Go Back   2020-2021 StudyChaCha > StudyChaCha Discussion Forum > General Topics

Old March 27th, 2014, 12:28 PM
Super Moderator
Join Date: Dec 2011
Default Re: Computer Science II Paper Question Paper for ISC board

ISC board Computer Science Paper II practical question exam questions are follows:

1. Write an algorithm for the selected problem. [10]
(Algorithm should be expressed clearly using any standard scheme such as pseudo
code or in steps which are simple enough to be obviously computable.)
2. Write a program in JAVA language. The program should follow the algorithm and [20]
should be logically and syntactically correct.
3. Document the program using mnemonic names / comments, identifying and clearly [10]
describing the choice of data types and meaning of variables.
4. Code / Type the program on the computer and get a printout (hard copy). Typically, [10]
this should be a program that compiles and runs correctly.
5. Test run the program on the computer using the given sample data and get a printout [20]
of the output in the format specified in the problem.
6. Viva-Voce on the Selected Problem. [20]

Solve any one of the following Problems:
Question 1
An ISBN (International Standard Book Number) is a ten digit code which uniquely identifies a
The first nine digits represent the Group, Publisher and Title of the book and the last digit is used to
check whether ISBN is correct or not.
Each of the first nine digits of the code can take a value between 0 and 9. Sometimes it is necessary
to make the last digit equal to ten; this is done by writing the last digit of the code as X.
To verify an ISBN, calculate 10 times the first digit, plus 9 times the second digit, plus 8 times the
third and so on until we add 1 time the last digit. If the final number leaves no remainder when
divided by 11, the code is a valid ISBN.
For Example:
1. 0201103311 = 10*0 + 9*2 + 8*0 + 7*1 + 6*1 + 5*0 + 4*3 + 3*3 + 2*1 + 1*1 = 55
Since 55 leaves no remainder when divided by 11, hence it is a valid ISBN.
2. 007462542X = 10*0 + 9*0 + 8*7 + 7*4 + 6*6 + 5*2 + 4*5 + 3*4 + 2*2 + 1*10 = 176
Since 176 leaves no remainder when divided by 11, hence it is a valid ISBN.
3. 0112112425 = 10*0 + 9*1 + 8*1 + 7*2 + 6*1 + 5*1 + 4*1 + 3*4 + 2*2 + 1*5 = 71
Since 71 leaves no remainder when divided by 11, hence it is not a valid ISBN.
Design a program to accept a ten digit code from the user. For an invalid input, display an
appropriate message. Verify the code for its validity in the format specified below:
Test your program with the sample data and some random data:
Example 1
INPUT CODE : 0201530821
Example 2
INPUT CODE : 035680324
Example 3
INPUT CODE : 0231428031
OUTPUT : SUM = 122

Question 2
Write a program to declare a square matrix A[ ] [ ] of order (M x M) where ‘M’ is the number of
rows and the number of columns such that M must be greater than 2 and less than 20. Allow the
user to input integers into this matrix. Display appropriate error message for an invalid input.
Perform the following tasks:
(a) Display the input matrix.
(b) Create a mirror image matrix.
(c) Display the mirror image matrix.
Test your program with the sample data and some random data:
Example 1
INPUT : M = 3
4 16 12
8 2 14
4 1 3
4 16 12
8 2 14
4 1 3
12 16 4
14 2 8
3 1 6
Example 2
INPUT : M = 22

Question 3
A Palindrome is a word that may be read the same way in either direction.
Accept a sentence in UPPER CASE which is terminated by either ” . “, ” ? ” or ” ! “.
Each word of the sentence is separated by a single blank space.
Perform the following tasks:
(a) Display the count of palindromic words in the sentence.
(b) Display the palindromic words in the sentence.
Example of palindromic words:
Test your program with the sample data and some random data:
Example 1
Example 2
Example 3

================================================== ===================

Question 1

Design a program to accept a day number (between 1 and 366), year (in 4 digits) from the user to generate and display the corresponding date. Also accept 'N' (1<=N<=100) from the user to compute and display the future date corresponding to 'N' days after the generated date. Display an error message if the value of the day number, year and N are not within the limit or not according to the condition specified.

Test your program for the following data and some random data.

