MeroPaper

  • About Us
  • Contact Us
Important latest questions of Computer Science Class 12

Important latest questions of Computer Science Class 12

Unit 1 System Development Concept

computer science

Class: 12 | Subject: Computer Science

Short Answer Questions.

  1. What are the major activities in SDLC with based on waterfall model? [5]
  2. Write the importance and necessity of SDLC. [5]
  3. Describe the components of feasibility study. [5]
  4. Who is system analyst? List out characteristics of system analyst. [1+4]
  5. Describe system flowchart with diagram. [5]
  6. Describe SDLC with diagram. [5]
  7. What is feasibility study? Explain different levels of feasibility study. [2+3]
  8. What is E-R diagram? Explain the advantage of E-R diagram in system design. [1+4]
  9. Write the importance of SDLC. [5]
  10. What is feasibility study? Why it is necessary before designing a system? [2+3]
  11. What is expert system? Explain the fields of expert system. [1+4]
  12. What is system analysis and design? Describe briefly. [5]
  13. Describe different levels of feasibility study. [5]
  14. Who is system analyst? List out the rolls of system analyst. [1+4]
  15. Explain SDLC with appropriate diagram. [5]
  16. What is feasibility study? Explain different levels of feasibility study. [1+4]
  17. What is system? Explain the basic elements of system. [1+4]
  18. Who is system analyst? List out roles of system analyst. [1+4]
  19. Explain different stages of system development life cycle with clear figure. [5]
  20. What is feasibility study? Why feasibility study is important in system analysis phase? Explain. [2+5]
  21. Who is system analyst? Highlight the characteristics of a good analyst. [2+5]
  22. What are the documentation techniques? Explain with an example. [7]
  23. Define program logic. Explain different types of program logic tools. [2+5]
  24. What is system analysis? What are the major objectives of system analysis? Explain. [2+5]
  25. What is system analyst? Explain the major roles of system analyst. [2+5]
  26. What is feasibility study? Explain the different levels of feasibility study. [2+5]
  27. Explain about the system design methodologies. [7]
  28. Explain about the importance of computer security in this knowledge based society. [7]
  29. What are the different program logic tools? Explain about the decision table and decision tree with examples. [2+5]
  30. Explain about the different testing techniques during  the system development. [7]
  31. How can you test a newly developed system? Explain different types of testing techniques. [2+5]
  32. Differentiate between decision table and decision tree with example. [7]
  33. What is data security? How it can be implemented? [2+5]
  34. What is documentation? Explain the importance of documentation in program designing. [2+5]
  35. Who is system analyst? Explain the different stages of system development life cycle. [2+5]
  36. What are the different symbols used to construct a flow chart? Give brief explanation about a neat diagram. [2+5]
  37. What is program logic? Explain the different types of program logic design tools. [2+5]
  38. Define feasibility study. Why feasibility study is important in system development process. [2+5]
  39. What are the documentation techniques? Explain any three of them. [2.5+4.5]
  40. What do you mean by algorithm? Explain the aims of program design and building blocks of a structured programming. [3+4]
  41. State the steps involved in system development cycle in chronological order. Explain data security laws. [5+2]
  42. What is the importance of Data flow diagrams in the S.D.L.C? What do you mean by the following terms (any two): [3+4]

a. Physics system

b. C.A.S.E

c. P.I.E.C.E.S

d. Feasibility study

43. Define the term system. List different stages of system development life cycle. Highlight the importance of the first two stages. [2+3+2]

44. Who is systems analyst? Highlight the characteristics of a good analyst. [3+4]

Write Short Notes on:

45. Expert System.[2.5]

46. System Security. [2.5]

47. Data Security. [5]

48. Feasibility Study. [3.5]

Comments

comments

%d bloggers like this: