiate or define the terms Hardware (h/w) and software (s/w) in a computer system. Give one example for each.
Plus One Computer Application Previous Year Question Papers and Answers 2017 13

Question 13.
a. Convert (1010.11)2 to decimal.
b. Find the missing terms in the following series. (18)16, (1A)16, (1C)16 ………………., ……………….
Plus One Computer Application Previous Year Question Papers and Answers 2017 14

Question 14.
Predict the output of the following operations. x = – 5 and y = 3 initially,
Plus One Computer Application Previous Year Question Papers and Answers 2017 15
Consider the following statement.
Plus One Computer Application Previous Year Question Papers and Answers 2017 16
int Length;
Then what is the difference between (a) and (b)?
Plus One Computer Application Previous Year Question Papers and Answers 2017 17
a. Length = 50
b. Length ==50

Question 15.
Arrange the following memory or storage devices on the base of their operation speed in ascending order.
Plus One Computer Application Previous Year Question Papers and Answers 2017 18
a. Hard disk
b. Cache
c. RAM
d. Registers

Question 16.
List the different stages in programming.
Plus One Computer Application Previous Year Question Papers and Answers 2017 19

Question 17.
Classify the following identifiers valid or invalid. If invalid, give a reason.
Plus One Computer Application Previous Year Question Papers and Answers 2017 20
a. Length_l
b. _Lengthl
c. Length 1
d. 1 Length

Question 18.
A part of biodata of a student is given. Identify the data types which we can use to store and process these data.
Plus One Computer Application Previous Year Question Papers and Answers 2017 21
RolIJMumber : 34
Age : 17
Sex : M
Mob_Number : 8181818181
Height_in_Cm : 152.8
Rncode : 690601

Question 19.
State whether the following statements are true or false. If false, give a reason.
Plus One Computer Application Previous Year Question Papers and Answers 2017 22
a. break statement is essential in a switch.
b. for loop is an entry controlled loop.
c. do while loop is an entry controlled loop.
d. the switch is a selection statement.

Question 20.
URL stands for Uniform Resource Locator. Every resource on the internet has a unique URL. Then classify the following URL on the basis of
Plus One Computer Application Previous Year Question Papers and Answers 2017 23
http://www.dhsekerala.gov.in/index.html
a. Network protocol
b. Domain name
c. Filename

Question 21.
How is a WAN different from a LAN?
Plus One Computer Application Previous Year Question Papers and Answers 2017 24

Question 22.
If a = 5, b = 4, c = 3, d = 4, then what is the result in X after the following operation ?
Plus One Computer Application Previous Year Question Papers and Answers 2017 25

Plus One Computer Application Previous Year Question Papers and Answers 2017 26

Is there any difference between (a) and (b) by considering the following statement?
Plus One Computer Application Previous Year Question Papers and Answers 2017 27
a. Gender = ‘M’;
b. Gender = ‘M’;

Question 23.
Your friend Ravi purchased a new PC for his personal use. Mention the components required to connect this PC to the internet.
Plus One Computer Application Previous Year Question Papers and Answers 2017 28

Question 24.
Compare the advantages and disadvantages of implementing eBusiness.
Plus One Computer Application Previous Year Question Papers and Answers 2017 29

Question 25.
Compare Dot Matrix Printer (DMP), inkjet printer, laser printer, and thermal printer on the basis of their working speed, quality of printing and expense for printing.
Plus One Computer Application Previous Year Question Papers and Answers 2017 30
Dot Matrix Printer (DMP), inkjet printer, laser printer, thermal printer.

Question 26.
Rewrite the following code using else if ladder.
Plus One Computer Application Previous Year Question Papers and Answers 2017 30

Plus One Computer Application Previous Year Question Papers and Answers 2017 32

# include<iostream> 
using namespace std; 
int main()
{
int colour;
cout«“Enter a number between 1 and 4 : ";
cin»colour;
switch(colour)
{
case 1:
cout<<“Red”; 
break; case 2:
cout<<“ Green"; 
break; case 3:
cout<<“Blue”;
break;
default:
cout<<“Wrong input”;
}
}

OR

Write a C++ program to find the biggest number from 3 given numbers.

Answers

Answer 1.
c. Information

Answer 2.
b. Universal Serial Bus

Answer 3.
Compiler / interpreter / assembler /language processors

Answer 4.
c. Facebook

Answer 5.
Business Process Outsourcing

Answer 6.
c. do while loop

Answer 7.
Hyper Text Transfer Protocol

Answer 8.
a. Integrated Development Environment

Answer 9.

cin>>X>>Y;

Answer 10.
Start and Stop

Answer 11.
MODEM

Answer 12.
Hardware is the tangible and visible parts of a computer, which consists of some electromechanical components, eg., keyboard, mouse. The software is a set of programs that help us to use the computer system for our needs, eg., Operating system, language processors.

Answer 13.
a. (1010.11)2 = 1 × 23 + 0 × 22 + 1 × 21
+ 0 × 2°+ 1 x 21 + 1 × 22
= 8 + 0 + 2 + 0 + 1/2 + 1/4
= 10 + 0.75
= 10.75
b (1E)16, (20)16

Answer 14.
a. 5
b.1
c.2
d. 2

OR

a. The value 50 will be stored in the variable Length (ie., assignment operation).
b. The value 50 and the value of Length will be compared.

Answer 15.
Hard disk, RAM, Cache, Registers

Answer 16.

  1. Problem identification: During this phase, you will be able to identify the data involved in processing, its type and quality, a formula to be used, activities involved and the output to be obtained.
  2. Preparing algorithms and flowcharts: Once the problem is identified, it is necessary to develop a precise step-by-step procedure to solve the problem.
  3. Coding the program: The process of writing program instructions to solve a problem is called coding. The program written in any HLL is known as source code.
  4. Translation: It is the process of converting a program written in the high-level language into its equivalent version in machine language. The compiler or interpreter is used for this purpose.
  5. Debugging: In this stage, programming errors are discovered and corrected. Programming errors are known as ‘bugs’ and the process of detecting and correcting these errors is called debugging.

Answer 17.
a. Valid
b. Valid
c. Invalid; White space is used.
d. Invalid; the First letter is a digit.

Answer 18.
Roll_Number: int
Age: int
Sex: char
Mob_Number: long int
Height_in_Cm: float
Pincode: int/long int

Answer 19.
a. True
b. True
c. False; do while loop is an exit controlled loop
d. True

Answer 20.
a. http
b. dhsekerala.gov.in
c. index.html

Answer 21.
Wide Area Network (WAN). This is used to connect computers over a large geographical area. It is a network\of network. Here the computers are connected using telephone lines or microwave station or satellites. The error rate in data transmission is high, eg., internet. Local Area Network (LAN). This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial cable. Data transfer rate is high and an error rate is less.

Answer 22.
-3
OR
a. It is true. The variable is a type of char and the value assigned is a character value.
b. This statement is wrong. The variable is a type of char and the value assigned is a string.

Answer 23.
The following are the requirements for connecting a computer to the Internet:
1. (NIC) and an operating system that supports TCP/IP.
2. Modem
3. Telephone connection
4. Internet account of any ISP (Internet Service Provider)
5. Software for browsing.

Answer 24.
The major advantages of using e-Business applications are:

  • With e-Business, you can buy and sell products from anywhere.
  • eBusiness reduces the operational cost.
  • It minimizes travel time and cost. Challenges to eBusiness:
  • Most of the people are unaware of online business and its possibilities or they do not know how to conduct this.
  • Most of the people from rural areas do not have plastic money (debit card, credit card) which is necessary for eBusiness.
    If not used with caution your valuable information like credit card no., password etc. may lose.

Answer 25.

  1. Dot matrix printers use small electromagnetically activated pins in the print head and an inked, to produce images by an impact. These printers are slow and noisy.
  2. Inkjet printers form the image on the page by spraying tiny droplets of ink from the printed head. The printer needs several colors of ink. These are inexpensive, but the cost of ink cartridge makes it a costly.
  3. Laser printer produces good quality output. The image to be printed is transferred to a drum using a laser beam. The toner powder from the toner cartridge is then sprayed on the drum. The toner powder sticks onto the portions traced the drum by the laser beam. It is transferred to a paper by rolling the paper on the drum. Through heating, the powder is fused on to the paper. Laser printers are faster and their speed is in page per minute (ppm).
  4. The thermal printer produces a printed image by selectively heating heat-sensitive when it passes over the thermal print head.

Answer 26.

# include<iostream>
using namespace std;
int main()
{
int colour;
cout<<“Enter a number between 1 and 4:";
cin»colour; if (colour==1)
cout<<“Red”;
else if (colour==2)
cout<<“Green”; 
else if (colour==3) cout«“Blue";
else
cout«“Wronginput”; 
return o;
}

OR

#include<iostream> using namespace std; 
int main() 
{
int a, b, c;
cout<<“Enter three different numbers:”; 
cin >> a >> b >> c ; 
if (a > b)
{
if (a > c)
cout<<“The largest number is:”« a; 
else
cout<<“The largest number is:”<<c;
}
else
{
if (b > c)
cout<<“The largest number is:”«b; 
else
cout<<“The largest number is: ”<<c;
}
return O;
}

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Application Previous Year Question Paper 2018

Kerala Plus One Computer Application Previous Year Question Paper 2018

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Application Previous Year Question Papers and Answers 2018 33

Part A
Answer all questions from 1 to 5
Plus One Computer Application Previous Year Question Papers and Answers 2018 1

Question 1.
The meaningful and processed form of data is known as ……………….
Plus One Computer Application Previous Year Question Papers and Answers 2018 2

Question 2.
Write the full form of USB.

Question 3.
…………….. is a step by step procedure to solve a problem.
Plus One Computer Application Previous Year Question Papers and Answers 2018 3

Question 4.
What is the name of files created to support C++ programs and kept in the standard library?
Plus One Computer Application Previous Year Question Papers and Answers 2018 4

Question 5.
Find out the odd one from the following:
Plus One Computer Application Previous Year Question Papers and Answers 2018 5
a. DOS
c. ISDN
b. DSL
d. FTTH

Answer any nine questions from 6 to 16
Plus One Computer Application Previous Year Question Papers and Answers 2018 6

Question 6.
Despite the high speed and accuracy, computers are said to be the slaves of human beings. Why?
Plus One Computer Application Previous Year Question Papers and Answers 2018 7
Plus One Computer Application Previous Year Question Papers and Answers 2018 8

Question 7.
Name the four waste disposal methods.
Plus One Computer Application Previous Year Question Papers and Answers 2018 9

Question 8.
What are the features of RAM?
Plus One Computer Application Previous Year Question Papers and Answers 2018 10

Question 9.
Problem-solving by computer proceeds through different stages. Name the stages in the correct order.
Plus One Computer Application Previous Year Question Papers and Answers 2018 11

Question 10.
Write the output of the following C++ expressions.
Plus One Computer Application Previous Year Question Papers and Answers 2018 12

Let a = 7, b = 2 ’
a. a + b * 3 / ++b;
b. a < = 7 && b > 1;

Question 11.
Detect and correct the errors in the following C++ code.
Plus One Computer Application Previous Year Question Papers and Answers 2018 13

# include<iostream> 
using name space std; 
int main ( );
int a, b;
cout<< “Enter two numbers”; 
cin>>a and b; a + b = c;
cout<< “Sum =”<<c; 
return 0;
}

Question 12.
Rewrite the following code using a switch case statement.
Plus One Computer Application Previous Year Question Papers and Answers 2018 14

if(Lan==‘M’)
cout<<‘i prefer Malayalam”;
else if (Lan == ‘E’)
cout<<“l prefer English”;
else cout<<“l prefer neither Malayalam
nor English”;

Question 13.
There are many advantages of using networked computers instead of standalone computers. Write any four advantages of them.
Plus One Computer Application Previous Year Question Papers and Answers 2018 15

Question 14.
What is the importance of the TCP/IP protocol in computer networks?
Plus One Computer Application Previous Year Question Papers and Answers 2018 16

Question 15.
Write any two drawbacks in using social media.
Plus One Computer Application Previous Year Question Papers and Answers 2018 17

Question 16.
eBusiness has many possibilities in the business world, but it faces some challenges. Write about any two challenges in e-Business.
Plus One Computer Application Previous Year Question Papers and Answers 2018 18

Answer any nine questions from 17 to 27
Plus One Computer Application Previous Year Question Papers and Answers 2018 19

Question 17.
If (M)8 = (96)10 = (N)2 , find M and M.
(M)8 = (96)10 = (N)2
Plus One Computer Application Previous Year Question Papers and Answers 2018 20Plus One Computer Application Previous Year Question Papers and Answers 2018 21

Question 18.
Following is a flowchart to find the sum of the first 50 natural numbers.
a. Correct the flowchart if there are errors.
b. Redraw the flowchart to find the sum of even numbers between 1 and 50.
Plus One Computer Application Previous Year Question Papers and Answers 2018 22
Plus One Computer Application Previous Year Question Papers and Answers 2018 23

Question 19.
What is debugging? Which are the different types of errors that may occur in a program?
Plus One Computer Application Previous Year Question Papers and Answers 2018 24

Question 20.
a. What is a token in C++?
Plus One Computer Application Previous Year Question Papers and Answers 2018 25
b. Distinguish between keywords and identifiers.
Plus One Computer Application Previous Year Question Papers and Answers 2018 26

Question 21.
Data types are necessary to declare variables in C++.
a. What is a data type?
b. Write the classification of fundamental data types in C++.
Plus One Computer Application Previous Year Question Papers and Answers 2018 27

Question 22.
Write a short note on arithmetic and logical operators in C++.
Plus One Computer Application Previous Year Question Papers and Answers 2018 28

Question 23.
a. Write the equivalent arithmetic operations for the given C++ shorthands.
Plus One Computer Application Previous Year Question Papers and Answers 2018 29
b. What is the difference between a=20 and a==20?
Plus One Computer Application Previous Year Question Papers and Answers 2018 30

Question 24.
Write a C++ program to find the sim pie interest of an amount (P) deposited with a rate of interest (R) for a period of years (N). A rate of interest = 7% if deposit amount P is less than 1 lakh. A rate of interest = 8% if deposit amount P is between 1 lakh and 5 lakhs. A rate of interest = 9% if the deposit amount P is above 5 lakhs. (Hint: Simple interest = P × N × R/100)
Plus One Computer Application Previous Year Question Papers and Answers 2018 31

Question 25.
a. Give the output of the following code.
Plus One Computer Application Previous Year Question Papers and Answers 2018 32

for(i= 10; i<30; i+ = 3)
{
cout<<i<<“\t”;
}

b. Rewrite the code using while loop, while
Plus One Computer Application Previous Year Question Papers and Answers 2018 33

Question 26.
Explain briefly about the wireless broadband connectivity methods used for internet connection.
Plus One Computer Application Previous Year Question Papers and Answers 2018 34

Question 27.
e-Leaming allows us to overcome many limitations of the conventional teaching-learning process.
a. Name any three eLearning tools for enhancing the e-Learning process.
b. Write any three advantages of eLearning.
Plus One Computer Application Previous Year Question Papers and Answers 2018 35

Answer any two questions from 28 to 30
Plus One Computer Application Previous Year Question Papers and Answers 2018 36

Question 28.
a. Write a detailed classification of software.
b. Some programming languages use compiler whereas some use interpreter. What makes them different?
c. What do you mean by free software?
Plus One Computer Application Previous Year Question Papers and Answers 2018 37

Question 29.
a. What is a type conversion ? Which are the two ways of type conversion?
Plus One Computer Application Previous Year Question Papers and Answers 2018 38
b. Define type casting.
Plus One Computer Application Previous Year Question Papers and Answers 2018 39
c. Consider the C++ code.
Plus One Computer Application Previous Year Question Papers and Answers 2018 40
p = 7, q = 2; float a, b;
a = p/q;
b = (a+q)/q;
Find the values of’a and b.

Question 30.
a. Define the term topology.
b. Consider that, your principal has decided to network your computer lab. Which topology will you suggest? Justify your answer.
c. Differentiate between LAN and WAN.
Plus One Computer Application Previous Year Question Papers and Answers 2018 41

Answers

Answer 1.
information

Answer 2.
Universal Serial Bus

Answer 3.
Algorithm

Answer 4.
Header files

Answer 5.
a. DOS

Answer 6.
Yes. Many people think that the computer has superhuman capabilities. However, this is not true. A computer does not have natural intelligence as humans have. A computer cannot decide on its own.

Answer 7.

  1. Reuse: It refers to second-hand use or usage after the equipment has been upgraded or modified.
  2. Incineration: It is a controlled and complete combustion process in which the waste is burned in specially designed incinerators at a high temperature in the range of 900 to 1000 degree Celsius.
  3. Recycling: It is the process of making or manufacturing new products from a product that has originally served its purpose.
  4. Landfilling: In this method, the soil is excavated from the trenches made and waste material is buried in it, which is covered by a thick layer of soil.

Answer 8.
The microprocessor can read from and write to RAM. Data can be stored and retrieved at random from anywhere within the RAM, no matter where the data is. The contents of RAM are lost when power is switched off. Therefore, RAM is a volatile memory. The speed of a RAM refers to how fast the data in memory is accessed and expressed in MegaHertz (MHz).

Answer 9.
Problem identification, preparing algorithms and flowcharts, coding the program, translation, debugging.

Answer 10.
a. 9
b. True / 1

Answer 11.

# include<iostream> 
using namespace std; 
int main ()
int a, b, c;
cout<< “Enter two numbers"; 
cin>>a>>b; c = a + b;
cout<< “Sum =”<<c; return 0;
}

Answer 12.

switch (Lan)
{
case‘M’: cout<<“I prefer Malayalam";
break;
case ‘E’: cout<<“l prefer English”; break;
default:cout<<“l prefer neither Malayalam nor English";
}

Answer 13.
The advantages of networks are:

  1. Resource sharing: All the computers in a network can share software.
  2. Reliability: If one computer fails, the other computer can perform the work without any delay.
  3. Price Vs Performance: Instead of a main frame 10 personal computers are used with less cost and same performance.
  4. Communication medium: It has a powerful communication medium. We can exchange information between computers in a network.
  5. Scalable: System performance can be increased by adding computers to a network.

Answer 14.
Transmission Control Protocol (TCP) uses a set of rules to exchange\messages with other internet points at time information packet level. When data is to be sent from one computer to another over the internet, it is first broken into smaller packets by TCP and then sends. When these packets are received by the receiving computer, TCP submits a request for retransmission else packets are assembled into the original message according to the rules specified in the TCP protocol. Delivery of each packet to the right destination is done by Internet Protocol (IP).

Answer 15.

  1. Intrusiontoprivacy.The personal information (photo, e-mail id, phone number, name, address etc.) posted on such sites can be used for illegal activities.
  2. Addiction to such sites wastes our valuable time.
  3. Spread rumors. Social media will spread the news quickly.

Answer 16.

  1. A good percentage of the population is unaware of IT applications and its uses. Most of the regular Internet users also lack knowledge about online business and its possibilities.
  2. Most of the customers, especially to the rural population, do not possess plastic money such as credit card, debit card and net banking system, which is necessary for e-Business.
  3. If not Used with caution, customers may lose valuable information like their credit card number, passwords, etc.
  4. Products like apparel, handicrafts, jewelry, etc are often purchased after examining physically. But in online shopping, customers don’t have this touch and feel advantage.
  5. For the success of e-Business of any organization or company perfect and efficient shipment service is a necessity.

Answer 17.
Plus One Computer Application Previous Year Question Papers and Answers 2018 42
Plus One Computer Application Previous Year Question Papers and Answers 2018 43

Answer 18.
Plus One Computer Application Previous Year Question Papers and Answers 2018 44

Answer 19.
It is the stage where programming errors are discovered and corrected, programming errors are known as ‘bugs’and the process of detecting and correcting these errors is called debugging.

The error messages may be displayed by the error-handling function of the language. These errors are known as a runtime error. These errors can be rectified by providing instruction for checking the validity of the data before it gets processed by the subsequent instructions in the program.

The logical error is due to the improper planning of the program’s logic. The language processor successfully translates the source code into machine code if there are no syntax errors. The computer actually follows the program instructions and gives the output as per the instructions. But the output may not be correct. This is known as logical errors.

The error messages may be displayed by the error-handling function of the language. These errors are known as a runtime error. These errors can be rectified by providing instruction for checking the validity of the data before it gets processed by the subsequent instructions in the program.

Answer 20.
a. Tokens or lexical units are the fundamental building blocks of the program. C++ has five types of tokens. They are keywords, identifiers, literals, punctuators, and operators.
b. Identifiers are the user-defined words that are used to name different program elements such as memory locations, statements, functions, objects, classes etc.
The words (tokens) that convey a specific meaning to the language compiler are called keywords. These are also known as reserved words as they are reserved by the language for special purposes and cannot be redefined for any other purposes.

Answer 21.
a. The data type specifies the nature of
data we have to store, the set of operations that can be performed on the data. Predefined data types in C++ are char, int, float, double and void, b. int data types; Integers are whole numbers without a fractional part: They can be positive, zero or negative. The keyword int represents integer numbers. It allows 4 bytes of memory.

char data types. All letters, digits, special symbols, punctuations, etc. come under this category. When these characters are used as data they are considered as char type data in C+ +. The keyword char represents character type data, void data type. The data type void is a keyword and it indicates an empty set of data. It does not require any memory space, float data types.

Numbers with a fractional part are called floating point numbers. The keyword float is used to denote such numbers. It allows 4 bytes of memory, double data type. It is used to store large real numbers. It uses 8 bytes of memory. It can be represented as double.

Answer 22.
Arithmetic operators: These are defined to perform basic arithmetic operations such as addition, subtraction, multiplication, and division. The symbols used for this are +,* and / respectively. It provides a special operator, % (modulus operator) for getting remainder during division.
Logical operators: Used to combine relational operations and it gives either true or false.

Answer 23.
a. i. x = x % 20;
ii. a = a + 2;
iii. p = p/5;
b. A specific data is stored in memory lo-cations (variables) using assignment op-erator (=). Here the value 20 is stored in the variable
a. == (equal to) is a relational operator used for comparing numeric data. Here the value 20 is compared with the value stored in the variable a.

Answer 24.

# include <iostream>'
using namespace std; 
int main()
{ 
int P, N, R; 
float SI;
cout << “Enter the values of P and N:”; cin >> P>>N; 
if (P< 100000)
{
SI = (P*N*7)/100;
cout << “Simple Interest is”<<SI;
}
else if (P>100000 && P<500000)
{
SI = (P*N*8)/100;
cout << “Simple Interest is”<<SI;
}
else if (P>500000)
{
SI = (P*N*9)/100;
cout << “Simple Interest is"<<SI;
}
return 0;
}

Answer 25.
a. 10, 13, 16, 19, 22, 25, 28 b. i = 10;

while (i<30)
{
cout<<i<<“\t”;
i+=3;
} '

Answer 26.
Satellite Broadband. Here the internet connectivity is provided through a satellite. A VSAT (Very Small Aperture Terminal) dish antenna and a transceiver (transmitter-receiver) required at the user’s side. Speed up to 1 Gbps. Used in banks, stock exchange etc.

Mobile broadband is wireless internet access using mobile phones, tablets, USB modems etc. The modems are built inside the mobile phones, tablets. You can use the internet when you are in traveling. The mobile technologies use here are 2G, 3G, and 4G.

Wimax (World Wide Interoperability for Microwave Access). The whole area of a city can be provided with wireless internet using WiMax. It uses the base station for transmitting WiMAX signals and Wimax receivers for receiving the signal. Speed ‘ up to 70 Mbps.

Answer 27.
a. Online chat, Educational TV channels, Electronic books reader (e-Books) b. 1. eLearning has the ability to offer courses on a variety of subjects to a large number of students from a distant location.
2. In e-Learning, a cost for learning is much less. It saves journey time and money, instructor fees, etc.
3. People with limited financial resources are very much supported by the lower cost of e-Learning.

Answer 28.
a. Software is a general term used to denote a set of programs that help us to use a computer system and other electronic devices efficiently and effectively. The two types of softwares are:
1. System software: It is a set of one or more programs designed to control the operations of a computer.

  • Operating system: It is a set of programs that acts as an interface between the user and computer hard ware.
  • Language processors: The instructions to the computer are written in different languages. Various language processors are:

a. Assembler: It converts languages written in assembly language into machine language.
b. Interpreter: It converts a high-level language into machine language by-line by line.
c. Compiler: It translate a high level language into machine language by converting all the lines at a time.

  • Utility software: A set of programs which help users in system maintenance tasks and in performing tasks of routine nature. Utility programs are compression tools (WinZip, Win RAR), disk defragmenter (rearranges files on a computer hard disk), backup software.

2. Application software: It is tHe software developed for a specific application. It ineludes general purpose software\(Word Processing software, spreadsheet sbftware, presentation software, database, multimedia), specific purpose software (designed to handle particular tasks).
b. Compiler: It translate a high level lan-guage into machine language by converting all the lines at a time. The errors are provided at the end of the compilation. The programming language that have a compiler are C, C++, Pascal, etc.

Interpreter: It converts a high level language into machine language by line by line. If there is an error in one line, it reports and the execution is terminated. It will continue the translation only after the correction of the error, eg., BASIC is an inter-preted language.
c. It gives the user the freedom to use, copy, distribute, examine, change and improve the software.

Answer 29.
a. Type conversion is the process of con-verting the current data type of a value into another type. It may be implicitly and explicitly converted.
It can be done in two ways:
1. Implicit type conversion: It is performed by C++ compiler internally. In expressions where different types of data are involved, C++ converts the lower sized operands to the data type of the highest sized operand. Since the conversion is always from lower type to higher, it is also known as type promotion.

2. Explicit type conversion: Sometimes the programmer may decide the data type of the result of an evaluation. This is done by the programmer by specifying the data type within parentheses to the left of the operand. Since the programmer explicitly casts a data to the desired type, it is also known as type casting. Usually, type casting is applied on the variables in the expressions.
b. Sometimes the programmer may decide the data type of the result of an evaluation.

This is done by the programmer by sSpecitying the data type within parentheses to the left of the operand. Since the programmer explicitly casts a data to the desired type, it is also known as type casting.
c. a = 3.0 or 3
b = 2.5

Answer 30.
a. Physical or logical arrangement of computers on a network is called structure or topology.
b. Bus topology. All the computers are at-tached to a single cable called the bus. Here one computer transmits all other computers listen. Therefore it is called the broadcast bus. The transmission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not. Advantages are add or remows computer is very easy. It requires less cable length and the installation cost is less,
c. Local Are Network (LAN): This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial cable. Data transfer rate is high and an error rate is less.

Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a network of networks. Here the computers are connected using telephone lines or Microwave station or satellites. The error rate in rate in data transmission is high, eg., internet.

Plus One Computer Application Previous Year Question Papers and Answers

Plus One Computer Science Model Question Paper 3

Kerala Plus One Computer Science Model Question Paper 3

Answer all question from 1 to 5
Plus One Computer Science Model Question Papers Paper 1
Question 1.
The computing machine developed by Balaise Pascal is known as ………………………………..
Plus One Computer Science Model Question Papers Paper 3

Question 2.
The conditional operator is ……………… opera­tor.
Plus One Computer Science Model Question Papers Paper 3.2

Question 3.
Write the name of the header file which contains the exit( ) function.
Plus One Computer Science Model Question Papers Paper 3.34

Question 4.
……………. is stored at the end of the string.
Plus One Computer Science Model Question Papers Paper 3.3

Question 5.
A short distance wireless internet ac­cess method is…
Plus One Computer Science Model Question Papers Paper 3.4

Answer any nine questions from 6 to 16
Plus One Computer Science Model Question Papers Paper 3.5

Question 6.
Compare the Roman number system and Mayan’s number system.
Plus One Computer Science Model Question Papers Paper 3.6

Question 7.
If (X)2 – (1o1o)2 = (1ooo)2 then find X.
Plus One Computer Science Model Question Papers Paper 3.35

Question 8.
Describe the use of electronic spread­sheets.
Plus One Computer Science Model Question Papers Paper 3.7

Question 9.
Differentiate between top-down design and bottom-up design in problem solv­ing.
Plus One Computer Science Model Question Papers Paper 3.8

Question 10.
Some of the literals in C++ are given below. How do they differ?
Plus One Computer Science Model Question Papers Paper 3.9

Question 11.
What will be the result of the following if ans is 6 initially?
Plus One Computer Science Model Question Papers Paper 3.10

  1. cout <<ans = 8 ;
  2. cout << ans == 8;

Question 12.
Write a C++ code segment to input val­ues into the array:
Plus One Computer Science Model Question Papers Paper 3.11

Question 13.
Predict the output of the following code segment:
Plus One Computer Science Model Question Papers Paper 3.12

char str[] = “program”;
for (int i=o; str[i] != ‘\o’; ++i)
{
putchar(str[i]);
putchar(‘-’);
}

Question 14.
Write down the output of the following code segment:
Plus One Computer Science Model Question Papers Paper 3.13
puts(“hello”);
puts(“friends”);

Question 15.
How can multimedia content be sent using mobile phones?
Plus One Computer Science Model Question Papers Paper 3.14

Question 16.
What are the functions of the mobile oper­ating system?
Plus One Computer Science Model Question Papers Paper 3.15

Answer any nine questions from 17 to 27
Plus One Computer Science Model Question Papers Paper 3.16

Question 17.
Find dual of following Boolean expressions:
Plus One Computer Science Model Question Papers Paper 3.17

  1. X. Y + Z
  2. C + A.1 + A.C
  3. (A+o).(A.1. A )

Question 18.
Fill in the blanks
Plus One Computer Science Model Question Papers Paper 3.18

  1. (———– )2 = (AB)l6
  2. (__ D__ )l6 = (1010_____ 1ooo)2
  3. 2510 = (______ )2

Question 19.
Differentiate compiler and interpreter.
Plus One Computer Science Model Question Papers Paper 3.19

Question 20.
Draw a flowchart to input ten different numbers and find their average.
Plus One Computer Science Model Question Papers Paper 3.20

Question 21.
Write a C++ program to check whether the given number is prime or not.
Plus One Computer Science Model Question Papers Paper 3.21

Question 22.
In how many ways can a variable be declared in C++?
Plus One Computer Science Model Question Papers Paper 3.23

Question 23.
Write a program to find the largest among the three numbers.
Plus One Computer Science Model Question Papers Paper 3.24

Question 24.
Write a C++ program to find the sum of major diagonal elements of a matrix,
Plus One Computer Science Model Question Papers Paper 3.25

Question 25.
What are the differences between the linear search method and the binary search method?
Plus One Computer Science Model Question Papers Paper 3.36

Question 26.
What are the advantages of the modular style of programming?
Plus One Computer Science Model Question Papers Paper 3.26

Question 27.
Distinguish between exit( ) function and return statement.
Plus One Computer Science Model Question Papers Paper 3.27

Answer any two questions from 28 to 30
Plus One Computer Science Model Question Papers Paper 3.28

Question 28.
Define the term green computing. List and explain the approaches that you can adopt to promote green computing concepts at all possible levels.
Plus One Computer Science Model Question Papers Paper 3.29

Question 29.
Write a program using a nested loop that inputs a number n which generates an output as follows. [Hint: If the value of n is 5, the output will be as]
Plus One Computer Science Model Question Papers Paper 3.31
Plus One Computer Science Model Question Papers Paper 3.30

Question 30.
What is network protocol? Explain.
Plus One Computer Science Model Question Papers Paper 3.32

Answer

Answer 1.
Pascaline

Answer 2.
ternary

Answer 3.
process.h

Answer 4.
The null character ‘\o’

Answer 5.
Wimax

Answer 6.
The Romans used 7 letters (I, V, X, L, C, D, and M) of the alphabet for representing numbers.
The Mayans used a number system with base 20. It is the sum of the number of fingers and toes. This number system could produce very accurate astronomical observations and make measurements with greater accuracy.

