Home Free CBSE IT Resources

Viva Questions for CBSE Computer Science XII(2024-25)

Recent Topics

Answer: Python is a high-level, interpreted, and general-purpose programming language.

Answer: Python was created by Guido van Rossum.

Answer: Python 2 and Python 3.

Answer: Indentation is used to define a block of code. It is a way of grouping statements.

Answer: Comments in Python are created using the '#' symbol.

Answer: PEP 8 is a style guide for Python code, providing conventions for writing readable and consistent code.

Answer: print("Hello, World!")

Answer: A variable is a reserved memory location to store values.

Answer: variable_name = value

Answer: = is the assignment operator, while == is the equality operator used to compare values.

Answer: Python is dynamically typed, meaning the type of a variable is interpreted at runtime.

Answer: A tuple is an ordered, immutable collection of elements.

Answer: Elements in a tuple are accessed using index values, starting from 0.

Answer: A list is a mutable, ordered collection of elements, allowing for modification of its contents.

Answer: Slicing is a way to extract a portion of a sequence (string, list, etc.) by specifying a range.

Answer: len(my_list) returns the number of elements in the list.

Answer: A dictionary is an unordered collection of key-value pairs.

Answer: my_dict[key] = value

Answer: The if statement is used for conditional execution of code.

Answer: elif is used for additional conditions, while else is a fallback for when none of the previous conditions are met.

Answer: A loop is a way to repeat a block of code multiple times.

Answer: for loop and while loop.

Answer: The break statement is used to exit a loop prematurely.

Answer: A function is a block of reusable code that performs a specific task.

Answer: def function_name(parameters):

Answer: The return statement is used to exit a function and return a value.

Answer: A module is a file containing Python definitions and statements. It can be reused in other programs using the import statement.

Answer: append() adds a single element to the end of the list, while extend() adds elements from an iterable to the end.

Answer: file = open('filename', 'mode')

Answer: The with statement ensures that the file is properly closed after the block is executed.

Answer: An exception is an event that occurs during the execution of a program, indicating an error.

Answer: Exceptions are handled using the try, except, and optionally finally blocks.

Answer: Inheritance is a mechanism by which a class can inherit properties and methods from another class.

Answer: The super() function is used to call a method from the parent class.

Answer: import module_name

Answer: The __init__ method is a constructor that initializes the attributes of a class when an object is created.

Answer: python -m venv myenv

Answer: pip is a package installer for Python, used to install and manage Python packages.

Answer: pip install package_name

Answer: The lambda function is used to create small, anonymous functions.

Answer: A decorator is a design pattern in Python that allows the modification of functions or methods using other functions.

Answer: type(variable)

Answer: The global keyword is used to indicate that a variable is a global variable.

Answer: Use parentheses to catch multiple exceptions: except (ExceptionType1, ExceptionType2) as e:

Answer: The __str__ method is used to represent an object as a string.

Answer: A generator is a special type of iterator that allows the lazy evaluation of values.

Answer: [expression for item in iterable if condition]

Answer: The map function applies a given function to all items in an input list.

Answer: The filter function filters elements of an iterable based on a function that returns True or False.

Answer: list(set(my_list))

Answer: A set is an unordered collection of unique elements.

Answer: my_set.add(element)

Answer: The union method combines two sets, eliminating duplicate elements.

Answer: element in my_set

Answer: The pop method removes and returns an arbitrary element from the set.

Answer: class ClassName:

Answer: Encapsulation is the bundling of data and methods that operate on the data into a single unit, known as a class.

Answer: The __doc__ attribute contains the docstring of a module, class, or function.

Answer: isinstance(object, class)

Answer: Polymorphism allows objects to be treated as instances of their parent class.

Answer: The zip function combines multiple iterables into a single iterable.

Answer: my_list.reverse()

Answer: The enumerate function adds a counter to an iterable and returns it in a form of (index, element).

Answer: raise ExceptionType("Error message")

Answer: The is operator is used to check if two variables reference the same object.

Answer: my_string.lower()

Answer: The strip method removes leading and trailing whitespaces from a string.

Answer: my_string.startswith("substring")

Answer: The format method is used to format strings by replacing placeholders with values.

Answer: max(my_list)

Answer: The sorted function returns a sorted list from the elements of any iterable.

Answer: str(my_integer)

Answer: A docstring is a string literal that occurs as the first statement in a module, class, function, or method.

Answer: import os and then os.path.exists("filename")

Answer: The os module provides a way of using operating system-dependent functionality.

Answer: len(my_string)

Answer: The all function returns True if all elements of an iterable are true.

Answer: int(my_string)

Answer: The try block contains code that might raise an exception, and the except block handles the exception.

Answer: tuple(my_list)

Answer: The sum function returns the sum of all items in an iterable.

Answer: min(my_list)

Answer: The any function returns True if at least one element of an iterable is true.

Answer: (number % 2) != 0

Answer: The sys module provides access to some variables used or maintained by the Python interpreter.

Answer: list1 + list2

Answer: The math module provides mathematical functions.

Answer: import math

Answer: my_list = []

Answer: my_list.append(element)

Answer: append() adds a single element to the end, while extend() adds elements from an iterable to the end.

Answer: my_list[0]

Answer: my_list.remove(value)

Answer: my_list.reverse()

Answer: List comprehension is a concise way to create lists using a single line of code.

Answer: element in my_list

Answer: The pop method removes and returns an element at a specified index or the last element if no index is specified.

Answer: len(my_list)

Answer: my_tuple = ()

Answer: Tuples are immutable, meaning their elements cannot be changed after creation, while lists are mutable.

Answer: Elements in a tuple are accessed using index values, starting from 0.

Answer: No, tuples are immutable, and their elements cannot be changed.

Answer: my_tuple = tuple(my_list)

Answer: Unpacking allows assigning multiple variables at once using the elements of a tuple.

Answer: The count method returns the number of occurrences of a specified value in the tuple.

Answer: element in my_tuple

Answer: The index method returns the index of the first occurrence of a specified value in the tuple.

Answer: Yes, tuples can contain elements of different data types.

Answer: my_dict = {}

Answer: A dictionary is an unordered collection of key-value pairs.

Answer: my_dict[key] = value

Answer: my_dict[key]

Answer: No, keys in a dictionary must be unique.

Answer: key in my_dict

Answer: The get method returns the value for a specified key, or a default value if the key is not found.

Answer: del my_dict[key] or my_dict.pop(key)

Answer: my_dict.keys()

Answer: The items method returns a view of all key-value pairs as tuples.

Answer: file = open('filename', 'mode')

Answer: Modes include 'r' for reading, 'w' for writing, 'a' for appending, and 'b' for binary.

Answer: file.close()

Answer: The with statement ensures proper handling of resources and automatically closes the file.

Answer: content = file.read()

Answer: content = file.read(N)

Answer: lines = file.readlines()

Answer: file.write('content')

Answer: The seek method moves the file pointer to a specified position.

Answer: import os and then os.path.exists("filename")

Answer: file = open('newfile.txt', 'w')

Answer: The readline method reads a single line from the file.

Answer: file = open('filename', 'a')

Answer: Use modes 'rb' for reading binary and 'wb' for writing binary.

Answer: for line in file:

Answer: The tell method returns the current position of the file cursor.

Answer: Use the chardet library or other tools to detect the file encoding.

Answer: Use the readline method in a loop or read all lines into a list and access the desired line by index.

Answer: The flush method flushes the internal buffer, ensuring that all data is written to the file.

Answer: Use a try, except block to catch and handle exceptions that may occur during file operations.

Answer: A list is a collection of ordered and mutable elements.

Answer: my_list = []

Answer: my_list.append(element)

Answer: append() adds a single element to the end, while extend() adds elements from an iterable.

Answer: my_list.remove(value)

Answer: The pop() method removes and returns the element at the specified index.

Answer: my_list.reverse()

Answer: List comprehension is a concise way to create lists using a single line of code.

Answer: my_list.index(element)

Answer: sort() is an in-place method, while sorted() returns a new sorted list.

Answer: A tuple is an ordered and immutable collection of elements.

Answer: my_tuple = ()

Answer: Yes, a tuple can contain elements of different data types.

Answer: Elements in a tuple are accessed using index values, starting from 0.

Answer: The count() method returns the number of occurrences of a specified value in the tuple.

Answer: list(my_tuple)

Answer: Yes, tuples can be used as keys in dictionaries if they are immutable.

Answer: Packing is putting values into a tuple, and unpacking is extracting values from a tuple.

Answer: Lists are mutable, while tuples are immutable.

Answer: tuple1 + tuple2

Answer: A dictionary is an unordered collection of key-value pairs.

Answer: my_dict = {}

Answer: my_dict[key] = value

Answer: my_dict[key]

Answer: The keys() method returns a view of all keys in the dictionary.

Answer: key in my_dict

Answer: The items() method returns a view of all key-value pairs in the dictionary.

Answer: del my_dict[key]

Answer: No, dictionary keys must be unique.

Answer: The get() method returns the value for a specified key, or a default value if the key is not present.

Answer: file = open('filename', 'mode')

Answer: The with statement ensures proper file handling by automatically closing the file when the block is exited.

Answer: content = file.read()

Answer: file.write('content')

Answer: 'r' is for reading, 'w' is for writing (creates a new file or truncates an existing one), and 'a' is for appending.

Answer: content = file.read(number_of_characters)

Answer: The readline() method reads a single line from the file.

Answer: Use a for loop: for line in file:

Answer: file.close()

Answer: import os and then os.path.exists("filename")

Answer: The tell() method returns the current position of the file cursor.

Answer: file.seek(offset, whence)

Answer: The 'with' statement is used to wrap the execution of a block with methods defined by a context manager.

Answer: Use file.writelines(list_of_lines)

Answer: The flush() method flushes the internal buffer, ensuring that the data is written to the file.

Answer: os.rename("old_filename", "new_filename")

Answer: os.remove("filename")

Answer: The mode parameter specifies the purpose of opening the file (read, write, append, etc.).

Answer: os.access("filename", os.R_OK)

Answer: The truncate() method resizes the file to the given size.

Answer: Use a try-except block for FileNotFoundError.

Answer: The finally block contains code that will be executed regardless of whether an exception occurs or not.

Answer: raise CustomException("Error message")

Answer: os.path.isfile("filename") checks if a path is an existing regular file.

Answer: os.access("filename", os.W_OK)

Answer: os.path.isdir("directory_name") checks if a path is an existing directory.

Answer: Use a try-except block for IOError.

Answer: os.path.join() joins path components intelligently.

Answer: os.path.getsize("filename")

Answer: Binary mode is used to indicate that the file should be treated as a binary file, not a text file.

Answer: Use shutil.copy("source_filename", "destination_filename")

Answer: The shutil module provides a higher-level interface for file operations.

Answer: Use the shutil.make_archive() function.

Answer: Use the shutil.unpack_archive() function.

Answer: os.path.exists("path") checks if a path exists.

Answer: os.getcwd()

Answer: os.listdir("directory") returns a list containing the names of the entries in the directory.

Answer: os.rmdir("directory_name")

Answer: os.path.abspath("path") returns the absolute version of a path.

Answer: os.path.isabs("path")

Answer: An exception is an event that occurs during the execution of a program, indicating an error.

Answer: Exceptions are handled using the try, except, and optionally finally blocks.

Answer: The except block is used to handle exceptions. Code within this block is executed when an exception of the specified type occurs.

Answer: The finally block contains code that is always executed, regardless of whether an exception occurred or not.

Answer: raise CustomException("Error message")

Answer: The assert statement is used to test if a given condition is True. If it is not, an AssertionError is raised.

Answer: Use parentheses to catch multiple exceptions: except (ExceptionType1, ExceptionType2) as e:

Answer: The else block is executed if no exception occurs in the try block.

Answer: The with statement is used to ensure the proper acquisition and release of resources, such as file handling.

Answer: Handle NameError by checking if the variable is defined or using a default value.

Answer: A function is a block of reusable code that performs a specific task.

Answer: def function_name(parameters):

Answer: The return statement is used to exit a function and return a value.

Answer: Parameters are variables in a function definition, and arguments are the values passed into a function.

Answer: function_name(arguments)

Answer: Positional arguments are passed based on their position, while keyword arguments are identified by parameter names.

Answer: MySQL is an open-source relational database management system (RDBMS) that uses Structured Query Language (SQL).

Answer: MySQL is developed and maintained by Oracle Corporation.

Answer: MySQL features include ACID compliance, support for various storage engines, data security, and scalability.

Answer: The default port number for MySQL is 3306.

Answer: mysql -u username -p

Answer: It displays a list of all available databases.

Answer: USE database_name;

Answer: CREATE USER 'username'@'localhost' IDENTIFIED BY 'password';

Answer: GRANT privilege(s) ON database.table TO 'username'@'localhost';

Answer: It reloads the privileges from the grant tables in the MySQL database.

Answer: INT, FLOAT, DOUBLE, DECIMAL.

Answer: CREATE TABLE table_name (column1 datatype, column2 datatype, ...);

Answer: It uniquely identifies each record in a table.

Answer: CREATE TABLE table_name (column1 datatype PRIMARY KEY, ...);

Answer: It automatically increments the value of the column for each new record.

Answer: ALTER TABLE table_name ADD COLUMN new_column datatype;

Answer: It ensures that all values in a column are unique.

Answer: CREATE TABLE table_name (column1 datatype UNIQUE, ...);

Answer: It establishes a link between two tables using a foreign key.

Answer: CREATE TABLE table_name (column1 datatype, column2 datatype, FOREIGN KEY (column1) REFERENCES another_table(column2));

Answer: INSERT INTO table_name (column1, column2, ...) VALUES (value1, value2, ...);

Answer: It retrieves data from one or more tables.

Answer: SELECT * FROM table_name;

Answer: It filters the results based on a specified condition.

Answer: UPDATE table_name SET column1 = value1, ... WHERE condition;

Answer: DELETE FROM table_name WHERE condition;

Answer: It sorts the result set based on one or more columns.

Answer: SELECT * FROM table_name LIMIT number_of_rows;

Answer: It groups the result set by one or more columns.

Answer: SELECT COUNT(column) FROM table_name;

Answer: A join is a way to combine rows from two or more tables based on a related column between them.

Answer: SELECT * FROM table1 INNER JOIN table2 ON table1.column = table2.column;

Answer: A left join returns all rows from the left table and the matched rows from the right table.

Answer: SELECT * FROM table_name WHERE column_name IN (value1, value2, ...);

Answer: A subquery is a query nested inside another query.

Answer: SELECT column FROM table_name WHERE column_name operator (SELECT column FROM another_table WHERE condition);

Answer: A correlated subquery refers to a subquery that depends on the outer query.

Answer: SELECT column FROM table_name WHERE EXISTS (SELECT column FROM another_table WHERE condition);

Answer: ANY compares a value to any value in a subquery, and ALL compares a value to all values in a subquery.

Answer: SELECT * FROM table_name t1 INNER JOIN table_name t2 ON t1.column = t2.column;

Answer: Aggregate functions perform a calculation on a set of values and return a single value.

Answer: SELECT SUM(column) FROM table_name;

Answer: It calculates the average value of a numeric column.

Answer: SELECT MAX(column), MIN(column) FROM table_name;

Answer: It counts the number of rows in a result set.

Answer: SELECT GROUP_CONCAT(column) FROM table_name;

Answer: It filters the results of a GROUP BY clause based on a specified condition.

Answer: SELECT DISTINCT column FROM table_name;

Answer: It renames a column or table using an alias.

Answer: A view is a virtual table based on the result of a SELECT query.

Answer: CREATE VIEW view_name AS SELECT column1, column2 FROM table_name WHERE condition;

Answer: Indexes improve the speed of data retrieval operations on a database.

Answer: CREATE INDEX index_name ON table_name (column_name);

Answer: A composite index involves more than one column and improves query performance for multiple conditions.

Answer: DROP INDEX index_name ON table_name;

Answer: A primary key is a combination of columns that uniquely identifies each row, while a unique index enforces uniqueness but allows NULL values.

Answer: SHOW INDEX FROM table_name;

Answer: A FULLTEXT index is used for full-text searches on text columns.

Answer: CREATE FULLTEXT INDEX index_name ON table_name (column_name);

Answer: A transaction is a sequence of one or more SQL statements that are executed as a single unit.

