HBSE CLASS 12 COMPUTER SCIENCE 2026 PYQs +200 MCQs
✅ HBSE CLASS 12 COMPUTER SCIENCE
📘 PAPER 2021 (Code 5607, Set A)
🔹 Q1. What is a Constructor? Explain any two types of constructors. (4 Marks)
✅ Answer:
A constructor is a special member function of a class in C++ that is automatically called when an object of the class is created. It is used to initialize the data members of the class.
The name of the constructor is the same as the class name.
🔸 Types of Constructors:
1. Default Constructor
-
A constructor with no parameters.
-
It initializes data members with default values.
class Student {
public:
Student() {
cout << “Default Constructor Called”;
}
};
2. Parameterized Constructor
-
A constructor that takes arguments.
-
Used to initialize data members with user-defined values.
class Student {
int roll;
public:
Student(int r) {
roll = r;
}
};
🔹 Q2. Explain Public, Private and Protected class members. (4 Marks)
✅ Answer:
In C++, access specifiers define the accessibility of class members.
1. Public
-
Members declared as public can be accessed from outside the class.
-
Accessible everywhere.
class A {
public:
int x;
};
2. Private
-
Members declared as private cannot be accessed outside the class.
-
Accessible only within the class.
class A {
private:
int x;
};
3. Protected
-
Protected members are accessible inside the class and in derived classes.
-
Not accessible outside the class.
class A {
protected:
int x;
};
🔹 Q3. Create a class “Classroom” (4 Marks)
✅ Answer:
#include<iostream>
using namespace std;
class Classroom {
float length, width, height;
public:
void assign(float l, float w, float h) {
length = l;
width = w;
height = h;
}
float area() {
return length * width;
}
void display() {
cout << “Length: ” << length << endl;
cout << “Width: ” << width << endl;
cout << “Area: ” << area() << endl;
}
};
int main() {
Classroom c;
c.assign(10, 5, 8);
c.display();
return 0;
}
🔹 Q4. Difference between LAN and MAN (3 Marks)
| LAN | MAN |
|---|---|
| Local Area Network | Metropolitan Area Network |
| Covers small area (school, office) | Covers city area |
| High speed | Moderate speed |
| Privately owned | Usually government/private |
🔹 Q5. Define Inheritance. Explain Base class and Derived class. (3 Marks)
✅ Answer:
Inheritance is an OOP concept in which one class acquires the properties and behavior of another class.
-
Base Class: The class whose properties are inherited.
-
Derived Class: The class that inherits properties.
class Parent {
public:
void show() {
cout << “Base Class”;
}
};
class Child : public Parent {
};
🔹 Q6. How insertion takes place in a queue? (2 Marks)
Insertion in a queue is called Enqueue.
Steps:
-
Check if queue is full.
-
Increment REAR.
-
Insert element at REAR position.
Queue follows FIFO (First In First Out).
🔹 Q7. Define Normalization. (2 Marks)
Normalization is the process of organizing data in a database to:
-
Reduce redundancy
-
Avoid data inconsistency
It divides large tables into smaller related tables.
🔹 Q8. Define Web Browser. Give one example. (2 Marks)
A Web Browser is a software application used to access and view websites on the internet.
Example: Google Chrome
✅ HBSE CLASS 12 COMPUTER SCIENCE PAPER 2024 Set A
🔷 SECTION A (Objective Answers)
-
(i) FTP stands for → File Transfer Protocol
(ii) Smallest value SQL function → MIN()
(iii) Hyperlink tag → <a>
(iv) Stack removal order → SRQP
(v) Underline tag → <u>
(vi) Unary increment operator → ++
(vii) Structure statement → True
(viii) h1 least important → False
(ix) Assertion-Reason → Option D
(x) Assertion-Reason → Option A
🔷 SECTION B
Q2. Syntax of for loop in C++
for(initialization; condition; increment/decrement)
{
// statements
}
Q3. Two types of constructor
-
Default constructor
-
Parameterized constructor
Q4. Define 2NF
A table is in Second Normal Form (2NF) if:
-
It is in 1NF
-
No partial dependency exists
Q5. Syntax of INSERT
INSERT INTO table_name
VALUES (value1, value2, …);
✅ SECTION – A (Objective Type Questions)
(1 × 10 = 10 Marks)
1(i) What does FTP stand for?
✔ Answer: (C) File Transfer Protocol
1(ii) Which SQL function is used to retrieve the smallest value from a specific column?
✔ Answer: (B) MIN()
1(iii) Which HTML tag is used to create a hyperlink in a webpage?
✔ Answer: (C) <a>
1(iv) If elements “P”, “Q”, “R”, “S” are placed in a stack and deleted one at a time, in what order will they be removed?
Stack follows LIFO (Last In First Out).
✔ Answer: (C) SRQP
1(v) ______ tag is used for making the text underline in HTML.
✔ Answer: <u>
1(vi) ______ unary operator increments the value of the operand by 1.
✔ Answer: ++ (Increment operator)
1(vii) Structure is a user-defined data type that can contain variables of different data types.
✔ Answer: True
1(viii) The <h1> tag is used to define the least important heading.
✔ Answer: False
(h1 is the most important heading.)
1(ix) Assertion–Reason (SQL full form Simple Query Language)
Assertion is False (SQL = Structured Query Language)
Reason is True
✔ Correct Option: (D)
1(x) Assertion–Reason (URL and Browser use)
Both are correct and Reason explains Assertion
✔ Correct Option: (A)
✅ SECTION – B (Very Short Answer Type)
(1 × 4 = 4 Marks)
2. Write syntax of “for” loop in C++.
✔ Answer:
for(initialization; condition; increment/decrement)
{
// statements
}
3. Name any two types of constructor.
✔ Answer:
-
Default Constructor
-
Parameterized Constructor
4. Define 2NF.
✔ Answer:
A table is said to be in Second Normal Form (2NF) if:
-
It is in First Normal Form (1NF), and
-
There is no partial dependency (i.e., non-key attribute depends on whole primary key).
5. Write the syntax of INSERT command in SQL.
✔ Answer:
VALUES (value1, value2, …);
✅ SECTION – C (Short Answer Type)
(2 × 5 = 10 Marks)
6. Given table Student_Course (Check 1NF)
Table shows multiple values in Stu_Course column (e.g., Hindi, Maths).
(i) Is the table in 1NF?
✔ Answer: (B) No
Because 1NF requires atomic (single) values.
(ii) What is the key characteristic of 1NF?
✔ Answer: (C) Atomic/Single values in each column
OR
Explain any two DDL commands with example.
✔ Answer:
1. CREATE
Used to create a new table.
Roll INT,
Name VARCHAR(20)
);
2. DROP
Used to delete a table permanently.
DROP TABLE Student;
7. Explain how to define a function outside a class in C++.
✔ Answer:
When a function is declared inside a class but defined outside, scope resolution operator :: is used.
Example:
#include<iostream>
using namespace std;
class Sample {
public:
void display();
};
void Sample::display() {
cout << “Function defined outside class”;
}
int main() {
Sample s;
s.display();
}
8. Explain SUM() function in SQL with syntax.
✔ Answer:
SUM() is an aggregate function used to calculate total of a numeric column.
