2025-26 II PUC MODEL QUESTION PAPER- 3
PART-A
I. Answer ALL the questions. Each question carries ONE mark.
Select the correct answer from the choices given.
1. The exception raised when a local or global variable is not defined is
a. ImportError b. TypeError c. ValueError d. NameError
Ans: d. NameError
2. The default file opening mode in Python is
a. <r> the read only mode
b. <w> the write mode
c. <a> the append mode
d. <r+> the read write mode
Ans: a. <r> the read only mode
3. Assertion(A): A stack is a linear data structure that stores the elements in
FIFO order
Reason(R): In stack a new element is added and removed from one end only
a. Both A and R are correct, and R is the correct explanation of A
b. Both A and R are correct, and A is not the correct explanation for R
c. A is true but R is false
d. A is false bur R is true
Ans: d. A is false but R is true
4. The operations used to view elements at the front of the Queue, without removing it
from the Queue is
a. Dequeue () b. Peek () c. Enqueue () d. Tell ()
Ans: b. Peek ()
5. The time complexity of a quadratic time algorithm is
a. n2 b. n3 c. log(n) d. 1
Ans:- a. n2
6. Number of passes required to sort a list of size 100 using bubble sort is
a. 100 b. 1000 c. 10 d. 99
Ans: d. 99
7. The purpose of data constraint in database is
a. to ensure reliability b. to define size of databases
c. to specify storage format d. to speedup query
Ans: a. to ensure reliability
8. The degree of the Cartesian product of two relations A and B is the
a. Product of their cardinalities b. Difference of their cardinalities
c. Quotient of their cardinalities d. Sum of their cardinalities
Ans: d. Sum of their cardinalities
9. Identify the correct date function from the following
a. FINDDATE () b. JULIANDATE () c. NOW () d. SYSTEM_DATE ()
Ans: c. NOW ()
10. The SQL command to modify the structure of a table is
a. CREATE b. UPDATE c. INSERT d. ALTER
Ans: d. ALTER
11. The device used for conversion between digital and analogue signal is
a. Modem b. Repeater c. Router d. Switch
Ans: a. Modem
12. The approximate range of personal area networks is
a. 14 meters b. 5 meters c. 10 meters d. 20 meters
Ans: c. 10 meters
13. Choose full duplex communications device from the following
a. Mobile phones b. Walkie-talkie c. Television d. Microphone
Ans: a. Mobile phones
14. Identify the request respond protocol from the following
a. IP b. TCP c. UDP d. HTTP
Ans: d. HTTP
15. Choose the item not belonging to the group
a. Firewall b. Virus c. Worms d. Ransomware
Ans: a. Firewall
II. Fill in the blanks choosing the appropriate word/words from those given in the
brackets.
(Pickle, Exceptions, Product, Distinct, Union, Redundancy, Order By)
16. _______disrupts the normal execution of a program
Ans: Exceptions
17. ________ Python module is used to perform read-write operations on binary file
Ans: Pickle
18. ________refers to duplication of data in a database
Ans: Redundancy
19. _______clause is used along with select to avoid duplicate values in an SQL
query
Ans: Distinct
20. ________operation is used to combine the selected rows of two tables at a time
Ans: Union
PART B
III. Answer any FOUR questions. Each question carries TWO marks
21. With appropriate syntax explain PUSH operation on stack using Python
Answer: The push operation adds an element to the top of a stack. In python a list is
commonly used to implement a stack and the built-in append( ) method is used to add
the element.
Syntax: stack[ ] an empty list represents a stack
[Link]( Item)
Example: [Link](10)
22. List out two operations on double ended queue
Answer:
Operations on Deque
1. INSERTFRONT: This operation is used to insert a new element at the front of the
deque.
2. INSERTREAR: This operation is the same as a normal queue, i.e. insert a new
element at the rear of the deque.
3. DELETIONFRONT: This operation is the same as normal queue, i.e. to remove
an element from the front of the deque.
4. DELETIONREAR: This operation is used to remove one element at a time from
the rear of the deque.