Answer: ACID stands for Atomicity, Consistency, Isolation, and Durability, ensuring the reliability of transactions.

Answer: START TRANSACTION;

Answer: It saves all changes made during the current transaction.

Answer: ROLLBACK;

Answer: In READ COMMITTED, a transaction sees only committed data, while in READ UNCOMMITTED, it can see uncommitted data.

Answer: A deadlock is a situation where two or more transactions cannot proceed because each is waiting for the other to release a lock.

Answer: LOCK TABLES table_name [AS alias] {READ | WRITE};

Answer: It releases any table locks held by the current session.

Answer: SET TRANSACTION ISOLATION LEVEL isolation_level;

Answer: A stored procedure is a set of SQL statements that can be executed as a single unit.

Answer: It is used to execute a stored procedure.

Answer: IN, OUT, and INOUT parameters can be used.

Answer: DROP PROCEDURE IF EXISTS procedure_name;

Answer: A trigger is a set of instructions that are automatically executed (or fired) in response to certain events.

Answer: BEFORE triggers are executed before the event, and AFTER triggers are executed after the event.

Answer: ALTER TABLE table_name DISABLE TRIGGER trigger_name;

Answer: They represent the old and new values of the row being affected by the trigger.

Answer: A computer network is a collection of interconnected devices (such as computers, printers, etc.) that can communicate and share resources.

Answer: Networking enables communication and resource sharing among different devices, facilitating data exchange and collaboration.

Answer: A node is a device or a data point in a network, such as a computer, printer, or router.

Answer: LAN (Local Area Network) is limited to a small geographic area, while WAN (Wide Area Network) covers a larger geographic area, often connecting multiple LANs.

Answer: A protocol is a set of rules that govern the communication between devices in a network.

Answer: The OSI (Open Systems Interconnection) model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven abstraction layers.

Answer: Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Answer: A protocol stack refers to the implementation of a protocol suite, which is a set of related protocols used together to perform network communication functions.

Answer: The Physical layer deals with the physical connection between devices, specifying characteristics like cables, connectors, and transmission rates.

Answer: The Data Link layer is responsible for framing data into frames, error detection, and addressing within the local network.

Answer: A router is a networking device that connects different networks and forwards data between them.

Answer: A switch is a networking device that connects devices within the same network, using MAC addresses to forward data.

Answer: A hub is a basic networking device that connects multiple devices in a LAN, but it operates at the Physical layer and does not filter or interpret data.

Answer: A bridge connects two or more network segments at the Data Link layer, filtering traffic based on MAC addresses.

Answer: A gateway is a network node that connects two networks that use different communication protocols.

Answer: A modem (modulator-demodulator) converts digital data from a computer into analog signals for transmission over analog communication lines and vice versa.

Answer: A firewall is a security device or software that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.

Answer: A repeater is a device that amplifies and retransmits signals in a network to extend the reach of the network.

Answer: A proxy server acts as an intermediary between a user's device and the internet, forwarding requests and responses.

Answer: A NIC is a hardware component that allows computers to connect to a network, providing a physical connection to the network medium.

Answer: A network topology is the arrangement of various elements (links, nodes, etc.) in a computer network.

Answer: Bus, Ring, Star, Mesh, Tree.

Answer: In a bus topology, all devices share a single communication line or cable.

Answer: In a ring topology, each device is connected to exactly two other devices, forming a closed loop.

Answer: In a star topology, all devices are connected to a central hub or switch.

Answer: In a mesh topology, every device is connected to every other device in the network.

Answer: A hybrid topology is a combination of two or more different types of topologies.

Answer: In a client-server model, one or more servers provide services to multiple clients.

Answer: In a peer-to-peer model, all devices have equal status and can communicate directly with each other.

Answer: The TCP/IP model is a suite of protocols that forms the basis for the internet. It consists of four layers: Link, Internet, Transport, and Application.

Answer: An IP address is a numerical label assigned to each device participating in a computer network that uses the Internet Protocol for communication.

Answer: IPv4 (Internet Protocol version 4) and IPv6 (Internet Protocol version 6).

Answer: IPv4 addresses are represented as four sets of numbers separated by dots (e.g., 192.168.0.1).

