ReadLearnExcel

HBSE CLASS 12 COMPUTER SCIENCE 2026 PYQs +200 MCQs

HBSE CLASS 12 COMPUTER SCIENCE 2026 PYQs +200 MCQs

Table of Contents

✅ HBSE CLASS 12 COMPUTER SCIENCE

📘 PAPER 2021 (Code 5607, Set A)


🔹 Q1. What is a Constructor? Explain any two types of constructors. (4 Marks)

✅ Answer:

A constructor is a special member function of a class in C++ that is automatically called when an object of the class is created. It is used to initialize the data members of the class.

The name of the constructor is the same as the class name.

🔸 Types of Constructors:

1. Default Constructor

  • A constructor with no parameters.

  • It initializes data members with default values.

class Student {
public:
Student() {
cout << “Default Constructor Called”;
}
};

2. Parameterized Constructor

  • A constructor that takes arguments.

  • Used to initialize data members with user-defined values.

class Student {
int roll;
public:
Student(int r) {
roll = r;
}
};

🔹 Q2. Explain Public, Private and Protected class members. (4 Marks)

✅ Answer:

In C++, access specifiers define the accessibility of class members.

1. Public

  • Members declared as public can be accessed from outside the class.

  • Accessible everywhere.

class A {
public:
int x;
};

2. Private

  • Members declared as private cannot be accessed outside the class.

  • Accessible only within the class.

class A {
private:
int x;
};

3. Protected

  • Protected members are accessible inside the class and in derived classes.

  • Not accessible outside the class.

class A {
protected:
int x;
};

🔹 Q3. Create a class “Classroom” (4 Marks)

✅ Answer:

#include<iostream>
using namespace std;

class Classroom {
float length, width, height;

public:
void assign(float l, float w, float h) {
length = l;
width = w;
height = h;
}

float area() {
return length * width;
}

void display() {
cout << “Length: ” << length << endl;
cout << “Width: ” << width << endl;
cout << “Area: ” << area() << endl;
}
};

int main() {
Classroom c;
c.assign(10, 5, 8);
c.display();
return 0;
}

🔹 Q4. Difference between LAN and MAN (3 Marks)

LAN MAN
Local Area Network Metropolitan Area Network
Covers small area (school, office) Covers city area
High speed Moderate speed
Privately owned Usually government/private

🔹 Q5. Define Inheritance. Explain Base class and Derived class. (3 Marks)

✅ Answer:

Inheritance is an OOP concept in which one class acquires the properties and behavior of another class.

  • Base Class: The class whose properties are inherited.

  • Derived Class: The class that inherits properties.

class Parent {
public:
void show() {
cout << “Base Class”;
}
};

class Child : public Parent {
};

🔹 Q6. How insertion takes place in a queue? (2 Marks)

Insertion in a queue is called Enqueue.

Steps:

  1. Check if queue is full.

  2. Increment REAR.

  3. Insert element at REAR position.

Queue follows FIFO (First In First Out).


🔹 Q7. Define Normalization. (2 Marks)

Normalization is the process of organizing data in a database to:

  • Reduce redundancy

  • Avoid data inconsistency

It divides large tables into smaller related tables.


🔹 Q8. Define Web Browser. Give one example. (2 Marks)

A Web Browser is a software application used to access and view websites on the internet.

Example: Google Chrome

✅ HBSE CLASS 12 COMPUTER SCIENCE PAPER 2024 Set A

🔷 SECTION A (Objective Answers)

  1. (i) FTP stands for → File Transfer Protocol
    (ii) Smallest value SQL function → MIN()
    (iii) Hyperlink tag → <a>
    (iv) Stack removal order → SRQP
    (v) Underline tag → <u>
    (vi) Unary increment operator → ++
    (vii) Structure statement → True
    (viii) h1 least important → False
    (ix) Assertion-Reason → Option D
    (x) Assertion-Reason → Option A


🔷 SECTION B

Q2. Syntax of for loop in C++

for(initialization; condition; increment/decrement)
{
// statements
}

Q3. Two types of constructor

  • Default constructor

  • Parameterized constructor

Q4. Define 2NF

A table is in Second Normal Form (2NF) if:

  • It is in 1NF

  • No partial dependency exists


Q5. Syntax of INSERT

INSERT INTO table_name
VALUES (value1, value2, …);

✅ SECTION – A (Objective Type Questions)

(1 × 10 = 10 Marks)

1(i) What does FTP stand for?

Answer: (C) File Transfer Protocol


1(ii) Which SQL function is used to retrieve the smallest value from a specific column?

Answer: (B) MIN()


1(iii) Which HTML tag is used to create a hyperlink in a webpage?

Answer: (C) <a>


1(iv) If elements “P”, “Q”, “R”, “S” are placed in a stack and deleted one at a time, in what order will they be removed?

Stack follows LIFO (Last In First Out).
Answer: (C) SRQP


1(v) ______ tag is used for making the text underline in HTML.

Answer: <u>


1(vi) ______ unary operator increments the value of the operand by 1.

Answer: ++ (Increment operator)


1(vii) Structure is a user-defined data type that can contain variables of different data types.

Answer: True


1(viii) The <h1> tag is used to define the least important heading.

Answer: False
(h1 is the most important heading.)


1(ix) Assertion–Reason (SQL full form Simple Query Language)

Assertion is False (SQL = Structured Query Language)
Reason is True
Correct Option: (D)


1(x) Assertion–Reason (URL and Browser use)

Both are correct and Reason explains Assertion
Correct Option: (A)


✅ SECTION – B (Very Short Answer Type)

(1 × 4 = 4 Marks)


2. Write syntax of “for” loop in C++.

Answer: 

for(initialization; condition; increment/decrement)
{
// statements
}

3. Name any two types of constructor.

Answer:

  1. Default Constructor

  2. Parameterized Constructor


4. Define 2NF.

Answer:

A table is said to be in Second Normal Form (2NF) if:

  • It is in First Normal Form (1NF), and

  • There is no partial dependency (i.e., non-key attribute depends on whole primary key).


5. Write the syntax of INSERT command in SQL.

Answer:

INSERT INTO table_name (column1, column2, …)
VALUES (value1, value2, …);

✅ SECTION – C (Short Answer Type)

(2 × 5 = 10 Marks)


6. Given table Student_Course (Check 1NF)

Table shows multiple values in Stu_Course column (e.g., Hindi, Maths).

(i) Is the table in 1NF?

Answer: (B) No

Because 1NF requires atomic (single) values.


(ii) What is the key characteristic of 1NF?

Answer: (C) Atomic/Single values in each column


OR

Explain any two DDL commands with example.

Answer:

1. CREATE

Used to create a new table.

CREATE TABLE Student (
Roll INT,
Name VARCHAR(20)
);

2. DROP

Used to delete a table permanently.

DROP TABLE Student;

7. Explain how to define a function outside a class in C++.

Answer:

When a function is declared inside a class but defined outside, scope resolution operator :: is used.

Example:

#include<iostream>
using namespace std;

class Sample {
public:
void display();
};

void Sample::display() {
cout << “Function defined outside class”;
}

int main() {
Sample s;
s.display();
}

8. Explain SUM() function in SQL with syntax.

Answer:

SUM() is an aggregate function used to calculate total of a numeric column.

Syntax:

SELECT SUM(column_name)
FROM table_name;

SELECT SUM(Salary)
FROM Employee;

9. How to add image in a webpage using HTML?

Answer:

Image is added using <img> tag.

