{"id":35770,"date":"2022-12-27T10:00:59","date_gmt":"2022-12-27T04:30:59","guid":{"rendered":"https:\/\/www.aplustopper.com\/?p=35770"},"modified":"2022-12-28T09:50:05","modified_gmt":"2022-12-28T04:20:05","slug":"plus-two-computer-science-model-question-papers-paper-2","status":"publish","type":"post","link":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/","title":{"rendered":"Plus Two Computer Science Model Question Papers Paper 2"},"content":{"rendered":"

Plus Two Computer Science Model Question Papers Paper 2 is part of Plus Two Computer Science Previous Year Question Papers and Answers<\/a>.\u00a0Here we have given Plus Two Computer Science Model Question Papers Paper 2<\/p>\n

Plus Two Computer Science Model Question Papers Paper 2<\/h2>\n\n\n\n\n\n\n
Board<\/strong><\/td>\nSCERT<\/td>\n<\/tr>\n
Class<\/strong><\/td>\nPlus Two<\/td>\n<\/tr>\n
Subject<\/strong><\/td>\nComputer Science<\/td>\n<\/tr>\n
Category<\/strong><\/td>\nPlus Two Previous Year\u00a0Question Papers<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n

Time: 2 Hours<\/strong>
\nCool off time : 15 Minutes<\/strong><\/p>\n

General Instructions to candidates:<\/strong><\/p>\n

    \n
  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.<\/li>\n
  • Your are not allowed to write your answers nor to discuss anything with others during the ‘cool off time’.<\/li>\n
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.<\/li>\n
  • Read questions carefully before you answering.<\/li>\n
  • All questions are compulsory and only internal choice is allowed.<\/li>\n
  • When you select a question, all the sub-questions must be answered from the same question itself.<\/li>\n
  • Calculations, figures and graphs should be shown in the answer sheet itself.<\/li>\n
  • Malayalam version of the questions is also provided.<\/li>\n
  • Give equations wherever necessary.<\/li>\n
  • Electronic devices except non programmable calculators are not allowed in the Examination Hall.<\/li>\n<\/ul>\n

    \"Plus<\/p>\n

    Answer all questions from 1 to 5 (5×1 = 5)
    \n\"Plus<\/p>\n

    Question 1.
    \nThe variables declared inside the class are known as ……….
    \n\"Plus<\/p>\n

    Question 2.
    \nQueue follows the……principle.
    \n\"Plus<\/p>\n

    Question 3.
    \nA link to a particular section of the same document is called………..
    \n\"Plus<\/p>\n

    Question 4.
    \nThe keyword used to declare a variable in JavaScript is………..
    \n\"Plus<\/p>\n

    Question 5.
    \nName a protocol that provides secure file transfer.
    \n\"Plus<\/p>\n

    Answer any nine questions from 6 to 16 (9×2 = 18)
    \n\"Plus<\/p>\n

    Question 6.
    \nOrphaned memory blocks are undesirable. How can they be avoided ?
    \n\"Plus<\/p>\n

    Question 7.
    \n\u201cStructure is a user-defined data type\u201d. Justify this statement.
    \n\"Plus
    \n\"Plus<\/p>\n

    Question 8.
    \nHow does stack overflow and underflow occur?
    \n\"Plus<\/p>\n

    Question 9.
    \nWhat is the role of payment gateway in online purchases?
    \n\"Plus<\/p>\n

    Question 10.
    \nWrite two different uses of \u201c+\u201d operator in JavaScript ?
    \n\"Plus<\/p>\n

    Question 11.
    \nWhat are the advantages of writing JavaScript code in the head section of an HTML page?
    \n\"Plus<\/p>\n

    Question 12.
    \nWhat happens when we use DELETE FROM command without a WHERE clause?
    \n\"Plus<\/p>\n

    Question 13.
    \nWhat are the features of AUTO_ INCREMENT constraint?
    \n\"Plus<\/p>\n

    Question 14.
    \nWrite a PHP program to display the perfect numbers below 100.
    \n\"Plus<\/p>\n

