Professional Documents
Culture Documents
in
COMPUTER
APPLICATIONS
in
XII
s s.
re
2, 3 &
5 Mark
e xp
vi
al
.k
w
w
w
Name:……………………………...….
Class:……………Sec……..............
Roll No:………………….……………..
School:…………………………………..
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
s s.
re
e xp
vi
al
.k
w
w
w
2
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
5 PHP FUNCTION AND ARRAY 30
s.
6 PHP CONDITIONAL STATEMENTS 35
s
re
7 LOOPING STRUCTURE
xp 42
13 NETWORK CABLING 76
w
15 E-COMMERCE 86
3
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
s s.
re
e xp
vi
al
.k
w
w
w
4
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2 Mark
1.Define Multimedia
Multimedia is an integration of many types of media like text, images, graphics, audio,
video, animation etc.
1.Text
in
2. Images
s.
3. Audio
s
4.Video
re
5. Animation xp
3.Classify the TEXT Component in multimedia
e
vi
❖ Static Text
al
❖ Hyper Text
❖ Vector Images
w
5. Define Animation
w
Animation is the process of displaying still images so quickly so that they give the
impression of continuous movement.
5
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3. OGG
in
6. RA (Real Audio Format)
s s.
8. List out video file formats
re
1. AVI (Audio/Video Interleave)
xp
2. MPEG (Moving Picture Experts Group)
5.Multimedia Architect
6
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
in
s.
2. Describe the features and techniques of animation.
s
❖ Animation may be in two or three dimensional
re
❖ Animation tools are very powerful and effective.
xp
❖ Two types of Animation Path animation and Frame animation.
e
3. Write roles and responsibilities of Production team members.
vi
Various roles and responsibilities like Production Manager , Script Writer, Text
editor, Graphics Architect, Multimedia Architect, and Web Master.
al
.k
7
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
1.Explain in detail process of Multimedia
in
travel, communication and publishing.
s.
5 Multimedia Production Team Team for Production Manager ,Script writer,
Editor, Graphics & Multimedia Architect, Web
s
master.
re
6 Hardware/Software Selection Hardware includes fastest CPU, RAM, Monitors,
xp
Hard disks. Software is the selection of suitable
software.
e
7 Defining the content Content is the narration, bullets, charts and tables
vi
etc.
al
8
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
• Animation is the process displaying still images so quickly so that they give the impression
of continuous movement.
• The Least frame rate of at least 16 frames per second impression of smoothness. The Natural
looking of at least 25 frames per second.
• Animation may be in two or three dimensional. Two dimensional animation is a two axis X
and Y. Three dimensional animation is a three axis X, Y and Z
• Animation tools are very powerful and effective. Two types of Animation Path animation
in
and Frame animation.
s.
• Path animation involves moving an object on a screen. Ex. Cartoon character. Frame
animation is a multiple objects are allowed to travel and the background side changes.
s
re
3. Explain in detail about production team roles and Responsibilities
xp
1 Production Manager Production manager is a technology expert, efficient team
leader, good writing , Communication and budget management
e
skills.
vi
5 Multimedia Architect It is include graphics, text, audio, video, music, photos and
animation.
7 Audio and video specialist It is include recording, editing, sound effects and digitalizing.
9
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
• TGA is the first popular format for high resolution images.
s.
3 Audio file • WAV is the most popular file format in windows for storing
s
Formats uncompressed sound files.
re
• MP3 is the most popular format for storing and downloading
music.
xp
• WMA is a popular windows media audio format owned by
Microsoft
e
•
vi
4. Video file AVI is the video file format for windows. Sound and picture
format elements are stored in the file.
al
10
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2 Mark
Desktop publishing is the creation of page layouts for documents using DTP software.
in
s.
3. Write the steps to open PageMaker.
s
Start All Programs Adobe PageMaker 7.0 Adobe PageMaker 7.0
re
4. How do you create a New document in PageMaker?
xp
1. Choose File New in the menu bar.
e
2. Now Document Setup Dialog box appears.
vi
4. Click on OK.
.k
Used to draw circles and ellipses. Used to create elliptical placeholders for
text and graphics.
11
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Entering a new text or modifying the existing text in a document is known as Text
editing.
A text block contains type, paste or import. You can’t see the borders of a text block
until you select the pointer tool.
in
A threaded text block can be identified by a plus sign in its top or bottom handles.
s.
The process of connecting text among Text blocks is called threading text.
s
re
12. How do you insert a page in Page Maker?
4. Click on Insert.
al
3 Mark
.k
w
Adobe page Maker is a page layout software. It is used to design and produce
documents that can be printed. You can create anything from a simple business card to a large
w
book.
Pointer Tool F9
12
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3. Write the use of any three tools in PageMaker along with symbols.
in
4. How do you rejoin split blocks?
s.
• Place the Cursor – bottom handle – second text block – drag and drop - up to top.
s
Place the Cursor - bottom handle – first text block – drag and drop – if necessary.
re
5. How do you link frames containing text?
xp
1. Draw a second frame 2. Click the first frame to select it.
e
3. Click the red triangle 4. Click the second frame
vi
Master Pages commonly use logos, page numbers, headers, and footers.
w
w
13
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
Pointer tool Used to select, move, and resize text objects and graphics.
in
Cropping tool Used to orderly imported graphics.
s.
Line tool Used to draw straight lines in any direction
s
re
Constrained line Used to draw vertical or horizontal lines.
tool
xp
Rectangle tool Used to draw squares and rectangles.
e
vi
Ellipse frame Used to create elliptical placeholders for text and graphics.
tool
w
Polygon frame Used to create polygonal placeholders for text and graphics.
tool
14
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
6. Click on Open.
in
7. Click in a frame to place the text will be placed in the frame.
s.
3. How can you convert text in a text block to a frame?
s
re
1. Draw the frame of your choice using one of the PageMaker’s Frame tool.
15
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2 Mark
1.Define Data Model and list the types of data model used.
The database technology came into existence in terms of models with relational and
object-relational behavior.
Network Model
in
Relational Model
s.
Object Oriented database model
s
2. List few disadvantages of processing system
re
❖ Data Duplication - Same data is used for processing system.
xp
❖ High Maintenance - Access control and verifying data.
A single valued attribute contains only one A multi valued attribute has more than one
value for the attribute. value for that particular attribute.
w
16
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
6. List any two DDL and DML commands with its Syntax.
DDL DML
Syntax Syntax
Commands Commands
in
7. What is view in SQL?
s.
▪ Views – A set of stored queries. Example: create a database to store the personal
s
details.
re
8. Write the difference between SQL and MySQL
xp
SQL MySQL
e
SQL is a Structured Query Language MySQL is a database Software.
vi
To query and operate database system. Allows data handling, storing, modifying,
al
deleting.
.k
▪ SQL – Structured Query Language is a standard language used for accessing and
manipulating databases.
17
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
❖ In earlier days they have used punched card technology to store the data.
in
In ER Model, relationship exists between two entities. Three types of relationships are
available in the Entity Relationship.
s.