23. Mention any two applications of modified binary search
Answer: Modified binary search techniques have far reaching applications such as
1. indexing in databases
2. implementing routing tables in routers,
3. data compression code
24. Explain the role of UNIQUE constraint in a database
Answer: The UNIQUE constraints in a database ensures that all values in a column, or a
group of columns, are distinct. Its primary role is to prevent duplicate entries, therby
maintaining data integrity and consistency.
25. Describe INSTR() function in MySql
Answer: This function returns the position of the first occurrence of the substring in the
given string. Returns 0, if the substring is not present in the string.
Syntax: INSTR(string, substring):
Example: SELECT INSTR(“Informatics”, “ma”);
Output: 6
26. What is URL? Explain.
Answer: URL – Uniform Resource Locator. It is a unique address or path for each
resource located on the web. It is also known as Uniform Resource Identifier
(URI). Every page on the web has a unique URL. Examples are:
[Link] [Link],[Link] etc. URL
is sometimes also called web address.
27. Explain Point-To-Point protocol
Answer: PPP is a communication protocol which establishes a dedicated and direct
connection between two communicating devices. This protocol defines how two devices
will authenticate each other and establish a direct link between them to exchange data.
For example, two routers with direct connection communicate using PPP. The Internet
users who connect their home computers to the server of an Internet Service Provider
(ISP) through a modem also use PPP. The communicating devices should have duplex
modes for using this protocol. This protocol maintains data integrity ensuring that the
packets arrive in order. It intimates the sender about damage or lost packets and asks to
resend it.
PART C
Answer any FOUR questions. Each question carries THREE marks
28. Define the following :
a. Exception handler
b. Throwing an exception
c. Catching an exception
Answer:
a. Exception Handler:
Exception Handlers are the codes that are designed to execute when a
specific exception is raised.
b. Throwing an exception:
When an error is encountered in a program, Python interpreter raises or
throws an exception.
c. Catching an exception:
An exception is said to be caught when a code that is designed to handle a
particular exception is executed. An exception is caught in the try block and
handles in except block.
29. Answer the following
a. Open a file “[Link]” in “r” mode using with clause
b. Print the contents using appropriate function
Solution:
a. with open(“[Link]”,”r”) as fileobject:
content=[Link]( )
b. print(content)
30. What is the basic principle behind bubble sort?
Answer: The basic principle of Bubble Sort is to repeatedly step through a list,
compare adjacent elements, and swap them if they are in the wrong order, causing larger
elements to "bubble up" to their correct positions at the end of the list with each pass,
until the entire list is sorted
31. What is hashing? Explain how it improves the efficiency of searching
Answer: Hashing is a technique which can be used to know the presence of a key in a list
in just one step. The idea is if we already know the value at every index position in a list,
it would require only a single comparison to check the presence or absence of a key in
that list. A formula called hash function is used to calculate the value at an index in the
list.
Hash based searching requires only one key comparison to discover the presence or
absence of a key, provided every element is present at its designated position decided by
a hash function. Thus Hashing makes searching operations very efficient.
32. Describe database schema
Answer: Database Schema is the design of a database. It is the skeleton of the database
that represents the structure (table names and their fields/columns), the type of data each
column can hold, constraints on the data to be stored (if any), and the relationships
among the tables. Database schema is also called the visual or logical architecture as it
tells us how the data are organized in a database.
33. Explain natural join
Answer: The join operation which is used to merge two tables depending on their same
column name and data types is known as natural join. After this operation, the final table
will accommodate all the attributes of both the tables.
34. Explain bus topology
Answer: In bus topology (Figure 10.17), each communicating device connects to a
transmission medium, known as bus. Data sent from a node are passed on to the bus and
hence are transmitted to the length of the bus in both directions. That means, data can be
received by any of the nodes connected to the bus.
In this topology, a single backbone wire called bus is shared among the nodes, which
makes it cheaper and easier to maintain. Both ring and bus topologies are considered to
be less secure and less reliable.
PART D
Answer any FOUR questions. Each question carries FIVE marks
35. Using stack evaluate the postfix expression A B * C / D * with
A=3, B=5, C=1, D=4
Answer:
35*1/4
36. Write a Python program test whether a given string STR stored in a double
ended queue DQ is a palindrome or not.