Syntax:
SELECT SUM(column_name)
FROM table_name;
SELECT SUM(Salary)
FROM Employee;
9. How to add image in a webpage using HTML?
✔ Answer:
Image is added using <img> tag.
Syntax:
<img src=”image.jpg” alt=”Image description”>
Example:
<img src=”flower.jpg” alt=”Flower Image”>
10. Case Study (Browser & Search Engine)
(i) Which is an example of a browser?
✔ Answer: (B) Google Chrome
(ii) Why does she use search engine for her project?
✔ Answer: (C) To find relevant information quickly
✅ SECTION – D (Essay Type Questions)
(4 × 4 = 16 Marks)
11. What is Linear Queue? Write algorithm to insert element in linear queue.
✔ Answer:
A Linear Queue is a linear data structure that follows FIFO (First In First Out).
Insertion is called Enqueue.
Algorithm for Enqueue:
-
If REAR = MAX-1 → Queue Overflow
-
If FRONT = -1 → Set FRONT = 0
-
Increment REAR
-
Insert element at Q[REAR]
OR
Explain Bubble Sort with example.
Bubble Sort repeatedly compares adjacent elements and swaps them if needed.
Example:
Array: 5 3 2 4
Pass 1 → 3 2 4 5
Pass 2 → 2 3 4 5
Sorted array → 2 3 4 5
12. What is SDLC? Explain any three phases.
✔ Answer:
SDLC (System Development Life Cycle) is a process used to develop software systematically.
Phases:
-
Requirement Analysis
-
Collect user requirements
-
-
Design
-
Plan system structure
-
-
Implementation
-
Coding and development
-
-
Testing
-
Checking errors
-
-
Maintenance
-
Updating software
-
(Any three explained)
OR
Explain:
(a) Black Box Testing
Testing without knowing internal code.
(b) White Box Testing
Testing internal logic of program.
(c) Unit Testing
Testing individual modules.
(d) Integration Testing
Testing combined modules.
13. Describe TCP/IP model and explain any two layers.
✔ Answer:
TCP/IP model has four layers:
-
Application Layer
-
Transport Layer
-
Internet Layer
-
Network Access Layer
Example:
Transport Layer:
-
Responsible for reliable data transfer
-
Uses TCP and UDP
Internet Layer:
-
Handles logical addressing
-
Uses IP protocol
OR
Explain:
(a) LAN – Small area network
(b) MAN – City-level network
(c) WAN – Large geographical network
(d) WWW – World Wide Web
14. Describe Inheritance in C++ and explain types.
✔ Answer:
Inheritance allows one class to acquire properties of another class.
Types:
-
Single Inheritance
-
Multiple Inheritance
-
Multilevel Inheritance
Example:
class A {};
class B : public A {};
OR
Explain Destructor in C++ with example.
A destructor is used to free resources when object is destroyed.
Syntax:
~ClassName() { }
Example:
class Test {
public:
~Test() {
cout << “Destructor Called”;
}
};
HBSE Class 12 Computer Science – 2023
✅ SECTION – A (Objective Type Questions)
(1 × 10 = 10 Marks)
1(i) What does FTP stand for?
✔ Answer: (C) File Transfer Protocol
1(ii) Which SQL function retrieves the smallest value from a column?
✔ Answer: (B) MIN()
1(iii) Which HTML tag is used to create a hyperlink?
✔ Answer: (C) <a>
1(iv) If P, Q, R, S are pushed in a stack, deletion order will be?
Stack follows LIFO → Last In First Out
✔ Answer: (C) SRQP
1(v) ______ tag is used to underline text in HTML.
✔ Answer: <u>
1(vi) ______ unary operator increments value by 1.
✔ Answer: ++
1(vii) Structure can contain different data types.
✔ Answer: True
1(viii) <h1> is the least important heading.
✔ Answer: False
1(ix) Assertion–Reason (SQL full form Simple Query Language)
Assertion False
Reason True
✔ Answer: (D)
1(x) Assertion–Reason (URL & browser use)
Both correct and reason explains assertion
✔ Answer: (A)
✅ SECTION – B (Very Short Answer Type)
(1 × 4 = 4 Marks)
2. Write syntax of for loop in C++.
✔ Answer:
for(initialization; condition; increment/decrement)
{
// statements
}
3. Name any two types of constructors.
✔ Answer:
-
Default Constructor
-
Parameterized Constructor
4. Define 2NF.
✔ Answer:
A table is in Second Normal Form if:
-
It is in 1NF
-
There is no partial dependency
5. Write syntax of INSERT command in SQL.
✔ Answer:
VALUES (value1, value2, …);
✅ SECTION – C (Short Answer Type)
(2 × 5 = 10 Marks)
6. Given Student_Course table – Check 1NF
Since course column contains multiple values (Hindi, Maths etc.), it violates atomic property.
(i) Is table in 1NF?
✔ Answer: (B) No
(ii) Key characteristic of 1NF?
✔ Answer: (C) Atomic/Single values in each column
OR
Explain any two DDL commands.
✔ Answer:
CREATE
CREATE TABLE Student (
Roll INT,
Name VARCHAR(20)
);
DROP
DROP TABLE Student;
7. Define a function outside class in C++.
✔ Answer:
Scope resolution operator :: is used.
class Sample {
public:
void display();
};
void Sample::display() {
cout << “Hello”;
}
8. Explain SUM() function.
✔ Answer:
SUM() calculates total of numeric column.
SELECT SUM(Salary)
FROM Employee;
9. Add image in webpage using HTML.
✔ Answer:
<img src=”image.jpg” alt=”Image”>
10. Case Study
(i) Example of browser → Google Chrome
(ii) Use of search engine → To find relevant information quickly
✅ SECTION – D (Essay Type Questions)
(4 × 4 = 16 Marks)
11. Linear Queue and Algorithm for insertion
Linear Queue follows FIFO principle.
Algorithm:
-
If REAR = MAX-1 → Overflow
-
If FRONT = -1 → FRONT = 0
-
REAR = REAR + 1
-
Insert element
OR
Bubble Sort
Repeatedly compares adjacent elements and swaps.
Example:
5 3 2 4
→ 3 2 4 5
→ 2 3 4 5
12. What is SDLC? Explain three phases.
SDLC is systematic process for software development.
Phases:
-
Requirement Analysis
-
Design
-
Implementation
-
Testing
-
Maintenance
OR
Explain:
Black Box Testing
White Box Testing
Unit Testing
Integration Testing
13. TCP/IP Model
Four layers:
-
Application
-
Transport
-
Internet
-
Network Access
Transport Layer ensures reliable communication.
Internet Layer handles IP addressing.
OR
Explain:
LAN
MAN
WAN
WWW
14. Inheritance in C++
Inheritance allows one class to acquire properties of another.
Types:
-
Single
-
Multiple
-
Multilevel
OR
Destructor
Destructor frees resources.
~ClassName() {
// cleanup
}
✅ HBSE CLASS 12 COMPUTER SCIENCE PAPER 2025 Set A
🔷 SECTION – A (Objective Type Questions)
(1 × 10 = 10 Marks)
1(i) What is Bluetooth primarily used for?
✔ Answer: (B) Wireless communication between devices over short distances
1(ii) Which SQL keyword is used to sort the result set?