Answer 7.
(X)2 – (1o1o)2 = (1ooo)2
(X)2 – 10 = 8
18 – 10 = 8
(18)10= (1oo1o)2 = (X)2

Answer 8.
Spreadsheet software allows users to perform calculations using spreadsheets. eg., Microsoft Excel, Open Office calc, Lotus 1-2-3, and Apple numbers.

Answer 9.
Top-down design: It is the process of breaking the overall procedure or task into component parts (modules) and then subdividing each component module until the lowest level of detail is reached. It is also called top-down decomposition.
Bottom-up design: Once the overall procedure or task is broken down into component parts (modules) and each component module are further subdivided until the lowest level of detail has been reached, we start solving from the low­est module onwards. The solution for the main module will be developed only after designing a specific solution to its submodules.

Answer 10.
5 is an integer literal.
‘5’ is a character literal.
5.0 is floating point literal.
“5” is string literal.

Answer 11.

  1. 8
  2. The result will be o (false) because of 6
  3. is not equal to 8.

Answer 12.

for (int i=o; i<50; i++)
{
cin>>ar[i];
}

Answer 13.
p-r-o-g-r-a-m-

Answer 14.
hello friends

Answer 15.
Multimedia Messaging Service (MMS) is the standard way to send and receive messages consisting of multimedia con­tent using mobile phones.

Answer 16.
It is an OS used in handheld devices such as a smartphone, tablet, etc. It man­ages the hardware, multimedia func­tions, internet connectivity, etc. eg., Android, iOS.

Answer 17.
a. X + Y.Z
b. A + C . A+o . A + C
c. (A . l) + (A + o + \( \bar { A } \))

Answer 18.
a. A → 1010, B → 1011
(1010101l)2
b. (AD8)26 = (1010 1101 1ooo)2
c. (o.o1)2

Answer 19.
Compiler: It translates a high-level language into machine language by converting all the lines at a time. The errors are provided at the end of the compilation. The programming language that has a compiler are C, C++, Pascal, etc.
Interpreter: It converts a high-level language into machine language by-line by line. If there is an error in one line, it reports and the execution is terminated. It will continue the translation only after the correction of the error, eg., BASIC is an interpreted language.

Answer 20.
Plus One Computer Science Model Question Papers Paper 3.33

Answer  21.

#include<iostream>
#include<cstdlib>
using namespace std; int main()
{
int i, num;
cout<<“Enter the number: cin>>num;
for(i=2; i<=num/2; ++i)
}
if(num%i == o)
{
cout<<“Not a Prime Number”; exit(o);
}
}
cout<<“Prime Number”; return 0;
}

Answer 22.
In C+ +, variable can be declared in three ways. They are:

  • Uninitialized variable, eg., int a;
  • Initialised variable, eg., int a = 2;
  • Dynamically initialized variable,
  • eg., int a = b + 10;

Answer 23.

#include <iostream> 
using namespace std;
 int main( )
{
int a, b, c;
cout << “Enter three different num­bers: ”;
cin >>a>>b>>c;
 if (a > b)
{
if (a > c)
cout<<“The largest number is:”<< a; else
cout << “The largest number is:”<<c;
}
else
{
if Ob > c)
cout << “The largest number is:”<<b; else
cout << “The largest number is: ”<<c;
}
return o;
}

Answer 24.

#include <iostream> 
using namespace std; int main( )
{ int mat[io][io], n, i, j, s=o;
cout<<“Enter the rows/columns of square matrix: ”; 
cin> >n;
cout<<“Enter the elements\n”; for(i=o; i<n; i++)
for(j=o; j<n; j++) 
cin> >mat[i][j];
cout<<“Major diagonal elements are\n”;
for(i=o; i<n; i++)
{
cout<<mat[i][i]<<“\t”; 
s = s + mat[i][i];
}
cout<<“\nSum of major diagonal elements is: 
cout<<s; 
return o; 
}

Answer 25.
Linear search method:

  • The elements need not to be in any or­der.
  • Takes more time for the process.
  • May need to visit all the elements.
  • Suitable when the array is small.

Binary search method:

  • The elements should be in sorted or­der.
  • Takes very less time for the process.
  • All the elements are never visited.
  • Suitable when the array is large.

Answer 26.

  • It reduces the size of the program
  • Less chances of error.
  • Modularization reduces program­ming complexity.
  • Improves reusability.

Answer 27.
The return statement returns a value to the calling function and transfers the program control back to the calling function.
The exit( ) function terminates the ex­ecution of the program itself.

Answer 28.
Green computing is the study and prac­tice of environmentally sustainable computing or IT. To promote green computing, there are 4 approaches are used. They are:

  1. Green design: Designing energy effi­cient and eco-friendly computers and devices.
  2. Green manufacturing: Minimising waste during the manufacturing of IT devices.
  3. Green use: Minimising the electric­ity consumption of computers.
  4. Green disposal: Reconstructing used computers or appropriately disposing off or recycling unwanted electronic equipment.

Answer  29.

#include<iostream>
using namespace std;
int main( )
{
int n, i, j, s;
cout<<“Enter the value of n”; cin> >n;
for (i=n; i>=i; i- -)
{
for (j=n; j>=i; j- -)
{
s = j * j;
cout<<s<<“\t”;
}
cout< <“\n”;
}
return o;
}

Answer 30.
A protocol is a collection of rules and regulations to transfer data from one location to another. Different types of protocols are:

  1. Transmission Control Protocol (TCP): It uses a set of rules to exchange mes­sages with other internet points at the information packet level.
  2. Internet Protocol (IP): It uses a set of rules to send and receive messages at the internet address level.
  3. File Transfer Protocol (FTP): It is used for transferring files between comput­ers connected to local network or internet.
  4. Hyper Text Transfer Protocol (HT­TP): It is a protocol used for WWW for enabling the web browser to access the web server and request HTML documents.

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Computer Science Model Question Paper 2

Kerala Plus One Computer Science Model Question Paper 2

Answer all question from 1 to 5
Plus One Computer Science Model Question Papers Paper 1

Question 1.
Abacus was discovered by the ………..
Plus One Computer Science Model Question Papers Paper 2

Question 2.
The name given to a storage location is known as ……………
Plus One Computer Science Model Question Papers Paper 2.1

Question 3.
………………….. statement takes the program out of the loop even though the test expression is true.
Plus One Computer Science Model Question Papers Paper 2.2

Question 4.
Name the header file required for a us­ing console I/O function.
Plus One Computer Science Model Question Papers Paper 2.3

Question 5.
Write the full form of FTTH.
Plus One Computer Science Model Question Papers Paper 2.4

Answer any nine questions from 6 to 16
Plus One Computer Science Model Question Papers Paper 2.5

Question 6.
On what factors, the action of the Turing machine depends?
Plus One Computer Science Model Question Papers Paper 2.6

Question 7.
Express the integer number -39 in sign and magnitude representation.

Plus One Computer Science Model Question Papers Paper 2.7
Plus One Computer Science Model Question Papers Paper 2.8

Question 8.
What is a control unit?
Plus One Computer Science Model Question Papers Paper 2.9

Question 9.
“It is better to give proper documenta­tion within the program”. Give a rea­son.
Plus One Computer Science Model Question Papers Paper 2.10

Question 10.
Mention the purpose of tokens in C++. Write names of any four tokens in C++.
Plus One Computer Science Model Question Papers Paper 2.32

Question 11.
What is a variable? List the two values associated with it.
Plus One Computer Science Model Question Papers Paper 2.11

Question 12.
Declare an array of size 5 and initialize it with the number 8, 7, 2, 4 and 6.
Plus One Computer Science Model Question Papers Paper 2.12

Question 13.
Consider the following C++ statements:
Plus One Computer Science Model Question Papers Paper 2.13
char word [20];
cin>>word;
cout<<word;
gets (word) ;
puts (word) ;
If the string entered is “HAPPY NEW YEAR”, predict the output and justify your answer.
Plus One Computer Science Model Question Papers Paper 2.14

Question 14.
What will be the output of the state­ment?
Plus One Computer Science Model Question Papers Paper 2.15

Question 15.
a. Define Intranet.
Plus One Computer Science Model Question Papers Paper 2.16
b. Write the structure of an email ad­dress.
Plus One Computer Science Model Question Papers Paper 2.17

Question 16.
How does a Trojan horse affect a com­puter?

Answer any nine questions from 17 to 27.
Plus One Computer Science Model Question Papers Paper 2.18
Question 17.
Fill in the blanks:
Plus One Computer Science Model Question Papers Paper 2.19
a. (o.625)10 = (……………. )2
b. (38o)10 = (………. )16
c. (437)8 = (………………………… )2

Question 18.
What are the methods of representing characters in computer memory?
Plus One Computer Science Model Question Papers Paper 2.20

Question 19.
Differentiate between freeware and shareware.
Plus One Computer Science Model Question Papers Paper 2.33

Question 20.
Write a C++ program to accept an in­teger number and print its reverse. (Hint: If 234 is given, the output must be 432).
Plus One Computer Science Model Question Papers Paper 2.21

Question 21.
What are the limitations of a flow-chart?
Plus One Computer Science Model Question Papers Paper 2.34

Question 22.
Raju wants to add value 1 to the vari­able ‘p’ and store the new value in ‘p’ itself. Write four different statements in C++ to do the task.
Plus One Computer Science Model Question Papers Paper 2.22

Question 23.
Compare and discuss the suitability of three loops in different situations.
Plus One Computer Science Model Question Papers Paper 2.23

Question 24.
Define an array. Also, write an algo­rithm for searching an element in the array using any one method that you are familiar with.
Plus One Computer Science Model Question Papers Paper 2.25

Question 25.
Write a program to find the sum and average of elements in a 2D array.
Plus One Computer Science Model Question Papers Paper 2.26

Question 26.
Write a program for swapping the val­ues of two variables.

Answer any two questions from 28 to 30
Plus One Computer Science Model Question Papers Paper 2.27

Question 27.
Write a program to combine two strings if they are different and find its length.

Question 28.
Briefly explain various types of memory
Plus One Computer Science Model Question Papers Paper 2.28

Question 29.
Explain the different jump statements available in C++.
Plus One Computer Science Model Question Papers Paper 2.29

Question 30.
How are computer network classified based on size?
Plus One Computer Science Model Question Papers Paper 2.30

Answer

Answer 1.
Mesopotamians

Answer 2.
variable

Answer 3.
break

Answer 4.
Stdio.h

Answer 5.
Fibre To The Home

Answer 6.
The action of a Turing machine is de­termined by:

  • the current state of the machine.
  • the symbol in the cell currently be­ing scanned by the head.
  • a table of transition rules, which serve as the ‘program’ for the machine.

Answer 7.
The number is negative, so a first bit (MSB) is 1
7-bit binary equivalent of 39
= (100111)2
So -39 can be written as (1100111)2

Answer 8.
Control unit (CU) is responsible for ac­tivating and controlling the operations of the units of the computer. Each of the functional units has its own func­tion, but none of these will perform the function until it is asked to, this task is assigned to the control unit.

Answer 9.
Documentation is an on-going process. that starts in the problem study phase of the system and continues till its implementation and operation. We can write comments in the source code as part of the documentation. It provides suffi­cient information in a program to un­derstand its working. If the program is documented, it helps to understand the logic we applied. It helps the debugging process as well as a program modification at a later stage.

Answer 10.
Tokens or lexical units are the funda­mental building blocks of the program. C++ has five types of tokens. They are keywords, identifiers, literals, punc­tuators, and operators.

Answer 11.
Variables are the names given to memory locations. There are two values associated with a variable. They are R-value and L-value. The R-value represents the data and L­value represents the memory address of the variable.

Answer 12.

int A[5];
A[5] = {8, 7, 2, 4, 6};
OR
int A[5] = {8, 7, 2, 4, 6};

Answer 13.
The output will be,
HAPPY
HAPPY NEW YEAR
Because cin statement reads till a whi­te space. But the function gets( ) is a con­sole input function used to accept a string of characters including white spaces from the standard input device (keyboard).

Answer 14.
It displays ‘a’ on the screen. If an inte­ger value is given as the argument, it will be considered as an ASCII value and the corresponding character will be dis­played.

Answer 15.
a. A private network inside a company or organisation is called intranet.
b. The structure of an e-mail address is, user-name@domainname
eg., [email protected] Here username is vinu domain name is gmail.com

Answer 16.
It appears as a useful software but it is a harmful software and it will delete useful software or files. They allow malicious user access to confidential and personal information in the computer through the network without the knowledge of the user.

Answer 17.
Plus One Computer Science Model Question Papers Paper 2.31

Answer 18.
Characters are representing as binary codes in computer memory. Various codes are ASCII (American Standard Code for Information Interchange), EB­CDIC (Extended Binary Coded Decimal Interchange Code), ISCII (Indian Stan­dard Code for Information Interchange/ Indian Script Code for Information In­terchange) and Unicode.

Answer 19.
Freeware refers to copyrighted com­puter software which is made available for use free of charge for an unlimited period. In these, all the features are free. Shareware refers to commercial soft­ware that is distributed on a trial basis. It is distributed without payment and with limited functionality. All the fea­tures are not free.

Answer 20.

#include <iostream> 
using namespace std; int main( )
{
int num, c, digit, rev=o; 
cout<<“Enter the number: ";
cin> >num; 
c = num; 
while(num != o)
{
digit = num % 10; 
rev = (rev * 10)+ digit;
num = num/10;
}
cout<<“The reverse of the number is” 
< <rev; 
return o;
}

Answer 21.
1. Flowcharts are very time consum­ing and laborious to draw with proper symbols and spacing.
2. Owing to the symbol-string nature of flowcharting, any change or modifi­cation in the logic of the algorithm usu­ally requires a completely new flow­chart.
3. There are no standards determining the amount of detail that should be in­cluded in a flowchart.

Answer 22.
p = p + 1;
p+ + ;
++p;
p+=i;

Answer 23.
for loop:

  1. Entry controlled loop.
  2. Initialization along with loop defini­tion.
  3. No guarantee to execute the loop body at least once.

while loop:

  1. Entry controlled loop.
  2. Initialization before loop definition.
  3. No guarantee to execute the loop body at least once.

do….while loop:

  1. Exit controlled loop.
  2. Initialization before loop definition.
  3. Will execute the loop body at least once even though the condition is False.