One-to-One relationship
s
One-to-Many relationship
re
Many-to-Many relationship xp
3. Discuss on Cardinality in DBMS
e
▪ Cardinality is defined as the number of items included in a relationship.
vi
Types of Cardinality
al
18
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
COMMANDS SYNTAX
in
6. Types of SQL Commands
s.
DDL-Data Definition Language CREATE, ALTER, DROP, RENAME, TRUNCATE
s
DML-Data Manipulation Language INSERT, UPDATE, DELETE
re
DQL-Data Query Language SELECT
xp
TCL-Transaction Control Language COMMIT, ROLLBACK, SET TRANSACTION,
SAVEPOINT
e
DCL-Data Control Language Grant, Revoke
vi
al
.k
w
w
w
19
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
1.Discuss on various Database Models available in DBMS.
Database Models
in
✓ Advantages less redundant data, efficient search, data integrity, and
security.
s.
Network model
s
➢ In this model each member can have more than one owner. The many to
re
many relationships are handled in a better way.
xp
✓ Network schema - It is the structure of database.
Relational model
al
20
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2. Attributes
3. Relationship
in
rectangular box.
s.
Types of Entity
s
1. Strong Entity 2.Weak Entity 3. Entity Instance
re
Strong Entity Weak Entity
xp Entity Instance
is represented by one
rectangle.
.k
Types of attributes
Relationship Type
1. Key Attribute
2. Simple Attributes 1.One-to-One relationship – (1:1)
3. Composite Attributes 2.One-to-Many relationship – (1:N)
4. Single valued Attribute
5. Multi valued Attribute 3.Many-to-Many relationship –(M:N)
21
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Attributes
An attribute is the information about the entity include quantify, qualify, classify,
and specify an entity.
Types of attributes
1. Key Attribute
2. Simple Attributes
in
3. Composite Attributes
s.
4. Single Valued Attributes
s
5. Multi Valued Attributes
re
1.Key Attribute Key xp
Key attributes is a unique characteristic on an entity.
2.Simple Attribute
e
Simple attributes is a single value for their entity. It cannot be separated.
vi
3.Composite Attributes
al
A single valued attribute contains only A multi valued attribute has more than
w
one value for the attribute. one value for that particular attribute.
22
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
4. INTRODUCTION TO HYPERTEXT PRE-PROCESSOR
2 Mark
2 Mark
PHP can be used on all major operating systems. Ex. Windows, Linux, Mac OS
PHP has also Support for most of the web servers. Ex. Apache and many others.
in
A web server is a software that uses Hypertext Transfer Protocol to serve the files that
form web pages to users.
s.
3. What are the types of scripting language?
s
re
✓ Client side scripting language
Google chrome
Mozilla Firefox
Opera
Safari
Internet Explorer
UC Browser
23
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
6. What is URL?
URL is a Uniform Resource Locator, the address of a specific Web page or file on the
Internet.
in
◆ Variable name must always begin with a $ symbol. It is never start with a number.
Variables are case sensitive.
s s.
9. Define Client Server Architecture.
re
Client –Server Architecture is a Server provides resources and services to one or more
clients.
xp
10. Define Web server?
e
⚫ A web server is a software that uses Hypertext Transfer Protocol to serve the files that
form Web pages to users. A Web server contains one or more websites.
vi
al
.k
w
w
w
24
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
A Web server is a software that uses Hypertext Transfer Protocol to serve the files that
in
form Web pages to users. A Web server contains one or more websites.
s.
3. Differentiate Server side and Client Side Scripting language?
s
re
Client side Server side
interaction
al
4. In how may ways you can embed PHP code in an HTML Page?
w
• The Second way is the HTML with PHP using PRINT or ECHO
25
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
$=’Computer Application’;
in
?>
s.
Integer Integer is a data type which contains <?php
s
non decimal numbers.
$x=1234;
re
?>
xp
Float Float is a data type which contains <?php
decimal numbers.
e
$x=1.23;
vi
?>
al
.k
$x=true;
w
$y=false;
w
?>
?>
26
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
?>
in
NULL Null is a special data type which <?php
contains a single value: NULL
$x= “Computer Application”
s.
$x= null;
s
re
?>
e xp
Resource Resource is a specific variable, it has <?php
vi
a reference to an external
resources. $x = fopen(“Book .txt”, “r”);
al
var_dump($x);
.k
?>
w
w
w
27
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Operators in PHP
Arithmetic operators
Arithmetic operators in PHP perform addition, subtraction, multiplication, and division.
in
+ Addition Adding numbers
s.
- Subtraction Subtracting numbers
s
* Multiplication Multiplying numbers
re
/ Division xp Dividing numbers
Comparison Operators
w
28
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Increment and decrement operators are used to perform increasing and decreasing
variable.
Operator Name
++$x Pre-increment
$x++ Post-increment
--$x Pre-decrement
in
$x-- Post-decrement
s s.
Logical Operators
re
Logical operators are used to perform conditional statements.
xp
Symbol Operator Name Example
|| OR $x | | $y
! NOT ! $x
al
String Operators
w
29
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5. PHP FUNCTION AND ARRAY
2 Mark
2 Mark
in
User defined function in PHP gives a privilege to user to write own specific operation
inside of existing program module.
s.
3. What is parameterized Function.
s
PHP Parameterized functions are the functions with parameters or arguments.
re
xp
4. List out System defined functions.
✓ is_bool(),
e
✓ is_int(),
vi
✓ is_float()
al
✓ is_null()
.k
w
Syntax
w
function functionName()
Code to be executed;
30
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Array is a concept that stores more than one value of same data type in single array
variable. Array is a data type which has a multiple values in a single variable.
Array is a concept that stores more than one value of same data type in single array
variable. Array is a data type which has a multiple values in a single variable.
in
8. List out types of Array in PHP
s.
Indexed Arrays
s
Associative Array
re
Multi-Dimensional Array xp
9. Define Associative Array
e
Associative arrays are arrays that use named keys that you assign to them.
vi
al
3 Mark
w
31
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
User defined function in PHP gives a privilege A function is already created by system it is a
to user to write own specific operation inside reusable piece or block of code that performs
of existing program module. a specific action.
in
Array is a concept that stores more than one value of same data type in single array
s.
variable. Array is a data type which has a multiple values in a single variable.
Indexed Arrays
s
re
Associative Array
Multi-Dimensional Array
e xp
5. Differentiate Associate array and Multidimensional array
vi
named keys that you assign to them. array containing one or more arrays.
w
Syntax Syntax
w
key=>value…);
w
array(elements),
array(elements),
);
32
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
Functions in PHP
in
1. User Defined Function 2. Function calling
s.
User defined function in PHP gives A function declaration part will
a privilege to user to write own specific be executed by a call to the function.
s
operation inside of existing program
re
module. Syntax
Syntax functionName();
xp
function functionName() Example
e
{ <?php
vi
function insert( )
Code to be executed; {
al
3. Parameterized Function
w
Example
} ?>
33
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Array
Array is a concept that stores more than one value of same data type in single
array variable. Array is a data type which has a multiple values in a single variable.
