You are on page 1of 70

HIGHER SECONDARY – SECOND YEAR

Supporting Material

COMPUTER APPLICATIONS

PREPARATION TEAM
V.G. RAMAKRISHNAN K. KANNAN
Karnataka Sanga Hr. Sec. School, Chennai Girls Hr. Sec. School,
T. Nagar, Chennai 600 017 Rotler Street, Chennai 600 112

N.V. GOWRISHANKAR A. SAGAR BABU


Chennai Girls Hr. Sec. School, SMB Jain Hr. Sec. School,
Nungambakkam, Chennai 600 034 T. Nagar, Chennai 600 017

K. LENIN SIVA SARAVANAN,


Chennai Girls Hr. Sec. School, Chennai Hr. Sec. School,
Saidapet, Chennai 600 015 M.G.R. Nagar, Chennai 600 083

CHENNAI EDUCATIONAL DISTRICT

1
HIGHER SECONDARY – SECOND YEAR
COMPUTER APPLICATIONS
Chapter 1
MULTIMEDIA AND DESKTOP PUBLISHING
PART – I
Choose the best answer:
1. ………….. refers to any type of application that 3. Sound – MPEG
involves more than one type of media such as text, 4. Video – RTF
graphics video animation and sound (a) 1, 2, 3, 4 (b) 2, 3, 4, 1
(a) an executable file (b) desktop publishing (c) 4, 1, 2, 3 (d) 3, 4, 1, 2
(c) multimedia (d) hypertext
6. Find the odd one on the following which is not an
2. One of the disadvantages of the multimedia is its image format
(a) cost (b) adaptability (a) TIFF (b) BMP (c) RTF (d) JPEG
(c) usability (d) relativity
7. …….. is the process displaying still images they
3. Expand JPEG give continuous movement
(a) Joint Photo Experts Gross (a) Text formats (b) Sound
(b) Joint Photographic Experts Group (c) MP3 (d) Animation
(c) Joint Processor Experts Group
(d) Joint Photographic Expression Group 8. The live telecasting of real time program through
Internet is known as ……..
4. You need hardware, software and ………. to (a) web casting (b) web hosting
make multimedia (c) data manipulation (d) none of the above
(a) network
(b) compact disk drive 9. GIF use ……… color look up table
(c) good idea (a) 8 bit (b) 8 KB (c) 8 MB (d) 8 GB
(d) programming knowledge
10. RTF file format was introduced by ……..
5. Match the following by choosing the right one (a) TCS (b) Microsoft
1. Text – TGA (c) Apple (d) IBM
2. Image – MIDI

Chapter – 2
AN INTRODUCTION TO ADOBE PAGEMAKER

1. DTP stands for …………….. 4. In PageMaker Window, the area outside of the
(a) Desktop Publishing dark border is referred to as ………
(b) Desktop Publication (a) page (b) pasteboard
(c) Doctor To Patient (c) blackboard (d) dashboard
(d) Desktop Printer
5. Shortcut to close a document in PageMaker is
2. ………….. is a DTP software. ……………..
(a) Lotus 1-2-3 (b) PageMaker (a) Ctrl + A (b) Ctrl + B
(c) Maya (d) Flash (c) Ctrl + C (d) Ctrl + W

3. Which menu contains the New option? 6. A ………….. tool is used for magnifying the
(a) File menu (b) Edit menu particular portion of the area.
(c) Layout menu (d) Type menu (a) Text tool (b) Line tool
(c) Zoom tool (d) Hand tool

2
14. …………… Bar is the topmost part of the
7. ……………. tool is used for drawing boxes. PageMaker window.
(a) Line (b) Ellipse (a) Menu (b) Title
(c) Rectangle (d) Text (c) Tools (d) Scroll

8. Place option is present in ……….. menu. 15. ……….. is the process of moving up and down
(a) File (b) Edit or left and right through the document window.
(c) Layout (d) Window (a) cutting (b) copying
(c) scrolling (d) typing
9. To select an entire document using the
keyboard, press ………….. 16. ________ tool is used to draw a circle.
(a) Ctrl + A (b) Ctrl + B (a) circle (b) rectangle
(c) Ctrl + C (d) Ctrl + D (c) ellipse (d) line