1. Example :

YEAR : 2008


2. Example :

YEAR : 2008


View Answer(s)
Contribute Your Answer / Explanation

Question 2

Write a program to declare a matrix A[ ] [ ] of order (m x n) where 'm' is the number of rows and 'n' is the number of columns such that both m and n must be greater than 2 and less than 20. Allow the user to input positive integers into this matrix. Perform the following tasks on the matrix:
(a) Sort the elements of the outer row and column elements in ascending order using any standard sorting technique and arrange them in an array.
(b) Calculate the sum of the outer row and column elements.
(c) Output the original matrix, rearranged matrix and only the boundary elements of the rearranged array with their sum.

Test your program for the following data and some random data.

1. Example : INPUT : M = 3
N = 3
1 7 4
8 2 5
6 3 9
1 7 4
8 2 5
6 3 9
1 3 4
9 2 5
8 7 6
1 3 4
9 5
8 7 6


2. Example : INPUT : M = 2
N = 3

7 1 6
8 9 2
7 1 6
8 9 2

1 2 6
9 8 7

1 2 6
9 8 7


3. Example : INPUT : M = 4
N = 4
9 2 1 5
8 13 8 4
15 6 3 11
7 12 23 8
9 2 1 5
8 13 8 4
15 6 3 11
7 12 23 8
1 2 4 5
23 13 8 7
15 6 3 8
12 11 9 8
1 2 4 5
23 7
15 8
12 11 9 8

View Answer(s)
Contribute Your Answer / Explanation

Question 3

Read a single sentence which terminates with a full stop(.). The words are to be separated with a single blank space and are in lower case. Arrange the words contained in the sentence according to the length of the words in ascending order. If two words are of the same length then the word occurring first in the input sentence should come first. For both input and output, the sentence must begin in upper case.

Test your program for the following data and some random data. INPUT : The lines are printed in reverse order.
OUTPUT : In the are lines order printed reverse.
INPUT : Print the sentence in ascending order.
OUTPUT : In the print order sentence ascending.
INPUT : I love my country.
OUTPUT : I my love country.
Answered By StudyChaCha Member
Reply With Quote Quick reply to this message
Old December 17th, 2014, 12:52 PM
Default Re: Computer Science II Paper Question Paper for ISC board

i need computer science theory paper solved
Reply With Quote Quick reply to this message
Old December 21st, 2014, 12:46 PM
Super Moderator
Join Date: Dec 2012
Default Re: Computer Science II Paper Question Paper for ISC board

Here I am giving you syllabus of Computer Science Paper I and II of 11th and 12th class of ISC board.

There will be two papers in the subject:
Paper I: Theory - 3 hours ….100 marks
Paper II: Practical - 3 hours ….100 marks

Paper 1 shall be of 3 hours duration and be divided into two parts.
Part I (30 marks): This part will consist of compulsory short answer questions, testing knowledge, application and skills relating to the entire syllabus.
Part II (70 marks): This part will be divided into three Sections, A, B and C. Candidates are required to answer three questions out of four from Section A and two questions out of three in each of the Sections B and C. Each question in this part shall carry 10 marks.


Basic Computer Hardware and Software

1. Numbers
Representation of numbers in different bases and interconversion between them (e.g. binary, octal, decimal, hexadecimal). Addition and subtraction operations for numbers in different bases.
Introduce the positional system of representing numbers and the concept of a base. Discuss the conversion of representations between different bases using English or pseudo code. These algorithms are also good examples for defining different functions in a class modelling numbers (when programming is discussed). For addition and subtraction use the analogy with decimal numbers, emphasize how carry works (this will be useful later when binary adders are discussed).

2. Encodings
(a) Binary encodings for integers and real numbers using a finite number of bits (signmagnitude, twos complement, mantissaexponent notation). Basic operations on integers and floating point numbers. Limitations of finite representations. Signed, unsigned numbers, least and most significant bits. Sign-magnitude representation and its shortcomings (two representations for 0, addition requires extra step); twos-complement representation. Operations (arithmetic, logical, shift), discuss the basic algorithms used for the arithmetic operations. Floating point representation: normalized scientific notation, mantissaexponent representation, binary point (discuss trade-off between size of mantissa and exponent). Single and double precision. Arithmetic operations with floating point numbers. Properties of finite representation: overflow, underflow, lack of associativity (demonstrate this through actual programs).