Answer:
def Deque():
return ( )
def addRear(deque, ch):
[Link](ch)
def removeFront(deque):
if len(deque) == 0:
return None
return [Link](0)
def removeRear(deque):
if len(deque) == 0:
return None
return [Link]()
def palchecker(aString):
chardeque = Deque()
for ch in aString:
addRear(chardeque, ch)
while len(chardeque) > 1:
first = removeFront(chardeque)
last = removeRear(chardeque)
if first != last:
return False
return True
string1 = input("Enter a string: ")
pal = palchecker([Link]())
if pal:
print(string1, "is a palindrome.")
else:
print(string1, "is not a palindrome.")
37. Write an algorithm to perform linear search on a list L of N elements.
Answer:
Algorithm: LinearSearch(numList, key, n)
Step1: Set index=0
Step2: while index<n, Repeat step3
Step3: if numList[index]==key then
Print “Key element found at Position”, index+1
Stop
Else
Index=index+1
Step4: Print “ Search Unsuccessful”
38. Define DBMS and explain the following in respect of DBMS
a. Database Engine
b. Candidate Key
c. Query
d. Cardinality
Answer:-
a. Database Engine
Database engine is the underlying component or set of programs used by a
DBMS to create database and handle various queries for data retrieval and
manipulation.
b. Candidate Key
A relation can have one or more attributes that takes distinct values. Any of
these attributes can be used to uniquely identify the tuples in the relation. Such
attributes are called candidate keys as each of them are candidates for the
primary key.
c. Query
A query is a request to a database for information retrieval and data
manipulation (insertion, deletion or update). It is written in Structured Query
Language (SQL)
d. Cardinality
The number of tuples in a relation is called the Cardinality of the relation.
39. Explain Local Area Network
Answer: It is a network that connects computers, mobile phones, tablet, mouse, printer,
etc., placed at a limited distance. The geographical area covered by a LAN can range
from a single room, a floor, an office having one or more buildings in the same premise,
laboratory, a school, college, or university campus. The connectivity is done by means of
wires, Ethernet cables, fibre optics, or Wi-Fi. A Local Area Network (LAN) is shown in
Figure.
LAN is comparatively secure as only authentic users in the network can access other
computers or shared resources. Users can print documents using a connected printer,
upload/download documents and software to and from the local server. Such LANs
provide the short range communication with the high speed data transfer rates. These
types of networks can be extended up to 1 km. Data transfer in LAN is quite high, and
usually varies from 10 Mbps (called Ethernet) to 1000 Mbps (called Gigabit Ethernet),
where Mbps stands for Megabits per second. Ethernet is a set of rules that decides how
computers and other devices connect with each other through cables in a local area
network or LAN.
40. What is transmission media? Explain types of transmission media
Answer: A transmission medium can be anything that can carry signals or data between
the source (transmitter) and destination (receiver). For example, as we switch on a ceiling
fan or a light bulb, the electric wire is the medium that carries electric current from
switch to the fan or bulb.
In data communication, transmission media are the links that carry messages between
two or more communicating devices. Transmission can be classified as
1. Guided transmission media
2. Unguided transmission media
In guided transmission, there is a physical link made of wire/cable through which
data in terms of signals are propagated between the nodes. These are usually
metallic cable, fiber-optic cable, etc. They are also known as wired media.
In unguided transmission, data travels in air in terms of electromagnetic waves
using an antenna. They are also known as wireless media.
Wired Transmission Media :
Any physical link that can carry data in the form of signals belongs to
the category of wired transmission media. Three commonly used guided/wired
media for data transmission are, twisted pair, coaxial cable, and fiber optic
cable. Twisted-pair and coaxial cable carry the electric signals whereas the optical
fiber cable carries the light signals
(A) Twisted Pair Cable : A twisted-pair consists of two copper wires
twisted like a DNA helical structure. Both the copper wires are insulated
with plastic covers. Usually, a number of such pairs are combined
together and covered with a protective outer wrapping.