10. Character formatting consists of which of the 17. The Insert pages option is available on clicking
following text properties? the _________ menu.
(a) Bold (b) Italic (a) File (b) Edit
(c) Underline (d) All of these (c) Format (D) Layout

11. Which tool lets you edit text? 18. Match the following.
(a) Text tool (b) Type tool (A) Cut - (i) Ctrl + Z
(c) Crop tool (d) Hand tool (B) Copy - (ii) Ctrl + V
(C) Paste - (iii) Ctrl + X
12. Shortcut to print a document in Pagemaker is (D) Undo - (iv) Ctrl + C
……….. (a) A-iii, B-iv, C-ii, D-I
(a) Ctrl + A (b) Ctrl + P (b) A-i, B-iv, C-iii, D-ii
(c) Ctrl + C (d) Ctrl + V (c) A-iv, B-iii, C-i, D-ii
(d) A-iii, B-i, C-ii, D-iv
13. Adobe PageMaker is a ………… software.
(a) Wordprocessor (b) Spreadsheet 19. Choose the correct pair
(c) presentation (D) Page Layout (a) File and Cut (b) Edit and New
(c) Undo and Copy (d) Undo and Redo

Chapter – 3
INTRODUCTION TO DATABASE MANAGEMENT SYSTEM

1. Which language is used to request information 3. An entity set that does not have enough
from a Database? attributes to form primary key is known as
a) Relational b) Structural a) Strong entity set b) Weak entity set
c) Query d) Compiler c) Identity set d) Owner set

2. The …………. diagram gives a logical structure 4. ……………. Command is used to delete a
of the database graphically? database.
a) Entity-Relationship b) Entity a) Delete database database_name
c) Architectural Representation d) Database b) Delete database_name
c) drop database database_name
d) drop database_name

3
8. Communication is established with MySQL using
5. Which type of below DBMS is MySQL? a) SQL b) Network calls
a) Object Oriented b) Hierarchical c) Java d) API’s
c) Relational d) Network
9. Which is the MySQL instance responsible for
6. MySQL is freely available and is open source. data processing?
a) True b) False a) MySQL Client b) MySQL Server
c) True only for Windows d) True only for UNIX c) SQL d) Server Daemon Program

7. ………………. represents a “tuple” in a relational 10. The structure representing the organizational
database? view of entire database is known as ………….. in
a) Table b) Row MySQL database.
c) Column d) Object a) Schema b) View
c) Instance d) Table

Chapter – 04
INTRODUCTION TO HYPERTEXT PRE-PROCESSOR
5. We can use ___ to comment a single line?
1. What does PHP stand for? i) /? ii) // iii) # iv) /* */
a) Personal Home Page a) Only (ii) b) (i), (iii) and (iv)
b) Hypertext Preprocessor c) (ii), (iii) and (iv) d) Both (ii) and (iv)
c) Pretext Hypertext Processor
d) Pre-processor Home Page 6. What will be the output of the following PHP
code?
2. What does PHP files have a default file < ?php
extension? $num = 1;
a) .html b) .xml c) .php d) .ph $num1 = 2;
print $num . “+”. $num1 ;
3. A PHP script should start with ___ and end with ?>
___: a) 3 b) 1+2 c) 1.+.2 d) Error
a) <php> b) < ? php ?>
c) < ? ? > d) < ?php ? > 7. Which statement will output $x on the screen?
a) echo “\$x”; b) echo “$$x”;
4. Which of the following must be installed on your c) echo “/$x”; d) echo “$x;
computer so as to run PHP script?
a) Adobe b) windows 8. Which of the below symbols is a newline
c) Apache d) IIS character?
a) \r b) \n c)/n d)/r

Chapter – 05
PHP FUNCTION AND ARRAY

1. Which one of the following is the right way of 2. A function in PHP which starts with __ (double
defining a function in PHP? underscore) is known as..
a) function { function body } a) Magic Function b) Inbuilt Function
b) data type functionName(parameters) { c) Default Function d) User Defined
function body } Function
c) functionName(parameters) { function body }
d) function fumctionName(parameters) { 3. PHP’s numerically indexed array begin with
function body } position ___________
a) 1 b) 2 c) 0 d) -1