Syntax:

<img src=”image.jpg” alt=”Image description”>

Example:

<img src=”flower.jpg” alt=”Flower Image”>

10. Case Study (Browser & Search Engine)

(i) Which is an example of a browser?

Answer: (B) Google Chrome


(ii) Why does she use search engine for her project?

Answer: (C) To find relevant information quickly


✅ SECTION – D (Essay Type Questions)

(4 × 4 = 16 Marks)


11. What is Linear Queue? Write algorithm to insert element in linear queue.

Answer:

A Linear Queue is a linear data structure that follows FIFO (First In First Out).

Insertion is called Enqueue.

Algorithm for Enqueue:

  1. If REAR = MAX-1 → Queue Overflow

  2. If FRONT = -1 → Set FRONT = 0

  3. Increment REAR

  4. Insert element at Q[REAR]


OR

Explain Bubble Sort with example.

Bubble Sort repeatedly compares adjacent elements and swaps them if needed.

Example:
Array: 5 3 2 4

Pass 1 → 3 2 4 5
Pass 2 → 2 3 4 5
Sorted array → 2 3 4 5


12. What is SDLC? Explain any three phases.

Answer:

SDLC (System Development Life Cycle) is a process used to develop software systematically.

Phases:

  1. Requirement Analysis

    • Collect user requirements

  2. Design

    • Plan system structure

  3. Implementation

    • Coding and development

  4. Testing

    • Checking errors

  5. Maintenance

    • Updating software

(Any three explained)


OR

Explain:

(a) Black Box Testing
Testing without knowing internal code.

(b) White Box Testing
Testing internal logic of program.

(c) Unit Testing
Testing individual modules.

(d) Integration Testing
Testing combined modules.


13. Describe TCP/IP model and explain any two layers.

Answer:

TCP/IP model has four layers:

  1. Application Layer

  2. Transport Layer

  3. Internet Layer

  4. Network Access Layer

Example:

Transport Layer:

  • Responsible for reliable data transfer

  • Uses TCP and UDP

Internet Layer:

  • Handles logical addressing

  • Uses IP protocol


OR

Explain:

(a) LAN – Small area network
(b) MAN – City-level network
(c) WAN – Large geographical network
(d) WWW – World Wide Web


14. Describe Inheritance in C++ and explain types.

Answer:

Inheritance allows one class to acquire properties of another class.

Types:

  1. Single Inheritance

  2. Multiple Inheritance

  3. Multilevel Inheritance

Example:

class A {};
class B : public A {};

OR

Explain Destructor in C++ with example.

A destructor is used to free resources when object is destroyed.

Syntax:

~ClassName() { }

Example:

class Test {
public:
~Test() {
cout << “Destructor Called”;
}
};

HBSE Class 12 Computer Science – 2023

✅ SECTION – A (Objective Type Questions)

(1 × 10 = 10 Marks)

1(i) What does FTP stand for?

Answer: (C) File Transfer Protocol


1(ii) Which SQL function retrieves the smallest value from a column?

Answer: (B) MIN()


1(iii) Which HTML tag is used to create a hyperlink?

Answer: (C) <a>


1(iv) If P, Q, R, S are pushed in a stack, deletion order will be?

Stack follows LIFO → Last In First Out
Answer: (C) SRQP


1(v) ______ tag is used to underline text in HTML.

Answer: <u>


1(vi) ______ unary operator increments value by 1.

Answer: ++


1(vii) Structure can contain different data types.

Answer: True


1(viii) <h1> is the least important heading.

Answer: False


1(ix) Assertion–Reason (SQL full form Simple Query Language)

Assertion False
Reason True
Answer: (D)


1(x) Assertion–Reason (URL & browser use)

Both correct and reason explains assertion
Answer: (A)


✅ SECTION – B (Very Short Answer Type)

(1 × 4 = 4 Marks)


2. Write syntax of for loop in C++.

Answer:

for(initialization; condition; increment/decrement)
{
// statements
}

3. Name any two types of constructors.

Answer:

  1. Default Constructor

  2. Parameterized Constructor


4. Define 2NF.

Answer:
A table is in Second Normal Form if:

  • It is in 1NF

  • There is no partial dependency


5. Write syntax of INSERT command in SQL.

Answer:

INSERT INTO table_name (column1, column2, …)
VALUES (value1, value2, …);

✅ SECTION – C (Short Answer Type)

(2 × 5 = 10 Marks)


6. Given Student_Course table – Check 1NF

Since course column contains multiple values (Hindi, Maths etc.), it violates atomic property.

(i) Is table in 1NF?

Answer: (B) No


(ii) Key characteristic of 1NF?

Answer: (C) Atomic/Single values in each column


OR

Explain any two DDL commands.

Answer:

CREATE

CREATE TABLE Student (
Roll INT,
Name VARCHAR(20)
);

DROP

DROP TABLE Student;

7. Define a function outside class in C++.

Answer:

Scope resolution operator :: is used.

class Sample {
public:
void display();
};

void Sample::display() {
cout << “Hello”;
}

8. Explain SUM() function.

Answer:

SUM() calculates total of numeric column.

SELECT SUM(Salary)
FROM Employee;

9. Add image in webpage using HTML.

Answer:

<img src=”image.jpg” alt=”Image”>

10. Case Study

(i) Example of browser → Google Chrome
(ii) Use of search engine → To find relevant information quickly


✅ SECTION – D (Essay Type Questions)

(4 × 4 = 16 Marks)


11. Linear Queue and Algorithm for insertion

Linear Queue follows FIFO principle.

Algorithm:

  1. If REAR = MAX-1 → Overflow

  2. If FRONT = -1 → FRONT = 0

  3. REAR = REAR + 1

  4. Insert element


OR

Bubble Sort

Repeatedly compares adjacent elements and swaps.

Example:
5 3 2 4
→ 3 2 4 5
→ 2 3 4 5


12. What is SDLC? Explain three phases.

SDLC is systematic process for software development.

Phases:

  1. Requirement Analysis

  2. Design

  3. Implementation

  4. Testing

  5. Maintenance


OR

Explain:

Black Box Testing
White Box Testing
Unit Testing
Integration Testing


13. TCP/IP Model

Four layers:

  1. Application

  2. Transport

  3. Internet

  4. Network Access

Transport Layer ensures reliable communication.
Internet Layer handles IP addressing.


OR

Explain:

LAN
MAN
WAN
WWW


14. Inheritance in C++

Inheritance allows one class to acquire properties of another.

Types:

  1. Single

  2. Multiple

  3. Multilevel


OR

Destructor

Destructor frees resources.

~ClassName() {
// cleanup
}

✅ HBSE CLASS 12 COMPUTER SCIENCE PAPER 2025 Set A

🔷 SECTION – A (Objective Type Questions)

(1 × 10 = 10 Marks)

1(i) What is Bluetooth primarily used for?

Answer: (B) Wireless communication between devices over short distances


1(ii) Which SQL keyword is used to sort the result set?

Answer: (A) ORDER BY


1(iii) Which of the following is NOT an operation performed on a queue?

Answer: (D) Insert at Position


1(iv) In Python, which block is executed when an exception is raised inside the try block?

Answer: (B) except


1(v) The main function of a router is to forward ______ between different networks.

Answer: Data packets


1(vi) The ______ command is used to retrieve data from a database.

Answer: SELECT


1(vii) The finally block is only executed if an exception is raised.