Indexed Arrays
Associative Array
in
Multi-Dimensional Array
s.
Array Syntax
s
$Array_Variable = array(“value1”, “value2”, “value3”);
re
Indexed Arrays
The index can be assigned automatically in a collection of data set.
xp
Example
<?php
e
vi
?>
.k
Associative Arrays
Associative arrays are arrays that use named keys that you assign to them.
w
Syntax
w
Multidimensional Array
A multidimensional array is an array containing one or more arrays.
Syntax
array(
array(elements),
array(elements),
);
34
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
6. PHP CONDITIONAL STATEMENTS
2 Mark
Conditional Statements are useful for writing decision making logics. It is most
important feature of many programming languages including PHP.
in
3. What is If else statement in PHP
s.
If statement executes a statement or a group of statements if a specific condition is
satisfied by the user expectation.
s
re
4. List out conditional statements in PHP
if Statement
xp
if…else Statement
e
if…elseif…else Statement
vi
Switch Statement
al
.k
if(condition)
w
{
w
Condition is true;
else
Condition is false;
35
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
The switch statement is used to perform different actions based on different conditions.
in
8. Write syntax of Switch statement.
Switch(n){
s.
case label 1:
s
re
Code to be executed label 1;
break;
xp
case label 2:
e
Code to be executed label 2;
vi
break;
al
case label 3:
.k
break;
…..
w
default:
w
Code to be executed n;
36
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
s s.
3 Mark
37
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
The switch statement is used to perform different actions based on different conditions.
in
It is a single statement. No else statement. It is a combination of if-else statement.
s.
Only one statement s can execute. More than one statement can executed.
s
Condition is false there is no alternatives. Condition is false more than alternatives.
re
e xp
vi
al
.k
w
w
w
38
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
1.Explain Functions of conditional statements in PHP
Conditional Statements are useful for writing decision making logics. It is most
important feature of many programming languages including PHP.
if Statement
if…else Statement
if…elseif…else Statement
in
Switch Statement
s.
If statement
s
If statement executes a statement or a group of statements if a specific condition is
re
satisfied as per the user expectation.
If …else statement
xp
If statement executes a statement or a group of statements if a specific condition is
satisfied by the user expectation.
e
If…elseif…else statement
vi
al
Switch statement
w
The switch statement is used to perform different actions based on different conditions.
Switch statement test only for equality.
w
w
39
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
The switch statement is used to perform different actions based on different conditions.
Switch statement test only for equality. It is execute one case after another till a break statement.
Syntax
Switch(n){
case label 1:
in
break;
s.
case label 2:
s
Code to be executed label 2;
re
break; xp
case label 3:
…..
al
default:
.k
Code to be executed n;
w
}
w
w
40
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Example
<?php
$favcolor = ”red”;
switch($favcolor){
case “red”:
break;
in
case “blue”:
s.
echo “favorite color is blue”;
s
break;
re
case “green”:
xp
echo “favorite color is green”;
e
break;
vi
default:
al
?>
w
w
w
41
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
7. LOOPING STRUCTURE
2 Mark
Looping Structures are useful for writing iteration logics. It is the most important
feature of many programming languages, including PHP.
in
For loop is an important functional looping system which is user for iteration logics.
s s.
3. What is for each loop in PHP?
re
foreach loop is exclusively available in PHP. It works only with arrays. The loop
iteration depends on each KEY value in the Array.
e xp
4. List out looping Structure in PHP
vi
• For loop
al
• Foreach loop
.k
• While loop
w
• Do While loop
w
w
Code to be executed;
42
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Code to be executed;
in
While (condition is true)
s.
{
Code to be executed;
s
re
}
Code to be executed;
al
} while(condition is true);
.k
for loop is an important functional looping foreach loop is exclusively available in PHP. It
w
system which is user for iteration logics. works only with arrays.
The foreach loop works only on arrays, and is used to loop through each key/value pair
in an array.
43
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
Looping Structures are useful for writing iteration logics. It is the most important
feature of many programming languages, including PHP.
❖ For loop
❖ Foreach loop
❖ While loop
❖ Do While loop
in
2. Differentiate for each and while loop
s.
foreach loop While loop
s
Foreach loop is exclusively available in PHP. While loop is an important feature which is
re
It works only with arrays. The loop iteration used for simple iteration logics. The condition
depends on each KEY value in the Array. is true or false
xp
for each ($array as $value) While (condition is true)
e
{ {
vi
} }
.k
w
While loop is an important feature which is Do while loop always run the statement
used for simple iteration logics. The condition inside of the loop block at the first time
is true or false execution. The condition is true or false.
} } while(condition is true);
44
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
Looping Structures are useful for writing iteration logics. It is the most important feature
of many programming languages, including PHP.
➢ for loop
➢ foreach loop
➢ While loop
in
➢ do While loop
s.
For loop
s
For loop is an important functional looping system which is user for iteration logics.
re
Foreach loop xp
Foreach loop is exclusively available in PHP. It works only with arrays. The loop
iteration depends on each KEY value in the Array.
e
While loop
vi
While loop is an important feature which is used for simple iteration logics. The
al
Do While loop
.k
Do while loop always run the statement inside of the loop block at the first time
w
45
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Foreach loop is exclusively available in PHP. It works only with arrays. The loop
iteration depends on each KEY value in the Array.
Syntax
Code to be executed;
in
}
s.
Example
s
<?php
re
$student_name = array(“name1”,”name2”,”name3”);
xp
foreach($student_name as $value)
{
e
echo “$value<br>”;
vi
}
al
?>
.k
w
w
w
46
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Do while loop always run the statement inside of the loop block at the first time
execution. The condition is true or false.
Syntax
do
Code to be executed;
in
} while(condition is true);
s.
Example
s
<?php
re
$i=0; xp
do
{
e
echo ”The number is: $i”;
vi
$i++;
al
} While($i<=10);
.k
?>
w
w
w
47
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
For loop is an important functional looping system which is user for iteration logics.
Syntax
Code to be executed;
in
Example
s.
<?php
s
for($i=0;$i<=10;$i++)
re
{
xp
echo “The number is : $i”;
e
}
vi
?>
al
.k
w
w
w
48
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
if( 1stcondition)
{
1st Condition is true;
}
in
elseif(2nd condition)
{
s.
2nd Condition is true;
}
s
re
else
{
xp
Both conditions are false;
}
e
Example
vi
<?php
al
$pass_mark=35;
.k
$firts_class=60;
$student_mark=70;
w
if(student_mark>=$first_class){
w
elseif($student_mark>=$pass_mark){
echo “The student is eligible”;
else{
}?>
49
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
If else statement
Syntax
if(condition)
in
Condition is true;
s.
}
s
else
re
{ xp
Condition is false;
}
e
Example
vi
<?php
al
$pass_mark=35;
.k
$student_mark=70;
w
if($student_mark>=$pass_mark){
w
else{
?>
50
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Text inputs contain textbox and text area controls. Buttons may contain Submit button,
Reset button and Cancel Button. Form tag is used to control the entire HTML document.
Get Method
in
- it is designed to send data to the server.
s.