4
4. Which of the following are correct ways of Correct Answer: Array ( [A] => 2 [Tiger] => 1
creating an array? )
i) state[0] = “Tamilnadu”; 6. Indices of arrays can be either strings or
ii) $state[] = array(“Tamilnadu”); numbers and they are denoted as
iii) $state[0] = “Tamilnadu”; a) $my_array {4} b) $my_array [4]
iv) $state = array(“Tamilnadu”); c) $my_array| 4 | d) None of them
a) iii) and iv) b) ii) and iii)
c) Only i) d) ii), iii) and iv)
7. PHP arrays are also called as
5. What will be the output of the following PHP a) Vector arrays b) Perl arrays
code? c) Hashes d) All of them
<?php
$a=array(“A”,”Cat”,”Dog”,”A”,”Dog”); 8. As compared to associative arrays vector
$b=array(“A”,”A”,”Cat”,”A”,”Tiger”); arrays are much
$c=array_combine($a,$b); a) Faster b) Slower
print_r(array_count_values($c)); c) Stable d) None of them
?>
a) Array ([A] =>5[Cat] =>2 [Dog]=>2[Tiger]=>1) 9. What functions count elements in an array?
b) Array([A]=>2 [Cat]=>2 [Dog]=>1 [Tiger]=>1) a) count b) Sizeof
c) Array([A]=>6[Cat]=>1[Dog]=>2[Tiger]=>1) c) Array_Count d) Count_array
d) Array( [A]=>2[Cat] =>1[Dog]=>4[Tiger]=>1)
Chapter – 06
PHP CONDITIONAL STATEMENTS

1. What will be the output of the following PHP else


code? print “how are u”;
<?php print “hello”
$x; ?>
if ($x) a) how are uhello b) hihello
print “hi” ; c) hi d) no output
else
print “how are u”; 4. Statement which is used to make choice
?> between two options and only option is to be
a) how are u b) hi performed is written as
c) error d) no output a) if statement b) if else statement
c) then else statement d) else one statement
2. What will be the output of the following PHP
code? 5. What will be the output of the following PHP
<?php code ?
$x = 0; <?php
if ($x++) $a = “”;
print “hi”; if ($a)
else print “all”;
print “how are u”; if
?> else
a) hi b) no output print “some”;
c) error d) how are u ?>
a) all b) some
3. What will be the output of the following PHP c) error d) no output
code ?
<?php 6. What will be the output of the following PHP
$x; code ?
if ($x == 0) <?php
print “hi” ; $a = “”;

5
if ($a) 8. What will be the output of the following PHP
print “all”; code ?
if <?php
else $x = 10;
print “some”; $y = 20;
?> if ($x > $y && 1||1)
a) all b) some print “hi” ;
c) error d) no output else
print “how are u”;
7. What will be the output of the following PHP ?>
code ? a) how are u b) hi
<?php c) error d) no output
$x = 10;
$y = 20; 9. What will be the output of the following PHP
if ($x > $y + $y != 3) code ?
print “hi” ; <?php
else if (-100)
print “how are u”; print “hi” ;
?> else
a) how are u b) hi print “how are u”;
c) error d) no output ?>
a) how are u b) hi
c) error d) no output

Chapter – 07
LOOPING STRUCTURE

1. Most complicated looping structure is }


a) While b) Do While echo “Counter is: $counter”;
c) For d) None of them ?>
a) Welcome to Tamilnadu
2. Loops that iterate for fixed number of times is b) Counter is: 20
called c) Welcome to Tamilnadu Counter is: 22
a) Unbounded loops b) Bounded loops d) Welcome to Tamilnadu Welcome t
c) While loops d) For loops Tamilnadu Counter is: 22