Answer: False
(Finally block executes whether exception occurs or not.)


1(viii) In Python, the default mode for opening a file is ‘r’.

Answer: True


1(ix) Assertion–Reason

Correct Option: (A)


1(x) Assertion–Reason

Correct Option: (A)


🔷 SECTION – B (Very Short Answer Type)

(1 × 5 = 5 Marks)


2. What type of error does Python raise if you try to divide a number by zero?

Answer:
Python raises a ZeroDivisionError.


OR

What function is used to open a file in Python?

Answer:
The function used to open a file is:

open()

3. What is a database?

Answer:
A database is an organized collection of related data stored electronically so that it can be easily accessed, managed, and updated.


4. What is the primary disadvantage of BUS topology?

Answer:
If the main cable (backbone) fails, the entire network stops working.


5. What are coaxial cables? Mention one advantage.

Answer:
Coaxial cables are transmission media consisting of a central conductor surrounded by insulation and shielding.

Advantage:
They have better resistance to noise compared to twisted pair cables.


🔷 SECTION – C (Short Answer Type)

(2 × 5 = 10 Marks)


6. What is the use of else block in exception handling in Python?

Answer:
The else block executes only when no exception occurs in the try block.

Example:

try:
x = 10 / 2
except ZeroDivisionError:
print(“Error”)
else:
print(“No error occurred”)

OR

How do you close a file in Python? Why is it important?

Answer:
A file is closed using:

file.close()

Importance:

  • Frees system resources

  • Saves changes properly

  • Prevents data corruption


7. What is Bubble Sort?

Answer:
Bubble Sort is a simple sorting technique in which adjacent elements are compared and swapped if they are in the wrong order.

It repeatedly passes through the list until it is sorted.


8. What is the purpose of SMTP protocol?

Answer:
SMTP (Simple Mail Transfer Protocol) is used to send emails from one server to another over the internet.


9. How do firewalls help in preventing cyber attacks?

Answer:
Firewalls:

  • Monitor incoming and outgoing traffic

  • Block unauthorized access

  • Filter malicious data packets

They act as a security barrier between a trusted network and the internet.


10. How does bandwidth affect the speed of data transmission?

Answer:
Higher bandwidth allows more data to be transmitted per second.
So, higher bandwidth results in faster data transfer speed.


🔷 SECTION – D (Essay Type Questions)

(4 × 3 = 12 Marks)


13. What is Stack Data Structure? Write a Python program to insert element in a stack.

Answer:

A Stack is a linear data structure that follows LIFO (Last In First Out) principle.

Insertion in stack is called Push.

Python Program:

stack = []

def push():
item = input(“Enter element: “)
stack.append(item)
print(“Element inserted”)

push()
print(“Stack:”, stack)

OR

Explain Linear Search with example.

Linear Search is a searching technique where elements are checked one by one.

Example:

arr = [10, 20, 30, 40]
key = 30

for i in arr:
if i == key:
print(“Element found”)
break

14. What is SQL? What are its primary components (DML, DDL, DCL)?

Answer:

SQL (Structured Query Language) is used to manage and manipulate databases.

Components:

  1. DDL (Data Definition Language)

    • CREATE

    • ALTER

    • DROP

  2. DML (Data Manipulation Language)

    • INSERT

    • UPDATE

    • DELETE

    • SELECT

  3. DCL (Data Control Language)

    • GRANT

    • REVOKE


OR

Explain following commands:

(i) ALTER TABLE

Used to modify structure of existing table.

Example:

ALTER TABLE Student ADD Age INT;

ii) DROP TABLE

Deletes entire table permanently.

DROP TABLE Student;

(iii) DELETE

Removes records from table.

DELETE FROM Student WHERE Roll=1;

(iv) INSERT

Adds new records into table.

INSERT INTO Student VALUES (1,’Ram’);

15. What is Network Topology? Explain:

(i) STAR

All devices are connected to a central hub.

Advantage: Easy to manage
Disadvantage: Hub failure stops network


(ii) RING

Devices are connected in circular form.

Data flows in one direction.


OR

Explain:

(i) LAN

Local Area Network — Covers small area like school.

(ii) WAN

Wide Area Network — Covers large geographical area.

(iii) Modem

Converts digital signals to analog and vice versa.

(iv) Gateway

Connects two different networks using different protocols.

📊 1️⃣ MOST REPEATED THEORY QUESTIONS (Very High Frequency)

Topic 2021 2022 2023 2024 2025 Frequency
Constructor Types 🔥 4/5
Inheritance 🔥 4/5
Destructor 🔥 4/5
2NF / Normalization 🔥 5/5
INSERT Syntax 🔥 5/5
SUM / MIN SQL 🔥 5/5
LAN / MAN / WAN 🔥 5/5
Stack (LIFO) 🔥 5/5
Queue (FIFO) 🔥 5/5
SDLC 🔥 5/5
TCP/IP Model 🔥 5/5

📌 2️⃣ MOST REPEATED PROGRAMMING QUESTIONS

🔹 C++ Section (2021–2024 Pattern)

🔥 Very Important:

  • Define function outside class (4 times)

  • Classroom type program (2 times)

  • Constructor + Destructor program (4 times)

  • Linear Search (3 times)

  • Bubble Sort (3 times)

  • Queue Algorithm (4 times)

👉 Conclusion:
OOPS + Searching + Sorting = Guaranteed 8–12 Marks


🔹 Python Section (2025 Pattern Shift)

🔥 Newly repeated areas:

  • Exception Handling

  • Stack using List

  • File Handling

  • ZeroDivisionError

  • open() function

  • finally block

👉 Conclusion:
Exception Handling + Stack Program = Very Important for 2026


📌 3️⃣ DATABASE (SQL) – MOST REPEATED

Question Type Frequency
INSERT syntax 5/5
SUM() 4/5
MIN() 4/5
DDL Commands (CREATE, ALTER, DROP) 5/5
1NF Case Study 3/5
Primary Key 4/5

📌 4️⃣ NETWORKING – 100% REPEATED SECTION

Every year networking questions are asked from:

  • LAN / MAN / WAN

  • Star / Ring topology

  • TCP/IP layers

  • SMTP

  • Router

  • Bandwidth

  • Firewall

👉 Networking = Safe Scoring Area (6–8 Marks Every Year)


📌 5️⃣ MARKS DISTRIBUTION TREND (2021–2025)

Section Average Marks
OOPS 8–10
SQL 6–8
Data Structure 6–8
Networking 6–8
SDLC / Testing 4–6

🎯 6️⃣ 2026 PREDICTION (Based on Trend)

🔥 90% Expected for 2026:

  1. Constructor + Destructor (4 Marks)

  2. Inheritance Types

  3. Linear Search OR Bubble Sort

  4. Stack / Queue Algorithm

  5. INSERT + SUM SQL

  6. 2NF Case Study

  7. SDLC Phases

  8. TCP/IP Model

  9. Star vs Ring

  10. Exception Handling (if Python continues)


📘 7️⃣ ONE SHOT REVISION STRATEGY (For Your Live Class)

Principal Sir 🙏
You can structure your revision like this:

Day 1 – OOPS Master

Constructor
Destructor
Inheritance
Function Outside Class

Day 2 – Data Structure

Stack
Queue
Linear Search
Bubble Sort

Day 3 – SQL Master

INSERT
SUM
MIN
DDL
Normalization

Day 4 – Networking + SDLC

LAN / MAN / WAN
TCP/IP
Star / Ring
Firewall
SDLC

👉 This 4-Day Plan Covers 80–90% Paper.