✔ Answer: (A) ORDER BY
1(iii) Which of the following is NOT an operation performed on a queue?
✔ Answer: (D) Insert at Position
1(iv) In Python, which block is executed when an exception is raised inside the try block?
✔ Answer: (B) except
1(v) The main function of a router is to forward ______ between different networks.
✔ Answer: Data packets
1(vi) The ______ command is used to retrieve data from a database.
✔ Answer: SELECT
1(vii) The finally block is only executed if an exception is raised.
✔ Answer: False
(Finally block executes whether exception occurs or not.)
1(viii) In Python, the default mode for opening a file is ‘r’.
✔ Answer: True
1(ix) Assertion–Reason
✔ Correct Option: (A)
1(x) Assertion–Reason
✔ Correct Option: (A)
🔷 SECTION – B (Very Short Answer Type)
(1 × 5 = 5 Marks)
2. What type of error does Python raise if you try to divide a number by zero?
✔ Answer:
Python raises a ZeroDivisionError.
OR
What function is used to open a file in Python?
✔ Answer:
The function used to open a file is:
open()
3. What is a database?
✔ Answer:
A database is an organized collection of related data stored electronically so that it can be easily accessed, managed, and updated.
4. What is the primary disadvantage of BUS topology?
✔ Answer:
If the main cable (backbone) fails, the entire network stops working.
5. What are coaxial cables? Mention one advantage.
✔ Answer:
Coaxial cables are transmission media consisting of a central conductor surrounded by insulation and shielding.
Advantage:
They have better resistance to noise compared to twisted pair cables.
🔷 SECTION – C (Short Answer Type)
(2 × 5 = 10 Marks)
6. What is the use of else block in exception handling in Python?
✔ Answer:
The else block executes only when no exception occurs in the try block.
Example:
try:
x = 10 / 2
except ZeroDivisionError:
print(“Error”)
else:
print(“No error occurred”)
OR
How do you close a file in Python? Why is it important?
✔ Answer:
A file is closed using:
file.close()
Importance:
-
Frees system resources
-
Saves changes properly
-
Prevents data corruption
7. What is Bubble Sort?
✔ Answer:
Bubble Sort is a simple sorting technique in which adjacent elements are compared and swapped if they are in the wrong order.
It repeatedly passes through the list until it is sorted.
8. What is the purpose of SMTP protocol?
✔ Answer:
SMTP (Simple Mail Transfer Protocol) is used to send emails from one server to another over the internet.
9. How do firewalls help in preventing cyber attacks?
✔ Answer:
Firewalls:
-
Monitor incoming and outgoing traffic
-
Block unauthorized access
-
Filter malicious data packets
They act as a security barrier between a trusted network and the internet.
10. How does bandwidth affect the speed of data transmission?
✔ Answer:
Higher bandwidth allows more data to be transmitted per second.
So, higher bandwidth results in faster data transfer speed.
🔷 SECTION – D (Essay Type Questions)
(4 × 3 = 12 Marks)
13. What is Stack Data Structure? Write a Python program to insert element in a stack.
✔ Answer:
A Stack is a linear data structure that follows LIFO (Last In First Out) principle.
Insertion in stack is called Push.
Python Program:
stack = []
def push():
item = input(“Enter element: “)
stack.append(item)
print(“Element inserted”)
push()
print(“Stack:”, stack)
OR
Explain Linear Search with example.
Linear Search is a searching technique where elements are checked one by one.
Example:
arr = [10, 20, 30, 40]
key = 30
for i in arr:
if i == key:
print(“Element found”)
break
14. What is SQL? What are its primary components (DML, DDL, DCL)?
✔ Answer:
SQL (Structured Query Language) is used to manage and manipulate databases.
Components:
-
DDL (Data Definition Language)
-
CREATE
-
ALTER
-
DROP
-
-
DML (Data Manipulation Language)
-
INSERT
-
UPDATE
-
DELETE
-
SELECT
-
-
DCL (Data Control Language)
-
GRANT
-
REVOKE
-
OR
Explain following commands:
(i) ALTER TABLE
Used to modify structure of existing table.
Example:
ii) DROP TABLE
Deletes entire table permanently.
DROP TABLE Student;
(iii) DELETE
Removes records from table.
DELETE FROM Student WHERE Roll=1;
(iv) INSERT
Adds new records into table.
INSERT INTO Student VALUES (1,’Ram’);
15. What is Network Topology? Explain:
(i) STAR
All devices are connected to a central hub.
Advantage: Easy to manage
Disadvantage: Hub failure stops network
(ii) RING
Devices are connected in circular form.
Data flows in one direction.
OR
Explain:
(i) LAN
Local Area Network — Covers small area like school.
(ii) WAN
Wide Area Network — Covers large geographical area.
(iii) Modem
Converts digital signals to analog and vice versa.
(iv) Gateway
Connects two different networks using different protocols.
📊 1️⃣ MOST REPEATED THEORY QUESTIONS (Very High Frequency)
| Topic | 2021 | 2022 | 2023 | 2024 | 2025 | Frequency |
|---|---|---|---|---|---|---|
| Constructor Types | ✔ | ✔ | ✔ | ✔ | — | 🔥 4/5 |
| Inheritance | ✔ | ✔ | ✔ | ✔ | — | 🔥 4/5 |
| Destructor | ✔ | ✔ | ✔ | ✔ | — | 🔥 4/5 |
| 2NF / Normalization | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
| INSERT Syntax | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
| SUM / MIN SQL | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
| LAN / MAN / WAN | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
| Stack (LIFO) | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
| Queue (FIFO) | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
| SDLC | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
| TCP/IP Model | ✔ | ✔ | ✔ | ✔ | ✔ | 🔥 5/5 |
📌 2️⃣ MOST REPEATED PROGRAMMING QUESTIONS
🔹 C++ Section (2021–2024 Pattern)
🔥 Very Important:
-
Define function outside class (4 times)
-
Classroom type program (2 times)
-
Constructor + Destructor program (4 times)
-
Linear Search (3 times)
-
Bubble Sort (3 times)
-
Queue Algorithm (4 times)
👉 Conclusion:
OOPS + Searching + Sorting = Guaranteed 8–12 Marks
🔹 Python Section (2025 Pattern Shift)
🔥 Newly repeated areas:
-
Exception Handling
-
Stack using List
-
File Handling
-
ZeroDivisionError
-
open() function
-
finally block
👉 Conclusion:
Exception Handling + Stack Program = Very Important for 2026
📌 3️⃣ DATABASE (SQL) – MOST REPEATED
| Question Type | Frequency |
|---|---|
| INSERT syntax | 5/5 |
| SUM() | 4/5 |
| MIN() | 4/5 |
| DDL Commands (CREATE, ALTER, DROP) | 5/5 |
| 1NF Case Study | 3/5 |
| Primary Key | 4/5 |
📌 4️⃣ NETWORKING – 100% REPEATED SECTION
Every year networking questions are asked from:
-
LAN / MAN / WAN
-
Star / Ring topology
-
TCP/IP layers
-
SMTP
-
Router
-
Bandwidth
-
Firewall
👉 Networking = Safe Scoring Area (6–8 Marks Every Year)
📌 5️⃣ MARKS DISTRIBUTION TREND (2021–2025)
| Section | Average Marks |
|---|---|
| OOPS | 8–10 |
| SQL | 6–8 |
| Data Structure | 6–8 |
| Networking | 6–8 |
| SDLC / Testing | 4–6 |
🎯 6️⃣ 2026 PREDICTION (Based on Trend)
🔥 90% Expected for 2026:
-
Constructor + Destructor (4 Marks)
-
Inheritance Types
-
Linear Search OR Bubble Sort
-
Stack / Queue Algorithm
-
INSERT + SUM SQL
-
2NF Case Study
-
SDLC Phases
-
TCP/IP Model
-
Star vs Ring
-
Exception Handling (if Python continues)
📘 7️⃣ ONE SHOT REVISION STRATEGY (For Your Live Class)
Principal Sir 🙏
You can structure your revision like this:
Day 1 – OOPS Master
Constructor
Destructor
Inheritance
Function Outside Class
Day 2 – Data Structure
Stack
Queue
Linear Search
Bubble Sort
Day 3 – SQL Master
INSERT
SUM
MIN
DDL
Normalization
Day 4 – Networking + SDLC
LAN / MAN / WAN
TCP/IP
Star / Ring
Firewall
SDLC
👉 This 4-Day Plan Covers 80–90% Paper.