3. Which loop evaluates condition expression as 6. What will be displayed in a browser when the
Boolean, if it is true, it executes statements and following PHP code is executed:
when it is false it will terminate? <?php
a) For loop b) For each loop for ($counter = 10; $counter < 10; $counter =
c) While loop d) All of them $counter + 5){
echo “Hello”;
4. Which loop evaluates condition expression as }
Boolean, if it is true, it executes statements and ?>
when it is false it will terminate? a) Hello Hello Hello Hello Hello
a) For loop b) For each loop b) Hello Hello Hello
c) While loop d) All of them c) Hello d) None of the above

5. What will be displayed in a browser when the 7. PHP supports four types of looping techniques;
following PHP code is executed: a) for loop b) while loop
c) foreach loop d) all the above
<?php
for ($counter = 20; $counter < 10; $counter++){ 8. Consider the following code
echo “Welcome to Tamilnadu “; <? php

6
$count=12; }
do{ ?>
printf(“%d squared=%d<br/>”, a) ********** b) *********
$count, pow($count,2)); c) *********** d) Infinite loop
} while($count<4);
?> 10. What will be the output of the following PHP
What will be the output of the code. code ?
a) 12 squared 141 b) 12 squared=144 <?php
c) “12 squared=141” d) Execution error for ($x = -1; $x < 10;--$x)
{
9. What will be the output of the following PHP print $x;
code? }
<?php ?>
for ($x = 1; $x < 10;++$x) a) 123456713910412 b) 123456713910
{ c) 1234567139104 d) Infinite loop
print “*\t”;
Chapter – 08
FORMS AND FILES

1. When you use the $_GET variable to collect 6. If you would like to read a file character by
data, the data is visible to.. character which function do you use?
a) none b) only you a) fopen ( ) b) fread ( )
c) everyone d) selected few c) fgetc ( ) d) file ( )

2. Which one of the following should not be used 7. PHP is a ______ typed language.
while sending passwords or other sensitive a) User b) Loosely
information? c) Server d) System
a) GET b) POST
c) REQUEST d) NEXT 8. What does fopen() function do in PHP?
a) It used to open files in PHP
3. Which directive determines whether PHP b) It used to open Remote Server
scripts on the server can accept file uploads? c) It used to open folders in PHP
a) file_uploads b) file_upload d) It used to open Remote Computer
c) file_input d) file_intake
9. How PHP files can be accessed?
4. In HTML form <input type=”text”> is used for a) Through Web Browser
a) One line text b) Block of text b) Through HTML files
c) One paragraph d) None c) Through Web Server
d) All of Above
5. HTML classes that is already defined and allow
us to apply styles on it are called as 10. Which of the following functions reads the entire
a) Pseudo classes b) Css classes contents of a file?
c) Javascript classes d) None a) fgets() b) file_get_contents()
c) fread() d) readfile()
Chapter – 09
CONNECTING PHP AND MYSQL

1. Which one of the following statements 2. Which one is correct way, we can retrieve the
instantiates the mysqli class? data in the result set of MySQL using
a) mysqli = new mysqli() PHP?
b) $mysqli = new mysqli() a) mysql_fetch_row. b) mysql_fetch_array
c) $mysqli->new.mysqli() c) mysql_fetch_object d) All the above
d) mysqli->new.mysqli()

7
3. How Can we Create a Database Using PHP c) mysql_connect(“Server Name “,”User
and MySQL? Name”,”Password”,”DB Name”);
a) mysqli_create_db(“Database Name”) d) mysqli_connect (“Database Object”);
b) mysqli_create_db(“Data”)
c) create_db(“Database Name”) 7. Which is the not a correct MySQL Function in
d) create_db(“Data”) PHP ?
a) Mysqli_connect() Function
4. Which is the correct function to execute the b) Mysqli_close() Function
SQL queries in PHP ? c) mysqli_select_data() Function
a) mysqli_query(“Connection Object”,”SQL d) mysqli_affected_rows() Function
Query”)
b) query(“Connection Object”,”SQL Query”) 8. How many parameter are required for MYSQLi
c) mysql_query(“Connection Object”,”SQL connect function in PHP ?
Query”) a) 2 b) 3 c) 4 d) 5
d) mysql_query(“SQL Query”)
9. How many parameter are required for MYSQLi
5. Which is the correct function Closing query function in PHP ?
Connection in PHP ? a) 2 b) 3 c) 4 d) 5
a) mysqli_close(“Connection Object”);
b) close(“Connection Object”); 10. How many parameter are required for MYSQLi
c) mysql_close(“Connection Object”); Close function in PHP ?
d) mysqli_close(“Database Object”); a) 1 b) 2 c) 3 d) 5

