ICS Computer Science Important
ICS Computer Science Important
ICS Computer Science Important
1x14=14
The process of arranging data in a logical sequence is called.
Sorting
Summarizing
Data capturing
classifying
Database
None
Database
Database
Data business
modeling
Management
model system
system
System
Which of the following is handled by DBMS?
Data integrity
Data security
Data
independence
The major components of DBMS is called
All
Database
manager
SQL is a (n)
Unstructured
language
File manager
Data manager
All
Structured
language
Object
oriented
programming
Software
Database
Data basic
Database
Database authority
administrator Administration
Application
A primary key that consists of more than one attribute is called a:
Foreign key
Composite key
10
11
It helps in
indexing of a
large database
An attribute is also known as :
It makes
sorting quicker
All
Table
Row
Field
Relationship
Attribute
Relation
Tuple
Page | 2
12
Data
manipulation
Data definition
and
manipulation
Searching records
13
14
Improve the
Document the
performance
structure of the
of the
database itself
database
A key that is used strictly for data
Reduce data
All
dependencey
for application
program
retrieval purposes:
Composite key
Q-2: Write short answers any TEN, each question carry 2 marks.
i.
Define Database.
ii.
Who is data administrator?
iii.
What you know about foreign key.
iv.
Define Candidate key / alternate key?
v.
What is primary key.
vi.
Write the names of different keys which use in database,
vii.
What is entity? Give an example.
viii.
What is secondary key?
ix.
Write 3 advantages of DBMS.
x.
Define consistency constraints?
xi.
What is DBMS?
xii.
Describe Data manipulation.
xiii.
Define Data processing.
Primary key
2x10=20
2.
Page | 3
3.
4.
5.
6.
7.
8.
9.
10.
12.
13.
14.
represented by a:
Diamond
Rectangular
Oval symbol
Line
Symbol
box
A data model is
A logical
Shown as an Transformed
All
representation
entityinto tables and
of the structure relationship
relationship
of the database diagram
An Index may be created on:
Primary Key
Secondary
Foreign Key
All
Key
Which of the following is used to associate entities with one
another?
Entity
Attribute
Relationship
Identifier
A relationship can be:
One to One
One to many Many to many All
In an E-R diagram, a rectangle represents a (n)
Entity
Attribute
Relationship
None
Which of the following are basic data distribution strategies?
Centralized
Partitioned
Replication
All
Which of the following represent the entities?
Teacher
Student
Principal
All
A technique for physically arranging the records of a file on
secondary storage devices is called:
Physical
File
Retrieval
Update
pointer
organization
program
Program
Which of the following is related to Modality?
Optional
Mandatory
Unidirectional
A and B
Which of the following is an example of one to one
relationship?
MotherBike-Record
StudentClientdaughter
RegNo
phone-no
A relationship between countries and capitals is an example of
___________ relationship.
One to many
One to One
Many to many Many to
one
____________ are the basis of usage paterns of the database.
Data volume and Usage analysis are used to estimate the size
or volume and the usage patterns of the database.
Decision
Normalize
Usage
Logical
Tables
Relations
Analysis
Design
Q-2: Write short answers any TEN, each question carry 2 marks.
i. Define maximum cardinality and minimum cardinality.
ii. Distinguish between an entity class and an entity instance.
iii. Define Database integrity.
iv. List major inputs to physical design.
v. State the purpose of Database design process.
vi. Write the use of ER Diagram.
vii. What is the purpose of feasibility study?
2x10=20
Page | 4
viii.
ix.
x.
2x8=16
3.
4.
5.
6.
7.
8.
Functional
Partial
Associative
Transitive
Page | 5
9.
10.
11.
12.
13.
14.
Page | 6
Q-2: Write short answers any TEN, each question carry 2 marks.
2x10=20
i.
Write the names of three typical problem in merging relations.
ii.
Compare normal form and normalization.
iii.
Describe transitive dependency.
iv.
Differentiate between partial dependency and transitive dependency.
v.
What is partial dependency?
vi.
What are the database anomalies?
vii.
Describe repeating group.
viii.