🚀 MOST IMPORTANT 10 QUESTIONS (Write on Board in Live Class)
-
Types of Constructor
-
Destructor with Example
-
Inheritance Types
-
Linear Search Algorithm
-
Bubble Sort
-
INSERT Syntax
-
Define 2NF
-
TCP/IP Layers
-
Star vs Ring
-
SDLC Phases
📢 FINAL CONCLUSION
✔ OOPS + SQL + Networking = 70% Paper
✔ These topics repeated every year
✔ Smart preparation → Easy 35+/40
📝 HBSE CLASS 12 – COMPUTER SCIENCE (2026 Prediction)
Time: 3 Hours
Maximum Marks: 40
🔷 SECTION – A (Objective Type)
(1 × 10 = 10 Marks)
-
(i) Which of the following is a type of constructor?
(A) Destructor
(B) Default Constructor
(C) Operator
(D) Class
(ii) Which SQL function is used to calculate total value?
(A) COUNT()
(B) MAX()
(C) SUM()
(D) AVG()
(iii) Stack follows which principle?
(A) FIFO
(B) LIFO
(C) FILO
(D) None
(iv) Which topology uses a central hub?
(A) Ring
(B) Bus
(C) Star
(D) Mesh
(v) The INSERT command belongs to:
(A) DDL
(B) DML
(C) DCL
(D) TCL
(vi) Which protocol is used to send emails?
(A) HTTP
(B) FTP
(C) SMTP
(D) TCP
(vii) The finally block executes only if error occurs.
(True / False)
(viii) The primary key can contain duplicate values.
(True / False)
(ix) Assertion: TCP ensures reliable communication.
Reason: TCP uses error checking and acknowledgment.
(A) Both true and reason explains
(B) Both true but reason not correct
(C) Assertion true, reason false
(D) Assertion false
(x) Assertion: Normalization reduces redundancy.
Reason: It organizes data into smaller related tables.
(A) Both true and reason explains
(B) Both true but reason not correct
(C) Assertion true, reason false
(D) Assertion false
🔷 SECTION – B (Very Short Answer)
(1 × 5 = 5 Marks)
-
Define Destructor with syntax.
OR
What is ZeroDivisionError in Python?
-
Define 2NF.
-
Write syntax of INSERT command.
-
What is LAN?
-
Define Stack.
🔷 SECTION – C (Short Answer Type)
(2 × 5 = 10 Marks)
-
Explain types of Constructors with example.
OR
Explain Destructor with example.
-
Write algorithm for insertion in a Linear Queue.
-
Explain SUM() function with example.
-
What is SDLC? Explain any two phases.
-
Explain Star and Ring topology.
🔷 SECTION – D (Long Answer Type)
(4 × 3 = 12 Marks)
-
Write a C++ program to define a class “Student” with data members roll and marks.
Include:
-
Constructor
-
display() function
OR
Write Python program to implement Stack using list.
-
Explain Inheritance in C++. Explain any three types with diagram.
OR
Explain TCP/IP model and its layers.
-
Explain Linear Search with algorithm and example.
OR
Explain Bubble Sort with example and passes.
🔷 INTERNAL CHOICE EXTRA (Case Study Type – 3 Marks)
-
A table Student_Course contains:
Roll | Name | Course (Maths, Hindi)
(i) Is table in 1NF?
(ii) If not, convert it into 1NF.
(iii) Define Primary Key.
🎯 MARKS DISTRIBUTION (Expected)
OOPS → 10 Marks
Data Structure → 8 Marks
SQL → 8 Marks
Networking → 8 Marks
SDLC → 4 Marks
🔥 WHY THIS PAPER IS STRONG PREDICTION?
Based on 5-year repetition:
✔ Constructor asked 4/5 years
✔ INSERT asked 5/5 years
✔ Stack/Queue asked 5/5 years
✔ TCP/IP asked 5/5 years
✔ 2NF asked 5/5 years
✔ SDLC asked 5/5 years
🔥 200 Rapid Fire MCQs
For HBSE Class 12 Computer Science (2026 Board Focused)
Based on 2021–2025 repeated trends.
Pattern:
✔ OOPS
✔ Data Structure
✔ SQL
✔ Networking
✔ SDLC
✔ Python (New Pattern)
🔥 PART 1 – OOPS (1–40)
-
Constructor name must be same as:
A) Function
B) Class
C) Variable
D) Object -
Constructor is called:
A) Manually
B) Automatically
C) Rarely
D) Never -
Destructor is preceded by symbol:
A) #
B) @
C) ~
D) & -
Constructor with no parameters is:
A) Copy
B) Default
C) Derived
D) Static -
Inheritance allows:
A) Deletion
B) Reuse
C) Loop
D) Sorting -
Base class is also called:
A) Parent
B) Child
C) Derived
D) Object -
Derived class is also called:
A) Parent
B) Child
C) Root
D) Master -
Protected members are accessible in:
A) Same class only
B) Derived class
C) Outside program
D) Nowhere -
Private members are accessible in:
A) Anywhere
B) Same class only
C) Derived only
D) Global -
Function defined outside class uses:
A) .
B) ::
C) ->
D) #
🔥 PART 2 – DATA STRUCTURE (41–80)
-
Stack follows:
A) FIFO
B) LIFO
C) LILO
D) FILO -
Insertion in stack is called:
A) Enqueue
B) Push
C) Pop
D) Delete -
Deletion in stack is called:
A) Push
B) Pop
C) Insert
D) Append -
Queue follows:
A) FIFO
B) LIFO
C) FILO
D) LILO -
Insertion in queue is:
A) Push
B) Enqueue
C) Pop
D) Delete -
Deletion in queue is:
A) Enqueue
B) Dequeue
C) Insert
D) Append -
Linear search complexity:
A) O(1)
B) O(log n)
C) O(n)
D) O(n²) -
Bubble sort complexity:
A) O(n)
B) O(log n)
C) O(n²)
D) O(1)
-
Stack Overflow occurs when:
A) Stack is empty
B) Stack is full
C) Stack is half
D) Stack is sorted -
Stack Underflow occurs when:
A) Stack is full
B) Stack is empty
C) Stack is large
D) Stack is new -
Queue Overflow occurs when:
A) FRONT = -1
B) REAR = MAX-1
C) REAR = 0
D) FRONT = MAX -
Queue Underflow occurs when:
A) FRONT = -1
B) REAR = MAX-1
C) FRONT = 0
D) REAR = 0 -
In Linear Queue, insertion takes place at:
A) FRONT
B) REAR
C) Middle
D) Anywhere -
In Linear Queue, deletion takes place at:
A) REAR
B) FRONT
C) Middle
D) End -
Bubble Sort compares:
A) First & Last elements
B) Adjacent elements
C) Random elements
D) Middle elements -
In Bubble Sort, after first pass, the ______ element is placed correctly.