3. What is Form Validation in PHP?
s
Validation is a process of checking the input data submitted by the user from client
re
machine.
Client Side Validation xp
Server Side Validation
e
4. List out HTML control to support PHP language.
vi
Text inputs
al
Buttons
.k
Checkbox
w
Radio box
w
File Select
Form Tag
w
Type Description
51
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
File handling is an important part of any web application. PHP has several functions for
creating, reading, uploading, and editing files.
Browse button is used to upload a single file or multiple files. It is one of the types of
button.
in
8. Write Syntax of Browse button in HTML.
s.
Syntax:
s
re
<input type = “file” name = “myfile”>
xp
9. Compare Text box and Text Area.
e
Text Box Text Area
vi
Text box is generally used for Text Area is generally used for
al
fopen() is helps to open a file in the server. It contains Two parameters 1. File
2. Read/Write mode.
52
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
→ Form tag contains input box, check boxes radio buttons etc.
in
Get method displays the form values in the URL. $_GET [variable name];
s.
The users to book mark the results.
s
Post method is when submitting login details to the server. $_POST [variable name];
re
3. Differentiate Get and Post Method. xp
GET POST
Supports only string data types. Supports many different data types such as
string, numeric, binary etc.
al
File handling is an important part of any web application. You often need to open and
process a file for different tasks. File handling is done by using any programming language.
w
53
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
The input data sent to the server with The input data sent to the server with
POST method via URL address is known as POST method is stored in the request body of
query string. All input data are visible by user the clients HTTP request.
after they clicks the submit button.
in
3. Example: Welcome.php
s.
<html> <html>
<body> <body>
s
re
<form action= “welcome.php”method=”post”> Welcome
</form> </body>
al
</body> </html>
.k
</html>
w
w
w
54
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Values of type
Description
attribute
Text Create a Text box. All kind of text input such as name, address etc.,
Password Similar as Text box. But, while entering data ,the characters are
appearing as coded symbols such as Asterisk.
Check box Check box is a small square box. It is used to select multiple options.
in
Radio button Radio button is a small circle. It is used to select any one of the multiple
options.
s.
Reset It is a special command button used to clear all the entries made in the
s
form.
re
Submit It is also special command button used to submit all the entries in the
xp
form.
File handling is an important part of any web application. You often need to open and
process a file for different tasks.File handling is done by using any programming language.
w
PHP has several functions for creating, reading, uploading, and editing files.
w
55
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
2.PHP Read a File <?php
The fread() function reads from an open a file. fread($myfile.filesize(“student.txt”));
s.
syntax fread($file_object, filesize(“filename”)); ?>
s
re
3.PHP Close a File <?php
The fclose() function is used to close an opened file. $myfile = fopen(“student.txt”, “r”);
fclose($myfile);
xp
syntax fclose($file_Object); ?>
<?php
e
4.PHP Write a File $myfile= fopen(“new_file.txt”, “w”);
vi
fclose($myfile);
syntax fwrite($myfile, $txt);
.k
?>
<?php
w
$myfile=
file.
file_put_contents(“FILE_APPEND”);
w
File upload is the best feature to select one file from the local machine to server machine.
“file_uploads = On”
56
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2 Mark
Mysqli_connect() Function
Mysqli_close() Function
Mysqli_select_db() Function
Mysqli_affected_rows() Function
in
Mysqli_connect_error() Funciton
s.
Mysqli_fetch_assoc() Function
s
2. What is MySQLi function?
re
MySQLi is extension in PHP scripting language which gives access to the MYSQL
xp
database. MYSQLi extension was introduced version 5.0.0.
☺ Mysqli_close() Function
al
☺ Mysqli_select_db() Function
.k
☺ Mysqli_affected_rows() Function
w
☺ Mysqli_connect_error() Funciton
w
☺ Mysqli_fetch_assoc() Function
w
This function is used to connect the data base This function is used to close an existing
server machine PHP scripting language. opened database connection between PHP
and MySQL Database Server.
This function requires four parameters to This function requires only one parameter to
connect to database server. connect to database server.
57
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
A connection string is a string that specifies information about a data source and
connecting to it.
in
s.
7. What is web Database?
s
A web database is a database application designed to be managed and accessed through
re
the Internet.
xp
8. What is mysqli_fetch_assoc() Function?
e
The mysqli_fetch_assoc() function fetches result row as an associative array.
vi
Syntax: mysqli_fetch_assoc(result);
al
.k
Syntax: mysqli_connect_error();
w
Syntax: mysqli_affected_rows(connection);
58
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
MySQLi is extension in PHP scripting language which gives access to the MYSQL
database. MYSQLi functions are designed to communicate with MySQL.
in
s.
3. Differentiate mysqli_affected_rows() function and mysqli_fetch_assoc() function
Mysqli_affected_rows() Mysqli_fetch_assoc()
s
re
The mysqli_affected_rows() function returns The mysqli_fetch_assoc() function fetches
the number of affected rows in the previous result row as an associative array.
SELECT, INSERT, UPDATE, REPLACE,
xp
or DELETE query.
e
Syntax:mysqli_affected_rows(connection); Syntax: mysqli_fetch_assoc(result);
vi
al
Syntax
w
PHP and MySQL has become very popular server side web scripting language in
Internet.
59
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
MySQLi is extension in PHP scripting language which gives access to the MYSQL
database. MYSQLi extension was introduced version 5.0.0.
in
➔ MySQL AVG Function
s.
➔ MySQL SUM Function
s
1. The MySQL COUNT function is used to count the number of rows in a database table.
re
Example: mysql>SELECT COUNT (*) FROM employee;
xp
2. The MySQL MAX function is used to select the highest value for a certain column
4. The MySQL AVG function selects the average value for certain table column.
.k
5. The MySQL SUM function is used to selecting the total for a numeric column.
w
60
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
A set of computers connected together for the purpose of sharing resource is called as
computer networks.
2. Define Internet
in
3. What are the common uses of computer Network.
Communication
s.
Resource Sharing
s
re
Data or Software sharing
Money savings
xp
4. List out some feature of Mobile Network.
e
Less consumption of power
vi
Example: Speakers, CCTV, Printers etc., Example: WiFi Tablets, Indoor cameras etc.,
61
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
1.Define ARPANET
First in 1969, Advanced Research Projects Agency Network, four nodes of connected
between four universities using the 50kbps circuits.
in
information.
s.
Artificial intelligence will help to maintain, manage, speech recognition, learning,
s
planning, problem solving and protect it.
re
4. List out some usefulness of social networks.
xp
Group information sharing over long distances.
Broadcast announcements.
e
vi
Computer networking, It’s important financial aspect for organization because it saves
.k
money. It reduces the paper work, man power and save the time.
w
w
5 Mark
w
E- Commerce
62
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
1963 Intergalactic Computer Computer engaged to access
s.