    Question 15.
    \nWhy is cyber law important ?
    \n\"Plus
    \n\"Plus<\/p>\n

    Question 16.
    \nList some uses of biometrics.
    \n\"Plus<\/p>\n

    Answer any nine questions from 17 to 27 (9×3 = 27)
    \n\"Plus<\/p>\n

    Question 17.
    \nWhat are the advantages of character pointer over character array?
    \n\"Plus<\/p>\n

    Question 18. How C++ implements encapsulation and data hiding?
    \n\"Plus<\/p>\n

    Question 19.
    \nWrite a procedure to implement traversal operation in a linked list.
    \n\"Plus<\/p>\n

    Question 20.
    \nCreate a table with 5 types of fruit names, use headings as serial number, name and cost.
    \n\"Plus<\/p>\n

    Question 21.
    \nDiscuss about six built in functions used in JavaScript.
    \n\"Plus<\/p>\n

    Question 22.
    \nCategorize the cloud service models.
    \n\"Plus<\/p>\n

    Question 23.
    \nUsing the instance of the EMPLOYEE relation given below, write the result of the following relational algebra expressions.
    \n\"Plus
    \n\"Plus<\/p>\n

    Question 24.
    \nExplain about the components of SQL.
    \n\"Plus<\/p>\n

    Question 25.
    \nWhat is the use of $_SERVER? $_SERVER
    \n\"Plus<\/p>\n

    Question 26.
    \nDefine the following cyber crimes:
    \n\"Plus
    \na. Cyber terrorism
    \nb. Website defacement
    \nc. Attacks against e-governance web-sites<\/p>\n

    Question 27.
    \nExplain how cloud service models change the way we use computers
    \n\"Plus<\/p>\n

    Answer any two questions from 28 to 30 (2 x 5 = 10)
    \n\"Plus<\/p>\n

    Question 28.
    \nExplain about column constraints.
    \n\"Plus<\/p>\n

    Question 29.
    \nHow can we connect a website hosted in a Webserver to a domain name?
    \n\"Plus<\/p>\n

    Question 30.
    \nCreate a form that accepts information regarding a student. Fields necessary are name, age, class, sex, roll number, hobbies and date of birth. Use appropriate form controls.
    \n\"Plus
    \n\"Plus<\/p>\n

    Answers<\/strong><\/p>\n

    Answer 1.
    \ndata member<\/p>\n

    Answer 2.
    \nFIFO (First In First Out)<\/p>\n

    Answer 3.
    \nInternal linking<\/p>\n

    Answer 4.
    \nvar<\/p>\n

    Answer 5.
    \nFTP (File Transfer Protocol)<\/p>\n

    Answer 6.
    \nIf the memory allocated using new operator is not freed using delete, that memory is said to be an orphaned memory block -a block of memory that is left unused, but not released for further allocation. Remedy for memory leak is to ensure that the memory allocated through new is properly deallocated through delete. Memory leak takes place only in the case of dynamic memory allocation. But in case of static memory allocation, the operating system takes the responsibility of allocation and deallocation without user\u2019s instruction. So there is no chance of memory leak in static memory allocation.<\/p>\n

    Answer 7.
    \nC++ provides facility to define new data types by which such aggregate or grouped data can be represented. The data types defined by user to represent data of aggregate nature are generally known as user-defined data types. Structure is a user-defined data type which represents a collection of logically related data items. It can represent a group of different types .of data under a common name.<\/p>\n

    Answer 8.
    \nOnce the stack is full, and if we attempt to insert an item, an impossible situation arises. This is known as stack overflow.
    \nIf the stack is empty and we try to delete an item from the stack, an unfavorable situation arises. This is known as stack underflow.<\/p>\n

    Answer 9.
    \nPayment gateway is a server that acts as a bridge between merchant server and bank server and transfers money in an encrypted format whenever an online payment\/money transfer is made.<\/p>\n

    Answer 10.
    \nOperator + is used to add two strings. Adding two string means concatenating two strings. If the operands are numbers, it will add the numbers. If the operands are strings it will concatenate the strings. If + operator sees any one operand as string, it will treat both the operands as string type and concatenate the strings.<\/p>\n

    Answer 11.
    \nIt is a visual practice to include scripts in the head section of the web page. The main reason for this is that the body section of most of the HTML pages contains a large volume of text that specifies the contents to be displayed on the web page. Mixing a function definition also with this will create a lot of confusion for the web designer for making any kind of modification in the page. Moreover, the head section of a web page is loaded before the body section. Therefore, if any function call is made in the body section, the function will be executed as the function will be executed as the function definition is already loaded in the memory.<\/p>\n

    Answer 12.
    \nThe rows which are to be deleted are selected by using the WHERE clause. If the WHERE clause is not used, all the rows in the table will be deleted.<\/p>\n

    Answer 13.
    \nIt performs an auto-increment feature. By default, the starting value for this constraint is 1 and will be incremented by 1 for each new record. Only one AUTO_INCREMENT column per table is allowed.<\/p>\n

    Answer 14.<\/p>\n

    <?\r\nfunction is_perfect($number)\r\n{\r\nfor ($n = 2; $n <= sqrt($number); $n++)\r\n{\r\nif (!($number % $n))\r\n{\r\n$d += $n;\r\nif ($n <> $number \/ $n)\r\n$d += $number \/ $n;\r\n}}\r\nreturn ++$d == $number;\r\n}\r\nfor ($n = 1; $n < 100; $n++) \r\nif (is_perfect($n)) \r\necho $n . '<br \/>';\r\n?><\/pre>\n

    Answer 15.
    \nCyber law is important because it touches almost all aspects of transactions and activities using internet. Whether we realist it or not, every action and every reaction in cyberspace has some legal perspectives.<\/p>\n

    Answer 16.
    \nBiometrics authentication is used in identification of individual. Biometrics identifiers are the distinctive, measurable characteristics used to label and describe individuals.
    \nBiometric identification is popularly used in attendance management system authentication in computers and other devices, Adhar cards, etc.<\/p>\n

    Answer 17.
    \n1. Since there is no size specification, a string of any number of characters can be stored. There is no wastage or insufficiency of memory space. But it should be done with initialization, (e.g., char *str = \u201cProgram\u201d;)
    \n2. Assignment operator (=) can be used to copy strings.
    \n3. Any character in the string can be referenced using the concept of pointer arithmetic which makes access faster.
    \n4. Array of strings can be managed with optimal use of memory space.<\/p>\n

    Answer 18.
    \nC++ implements encapsulation and data hiding through the declaration of a class. A class can contain private, protected and public members.<\/p>\n

    Private: By default, all items defined in a class are private. Members declared under private section are not visible outside the class.<\/p>\n

    Protected: Members declared as protected are visible to its derived class, but not outside the class.<\/p>\n

    Public: All variables or functions defined after the public access specifier are accessible anywhere in our program.<\/p>\n

    Answer 19.
    \nIn linked list, traversal begin from the first node. The pointer Start gives the address of the first node, so that we can access the data part using arrow (->) operator. Then we access the link part of the first part, which is the address of the second node. Using this address, we can access the data and link of the second node. This process is continued until we found NULL pointer in the link of a node.<\/p>\n

    Answer 20.<\/p>\n

    <HTML>\r\n<HEAD> <TITLE> Fruits Details <\/ TITLE> <\/HEAD>\r\n<BODY> <TABLE Border = \u201c1\u201d>\r\n<TR> <TH> Serial number <\/TH> \r\n<TH>Name <\/TH>\r\n<TH>Cost<\/TH> <\/TR>\r\n<TR> <TD>1<\/TD>\r\n<TD>Mango<\/TD>\r\n<TD>70<\/TD> <\/TR>\r\n<TR> <TD>2<\/TD>\r\n<TD > Apple < \/TD >\r\n<TD>100<\/TD> <\/TR>\r\n<TR> <TD>3<\/TD>\r\n<TD>Orange<\/TD>\r\n<TD>40<\/TD> <\/TR>\r\n<TR> <TD>4<\/TD>\r\n<TD>Grapes<\/TD>\r\n<TD>90<\/TD> <\/TR>\r\n<TR> <TD>5<\/TD>\r\n<TD>Plum<\/TD>\r\n<TD>150<\/TD> <\/TR>\r\n<\/BODY>\r\n<\/HTML><\/pre>\n