Define functional dependency.
ix.
Define Normalization.
x.
Define mutual exclusiveness of data.
xi.
Define the term of redundancy.
xii.
What is meant by entity integrity?
xiii.
Define referential integrity.
xiv.
How is entity integrity attained.
2x8=16
Record = row
Field =
row
Recor
d=
table
A collection of data that consists of name, address and
email of a person is called:
The Royal College & Computer
Institute Feroza
Page | 7
Charact Field
er
The smallest meaningful unit of data in a database is called:
Byte
Record
Byte
Record
Charact Field
er
Each separate piece of information stored in a record is
called a:
Form
Field
Table
Cell
Query
Both a
and b
None
At most
three
tables
None
Field
Cell
Record
Properties
Entities
Object
s
Report
Query
10
Form
Related
Designe
d
12
13
14
All
Both
records
and
fields
Which of the following is NOT a database object:
None
of
these
Table
MS
Word
Query
Report
All of
these
Page | 8
Existing
databas
e
New
folder
Page | 9
Q-2: Write short answers any TEN, each question carry 2 marks.
i.
How does a database is differ from a table?
ii.
What is MS Access?
iii.
List some disadvantages of IDE.
iv.
Define IDE.
v.
Define Menu Bar.
vi.
What is database wizard?
vii.
Why Reports are important?
viii.
Define form.
ix.
What are reports?
x.
Define query.
xi.
Define any two database objects.
xii.
What is database object?
xiii.
List some advantages of IDE.
2x10=20
2x8=16
What is database object? Discuss the database objects used to store and retrieve data?
Design grid
Report
Dynaset
Page | 10
*
What is Z to A order called:
Ascending
1
1
File Menu
Tool
View Menu
Number
Hyperlink
OLE
Default value
All
14
Alphabetical
13
Condescendi
ng
12
Descending
Input mask
Page | 11
Q-2: Write short answers any TEN, each question carry 2 marks.
i.
How are records sorted in a query?
ii.
List some advantages of queries.
iii.
Define referential integrity is used?
iv.
List out the types of relationships.
v.
Define sorting.
vi.
Describe the term cascade update.
vii.
Write different options in Find and Replace dialog box.
viii.
What is the use of input mask?
ix.
What are field validation rules?
x.
Write the uses of design view in MS Access.
xi.
Define the term table in Database.
xii.
What is degree of relation.
xiii.
Define the term cardinality.
Q-3: Write detail answers any 2 from the following questions.
2x10=20
2x8=16
Define Primary key. What is the procedure of applying primary key in MS Access?
2x10=20
2x8=16
Page | 12
.What is linking? How can an object from other database be linked in MS Access.
1965-75
1972-88
1955-57
Page | 13
11
12
13
14
Interpreter
Compiler
Debugger
Linker
Which of the following language is ideal to write business
application?
Assembly
COBOL
BASIC
None
language
An assembly language uses:
English
Mnemonic
Binary digit
None
words
codes
A programs syntax errors is detected by:
Compiler
Linker
Loader
Debugger
A set of rules that must be followed to develop a program is
called:
Syntax
Preprocessor Bug
Debug
STDIO stands for:
Standard
Symbolic
Simple input
input output input output
output
The extension of Object file is:
String input
output
.c
.h
.txt
.obj
Page | 14
Q-2: Write short answers any TEN, each question carry 2 marks.
i. What do you mean by delimiters?
ii. Why is logical error the most difficult error?
iii. What is difference between bug and debug?
iv. Find out syntax error in following program.
Include <conio.h>
VOID main ()
Printf (Hello)
}
v. What are header files?
vi. Name different types of preprocessor directives.
vii. Write shortcut key to compile C program.
viii. Define object code.
ix. What is compiler
x. Differentiate between compiler and interpreter.
xi. Define assembly language.
xii. What is a programmer?
xiii. What is ANSI in C?
xiv. What is working of this function getch () in C language.
2x10=20
2x8=16
How many types of error in C language? Write in detail also discus which one error is difficult to find.