Answer 24.
An array is a collection of elements of the same type placed in contiguous memory locations.
Algorithm for Linear search
Step 1: Start
Step 2: Accept a value in N as the num­ber of elements of the array
Step 3: Accept N elements into the ar­ray AR
Step 4: Accept the value to be searched in the variable ITEM
Step 5: Set LOC = -1
Step 6: Starting from the first position, repeat Step 7 until the last element
Step 7: Check whether the value in ITEM is found in the current position. If found then store the position in LOC and Go to Step 8, else move to the next posi­tion.
Step 8: If the value of LOC is less than o then display “Not Found”, else display the value of LOC + 1 as the position of the search value.
Step 9: Stop

Answer 25.

#include <iostream>
#include <cstdlib> using namespace std; int main()
{
int m, n, i, j, s = o, A[io][io]; float avg;
cout<<“Enter the order of matrix:”;
cin>>m>>n;
cout<<“Enter the elements of matrix\n”;
for (i=o; i<m; i++)
{
for (j=o; j<n; j++) cin > > A[i] [j ];
}
for (i=o; i<m; i++)
{
for (j=o; j<n; j++) s = s + A[i][j];
}
avg = s/(m*n);
cout<<“Sum of the elements of matrix:”<<s;
cout<<“Average of the elements of matrix:”< <avg;
}

Answer 26.

#include <iostream> 
using namespace std; "
void swapfint & x, int & y)
{
int t = x;
x = y;
Y = t;
}
int main()
{
int m, n; m = 10; n = 20;
cout<<“Before swapping m= ”<< m <<“ and n= ”<<n; swap(m, n);
cout<<“\nAfter swapping m= ”<< m <<“ and n= ”<<n; return o;
}

Answer 27.

#include <iostream>
#include <cstring> 
using namespace std; 
int main( )
{
char s1[2o], s2[2o], s3[2o]; 
cout<<“Enter two strings: ”;
cin>>si>>s2; 
int n=strcmp(s1, S2);
if (n= = o)
cout<<“\nThe input strings are same”; 
else	
{	
cout<<“\nThe input strings are not
same”;
strcpy(s3, s1); 
strcat(s3, S2);
cout<<“\nString after concatenation is: ”<<S3;
cout<<“\nLength of the new string is” j 
<<strlen(s3);	
}
return o;
}

Answer 29.
Memory is a place where we can store data, instructions, and results in temporarily or permanently. Memory can be  classified into two:
1. Primary memory: Also refers to the main memory. It holds data, intermediate results and results of ongoing jobs; temporarily. This includes mainly; three types of memory.

i.RAM (Random Access Memory): The microprocessor can read from and write to. The contents of RAM are lost when power is switched off. Therefore, RAM is a volatile memory.

ii. ROM (Read Only Memory): It can perform only read operations and its contents cannot be easily altered. ROM is non-volatile; the contents are retained even after the power is switched off. It is used to hold boot up program is known as Basic Input Output System (BIOS). This software runs when the computer is switched on or ‘boots up’. Different types of ROM are PROM (Programmable ROM), EPROM (Erasable Programmable ROM), EEPROM (Electrically Erasable Programmable ROM)

iii. Cache memory: It is a small and fast memory between the processor and RAM. Frequently accessed data, instructions, intermediate results, etc. are stored in cache memory for quick access. Cache is more expensive than RAM.

iv. Secondary memory: Also known as auxiliary memory. It holds data and information permanently. Various devices in this type are a magnetic storage device (magnetic tape, hard disk), an optical storage device (Compact Disc (CD), Digital Versatile Disk (DVD), Bluray DVD), semiconductor memory (USB flash drive, flash memory cards).2 9. The statements that facilitate the transfer of program control from one place to another are called jump statements.
They are:

  • return statement: It is used to transfer control back to the calling program or to come out of a function.
  • goto statement: It can transfer the program control to anywhere in the function. The target destination of a goto statement is marked by a label, which is an identifier.
  • break statement: When a break statement is encountered in a program, it takes the program control outside the immediately enclosing loop (for, while, do…while) or switch statement. Execution continues from the statement immediately after the control structure.
  • continue statement: It is used for skipping over a part of the code within the loop-body and forcing the next iteration. The break statement forces termination of the loop, but continue statement forces next iteration of the loop.
  • exit() function: It terminates the pro­gram itself. And can be used in a pro­- gram only if we include the header file process.h.

Answer 30.
1. Personal Area Network (PAN): It is used to connect devices situated in a small radius by using guided media or unguided media.

2. Local Area Network (LAN); This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial ca­ble. Data transfer rate is high and the er­ror rate is less.

3. Metropolitan Area Network (MAN): It is a network spread over a city. MAN have lesser speed than LAN and the er­ror rate is less. Here optical fiber cable is used, eg., Cable TV network.

4. Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a network of net­works. Here the computers are con­nected using telephone lines or Micro­wave station or satellites. The error rate in rate in data transmission is high, eg., internet.

We hope the Plus One Computer Science Model Question Papers Paper 2 help you. If you have any query regarding Plus One Computer Science Model Question Papers Paper 2, drop a comment below and we will get back to you at the earliest.

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Computer Science Model Question Paper 1

Kerala Plus One Computer Science Model Question Paper 1

Answer all question from 1 to 5
Plus One Computer Science Model Question Papers Paper 1

Question 1.
Which data type of C++ does not require any memory space?
Plus One Computer Science Model Question Papers Paper 1 .1

Question 2.
Who is regarded as the father of mod­ern Computer Science as well as artifi­cial intelligence?
Plus One Computer Science Model Question Papers Paper 1 .2

Question 3.
In C++, ………. loop will execute at least once even though the condition is false.
Plus One Computer Science Model Question Papers Paper 1 .3

Question 4.
In C++, ………. function is used to input a character or string using cin.
Plus One Computer Science Model Question Papers Paper 1 .4

Question 5.
Expand URL.
Plus One Computer Science Model Question Papers Paper 1 .5

Answer any nine questions from 6 to 16
Plus One Computer Science Model Question Papers Paper 1 .6

Question 6.
What are the advantages of the second gen­eration of computers over first genera­tion computers?
Plus One Computer Science Model Question Papers Paper 1 .7

Question 7.
Find the dual of following boolean equation:
Plus One Computer Science Model Question Papers Paper 1 .8

  1. \(X+\bar { X } =1 \)
  2. \((X+0).(X.1.\bar { X } )=0\)

Question 8.
Which are the various e-waste disposal methods?
Plus One Computer Science Model Question Papers Paper 1 .9

Question 9.
Draw the flowchart to find the simple interest. [Hint : I = P * N * R]
Plus One Computer Science Model Question Papers Paper 1 .10

Question 10.
Explain any two escape sequences used in C++.
Plus One Computer Science Model Question Papers Paper 1 .38

Question 11.
List and correct the errors in the fol­lowing C++ statement
Plus One Computer Science Model Question Papers Paper 1 .12

Question 12.
What are the different ways to write comments in C++?
Plus One Computer Science Model Question Papers Paper 1 .11

Question 13.
Write a brief explanation for the below mentioned C++ statement :
int a[ ]={2,3,5,6,9};
Plus One Computer Science Model Question Papers Paper 1 .13

Question 14.
Explain the memory allocation for the string.
Plus One Computer Science Model Question Papers Paper 1 .14

Question 15.
Which are the various e-waste disposal methods?
Plus One Computer Science Model Question Papers Paper 1 .15

Question 16.
What are the hardware and software requirements for connecting a com­puter to the internet?
Plus One Computer Science Model Question Papers Paper 1 .16

Answer any nine questions from 17 to 27
Plus One Computer Science Model Question Papers Paper 1 .17
Question 17.
Fill in the blanks.

(49)10 = (……………… )2 = (………………. )8 =

Question 18.
a. Write an algorithm to print the even numbers between 1 and 1oo.
Plus One Computer Science Model Question Papers Paper 1 .18
b. Write anyone advantages of using the flowchart.
Plus One Computer Science Model Question Papers Paper 1 .19

Question 19.
Explain different components of CPU.
Plus One Computer Science Model Question Papers Paper 1 .39

Question 20.
Which are the different universal ga­tes? Why they are called so? Draw the logical symbols of these gates.
Plus One Computer Science Model Question Papers Paper 1 .20

Question 21.
Describe the different phases in pro­gramming.
Plus One Computer Science Model Question Papers Paper 1 .21

Question 22.
What will be the output of the follow­ing C++ program?
Plus One Computer Science Model Question Papers Paper 1 .22

#include<iostream> 
using namespace std; int main()
{
int a, b, c;
a = 5; 
b = 8; 
c = a;
cout<<“\n Value of a is” <<++a;
cout<<“\n Value of b is” <<b++;
cout<<“\n Value of c is” <<- -c;
return 0;
}

Question 23.
Differentiate if……… else if and switch statements in C+ +.
Plus One Computer Science Model Question Papers Paper 1 .23

Question 24.
Explain any three array operations.
Plus One Computer Science Model Question Papers Paper 1 .25

Question 25.
Write C++ statements to declare a two-dimensional array of integers having 3 rows and 2 columns and input values to it
Plus One Computer Science Model Question Papers Paper 1 .24

Question 26.
Explain about any three string func­tions in the header file cstring.
Plus One Computer Science Model Question Papers Paper 1 .26

Question 27.
Differentiate call-by-value and call-by-reference methods in function calls.
Plus One Computer Science Model Question Papers Paper 1 .27

Answer any two questions from 28 to 30
Plus One Computer Science Model Question Papers Paper 1 .28

Question 28.
a. What is network topology?
Plus One Computer Science Model Question Papers Paper 1 .29
b. Which are the different types of net­work topologies?
Plus One Computer Science Model Question Papers Paper 1 .31

Question 29.
Explain about any five input or output devices used in a computer.
Plus One Computer Science Model Question Papers Paper 1 .32

Question 30.
Write a C++ program to input an inte­ger and check whether it is Amstrong number or not.
[Hint: Amstrong number is the one in which sum of cubes of digits in that number is the number itself.]

Answer

Plus One Computer Science Model Question Papers Paper 1 .34
Plus One Computer Science Model Question Papers Paper 1 .34
Answer 1.
void data type

Answer 2.
Alan Turing

Answer 3.
do……. while

Answer 4.
4- get()

Answer 5.
Uniform Resource Locator

Answer 6.
The first generation computers were built using vacuum tubes. This genera­tion implemented the stored program concept.
In second generation computers, vacu­um tubes were replaced by transistors. This allowed computers to become smaller and more powerful and faster. They also became less expensive, re­quired less electricity and emitted less heat.

Answer 7.

  1. \(X+\bar { X } =1 \)
  2. \((X+0).(X.1.\bar { X } )=0\)

Answer 8.
1. Reuse: It refers to second-hand use or usage after the equipment has been upgraded or modified
2. Incineration: It is a controlled and 10. C++ represents Octal Number and complete combustion process in which the waste is burned in specially designed incinerators at a high temperature in the range of 900 to 1000 degree Celsius.
3. Recycling: It is the process of making or manufacturing new products from a product that has originally served its purpose.
4. Landfilling: In this method, the soil is excavated from the trenches made and waste material is buried in it, which is covered by a thick layer of soil.

Answer 9.
Plus One Computer Science Model Question Papers Paper 1 .34

Answer 10.
C++ represents Octal Number and Hexadecimal Number with the help of escape sequences. The \on and \xHn represent a number in the octal number system and the hexadecimal number system respectively

Answer 11.
The letter ‘C’ in cout should be in the small letter. Every C++ statement end with a semicolon!;). After cout the << operator should be used. The correct statement is,
cout<<“Computer Science”;

Answer 12.
Comments are lines in the code that are added to describe the program. They are ignored by the compiler.

  1. Single line comment: The characters // (two slashes) is used. The text ap­pearing after // in a line is treated as a comment by the C++ compiler.
  2. Multiline comments: Anything writ­ten within /* and */ is treated as comm­ent so that the comment can take any number of lines.

Answer 13.
It is an integer array with name ‘a’. It is initialised at the time declaration | with values 2, 3, 5, 6, 9.

Answer 14.
The memory required depends upon the number of characters stored. A null character ‘\o’ is stored at the end of the string. This character is used as the string terminator and added at the end automatically. So the memory re­quired to store a string will be equal to the number of characters in the string plus one byte for the null character.
eg., char str[ ] = “Hello”;
Here the size of the array is not speci­fied and hence only 6 bytes will be allo­cated
(5 bytes for the string and 1 for ‘\o’).

Answer 15.
Scope of local variables:

  1. Declared within a function or a block of statements.
  2. Available only within that function or block.
  3. Memory is allocated when the func­tion or block is active and freed when the execution of the function or block is completed.

The scope of global variables:

  1. Declared outside all the functions.
  2. Available to all the functions of the program.
  3. Memory is allocated just before the execution of the program and freed when the program stops the execution.

Answer 16.
The hardware and software require­ment for internet:

  1. A computer with a modem (inter­nal/external).
  2. A telephone connection.
  3. An account with an ISP.
  4. A browser software.

Answer 17.
Plus One Computer Science Model Question Papers Paper 1 .35

Answer 18.
Let i be the variable.
Step 1: Start
Step 2: Let i = 2
Step 3: Print i
Step 4: i = i + 2
Step 5: If i>=1oo, then go to Step 3
Step 6: Stop
b. Better communication: Since a flow­chart is a pictorial representation of a program, it is easier for a programmer to explain the logic of the program to some other programmer through a flow­chart rather than the program itself.

Answer 19.
The CPU consists of three components; Control unit (CU), Arithmetic logic unit (ALU) and registers. All the major calculations and comparisons are made inside ALU. CU is responsible for acti­vating and controlling the operations of the units of the computer. Registers are storage locations inside CPU, whose content can be accessed more quickly by the CPU than other memory. They are temporary storage areas for in­structions or data.

Answer 20.
The NAND and NOR gates are called universal gates. A universal gate is a gate which can implement any Boolean function with­out using any other gate type.
NAND gate: This is an AND gate with its output inverted by a NOT gate.
Plus One Computer Science Model Question Papers Paper 1 .36
NOR gate: This is an OR gate with its output inverted by a NOT gate.
Plus One Computer Science Model Question Papers Paper 1 .37

Answer 21.
1. Problem identification: During this phase, you will be able to identify the data involved in processing, its type and quality, the formula to be used, activities involved and the output to be obtained. This is the challenging phase as it ex­ploits the efficiency of the programmer.

2. Preparing algorithms and flowcha­rts: Once the problem is identified, it is necessary to develop a precise step-by­step procedure to solve the problem. This procedure is not new or confined to computers.

3. Coding the program: The process of writing program instructions to solve a problem is called coding. The program written in any HLL is known as source code.

4. Translation: It is the process of con­verting a program written in a high-level language into its equivalent version in machine language. The compiler or in­terpreter is used for this purpose.

5. Debugging: It is the stage where the project known as ‘bugs’ and the process of de­tecting and correcting these errors is called debugging.

Answer 22.
a = 5
b = 9
c = 4

Answer 23.
Switch:

  1. Permits multiple branching.
  2. Evaluates conditions with equality operator only.
  3. Case constant must be an integer or I a character type value.
  4. When no match is found, the default statement is executed.
  5. the break statement is required to exit from the switch statement.
  6. More efficient when the same vari­able or expression is compared against a set of values for equality.

else if ladder:

  1. Permits multiple branching.
  2. Evaluates any relational or logical expression.
  3. The condition may include a range of values and floating point constants.
  4. When no expression evaluates to  True, else block is executed.
  5. Program control automatically goes out after the completion of a block.
  6. More flexible and versatile compared to switch.