A) Smallest
B) Largest
C) Middle
D) Random -
If array has 5 elements, maximum passes in Bubble Sort are:
A) 3
B) 4
C) 5
D) 6 -
Worst case time complexity of Bubble Sort is:
A) O(1)
B) O(n)
C) O(n log n)
D) O(n²) -
Linear Search checks elements:
A) Randomly
B) From start to end
C) From end only
D) Middle first -
If element is not found in Linear Search, algorithm returns:
A) 0
B) -1
C) 1
D) MAX -
Data structure that allows insertion and deletion at both ends is:
A) Stack
B) Queue
C) Deque
D) Array -
Which of the following is not a linear data structure?
A) Stack
B) Queue
C) Tree
D) Array -
In Stack, top pointer indicates:
A) First element
B) Last inserted element
C) Middle element
D) Smallest element -
In Queue, FRONT points to:
A) Last element
B) First element
C) Middle element
D) Largest element -
In Queue, REAR points to:
A) First element
B) Last element
C) Middle
D) None -
Searching technique that works only on sorted list:
A) Linear Search
B) Binary Search
C) Bubble Sort
D) Push -
Time complexity of Binary Search is:
A) O(n)
B) O(n²)
C) O(log n)
D) O(1) -
Binary Search divides array into:
A) 3 parts
B) 2 equal halves
C) Random parts
D) 4 parts -
In Bubble Sort, if no swapping occurs in a pass, it means:
A) Array is reversed
B) Array is sorted
C) Array is empty
D) Array is large -
For n elements, maximum comparisons in Bubble Sort are:
A) n
B) n-1
C) n(n-1)/2
D) n² -
In stack implemented using array, initial value of TOP is:
A) 0
B) 1
C) -1
D) MAX -
After pushing one element in empty stack, TOP becomes:
A) -1
B) 0
C) 1
D) MAX -
In queue, initial value of FRONT and REAR is usually:
A) 0
B) 1
C) -1
D) MAX -
Circular Queue solves problem of:
A) Overflow
B) Underflow
C) Wastage of space
D) Sorting -
In Circular Queue, next position is calculated using:
A) i+1
B) i-1
C) (i+1) % MAX
D) MAX-i -
Deleting element from stack is called:
A) Push
B) Pop
C) Enqueue
D) Delete -
In Linear Queue, when FRONT > REAR, queue becomes:
A) Full
B) Sorted
C) Empty
D) Overflow -
Stack is also known as:
A) Priority List
B) Linear List
C) Pile
D) Tree -
Queue is also known as:
A) Waiting Line
B) Stack
C) Heap
D) Tree -
In Bubble Sort, total passes required for n elements are:
A) n
B) n-1
C) n+1
D) n²
🔥 PART 3 – SQL (81–120)
-
SQL stands for:
A) Structured Query Language
B) Simple Query Language
C) Standard Query Logic
D) Structured Queue Language -
INSERT belongs to:
A) DDL
B) DML
C) DCL
D) TCL -
CREATE belongs to:
A) DDL
B) DML
C) DCL
D) TCL -
SUM() is:
A) Scalar
B) Aggregate
C) Logical
D) Arithmetic -
MIN() returns:
A) Maximum
B) Minimum
C) Average
D) Count
-
DELETE command is used to:
A) Remove table structure
B) Remove records
C) Modify table name
D) Create database -
UPDATE command is used to:
A) Add new table
B) Modify existing records
C) Delete table
D) Remove column -
Syntax of UPDATE includes which clause to specify condition?
A) GROUP BY
B) ORDER BY
C) WHERE
D) HAVING -
PRIMARY KEY must be:
A) Duplicate
B) Null
C) Unique and Not Null
D) Sorted -
A table can have how many primary keys?
A) One
B) Two
C) Many
D) Unlimited -
FOREIGN KEY is used to:
A) Uniquely identify record
B) Link two tables
C) Sort data
D) Delete data -
Foreign Key references:
A) Any column
B) Primary key of another table
C) Duplicate column
D) NULL column -
1NF requires:
A) Multiple values in a cell
B) Atomic values
C) Duplicate rows
D) No key -
2NF removes:
A) Partial dependency
B) Full dependency
C) Redundancy only
D) Primary key -
3NF removes:
A) Partial dependency
B) Transitive dependency
C) Duplicate rows
D) Sorting -
ORDER BY clause is used to:
A) Filter rows
B) Group rows
C) Sort result
D) Delete rows -
Default sorting order in ORDER BY is:
A) DESC
B) RANDOM
C) ASC
D) NONE -
GROUP BY clause is used to:
A) Combine tables
B) Group rows with same values
C) Sort rows
D) Delete groups -
Aggregate functions are used with:
A) WHERE
B) SELECT
C) DROP
D) ALTER -
COUNT() function returns:
A) Sum
B) Maximum
C) Total number of rows
D) MinimumQ.No Ans Q.No Ans Q.No Ans Q.No Ans 1 B 26 A 51 B 76 B 2 B 27 B 52 A 77 C 3 C 28 B 53 B 78 C 4 B 29 B 54 B 79 A 5 B 30 A 55 B 80 B 6 A 31 B 56 B 81 A 7 B 32 C 57 B 82 B 8 B 33 B 58 D 83 A 9 B 34 C 59 B 84 B 10 B 35 B 60 B 85 B 11 A 36 B 61 C 86 B 12 B 37 D 62 C 87 B 13 A 38 C 63 B 88 C 14 A 39 B 64 B 89 C 15 C 40 A 65 B 90 A 16 B 41 B 66 B 91 B 17 B 42 B 67 C 92 B 18 A 43 B 68 B 93 B 19 D 44 A 69 B 94 A 20 B 45 B 70 C 95 B 21 B 46 B 71 C 96 C 22 B 47 C 72 B 97 C 23 B 48 C 73 C 98 B 24 B 49 B 74 C 99 B 25 B 50 B 75 C 100 C -
Which command removes entire table structure?
A) DELETE
B) REMOVE
C) DROP
D) UPDATE -
ALTER command is used to:
A) Delete records
B) Modify table structure
C) Sort data
D) Insert data -
NOT NULL constraint ensures:
A) Unique values
B) No empty value
C) Sorted data
D) Multiple keys -
UNIQUE constraint ensures:
A) Duplicate values allowed
B) Only NULL values
C) No duplicate values
D) Multiple primary keys -
Which clause filters rows?