3. Network communication with users of
computes.
s
1965 Telephone Switch First widely used Telephone switch
re
4. was introduced by Western
Electric
xp
1966 WAN(Wide Area Network) Published by Thomas and
5. Lawrence in the area of time
e
sharing.
vi
7.
expanding TCP/IP networks.
w
63
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3. Explain the Growth of the computer Networking or Explain about the development,
merits and demerits in Mobile networks
Gene
Data Switchi
ratio Start Technology Service
Bandwidth ng
n
Circuit,
in
2G 1990-2000 64 Kbps Digital Cellular SMS
Packet
s.
GPRS,EDGE,
2.5G 2001-2004 144 Kbps SMS,MMS Packet
s
CDMA
re
CDMA
2000,UMTS, Audio, Video
3G 2004-2005 2 Mbps
xp Packet
and data
EDGE
e
Dynamic
vi
Wearable
.k
64
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2 Mark
1.Define Intranet
in
➔ Less consumption of power
s.
➔ Huge capacity than a large transmitter
s
➔ Covering large area than a single transmitter.
re
3. List out the benefits of WIFI xp
It provides mobility.
Ensures connectivity.
al
4. How many types of RFID system available and what are they?
.k
Active RFID
w
Passive RFID
w
65
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
Limited number of
Large number of Limited number of
connected devices
connected devices connected devices
over Internet
in
Owned by a particular Owned by one or
Not owned by anyone
organization more Organizations.
s.
Departments,
s
WWW, Email, Social Suppliers, customer,
company,
media and vendors.
re
organizations.
xp
2. List out the components of a RFID enabled system.
e
RFID tag: It has silicon microchip attached to a small antenna and mounted on a
vi
substrate.
al
Reader: It has a scanner with antennas to transmit and receive signals, used for
communication.
.k
Controller: It is the host computer with a microprocessor which receives the reader
w
◆ HTTP – It is used between a web client and a web server and it guarantees non-secure
data transmissions.
◆ HTTPS- It is used between a web client and a web server ensures secure data
transmissions.
66
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Application Layer
Transport Layer
Internet Layer
in
ARP- Address Resolution Protocol
s.
ICMP- Internet Control Message protocol
s
SMTP-Simple Mail Transfer Protocol
re
DNS- Domain Name System
xp
5 Mark
e
vi
Internet: Several networks, small and big all over the world, are connected together to
form a Global network called the Internet.
.k
67
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
This is the 3rd layer, determining the path of the data packets is
in
3. Network layer
using IP Address.
s.
This is the 4th layer guarantees the sending data is successful.
4. Transport layer
s
It includes error checking operation.
re
This is the 5th layer identifies the system session between
5. Session layer
different network entities.
xp
This is the 6th layer Encryption and decryption protocols
e
6. Presentation layer
occur in this layers such as Secure Socket Layer(SSL)
vi
7. Application layer
comprising of software within the system.
.k
TCP/IP OSI
w
4 Layers 7 Layers
68
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2 Mark
.com
.edu
.gov
.net
in
2. What is an IP address?
s.
Internet Protocol address is the logical address in the network layer.
s
IP address is also used to find the host system in the whole network.
re
3. What are the types of IP address?
xp
IPv4 Address
IPV6 Address
e
vi
4. What is an URL?
al
❖ URL is made up four parts protocols, host name, folder name and file name.
.k
http://www.google.com
w
http://www.yahoo.com
w
http://www.facebook.com
http://www.gmail.com
⚫ Absolute URL
⚫ Relative URL
69
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
7. What is a domain?
Domain is a sub tree, in domain name space tree structure. The domain can be further
divided into sub domains.
8. What is a Zone?
A group of contiguous domains and sub domains in the Domain Name Space.
9. What is a resolver?
A program which is responsible for initiating the translation of a domain name into an
in
IP Address.
s.
☺ Commercial Organization
s
re
☺ Educational Institutions
☺ Government
xp
☺ Military groups
e
11. Write any four generic Top Level Domain
vi
Gov - Government
w
70
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
Domain Name System an internet service that translates domain name into IP Address.
IPv4 IPv6
in
Binary and Dotted-decimal notation Hexadecimal notation
s.
4billion addresses 16 billion addresses
s
re
3. Differentiate Domain Name and URL
xp
Domain Name Uniform Resource Locator (URL)
e
An identification string that helps to uniquely Address of a specific webpage or a website
vi
Used to link web pages on different websites Used to link web pages within the same
website.
Protocols, hostname, folder name and file Folder name and file name.
name
71
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Domain name is the sequence of labels separated by dot (.). The domain name is
always read from the leaf node to root node. The root node always represent NULL string. So
All the domain name ends with dot.
A web Address more commonly defines a A URL is the address of a particular website
unique name that helps people remember a or document available on the web.
in
URL
s.
It is like a memorable street address, can help It is the Internet address of a particular site or
people find you online. document available the world wide web.
s
5 Mark
re
xp
1. Classify and Explain the IP address.
e
Internet Protocol address is simply the logical address in the network layer. Ex: The
vi
door number or flat number is used to differentiate individual house from others in the same
apartment IP address is also used to find the host system in the whole network.
al
72
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Name Space
The domain names must be very unique and appropriate. The names should be selected
from a namespace.
in
Flat name space
s.
Flat name space is where the name is assigned to the IP address. They do not have any
specific structure.
s
Hierarchical name space
re
Hierarchical name space is where the name is made up of several parts.
xp
◼ 1st part- Nature of Organization
◼ 2nd part – Name of Organization
e
◼ 3rd part –Department of Organization
vi
Name Servers
al
Name Server is a main part in the Domain Name System. It translate the domain names
.k
Root Name Server –top level server which contains entire DNS, maintained by ICANN. There
w
are 13 servers.
w
Primary/Master Name Server – Contains a zone resource records. These records are updatable
by domain name holders such as Organizations.
Secondary/Slave Name Server – Contains a copy of primary server files. This server has no
authority to update, but reduce the workload.
Zone
The entire name space is divided into many different zones. Zone is defined as a group
of contiguous domains and sub domains. If the zone has a single domain, then zone and domain
are the same.
73
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Name Server is a main part in the Domain name System (DNS). It translates the
domain names to IP addresses.
Name server contains the DNS database which consists of domain names and their
corresponding IP addresses.
There is a need to store large number of domains for the world wide usage.
in
Types of Name Servers
s.
Root Name Server
s
re
Top level server which contains entire DNS tree, maintained by ICANN. There are 13
servers. xp
Primary/Master Name Server
It contains a zone resource records. These records are updatable by domain name
e
holders such as organizations.
vi
It contains a copy of primary server files. This server has no authority to update, but
.k
➔ The users enters the URL in the browser, the system first checks its DNS cache for the
corresponding IP address.
w
➔ If the IP address is found in the cache then the information is retrieved from cache.
➔ The system needs to query the resolver about the IP address from Internet Service
Provider (ISP)
➔ Each resolver has its own cache and if it is found in that then that information is
retrieved.
74
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
⚫ The names are represented as a tree like structure with root element on the top.
⚫ This tree can have a maximum of 128 levels starting from root element taking the level 0
to level 127.
Label
in
It is a string which can have maximum of 63 characters.
s.
Domain is a sub tree in domain names space tree structure. The domain can be further
divided into sub domains.
s
re
Domain Name
It is the sequence of labels. In domain name the sequence of labels are separated by
xp
dot(.).