🚀 MOST IMPORTANT 10 QUESTIONS (Write on Board in Live Class)

  1. Types of Constructor

  2. Destructor with Example

  3. Inheritance Types

  4. Linear Search Algorithm

  5. Bubble Sort

  6. INSERT Syntax

  7. Define 2NF

  8. TCP/IP Layers

  9. Star vs Ring

  10. SDLC Phases


📢 FINAL CONCLUSION

✔ OOPS + SQL + Networking = 70% Paper
✔ These topics repeated every year
✔ Smart preparation → Easy 35+/40

📝 HBSE CLASS 12 – COMPUTER SCIENCE (2026 Prediction)

Time: 3 Hours
Maximum Marks: 40


🔷 SECTION – A (Objective Type)

(1 × 10 = 10 Marks)

  1. (i) Which of the following is a type of constructor?
    (A) Destructor
    (B) Default Constructor
    (C) Operator
    (D) Class

(ii) Which SQL function is used to calculate total value?
(A) COUNT()
(B) MAX()
(C) SUM()
(D) AVG()

(iii) Stack follows which principle?
(A) FIFO
(B) LIFO
(C) FILO
(D) None

(iv) Which topology uses a central hub?
(A) Ring
(B) Bus
(C) Star
(D) Mesh

(v) The INSERT command belongs to:
(A) DDL
(B) DML
(C) DCL
(D) TCL

(vi) Which protocol is used to send emails?
(A) HTTP
(B) FTP
(C) SMTP
(D) TCP

(vii) The finally block executes only if error occurs.
(True / False)

(viii) The primary key can contain duplicate values.
(True / False)

(ix) Assertion: TCP ensures reliable communication.
Reason: TCP uses error checking and acknowledgment.

(A) Both true and reason explains
(B) Both true but reason not correct
(C) Assertion true, reason false
(D) Assertion false

(x) Assertion: Normalization reduces redundancy.
Reason: It organizes data into smaller related tables.

(A) Both true and reason explains
(B) Both true but reason not correct
(C) Assertion true, reason false
(D) Assertion false


🔷 SECTION – B (Very Short Answer)

(1 × 5 = 5 Marks)

  1. Define Destructor with syntax.

OR
What is ZeroDivisionError in Python?


  1. Define 2NF.


  1. Write syntax of INSERT command.


  1. What is LAN?


  1. Define Stack.


🔷 SECTION – C (Short Answer Type)

(2 × 5 = 10 Marks)

  1. Explain types of Constructors with example.

OR
Explain Destructor with example.


  1. Write algorithm for insertion in a Linear Queue.


  1. Explain SUM() function with example.


  1. What is SDLC? Explain any two phases.


  1. Explain Star and Ring topology.


🔷 SECTION – D (Long Answer Type)

(4 × 3 = 12 Marks)

  1. Write a C++ program to define a class “Student” with data members roll and marks.
    Include:

  • Constructor

  • display() function

OR
Write Python program to implement Stack using list.


  1. Explain Inheritance in C++. Explain any three types with diagram.

OR
Explain TCP/IP model and its layers.


  1. Explain Linear Search with algorithm and example.

OR
Explain Bubble Sort with example and passes.


🔷 INTERNAL CHOICE EXTRA (Case Study Type – 3 Marks)

  1. A table Student_Course contains:
    Roll | Name | Course (Maths, Hindi)

(i) Is table in 1NF?
(ii) If not, convert it into 1NF.
(iii) Define Primary Key.


🎯 MARKS DISTRIBUTION (Expected)

OOPS → 10 Marks
Data Structure → 8 Marks
SQL → 8 Marks
Networking → 8 Marks
SDLC → 4 Marks


🔥 WHY THIS PAPER IS STRONG PREDICTION?

Based on 5-year repetition:

✔ Constructor asked 4/5 years
✔ INSERT asked 5/5 years
✔ Stack/Queue asked 5/5 years
✔ TCP/IP asked 5/5 years
✔ 2NF asked 5/5 years
✔ SDLC asked 5/5 years

🔥 200 Rapid Fire MCQs
For HBSE Class 12 Computer Science (2026 Board Focused)
Based on 2021–2025 repeated trends.

Pattern:
✔ OOPS
✔ Data Structure
✔ SQL
✔ Networking
✔ SDLC
✔ Python (New Pattern)


🔥 PART 1 – OOPS (1–40)

  1. Constructor name must be same as:
    A) Function
    B) Class
    C) Variable
    D) Object

  2. Constructor is called:
    A) Manually
    B) Automatically
    C) Rarely
    D) Never

  3. Destructor is preceded by symbol:
    A) #
    B) @
    C) ~
    D) &

  4. Constructor with no parameters is:
    A) Copy
    B) Default
    C) Derived
    D) Static

  5. Inheritance allows:
    A) Deletion
    B) Reuse
    C) Loop
    D) Sorting

  6. Base class is also called:
    A) Parent
    B) Child
    C) Derived
    D) Object

  7. Derived class is also called:
    A) Parent
    B) Child
    C) Root
    D) Master

  8. Protected members are accessible in:
    A) Same class only
    B) Derived class
    C) Outside program
    D) Nowhere

  9. Private members are accessible in:
    A) Anywhere
    B) Same class only
    C) Derived only
    D) Global

  10. Function defined outside class uses:
    A) .
    B) ::
    C) ->
    D) #

🔥 PART 2 – DATA STRUCTURE (41–80)

  1. Stack follows:
    A) FIFO
    B) LIFO
    C) LILO
    D) FILO

  2. Insertion in stack is called:
    A) Enqueue
    B) Push
    C) Pop
    D) Delete

  3. Deletion in stack is called:
    A) Push
    B) Pop
    C) Insert
    D) Append

  4. Queue follows:
    A) FIFO
    B) LIFO
    C) FILO
    D) LILO

  5. Insertion in queue is:
    A) Push
    B) Enqueue
    C) Pop
    D) Delete

  6. Deletion in queue is:
    A) Enqueue
    B) Dequeue
    C) Insert
    D) Append

  7. Linear search complexity:
    A) O(1)
    B) O(log n)
    C) O(n)
    D) O(n²)

  8. Bubble sort complexity:
    A) O(n)
    B) O(log n)
    C) O(n²)
    D) O(1)

  1. Stack Overflow occurs when:
    A) Stack is empty
    B) Stack is full
    C) Stack is half
    D) Stack is sorted

  2. Stack Underflow occurs when:
    A) Stack is full
    B) Stack is empty
    C) Stack is large
    D) Stack is new

  3. Queue Overflow occurs when:
    A) FRONT = -1
    B) REAR = MAX-1
    C) REAR = 0
    D) FRONT = MAX

  4. Queue Underflow occurs when:
    A) FRONT = -1
    B) REAR = MAX-1
    C) FRONT = 0
    D) REAR = 0

  5. In Linear Queue, insertion takes place at:
    A) FRONT
    B) REAR
    C) Middle
    D) Anywhere

  6. In Linear Queue, deletion takes place at:
    A) REAR
    B) FRONT
    C) Middle
    D) End

  7. Bubble Sort compares:
    A) First & Last elements
    B) Adjacent elements
    C) Random elements
    D) Middle elements

