# Plus One Computer Application Model Question Paper 1

## Kerala Plus One Computer Application Model Question Paper 1

Time: 2 Hours
Cool off time: 15 Minutes
Maximum: 60 Scores

General Instructions to candidates

• There is a ‘cool off-time’ of 15 minutes in addition to the writing time of 2 hrs.
• Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
• Calculations, figures, and graphs should be shown in the answer sheet itself.
• Malayalam version of the questions is also provided.
• Give equations wherever necessary.
• Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Part A

Answer all questions from 1 to 5

Question 1.
Information may act as data. State True or False.

Question 2.
…………….. register holds the address of the next instruction to be executed by the processor.

Question 3.
A program written in HLL is known as ………..

Question 4.
The unpredictable value assigned to a variable at the time of its declaration is known as

Question 5.
The small text files used by browsers to remember our email IDs, usernames etc. are known as ……………..

Part B

Answer any nine questions from 6 to 16

Question 6.
Find decimal equivalent of (10001)2

Question 7.
What are the advantages of a hard disk?

Question 8.
Differentiate hardcopy and softcopy.

Question 9.
Write the names of two phases that are included in debugging.

Question 10.
What would happen if main () is not present in a program?

Question 11.
Comments are useful to enhance readability and understandability of a program. Justify this statement with examples.

Question 12.
What are the are the requirements to implement a multi-branching using a switch statement?

Question 13.
What is the peer-to-peer network? Peertopeer

Question 14.
Switch and hub are two devices associated with networking. Differentiate them.

Question 15.
Compare intranet and extranet.

Question 16.
What are the advantages of EMR?

Part C

Answer any nine questions from 17 to 27

Question 17.
And the smallest number in the list.

a. (1101 )2
b. (A)16
c. (13)8
d. (15)10

Question 18.
Write an algorithm to find a sum of first 100 odd numbers.

Question 19.
Draw a flowchart to display the first 100 natural numbers.

Question 20.
What is a floating point constant? What are the different ways to represent a floating point constant?

Question 21.
What are the three aspects of variables?

Question 22.
Find out the errors, if any, in the following C++ statements:

1. cout<< “a=” a;
2. m=5, n=12; 015
3. cout << “x” ; <<x;
4. cin >> y
5. cout>>\n “abc”
6. a = b + c
7. break = x

Question 23.
The following program finds the sum of three numbers. Modify the program to find the average. (Average should display fractional part also).

# include<iostream>
using namespace std;
int main ()
int x, y, z, result;
cout<<“Enter values for x, y, z”;
cin>>x>>y>>z;
result = x + y + z; .
return 0;
}

Question 24.
Rewrite the following statement using while and do while loops.

for(i=1; i<=10; i++) cout<<i;

Question 25.
Write the significance of break statement in the switch statement. What is the effect of the absence of a break in a switch statement?

Question 26.
What are the methods for preventing network attacks?

Question 27.
What are the major challenges faced in the implementation of e-Learning?

Part D

Answer any two questions from 28 to 30

Question 28.
Explain any five commonly used secondary or (auxiliary) memory devices.

Question 29.
WHte a C++ program to find the total and percentage of a student in six subjects.

Question 30.
What is network protocol? Explain.

True

Program Counter (PC)

source code

garbage value

(10001)2 = 1 × 24 + 0 × 23 + 0 × 22 + 0 × 21 + 1 × 2°
= 16 + 0 + 0 + 0 + 1
= 17
(10001 )2 = (17)10

Hard disks have very high storage capacity, high data transfer rates, and low access time, it is more durable and less error-prone.

Hardcopy outputs are permanent outputs which can be used at a later date or when required.
Softcopy outputs are electronic and are available on the screen in a digital form.

Two phases that included in debugging are debugging of syntax errors during translation and debugging of logical errors during execution.

The execution starts at main() and ends within main(). If we use any other function in the program, it is called (or invoked) from main().

Comments are lines in the code that are added to describe the program. They are ignored by the compiler.
i. Single line comment: The characters // (two slashes) is used. The text appearing after II in a line is treated as a comment by the C++ compiler.
ii. Multiline comments: Anything written within /* and */ is treated as a comment so that the comment can take any number of lines.
eg., /* This program displays the message “Smoking is injurious to health” on the monitor */

# include <iostream.h> // To use the cout object
using namespace std; // To access cout
int main() // program begins here
{ // The following output statement displays a message
cout << “Smoking is injurious to health"; return 0;
} // end of the program

The following are the requirements to implement a multi-branching using a switch statement:

1. Conditions involve only equality checking. In other cases, it should be converted into equality expression.
2. The first operand in all the equality expressions should be the same variable or expression.
3. The second operand in these expressions should be integer or character constants.

In this configuration, all the computers have equal priority. That means each computer can function as both a client and a server. There is no dedicated server.

A switch is an expensive device used to connect computers (device) to a network. Unlike a hub, switch transmit data, not to all computers, it retransmits data only to the intended computer. So the traffic is less and the speed is high.

Intranet: A private network inside a company or organization is called intranet.
Extranet: It allows vendors and business partners to access the company resources.

It is a more economical way of storing data. Medical history of patients will be accessible to patients easier and quicker. Transfer of records’ of patients between doctors/hospitals is much easier. A medical condition of a patient can be examined.

a: (1101)= 1 × 23 + 1 × 22 + 0 × 21 + 1 × 2°
= 8 + 4 + 1
= 13
b. (A)16 = 10
c. (13)8 = 1 × 81 + 3 × 8°
= 8 + 3 = 11
d. (15)10 = 15
The smallest value is (A)16 = 10

Step 1: Start
Step 2: Sum = 0, count = 1
Step 3: If count/2==1 then go to Step 4
Step 4: Sum = Sum + count
Step 5: count = count + 1
Step 6: If count<=100 then go to Step 3
Step 7: Print Sum
Step 8: Stop

Rotating point literals or real constants are numbers having fractional parts. These can be written in one of the two forms called fractional form or exponential form. A fractional form consists of signed or unsigned digits including a decimal point between digits. A real constant in exponent form has two parts: a mantissa and an exponent.

1. Variable name. It is a symbolic name (identifier) given to the memory location through which the content of the location is referred to.
2. Memory address. Every cell (or byte) in RAM will be assigned a unique address to refer it. The address is also called the Lvalue of a variable.
3. Content. It is the value stored in the location. This is also called the Rvalue of the variable. Type and size of the content depending on the data type of the variable.

1. After “a=” an operator << is missing.
2. The data type is missing, the variable name of 015 is missing.
3. The first semicolon is an error.
4. The semicolon is missing at the end.
5. The semicolon is missing at the end. << should be used after cout. \n must be in double quote.
6. The semicolon is missing at the end. A data type is missing.
7. The semicolon is missing at the end. a break is a keyword.

# include<iostream>
using namespace std;
int main ( )
int x, y, z; float result;
cout<< “Enter values for x, y, z”;
cin>>x>>y>>z;
result = (x + y + z)/3.0;
return 0;
}

while:
i = 1;
while (i<= 10)
{
cout<<i;
i++;
}
do while:
i = 1;
do
{
cout<<i;
i++;
}
while (i<= 10);

When a break statement is encountered, the program control goes to the statements following the switch statement.
If the break statement is absent, even after finding a match other cases following are also checked. If no match is found, statements in the default block get executed.

1. Firewall. A firewall is a combination of computer hardware and software that provide security to the computer/network. A firewall checks all the incoming and outgoing data from your computer and determines whether they are allowed or not.

2. Antivirus scanner. Antivirus software scans the files in the computer and removes viruses if they found. When an antivirus found malware in a file, the antivirus stops the file from running and put it into quarantine. Quarantine is a special area for storing files that are infected by a virus.

3. Cookies. These are small text files created when we use a browser to visit a website. Cookies store information like usernames, email address, websites visited, products purchased etc. Cookies help for efficient browsing. Cookies are not viruses, but it is possible for a hacker to use cookies as spyware. Most browsers provide facility to delete cookies.

1. Face to face contact between students adds teachers is not possible.
2. Proper interaction among teachers and students are often limited due to the lack of infrastructural facilities.
3. Equipment and technology (computer and high speed Internet) requirement restrict the adoption of e-Learning.
4. Learners who require constant motivation may not be serviced adequately.
5. Handson on real laboratory scenario is also a constraint in eLearning.

1. Hard disk. It consists of metal disks coated with magnetic material concealed in dust free containers. Hard disks have very high storage capacity, high data transfer rates and low access time. It is more durable and less error prone. A hard disk may contain one or more platters. Each platter requires two read/write heads, one for each surface.

2. Compact Disc (CD). It is an optical storage medium capable of storing upto 700 MB of data. A CD drive uses red laser beams for reading from and writing data into CD. Two types of CDs are CDR (recordable) and CDRW (Rewritable).

3. USB flash drive. It is a small external storage device which consists of flash memory. These are portable and rewritable. The storage capacity of a USB drive currently varies from 2 GB to 32 GB.

4. Digital Versatile Disk (DVD). In these higher storage capacity is achieved by using smaller spots to record data. Recording and reading of data is done using DVD drive. The capacity of a DVD varies from 4.37 GB to 15.9 GB. There are three major types of DVDs: DVDROM, DVDRW and DVDRAM.

5. Magnetic tape. It is a backup device that can store huge volume of data. The cost per unit volume of a magnetic tape is less compared to other magnetic storage devices. It is a recording medium consisting of a thin tape with a coating of fine magnetic material. It can be used for recording analog or digital data. Data is stored in frames across the width of the

# include <iostream>
using namespace std;
int main()
{
int i, mark, sum = 0, max;
float per;
for (i = 0; i<6; i++)
{
cout<<“ Enter the mark: ”;
cin>>mark;
sum = sum + mark;
}
cout<<“Enter the maximum mark: ”;
cin>>max;
per = (sum/max)* 100;
cout<<“Sum of the entered marks:” << sum;
cout<<“ Percentage of the marks in six subjects:” << per;
return 0;
}