class 11 computer model question solutions
Model
Question
Grade
XI
Time
2 Hours
Group
A:
Multiple Choice Questions (9 x 1=9)
Tick the best alternative.
1. Which one of the
following is an input device?
a) speaker b) printer
c) monitor d) mouse
2. Which of the following
is NOT a bus type?
a) Address bus b) Data bus c) Memory bus d) Control
bus
3. How to represent Boolean
F(x,y)=x.y in logic gate?


4. Which scheduling
algorithm allocates the CPU first to the process that requests the CPU
first?
a) first-come, first-served scheduling c) shortest job scheduling
b) priority scheduling d) Round robin scheduling
5. Which operator is used
to start for enter the formula in in Excel cell?
a) $ b) @ c) = d) +
6. Which looping process
checks the test condition at the end of the loop?
a) for b) while d) do-whiled) Nested
loop
7. How to insert an image in web page using
HTML tag?
👇
8. Which image format is
best used for photographs and offers a small file size? (U)
a) PNG b) GIF c) BMP d) JPEG
9. Which of following is
monitors user activity on internet and transmit that information in the
background to someone else? (U)
a) Malware b) Spyware c) Adware d)
Virus
Group 'B'
Give short answer to the following questions.
(5 x 5=25)
1. Explain different types
of secondary memory of computer system.
Secondary memory,
also known as auxiliary memory, refers to the storage devices that are used to
store data and programs for a longer duration of time, even when the computer
is turned off. Here are the different types of secondary memory of a computer
system:
- Ø Hard Disk Drive
(HDD): An HDD is a magnetic storage device that uses rotating disks to store
data. It is the most common type of secondary memory used in computers today.
The data is stored on the disk using magnetic heads that read and write the
information on the spinning disk.
- Ø Solid State Drive
(SSD): An SSD is a newer type of secondary memory that uses flash memory chips
to store data. It has no moving parts, which makes it faster, more reliable,
and durable than an HDD. It is becoming increasingly popular for its fast read
and write speeds, and its ability to access data quickly.
- Ø Optical Storage
Devices: These include CDs, DVDs, and Blu-Ray discs. They are used to store
data and can be read by optical drives. The data is stored on the disc using
pits and lands, which are read by a laser beam.
- Ø USB Flash Drive: A
USB flash drive, also known as a thumb drive or pen drive, is a small, portable
storage device that can be used to store and transfer data. They are becoming
increasingly popular due to their portability and large storage capacity.
- Ø Memory Cards:
Memory cards are used in digital cameras, mobile phones, and other portable
devices for storing data. They are small, portable, and have high storage
capacity.
- Ø Magnetic Tape:
Magnetic tape is a sequential access storage device that is used for backup and
archiving purposes. It is not commonly used in personal computers but is still
used in large computer systems for backup and recovery purposes.
OR
Describe the decimal to binary number conversion process
with example.
The decimal to
binary conversion process involves converting a decimal number, which is base
10, into a binary number, which is base 2. Here are the steps for the
conversion process:
- Ø Divide the decimal
number by 2.
- Ø Write down the
remainder (either 0 or 1).
- Ø Divide the quotient
(result of the division) by 2 again.
- Ø Write down the
remainder again.
- Ø Repeat steps 3 and 4 until the quotient becomes 0.

2. What are the functions of operating system?
Describe.
The operating
system (OS) is a crucial part of a computer system that manages the computer
hardware and software resources and provides services for computer programs.
Here are the main functions of an operating system:
- Ø Memory Management:
The OS manages the computer's memory and ensures that every program running on
the system has sufficient memory space to execute its tasks.
- Ø Processor
Management: The OS assigns the computer's CPU resources to different programs and
ensures that they are allocated in a fair and efficient manner.
- Ø Device Management:
The OS manages the computer's input/output (I/O) devices, such as printers,
scanners, and disks, and ensures that they are used efficiently.
- Ø File Management:
The OS manages the computer's file system and provides a hierarchical directory
structure for storing, organizing, and accessing files and folders.
- Ø Security: The OS
provides various security mechanisms to protect the computer system and data
from unauthorized access, viruses, and other threats.
- Ø User Interface: The
OS provides a graphical user interface (GUI) or a command-line interface (CLI)
to allow users to interact with the computer system and run programs.
- Ø Networking: The OS
provides networking capabilities that allow the computer system to connect to
other computers and devices and access the internet.
- Ø Resource
Allocation: The OS manages the allocation of system resources, such as CPU
time, memory space, and I/O bandwidth, among the different programs running on the
system.
3. Define different types of CSS.
CSS, or Cascading
Style Sheets, is a stylesheet language used for describing the presentation of
web pages. There are three main types of CSS:
- Ø Inline CSS - used
to apply styles directly to individual HTML elements using the
"style" attribute.
- Ø Internal CSS - used
to apply styles to the entire page or specific sections of the page using the
"style" tag within the head section of the HTML document.
- Ø External CSS - used
to apply styles to multiple pages or an entire website using an external CSS
file.
OR
Explain the
different components of multimedia.
Multimedia is a
combination of different types of media, including text, graphics, audio,
video, and animation. Each of these components serves a specific purpose and
adds to the overall impact of the multimedia presentation.
- Ø Text: Text is used
to convey information in a multimedia presentation. It can be formatted using
various fonts, styles, colors, and sizes to make it more visually appealing.
- Ø Graphics: Graphics
refer to any non-textual element that is used to enhance the visual appeal of a
multimedia presentation. They can be still images or dynamic graphics, such as
charts, diagrams, logos, and photographs.
- Ø Audio: Audio
components include music, sound effects, and voice recordings. They can be used
to create an immersive experience and enhance the emotional impact of a
multimedia presentation.
- Ø Video: Video
components include animations, video clips, and full-length movies. They are
used to convey complex ideas and concepts that cannot be easily explained using
other media.
- Ø Animation:
Animation components include 2D and 3D animations, which are used to create
movement and interactivity in a multimedia presentation.
4. Differentiate between the do and while loop.
do-while loop |
while loop |
|
Syntax |
do { // code block to be
executed } while (test condition); |
while (test condition) { // code block to be executed } |
Test condition |
Evaluated after the code block is executed |
Evaluated before the code block is executed |
Execution |
Code block is executed at least once, regardless of the test
condition |
Code block is executed only if the test condition is true |
Termination |
Loop terminates when the test condition is false |
Loop terminates when the test condition is false |
Usage |
Use when you want to execute the code block at least once |
Use when you want to execute the code block only if the test
condition is true |
5. Suggest the prevention methods of cybercrime.
Here are some prevention methods to protect against cybercrime:
- Ø
Use strong and unique
passwords, and enable two-factor authentication where possible.
- Ø
Install and regularly update
antivirus software and firewalls on all devices.
- Ø
Keep software and operating
systems up to date with the latest security patches.
- Ø
Be wary of suspicious
emails, messages, and links, and never open attachments from unknown sources.
- Ø
Use secure networks and
avoid public Wi-Fi for sensitive tasks.
- Ø
Be cautious of social
engineering tactics, such as phishing and pretexting scams.
- Ø
Regularly back up important
data to external hard drives or cloud storage.
- Ø
Educate yourself and others
about cybersecurity best practices and the latest threats.
Group 'C'
Give long answer to the following
question (2 x 8=16)
6. Explain computer architecture with block diagram and
functions of its components.
Q. Draw
block diagram of digital computer and explain how data is processed in digital
computer?
- Input: The
data is entered into the computer through an input device, such as a
keyboard, mouse, or scanner, which is responsible for converting the data
into a form that can be understood by the computer's memory and CPU.
- Processing: The
CPU retrieves the data from memory and performs arithmetic and logical
operations on it. The CPU is made up of two main components: the
Arithmetic Logic Unit (ALU) and the Control Unit.
- ALU: The ALU performs mathematical and logical
operations on the data, such as addition, subtraction, multiplication, and
division.
- Control Unit: The Control Unit manages the flow of data
and instructions between the CPU, memory, and input/output devices. It
also interprets the instructions and controls the operation of the CPU.
- Memory: The
data is stored in the computer's memory, which is a temporary storage
location where the data can be accessed by the CPU.
- Output: Once
the data has been processed, it is sent to an output interface, which
converts the data into a form that can be understood by an output device,
such as a monitor or printer. The processed data is then displayed or
printed by the output device.
OR
Write a program to input the elements of 4 x 3 matrix and
prints its elements properly using array.
#include <stdio.h>
#include <conio.h>
int main()
{
int
matrix[4][3];
int
i, j;
printf("Enter the elements of the 4 x 3 matrix:\n");
for (i = 0; i < 4; i++)
{
for (j = 0; j < 3; j++)
{
scanf("%d", &matrix[i][j]);
}
}
printf("\nThe matrix elements are:\n");
for (i = 0; i < 4; i++)
{
for (j = 0; j < 3; j++)
{
printf("%d ", matrix[i][j]);
}
printf("\n");
}
return 0;
}
7. Draw AND, OR, XOR and XNOR gates with
truth table and logic gates.
Post a Comment