A) WHERE
B) GROUP BY
C) ORDER BY
D) SELECT -
SQL statement used to retrieve data:
A) GET
B) SELECT
C) FETCH
D) OPEN -
HAVING clause is used with:
A) WHERE
B) ORDER BY
C) GROUP BY
D) INSERT -
Difference between WHERE and HAVING:
A) No difference
B) WHERE filters before grouping
C) HAVING filters before grouping
D) Both same -
Composite Primary Key means:
A) Two primary keys
B) Combination of columns as primary key
C) No key
D) Duplicate key -
Which command adds a column?
A) INSERT
B) UPDATE
C) ALTER
D) DELETE -
DELETE without WHERE clause will:
A) Delete one row
B) Delete all rows
C) Delete table
D) Give error -
TRUNCATE command:
A) Deletes structure
B) Deletes all rows quickly
C) Modifies table
D) Adds column -
SQL is case sensitive for:
A) Keywords
B) Table names (depends on DBMS)
C) Numbers
D) None -
Referential Integrity is maintained by:
A) Primary Key
B) Foreign Key
C) Unique Key
D) NULL -
Candidate Key is:
A) Duplicate key
B) Possible primary key
C) Foreign key
D) Secondary key -
Which normal form eliminates repeating groups?
A) 1NF
B) 2NF
C) 3NF
D) BCNF -
Partial dependency occurs in:
A) 1NF
B) 2NF
C) 3NF
D) 4NF -
Transitive dependency is removed in:
A) 1NF
B) 2NF
C) 3NF
D) None -
SQL command to change table name:
A) UPDATE
B) RENAME
C) MODIFY
D) DELETE -
Which SQL clause is executed first logically?
A) SELECT
B) ORDER BY
C) WHERE
D) FROM
🔥 PART 4 – NETWORKING (121–160)
-
LAN covers:
A) Country
B) City
C) Small area
D) World -
WAN covers:
A) Office
B) City
C) Large area
D) Room -
Topology with central hub:
A) Ring
B) Star
C) Bus
D) Mesh -
SMTP is used for:
A) Browsing
B) Sending Email
C) Downloading
D) Searching -
TCP ensures:
A) Fast
B) Reliable
C) Weak
D) No control
-
A Router is used to:
A) Store data
B) Connect different networks
C) Print documents
D) Edit files -
Router works at which layer of TCP/IP model?
A) Application
B) Transport
C) Internet
D) Network Access -
A Modem converts:
A) Analog to Analog
B) Digital to Digital
C) Digital to Analog and vice versa
D) Data to Text -
Modem stands for:
A) Modulator Device
B) Modulator-Demodulator
C) Mode-Demo
D) Modern Device -
Firewall is used for:
A) Increasing speed
B) Network security
C) Connecting cables
D) Data storage -
Firewall protects against:
A) Hardware failure
B) Cyber attacks
C) Power failure
D) Printer errors -
Bandwidth refers to:
A) Storage capacity
B) Data transfer rate
C) Network size
D) Cable length -
Higher bandwidth means:
A) Slower speed
B) Faster data transfer
C) No change
D) Data loss -
TCP stands for:
A) Transmission Control Protocol
B) Transfer Communication Process
C) Technical Control Program
D) Transmission Communication Port -
IP stands for:
A) Internet Process
B) Internal Protocol
C) Internet Protocol
D) Information Port -
TCP ensures:
A) Fast transfer only
B) Reliable data transmission
C) No error checking
D) Unsecured data -
UDP is:
A) Reliable protocol
B) Connection-oriented
C) Faster but unreliable
D) Used only for email -
HTTP stands for:
A) Hyper Text Transfer Protocol
B) High Text Transfer Process
C) Hyper Transfer Text Program
D) Host Transfer Protocol -
HTTP is mainly used for:
A) Sending emails
B) File transfer
C) Web browsing
D) Database management -
HTTPS provides:
A) Faster speed
B) Encryption
C) No security
D) Open access -
FTP stands for:
A) File Transfer Protocol
B) Fast Text Process
C) File Transport Port
D) Format Transfer Protocol -
FTP is used to:
A) Browse web
B) Send emails
C) Transfer files
D) Design website -
WWW stands for:
A) World Wide Web
B) Web World Wide
C) World Web Window
D) Wide World Web -
WWW is a collection of:
A) Computers
B) Servers
C) Web pages
D) Routers -
URL stands for:
A) Uniform Resource Locator
B) Universal Resource Link
C) Unified Resource Location
D) Uniform Record Locator -
DNS is used to:
A) Store files
B) Convert domain name to IP address
C) Send emails
D) Block websites -
SMTP is used for:
A) Receiving emails
B) Sending emails
C) Browsing
D) Searching -
POP3 is used for:
A) Sending emails
B) Receiving emails
C) File transfer
D) Browsing -
Network topology refers to:
A) Network speed
B) Network layout
C) Network security
D) Network size -
Star topology uses:
A) Ring cable
B) Central hub
C) No cable
D) Mesh network -
Ring topology forms:
A) Star shape
B) Circular path
C) Linear path
D) Random structure -
Bus topology uses:
A) Central hub
B) Backbone cable
C) Circular cable
D) No cable -
WAN covers:
A) Small room
B) Building
C) City
D) Large geographical area -
LAN covers:
A) Country
B) Continent
C) Small area
D) World -
MAN covers:
A) School
B) Office
C) City
D) Country -
Gateway is used to:
A) Connect similar networks
B) Connect different networks with different protocols
C) Store data
D) Sort data -
NIC stands for:
A) Network Internet Card
B) Network Interface Card
C) Network Internal Cable
D) Network Input Code -
Packet switching divides data into:
A) Blocks
B) Files
C) Packets
D) Frames -
Internet layer of TCP/IP handles:
A) Data formatting
B) Logical addressing
C) File storage
D) Encryption -
Application layer in TCP/IP provides services to:
A) Network devices
B) End users
C) Routers
D) Modems
🔥 PART 5 – SDLC & TESTING (161–180)
-
First phase of SDLC:
A) Design
B) Testing
C) Requirement Analysis
D) Coding -
Testing without knowing internal code:
A) White Box
B) Black Box
C) Unit
D) Alpha
-
Integration Testing is performed after:
A) Maintenance
B) Unit Testing
C) Deployment
D) Design -
Integration Testing checks:
A) Individual modules
B) Combined modules working together
C) Hardware only
D) User interface only -
Unit Testing is done on:
A) Entire system
B) Individual module
C) Network
D) Database -
System Testing is done to test:
A) Single function
B) Complete system
C) Only database
D) Only UI -
Black Box Testing focuses on:
A) Internal code
B) External behavior
C) Memory usage
D) Server speed -
White Box Testing focuses on:
A) Output only
B) Internal logic
C) Design only
D) User requirements -
Alpha Testing is performed by:
A) Customers
B) Developers
C) Government
D) Hackers -
Beta Testing is performed by:
A) Developers
B) End users
C) Testers only
D) Network admin -
Maintenance phase comes after:
A) Requirement
B) Design
C) Implementation
D) Deployment -
Correct order of SDLC phases is:
A) Design → Requirement → Testing
B) Requirement → Design → Implementation → Testing → Maintenance
C) Testing → Coding → Requirement
D) Implementation → Design → Requirement -
Requirement Analysis phase involves:
A) Coding
B) Collecting user needs
C) Testing modules
D) Deleting data -
Design phase prepares:
A) Code
B) Blueprint of system
C) Database deletion
D) Reports only -
Implementation phase includes:
A) Coding
B) Maintenance
C) Testing
D) Requirement gathering -
Testing phase ensures:
A) No coding
B) Error detection
C) Network installation
D) Database creation -
Maintenance includes:
A) Writing new code only
B) Correcting errors after deployment
C) Designing system
D) Testing modules -
Feasibility study is done during:
A) Testing
B) Requirement Analysis
C) Maintenance
D) Implementation -
Corrective Maintenance is done to:
A) Improve performance
B) Fix errors
C) Add new features
D) Change design -
Adaptive Maintenance is done to:
A) Remove system
B) Adapt to new environment
C) Delete database
D) Stop testing -
Exception handling in Python is done using:
A) if-else
B) try-except
C) for loop
D) while loop -
The try block contains:
A) Normal code
B) Risky code
C) Error message
D) File name -
The except block executes when:
A) No error occurs
B) Error occurs
C) Loop ends
D) File closes -
finally block executes:
A) Only when error occurs
B) Only when no error
C) Always
D) Never -
ZeroDivisionError occurs when:
A) Add numbers
B) Multiply numbers
C) Divide by zero
D) Subtract numbers -
Syntax to open a file is:
A) file()
B) open()
C) read()
D) write() -
Default mode of open() function is:
A) w
B) r
C) a
D) x -
Mode ‘w’ in open() is used to:
A) Read file
B) Write file (overwrite)
C) Append file
D) Delete file -
Mode ‘a’ in open() is used to:
A) Read file
B) Append data
C) Delete data
D) Rename file -
File is closed using:
A) end()
B) close()
C) stop()
D) exit() -
If file is not closed properly, it may cause:
A) Faster speed
B) Data corruption
C) No issue
D) Sorting -
read() function is used to:
A) Write file
B) Delete file
C) Read file content
D) Close file -
write() function is used to:
A) Read file
B) Write data into file
C) Delete file
D) Search file -
Which data structure in Python can be used to implement Stack?