(b) Characters and their encodings (e.g. ASCII, Unicode). Discuss the limitations of the ASCII code in representing characters of other languages. Discuss the Unicode representation for the local language. Java uses Unicode, so strings in the local language can be used (they can be displayed if fonts are available) – a simple table lookup for local language equivalents for Latin (i.e. English) character strings may be done.

3. High level structure of computer
Block diagram of a computer system with details of (i) function of each block and (ii) interconnectivity and data and control flow between the various blocks Show how the logic in (a) above can be realized in hardware in the form of gates. These gates can then be combined to implement the basic operations for arithmetic. Tie up with the arithmetic operations on integers discussed earlier in 2 (a). Develop the diagram by successive refinement of blocks till all the following have been covered: ALU, RAM, cache, the buses (modern computers have multiple buses), disk (disk controller and what it does), input/output ports (serial, parallel, USB, network, modem, line-in, line-out etc.), devices that can be attached to these ports (e.g keyboard, mouse, monitor, CDROM, DVD, audio input/output devices, printer, etc.). Clearly describe the connectivity and the flow of data and control signals. Memory organization and access; parity; memory hierarchy - cache, primary memory, secondary memory.

4. Basic architecture of a simple processor and its instruction set
Simple Hypothetical Computer.The simple hypothetical computer abbreviated as (SHC) is meant to introduce the basic structure of a processor in particular registers, basic instruction set, structure of an instruction, program counter addressing modes (immediate, direct, register, register-indirect). Simple programs should be written in the SHC instruction set (e.g. max./min. of set of nos.)

5. Propositional logic, hardware implementation, arithmetic operations
(a) Propositional logic, well formed formulae, truth values and interpretation of well formed formulae, truth tables. Propositional variables; the common logical connectives (~ (not), ∧ (and), ∨ (or),
⇒ (implication), ⇔ (equivalence)); definition of a well-formed formula (wff); representation of simple word problems as wff (this can be used for motivation); the values true and false; interpretation of a wff; truth tables; satisfiable, unsatisfiable and valid formulae.

(b) Logic and hardware, basic gates (AND, NOT, OR) and their universality, other gates (NAND, NOR, XOR); inverter, half adder, full adder.

6. Memory
The access time differences between the different kinds of memory; size differences; locality of reference and cache memory.

7. System and other software
Boot process. Operating system as resource manager, command processing, files, directories and file system. Commonly available programs (editors, compilers, interpreters, word processors, spread sheets etc.). Boot process step-by-step from power on till the prompt. In OS discuss: (i) all the resources (processor, memory, i/o) that need to be managed in a computer; (ii) what is meant by managing these resources. Logical structure of data storage on disk using logical disks, hierarchical directories and files. Distinguish between interpreters and compilers. In particular discuss the javac and java programs.

The programming element in the syllabus is aimed at algorithmic problem solving and not merely rote learning of Java syntax. The Java version used should be 1.5 or later. For programming, the students can use any text editor and the javac and java programs or any development environment: for example, BlueJ, Eclipse, NetBeans etc. BlueJ is strongly recommended for its simplicity, ease of use and because it is very well suited for an ‘objects first’ approach.

8. Introduction to algorithmic problem solving using Java
Note that topics 9 to 13 will get introduced almost simultaneously when classes and their definitions are introduced.

9. Objects
(a) Objects as data (attributes) + behaviour (methods or functions); object as an instance of a class. Constructors. Difference between object and class should be made very clear. Blue and Greenfoot can be used for this purpose. Constructor as a special kind of function; the new operator; multiple constructors with different argument structures; constructor returns a reference to the object.

(b) Analysis of some real world programming examples in terms of objects and classes. Use simple examples like a calculator, date, number etc. to illustrate how they can be treated as objects that behave in certain welldefined ways and how the interface provides a way to access behaviour. Illustrate behaviour changes by adding new functions, deleting old functions or modifying existing functions.

10. Primitive values, wrapper classes, types and casting
Primitive values and types: int, short, long, float, double, boolean, char. Corresponding wrapper classes for each primitive type. Class as type of the object. Class as mechanism for user defined types. Changing types through user defined casting and automatic type coercion for some primitive types. Ideally, everything should be a class; primitive types are defined for efficiency reasons; each primitive type has a corresponding wrapper class. Classes as user defined types. In some cases types are changed by automatic coercion or casting – e.g. mixed type expressions. However, casting in general is not a good idea and should be avoided, if possible.