Answer 24.
1. Traversal:  Accessing each element of the array at least once is called tra­versal. We can use this operation to check the correctness of operations dur­ing operations like insertion, deletion etc. Displaying all the elements of an array is an example of traversal,

eg., for (i=o; i,<1o; i++) 
cout<< a[i]<< “\t”;

2. Sorting: It is the process of arrang­ing the elements of the array in some logical order. This logical order may be ascending or descending in case of nu­meric values or dictionary order in case of strings.

3. Searching: It is the process of finding the location of the given element in the array. The search is said to be success­. full if the given element is found, that is the element exists in the array; other­wise unsuccessful. There are basically two approaches to a search operation. They are linear search and binary search.

#include <iostream> 
using namespace std;
int main( )
{
int mat[3][2], i, j; 
cout<<“Enter the elements\n”; 
for(i=o; i<3; i++) 
for(j=o; j<2; j++) 
cin>>mat[i][j]; return o;
}

Answer 26.
1. strlen (): This function is used to find the length of a string, i.e., the number of characters in the string. Its syntax is:
int strlen (string);
eg., n = strlen (“Hello”);
Here returns the number of characters in the string, i.e. 5 to the variable n.

2. strcpy( ): This function is used to copy one string into another. The syntax is: strcpy
(string 1, string 2);
The function will copy string 2 to string 1.
eg., strcpy(s1,s2);

3. strcat( ): This function is used to ap­pend one string to another string. The length of the resultant string is the to­tal length of the two strings. The syn­tax is strcat (string 1, string 2);
The size of the first argument should be able to accommodate both the strings together.
eg., strcat(s1,s2);

Answer 27.
Call by value method:

  1. Ordinary variables are used as for­mal parameters.
  2. Actual parameters may be con­stants, variables or expressions.
  3. The changes made in the formal ar­guments are not reflected in actual ar­guments.
  4. Exclusive memory allocation is re­quired for the formal arguments.

Call by reference method:

  1. Reference variables are used as for­mal parameters.
  2. Actual parameters will be variables only.
  3. The changes made in the formal ar­guments are reflected in actual argu­ments.
  4. The memory of actual arguments is shared by formal arguments.

Answer 28.
1. a. The physical or logical arrangement of computers on a network is called struc­ture or topology. It is the geometrical arrangement of computers in a net­work.
b. Star, ring, mesh, bus, tree, and hy­brid are the different network topolo­gies.
c. Star topology: It has a server all other computers are connected to it. Advan­tages add or remove workstations to a star network is easy and the failure of a workstation will not effect the other. The disadvantages are that if the server fails the entire network will fail.

2. Bus topology: All the computers are attached to a single cable called the bus. Here one computer transmits all other computers listen. Therefore it is called the broadcast bus. The transmission from any station will travel in both the di­rection. The connected computers can hear the message and check whether it is for them or not. Advantages are added or remove computer is very easy. It requires less cable length and the in­stallation cost is less. The disadvantage is fault detection is very difficult because of no central computer.

Answer 29.
Input devices are:
1. A light pen is a pointing device shaped like a pen. The tip of the light pen con­tains a light-sensitive element which when placed against the screen en­abling the computer to identify the lo­cation of the pen on the screen. The ad­vantage is drawing directly on to the screen.

2. The touch screen allows the user to oper­ate by simply touching on the display screen. It can also be operated using a stylus which gives more precision,

3. The joystick is used for playing video games, controlling training simulators and robots. The joystick has a vertical stick which can move in any direction. It has a button on the top that is used to select the option pointed by the cursor.

4. Keyboard: It is the most common in­put device. It allows the user to input alphabets, numbers and other charac­ters, Keyboard detects the key pressed and generates the corresponding ASCII code which can be recognised by the computer. It has a keyboard layout called the QWERTY design.

5. Mouse: It is a small hand-held device used to indicate the position of a cursor or its movement on a computer display screen by rolling it over a mouse pad/ flat surface. A mouse has one or more buttons and possibly a scroll wheel. The scroll wheel is used for scrolling the screen vertically or horizontally.

Output devices are:

1. Visual Display Unit (VDU): It visu­ally conveys text, graphics, and video information. The information shown on a display device is called soft copy because and is displayed for a temporary period of time.

2. Printers: These are used to produce hardcopy output. Based on the technol­ogy used, they can be classified as im­pact printers and non-impact printers.

3. Plotter: It is an output device used to produce hard copies of graphs and designs on the paper.

4. 3D printer: It is a new generation output device used to print 3D objects. The 3D printing process turns the ob­ject to be printed into thousands of horizontal tiny little layer. These tiny layers stick together to form a solid object.

5. Speaker: It produces sound. The speaker produces sound by the move­ment of the diaphragm in the speaker forward and backward according to the electrical signals coming out of the au­dio port.

Answer 30.

include<iostream>
using namespace std;
int main()
{
int n, i = 1, r, cb = o; cout<<“Enter a number: cin>>n; i =n; while (n)
{
r = n%io;
cb = cb + r * r * r;
n = n/10;
}
if (cb==i)
cout<<“The given number is an Arm­strong number 
}
return o; 
}

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Computer Science Previous Year Question Paper 2017

Kerala Plus One Computer Science Previous Year Question Paper 2017

Time Allowed: 2 hours
Cool off time: 15 Minutes
Maximum Marks: 60

General Instructions to Candidates

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Science Previous Year Question Papers and Answers 2018

Answer all questions from l to 5
Plus One Computer Science Previous Year Question Papers and Answers 2018 .1

Question 1.
The number (158)10 can be represented in Hexadecimal number system as……..
Plus One Computer Science Previous Year Question Papers and Answers 2017 .1

Question 2.
a. Write the following memory devices in the order of their speed, (fastest to g slowest order)
1. Cache
2. RAM
3. Hard disk
4. Registers
b. What do you mean by freeware and shareware?
Plus One Computer Science Previous Year Question Papers and Answers 2017 .2

Question 3.
Pick the odd one out and give a reason for your finding.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .3

Question 4.
(a) Name the type of loop which can be used to ensure that the body of the loop will surely be executed at least once.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .4
(b) Consider the code given below and predict the output.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .5

for (int i = 1; i < = 9; i = i + 2)
{
if (i = = 5) continue; 
cout >> i << " ";
}

Question 5.
Find the value of score [4] based on the following declaration statement.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .6
score [5] = {98, 87, 92, 79, 85};

Question 6.
Name the built-in function to check whe­ther a character is alphanumeric or not.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .7

Question 7.
a. Different networks with different proto­cols are connected by a device called
1. Router
2. Bridge
3. Switch
4. Gateway
b. Define Protocol.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .8

Question 8.
Find the best matches from the given definitions for the terms in the given list. (Worm, Hacking, Phishing, Spam)
a. Unsolicited e-mails sent indiscrimi­nately.
b. A technical effort to manipulate the normal behavior of the networked computer system.
c. A stand-alone malware program usually makes the data traffic slow.
d. Attempt to acquire information like usernames and passwords by posing as the original website.
e. Appear to be useful software but will do damage like deleting necessary funds.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .9

Question 9.
Represent -3 8 in 2’s complement form.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .21

Question 10.
Write an algorithm to print the numbers up to 100 in reverse order. That is the output should be as 100, 99, 98, 97,….,
OR
Draw a flowchart to check whether the given number is positive, negative or zero.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .22
Question 11.
Identify the invalid literals from the following and write a reason for each.
a. 2E3.5
b. “9”
c. ‘hello’
d. 55450

Question 12.
The following C++code segment is a part of a program written by Smitha to find the average of 3 numbers.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .23

int a, b, c;                                                        
float avg;                                                         
cin>>a>>b>>c; 
avg = (a+b+c)/3;   
cout<<avg;

What will be the output if she inputs 1,4 and 5? How can you correct it?
Plus One Computer Science Previous Year Question Papers and Answers 2017 .24

Question 13.
Let M[3][3] be a 2D array that contains the elements of a square matrix. Write C++  statements to find the sum of the diagonal elements.

Question 14.
What are the advantages of using gets() function in C++ program to input string data? Explain with an example.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .25

Question 15.
Read the function definition given below, Predict the output, if the function is called as convert
Plus One Computer Science Previous Year Question Papers and Answers 2017 .26
Plus One Computer Science Previous Year Question Papers and Answers 2017 .27

void convert (int n)
{ 
if (n>l) convert (n/2); cout<<n%2;
}

Question 16.
Compare any three features of five gene­rations of computers
Plus One Computer Science Previous Year Question Papers and Answers 2017 .28

Question 17.
Draw the logic circuit of Boolean expre­ssion:
\((A+\bar { BC)+ } \bar { AB\quad } \)
OR
Using algebraic method, prove that
\(\bar { Y } .\bar { Z } +\bar { Y } .Z+Y.Z+Y=1\)
Plus One Computer Science Previous Year Question Papers and Answers 2017 .29

Question 18.
“It is better to give proper documentation within the program”. Give a reason.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .30

Question 19.
Briefly explain the three components in the structure of a C++ program.

Question 20.
Write an algorithm for arranging elements of an array in ascending order using bubble sort.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .31

Question 21.
Explain the difference between call-by-value method and call-by-reference method with the help of examples.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .32

Question 22.
Compare any three types of networks based on span of geographical area.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .33

Question 23.
Susheel’s e-mail ID is [email protected]. He sends an e-mail to Rani whose e-mail ID is [email protected]. How is the mail sent from Susheel’s computer to Rani’s computer?
Plus One Computer Science Previous Year Question Papers and Answers 2017 .34

Question 24.
With the help of a block diagram, explain the functional units of a computer.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .35

Question 25.
Write a program to check whether the given number is palindrome or not. (5)
OR
Write a program to print the leap years between 2000 and 3000.
(A century year is a leap year only if it is divided by 400 and a non-century year is a leap year only if it is divided by 4.)
Plus One Computer Science Previous Year Question Papers and Answers 2017 .36

Answer

Answer 1.
9E

Answer 2.
a. Registers, Cache, RAM, Hard disk
b. Freeware refers to copyrighted com­puter software which is made avail­able for use free of charge for a un­limited period.
Shareware refers to commercial software that is distributed on a trial basis. It is distributed without payment and with limited functionality.

Answer 3.
(c) ; Others has only one entry flow and one exit flow.
(b) ; Used for both input and output operations.

Answer 4.
a. do while loop
b. l 3 7 9

Answer 5.
85

Answer 6.
isalpha( )

Answer 7.
a. (iv). Gateway
b. Protocols are rules and conventions for transmitting data.

Answer 8.
a. Spam
b. Hacking
c.Worm
d. phishing

Answer 9.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .37

Answer 10.
Let i be the variable.
Step 1: Start
Step 2: Let i = 100
Step 3: Print i
Step 4: i = i – 1
Step 5: If i>=1, then goto Step 3
Stop 6: Stop
OR
Plus One Computer Science Previous Year Question Papers and Answers 2017 .38

Answer 11.
Invalid literally are:
(a).2E3.5; the fractional number cannot be used as an exponent.
(c). ‘hello’; String literals are enclosed within a pair of double quotes.

Answer 12.
The output will be 3.
(a+b + c)/3.o
or float (a+b+c)/3
or int a, b, c are replaced by float a, b, c or use of typecasting

Answer 13.

#include <iostream> 
using namespace std;
int main( )
{ 
int m[3][3], n, i, j, s=o;
cout<<“Enter the rows/columns of square matrix:
cin> >n;
cout<<“Enter the elements\n”; 
for(i=o; i<n; i++)
for(j=o; j<n; j++)
cin>>m[i][j];
cout<<“Diagonal elements are\n”; for(i=o; i<n; i++)
{
cout<<m[i][i]<<“\t”; s = s + m[i][i];
}
cout<<“\nSum of Diagonal elements is:
cout<<s; return o;
}

Answer 14.
By using gets( ) function we can input string with white space.
cin statement reads till a white space. But the function gets() is used to accept a string of characters including white spaces from the standard input device (keyboard) and store it in a character array.
eg., char str[3o];
gets(str);
puts(str);

Answer 15.
The output will be 111.
This is a recursive function. The pro­cess of calling a function by itself is known as recursion and the function is known as a recursive function.

Answer 16.
First-generation computers (1940-56):
The first generation computers were built using vacuum tubes. This genera­tion implemented the stored program concept, eg., Electronic Numerical Integra­tor and Calculator (ENIAC), Electronic Dis­crete Variable Automatic Computer (EDVAC), Universal Automatic Computer (UNIVAC).

Second-generation computers (1956-63):
In this generation computers, vacuum tubes were replaced by transistors. This allowed computers to become smaller and more powerful and faster. The manufac­turing cost was also less. The concept of programming language was developed. Programming languages FORTRAN and COBOL were introduced, eg., IBM 1401, IBM 1620.

Third generation computers (1964­71):
These are smaller in size due to the use of integrated circuits (IC’s). IC dras­tically reduced the size and increased the speed and efficiency of computing. Keyboards and monitors were intro­duced. The high-level language BASIC was developed during this period, eg., IBM 360, IBM 370.

Fourth-generation computers (1971 onwards):
The computers that we use today belong to this generation. These computers use microprocessors and are called microcomputers use Large Scale of Integration (LSI). These computers are smaller in size and have faster ac­cessing and processing speeds, eg., IBM PC, Apple II.

Fifth-generation computers (future):
These are based on artificial intelli­gence. The fifth-generation computing also aims at developing computing machines that respond to natural lan­guage input and are capable of learn­ing and self-organization.

Answer 17.
Plus One Computer Science Previous Year Question Papers and Answers 2017 .39

Answer 18.
Documentation is an on-going process that starts in the problem study phase of the system and continues till its implementation and operation. We can write comments in the source code as part of the documentation. It provides suffi­cient information in a program to un­derstand its working. If the program is documented, it helps to understand the logic we applied. It helps the debugging process as well as program modification at a later stage.

Answer 19.
1. Preprocessor directives:
A C++ pro­gram starts with preprocessor direc­tives. Preprocessors are the compiler directive statements which give instruction to the compiler to process the information provided before ac­tual compilation starts. The #include is used to link the header files available in the C++ library. There are some other pre-processor direc­tives such as #define, #undef, etc.

2. Header files:
It contains the informa­tion about functions, objects, and pre­defined derived data types and they are available along with compiler. The header file stream contains the information about the objects cin and court.

3. The main( ) function:
The execution starts at main ( ) and ends within main ( ). If we use any other function in the program, it is called (or in­voked) from the main Q. The function header main ( ) is followed by its body, which is a set of one or more statements within a pair of braces { }. This structure is known as the definition of the main f) function. Each statement is delimited by a semicolon (;).

Answer 20.
Step 1: Start
Step 2: Accept a value in N as the num­ber of elements of the array.
Step 3: Accept N elements into the array AR.
Step 4: Repeat Steps 5 to 7, (N -1) times.
Step 5: Repeat Step 6 until the second last element of the list.
Step 6: Starting from the first position, compare two adjacent eleme­nts in the list. If they are not in proper order, swap the elements.
Step 7: Revise the list by excluding the last element in the current list.
Step 8: Print the sorted array AR.
Step 9: Stop

Answer 21.
Call by value method:
1. Ordinary variables are used as formal parameters.
2. Actual parameters may be constants, variables or expressions.
3. The changes made in the formal ar­guments are not reflected in actual arguments.
4. Exclusive memory allocation is required for formal arguments.

eg., void change find n)   
{  
n = n + 1;
cout << “n =” << n << ‘\n’;
}
int main( )
{
int x = 20; 
change( ); 
cout << “x = ” << x;
}

Here only the value of the variable x is passed to the function. Thus the formal parameter n in the function will get the value 20. When we increase the value of n, it will not affect the value of the variable x. The output of the above code is n = 21, x = 20 Call by reference method:

  1. Reference variables are used as formal parameters.
  2. Actual parameters will be variables only.
  3. The changes made in the formal ar­guments are reflected in actual ar­guments.
  4. The memory of actual arguments is shared by formal arguments.
eg., void changefint & n)
{
n = n + 1;
cout << “n = ” << n << ‘\n’;
}
int mainf)
{
int x=20;
change(x);
cout << “x = ” << x;
}
Here the output will be n = 21, x = 21

Answer 22.
The network is classified based upon the amount of geographical area that covers.
1. Personal Area Network (PAN): It is used to connect devices situated .in a small radius by using guided media or unguided media.

2. Local Area Network (LAN): This is used to connect computers in a single room or buildings of one location by using twisted pair wire or coaxial cable,  Data transfer rate is high and the error rate is less.

3. Metropolitan Area Network (MAN): It is a network spread over a city,  MAN have lesser speed than LAN and the error rate is less. Here optical fi- J ber cable is used, eg., Cable TV net­work.

4. Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a net­work of networks. Here the comput­ers are connected using telephone lines or Microwave station or satel­lites. The error rate in data transmis­sion is high, eg., internet.

Answer 23.
When an e-mail is sent from your com­puter, it first reaches the e-mail server of our e-mail service provider. From there the e-mail is routed to the recipi­ents e-mail server through the internet. The recipient’s e-mail server delivers the e-mail to recipients inbox which stores the message. SMTP (Simple Mail Transfer Protocol) is used e-mail com­munication.

Answer 24.
Functional units of a computer are based on a model proposed by John Von Neu­mann. It consists of some functional units namely Input Unit, Central Pro­cessing Unit (CPU), Storage Unit and Output Unit.

1. Input unit. The collected data and the instructions for their processing are entered into the computer through the input unit. They are stored in the memory (storage unit). The data may be in different forms. Keyboard, mouse, scanner, mic, digital cam­era, etc. are some commonly used in­put devices.

2. Central Processing Unit (CPU). The CPU is the brain of the computer. In a computer system, all major computations and comparisons are made inside the CPU. It is also responsible for activating and controlling the operations of other units of the com­puter. The functions of CPU are per­formed by three components; Arith­metic Logic Unit (ALU), Control Unit (CU), Registers.

3. Storage unit. The data and instruc­tions entered in the computer through input unit are stored inside the computer before actual process­ing starts. The information or results produced after processing are also stored inside the computer, before transferring to the output unit. The intermediate results, if any, must also be stored for further processing.

4. Output unit. The information ob­tained after data processing is sup­plied to the outside world through the output unit in a human-readable form. Monitor and printer are the commonly used output devices.

Answer 25.

#include <iostream>
using namespace std; 
int main()
{
int num, c, digit, rev=o; 
cout<<“Enter the number:";
cin> >num; c=num;
while(num != o)
{
digit = num % 10;                                 '
rev = (rev * 10)+ digit; 
num = num/10;
}
cout<<“The reverse of the number is”
<<rev; 
if (rev == c)
cout<<“\nThe given number is a palindrome.";
indrome.”; else
cout<<“\nThe given number is not a
palindrome.”;
return o;
}
OR
#include <iostream> 
using namespace std;
void main()
{
int i;
for (i=2000; i<=3000; i++) {
if (i%4 == o)
{
if (i%400 == o) cout << i;
}
return 0;
}

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Computer Science Previous Year Question Paper 2018

Kerala Plus One Computer Science Previous Year Question Paper 2018

Time Allowed: 2 hours
Cool off time: 15 Minutes
Maximum Marks: 60

General Instructions to Candidates :

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • Read the instructions carefully.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Computer Science Previous Year Question Papers and Answers 2018

Answer all questions from 1 to 5
Plus One Computer Science Previous Year Question Papers and Answers 2018 .1

Question  1.
What is the base of Mayan Number Sys­tem?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .2

Question  2.
Name any two preprocessor directives in C++
Plus One Computer Science Previous Year Question Papers and Answers 2018 .3

Question 3.
Which statement in C++ can transfer control of a program to a labeled statement?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .4

Question 4.
Which character is used to delimit the string in memory?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .5

Question 5.
An electronic device used for commu­nication between computers through the telephone line is ……….
Plus One Computer Science Previous Year Question Papers and Answers 2018 .6

Answer any nine questions from 6 to 16
Plus One Computer Science Previous Year Question Papers and Answers 2018 .7

Question 6.
Draw the block diagram of John Von Neumann’s computer architecture.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .8

Question 7.
List any four image file formats.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .9

Question 8.
What is cache memory?

Question 9.
Draw a flowchart to find the area of a rectangle.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .10

Question 10.
What are the different types of cha­racters in the character set of C++? C++
Plus One Computer Science Previous Year Question Papers and Answers 2018 .11

Question 11.
Classify data types used in C++.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .12

Question 12.
How many bytes are required to store the following arrays?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .13

Question 13.
Distinguish the memory allocation of the following initialization statements.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .14
char name[10] = “TOM”;
char str[] = “TOM”;

Question 14.
Current the program and write the output
Plus One Computer Science Previous Year Question Papers and Answers 2018 .15

#include<iostream>
using namespace std;
int main ()
{
Char str[ ]= “Green Computing”;
int n;
n=strlen (str);
cout< <n;
return o;
}

Question 15.
What is a firewall?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .16

Question 16.
What is phishing?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .17

Answer any nine questions from 17 to 27.

Plus One Computer Science Previous Year Question Papers and Answers 2018 .18

Question 17.
a. A number of symbols used in a num­ber system are called
b. Find MSD in the decimal number 7854-25
c. Find octal equivalent of (400)10.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .19

Question 18.
a. ASCII stands for………….
Plus One Computer Science Previous Year Question Papers and Answers 2018 .21
b. Find the largest number in the list,
Plus One Computer Science Previous Year Question Papers and Answers 2018 .20
1. (1oooo)2
2. (1ooo)8
3. (1oo)10
4. (1o)l6

Question 19.
a. Name two different language pr­ocessors which translate the high-level lan­guage program into machine language program.
b. What is the operating system? Give two examples?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .23
Plus One Computer Science Previous Year Question Papers and Answers 2018 .22

Question 20.
What is the operating system ? Give two examples.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .24

Question 21.
a. Distinguish between entry controlled loop and exit controlled loop
Step l: Start
Step 2: N = l
Step 3: Print N
Step 4: N = N + 1
Step 5: If N<=10 Then Go To step 3
Step 8: Stop

b. When we implement the above algo­rithm in C++, what will be the output?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .25

Question 22.
What is the role of relational operators in C++ ? Give suitable examples.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .26

Question 23.
Distinguish between the break and continue statements in C+ +.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .27

Question 24.
If 24, 54, 89, 56, 76, 42, 5 are the ele­ments of an array, illustrate the work­ing of selection sort algorithm for sort­ing these elements in descending order.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .28

Question 25.
Write a C++ program to input the scores of 5 students and display them in reverse order using an array.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .29
Question 26.
Explain the difference between Call-by­value and Call-by-reference methods with suitable examples.
Call-by-value, Call-by-reference
Plus One Computer Science Previous Year Question Papers and Answers 2018 .30

Answer any nine questions from 28 to 30
Plus One Computer Science Previous Year Question Papers and Answers 2018 .32

Question 27.
Explain the scope of variables in a C++ program.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .31

Question 28.
List and explain various components of system software.

Question 29.
What will be the output of the given C++ program? Justify your answer.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .33

#include<iostream>
using namespace std; int main( )
{
int a, b, num;
for (a=i; a< = io; ++a)
{
for (b=i; b<=5; ++b)
num = a*b;
cout<<num<<endl;
}
return 0;
}

b. Rewrite the following program using while and do-while loops. (Write sepa­rate programs)
Plus One Computer Science Previous Year Question Papers and Answers 2018 .34

#include<iostream>
using namespace std;
int main( )
{
int i;
for (i=i; i<=io; i++)
{
cout< <i;
}
return o;
}

Question 30.
a. URL stands for……
b. Explain the format of URL with an example.
c. What is the use of URL in computer networks?
Plus One Computer Science Previous Year Question Papers and Answers 2018 .35

Answer

Answer 1.
20

Answer 2.
#define, #undef

Answer 3.
goto statement

Answer 4.
‘\o’

Answer 5.
MODEM

Answer 6.
Von Neumann architecture consists of a central processing unit (CPU) contai­ning arithmetic logic unit (ALU) and controls unit (CU), input-output unit and a memory for storing data and in­structions. This model implements the ‘Stored Program Concept’ in which the data and the instructions are stored in the memory.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .36

Answer 7.
JPEG (Joint Picture Experts Group), bitmap file format (BMP), Tagged Im­age File Format (TIFF), Graphics Inter­change Format (GIF).

Answer 8.
It is a small and fast memory between the processor and RAM. Frequently ac­cessed data, instructions, intermediate results, etc. are stored in cache memory for quick access.

Answer 9.
Let l, b, A are the variables.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .37

Answer 10.
1.  Letters: A – Z, a – z
2. Digits: 0 – 9
3. Special characters: +, -, *, \, , /, ( ), [ ], { }, =, <, >, ?, !, @, %, #, $
4. White spaces: Blank space (space bar), tab, return, new line, form feed
5. Other characters: 256 ASCII charac­ters

Answer 11.
Based on nature, size and associated operations, data types are classified into fundamental data types, user-defined data types and derived data types. Pre­defined data types (fundamental data types) in C++ are char, int, float, double and void.

Answer 12.
2 x 2 x 5 = 20 bytes
2 x 25 = 50 bytes

Answer 13.
char name[io] = “TOM”;
Here is the first statement, 10 memory locations will be allocated and the string will be stored with null charac­ter as the delimiter. The last six bytes . will be left unused,
char str[ ] = “TOM”;
Here the size of the array is not speci­fied and hence only 4 bytes will be allo­cated
(3 bytes for the string and 1 for ‘\o’)-

Answer 14.

#include <iostream>
#include <cstdio> using namespace std; int main( )
{
char str[ ]= “Green Computing”;
int n;
n=strlen(str);
cout<<n;
return 0;
}
The output will be 15.

Answer 15.
Firewall is a system that controls the incoming and outgoing network traffic by analyzing the data and then pro­vides security to the computer network in an organization from other networks (internet).

Answer 16.
It is an attempt to get others informa­tion such as usernames, passwords, bank a/c details etc by acting as the au­thorized website. Phishing websites have URLs and home pages similar to their original ones and mislead others, it is called spoofing.

Answer 17.
a. base or radix
b. 7
c. (620)8
Plus One Computer Science Previous Year Question Papers and Answers 2018 .38

Answer 18.
a. American Standard Code for Infor­mation Interchange
b. i. (10000)2 =1 x 24 + 0 x 23 + 0 x 22+0 x 21 + 0 x 20 = 16 + o + 0 + o = 16
ii. (1000)8 = 1 x 83 + o x 82 + ox 81 + o x 8° = 512 + 0 + o + o = 512
iii.(100)10
iv. (10)16 = 1 x 161 + o x 16°= 16
Here (1ooo)8 is the largest number.

Answer 19.
a. Compiler, interpreter
b. It is a set of programs that act as an interface between the user and com­puter hardware, eg., Linux, MS Win­dows.

Answer 20.
Entry controlled loop:
1. Initialization before loop definition.
2. No guarantee to execute the loop body at least once.
3. e.g.for loop, while loop

Exit controlled loop:
1. Initialization before loop definition.
2. Will execute the loop body at least once even though the condition is False.
3. eg., do while loop

Answer 21.
a.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .39

b. This C++ program will display the first 10 natural numbers. 123456789 10

Answer 22.
Used for comparing numeric data. These are binary operators. The result of any relational operation will be ei­ther True or False. They are < (less than), > (greater than), <= (less than or equal to), >= (greater than or equal to), == (equal to), != (not equal to).= is an assignment operator used to as­sign a value to the variable. == is a relational operator that tests for equal­ity.

Answer 23.
break:

  1. Used with switch and loops.
  2. Brings the program control outside the switch or loop by skipping the rest of the statements within the block.
  3. Program control goes out of the loop even though the test expression is True.

continue:

  1. Used only with loops.
  2. Brings the program control to the beginning of the loop by skipping the rest of the statements within the block.
  3. Program control goes out of the loop only when the test expression becomes False.

Answer 24.
Plus One Computer Science Previous Year Question Papers and Answers 2018 .40

Answer 25.

#include <iostream>
using namespace std; int main( )
{
int i, score[5];
for(i=o; i<5; i++)
{
cout<<“Enter the scores: ";
cin>>score[i];
}
for(i=4; i>=o; i- -)
cout<<“Scores of student” <<i <<“ is”
<< score[i]<<endl;
return o;
}

Answer 26.
Call by value method:
1. Ordinary variables are used as for­mal parameters.
2. Actual parameters may be con­stants, variables or expressions.
3. The changes made in the formal ar­guments are not reflected in actual ar­guments.
4. Exclusive memory allocation is re­quired for the formal arguments

Call by reference method:

1. Reference variables are used as for­mal parameters.
2. Actual parameters will be variables only.
3. The changes made in the formal ar­guments are reflected in actual argu­ments.
4. Memory of actual arguments is shared by formal arguments. Call-by-value:

eg., eg., void change(int n)
{
n = n + 1;
cout << “n =” << n << ‘\n’;
}
int main()
{
int x = 20; change(x); cout << “x = ” << x;
}

Here only the value of the variable x is passed to the function. Thus the formal parameter n in the function will get the value 20. When we increase the value of n, it will not affect the value of the variable x. The output of the above code
is n = 21, x = 20

Call-by-reference: void change(int & n)
{
n = n + 1;
cout << “n = ” << n << ‘\n’;
}
int main()
{
int x=20;
change(x);
cout << “x = ” << x;
}
Here the output will be n = 21, x = 21

Answer 27.
The scope of local variables:
1. Declared within a function or a block of statements.
2. Available only within that function or block.
3. Memory is allocated when the func­tion or block is active and freed when the execution of the function or block is completed.
The scope of global variables:
1. Declared outside all the functions.
2. Available to all the functions of the program.
3. Memory is allocated just before the execution of the program and freed when the program stops execution.

eg., #include <iostream>
using namespace std; int cubefint n)
{
int cb;
cout<< “The value of x passed to n is” << x; 
/*This is an error because the vari­able x is declared within the main() func­tion. 
So it cannot be used in other func­tions. */
cb = n * n * n;
return cb;
}
int main()
{
int x, result;
cout << “Enter a number : ”;
cin >> x;
result = cube(x);
cout << “Cube = ” << result;
cout << “\nCube = ”<<cb;
}

In the above program, the scope of the var­iable CB is in the cube( ) function because it is declared within that function. Hence this variable cannot be used out­side the function. This scope is known as local scope.

Answer 28.
System software is a set of one or more programs designed to control the opera­tions of a computer.
The following are components of system software:
1. Operating system: It is a set of pro­grams that acts as an interface between the user and computer hardware. The primary objective of an operating sys­tem is to make computer system con­venient to use. The operating system is the most important system software.

2. Language processors: Language pro­cessors are software used to convert programs written in assembly language or high-level language into ma- 1 chine language.

Various language processors are:
a. Assembler: It converts languages written in assembly language into the ma­chine language.

b. Interpreter: It converts a high-level language into machine language by-line by line. If there is an error in one line, it reports and the execution is ter­minated. It will continue the transla­tion only after the correction of the er­ror. eg., BASIC is an interpreted lan­guage.

c. Compiler: It translates a high-level language into machine language by converting all the lines at a time. The errors are provided at the end of the compilation. The programming lan­guage that have a compiler are C, C++, Pascal, etc.

d. Utility software: A set of programs which help users in system mainte­nance tasks and in performing tasks of routine nature.

Utility programs are:
a. Compression tools: Large files can be compressed so that they take less storage area. Compression of files is known as zipping and decompression is called unzipping, eg., WinZip, WinRAR.

b. Disk defragmenter: It is a program that rearranges files on a computer hard disk. This enables the computer to work faster and more efficiently.

c. Backup software: It duplicating the disk information so that in an event of disk failure or in an event of accidental deletion, this backup may be used. Backup utility programs facilitate the backing up of the disk.

Answer 29.
a.
5
10
15
20
25
30
35
40
45
50
Only the outer loop statement will ex­ecute. The inner loop executes only once because of the absence of
{ }. The result variable num and the value of num in the last iteration of the inner loop are dis­played using the court statement.
b.

While:- i = 1;
while (i< = io)
{
cout<<i;
i++;
}
Do while:-
i = 1;
do
{
cout<<i;
i++;
}
while (i<=io);

Answer 30.
a. Uniform Resource Locator
b. Provides a way to locate a resource on the web, the hypertext system that operates over the internet.
c. URL has three parts.
1. http: It means a hypertext transfer protocol. It is a protocol used to transfer hypertext.
2. www: Means World Wide Web. With an email address, we can open our mailbox from anywhere in the world.
3. The third part is a unique name. It is the official website name of signals Window System, eg., hscap.kerala

Plus One Computer Science Previous Year Question Papers and Answers

Plus One Business Studies Model Question Paper 3

Kerala Plus One Business Studies Model Question Paper 3

General Instructions

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.
  • You are not allowed to write your answers nor to discuss anything with others during the ‘cool off time’.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • All questions are compulsory and the only internal choice is allowed.
  • When you select a question, all the sub-questions must be answered from the same question itself.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give provided wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Plus One Business Studies Model Question Papers Paper 2 01

Answer the following questions from 1 to 9. Each carries 1 score.
Plus One Business Studies Model Question Papers Paper 3 1

Question 1.
Business activities are undertaken primarily to …………..
Plus One Business Studies Model Question Papers Paper 3 2
a. Earn profit
Plus One Business Studies Model Question Papers Paper 3 3
b. Have recognition
Plus One Business Studies Model Question Papers Paper 4
c. Fulfill social obligation

Question 2.
Provision of residential accommodation to the member at a reasonable rate is the objective
Plus One Business Studies Model Question Papers Paper 5
a. Producers cooperative
Plus One Business Studies Model Question Papers Paper 6
b. Consumers cooperative
Plus One Business Studies Model Question Papers Paper 7
c. Housing cooperative
Plus One Business Studies Model Question Papers Paper 8
d. Credit cooperative
Plus One Business Studies Model Question Papers Paper 9

Question 3.
Which of the following cannot be classified as an auxiliary to trade’?
Plus One Business Studies Model Question Papers Paper 10
a. Mining
Plus One Business Studies Model Question Papers Paper 11
b. Insurance
Plus One Business Studies Model Question Papers Paper 12
c. Warehousing
Plus One Business Studies Model Question Papers Paper 13
d. Transport
Plus One Business Studies Model Question Papers Paper 14

Question 4.
Mortality is to be enforced in an establishment by the ………………
Plus One Business Studies Model Question Papers Paper 15
a. Top level management
Plus One Business Studies Model Question Papers Paper 16
b. Middle-level management
Plus One Business Studies Model Question Papers Paper 17
c. Low-level management
Plus One Business Studies Model Question Papers Paper 18
d. Employees at all levels
Plus One Business Studies Model Question Papers Paper 19

Question 5.
Preliminary contracts are signed
Plus One Business Studies Model Question Papers Paper 20
a. before the incorporation
Plus One Business Studies Model Question Papers Paper 21
b. after incorporation but before the capital subscription
Plus One Business Studies Model Question Papers Paper 23
c. after incorporation but before the commencement of business
d. after the commencement of business
Plus One Business Studies Model Question Papers Paper 24

Question 6.
……………….. is the last link in the channel of distribution of goods and services
Plus One Business Studies Model Question Papers Paper 25
a. Wholesale
Plus One Business Studies Model Question Papers Paper 26
b. Retailer
Plus One Business Studies Model Question Papers Paper 27
c. Producer
Plus One Business Studies Model Question Papers Paper 28
d. Customer
Plus One Business Studies Model Question Papers Paper 29

Question 7.
Public deposits are the deposits that are raised directly from
Plus One Business Studies Model Question Papers Paper 30
a. The public
Plus One Business Studies Model Question Papers Paper 31
b. The director
Plus One Business Studies Model Question Papers Paper 32
c. The auditors
Plus One Business Studies Model Question Papers Paper 33
d. The owner’s
Plus One Business Studies Model Question Papers Paper 34

Question 8.
An arrangement to acquire the right use an asset without owing is called
Plus One Business Studies Model Question Papers Paper 35
a. Factoring
b. Leasing
c. Financing
d. Warehousing

Question 9.
ADRs are issued in
Plus One Business Studies Model Question Papers Paper 36
a. Canada
കാനഡ
b.China again
Plus One Business Studies Model Question Papers Paper 38
c. India
Plus One Business Studies Model Question Papers Paper 39
d. USA
Plus One Business Studies Model Question Papers Paper 40

Answer any 6 questions from 10 to 16. Each carries 2 scores.
Plus One Business Studies Model Question Papers Paper 41

Question 10.
Write any two merits of lease financing.
Plus One Business Studies Model Question Papers Paper 42

Question 11.
Explain the concept of discretionary responsibility.
Plus One Business Studies Model Question Papers Paper 43

Question 12.
Name the following partners.
a. A partnership firm informs its customers that Mr. Ramesh is its partner. From the customers, Mr. Ramesh comes to know about it. But he does not deny it.
b. Vinod is a partner who hasn’t invested any money and does not take part in any activity.
Plus One Business Studies Model Question Papers Paper 44

Question 13.
Write a short note on NABARD.
Plus One Business Studies Model Question Papers Paper 45

Question 14.
Certain retailers do not have any fixed place of business to conduct the trade. State any two characteristics of them.
Plus One Business Studies Model Question Papers Paper 46

Question 15.
Find the business models from the following.
Plus One Business Studies Model Question Papers Paper 47
a. Customers making toll free calls through call centers to inquire about the product of a company
Plus One Business Studies Model Question Papers Paper 48
b. CIAL Tech Ltd. .uses a network of computers for monitoring delivery of components to the suppliers
Plus One Business Studies Model Question Papers Paper 49

Question 16.
A cooperative society is a voluntary association of persons who join together with the motive of the welfare of the members. State any two merits of a cooperative society.
Plus One Business Studies Model Question Papers Paper 50

Answer any 4 questions from 17 to 21. Each carries 3 scores.
Plus One Business Studies Model Question Papers Paper 51

Question 17.
How does a cooperative society exemplify democracy and secularism? Explain.
Plus One Business Studies Model Question Papers Paper 52

Question 18.
Compare the status of minor in joint Hindu family business with that in a partnership firm.
Plus One Business Studies Model Question Papers Paper 53

Question 19.
Write any two limitations of business.
Plus One Business Studies Model Question Papers Paper 54

Question 20.
The management of Thottam Plantation decided to set apart 10% of their profits for the education of students belonging to weaker sections. Identify the type of social responsibility referred here. Also, write three points of arguments for social responsibility.
Plus One Business Studies Model Question Papers Paper 55

Question 21.
For buying and selling of goods within the boundaries of a country mainly two intermediaries are involved. Write two services each provided by these intermediaries to the producers.
Plus One Business Studies Model Question Papers Paper 56

Answer the following questions which carry 4 scores.
Plus One Business Studies Model Question Papers Paper 57

Question 22.
Match the following:
Plus One Business Studies Model Question Papers Paper 58

Answer any 3 questions from 23 to 26. Each carries 4 scores.
Plus One Business Studies Model Question Papers Paper 3 136

Question 23.
Kochi Metro rail corporation Ltd. Engaged in the construction of Kochi metro by joining together with the government of Kerala What are the advantages of such venture?
Plus One Business Studies Model Question Papers Paper 60

Question 24.
Modern means of communication helps in making the exchange of ideas and information faster. Explain the modern means of communication.
Plus One Business Studies Model Question Papers Paper 61

Question 25.
Miss Lindzy approaches you with the intention of subscribing to shares in a private limited company. She wants to know the privileges enjoyed by a private limited company. Can you help her?
Plus One Business Studies Model Question Papers Paper 62

Question 26.
“ High profit-making institutions are beneficial not only to the businessmen but also to the society”. Comment on the above statement both from the point of view of the businessman and the society.
Plus One Business Studies Model Question Papers Paper 63

Answer any 3 questions from 27 to 30. Each carries 5 scores.
Plus One Business Studies Model Question Papers Paper 64

Question 27.
Explain the term marine insurance and also explain the types of marine insurance.
Plus One Business Studies Model Question Papers Paper 65

Question 28.
A commerce teacher, while going through the topic, “ Internal Trade”. Cites the examples of ‘Bata Shoe Company’ having its headquarters in Mumbai where if it has its showrooms at different locations of the city as well as in various cities all over India. The products of the company carry the same price in all these showrooms. Identify the type of shop cited in the example. List any five features of such shops.
Plus One Business Studies Model Question Papers Paper 66

Question 29.
Do you welcome the opening of the Indian retail market to multinationals like Walmart, McDonald’s etc?
Plus One Business Studies Model Question Papers Paper 67
Plus One Business Studies Model Question Papers Paper 68

Question 30.
Suppose, a public enterprise is established in your district. As an e-commerce student, can you compare the various features of the three forms of public enterprises?
Plus One Business Studies Model Question Papers Paper 69

Answer any 2 questions from 31 to 33. Each carries 8 scores.
Plus One Business Studies Model Question Papers Paper 70

Question 31.
Mr. Manoj is running a ladies store. As he has no business partners in the shop, he appointed two more ladies to assist him in trading activities for a salary of Rs. 2,000 per month. Identify this business organization State any four advantages and three disadvantages of the organization.
Plus One Business Studies Model Question Papers Paper 71

Question 32.
The newly established Eastern valley Ltd., require a huge volume of finance for establishing their business. A wide variety of sources of funds are available for them. Advice the finance department about the factors to be considered before selecting the suitable sources.
Plus One Business Studies Model Question Papers Paper 72
Plus One Business Studies Model Question Papers Paper 73

Question 33.
Seetharam & sons Pvt.Ltd and Krishna Sagar Ltd. are two companies incorporated in India. Identify the types of companies. Differentiate between the two types of companies
Plus One Business Studies Model Question Papers Paper 74

Answers

Answer 1.
a. Earn profit
ലാഭം നേടുക

Answer 2.
c. Housing cooperative
Plus One Business Studies Model Question Papers Paper 75

Answer 3.
Mining

Answer 4.
Employees at all levels
Plus One Business Studies Model Question Papers Paper 76

Answer 5.
before the incorporation
Plus One Business Studies Model Question Papers Paper 77

Answer 6.
b.Retailer
Plus One Business Studies Model Question Papers Paper 78

Answer 7.
The public

Answer 8.
Leasing

Answer 9.
USA

Answer 10.

  • It provides finance without diluting the ownership or control of a business
    Plus One Business Studies Model Question Papers Paper 79
  • It does not affect the debtor raising of an enterprise.
    Plus One Business Studies Model Question Papers Paper 80

Answer 11.
Discretionary Responsibility
Plus One Business Studies Model Question Papers Paper 81
This refers to purely voluntary obligation that an enterprise assumes for instance providing charitable contribution to educational institutions or helping the affected people during floods or earthquakes.
Plus One Business Studies Model Question Papers Paper 82
Plus One Business Studies Model Question Papers Paper 83

Answer 12.
a. Partner by holding out
b. Nominal partner

Answer 13.
National Bank for Agriculture and Rural Development (NABARD)
NABARD was set up in 1982 to promote integrated rural development. It has been adopting a multipronged, multipurpose strategy for the promotion of rural business enterprises in the country.
Plus One Business Studies Model Question Papers Paper 85

Answer 14.
Characteristics of if itinerant retailers
a. Deals in daily use consumer products.
b. Supply of products of doorsteps etc.

Answer 15.
a. C2B
b. B2B.

Answer 16.
a. Large funds
b. Share of risk

Answer 17.
AH, a feature of the cooperative society lends it to a democratic character. Further, the membership of a cooperative society is open to all, irrespective of their religion, caste, and gender. The cooperative society through its purpose lays emphasis on the values of mutual help and welfare. These features prove the secular nature of cooperative societies.
Plus One Business Studies Model Question Papers Paper 87

Answer 18.
A person becomes a member of a joint Hindu family business when he takes birth in such a family. All minors the family are coparceners in the family business. A partnership is based on a legal contract between partners. Since the minor is incompetent for entering to a valid contract, minor cannot be a partner of a partnership firm, but minor can be appointed as a beneficiary of a partnership firm.
Plus One Business Studies Model Question Papers Paper 88

Answer 19.

