Plus Two / 12th Computer Science - Book Back Answers - Chapter 3 - English Medium
Tamil Nadu Board 12th Standard Computer Science - Chapter 3: Book Back Answers and Solutions
This post covers the book back answers and solutions for Chapter 3 from the Tamil Nadu State Board 12th Standard Computer Science textbook. These detailed answers have been carefully prepared by our expert teachers at KalviTips.com.
We have explained each answer in a simple, easy-to-understand format, highlighting important points step by step under the relevant subtopics. Students are advised to read and memorize these subtopics thoroughly. Once you understand the main concepts, you’ll be able to connect other related points with real-life examples and confidently present them in your tests and exams.
By going through this material, you’ll gain a strong understanding of Chapter 3 along with the corresponding book back questions and answers (PDF format).
Question Types Covered:
- 1 Mark Questions: Choose the correct answer, Fill in the blanks, Identify the correct statement, Match the following
- 2 Mark Questions: Answer briefly
- 3, 4, and 5 Mark Questions: Answer in detail
All answers are presented in a clear and student-friendly manner, focusing on key points to help you score full marks.
All the best, Class 12 students! Prepare well and aim for top scores. Thank you!
Chapter 3: Scoping
I. Choose the correct answer.
1. Which of the following refers to the visibility of variablesin one part of a program to another part of the same program.
(A) Scope
(B) Memory
(C) Address
(D) Accessibility
Answer Key:
(A) Scope
2. The process of binding a variable name with an object is called
(A) Scope
(B) Mapping
(C) late binding
(D) early binding
Answer Key:
(B) Mapping
3. Which of the following is used in programming languages to map the variable and object?
(A) ::
(B) :=
(C) =
(D) ==
Answer Key:
(C) =
4. Containers for mapping names of variables to objects is called
(A) Scope
(B) Mapping
(C) Binding
(D) Namespaces
Answer Key:
(D) Namespaces
5. Which scope refers to variables defined in current function?
(A) Local Scope
(B) Global scope
(C) Module scope
(D) Function Scope
Answer Key:
(A) Local Scope
6. The process of subdividing a computer program into separate sub-programs is called
(A) Procedural Programming
(B) Modular programming
(C) Event Driven Programming
(D) Object oriented Programming
Answer Key:
(B) Modular programming
7. Which of the following security technique that regulates who canuse resources in a computing environment?
(A) Password
(B) Authentication
(C) Access control
(D) Certification
Answer Key:
(C) Access control
8. Which of the following members of a class can be handled only from within the class?
(A) Public members
(B) Protected members
(C) Secured members
(D) Private members
Answer Key:
(D) Private members
9. Which members are accessible from outside the class?
(A) Public members
(B) Protected members
(C) Secured members
(D) Private members
Answer Key:
(A) Public members
10. The members that are accessible from within the class and are also available to its subclasses is called
(A) Public members
(B) Protected members
(C) Secured members
(D) Private members
Answer Key:
(B) Protected members
(A) Scope
(B) Memory
(C) Address
(D) Accessibility
Answer Key:
(A) Scope
2. The process of binding a variable name with an object is called
(A) Scope
(B) Mapping
(C) late binding
(D) early binding
Answer Key:
(B) Mapping
3. Which of the following is used in programming languages to map the variable and object?
(A) ::
(B) :=
(C) =
(D) ==
Answer Key:
(C) =
4. Containers for mapping names of variables to objects is called
(A) Scope
(B) Mapping
(C) Binding
(D) Namespaces
Answer Key:
(D) Namespaces
5. Which scope refers to variables defined in current function?
(A) Local Scope
(B) Global scope
(C) Module scope
(D) Function Scope
Answer Key:
(A) Local Scope
6. The process of subdividing a computer program into separate sub-programs is called
(A) Procedural Programming
(B) Modular programming
(C) Event Driven Programming
(D) Object oriented Programming
Answer Key:
(B) Modular programming
7. Which of the following security technique that regulates who canuse resources in a computing environment?
(A) Password
(B) Authentication
(C) Access control
(D) Certification
Answer Key:
(C) Access control
8. Which of the following members of a class can be handled only from within the class?
(A) Public members
(B) Protected members
(C) Secured members
(D) Private members
Answer Key:
(D) Private members
9. Which members are accessible from outside the class?
(A) Public members
(B) Protected members
(C) Secured members
(D) Private members
Answer Key:
(A) Public members
10. The members that are accessible from within the class and are also available to its subclasses is called
(A) Public members
(B) Protected members
(C) Secured members
(D) Private members
Answer Key:
(B) Protected members
II.Answer the following questions.
12th Computer Science (soon)
III. Answer the following questions.
12th Computer Science (Soon)
IV. Answer the following questions.
12th Computer Science (Soon)
0 Comments:
Post a Comment