    Answer 21.<\/p>\n

      \n
    1. alert() function: This function is used to display a message on the screen. This function is used to display a message to the user at the time of data validation, eg., alert (\u201cWelcome to JavaScript\u201d);<\/li>\n
    2. isNaN() function: This function is used to check whether a value is a number or not. In this function, NaN stands for Not a Number. The function returns true if the given value is not a number, eg., isNaN(\u201cAbc\u201d);<\/li>\n
    3. toUpperCasef) function: This function returns the upper case form of the given string. It is called along with the name of the string variable.
      \neg., x.toUpperCaseO; returns the upper case form of the string in the variable x.<\/li>\n
    4. toLowerCaseO function: It returns the lower case form of the given string. If all the characters in the string are already in the, lower case, the toLowerCase () returns the same string.
      \neg., var x, y;
      \nx = \u201cAnuvritha\u201d;
      \ny = x.toLowerCase ();
      \nalert(y);<\/li>\n
    5. charAt() function: It returns the character at a particular position. charAt(0) returns the first character in the string. charAt(1) returns the second character in the string and so on.
      \neg., var x, y;
      \nx = \u201cOrange\u201d;
      \ny = x.charAt(2);
      \nalert(y);
      \nThis will display character \u2018a\u2019.<\/li>\n
    6. length property: It returns the length of the string, length means, the number of characters in the string. The property is called along with the variable.
      \neg., var x, y;
      \nx = \u201cOrange\u201d;
      \ny = x.length;
      \nalert(y);<\/li>\n<\/ol>\n

      Answer 22.
      \nSoftware as ab Service (SaaS): It gives subscribers access to both resources and applications. Here a complete application is offered to the customer, as a service on demand. Consumers purchase the ability to access and use and an application or service that is hosted in the cloud.<\/p>\n

      Platform as a Service (PaaS): A PaaS system goes a level above the software as a Service setup. A PaaS provider gives subscribers access to the components that they require to develop and operate applications over the internet. The customer has the freedom to build his own applications, which run on the provider\u2019s infrastructure.<\/p>\n

      Infrastructure as a Service (IaaS): In this, as the name states, deals primarily with computational infrastructure. IaaS provides basic storage and computing capabilities as standardized services over the network. The customer would typically set up his own software on the infrastructure.<\/p>\n

      Answer 23.
      \n\"Plus<\/p>\n

      Answer 24.
      \n1. Data Definition Language (DDL): These are used to create, modify and remove database objects.
      \n2. Data Manipulation Language (DML): It provides commands for data manipulations. DML is a component of SQL that enhances efficient user interaction with the data system by providing a set of commands.
      \n3. Data Control Language (DCL): It is used to control access to the database, which is very essential to a database system with respect to security concerns.<\/p>\n

      Answer 25.
      \nIt holds information about headers, script locations etc. Its elements are:<\/p>\n

      $_SERVER [\u2018PHP_SELF\u2019] - returns the file name of the currently executing script.\r\n$_SERVER [\u2018SERVER_NAME\u2019] - re-turns the name of the host server.\r\n$_SERVER [\u2018SCRIPT_NAME\u2019] - Same as $_SERVER [\u2018PHP_SELF\u2019]<\/pre>\n

      Answer 26.
      \na. It is a cyber attack against sensitive computer networks like nuclear power plants, air traffic controls, gas line controls, telecom, etc. These types of attacks against governments are increasing globally. Cyber terrorism focuses on the use of the internet by anti-nationals to affect a nation\u2019s economic and technological infrastructure. It may prove to be very costly to a country. Therefore governments provide very powerful security mechanisms for their servers.
      \nb. This is a common cyber attack against a government. Defacement of websites includes hacking of government websites and posting derogatory comments about a government in those websites.
      \nc. These types of attacks deny a particular online government service. This is done using a Distributed Denial of Service (DDoS) attack. They gain access to website administration through content management system and destroy the data. This causes huge loss to the government.<\/p>\n