Answer: Subnetting allows a network to be divided into smaller, manageable sub-networks for better organization and improved security.

Answer: A subnet mask is a 32-bit number that divides an IP address into network and host portions.

Answer: CIDR (Classless Inter-Domain Routing) notation is a compact representation of an IP address and its associated routing prefix.

Answer: Private IP addresses are reserved for use within private networks and are not routable on the internet. Examples include addresses in the ranges 192.168.x.x and 10.x.x.x.

Answer: DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network.

Answer: DNS (Domain Name System) translates human-readable domain names into IP addresses.

Answer: A MAC (Media Access Control) address is a unique identifier assigned to network interfaces for communications on the physical network segment.

Answer: Routing is the process of forwarding data packets from one network to another.

Answer: A router is a device that connects different networks and forwards data between them.

Answer: Routing tables contain information about routes used by routers to forward data.

Answer: A default gateway is a router or gateway that acts as an entry and exit point for data leaving or entering a network.

Answer: A switch is a networking device that connects devices within the same network, using MAC addresses to forward data.

Answer: A VLAN (Virtual Local Area Network) is a logical network created within a physical network, allowing devices to communicate as if they are on the same physical network.

Answer: A switch operates at the Data Link layer, filtering and forwarding data based on MAC addresses, while a hub simply broadcasts data to all connected devices.

Answer: A broadcast domain is the set of all devices on a network segment that hear broadcasts sent by any device within that segment.

Answer: ARP (Address Resolution Protocol) maps IP addresses to MAC addresses on a local network.

Answer: A routing protocol is a set of rules used by routers to communicate and share information about the network.

Answer: Network security involves implementing measures to protect data during transmission and prevent unauthorized access to network resources.

Answer: A firewall is a security device or software that monitors and controls incoming and outgoing network traffic, based on predetermined security rules.

Answer: A VPN (Virtual Private Network) provides a secure connection over the internet, encrypting data for confidentiality.

Answer: An IDS is a security tool that monitors network or system activities for malicious activities or policy violations.

Answer: Encryption transforms data into a secure format, preventing unauthorized access.

Answer: Antivirus software detects, prevents, and removes malicious software (malware) from a computer or network.

Answer: Authentication is the process of verifying the identity of a user, device, or system.

Answer: A DDoS (Distributed Denial of Service) attack floods a network or website with traffic, causing a service disruption.

Answer: A proxy server acts as an intermediary between a user's device and the internet, providing anonymity and security.

Answer: A honeypot is a security mechanism set up to attract and detect attackers or unauthorized users.

Answer: A wireless network is a network where devices communicate without physical cables, using radio waves or infrared signals.

Answer: Wi-Fi is a technology that allows devices to connect to a wireless local area network (WLAN) using radio waves.

Answer: SSID (Service Set Identifier) is a unique name given to a wireless network.

Answer: WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) are encryption protocols used to secure wireless networks.

Answer: A wireless router combines the functions of a router and a wireless access point, allowing devices to connect to the internet wirelessly.

Answer: Roaming allows a wireless device to move freely within the coverage area of multiple wireless access points.

Answer: Bluetooth is a wireless technology used for short-range communication between devices.

Answer: NFC is a short-range wireless communication technology that allows devices to communicate by touching or being in close proximity.

Answer: A repeater extends the range of a wireless network by amplifying and retransmitting signals.

Answer: A hotspot is a physical location where Wi-Fi access is available to the public.

Answer: The Internet is a global network of interconnected computers and computer networks that use standardized communication protocols.

Answer: The World Wide Web is an information space where documents and other web resources are identified by URLs, linked by hypertext, and accessible via the internet.

Answer: A URL (Uniform Resource Locator) is a web address that specifies the location of a resource on the internet.

Answer: A web browser is a software application used to access and view information on the World Wide Web.

Answer: HTTP (Hypertext Transfer Protocol) is a protocol used for transmitting hypertext over the internet. HTTPS (Hypertext Transfer Protocol Secure) is a secure version of HTTP that uses encryption.

Answer: HTML (Hypertext Markup Language) is the standard markup language for creating web pages.

Answer: CSS (Cascading Style Sheets) is a style sheet language used for describing the look and formatting of a document written in HTML.

Answer: 0