Important Questions

CBSE Guess > Papers > Important Questions > Class XII > 2010 > Computer Science > Computer Science By Ravi Kiran

CBSE CLASS XII

4. (a) Statement 1:
File.seekp(Record * sizeof(P));
OR
File.seekp(Record * sizeof(PracFile));
OR
File.seekp(-sizeof(P), ios::cur);
OR
File.seekg(Record * sizeof(P));
OR
File.seekg(Record * sizeof(PracFile));
OR
File.seekg(-sizeof(P), ios::cur);

(b) void CountIs()
{
ifstream Fil;
Fil.open(“DIALOGUE.TXT”);
char Word[10];
int Count =0;
while(!Fil.eof())
{
Fil>>Word;
if(strcmpi(Word,”is”)==0)
Count++;
}
cout<<Count;
Fil.close(); //Ignore
}

OR

void CountIs()
{
ifstream Fil;
Fil.open(“DIALOGUE.TXT”);
char Word[10];
int Count = 0;
while(Fil.getline(Word,10,’ ‘))
{
if(strcmpi(Word,”is”)==0)
Count++;
}
cout<<Count;
Fil.close(); //ignore
}

5. (a) All candidate keys, which are not the primary key of the table are called the alternate keys.
Primary Key: An attribute/ column used to identify each record in a table
Alternate Key: All such attributes/columns, which can act as a primary key but are not the primary key in a table.

(b) (i) SELECT SenderName from Sender WHERE City =‘Mumbai’;

(ii) SELECT R.RecID, S.SenderName, S.SenderAddress , R.RecName, R.RecAddress FROM Sender S, Recipient R WHERE S.SenderID = R.SenderID;

(iii) SELECT * FROM Recipient ORDER BY RecName;

(iv) SELECT COUNT(*) FROM Recipient GROUP BY RecCity

6. (a) Cyber law encompasses a wide variety of political and legal issues related to the Internet and other communications technology, including intellectual property, privacy, freedom of expression, and jurisdiction.

OR

Cyber law helps prevent Cyber Crime, Hacking, Data theft, Software Piracy and protects rights of Cyber Users.
W.X’
Y'.Z
W.X’+Y'.Z

(b) (i) Code Division Multiple Access
(ii) Wireless Local Loop
(iii) File Transfer Protocol
(iv) Hyper Text Markup Language

Paper By Mr. Ravi Kiran
Email Id : [email protected]