      Answer 27.
      \nSoftware as ab Service (SaaS): It gives subscribers access to both resources and applications. Here a complete application is offered to the customer, as a service on demand. Consumers purchase the ability to access and use and an application or service that is hosted in the cloud.<\/p>\n

      Platform as a Service (PaaS): A PaaS system goes a level above the software as a Service setup. A PaaS provider gives subscribers access to the components that they require to develop and operate applications over the internet. The customer has the freedom to build , his own applications, which run on the provider\u2019s infrastructure.<\/p>\n

      Infrastructure as a Service (IaaS): In this, as the name states, deals primarily with computational infrastructure. IaaS provides basic storage and computing capabilities as standardized services over the network. The customer would typically set up his own software on the infrastructure.<\/p>\n

      Answer 28.
      \nThese are applied only to individual columns. They are written immediately after the data type of the column. They are:<\/p>\n

        \n
      • NOT NULL: It specifies that a column can never have NULL values. NULL is a keyword that represents an empty value.<\/li>\n
      • Two NULL values cannot be added, subtracted and compared.<\/li>\n
      • AUTO_INCREMENT: It performs an auto-increment feature. By default, the starting value for this constraint is 1 and will be incremented by 1 for each new record. Only one AUTO_ INCRE-MENT column per table is allowed.<\/li>\n
      • UNIQUE: It ensures that no two rows have the same value in the column specified with the constraint.<\/li>\n
      • PRIMARY KEY: It declares a column as the primary key of the table. It is similar to UNIQUE except that it can be applied only to one column or combination of columns. The primary keys cannot contain NULL values.<\/li>\n
      • DEFAULT: A default value can be set for a column, in case the user does not provide a value for that column of a record.<\/li>\n<\/ul>\n

        Answer 29.
        \nDomain names are used to identify a website in the Internet. After finalizing a suitable domain name for our website, we have to check whether this domain name is available for registration or its is already in use by somebody else. The websites like www.whois .net check the database of ICANN that contain the list of all the registered domain names. If the domain name entered is available, we can proceed with the registration. The registration requires filling information for WHOIS database of domain names for ICANN. WHOIS information requires the name, address, telephone number and e-mail address of the registrant. After paying the annual registration fees online, the domain is purchased and is registered in our name. Our domain name has to be connected to the IP address if the web server where the web pages are stored. This is done using \u2018A record\u2019 (Address record) of the domain. An \u2018A record\u2019 is used to store the IP address of a web server connected to a domain name. The \u2018A record\u2019 can be modified by logging into the control panel of the domain.<\/p>\n

        Answer 30.<\/p>\n

        <HTML>\r\n<HEAD>\r\n< TITLE > Details of Students <\/TITLE>\r\n<\/HEAD>\r\n<FORM name = myform METHOD = post action = \u201csave.php\u201d> \r\n<FIELDSET>\r\n<LEGEND> Enter Details of student <\/LEGEND>\r\nName <INPUT TYPE = \u201ctext\u201d Name = txtname> <BR>\r\nAge<INPUT TYPE = \u201ctext\u201d Name = txtage> <BR>\r\nClass<INPUT TYPE = \u201ctext\u201d Class= txtclass> <BR>\r\nSex<INPUT TYPE = \u201cradio\u201d Name = sex VALUE = Male> Male &nbsp; &nbsp; &nbsp;\r\n<INPUT Type = \u201cradio\u201d Name = sex VALUE = Female> Female <BR> \r\nHobbies <INPUT Type = \u201ccheckbox\u201d Name = chkGarden > Gardening &nbsp; &nbsp; &nbsp;\r\n<INPUT Type = \u201ccheckbox\u201d Name = chkRead> Reading <BR>\r\n< INPUT Type =\u201cSubmit\u201d Value= \u201cSave\u201d> &nbsp; &nbsp; &nbsp; \r\n<INPUT Type=\u201cReset\u201dValue= \u201cClear\u201d> \r\n<\/FIELDSET>\r\n<\/FORM>\r\n<\/BODY>\r\n<\/HTML><\/pre>\n