  8. In Bubble Sort, after first pass, the ______ element is placed correctly.
    A) Smallest
    B) Largest
    C) Middle
    D) Random

  9. If array has 5 elements, maximum passes in Bubble Sort are:
    A) 3
    B) 4
    C) 5
    D) 6

  10. Worst case time complexity of Bubble Sort is:
    A) O(1)
    B) O(n)
    C) O(n log n)
    D) O(n²)

  11. Linear Search checks elements:
    A) Randomly
    B) From start to end
    C) From end only
    D) Middle first

  12. If element is not found in Linear Search, algorithm returns:
    A) 0
    B) -1
    C) 1
    D) MAX

  13. Data structure that allows insertion and deletion at both ends is:
    A) Stack
    B) Queue
    C) Deque
    D) Array

  14. Which of the following is not a linear data structure?
    A) Stack
    B) Queue
    C) Tree
    D) Array

  15. In Stack, top pointer indicates:
    A) First element
    B) Last inserted element
    C) Middle element
    D) Smallest element

  16. In Queue, FRONT points to:
    A) Last element
    B) First element
    C) Middle element
    D) Largest element

  17. In Queue, REAR points to:
    A) First element
    B) Last element
    C) Middle
    D) None

  18. Searching technique that works only on sorted list:
    A) Linear Search
    B) Binary Search
    C) Bubble Sort
    D) Push

  19. Time complexity of Binary Search is:
    A) O(n)
    B) O(n²)
    C) O(log n)
    D) O(1)

  20. Binary Search divides array into:
    A) 3 parts
    B) 2 equal halves
    C) Random parts
    D) 4 parts

  21. In Bubble Sort, if no swapping occurs in a pass, it means:
    A) Array is reversed
    B) Array is sorted
    C) Array is empty
    D) Array is large

  22. For n elements, maximum comparisons in Bubble Sort are:
    A) n
    B) n-1
    C) n(n-1)/2
    D) n²

  23. In stack implemented using array, initial value of TOP is:
    A) 0
    B) 1
    C) -1
    D) MAX

  24. After pushing one element in empty stack, TOP becomes:
    A) -1
    B) 0
    C) 1
    D) MAX

  25. In queue, initial value of FRONT and REAR is usually:
    A) 0
    B) 1
    C) -1
    D) MAX

  26. Circular Queue solves problem of:
    A) Overflow
    B) Underflow
    C) Wastage of space
    D) Sorting

  27. In Circular Queue, next position is calculated using:
    A) i+1
    B) i-1
    C) (i+1) % MAX
    D) MAX-i

  28. Deleting element from stack is called:
    A) Push
    B) Pop
    C) Enqueue
    D) Delete

  29. In Linear Queue, when FRONT > REAR, queue becomes:
    A) Full
    B) Sorted
    C) Empty
    D) Overflow

  30. Stack is also known as:
    A) Priority List
    B) Linear List
    C) Pile
    D) Tree

  31. Queue is also known as:
    A) Waiting Line
    B) Stack
    C) Heap
    D) Tree

  32. In Bubble Sort, total passes required for n elements are:
    A) n
    B) n-1
    C) n+1
    D) n²

🔥 PART 3 – SQL (81–120)

  1. SQL stands for:
    A) Structured Query Language
    B) Simple Query Language
    C) Standard Query Logic
    D) Structured Queue Language

  2. INSERT belongs to:
    A) DDL
    B) DML
    C) DCL
    D) TCL

  3. CREATE belongs to:
    A) DDL
    B) DML
    C) DCL
    D) TCL

  4. SUM() is:
    A) Scalar
    B) Aggregate
    C) Logical
    D) Arithmetic

  5. MIN() returns:
    A) Maximum
    B) Minimum
    C) Average
    D) Count

  1. DELETE command is used to:
    A) Remove table structure
    B) Remove records
    C) Modify table name
    D) Create database

  2. UPDATE command is used to:
    A) Add new table
    B) Modify existing records
    C) Delete table
    D) Remove column

  3. Syntax of UPDATE includes which clause to specify condition?
    A) GROUP BY
    B) ORDER BY
    C) WHERE
    D) HAVING

  4. PRIMARY KEY must be:
    A) Duplicate
    B) Null
    C) Unique and Not Null
    D) Sorted

  5. A table can have how many primary keys?
    A) One
    B) Two
    C) Many
    D) Unlimited

  6. FOREIGN KEY is used to:
    A) Uniquely identify record
    B) Link two tables
    C) Sort data
    D) Delete data

  7. Foreign Key references:
    A) Any column
    B) Primary key of another table
    C) Duplicate column
    D) NULL column

  8. 1NF requires:
    A) Multiple values in a cell
    B) Atomic values
    C) Duplicate rows
    D) No key

  9. 2NF removes:
    A) Partial dependency
    B) Full dependency
    C) Redundancy only
    D) Primary key

  10. 3NF removes:
    A) Partial dependency
    B) Transitive dependency
    C) Duplicate rows
    D) Sorting

  11. ORDER BY clause is used to:
    A) Filter rows
    B) Group rows
    C) Sort result
    D) Delete rows

  12. Default sorting order in ORDER BY is:
    A) DESC
    B) RANDOM
    C) ASC
    D) NONE

  13. GROUP BY clause is used to:
    A) Combine tables
    B) Group rows with same values
    C) Sort rows
    D) Delete groups

  14. Aggregate functions are used with:
    A) WHERE
    B) SELECT
    C) DROP
    D) ALTER

  15. COUNT() function returns:
    A) Sum
    B) Maximum
    C) Total number of rows
    D) Minimum

    Q.No Ans Q.No Ans Q.No Ans Q.No Ans
    1 B 26 A 51 B 76 B
    2 B 27 B 52 A 77 C
    3 C 28 B 53 B 78 C
    4 B 29 B 54 B 79 A
    5 B 30 A 55 B 80 B
    6 A 31 B 56 B 81 A
    7 B 32 C 57 B 82 B
    8 B 33 B 58 D 83 A
    9 B 34 C 59 B 84 B
    10 B 35 B 60 B 85 B
    11 A 36 B 61 C 86 B
    12 B 37 D 62 C 87 B
    13 A 38 C 63 B 88 C
    14 A 39 B 64 B 89 C
    15 C 40 A 65 B 90 A
    16 B 41 B 66 B 91 B
    17 B 42 B 67 C 92 B
    18 A 43 B 68 B 93 B
    19 D 44 A 69 B 94 A
    20 B 45 B 70 C 95 B
    21 B 46 B 71 C 96 C
    22 B 47 C 72 B 97 C
    23 B 48 C 73 C 98 B
    24 B 49 B 74 C 99 B
    25 B 50 B 75 C 100 C
  16. Which command removes entire table structure?
    A) DELETE
    B) REMOVE
    C) DROP
    D) UPDATE

  17. ALTER command is used to:
    A) Delete records
    B) Modify table structure
    C) Sort data
    D) Insert data

  18. NOT NULL constraint ensures:
    A) Unique values
    B) No empty value
    C) Sorted data
    D) Multiple keys

  19. UNIQUE constraint ensures:
    A) Duplicate values allowed
    B) Only NULL values
    C) No duplicate values
    D) Multiple primary keys

  20. Which clause filters rows?
    A) WHERE
    B) GROUP BY
    C) ORDER BY
    D) SELECT

  21. SQL statement used to retrieve data:
    A) GET
    B) SELECT
    C) FETCH
    D) OPEN

  22. HAVING clause is used with:
    A) WHERE
    B) ORDER BY
    C) GROUP BY
    D) INSERT

  23. Difference between WHERE and HAVING:
    A) No difference
    B) WHERE filters before grouping
    C) HAVING filters before grouping
    D) Both same