6. Which is the correct function to establish 11. Which version of PHP supports MySQLi
Connection in PHP ? fuctions ?
a) mysqli_connect(“Server Name “,”User a) Version 2.0 b) Version 3.0
Name”,”Password”,”DB Name”); c) Version 4.0 d) Version 5.0
b) connect(“Server Name “,”User
Name”,”Password”,”DB Name”);
Chapter 10
INTRODUCTION TO COMPUTER NETWORKS

1. A set of computers connecting together is called (c) Host (d) Telephone switch
as .............
(a) Network (b) Server 5. Wi-Fi is short name for
(c) Hub (d) Node (a) Wireless Fidelity (b) Wired fidelity
(c) Wired fiber optic (d) Wireless fiber optic
2. Computer network devices that originates route
and terminate the data were called as 6. People everywhere can express and publish
(a) Hub (b) Resource their ideas and opinions via
(c) Node (d) Cable (a) Tele-medicine (b) blogging
(c) Server (d) Node
3. Match the period and methods available on
history of computer networking in the Internet 7. Which one of the following periods, the speed
a) 1950 - X.25 TCP/IP capacity supported towards gigabit on computer
b) 1966 - SAGE network?
c) 1976 - WAN (a) SABRE (b) SAGE
d) 1972 - ARCNET (c) NEW FIBRE OPTICS (d) ARCNET
(a) 4321 (b) 3421
(c) 1234 (d) 2341 8 One among them was challenging to the
business people on computer networking
4. Western Electric introduced the first widely used (a) Hacking (b) Viruses
........... that implemented true computer control. (c) Both a & b (d) none of this above
(a) Packet switch (b) Arpanet

8
9. ............ able to predict, manage, and protect the
computer network at Internet 13. Facebook was created at ............ year
(a) Artificial intelligence (b) Broadband provider (a) 2002 (b) 2004
(c) Cloud computing (d) Transceivers (c) 2013 (d) 2010

10. …….. use less power comparing with single 14. In mobile network, land areas for network
transmitter or satellite often cell towers nearer coverage was distributed as
(a) Mobile devices (b) Transistors (a) Firmware (b) cells
(c) WIFI (d) Communication (c) Range (d) Service

11. People now a days getting relaxed via 15. Which one were harmful to computer
(a) Business (b) Corporate company (a) Bloggers (b) Browser
(c) News papers (d) Social media (c) Hackers (d) twitter

12. Which one of the following is not the social 16. Which innovation made the people to use
media Internet?
(a) Gmail (b) Facebook (a) Social web (b) Mobile technology
(c) twitter (d) Linkedin (c) Mobile App (d) Both a & b
Chapter 11
NETWORK EXAMPLES AND PROTOCOLS

1. The………….., “the Net,” is a worldwide system 5. A TCP/IP network with access restricted to
of computer networks members of an organization
(a) Internet (b) mobile (a) LAN (b) MAN
(c) communication (d) protocol (c) WAN (d) Intranet

2. Which one of the following will be easy the way 6. RFID stands for …………..
to uses Internet technology and the public (a) Radio Free identification
telecommunication system to securely share (b) real Frequency identity
business’s information with suppliers, vendors, (c) Radio Frequency indicators
partners and customers. (d) Radio Frequency Identification.
(a) Extranet (b) Intranet
(c) ARPANET (d) ARCNET 7. It guarantees the sending of data is successful
and which checks error on operation at OSI layer is
3. Match the following and choose the correct …………..
answer (a) Application layer (b) Network layer
i. HTTP - The core protocol of the (c) Transport Layer (d) Physical layer
World Wide Web.
ii. FTP - enables a client to send and 8. Which one of the following will secure data on
receive complete files from a transmissions
server. (a) HTTPS (b) HTTP
iii. SMTP - Provide e-mail services. (c) FTP (d) SMTP
iv. DNS - Refer to other host
computers by using names 9. ………………. provides e-mail service
rather than numbers. (a) DNS (b) TCP
(a) i, ii, iii, iv (b) ii, iii, iv, i (c) FTP (d) SMTP
(c) iii, iv, i, ii (d) iv, iii, ii, i
10. ……………. refer to other host computers by
4. Communication over ………………. is be made using names rather than numbers.
up of voice, data, images and text messages. (a) DNS (b) TCP
(a) Social media (b) mobile network (c) FTP (d) SMTP
(c) whatsApp (d) software