        We hope the Plus Two Computer Science Model Question Papers Paper 2 help you. If you have any query regarding Plus Two Computer Science Model Question Papers Paper 2, drop a comment below and we will get back to you at the earliest.<\/p>\n","protected":false},"excerpt":{"rendered":"

        Plus Two Computer Science Model Question Papers Paper 2 is part of Plus Two Computer Science Previous Year Question Papers and Answers.\u00a0Here we have given Plus Two Computer Science Model Question Papers Paper 2 Plus Two Computer Science Model Question Papers Paper 2 Board SCERT Class Plus Two Subject Computer Science Category Plus Two Previous […]<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[42728],"tags":[],"yoast_head":"\nPlus Two Computer Science Model Question Papers Paper 2 - A Plus Topper<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Plus Two Computer Science Model Question Papers Paper 2\" \/>\n<meta property=\"og:description\" content=\"Plus Two Computer Science Model Question Papers Paper 2 is part of Plus Two Computer Science Previous Year Question Papers and Answers.\u00a0Here we have given Plus Two Computer Science Model Question Papers Paper 2 Plus Two Computer Science Model Question Papers Paper 2 Board SCERT Class Plus Two Subject Computer Science Category Plus Two Previous […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/\" \/>\n<meta property=\"og:site_name\" content=\"A Plus Topper\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/aplustopper\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-27T04:30:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-28T04:20:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nirmala\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aplustopper.com\/#organization\",\"name\":\"Aplus Topper\",\"url\":\"https:\/\/www.aplustopper.com\/\",\"sameAs\":[\"https:\/\/www.facebook.com\/aplustopper\/\"],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.aplustopper.com\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.aplustopper.com\/wp-content\/uploads\/2018\/12\/Aplus_380x90-logo.jpg\",\"contentUrl\":\"https:\/\/www.aplustopper.com\/wp-content\/uploads\/2018\/12\/Aplus_380x90-logo.jpg\",\"width\":1585,\"height\":375,\"caption\":\"Aplus Topper\"},\"image\":{\"@id\":\"https:\/\/www.aplustopper.com\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aplustopper.com\/#website\",\"url\":\"https:\/\/www.aplustopper.com\/\",\"name\":\"A Plus Topper\",\"description\":\"Improve your Grades\",\"publisher\":{\"@id\":\"https:\/\/www.aplustopper.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aplustopper.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png\",\"contentUrl\":\"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#webpage\",\"url\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/\",\"name\":\"Plus Two Computer Science Model Question Papers Paper 2 - A Plus Topper\",\"isPartOf\":{\"@id\":\"https:\/\/www.aplustopper.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#primaryimage\"},\"datePublished\":\"2022-12-27T04:30:59+00:00\",\"dateModified\":\"2022-12-28T04:20:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aplustopper.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Plus Two Computer Science Model Question Papers Paper 2\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.aplustopper.com\/#\/schema\/person\/f32b4ae8f785abf58fd1bde7769e4604\"},\"headline\":\"Plus Two Computer Science Model Question Papers Paper 2\",\"datePublished\":\"2022-12-27T04:30:59+00:00\",\"dateModified\":\"2022-12-28T04:20:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#webpage\"},\"wordCount\":2524,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.aplustopper.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png\",\"articleSection\":[\"HSSLiVE\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aplustopper.com\/#\/schema\/person\/f32b4ae8f785abf58fd1bde7769e4604\",\"name\":\"Nirmala\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.aplustopper.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e6232dae8ded69387559c6a9893402d3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e6232dae8ded69387559c6a9893402d3?s=96&d=mm&r=g\",\"caption\":\"Nirmala\"},\"url\":\"https:\/\/www.aplustopper.com\/author\/nirmala\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Plus Two Computer Science Model Question Papers Paper 2 - A Plus Topper","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/","og_locale":"en_US","og_type":"article","og_title":"Plus Two Computer Science Model Question Papers Paper 2","og_description":"Plus Two Computer Science Model Question Papers Paper 2 is part of Plus Two Computer Science Previous Year Question Papers and Answers.