  24. Composite Primary Key means:
    A) Two primary keys
    B) Combination of columns as primary key
    C) No key
    D) Duplicate key

  25. Which command adds a column?
    A) INSERT
    B) UPDATE
    C) ALTER
    D) DELETE

  26. DELETE without WHERE clause will:
    A) Delete one row
    B) Delete all rows
    C) Delete table
    D) Give error

  27. TRUNCATE command:
    A) Deletes structure
    B) Deletes all rows quickly
    C) Modifies table
    D) Adds column

  28. SQL is case sensitive for:
    A) Keywords
    B) Table names (depends on DBMS)
    C) Numbers
    D) None

  29. Referential Integrity is maintained by:
    A) Primary Key
    B) Foreign Key
    C) Unique Key
    D) NULL

  30. Candidate Key is:
    A) Duplicate key
    B) Possible primary key
    C) Foreign key
    D) Secondary key

  31. Which normal form eliminates repeating groups?
    A) 1NF
    B) 2NF
    C) 3NF
    D) BCNF

  32. Partial dependency occurs in:
    A) 1NF
    B) 2NF
    C) 3NF
    D) 4NF

  33. Transitive dependency is removed in:
    A) 1NF
    B) 2NF
    C) 3NF
    D) None

  34. SQL command to change table name:
    A) UPDATE
    B) RENAME
    C) MODIFY
    D) DELETE

  35. Which SQL clause is executed first logically?
    A) SELECT
    B) ORDER BY
    C) WHERE
    D) FROM


🔥 PART 4 – NETWORKING (121–160)

  1. LAN covers:
    A) Country
    B) City
    C) Small area
    D) World

  2. WAN covers:
    A) Office
    B) City
    C) Large area
    D) Room

  3. Topology with central hub:
    A) Ring
    B) Star
    C) Bus
    D) Mesh

  4. SMTP is used for:
    A) Browsing
    B) Sending Email
    C) Downloading
    D) Searching

  5. TCP ensures:
    A) Fast
    B) Reliable
    C) Weak
    D) No control

  1. A Router is used to:
    A) Store data
    B) Connect different networks
    C) Print documents
    D) Edit files

  2. Router works at which layer of TCP/IP model?
    A) Application
    B) Transport
    C) Internet
    D) Network Access

  3. A Modem converts:
    A) Analog to Analog
    B) Digital to Digital
    C) Digital to Analog and vice versa
    D) Data to Text

  4. Modem stands for:
    A) Modulator Device
    B) Modulator-Demodulator
    C) Mode-Demo
    D) Modern Device

  5. Firewall is used for:
    A) Increasing speed
    B) Network security
    C) Connecting cables
    D) Data storage

  6. Firewall protects against:
    A) Hardware failure
    B) Cyber attacks
    C) Power failure
    D) Printer errors

  7. Bandwidth refers to:
    A) Storage capacity
    B) Data transfer rate
    C) Network size
    D) Cable length

  8. Higher bandwidth means:
    A) Slower speed
    B) Faster data transfer
    C) No change
    D) Data loss

  9. TCP stands for:
    A) Transmission Control Protocol
    B) Transfer Communication Process
    C) Technical Control Program
    D) Transmission Communication Port

  10. IP stands for:
    A) Internet Process
    B) Internal Protocol
    C) Internet Protocol
    D) Information Port

  11. TCP ensures:
    A) Fast transfer only
    B) Reliable data transmission
    C) No error checking
    D) Unsecured data

  12. UDP is:
    A) Reliable protocol
    B) Connection-oriented
    C) Faster but unreliable
    D) Used only for email

  13. HTTP stands for:
    A) Hyper Text Transfer Protocol
    B) High Text Transfer Process
    C) Hyper Transfer Text Program
    D) Host Transfer Protocol

  14. HTTP is mainly used for:
    A) Sending emails
    B) File transfer
    C) Web browsing
    D) Database management

  15. HTTPS provides:
    A) Faster speed
    B) Encryption
    C) No security
    D) Open access

  16. FTP stands for:
    A) File Transfer Protocol
    B) Fast Text Process
    C) File Transport Port
    D) Format Transfer Protocol

  17. FTP is used to:
    A) Browse web
    B) Send emails
    C) Transfer files
    D) Design website

  18. WWW stands for:
    A) World Wide Web
    B) Web World Wide
    C) World Web Window
    D) Wide World Web

  19. WWW is a collection of:
    A) Computers
    B) Servers
    C) Web pages
    D) Routers

  20. URL stands for:
    A) Uniform Resource Locator
    B) Universal Resource Link
    C) Unified Resource Location
    D) Uniform Record Locator

  21. DNS is used to:
    A) Store files
    B) Convert domain name to IP address
    C) Send emails
    D) Block websites

  22. SMTP is used for:
    A) Receiving emails
    B) Sending emails
    C) Browsing
    D) Searching

  23. POP3 is used for:
    A) Sending emails
    B) Receiving emails
    C) File transfer
    D) Browsing

  24. Network topology refers to:
    A) Network speed
    B) Network layout
    C) Network security
    D) Network size

  25. Star topology uses:
    A) Ring cable
    B) Central hub
    C) No cable
    D) Mesh network

  26. Ring topology forms:
    A) Star shape
    B) Circular path
    C) Linear path
    D) Random structure

  27. Bus topology uses:
    A) Central hub
    B) Backbone cable
    C) Circular cable
    D) No cable

  28. WAN covers:
    A) Small room
    B) Building
    C) City
    D) Large geographical area

  29. LAN covers:
    A) Country
    B) Continent
    C) Small area
    D) World

  30. MAN covers:
    A) School
    B) Office
    C) City
    D) Country

  31. Gateway is used to:
    A) Connect similar networks
    B) Connect different networks with different protocols
    C) Store data
    D) Sort data

  32. NIC stands for:
    A) Network Internet Card
    B) Network Interface Card
    C) Network Internal Cable
    D) Network Input Code

  33. Packet switching divides data into:
    A) Blocks
    B) Files
    C) Packets
    D) Frames

  34. Internet layer of TCP/IP handles:
    A) Data formatting
    B) Logical addressing
    C) File storage
    D) Encryption

  35. Application layer in TCP/IP provides services to:
    A) Network devices
    B) End users
    C) Routers
    D) Modems


🔥 PART 5 – SDLC & TESTING (161–180)

  1. First phase of SDLC:
    A) Design
    B) Testing
    C) Requirement Analysis
    D) Coding

  2. Testing without knowing internal code:
    A) White Box
    B) Black Box
    C) Unit
    D) Alpha

  1. Integration Testing is performed after:
    A) Maintenance
    B) Unit Testing
    C) Deployment
    D) Design

  2. Integration Testing checks:
    A) Individual modules
    B) Combined modules working together
    C) Hardware only
    D) User interface only