(B) Coaxial cable : Coaxial cable is another type of data transmission
medium. It is better shielded and has more bandwidth than a twisted
pair. It has a copper wire at the core of the cable which is surrounded
with insulating material. The insulator is further Backbone networks
interconnect different segments of the surrounded with an outer
conductor (usually a copper mesh). This outer conductor is wrapped in a
plastic cover.
(C) Optical Fiber: The optical fiber cable carries data as light, which travels
inside a thin fiber of glass. Optic fiber uses refraction to direct the light
through the media. A thin transparent strand of glass at the center is
covered with a layer of less dense glass called cladding. This whole
arrangement is covered with an outer jacket made of PVC or Teflon.
Such types of cables are usually used in backbone networks. These
cables are of light weight and have higher bandwidth which means
higher data transfer rate. Signals can travel longer distances and
electromagnetic noise cannot affect the cable. However, optic fibers are
expensive and unidirectional.
Wireless Transmission Media:
In wireless communication technology, information travels in the form of
electromagnetic signals through air. Electromagnetic spectrum of frequency ranging from
3 KHz to 900 THz is available for wireless communication (Figure 11.12). Wireless
technologies allow communication between two or more devices in short to long distance
without requiring any physical media. There are many types of wireless communication
technologies such as Bluetooth, WiFi, WiMax etc.
(A) Bluetooth :
Bluetooth is a short-range wireless technology that can be used to
connect mobile-phones, mouse, headphones, keyboards, computers, etc. wirelessly over a
short distance. One can print documents with Bluetooth enabled printers without a
physical connection. All these bluetooth-enabled devices have a low cost transceiver
chip. This chip uses the unlicensed frequency band of 2.4 GHz to transmit and receive
data. These devices can send data within a range of 10 meters with a speed of 1 - 2 Mbps.
In Bluetooth technology, the communicating devices within a range of 10 meters build a
personal area network called piconet.
(B) Wireless LAN :
This is another way of wireless communication. Wireless LAN is a local
area network (LAN), and it is a popular way to connect to the Internet. The international
organization IEEE assigns numbers to each different standards of LAN. The wireless
LAN is number as 802.11, and it is popularly known as Wi-Fi.
41. Explain Keyloggers in detail.
Answer: A keylogger can either be malware or hardware. The main purpose of this
malware is to record the keys pressed by a user on the keyboard. A keylogger makes logs
of daily keyboard usage and may send it to an external entity as well. In this way, very
sensitive and personal information like passwords, emails, private conversations, etc. can
be revealed to an external entity without the knowledge of the user. One strategy to avoid
the threat of password leaks by keyloggers is to use a virtual keyboard while signing into
your online accounts from an unknown computer.
A keylogger makes logs of daily keyboard usage and may send it to an external entity as
well.
• The on-screen keyboard is an application software that uses a fixed QWERTY key
layout.
• Online virtual keyboard is a web-based or a standalone software with a randomized key
layout every time it is used.
PART – E
Answer any TWO questions. Each question carries FIVE marks
42. Perform Selection sort algorithm on the following list of elements correctly and
neatly showing the various passes while sorting in ascending order .
43. The following are the runs scored by two batsman’s A and B of team Alpha
on the first five innings of three consecutive test matches
Batsman A: 77,89,45,63,70 runs per innings
Batsman B: 100,45,122,88,99 runs per innings
a. Find standard deviation of scores of both Batsman A and B
b. Based on standard deviation who is more consistent in scoring.
44. Write SQL commands for questions (a) to (e) based on data given in the
EMPLOYEE table given below.
a. Display information of all the employees in ascending order of their date of birth
b. To Compute the average salary of all the employees
c. To Display count of employees working in various departments
d. Command to Calculate the total salary of all the employees
e. Generate report of employees whose salary is in the range 150000 and 200000.
Solution:
a) Select * from EMPLOYEE order by DOB;
b) Select avg(SALARY) from EMPLOYEE;
c) Select Department, count(*) from EMPLOYEE group by DEPARTMENT;
d) Select sum(SALARY) from EMPLOYEE;
e) Select * from EMPLOYEE where SALARY Between 150000 and 200000;