11. Variables, expressions
Variables as names for values; expressions (arithmetic and logical) and their evaluation (operators, associativity, precedence). Assignment operation; difference between left hand side and right hand side of assignment. Variables denote values; variables are already defined as attributes in classes; variables have types that constrain the values it can denote. Difference between variables denoting primitive values and object values – variables denoting objects are references to those objects. The assignment operator = is special. The variable on the lhs of = denotes the memory location while the same variable on the rhs denotes the contents of the location e.g. i=i+2.

12. Statements, scope
Statements; conditional (if, if-then-else, switchbreak, ?: ternary operator), looping (for, while-do, do-while, continue, break); grouping statements in blocks, scope and visibility of variables.
Describe the semantics of the conditional and looping statements in detail. Evaluation of the condition in conditional statements (esp. difference between || and | and && and &). Emphasize fall through in switch statement. Many small examples should be done to illustrate control structures. Printing different kinds of patterns for looping is instructive. When number of iterations are known in advance use the for loop otherwise the while-do or do-while loop. Express one loop construct using the others. For e.g.:
for (; ; ) ; is equivalent
(i) Using while
; while {; } 187
(ii) Using do-while
; if ! do ; while
Nesting of blocks. Variables with block scope, function scope, class scope. Visibility rules when variables with the same name are defined in different scopes.

13. Functions
Functions/methods (as abstractions for complex user defined operations on objects), functions as mechanisms for side effects; formal arguments and actual arguments in functions; different
behaviour of primitive and object arguments. Static functions and variables. The this variable. Examples of algorithmic problem solving using functions (various number theoretic problems, finding roots of algebraic equations). Functions are like complex operations where the object is implicitly the first argument. Variable this denotes the current object. Functions typically return values, they may also cause sideeffects (e.g. change attribute values of objects) – typically functions that are only supposed to cause side-effects return void (e.g. Set functions). Java passes argument by value. Illustrate the difference between primitive values and object values as arguments (changes made inside functions persist after the call for object values). Static definitions as class variables and class functions visible and shared by all instances. Need for static functions and variables. Introduce the main method – needed to begin execution.

14. Arrays, strings
(a) Structured data types – arrays (single and multi-dimensional), strings. Example algorithms that use structured data types (e.g. searching, finding maximum/minimum, sorting techniques, solving systems of linear equations, substring, concatenation, length, access to char in string, etc.). Storing many data elements of the same type requires structured data types – like arrays.
Access in arrays is constant time and does not depend on the number of elements. Sorting techniques (bubble, selection, insertion), Structured data types can be defined by classes – String. Introduce the Java library String class and the basic operations on strings (accessing individual characters, various substring operations, concatenation, replacement, index of operations).

(b) Basic concept of a virtual machine; Java virtual machine; compilation and execution of Java programs (the javac and java programs). The JVM is a machine but built as a program and not through hardware. Therefore it is called a virtual machine. To run, JVM machine language programs require an interpreter (the java program). The advantage is that such JVM machine language programs (.class files) are portable and can run on any machine that has the java program.

(c) Compile time and run time errors; basic concept of an exception, the Exception class, catch and throw. Differentiate between compile time and run time errors. Run time errors crash the program. Recovery is possible by the use of exceptions. Explain how an exception object is created and passed up until a matching catch is found. This behaviour is different from the one where a value is returned by a deeply nested function call. It is enough to discuss the Exception class. Sub-classes of Exception can be discussed after inheritance has been done in Class XII.