The domain name is always read from the lower level to higher level form the leaf node
e
to root node.
vi
The root node always represent NULL string, all the domain name ending with dot.
al
Hyphens are allowed, but hyphens can not be used as first character of a domain
name.
w
Domain names have the minimum length of 2 and the maximum length of 63
characters.
75
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2 Mark
It is type of cable with two or more insulated wires twister together. It started with the
speed of 10 Mbps.
Universal Serial Bus, connects all the peripheral devices with the computers.
in
3. Write a note on the types of RJ45 connector.
s.
There are two wiring schemes available to terminate the twister-pair cable on each end,
s
which are T-568A and T-568B.
The crimping tool is a physical tool which is used to connect the patch wire and the
Ethernet connector (RJ45)
w
w
RJ-21 connector has 50 pins with 25 pins a the one end and 25 pins at the other end it is
also called as champ connector.
76
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
The first coloured wire at one end of the cable is the third coloured wire at the other
end of the cable. It is called crossover cables.
The RJ45 Ethernet connector is a small plastic cup which will be used to connect the
wire inside the connector and ready to use to connect the Internet.
in
3. What are the differences between serial and parallel ports?
s.
Serial port Parallel port
s
9 pins 25 pins
re
Male port xpFemale port
equipment.
w
RJ45 Connector
Ethernet Ports
Crimping tool
Single mode cables are used for long distance transmission and at a high cost whereas
the multimode cables are used for short distance transmission at a very low cost.
77
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
The primary function of the registered jack is to connect different data equipment and
telecommunication devices.
in
The Registered Jack refers to the male physical connector (Plug), a female physical
connector (Jack) and it’s wiring.
s.
RJ-11
s
It is the most popular modern form of registered jack.
re
It is found in home and office. xp
This Registered jack is mainly used in telephone and landlines.
⚫ The RJ-14 is the same as RJ-11 which will be used for telephone lines where same it as
w
⚫ This RJ-61 will use the twisted pair cable with a modular connection.
RJ-21
⚫ RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end.
⚫ The RJ-21 interface is typically used for data communication trucking applications.
78
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
There are three types of wiring techniques to construct the Ethernet cable.
1) Straight-Through Wiring
2) Cross-over Wiring
3) Roll-over Wiring
Straight-Through Wiring
Ethernet cables used for Ethernet connections are “straight through cables”.
in
These cable wires are in the same sequence at both ends of the cable .
s.
That pin 1 of the plug on one end is connected to pin 1 of the plug on the other end.
s
(T568A & T568B)
re
The straight through wiring cables are most used for connecting PC/NIC card to a hub.
xp
This is a simple physical connection used in printers, computers and other network
interfaces.
e
Cross-Over Wiring
vi
Crossover cable is used to connect two computers or Ethernet devices directly together
al
without a hub.
That pin 1 & 2 of the plug on one end are connected with pin 3 & 6 of the plug on
.k
other end.
w
The Null modem cables are the example of the crossover cables.
w
Roll-over Wiring
w
Rollover cable is a type of null-modem cable that is often used to connect a device
console port to make programming changes to the device.
That pins on one end are connected with other end in reverse order.
79
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2. RJ45 Connector
3. Ethernet Ports
4. Crimping Tool
in
These cable are generally made up of 8 wires in different colors.
s.
Four of them are solid colors and the others are striped.
s
The eight colors are 1.White green, 2. White orange, 3. White blue, 4. White brown
re
RJ45 Connector
xp
The RJ45 connector is a small plastic cup which will be used to connect the wire inside
the connector and ready to connect the Internet.
e
Each RJ45 connector has eight pins and connected to each end of the Ethernet cable.
vi
There are Two wiring schemes available to the twisted-pair cable on each end, which are
al
Ethernet card is a Network Interface Card (NIC) that allows computers to connect and
w
Now a days’ most of the computers come with built-in Ethernet cards which resides on
motherboard.
Crimping tool
The Crimping tool is a physical tool which is used to connect the patch wire and the
Ethernet connector (RJ45)
The crimping tool looks like a small cutting handle with two mold of Ethernet port.
80
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Coaxial Cables
This cable was invented at late 1880’s which is used to connect the television sets to
home antennas.
This cable is used to transfer information in 10 mbps. The cable is divided into thinnet
and thicknet cables.
Coaxial cables are also used for dish TV where the setup box and television is
in
connected using the coaxial cable only.
s.
Twisted Pair Cables
It is type of cable with two or more insulated wires twisted together. It started with the
s
speed of 10 mbps.
re
There are two types of twisted pair cables, Unshielded Twisted Pair and Shielded
xp
Twisted pair cables
Fiber Optics:
e
vi
This cable strands of glass and pulse of light is used to send the information.
al
These cables are placed in deep underground to avoid any damage to the cables.
.k
Single-mode cables are used for long distance transmission and at a high cost.
w
Multi-mode cables are used for short distance transmission at a very low cost.
w
USB Cables
w
The Universal Serial Bus are used to connect keyboard, mouse and other peripheral
devices.
The dongle is a small peripheral device with a sim slot and connects the Internet.
81
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
In the year of 1980s to 1990s the Ethernet and the USB were not developed.
Then the Serial and Parallel interface cables are used to connect the Internet to the
system.
The serial port will send 1 bit at one time. The parallel port will send 8 bit at one time.
Parallel cables are used to connect to the printer and other disk drivers.
Ethernet Cables
in
Ethernet cable is the most common type of network cable mainly used for connecting the
computer or devices at home or office.
s.
This cable connects wired devices within the local area network for sharing the
s
resources and accessing Internet.
re
This cable works at a speed of 10Gbps and more.
xp
3. Explain about RJ45 Connector
e
The RJ45 connector is a small plastic cup which will be used to connect the wire inside
vi
The RJ45 connector looks similar like a telephone jack but it looks a slightly wider.
.k
In RJ45 the “RJ” stands for the Registered Jack and “45” simply refers to the number of
interface standard in the cable.
w
Each RJ45 connector has eight pins and connected to each end of the Ethernet cable.
w
There are Two wiring schemes available to the twisted-pair cable on each end, which are
T-568A and T-568B
82
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
Network Simulator Version 2 : OTCL and C++ used to create and run NS2. It works
on Windows and Linux that supports wired or wireless network.
s.
4. Explain NRCFOSS
s
re
National Resource Centre for Free and Open Source Software an Institution of
Government of India. To help in development of FOSS in India.
xp
5. Write short note on Open NMS?
Open NMS (Network Management System) is a free and open-source initiative grade
e
network monitoring and management platform.
vi
al
3 Mark
.k
Free software a concept developed in the 1980s by an MIT computer science researcher,
Richard Stallman is defined by four conditions, by the nonprofit Free Software Foundation.
83
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
MySQL PHP
in
Remix Redistribute
s.
Remake Resell
s
Remanufacture Study and Learn
re
xp
5. What are the main functional areas of Open NMS?
e
Service Monitoring : Network based services ICMP, HTTP, DNS
vi
Linux Foundation
84
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
It provides limited scope with restrictions and It provides better flexibility and more
all freedom
in
Not Edit the source code Edit the source code
s.
Ex: Android, Firefox etc., Ex: Windows, Mac Os etc.,
s
re
2. List out the Benefits of Open Source Software
xp
There are many open source software’s. so, we can select and use any software.
The complete options of the software can be used without any cost and restrictions.
e
vi
We can share our ideas with the team, write the required code and share it with many.
al
We can learn many ideas and make our program writing skills more efficient.
license
85
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
15. E-COMMERCE
2 Mark
1.Define E-Commerce.
E-Commerce E-Business
Subset Superset
in
Commercial transactions Business transactions
s.
Website Website, CRM, ERP etc.,
s
Internet Internet, Intranet, Extranet
re
xp
3. Differentiate tangible goods and electronic goods with example of your own.
e
Tangible Electronic(intangible)
vi
The third wave is brought on by the mobile technologies. It connects users via mobile
devices for real-time and on-demand transactions.
86
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
in
company for their cycles.
s.
3. Write a note on name-your-price websites.
s
These websites generate revenue through affiliate links, sponsored advertisement or
even a small commission in every booking. Ex: Name-your-price websites.
re
4. Write a note on physical product dispute of E-Commerce.
xp
Physical product disputes are a major disadvantage in E-commerce. E-commerce
purchases are often made on trust. This is because, we do not have physical access to the
e
product.
vi
5 Mark
al
.k
The Dotcom companies of first wave are mostly American companies. Websites were
only in English.
w
The second wave is the rebirth of E-Commerce after the dotcom burst. The second wave
is considered as the global wave.
The third wave is brought on by the mobile technologies. It connects users via mobile
devices for real-item and on-demand transactions.
87
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
2. List all the E-Commerce Business models and explain any four briefly.
in
7. Government to Business (G2B)
s.
8. Government to Consumer (G2C)
s
9. Government to Government (G2G)
re
1. Business to Business (B2B)
xp
B2B E-Commerce, commercial transactions take place between different business
organizations, through the Internet. Ex: A cycle company may buy tyres from another
e
company for their cycles.
vi
B2C E-Commerce, commercial transactions take place between business firms and their
consumers. Ex: A book company selling books to customers.
.k
B2G is a business model that refers to business organizations sells products, services or
information to Governments. Ex: A Government buys laptops for students from a business.
w
88
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
C2G models usually include income tax or house tax payments, fees for certificates or
other documents. Ex: People paying for renewal of license online.
in
G2C in E-Commerce is very similar to C2G. The government provides platform for its
s.
citizens to services and information through internet. Ex: paying taxes, registering vehicles etc.,
s
9. Government to Government (G2G)
re
G2G is the online interaction between Government organizations or departments.
Payment: is made by cash, cheque, cards etc. Payment: credit card and through fund transfer
89
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Affiliate site
The affiliate site may be a price comparison service or shopping. Ex: offering more
information.
Auction site
Auction site is a kind of website, that auctions items on the Internet and some
commission from the sales Ex: ebay.com
in
Banner advertisement site displays advertisements of other companies in its websites
s.
and earns revenue.
s
Bulk-buying sites
re
Bulk-buying sites collect a number of users together all of who want to buy similar items.
The site negotiates a discount with the supplier and takes a commission.
xp
Digital publishing sites
e
This sites e-books or magazines on the web. Profits in a number of ways such as
vi
Licensing sites
.k
Licensing sites allow other websites to make use of their software. Ex: search engines
which allow a visitor of the site to search within the website more easily.
w
Name-your-price sites
w
90
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Advantages of E-Commerce
in
◼ Payments can also made through online.
s.
Disadvantages of E-Commerce
s
◼ E-Commerce we should wait between placing the order and the product in hand.
re
◼ We can see pictures of a cloth, but not its quality.
xp
◼ Delivery and security issues.
◼ Transaction problems.
al
91
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Electronic payment refers to a payment made form one bank account to another bank
account using electronic methods.
On-line payment system designed to allow Macro electronic payment systems support
in
efficient and frequent payments of small payments of higher value.
amounts.
s.
In order to keep transaction costs very low, The security requirements are more rigorous
s
the communication and computational costs in macro payment systems because of huge
re
are minimized here. money transactions.
xp
3. List the types of micro electronic payments based on its algorithm.
e
Hash chain, Hash Collisions, Shared secrete keys, probability based micro electronic
vi
payment systems.
al
Electronic purses allow users to make electronic transactions quickly and securely.
.k
The authors make only a few minor changes in parameters like time, date, distribution
w
92
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
Micro electronic payment is an on-line payment system designed to allow efficient and
frequent payments of small amounts.
Role in E-Commerce
Increasingly popular due to the widespread use of the internet-based shopping and
in
banking.
s.
Credit card Debit card
s
re
Credit card is pay later. Debit card is pay now.
- 2.88mm to 3.48mm
Thickness - 0.76mm
w
Stored value card is a type of debit card that is pay before. Customers don’t need to
have a bank account. Types: Closed loop (single purpose) Ex: Chennai metro rail travel card.
The crypto currency units are created by the solution of cryptographic tasks called
mining. The miners not only generate new monetary units, but also initiate new transactions
to the block chain.
93
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
1.What is credit card? Explain the key players of a credit card payment system and bring
out the merits of it.
Credit card
Credit card is an electronic payment system normally used for retail transactions.
A credit card enables the bearer to buy goods or services from a vendor, based on the
cardholder’s promise to the value later with an agreed interest.
in
Key players in opearations of credit card
1. Bearer
s.
The holder of the credit card account who is responsible for payment of
s
invoices in full or portion of the balance.
re
2. Merchant xp
Storekeeper or vendor who sell or providing service, receiving payment made
by its customers through the credit card.
e
3. Acquirer
vi
It acts as the intermediate between the banks. That process credit card payments
w
5. Issuer
Bearer’s bank, that issue the credit card, set limit of purchases, decides the
approval of transactions, issue invoices for payment, charges the holders etc.,
94
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Apart from card based payment systems there are many alternative electronic payment
systems.
in
3. RTGS (Real Time Gross Settlement System )
s.
Electronic Clearing Services (ECS)
s
Electronic clearing service can be defined as repeated transfer of funds from one bank
re
account to multiple bank accounts or using computer and internet technology.
The amount sent from the sender’s bank branch is credited to the receiver’s bank
al
Real Time Gross Settlement system (RTGS) is a payment system particularly used for
the settlement of transactions between financial institutions, especially banks.
w
transfers.
95
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
a) Internet banking
Internet banking is a online banking, E-banking, virtual banking , direct banks, web
banking and remote banking.
This is a very fast and convenient way of performing any banking transactions.
The online banking system will typically connect to the core banking system operated
by customers themselves ( Self-Service banking)
in
through its website.
s.
b) Mobile banking
s
The term mobile banking also called m-banking refers to the services provided by the
re
bank to the customer of mobile phones.