  1. It lacks a personal touch with customers.
    Plus One Business Studies Model Question Papers Paper 89
  2. Incongruence between order taking and order fulfillment speed.
    Plus One Business Studies Model Question Papers Paper 90

Answer 20.
Discretionary Responsibility
Plus One Business Studies Model Question Papers Paper 91
This refers to purely voluntary obligation that an enterprise assumes, for instance, providing a charitable contribution to an educational institute or helping the affected people during floods or earthquakes,
Plus One Business Studies Model Question Papers Paper 92
Arguments for Social Responsibility.
Plus One Business Studies Model Question Papers Paper 98

1. The justification for existence and growth
Plus One Business Studies Model Question Papers Paper 99
Business exists for providing goods and services to satisfy human needs. Though profit motive is an important justification for undertaking a business activity,
Plus One Business Studies Model Question Papers Paper 100

2. The long-term interest of the firm
Plus One Business Studies Model Question Papers Paper 101
A firm and its image stand to gain maximum profits in the long run when it has its highest goal as service to society. When an increasing number of members of society, including workers, consumers, shareholders, government official feel that business enterprise is not serving its best interest, they will tend to withdraw their cooperation to the enterprise concerned.
Plus One Business Studies Model Question Papers Paper 102
Plus One Business Studies Model Question Papers Paper 3 1

Answer 21.
Services of wholesalers
Plus One Business Studies Model Question Papers Paper 3 2
1. Services to manufacturers:

a. Facilitate large-scale production;
Plus One Business Studies Model Question Papers Paper 3 3
Bulk orders from wholesalers enable the producers to take the production on a large scale and take advantages of economies of scale.
Plus One Business Studies Model Question Papers Paper 3 4

b. Bearing risk
Plus One Business Studies Model Question Papers Paper 3 5
The wholesaler deals in goods in its own name and takes the risk of loss or damage in storage and transit.
Plus One Business Studies Model Question Papers Paper 3 6

c. Financial assistance
Plus One Business Studies Model Question Papers Paper 3 7
Wholesalers provide financial assistance to manufacturers means they make ready cash payment for purchases and even advance money to producers.
Plus One Business Studies Model Question Papers Paper 3 8

Services to retailers :
Plus One Business Studies Model Question Papers Paper 3 9

a. Availability of goods
Plus One Business Studies Model Question Papers Paper 3 10
The wholesalers make the products Real owner Fixed percentage of interest No voting rights International source of finance various manufacturers readily available to the retailers.
Plus One Business Studies Model Question Papers Paper 3 11

b. Marketing support
Plus One Business Studies Model Question Papers Paper 3 12
The wholesalers perform various marketing functions and provide support to retailers.
Plus One Business Studies Model Question Papers Paper 3 13

C. Grant of credit
Plus One Business Studies Model Question Papers Paper 3 14

Answer 22.
Plus One Business Studies Model Question Papers Paper 3 15

Answer 23.
Government company
Plus One Business Studies Model Question Papers Paper 3 16
A government company is established under the Indian Companies Act, 1956 and is registered and governed by the provisions of the Indian Companies Act. According to the Indian Companies Act 1956, a government company means any company in which not less than 51 percent of the paid up capital is held by the central government, or partly by central government and partly by one or more state governments.
Plus One Business Studies Model Question Papers Paper 3 17
Plus One Business Studies Model Question Papers Paper 3 18

Features
Plus One Business Studies Model Question Papers Paper 3 19

  1. It is an organization created by the Indian companies act,
    Plus One Business Studies Model Question Papers Paper 3 20
  2. It can obtain funds from government shareholdings
    Plus One Business Studies Model Question Papers Paper 3 21
  3. It can enter into a contract.
    Plus One Business Studies Model Question Papers Paper 3 22
  4. It can acquire property in its own name.
    Plus One Business Studies Model Question Papers Paper 3 23
  5. Its management is regulated by the provisions of the companies act.
    Plus One Business Studies Model Question Papers Paper 3 24

Answer 24.
1. Fax
Plus One Business Studies Model Question Papers Paper 3 25
The printed, a message is converted into electronic signals as the paper rolls through the fax machine. This message is received in the same format the other end on the paper roll that is attached to the machine.
Plus One Business Studies Model Question Papers Paper 3 26

2. Internet & E-mail
Plus One Business Studies Model Question Papers Paper 3 27
The Internet is an international computer network that links computers from sectors such as government agencies business houses, educational institution, stores it and allows it to be read on satisfying certain conditions.
Plus One Business Studies Model Question Papers Paper 3 28
Plus One Business Studies Model Question Papers Paper 3 29

3. Video conferencing and Teleconferencing
This mode of communication begins in Teleconferencing. A number of telephones are simultaneously connected to one another. Teleconferencing is a facility enabling people in different parts of the world to have an audio meeting, saving on transit time and hotel stay.
Plus One Business Studies Model Question Papers Paper 3 30

4. Video conferencing
Plus One Business Studies Model Question Papers Paper 3 31
It is the closest it gets to seeing and hearing one another without being present together technologies used in a video conference area monitor, screen, microphone, camera etc.
Plus One Business Studies Model Question Papers Paper 3 32

5. Voicemail
Plus One Business Studies Model Question Papers Paper 3 33
Voicemail is a form of email only. Here, a message, instead of being communicated in a written is sent in the form of voice of the caller.
Plus One Business Studies Model Question Papers Paper 3 34

Answer 25.
Privileges of a private company

  1. A private company can be formed by only two members. Andiamo.
    Plus One Business Studies Model Question Papers Paper 3 35
  2. There is no need to issue a prospectus.
    Plus One Business Studies Model Question Papers Paper 3 36
  3. Allotment of shares can be done without receiving the minimum subscription,
    Plus One Business Studies Model Question Papers Paper 3 37
  4. It can start a business as soon as it receives the certificate of incorporation.
    Plus One Business Studies Model Question Papers Paper 3 38
  5. It needs to have only two directors
    Plus One Business Studies Model Question Papers Paper 3 39
  6. It is not required to keep an index of members
    Plus One Business Studies Model Question Papers Paper 3 40
  7. There is no restriction on the amount of loan to the directors of a private company.
    Plus One Business Studies Model Question Papers Paper 3 41

Answer 26.
From the viewpoint of business:

  1. Profit is necessary for the survival of the business.
  2. Profit increases the efficiency of a business.
  3. Profit accelerates the pace of growth.
  4. Profit builds a good image of the business.
  5. Profit brings prosperity to the business.
  6. Profit is a reward for the risk borne by the businessman.

From the viewpoint of society:

  1. Society gets quality products at reasonable prices.
  2. Employees will get better remuneration, good working condition etc
  3. A profitable business enterprise generates more employment opportunities
  4. A profitable business concern can undertake various community development programs.

Answer 27.
Classification of marine insurance
Plus One Business Studies Model Question Papers Paper 3 42

  1. Ship or hull insurance
    Plus One Business Studies Model Question Papers Paper 3 43
    When a ship is insured against marine hazards it is known as hull insurance.
    Plus One Business Studies Model Question Papers Paper 3 44
  2. Cargo insurance
    Plus One Business Studies Model Question Papers Paper 3 45
    Marine insurance that covers the risk of loss of cargo is known as cargo insurance.
    Plus One Business Studies Model Question Papers Paper 3 46
  3. Freight insurance
    Plus One Business Studies Model Question Papers Paper 3 47
    Insurance of the risk of loss of freight is known as freight insurance,
    Plus One Business Studies Model Question Papers Paper 3 48

Answer 28.
Chain stores or multiple shops:
Plus One Business Studies Model Question Papers Paper 3 49
It is a system of branch shop operating under centralized management and dealing in a similar line of products. The central office is called head office. Branches are located all over the world.
Plus One Business Studies Model Question Papers Paper 3 50

Features of multiple shops
Plus One Business Studies Model Question Papers Paper 3 51

  • As there is centralized procurement they enjoy economies of scale
    Plus One Business Studies Model Question Papers Paper 3 52
  • By selling directly to the consumers they eliminate unnecessary middlemen on the sale of goods and services
    Plus One Business Studies Model Question Papers Paper 3 53
  • Since sales are made in cash basis no bad debts occurred
    Plus One Business Studies Model Question Papers Paper 3 55
  • It reduces the chance of dead stock by transferring the same to branch in another locality where it is in demand
    Plus One Business Studies Model Question Papers Paper 3 56

Answer 29.
Global enterprises or Multi-National Corporations (MNCs)
Plus One Business Studies Model Question Papers Paper 3 57
Global enterprises are huge industrial organizations which extend their industrial and marketing operations through a net VDC of their branches in several countries. They are characterized by their huge size, a large number of products, advanced technology etc.
Plus One Business Studies Model Question Papers Paper 3 58
Features:
Plus One Business Studies Model Question Papers Paper 3 59

1. Huge capital resources
Plus One Business Studies Model Question Papers Paper 3 60
These enterprises are characterized by ‘ possessing huge financial resources and the ability to raise funds from different sources.
Plus One Business Studies Model Question Papers Paper 3 61

2. Foreign collaboration
Plus One Business Studies Model Question Papers Paper 3 62
Global enterprises can collaborate with companies in the public and private sector
Plus One Business Studies Model Question Papers Paper 3 63

3. Advanced technology
Plus One Business Studies Model Question Papers Paper 3 64
These enterprises possess technological superiorities in their methods of production.
Plus One Business Studies Model Question Papers Paper 3 65

4. Product innovation
Plus One Business Studies Model Question Papers Paper 3 66
They are continuously engaged in developing new products, better quality an superior design of an existing product.
Plus One Business Studies Model Question Papers Paper 3 67

5. Marketing strategies
Plus One Business Studies Model Question Papers Paper 3 68
The marketing strategies of global companies are far more effective than other companies.
Plus One Business Studies Model Question Papers Paper 3 69

6. Expansion of market territory
Plus One Business Studies Model Question Papers Paper 3 70
Their operations and activities extend beyond the physical boundaries of their own country.
Plus One Business Studies Model Question Papers Paper 3 71

7. Centralized control
Plus One Business Studies Model Question Papers Paper 3 72
They have their headquarters in their home country and exercise control over all branches and subsidiaries,
Plus One Business Studies Model Question Papers Paper 3 73

Answer 30.
Public sector enterprises can be organized in the following three forms
Plus One Business Studies Model Question Papers Paper 3 74

  1. Departmental undertaking
    Plus One Business Studies Model Question Papers Paper 3 75
  2. Statutory corporations
    Plus One Business Studies Model Question Papers Paper 3 76
  3. Government company
    Plus One Business Studies Model Question Papers Paper 3 77

1. Departmental undertaking
Plus One Business Studies Model Question Papers Paper 3 78
This is the oldest form of organizing public sector enterprises. It may be run either by the central government or by the state government. They are managed by the government employees and works under the center of a minister.
Eg: Railway, Post and Telegraph etc.
Plus One Business Studies Model Question Papers Paper 3 79

Features:
Plus One Business Studies Model Question Papers Paper 3 80

  1. They are financed from the government Treasury.
    Plus One Business Studies Model Question Papers Paper 3 81
  2. They are subject to accounting and audit controls applicable other government activities.
    Plus One Business Studies Model Question Papers Paper 3 82
  3. The employees of the enterprise are government servants.
    Plus One Business Studies Model Question Papers Paper 3 83

2. Statutory corporations
Plus One Business Studies Model Question Papers Paper 3 84
Statutory corporations are public enterprises brought into existence by a special act of the government. The act defines its powers and functions, rules and regulations governing its employees and its relationship with the government departments.
Eg. LIC, RBI, SBI etc.
Plus One Business Studies Model Question Papers Paper 3 85

Features:
Plus One Business Studies Model Question Papers Paper 3 86

  1. Statutory corporations are set up under an act of parliament.
    Plus One Business Studies Model Question Papers Paper 3 87
  2. This type of organization is wholly owned by the state.
    Plus One Business Studies Model Question Papers Paper 3 88
  3. It is a body corporate and can sue and be sued.
    Plus One Business Studies Model Question Papers Paper 3 89

3 ……. Government company
Plus One Business Studies Model Question Papers Paper 3 90
A government company is established under the Indian Companies Act, 1956 and is registered and governed by the provisions of the Indian Companies Act. According to the Indian Companies Act 1956, a government company means any company in which not less than 51 percent of the paid up capital is held by the central government, or partly by central government and partly by one or more state governments.
Plus One Business Studies Model Question Papers Paper 3 91

Features:

  1. It is an organization created by the In. Indian companies act, 1956.
    Plus One Business Studies Model Question Papers Paper 3 92
  2. The company can sue and be sued.
  3. It can enter into a contract.
    Plus One Business Studies Model Question Papers Paper 3 93

Answer 31.
Sole Proprietorship
Plus One Business Studies Model Question Papers Paper 3 94
Sole proprietorship refers to a form of business organization which is owned, managed and controlled by an individual who is the recipient of all profits and bearer of all risk. A sole proprietor is the one who is the only owner of a business.
Plus One Business Studies Model Question Papers Paper 3 95
Plus One Business Studies Model Question Papers Paper 3 96

Merits:
Plus One Business Studies Model Question Papers Paper 3 97

  • Quick decision
    Plus One Business Studies Model Question Papers Paper 3 98
    A sole trader has full control over affairs of business, so he enjoys a considerable degree of freedom in decision making.
    Plus One Business Studies Model Question Papers Paper 3 99
  • Confidentiality of information
    Plus One Business Studies Model Question Papers Paper 3 100
    A sole trader can keep all information related to business operations confidential and maintain secrecy.
    Plus One Business Studies Model Question Papers Paper 3 101
  • Direct incentive
    Plus One Business Studies Model Question Papers Paper 3 102
    A sole trader is the only recipient of all the profit. The need to share profits does not arise as he is the single owner.
    Plus One Business Studies Model Question Papers Paper 3 103
  • It instills Sense of accomplishment and confidence in one’s abilities.
    Plus One Business Studies Model Question Papers Paper 3 104
  • There is ease information as well as the closure of the business
    Plus One Business Studies Model Question Papers Paper 3 105

Demerits:
Plus One Business Studies Model Question Papers Paper 3 106

  • Limited resources
    Plus One Business Studies Model Question Papers Paper 3 107
    Resources of a sole trader limited to his personal savings and borrowings from others
    Plus One Business Studies Model Question Papers Paper 3 108
  • Limited life of a business concern
    Plus One Business Studies Model Question Papers Paper 3 109
    The death, insanity, of a sole proprietor, causes discontinuity of business
    Plus One Business Studies Model Question Papers Paper 3 110
  • The owner has unlimited liability
  • Limited managerial ability
    Plus One Business Studies Model Question Papers Paper 3 111
    A sole trader may not be an expert in every aspect of management.
    Plus One Business Studies Model Question Papers Paper 3 112

Answer 32.
Sources of finance
Plus One Business Studies Model Question Papers Paper 3 113
A company would choose from among various sources of finance depending on the amount . of capital required and the term for which it is needed.
Plus One Business Studies Model Question Papers Paper 3 114
Factors affecting the choice of source of funds
Plus One Business Studies Model Question Papers Paper 3 115

  1. Cost of procurement and utilization of funds.
    Plus One Business Studies Model Question Papers Paper 3 116
  2. Financial strength and stability of operation.
    Plus One Business Studies Model Question Papers Paper 3 117
  3. A form of organization and legal status.
    Plus One Business Studies Model Question Papers Paper 3 118
  4. Purpose and time period for which funds are required.
    Plus One Business Studies Model Question Papers Paper 3 119
  5. The risk profile of source of finance.
    Plus One Business Studies Model Question Papers Paper 3 120
  6. Control
    Plus One Business Studies Model Question Papers Paper 3 121
  7. Effect on creditworthiness
    Plus One Business Studies Model Question Papers Paper 3 122
  8. Flexibility and ease of obtaining funds.
    Plus One Business Studies Model Question Papers Paper 3 123
  9. Tax benefit.
    Plus One Business Studies Model Question Papers Paper 3 124

Answer 33.
Types of companies
Plus One Business Studies Model Question Papers Paper 3 125
1. Private company A private company means a company which

  • Restrict the right of members to transfer its share.
    Plus One Business Studies Model Question Papers Paper 3 126
  • Has a minimum of 2 and a maximum of 50 members.
    Plus One Business Studies Model Question Papers Paper 3 127
  • Does not invite the public to subscribe to its share capital
    Plus One Business Studies Model Question Papers Paper 3 128
  • Must have minimum up paid capital of Rs.llakh
    Plus One Business Studies Model Question Papers Paper 3 129

Public company
Plus One Business Studies Model Question Papers Paper 3 130
A public company means a company which is not a private company. As per Indian companies act a public company is one which
Plus One Business Studies Model Question Papers Paper 3 131

  • Has a minimum paid-up capital of Rs. 5 lakhs
    Plus One Business Studies Model Question Papers Paper 3 132
  • Has a minimum of 7members and no limit on maximum member
    Plus One Business Studies Model Question Papers Paper 3 133
  • Has no restriction on transfer of share
    Plus One Business Studies Model Question Papers Paper 3 134
  • Is not prohibited from inviting the public to subscribe to its share capital or public deposits.
    Plus One Business Studies Model Question Papers Paper 3 135

Plus One Business Studies Previous Year Question Papers and Answers