15. Elementary data structures and associated algorithms, basic input/output
(a) Class as a contract; separating implementation from interface; encapsulation; private and public. Class is the basic reusable unit. Its function prototypes (i.e. the interface) work as a visible contract with the outside world since others will use these functions in their programs. This leads to encapsulation (i.e. hiding implementation information) which in turn leads to the use of private and public for realizing encapsulation.
(b) Interfaces in Java; implementing interfaces through a class; interfaces for user defined implementation of behaviour. Motivation for interface: often when creating reusable classes some parts of the exact implementation can only be provided by the final end user. For example in a class that sorts records of different types the exact comparison operation can only be provided by the end user. Since only he/she knows which field(s) will be used for doing the comparison and whether sorting should be in ascending or descending order be given by the user of the class.
Emphasize the difference between the Java language construct interface and the word interface often used to describe the set of function prototypes of a class.
(c) Basic data structures (stack, queue, dequeue); implementation directly through classes; definition through an interface and multiple implementations by implementing the interface. Basic algorithms and programs using the above data structures. A data structure is a data collection with well defined operations and behaviour or properties. The behaviour or properties can
usually be expressed formally using equations or some kind of logical formulae. Consider for e.g. a stack with operations defined as follows:
void push(Object o)
Object pop()
boolean isEmpty()
Object top()
Then, for example the LIFO property can be expressed by (assume s is a stack): if s.push(o); o1=pop() then o ≡ o1
What the rule says is: if o is pushed on the stack s and then it is popped and o1 is the object obtained then o, o1 are identical.
Another useful property is: if s.isEmpty() == true then s.pop() = ERROR
It says that popping an empty stack gives ERROR.
Similarly, several other properties can also be specified. It is important to emphasize the behavioural rules or properties of a data structure since any implementation must guarantee that the rules hold. Some simple algorithms that use the data structures:
i) For stack: parentheses matching, tower of Hanoi, nested function calls; solving a maze.
ii) For queue: scheduling processes, printers, jobs in a machine shop.
(d) Basic input/output using Scanner and Printer classes from JDK; files and their representation using the File class, file input/output; input/output exceptions. Tokens in an input stream, concept of whitespace, extracting tokens from an input stream (StringTokenizer class).
The Scanner class can be used for input of various types of data (e.g. int, float, char etc.) from the standard input stream or a file input stream. The File class is used model file objects in the underlying system in an OS independent manner. Similarly, the Printer class handles output. Only basic input and output using these classes should be covered. Discuss the concept of a token (a delimited continuous stream of characters that is meaningful in the application program – e.g. words in a sentence where the delimiter is the blank character). This naturally leads to the idea of delimiters and in particular whitespace and user defined characters as delimiters. As an example show how the StringTokenizer class allows one to extract a sequence of tokens from a string with user defined delimiters.
(e) Concept of recursion, simple recursive functions (e.g. factorial, GCD, binary search, conversion of representations of numbers between different bases). Many problems can be solved very elegantly by observing that the solution can be composed of solutions to ‘smaller’ versions of the same problem with the base version having a known simple solution. Recursion can be initially motivated by using recursive equations to define certain functions. These definitions are fairly obvious and are easy to understand. The definitions can be directly converted to a program. Emphasize that any recursion must have a base case. Otherwise, the computation can go into an infinite loop. Illustrate this by removing the base case and running the program. Examples:
(i) Definition of factorial:
factorial(0) = 1 //base case
factorial(n) = n * factorial(n-1)
(ii) Definition of GCD:
gcd(m, n) =
if (m==n) then n //base case
else if (m>n) then gcd(m-n, n)
else gcd(m, n-m)
(iii) Definition of Fibonacci numbers:
fib(0) = 1 //base case
fib(1) = 1 //base case
fib(n) = fib(n-1)+ fib(n-2)
The tower of Hanoi is a very good example of how recursion gives a very simple and elegant solution where as non-recursive solutions are quite complex. Discuss the use of a stack to keep track of function calls. The stack can also be used to solve the tower of Hanoi problem non-recursively.
(f) Concrete computational complexity; concept of input size; estimating complexity in terms of functions; importance of dominant term; best, average and worst case. Points to be given particular emphasis:
(i) Algorithms are usually compared along two dimensions – amount of space (that is memory) used and the time taken. Of the two the time taken is usually considered the more important. The motivation to study time complexity is to compare different algorithms and use the one that is the most efficient in a particular situation.
(ii) Actual run time on a particular computer is not a good basis for comparison since it depends heavily on the speed of the computer, the total amount of RAM in the computer, the OS running on the system and the quality of the compiler used. So we need a more abstract way to compare the time complexity of algorithms.
(iii) This is done by trying to approximate the number of operations done by each algorithm as a function of the size of the input. In most programs the loops are important in deciding the complexity. For example in bubble sort there are two nested loops and in the worst case the time taken will be proportional to n(n-1) where n is the number of elements to be sorted. Similarly, in linear search in the worst case the target has to be compared with all the elements so time taken will be proportional to n where n is the number of elements in the search set.
(iv) In most algorithms the actual complexity for a particular input can vary. For example in search the number of comparisons can vary from 1 to n. This means we need to study the best,worst and average cases. Comparisons are usually made taking the worst case. Average cases are harder to estimate since it depends on how the data is distributed. For example in search, if the elements are uniformly distributed it will take on the average n/2 comparisons when the average is taken over a statistically significant number of instances.
(v) Comparisons are normally made for large values of the input size. This means that the dominant term in the function is the important term. For example if we are looking at bubble sort and see that time taken can be estimated as: a*n2 +b*n + c
where n is the number of elements to be sorted and a, b, c are constants then for large n the dominant term is clearly n2 and we can in effect ignore the other two terms.