ICS computer model paper, ICS computer science guess papers 2014
Chapter-09(Elements of C language)
1
&&
||
--
==
><
None
Page | 15
&
y = y+ 1;
y =1 + y;
All
None
12
14
Hard Disk
None
a =a+b
b=b+a
a + = b is equalent to:
b+=a
13
ROM
a = +b
12
16
Page | 16
Q-2: Write short answers any TEN, each question carry 2 marks.
i. What is the data type of an expression?
ii. Define comments in C language?
iii. List different types of operators in C language.
iv. What is the use of AND operator?
v. What is compound condition?
vi. What is the use of decrement operator in C language?
vii. Define prefix and postfix increment operator.
viii. Why does cancelation error occur?
ix. How does an arithmetic underflow occur?
x. Define constant.
xi. What is variable initialization?
xii. Define different types of identifiers in C language.
xiii. What is an identifier, explain with example.
2x10=20
2x8=16
Write down the rules for naming variables in C language with examples.
Institute Feroza
Page | 17
11
12
13
14
conio.h
string.h
math.h
Page | 18
Q-2: Write short answers any TEN, each question carry 2 marks.
2x10=20
i. Differentiate between printf and scanf functions.
ii. Differentiate between gets and puts functions.
iii. Write output of the following program.
Char Word1, Word2, Word3;
Wor1= A;
Word2= B;
Word3= C;
Printf(%c %c Word3, Word1, Word2);
iv. Write a C statement to print the value of unsigned long y.
v. List out the names of different functions used for character input.
vi. Explain clscr.
vii. Explain getch.
viii. List out different types of format specifiers.
ix. Which symbol is used to start format specifiers?
x. List some important functions for input.
xi. Define standard input.
xii. What is control string in printf functions?
xiii. State the purpose of %d format specifier.
Q-3: Write detail answers any 2 from the following questions.
2x8=16
1x8=8
(a) Write a program that displays average marks using field width of 5 characters and precision of 2 characters,
(b) Write a program that displays the ASCII code of the character typed by the user.
Chapter-11(Decision Constructs)
1
Institute Feroza
Page | 19
Page | 20
Q-2: Write short answers any TEN, each question carry 2 marks.
2x10=20
i.
Define control structure.
ii.
Write the names of control structure.
iii.
Describe types of selection strure.
iv.
Draw the flow char of if statement.
v.
Which is the basic control structures for writing a program?
vi.
What is output of the following code?
if (5/2==1)
printf (My Program is running\n);
else
printf(My Program is running????\n);
vii.
Write three selection and three repetition statements.
viii.
Describe sequence structure.
ix.
Write the syntax of if-else statement.
x.
Write the alternative of if-else statement.
xi.
Why break statement is used in a switch () structure?
xii.
Write three advantages of switch statements.
xiii.
Explain if statement.
Q-3: Write detail answers any 2 from the following questions.
2x8=16
Write a program the inputs radius. It calculates area of a circle. Is user enters 1 as choice. It calculates
circumference if the user enters 2 as choice.
I C S C o m p u t e r S c i e n c e p a r t - 2 C h a p t e r- 1 2 L o o p
Constructs
Important Question for ICS Computer Science Part-2, Important notes for ICS
computer Science for all Intermediate Boards.
Chapter-12(Loop Constructs)
Page | 21
24
25
20
Right
braces}
Comma,
Semi
colon;
if-else
switch
None
Do-while
loop
For loop
All
Counter loop
None
Increment Decrement
None
Break
Terminate
None
Page | 22
Null
Validation
Increment/decremen
t
None
Sentinel
value
Input
value
Duration
Iteration
Test
For
While
None
While
Do while
None
Page | 23
Chapter-13(Functions in C)
1
Normal
Global
None
Page | 24
variable
variable
Name
Accessibility
Data type
11
12
13
14
Filtering
Delivering
Passing
ROM
Hard Disk
Cache
Institute Feroza
Page | 25
ii.
iii.
iv.
v.
vi.
vii.
viii.
ix.
x.
xi.
xii.
Write a program that inputs a number in main function and passes the number to a function. The