A) Tuple
B) List
C) Dictionary
D) Set -
append() method is used to:
A) Remove element
B) Add element at end
C) Sort list
D) Delete list -
pop() method in list is used to:
A) Insert element
B) Delete last element
C) Read file
D) Close program -
write() function is used to:
A) Read file
B) Write data into file
C) Delete file
D) Search file -
Which data structure in Python can be used to implement Stack?
A) Tuple
B) List
C) Dictionary
D) Set -
append() method is used to:
A) Remove element
B) Add element at end
C) Sort list
D) Delete list -
pop() method in list is used to:
A) Insert element
B) Delete last element
C) Read file
D) Close programQ.No Ans Q.No Ans Q.No Ans Q.No Ans 101 C 126 B 151 B 176 B 102 B 127 C 152 B 177 B 103 B 128 C 153 D 178 B 104 C 129 B 154 C 179 B 105 A 130 B 155 C 180 B 106 B 131 B 156 B 181 A 107 C 132 B 157 B 182 B 108 B 133 B 158 C 183 C 109 B 134 A 159 B 184 A 110 C 135 C 160 B 185 B 111 B 136 B 161 C 186 B 112 B 137 C 162 B 187 B 113 B 138 A 163 B 188 C 114 B 139 C 164 B 189 C 115 B 140 B 165 B 190 B 116 A 141 A 166 B 191 B 117 B 142 C 167 B 192 B 118 C 143 A 168 B 193 B 119 B 144 C 169 B 194 B 120 D 145 A 170 B 195 B 121 C 146 B 171 D 196 C 122 D 147 B 172 B 197 B 123 B 148 B 173 B 198 B 124 C 149 B 174 B 199 B 125 B 150 B 175 A 200 B
📘 HBSE Class 12 Computer Science – 100 Best Quick Revision Points (With Explanation)
🔥 PART 1 – OOPS (1–20)
1️⃣ Class – Blueprint to create objects.
2️⃣ Object – Instance of a class.
3️⃣ Constructor – Special function called automatically when object is created.
4️⃣ Default Constructor – No parameters.
5️⃣ Parameterized Constructor – Takes arguments.
6️⃣ Destructor – Called automatically when object is destroyed (symbol ~).
7️⃣ Inheritance – Acquiring properties of another class.
8️⃣ Base Class – Parent class.
9️⃣ Derived Class – Child class.
🔟 Single Inheritance – One base, one derived.
11️⃣ Multiple Inheritance – One class inherits from more than one base class.
12️⃣ Multilevel Inheritance – A → B → C chain.
13️⃣ Access Specifiers – public, private, protected.
14️⃣ Public – Accessible everywhere.
15️⃣ Private – Accessible only inside class.
16️⃣ Protected – Accessible inside class + derived class.
17️⃣ Scope Resolution Operator (::) – Defines function outside class.
18️⃣ Encapsulation – Wrapping data + functions together.
19️⃣ Polymorphism – Same function, different behavior.
20️⃣ Function Overloading – Same function name, different parameters.
🔥 PART 2 – DATA STRUCTURE (21–40)
21️⃣ Stack – Linear data structure (LIFO).
22️⃣ Push – Insert element in stack.
23️⃣ Pop – Remove element from stack.
24️⃣ Stack Overflow – When stack is full.
25️⃣ Stack Underflow – When stack is empty.
26️⃣ Queue – Linear data structure (FIFO).
27️⃣ Enqueue – Insert in queue.
28️⃣ Dequeue – Remove from queue.
29️⃣ Queue Overflow – REAR = MAX-1.
30️⃣ Queue Underflow – FRONT = -1 or FRONT > REAR.
31️⃣ Linear Search – Checks elements one by one.
32️⃣ Linear Search Time Complexity – O(n).
33️⃣ Binary Search – Works on sorted array.
34️⃣ Binary Search Complexity – O(log n).
35️⃣ Bubble Sort – Compares adjacent elements.
36️⃣ After 1st pass (Bubble Sort) – Largest element placed correctly.
37️⃣ Bubble Sort Complexity – O(n²).
38️⃣ Circular Queue – Solves space wastage problem.
39️⃣ TOP Pointer – Indicates last inserted element in stack.
40️⃣ FRONT & REAR – Used in queue.
🔥 PART 3 – SQL & DATABASE (41–65)
41️⃣ SQL – Structured Query Language.
42️⃣ DDL – CREATE, ALTER, DROP.
43️⃣ DML – INSERT, UPDATE, DELETE, SELECT.
44️⃣ DCL – GRANT, REVOKE.
45️⃣ CREATE – Creates table.
46️⃣ DROP – Deletes table permanently.
47️⃣ ALTER – Modifies table structure.
48️⃣ INSERT – Adds new records.
49️⃣ UPDATE – Modifies records.
50️⃣ DELETE – Deletes records.
51️⃣ SELECT – Retrieves data.
52️⃣ WHERE – Filters rows.
53️⃣ ORDER BY – Sorts result.
54️⃣ GROUP BY – Groups similar values.
55️⃣ HAVING – Filters grouped data.
56️⃣ SUM() – Returns total.
