Hsslive Xii Cs Key Model 2024.
Hsslive Xii Cs Key Model 2024.
Hsslive Xii Cs Key Model 2024.
in ®
1. Nested structure
2. (b) bgcolor
3. (b) Virtual Private Server
4. Foreign Key
5. (b) Group by
6. (d) www.amazon.com
7. Static Memory Allocation: The memory allocation that takes place before the execution of the program is
known as static memory allocation.
Dynamic Memory Allocation: Memory is allocated during the execution of the program.
8. struct Time
{
int hour;
int minute;
int second;
};
9. Polymorphism: The ability to process objects differently depending on their data type or class.
Compile time (Static) polymorphism (or early binding) & Run time (Dynamic) polymorphism (or late binding)
10. Depending upon memory allocation, data structures may be classified as static data structures and dynamic data
structures.
Static Memory Allocation: Memory allocation is fixed for static data structures (eg: arrays) and the size
cannot be changed during execution.
Dynamic Memory Allocation: Memory is allocated during execution for dynamic data structures (eg: linked
list) and the size changes according to the addition or deletion of data items.
11. Stack overflow: Once the stack is full and if we attempt to insert an item, an impossible situation
arises, known as stack overflow.
Stack underflow: If we try to delete an item from an empty stack, an unfavourable situation arises,
known as stack underflow.
16. The ability to modify the schema definition (data structure definition) in one level without affecting the schema
definition at the next higher level is called data independence.
There are two levels of data independence – Physical data independence and Logical data independence.
17. Cost savings, Flexibility, Reliability, Mobile accessibility. (Write Any Two)
18. A problem is divided among various CPUs. The calculations are carried out simultaneously. The memory is shared
by all the CPUs.
19. (a) Memory leak: If the memory allocated using new operator is not freed using delete, that memory is
said to be an orphaned memory block. This memory block is allocated on each execution of the program and the size
of the orphaned block is increased. Thus a part of the memory seems to disappear on every run of the program,
and eventually the amount of memory consumed has an unfavourable effect. This situation is known as memory
leak.
(c) Pointer: is a variable that can hold the address of a memory location.
20. Procedural oriented programming consists of a set of instructions and organizes these instructions to functions.
Disadvantages
Data is undervalued.
Procedure is given importance.
Creating new data types is difficult.
Poor real world modelling.
21. Linked list is a collection of nodes, where each node consists of two parts – a data and a link. Link is a pointer to
the next node in the list. The address of the first node is stored in a special pointer called START. Linked list is a
dynamic data structure. Memory is allocated during run time.
Join Now: https://join.hsslive.in Downloaded from https://www.hsslive.in ®
26. There are three types of web hosting – shared hosting, virtual hosting and dedicated hosting.
(i) Shared hosting: Many different websites are stored on one single web server and they share
resources like RAM and CPU. Most suitable for small websites that have less traffic.
(ii) Dedicated hosting: The client leases the entire web server and all its resources. It is not shared. Websites
of large organisations, government departments, etc. where there are large numbers of visitors, opt for dedicated web
hosting.
(iii) Virtual Private Server (VPS): VPS is a physical server that is virtually partitioned into several servers
using the virtualization technology. Each VPS works similar to a dedicated server and has its own separate server
operating system, web server software and packages.
Join Now: https://join.hsslive.in Downloaded from https://www.hsslive.in ®
27. SQL Data Types: INTEGER, DECIMAL, CHAR, VARCHAR, DATE, TIME. (Any three)
DECIMAL(N,D): denotes that the column with this specification can store any value having a maximum of N digits,
out of which D are after the decimal point.
CHAR: is a fixed length character data type. It is mainly used when the data in a column are of the same fixed length
and small in size.
VARCHAR: represents variable length strings. The space allocated for the data depends only on the actual size of the
string, not on the declared size of the column.
29. Core data types – Integer, Float/Double, String, Boolean (Any three)
Integer: An integer is a whole number ie, number without fractional part(including negative numbers).
Float/Double: Floating point numbers are represented by float or double data type
String: A string is a group of characters. They are enclosed between Single or Double quotation
mark.
Boolean: The boolean data type represent TRUE(1) or FALSE(0) values.
30. (a)
Java Script: Java script is a client side scripting language used to create interactive web pages..It is executed
by most web browsers. It is mainly used to validate user data. A java script file has the extension ‘ .js’.
ASP(Active Server Page): ASP is a server side scripting language used to create interactive web pages. An
ASP file has ‘.asp’ extension. An asp file contains text, HTML tags and scripts.
(b)
<HTML>
<HEAD>
<TITLE> Hsslive.in</TITLE>
</HEAD>
<BODY>
Body section
</BODY>
</HTML>
32. (a) Infringement is the unauthorised use of intellectual property rights such as patents, copyrights and
trademarks.
(b)
(i) Identity theft occurs when someone uses another person's identifying information, like their name, credit card
number, etc. without their permission to commit fraud or other crimes.
(ii) Harassment means posting humiliating comments focusing on gender, race, religion, nationality at specific
individuals in chat rooms, social media, e-mail, etc. is harassment.
Join Now: https://join.hsslive.in Downloaded from https://www.hsslive.in ®
(iii) Impersonation and cheating: Impersonation is an act of pretending to be another person for the purpose of
harming the victim.
************************************Prepared by Team Hsslive.in*******************************