Hybridoma Technology ( Production , Purification , and Application )
Fic (sendup dec17) cs lb
1. FAZAIA INTER COLLEGE LAHORE CANTT A1
SEND UP EXAMINATION DEC, 2017 (Lahore Board)
Subject: Comp. Sc. Time allowed: 20 mins
Class: XII Max. Marks : 15
Name: ________________ Roll No: _____________ Section:
________
OBJECTIVE
SECTION – A
Q1. Circle the correct option i.e. A/B/C/D. Each part carries one mark only.
(i) The linker combines different library files to the ____________.
(A) executable file (B) source file
(C) object file (D) output file
(ii) Which of the following key is used to save a file?
(A) F2 (B) F3
(C) F5 (D) F9
(iii) Void occupy how many bytes in memory?
(A) zero (B) one
(C) two (D) four
(iv) Increment and decrement operators are ______________.
(A) bitwise operator (B) assignment operator
(C) unary operator (D) binary operator
(v) Which of the following is valid character constant?
(A) a (B) “b”
(C) ‘6’ (D) =
(vi) x-=y+1 means ______________
(A) x=x-y+1 (B) x=-x-y=1
(C) x=-x+y+1 (D) x=x-y-1
(vii)The ___________ statement switches the control outside the block in which it is
used.
(A) switch (B) case
(C) if (D) break
(viii) Formal arguments are also called _____________.
(A) actual arguments (B) original arguments
(C) dummy arguments (D) referenced arguments
(ix) The actual parameters are passed to a function in __________.
(A) function prototype (B) function calling
(C) function definition (D) none of the above
2. (x) On successfully closing a file, the fclose() returns ___________.
(A) NULL (B) 0 (zero)
(C) 1 (one) (D) FILE POINTER
(xi) An array subscript should be ___________.
(A) float (B) double
(C) int (D) an array
(xii)Which of the following type of file require largest processing time?
(A) sequential file (B) indexed sequential file
(C) random file (D) direct access file
(xiii) CREATE command is used to create a _________.
(A) table (B) view
(C) report (D) query
(xiv) A label is meaningful only to a _________________ statement.
(A) if (B) break
(C) if –else (D) goto
(xv)Database development process involves mapping of conceptual data model into:
(A) object oriented data model (B) network data model
(C) implementation model (D) hierarchical data model
3. FAZAIA INTER COLLEGE LAHORE CANTT A2
SEND UP EXAMINATION DEC, 2017 (Lahore Board)
Subject: Comp. Sc. Time allowed: 20 mins
Class: XII Max. Marks : 15
Name: ________________ Roll No: _____________ Section:
________
OBJECTIVE
SECTION – A
Q1. Circle the correct option i.e. A/B/C/D. Each part carries one mark only.
(i) The ___________ statement switches the control outside the block in which it is
used.
(A) switch (B) case
(C) if (D) break
(ii) Formal arguments are also called _____________.
(A) actual arguments (B) original arguments
(C) dummy arguments (D) referenced arguments
(iii) The actual parameters are passed to a function in __________.
(A) function prototype (B) function calling
(C) function definition (D) none of the above
(iv) On successfully closing a file, the fclose() returns ___________.
(A) NULL (B) 0 (zero)
(C) 1 (one) (D) FILE POINTER
(v) An array subscript should be ___________.
(A) float (B) double
(C) int (D) an array
(vi) Which of the following type of file require largest processing time?
(A) sequential file (B) indexed sequential file
(C) random file (D) direct access file
(vii) CREATE command is used to create a _________.
(A) table (B) view
(C) report (D) query
(viii) A label is meaningful only to a _________________ statement.
(A) if (B) break
(C) if –else (D) goto
(ix) Database development process involves mapping of conceptual data model
into:
(A) object oriented data model (B) network data model
(C) implementation model (D) hierarchical data model
4. (x) x=y+1 means ______________
(A) x=x-y+1 (B) x=-x-y=1
(C) x=-x+y+1 (D) x=x-y-1
(xi) The linker combines different library files to the ____________.
(A) executable file (B) source file
(C) object file (D) output file
(xii) Which of the following key is used to save a file?