57️⃣ MIN() – Returns smallest value.
58️⃣ MAX() – Returns largest value.
59️⃣ COUNT() – Returns number of rows.
60️⃣ Primary Key – Unique & Not Null.
61️⃣ Foreign Key – Links two tables.
62️⃣ 1NF – Atomic values only.
63️⃣ 2NF – No partial dependency.
64️⃣ 3NF – No transitive dependency.
65️⃣ Normalization – Reduces redundancy.
🔥 PART 4 – NETWORKING (66–85)
66️⃣ LAN – Small area network.
67️⃣ MAN – City-level network.
68️⃣ WAN – Large geographical network.
69️⃣ Topology – Layout of network.
70️⃣ Star Topology – Central hub.
71️⃣ Ring Topology – Circular connection.
72️⃣ Bus Topology – Backbone cable.
73️⃣ Router – Connects different networks.
74️⃣ Modem – Modulator-Demodulator.
75️⃣ Firewall – Protects network from attacks.
76️⃣ Bandwidth – Data transfer rate.
77️⃣ Higher Bandwidth – Faster speed.
78️⃣ TCP – Reliable transmission.
79️⃣ UDP – Faster but unreliable.
80️⃣ IP – Logical addressing.
81️⃣ TCP/IP Model – 4 layers.
82️⃣ Application Layer – User services.
83️⃣ Transport Layer – Reliable communication.
84️⃣ Internet Layer – IP addressing.
85️⃣ Network Access Layer – Physical transmission.
🔥 PART 5 – SDLC & TESTING (86–95)
86️⃣ SDLC – System Development Life Cycle.
87️⃣ Requirement Analysis – Collect user needs.
88️⃣ Design Phase – Blueprint of system.
89️⃣ Implementation – Coding stage.
90️⃣ Testing – Error detection.
91️⃣ Maintenance – Updates & fixes.
92️⃣ Unit Testing – Individual module testing.
93️⃣ Integration Testing – Combined modules testing.
94️⃣ Black Box Testing – Without internal knowledge.
95️⃣ White Box Testing – Tests internal logic.
🔥 PART 6 – PYTHON (96–100)
96️⃣ try block – Contains risky code.
97️⃣ except block – Handles error.
98️⃣ finally block – Always executes.
99️⃣ open() – Opens file.
🔟0️⃣ close() – Closes file & frees resources.
🎯 FINAL EXAM STRATEGY
If students revise these 100 points:
✔ OOPS → 8–10 marks safe
✔ SQL → 6–8 marks safe
✔ Data Structure → 6–8 marks safe
✔ Networking → 6–8 marks safe
✔ SDLC/Python → 4–6 marks safe
👉 Target Score: 35+/40
PROGRAMMING SYMBOLS (C++ / Python / SQL)
| Symbol | Name |
|---|---|
| :: | Scope Resolution Operator |
| -> | Arrow Operator |
| # | Hash |
| @ | At Symbol |
| ~ | Tilde |
| && | Logical AND |
| == | Equal Comparison |
| != | Not Equal |
| ++ | Increment |
| — | Decrement |
| * | Asterisk |
| & | Ampersand |
| <> | Not Equal (SQL) |
| ; | Statement Terminator |
📘 1️⃣ SYMBOLS USED IN PROGRAMMING ONLY (C++ / Python / SQL)
🔹 Basic Programming Symbols
| Symbol | Name | Use |
|---|---|---|
| ; | Semicolon | Ends statement (C++) |
| {} | Curly Braces | Block of code |
| () | Parentheses | Function call / condition |
| [] | Square Brackets | Array / Index |
| = | Assignment Operator | Assign value |
| == | Equal Comparison | Compare values |
| != | Not Equal | Comparison |
| > | Greater Than | Comparison |
| < | Less Than | Comparison |
| >= | Greater Equal | Comparison |
| <= | Less Equal | Comparison |
🔹 Logical Symbols
| Symbol | Name |
|---|---|
| && | Logical AND |
| ! | Logical NOT |
🔹 Arithmetic Symbols
| Symbol | Name |
|---|---|
| + | Addition |
| – | Subtraction |
| * | Multiplication |
| / | Division |
| % | Modulus |
| ++ | Increment |
| — | Decrement |
🔹 Special C++ Symbols
| Symbol | Name | Use |
|---|---|---|
| :: | Scope Resolution | Define function outside class |
| -> | Arrow Operator | Access pointer members |
| & | Address Operator | |
| * | Pointer Operator | |
| #include | Preprocessor | |
| ~ | Destructor | |
| << | Insertion Operator | |
| >> | Extraction Operator |
🔹 Python Specific Symbols
| Symbol | Use |
|---|---|
| : | After if, for, def |
| # | Comment |
| “”” “”” | Multi-line string |
| == | Comparison |
| += | Add and assign |
| -= | Subtract and assign |
📘 2️⃣ ALL C++ OPERATORS LIST (Complete)
🔹 1. Arithmetic Operators
-
-
-
/ % ++ —
-
-
🔹 2. Relational Operators
== != > < >= <=
🔹 3. Logical Operators
&& || !
🔹 4. Assignment Operators
= += -= *= /= %=
🔹 5. Bitwise Operators
& | ^ ~ << >>
🔹 6. Conditional Operator
? : (Ternary Operator)
Example:
x > y ? x : y
🔹 7. Special Operators
| Operator | Name |
|---|---|
| sizeof | Size Operator |
| & | Address Of |
| * | Pointer |
| -> | Arrow |
| :: | Scope Resolution |
📘 3️⃣ ALL IMPORTANT SQL KEYWORDS LIST (Board Focused)
🔹 Data Definition Language (DDL)
CREATE
DROP
ALTER
TRUNCATE
🔹 Data Manipulation Language (DML)
INSERT
UPDATE
DELETE
SELECT
🔹 Data Control Language (DCL)
GRANT
REVOKE
🔹 Query Related Keywords
WHERE
GROUP BY
ORDER BY
HAVING
DISTINCT
FROM
IN
BETWEEN
LIKE
IS NULL
NOT NULL
ASC
DESC
🔹 Aggregate Functions
SUM()
COUNT()
MAX()
MIN()
AVG()
🔹 Constraints
PRIMARY KEY
FOREIGN KEY
UNIQUE
NOT NULL
CHECK
DEFAULT
📘 4️⃣ ALL NETWORKING ABBREVIATIONS (Very Important)
| Abbreviation | Full Form |
|---|---|
| LAN | Local Area Network |
| MAN | Metropolitan Area Network |
| WAN | Wide Area Network |
| WWW | World Wide Web |
| URL | Uniform Resource Locator |
| HTTP | Hyper Text Transfer Protocol |
| HTTPS | Hyper Text Transfer Protocol Secure |
| FTP | File Transfer Protocol |
| SMTP | Simple Mail Transfer Protocol |
| POP3 | Post Office Protocol |
| TCP | Transmission Control Protocol |
| UDP | User Datagram Protocol |
| IP | Internet Protocol |
| TCP/IP | Transmission Control Protocol / Internet Protocol |
| DNS | Domain Name System |
| NIC | Network Interface Card |
| ISP | Internet Service Provider |
| GUI | Graphical User Interface |
| OS | Operating System |