  3. Unit Testing is done on:
    A) Entire system
    B) Individual module
    C) Network
    D) Database

  4. System Testing is done to test:
    A) Single function
    B) Complete system
    C) Only database
    D) Only UI

  5. Black Box Testing focuses on:
    A) Internal code
    B) External behavior
    C) Memory usage
    D) Server speed

  6. White Box Testing focuses on:
    A) Output only
    B) Internal logic
    C) Design only
    D) User requirements

  7. Alpha Testing is performed by:
    A) Customers
    B) Developers
    C) Government
    D) Hackers

  8. Beta Testing is performed by:
    A) Developers
    B) End users
    C) Testers only
    D) Network admin

  9. Maintenance phase comes after:
    A) Requirement
    B) Design
    C) Implementation
    D) Deployment

  10. Correct order of SDLC phases is:
    A) Design → Requirement → Testing
    B) Requirement → Design → Implementation → Testing → Maintenance
    C) Testing → Coding → Requirement
    D) Implementation → Design → Requirement

  11. Requirement Analysis phase involves:
    A) Coding
    B) Collecting user needs
    C) Testing modules
    D) Deleting data

  12. Design phase prepares:
    A) Code
    B) Blueprint of system
    C) Database deletion
    D) Reports only

  13. Implementation phase includes:
    A) Coding
    B) Maintenance
    C) Testing
    D) Requirement gathering

  14. Testing phase ensures:
    A) No coding
    B) Error detection
    C) Network installation
    D) Database creation

  15. Maintenance includes:
    A) Writing new code only
    B) Correcting errors after deployment
    C) Designing system
    D) Testing modules

  16. Feasibility study is done during:
    A) Testing
    B) Requirement Analysis
    C) Maintenance
    D) Implementation

  17. Corrective Maintenance is done to:
    A) Improve performance
    B) Fix errors
    C) Add new features
    D) Change design

  18. Adaptive Maintenance is done to:
    A) Remove system
    B) Adapt to new environment
    C) Delete database
    D) Stop testing

  19. Exception handling in Python is done using:
    A) if-else
    B) try-except
    C) for loop
    D) while loop

  20. The try block contains:
    A) Normal code
    B) Risky code
    C) Error message
    D) File name

  21. The except block executes when:
    A) No error occurs
    B) Error occurs
    C) Loop ends
    D) File closes

  22. finally block executes:
    A) Only when error occurs
    B) Only when no error
    C) Always
    D) Never

  23. ZeroDivisionError occurs when:
    A) Add numbers
    B) Multiply numbers
    C) Divide by zero
    D) Subtract numbers

  24. Syntax to open a file is:
    A) file()
    B) open()
    C) read()
    D) write()

  25. Default mode of open() function is:
    A) w
    B) r
    C) a
    D) x

  26. Mode ‘w’ in open() is used to:
    A) Read file
    B) Write file (overwrite)
    C) Append file
    D) Delete file

  27. Mode ‘a’ in open() is used to:
    A) Read file
    B) Append data
    C) Delete data
    D) Rename file

  28. File is closed using:
    A) end()
    B) close()
    C) stop()
    D) exit()

  29. If file is not closed properly, it may cause:
    A) Faster speed
    B) Data corruption
    C) No issue
    D) Sorting

  30. read() function is used to:
    A) Write file
    B) Delete file
    C) Read file content
    D) Close file

  31. write() function is used to:
    A) Read file
    B) Write data into file
    C) Delete file
    D) Search file

  32. Which data structure in Python can be used to implement Stack?
    A) Tuple
    B) List
    C) Dictionary
    D) Set

  33. append() method is used to:
    A) Remove element
    B) Add element at end
    C) Sort list
    D) Delete list

  34. pop() method in list is used to:
    A) Insert element
    B) Delete last element
    C) Read file
    D) Close program

  35. write() function is used to:
    A) Read file
    B) Write data into file
    C) Delete file
    D) Search file

  36. Which data structure in Python can be used to implement Stack?
    A) Tuple
    B) List
    C) Dictionary
    D) Set

  37. append() method is used to:
    A) Remove element
    B) Add element at end
    C) Sort list
    D) Delete list

  38. pop() method in list is used to:
    A) Insert element
    B) Delete last element
    C) Read file
    D) Close program

    Q.No Ans Q.No Ans Q.No Ans Q.No Ans
    101 C 126 B 151 B 176 B
    102 B 127 C 152 B 177 B
    103 B 128 C 153 D 178 B
    104 C 129 B 154 C 179 B
    105 A 130 B 155 C 180 B
    106 B 131 B 156 B 181 A
    107 C 132 B 157 B 182 B
    108 B 133 B 158 C 183 C
    109 B 134 A 159 B 184 A
    110 C 135 C 160 B 185 B
    111 B 136 B 161 C 186 B
    112 B 137 C 162 B 187 B
    113 B 138 A 163 B 188 C
    114 B 139 C 164 B 189 C
    115 B 140 B 165 B 190 B
    116 A 141 A 166 B 191 B
    117 B 142 C 167 B 192 B
    118 C 143 A 168 B 193 B
    119 B 144 C 169 B 194 B
    120 D 145 A 170 B 195 B
    121 C 146 B 171 D 196 C
    122 D 147 B 172 B 197 B
    123 B 148 B 173 B 198 B
    124 C 149 B 174 B 199 B
    125 B 150 B 175 A 200 B

📘 HBSE Class 12 Computer Science – 100 Best Quick Revision Points (With Explanation)

🔥 PART 1 – OOPS (1–20)

1️⃣ Class – Blueprint to create objects.
2️⃣ Object – Instance of a class.
3️⃣ Constructor – Special function called automatically when object is created.
4️⃣ Default Constructor – No parameters.
5️⃣ Parameterized Constructor – Takes arguments.
6️⃣ Destructor – Called automatically when object is destroyed (symbol ~).
7️⃣ Inheritance – Acquiring properties of another class.
8️⃣ Base Class – Parent class.
9️⃣ Derived Class – Child class.
🔟 Single Inheritance – One base, one derived.

11️⃣ Multiple Inheritance – One class inherits from more than one base class.
12️⃣ Multilevel Inheritance – A → B → C chain.
13️⃣ Access Specifiers – public, private, protected.
14️⃣ Public – Accessible everywhere.
15️⃣ Private – Accessible only inside class.
16️⃣ Protected – Accessible inside class + derived class.
17️⃣ Scope Resolution Operator (::) – Defines function outside class.
18️⃣ Encapsulation – Wrapping data + functions together.
19️⃣ Polymorphism – Same function, different behavior.
20️⃣ Function Overloading – Same function name, different parameters.


🔥 PART 2 – DATA STRUCTURE (21–40)

21️⃣ Stack – Linear data structure (LIFO).
22️⃣ Push – Insert element in stack.
23️⃣ Pop – Remove element from stack.
24️⃣ Stack Overflow – When stack is full.
25️⃣ Stack Underflow – When stack is empty.
26️⃣ Queue – Linear data structure (FIFO).
27️⃣ Enqueue – Insert in queue.
28️⃣ Dequeue – Remove from queue.
29️⃣ Queue Overflow – REAR = MAX-1.
30️⃣ Queue Underflow – FRONT = -1 or FRONT > REAR.

31️⃣ Linear Search – Checks elements one by one.
32️⃣ Linear Search Time Complexity – O(n).
33️⃣ Binary Search – Works on sorted array.
34️⃣ Binary Search Complexity – O(log n).
35️⃣ Bubble Sort – Compares adjacent elements.
36️⃣ After 1st pass (Bubble Sort) – Largest element placed correctly.
37️⃣ Bubble Sort Complexity – O(n²).
38️⃣ Circular Queue – Solves space wastage problem.
39️⃣ TOP Pointer – Indicates last inserted element in stack.
40️⃣ FRONT & REAR – Used in queue.