(A) F2 (B) F3
(C) F5 (D) F9
(xiii) Void occupy how many bytes in memory?
(A) zero (B) one
(C) two (D) four
(xiv) Increment and decrement operators are ______________.
(A) bitwise operator (B) assignment operator
(C) unary operator (D) binary operator
(xv) Which of the following is valid character constant?
(A) a (B) “b”
(C) ‘6’ (D) =
FAZAIA INTER COLLEGE LAHORE CANTT
SEND UP EXAMINATION DEC, 2017 (Lahore Board)
Subject : Comp. Sc. Time allowed: 2 Hrs 40
mins
Class : XII Max. Marks: 60
Section-I
Q No 2: Attempt any SIX parts. All parts carry equal marks. (2 6) = 12
(i) How do we organize the file on storage media?
(ii) What is report generator?
(iii) What is a VIEW? How do we create it?
(iv) Write down the properties of relations.
(v) Briefly explain foreign key.
(vi) What is Data Modeling?
(vii) Briefly explain the term Modality.
(viii) Define the term attribute.
(ix) What is Cardinality?
Q No 3: Attempt any SIX parts. All parts carry equal marks. (2 6) = 12
(i) Differentiate between getch( ) and getche( ).
(ii) Briefly explain between #include directive.
(iii) Differentiate between linker and loader.
(iv) What is compound assignment statement?
(v) Why and where defauly keyword is used?
5. (vi) Briefly describe the basic control structures for writing programs.
(vii) Write a program that displays the ASCII code of the character typed by the user.
(viii) Write a program to find out the greatest value from the two given values by using
conditional operator.
(ix) Briefly explain the switch statement.
Q No 4: Attempt any SIX questions. All question carries equal marks (2 6) =
12
(i) What is a sential controlled loop?
(ii) Briefly explain do-while loop.
(iii) What is a function prototype?
(iv) What is a coercion of arguments?
(v) What is the lifetime of global variables?
(vi) Write a program to demonstrate the structure of a function.
(vii) Illustrate the difference between text and binary streams.
(viii) What is a file pointer?
(ix) Discuss any four file access modes.
Section-II
Note: Attempt any ONE question. (1 8) = 8
Q5. (a) Briefly describe the different Database Models.
(b) What are the four major components of the Database Systems.
Q6. Explain the following:
a) Physical Data Model
b) Conceptual Data Model
Section-III
Note: Attempt any TWO descriptive answers of the following questions. (2 8) =
16
Q7. Write a program that finds sum of the squares of integers from 1 to n. Where n is a
positive value entered by the user (i.e: sum=12
+22
+32
+…+n2
)
Q8. (a) Briefly explain the function which is used to read strings of characters from a
file.
(b) Define GOTO statement.
Q9. (a) What is return statement?
(b) Write a program that will append records in contact.txt file.
6. (vi) Briefly describe the basic control structures for writing programs.
(vii) Write a program that displays the ASCII code of the character typed by the user.
(viii) Write a program to find out the greatest value from the two given values by using
conditional operator.
(ix) Briefly explain the switch statement.
Q No 4: Attempt any SIX questions. All question carries equal marks (2 6) =
12
(i) What is a sential controlled loop?
(ii) Briefly explain do-while loop.
(iii) What is a function prototype?
(iv) What is a coercion of arguments?
(v) What is the lifetime of global variables?
(vi) Write a program to demonstrate the structure of a function.
(vii) Illustrate the difference between text and binary streams.
(viii) What is a file pointer?
(ix) Discuss any four file access modes.
Section-II
Note: Attempt any ONE question. (1 8) = 8
Q5. (a) Briefly describe the different Database Models.
(b) What are the four major components of the Database Systems.
Q6. Explain the following:
a) Physical Data Model
b) Conceptual Data Model
Section-III
Note: Attempt any TWO descriptive answers of the following questions. (2 8) =
16
Q7. Write a program that finds sum of the squares of integers from 1 to n. Where n is a
positive value entered by the user (i.e: sum=12
+22
+32
+…+n2
)
Q8. (a) Briefly explain the function which is used to read strings of characters from a
file.
(b) Define GOTO statement.
Q9. (a) What is return statement?
(b) Write a program that will append records in contact.txt file.