![Important Questions](../../../../../images/headings/important_question.gif)
CBSE Guess > Papers > Important Questions > Class XII > 2010 > Computer Science > Computer Science By Ravi Kiran
CBSE CLASS XII
![](../../../../../images/index.gif)
4. (a) Statement 1:
File.seekp(Record * sizeof(P));
OR
File.seekp(Record * sizeof(PracFile));
OR
File.seekp(-sizeof(P), ios::cur);
OR
File.seekg(Record * sizeof(P));
OR
File.seekg(Record * sizeof(PracFile));
OR
File.seekg(-sizeof(P), ios::cur);
(b) void CountIs()
{
ifstream Fil;
Fil.open(“DIALOGUE.TXT”);
char Word[10];
int Count =0;
while(!Fil.eof())
{
Fil>>Word;
if(strcmpi(Word,”is”)==0)
Count++;
}
cout<<Count;
Fil.close(); //Ignore
}
OR
void CountIs()
{
ifstream Fil;
Fil.open(“DIALOGUE.TXT”);
char Word[10];
int Count = 0;
while(Fil.getline(Word,10,’ ‘))
{
if(strcmpi(Word,”is”)==0)
Count++;
}
cout<<Count;
Fil.close(); //ignore
}
5. (a) All candidate keys, which are not the primary key of the table are called the alternate keys.
Primary Key: An attribute/ column used to identify each record in a table
Alternate Key: All such attributes/columns, which can act as a primary key
but are not the primary key in a table.
(b) (i) SELECT SenderName from Sender WHERE City =‘Mumbai’;
(ii) SELECT R.RecID, S.SenderName, S.SenderAddress ,
R.RecName, R.RecAddress FROM Sender S,
Recipient R
WHERE S.SenderID = R.SenderID;
(iii) SELECT * FROM Recipient ORDER BY RecName;
(iv) SELECT COUNT(*) FROM Recipient GROUP BY RecCity
6. (a) Cyber law encompasses a wide variety of political and legal issues related to
the Internet and other communications technology, including intellectual
property, privacy, freedom of expression, and jurisdiction.
OR
Cyber law helps prevent Cyber Crime, Hacking, Data theft, Software Piracy
and protects rights of Cyber Users.
W.X’
Y'.Z
W.X’+Y'.Z
(b) (i) Code Division Multiple Access
(ii) Wireless Local Loop
(iii) File Transfer Protocol
(iv) Hyper Text Markup Language
Paper By Mr. Ravi Kiran
Email Id : [email protected] |