16. Implementation of algorithms to solve problems
The students are required to do lab assignments in the computer lab concurrently with the lectures. Programming assignments should be done such that each major topic is covered in at least one assignment. Assignment problems should be designed so that they are non-trivial and make the student do algorithm design, address correctness issues, implement and execute the algorithm in
Java and debug where necessary. Self explanatory.

17. Social context of computing and ethical issues
(a) Intellectual property and corresponding laws and rights, software as intellectual property.
(b) Software copyright and patents and the difference between the two; trademarks; software licensing and piracy.
(c) Free software foundation and its position on software, open source software, various types of licensing (e.g. GPL, BSD).
(d) Privacy, email etiquette, spam, security issues, phising. Social impact and ethical issues should be discussed and debated in class. The important thing is for students to realise that these are complex issues and there are multiple points of view on many of them and there is no single ‘correct’ or ‘right’ view.

This paper of three hours duration will be evaluated internally by the school. The paper shall consist of three programming problems from which a candidate has to attempt any one. The practical consists of the two parts:
(1) Planning Session
(2) Examination Session
The total time to be spent on the Planning session and the Examination session is three hours. After completing the Planning session the candidates may begin with the Examination session. A maximum of 90 minutes is permitted for the Planning session. However, if the candidates finish earlier, they are to be permitted to begin with the Examination session.
Planning Session
The candidates will be required to prepare an algorithm and a hand written Java program to solve the problem. Examination Session
The program handed in at the end of the Planning session shall be returned to the candidates. The candidates will be required to key-in and execute the Java program on seen and unseen inputs individually on the Computer and show execution to the examiner. A printout of the program listing, including output results should be attached to the answer script containing the algorithm and handwritten program. This should be returned to the examiner. The program should be sufficiently documented so that the algorithm, representation and development process is clear from reading the program. Large differences between the planned program and the printout will result in loss of marks.
Teachers should maintain a record of all the assignments done as part of the practical work through the year and give it due credit at the time of cumulative evaluation at the end of the year. Students are expected to do a minimum of twenty assignments for the year.
Marks (out of a total of 100) should be distributed as given below:
Continuous Evaluation
Candidates will be required to submit a work file containing the practical work related to programming assignments done during the year.
Programming assignments done throughout the year
(Internal evaluation) - 20 marks
Terminal Evaluation
Solution to programming problem on the computer
- 60 marks
(Marks should be given for choice of algorithm and implementation strategy, documentation, correct output on known inputs mentioned in the question paper, correct output for unknown inputs available only to the examiner.)
Viva-voce - 20 marks
(Viva-voce includes questions on the following aspects of the problem attempted by the student: the algorithm and implementation strategy, documentation, correctness, alternative algorithms or implementations. Questions should be confined largely to the problem the student has attempted).
Attached Files Available for Download
File Type: pdf ISC Class XII Computer Science Syllabus.pdf (571.0 KB, 44 views)
Answered By StudyChaCha Member
Reply With Quote Quick reply to this message

Reply to this Question / Ask Another Question
Your Username: Click here to log in


All times are GMT +6.5. The time now is 01:04 PM.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2020, vBulletin Solutions, Inc.
Search Engine Friendly URLs by vBSEO 3.6.0 PL2

1 2 3 4 5 6 7 8 9