This algorithm secures the transactions by recording it in block chain and controls the
w
Crypto currency is also called as crypto coins, e-cash, alternative currencies or virtual
w
96
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
UPI withdraws and deposits funds directly form the bank account whenever a
transaction is requested.
s.
Advantages.
s
re
Immediate money transfers through mobile device round the clock 24x7
Can use single mobile application for accessing multiple bank accounts.
xp
Single click Authentication for transferring of fund.
e
It is not required to details such as Card no, Account number, IFSC etc. for every
vi
transaction.
Electronic payments will become much easier without requiring digital wallet or credit
al
or debit card.
.k
w
w
w
97
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
17. E-COMMERCE SECURITY SYSTEMS
2 Mark
The content of the transaction between the vendor and customer is stolen by the third
party.
The documents provided by the merchant to the customer or illegally used by the
another.
in
Some fake websites try to take advantage of users common typographical errors typing
a website address and direct users to a different website. Ex: www.goggle.com,
s.
www.faceblook.com
s
3. Define not-repudiation.
re
Non-repudiation: prevention against violation agreement after the deal.
It ensures that the signer who digitally signed the document cannot deny having signed it.
xp
4. List the different types of security technologies in E-commerce.
e
Encryption technology
vi
Authentication technology
al
Authentication protocols
.k
3 Mark
98
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
◆ Information leakage
◆ Tampering
◆ Payment frauds
◆ Cyber Squatting
in
◆ Typopiracy
s.
3. Differentiate asymmetric and symmetric algorithms.
s
Symmetric Key Encryption Asymmetric Key Encryption
re
Same key is used for both encryption and Different keys are used for encryption and
xp
decryption decryption
Plain text and cipher text are of same size The size of cipher text is always greater than
plain text.
al
.k
Pretty Good Privacy (PGP) encryption uses a serial combination of hashing, data
compression, symmetric-key cryptography and works on the concept of “web of trust”
w
Acquirer Domain
Issuer Domain
Interoperability Domain
99
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
in
Integrity: prevention of the data being unaltered or modified.
s.
Non-repudiation: prevention against violation agreement after the deal.
s
Privacy: Prevention of customers personal data being used by others.
re
Reliability: providing a reliable identification of the individuals or businesses.
xp
Review ability: capability of monitoring activities to audit and track the operations.
e
2. Differentiate Digital Signatures and Digital Certificates.
vi
Digital Signature is a mechanism that is used Digital Certificate is a computer file Which
to verify that a particular digital document. officially approves the certificate.
.k
Digital signatures are used to verify the Digital certificates are used to verify the
w
A digital signature is created using a Digital A digital certificate works o the principles of
Signature Standard (DSS). Ex: SHA1 SHA2 public key cryptography standards (PKCS).
Ex: X.509 or PGP format.
The document is encrypted at the sending end A digital certificate consist of certificates
and decrypted at the receiving end using owner name and public key, expiration date,
asymmetric keys. Certificate Authority’s name and digital
Signature.
100
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Encryption technology
in
Symmetric key encryption
s.
The Data Encryption Standard (DES) is a Symmetric key data encryption
s
method.
re
Same key is used for both encryption and decryption.
xp
Speed of encryption or decryption is very fast.
Provides confidentiality.
al
101
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
SET was developed in 1996 by VISA and Master Card, with the participation of
GTE, IBM, Microsoft and Netscape.
SET is based on the used of digital signatures and the encryption of transmitted
data with asymmetric and symmetric encryption algorithms.
Features
in
Using public key encryption and private key encryption ensure data
s.
confidentiality.
s
re
Dual signature technology to ensure the identity of both parties in the
transaction.
e xp
5. Briefly Explain Secure Sockets Layers (SSL).
vi
◼ Today, all browsers in the market support SSL, and most of the
w
Secure Communications.
w
◼ The URL starts with https:// instead of http:// where the “s” obviously means
Secured.
102
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
18. ELECTRONIC DATA INTERRCHANGE -EDI
2 Mark
1.Define EDI.
The Electronic Data Interchange is the exchange of business documents between one
trade partner and another electronically.
Delivery notes
Invoices
in
Purchase orders
s.
Advance ship notice
s
Functional acknowledgements
◆ Communication software
al
◆ Communication network
.k
The versions of EDIFACT are also called as directories. These EDIFACT directories
w
Example:
103
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
3 Mark
The Electronic Data Interchange is the exchange of business documents between one
trade partner and another electronically. Delivery notes, invoices, purchase orders, advance
ship notice, functional acknowledgements etc.
⚫ Semantic layer
in
⚫ Transport layer
s.
⚫ Physical layer
s
re
3. Write a note on UN/EDIFACT.
The basic standardization concept of EDIFACT is that there are uniform message
al
types called United Nations Standard Message (UNSM). Six uppercase English alphabets. The
message begins with UNH and ends with UNT.
.k
Character Uses
w
104
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
5 Mark
◼ Direct EDI/Point-to-Point
It is also called as Point-to-Point EDI. It establishes a direct connection between
various business stakeholders and partners individually.
EDI via VAN (Value Added Network) is where EDI documents are transferred with
the support of third party network service providers.
in
◼ EDI via FTP/VPN, SFTP,FTPS
s.
When protocols like FTP/VPN, SFTP and FTPS are used for exchange of EDI based
s
documents through the Internet or Intranet.
re
◼ Web EDI xp
Web based EDI conducts EDI using and web browser via the Internet. To use any
browser to transfer data to their business partners. Web based EDI is easy and convenient for
small and medium organizations.
e
vi
◼ Mobile EDI
al
Smart phones or other such handheld devices are used to transfer EDI documents it is
called as mobile EDI. Mobile EDI applications considerably increase the speed of EDI
.k
transactions.
w
Minimizing errors
Slashing response times
Automation of operations
Cutting costs
Integrating all business and trading partners
Providing information on process status
Optimizing financial ratios
105
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
Segment Tables
Segment table lists the message tags. Ex: C10 indicates repetitions of a segment or
group between 0 and 10.
EDI Interchange
in
▪ Interchange is also called as envelope.
s.
▪ The top level of EDIFACT structure is Interchange.
s
▪ Interchange may contain multiple messages. It starts with UNB and ends with
re
UNZ.
EDIFACT Message
xp
The basic standardization concept of EDIFACT is the there are uniform message types
e
called United Nations Standard Message (UNSM). The message begins with UNH and
vi
EDIFACT Segments
al
EDIFACT Elements
w
The elements are the piece of actual data. These data elements may be either simple or
composite.
w
106
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
s s.
re
e xp
vi
al
.k
w
w
w
107
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
s s.
re
e xp
vi
al
.k
w
w
w
108
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
s s.
re
e xp
vi
al
.k
w
w
w
109
www.kalviexpress.in www.kalviexpress.in
Muhyiddeen Matric Hr. Sec. School-Kayalpatnam, Tuticorin dt D.JENIS MCA., Email: jenisroyal@gmail.com
www.kalviexpress.in www.kalviexpress.in
in
s s.
re
e xp
vi
al
.k
w
w
w
110
www.kalviexpress.in www.kalviexpress.in