\u00a0Here we have given Plus Two Computer Science Model Question Papers Paper 2 Plus Two Computer Science Model Question Papers Paper 2 Board SCERT Class Plus Two Subject Computer Science Category Plus Two Previous […]","og_url":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/","og_site_name":"A Plus Topper","article_publisher":"https:\/\/www.facebook.com\/aplustopper\/","article_published_time":"2022-12-27T04:30:59+00:00","article_modified_time":"2022-12-28T04:20:05+00:00","og_image":[{"url":"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png"}],"twitter_card":"summary","twitter_misc":{"Written by":"Nirmala","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.aplustopper.com\/#organization","name":"Aplus Topper","url":"https:\/\/www.aplustopper.com\/","sameAs":["https:\/\/www.facebook.com\/aplustopper\/"],"logo":{"@type":"ImageObject","@id":"https:\/\/www.aplustopper.com\/#logo","inLanguage":"en-US","url":"https:\/\/www.aplustopper.com\/wp-content\/uploads\/2018\/12\/Aplus_380x90-logo.jpg","contentUrl":"https:\/\/www.aplustopper.com\/wp-content\/uploads\/2018\/12\/Aplus_380x90-logo.jpg","width":1585,"height":375,"caption":"Aplus Topper"},"image":{"@id":"https:\/\/www.aplustopper.com\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.aplustopper.com\/#website","url":"https:\/\/www.aplustopper.com\/","name":"A Plus Topper","description":"Improve your Grades","publisher":{"@id":"https:\/\/www.aplustopper.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aplustopper.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#primaryimage","inLanguage":"en-US","url":"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png","contentUrl":"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png"},{"@type":"WebPage","@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#webpage","url":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/","name":"Plus Two Computer Science Model Question Papers Paper 2 - A Plus Topper","isPartOf":{"@id":"https:\/\/www.aplustopper.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#primaryimage"},"datePublished":"2022-12-27T04:30:59+00:00","dateModified":"2022-12-28T04:20:05+00:00","breadcrumb":{"@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aplustopper.com\/"},{"@type":"ListItem","position":2,"name":"Plus Two Computer Science Model Question Papers Paper 2"}]},{"@type":"Article","@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#article","isPartOf":{"@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#webpage"},"author":{"@id":"https:\/\/www.aplustopper.com\/#\/schema\/person\/f32b4ae8f785abf58fd1bde7769e4604"},"headline":"Plus Two Computer Science Model Question Papers Paper 2","datePublished":"2022-12-27T04:30:59+00:00","dateModified":"2022-12-28T04:20:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#webpage"},"wordCount":2524,"commentCount":0,"publisher":{"@id":"https:\/\/www.aplustopper.com\/#organization"},"image":{"@id":"https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#primaryimage"},"thumbnailUrl":"https:\/\/farm8.staticflickr.com\/7880\/46580515331_916e44a14e_o.png","articleSection":["HSSLiVE"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.aplustopper.com\/plus-two-computer-science-model-question-papers-paper-2\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.aplustopper.com\/#\/schema\/person\/f32b4ae8f785abf58fd1bde7769e4604","name":"Nirmala","image":{"@type":"ImageObject","@id":"https:\/\/www.aplustopper.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/e6232dae8ded69387559c6a9893402d3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e6232dae8ded69387559c6a9893402d3?s=96&d=mm&r=g","caption":"Nirmala"},"url":"https:\/\/www.aplustopper.com\/author\/nirmala\/"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/posts\/35770"}],"collection":[{"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/comments?post=35770"}],"version-history":[{"count":1,"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/posts\/35770\/revisions"}],"predecessor-version":[{"id":154305,"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/posts\/35770\/revisions\/154305"}],"wp:attachment":[{"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/media?parent=35770"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/categories?post=35770"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aplustopper.com\/wp-json\/wp\/v2\/tags?post=35770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}