Page 1 :
IMPORT ESTIONS For II PUC, 1. K-map 2. State and prove De-Morgan’s theorem, algebraically., 3. Component of motherboard. 4. Explain BUS., 5. Explain. Cache memory. 6. Explain basic gates., 7. Explain derived gates. 8. Explain. NAND and NOR called as universal, gate., 9. Stack operation. 10. Queue operation., 11.Algoriths: a) insert b) delete c) search d) sort 12. Basic concepts of oops, 13. Advantages of oops. 14. Limitations of oops., 15. Applications of oops. 16 Difference between procedural and oop., 17. Define and declaration of classes and object. 18. Access specifies, 19. Member functions a) inside b) outside. 20. Array of objects., 21. Need of function overloading. 22.Explain inline function., 23. Advantages of inline function. 24. Explain friend function., 25. Characteristics of friend function. 26.Rules for declaring constructor function., 27. Invoking of constructors. 28. Destructor, 29. Feature of parameterized constructor. 30. Advantages of inheritance, 31. Types of inheritance and explain. 32. Advantages of pointers., 33. Declaring and initialization of pointer. 34. Operations can be performed an pointer, 35. Operations cannot be performed an pointer 36. Pointer as function parameters., 37. Difference between static and dynamic 38. Pass by value., 39. Pass by reference. 40.Explain streams classes, 41. Explain any 3 file modes. 42. Explain get(), getline(), read(), write() put()., 43. Apply of DB. 44.Mannual and computerized data processing, 45. Data processing cycle. 46. Features of data base., 47. DBMS users. 48. ISAM explain., 49. Explain normalized. 50. Compare relational and SQL., 51. Components of data ware house. 52. Advantages of data ware house., 53. Stages of data mining. 54. Functions of DDL., 55. Operators in SQL. 56. Command in SQL., 57. Group function. 58. Network goals., 59. Need of network. 60.Types of network., 61. Switching techniques. 62. Communication modes., 63. Explain network devices. 64.Application in networking., 65. Network security 66. Network protection methods., 67. Types of viruses. 68. Characteristics of viruses, 69. Virus prevention. 70. Antivirus example., 71. Types of e-commerce. 72. Advantages of e-commerce., 73. HTML structure. 74.Text formations tags., 75. Resizing tags. 76. Types of web hosting, 77. XML. 78. DHTML features., 79. Web scripting. 80. Explain hierarchical model