🔥 PART 3 – SQL & DATABASE (41–65)

41️⃣ SQL – Structured Query Language.
42️⃣ DDL – CREATE, ALTER, DROP.
43️⃣ DML – INSERT, UPDATE, DELETE, SELECT.
44️⃣ DCL – GRANT, REVOKE.
45️⃣ CREATE – Creates table.
46️⃣ DROP – Deletes table permanently.
47️⃣ ALTER – Modifies table structure.
48️⃣ INSERT – Adds new records.
49️⃣ UPDATE – Modifies records.
50️⃣ DELETE – Deletes records.

51️⃣ SELECT – Retrieves data.
52️⃣ WHERE – Filters rows.
53️⃣ ORDER BY – Sorts result.
54️⃣ GROUP BY – Groups similar values.
55️⃣ HAVING – Filters grouped data.
56️⃣ SUM() – Returns total.
57️⃣ MIN() – Returns smallest value.
58️⃣ MAX() – Returns largest value.
59️⃣ COUNT() – Returns number of rows.
60️⃣ Primary Key – Unique & Not Null.

61️⃣ Foreign Key – Links two tables.
62️⃣ 1NF – Atomic values only.
63️⃣ 2NF – No partial dependency.
64️⃣ 3NF – No transitive dependency.
65️⃣ Normalization – Reduces redundancy.


🔥 PART 4 – NETWORKING (66–85)

66️⃣ LAN – Small area network.
67️⃣ MAN – City-level network.
68️⃣ WAN – Large geographical network.
69️⃣ Topology – Layout of network.
70️⃣ Star Topology – Central hub.
71️⃣ Ring Topology – Circular connection.
72️⃣ Bus Topology – Backbone cable.
73️⃣ Router – Connects different networks.
74️⃣ Modem – Modulator-Demodulator.
75️⃣ Firewall – Protects network from attacks.

76️⃣ Bandwidth – Data transfer rate.
77️⃣ Higher Bandwidth – Faster speed.
78️⃣ TCP – Reliable transmission.
79️⃣ UDP – Faster but unreliable.
80️⃣ IP – Logical addressing.
81️⃣ TCP/IP Model – 4 layers.
82️⃣ Application Layer – User services.
83️⃣ Transport Layer – Reliable communication.
84️⃣ Internet Layer – IP addressing.
85️⃣ Network Access Layer – Physical transmission.


🔥 PART 5 – SDLC & TESTING (86–95)

86️⃣ SDLC – System Development Life Cycle.
87️⃣ Requirement Analysis – Collect user needs.
88️⃣ Design Phase – Blueprint of system.
89️⃣ Implementation – Coding stage.
90️⃣ Testing – Error detection.
91️⃣ Maintenance – Updates & fixes.
92️⃣ Unit Testing – Individual module testing.
93️⃣ Integration Testing – Combined modules testing.
94️⃣ Black Box Testing – Without internal knowledge.
95️⃣ White Box Testing – Tests internal logic.


🔥 PART 6 – PYTHON (96–100)

96️⃣ try block – Contains risky code.
97️⃣ except block – Handles error.
98️⃣ finally block – Always executes.
99️⃣ open() – Opens file.
🔟0️⃣ close() – Closes file & frees resources.


🎯 FINAL EXAM STRATEGY

If students revise these 100 points:

✔ OOPS → 8–10 marks safe
✔ SQL → 6–8 marks safe
✔ Data Structure → 6–8 marks safe
✔ Networking → 6–8 marks safe
✔ SDLC/Python → 4–6 marks safe

👉 Target Score: 35+/40


PROGRAMMING SYMBOLS (C++ / Python / SQL)

Symbol Name
:: Scope Resolution Operator
-> Arrow Operator
# Hash
@ At Symbol
~ Tilde
&& Logical AND
== Equal Comparison
!= Not Equal
++ Increment
Decrement
* Asterisk
& Ampersand
<> Not Equal (SQL)
; Statement Terminator

📘 1️⃣ SYMBOLS USED IN PROGRAMMING ONLY (C++ / Python / SQL)

🔹 Basic Programming Symbols

Symbol Name Use
; Semicolon Ends statement (C++)
{} Curly Braces Block of code
() Parentheses Function call / condition
[] Square Brackets Array / Index
= Assignment Operator Assign value
== Equal Comparison Compare values
!= Not Equal Comparison
> Greater Than Comparison
< Less Than Comparison
>= Greater Equal Comparison
<= Less Equal Comparison

🔹 Logical Symbols

Symbol Name
&& Logical AND
! Logical NOT

🔹 Arithmetic Symbols

Symbol Name
+ Addition
Subtraction
* Multiplication
/ Division
% Modulus
++ Increment
Decrement

🔹 Special C++ Symbols

Symbol Name Use
:: Scope Resolution Define function outside class
-> Arrow Operator Access pointer members
& Address Operator
* Pointer Operator
#include Preprocessor
~ Destructor
<< Insertion Operator
>> Extraction Operator

🔹 Python Specific Symbols

Symbol Use
: After if, for, def
# Comment
“”” “”” Multi-line string
== Comparison
+= Add and assign
-= Subtract and assign

📘 2️⃣ ALL C++ OPERATORS LIST (Complete)

🔹 1. Arithmetic Operators

      • / % ++ —


🔹 2. Relational Operators

== != > < >= <=


🔹 3. Logical Operators

&& || !


🔹 4. Assignment Operators

= += -= *= /= %=


🔹 5. Bitwise Operators

& | ^ ~ << >>


🔹 6. Conditional Operator

? : (Ternary Operator)

Example:
x > y ? x : y


🔹 7. Special Operators

Operator Name
sizeof Size Operator
& Address Of
* Pointer
-> Arrow
:: Scope Resolution

📘 3️⃣ ALL IMPORTANT SQL KEYWORDS LIST (Board Focused)

🔹 Data Definition Language (DDL)

CREATE
DROP
ALTER
TRUNCATE


🔹 Data Manipulation Language (DML)

INSERT
UPDATE
DELETE
SELECT


🔹 Data Control Language (DCL)

GRANT
REVOKE


🔹 Query Related Keywords

WHERE
GROUP BY
ORDER BY
HAVING
DISTINCT
FROM
IN
BETWEEN
LIKE
IS NULL
NOT NULL
ASC
DESC


🔹 Aggregate Functions

SUM()
COUNT()
MAX()
MIN()
AVG()


🔹 Constraints

PRIMARY KEY
FOREIGN KEY
UNIQUE
NOT NULL
CHECK
DEFAULT


📘 4️⃣ ALL NETWORKING ABBREVIATIONS (Very Important)

Abbreviation Full Form
LAN Local Area Network
MAN Metropolitan Area Network
WAN Wide Area Network
WWW World Wide Web
URL Uniform Resource Locator
HTTP Hyper Text Transfer Protocol
HTTPS Hyper Text Transfer Protocol Secure
FTP File Transfer Protocol
SMTP Simple Mail Transfer Protocol
POP3 Post Office Protocol
TCP Transmission Control Protocol
UDP User Datagram Protocol
IP Internet Protocol
TCP/IP Transmission Control Protocol / Internet Protocol
DNS Domain Name System
NIC Network Interface Card
ISP Internet Service Provider
GUI Graphical User Interface
OS Operating System

Leave a Comment

Your email address will not be published. Required fields are marked *