9
11. TCP/IP is a combination of two protocols: iv. Capital Protocol (CP)
i. Transmission Control Protocol (TCP) (a) i, ii (b) i, iii
ii. Internet Protocol (IP) (c) iii, iv (d) ii, iii
iii. Selection Protocol (SP)
Chapter 12
DNS (DOMAIN NAME SYSTEM)

1. Which of the following is used to maintain all the a) Zone b) Domain


directory of domain names? c) Resolver d) Name servers
a) Domain name system
b) Domain name space 11. ISP stands for
c) Name space d) IP address a) International Service provider
b) Internet Service Provider
2. Which of the following notation is used to denote c) Internet service Protocol
IPv4 addresses? d) Index service provider
a) Binary b) Dotted-decimal
c) Hexadecimal d) a and b 12. TLD stands for
a) Top Level Data b) Top Logical Domain
3. How many bits are used in the IPv6 addresses? c) Term Level Data d) Top Level Domain
a) 32 b) 64 c) 128 d) 16
13. Which of the following statements are true?
4. Expansion of URL is i) Domains name is a part of URL.
a) Uniform Resource Location ii) URL made up of four parts
b) Universal Resource Location iii) The relative URL is a part of Absolute URL
c) Uniform Resource Locator iv) URL doesn’t contain any protocol
d) Universal Resource Locator a) i & ii b) ii
c) i, ii & iii d) i, ii & iv
5. How many types are available in Relative URL?
a) 2 b) 3 c) 4 d) 5 14. Assertion (A): The number of addresses used
in IPv6 addressing method is 128.
6. Maximum characters used in the label of a Reason (R): IPv6 address is a 128 bit unique
node? address.
a) 255 b) 128 c) 63 d) 32 a) A is true and R is false.
b) A is false and R is true.
7. In domain name, sequence of labels are c) Both A and R are correct and R is the correct
separated by explanation of A.
a) ; b) .(dot) c) : d) NULL d) Both A and R are correct and R is not the correct
explanation of A.
8. Pick the odd one out from the following.
a) node b) label 15. Match the following
c) domain d) server a. domain - 1. progress that initiates translation
b. zone - 2. contains database of domain
9. Which of the following initiates the mapping of names
domain name to IP address? c. name server - 3. single node
a) Zone b) Domain d. resolver - 4. contiguous nodes
c) Resolver d) Name servers a. 1432 b.3421
c. 3214 d. 3412
10. Which is the contiguous area up to which the
server has access?
Chapter – 13
NETWORK CABLING
1. ARPANET stands for (c) Advanced Research Project Agency Network
(a) American Research Project Agency Network (d) American Research Programs And Network
(b) Advanced Research Project Area Network
10
2. WWW was invented by 7. Which connector is used in the Ethernet cables?
(a) Tim Berners Lee (b) Charles Babbage (a) RJ11 (b) RJ21 (c) RJ61 (d) RJ45
(c) Blaise Pascal (d) John Napier
8. Which of the following connector is called as
3. Which cable is used in cable TV to connect with champ connector?
setup box? (a) RJ11 (b) RJ21
(a) UTP cable (b) Fiber optics (c) RJ61 (d) RJ45
(c) Coaxial cable (d) USB cable
9. How many pins are used in RJ45 cables?
4. Expansion of UTP is (a) 8 (b) 6 (c) 50 (d) 25
(a) Uninterrupted Twisted Pair
(b) Uninterrupted Twisted Protocol 10. Which wiring standard is used for connecting
(c) Unshielded Twisted Pair two computers directly?
(d) Universal Twisted Protocol (a) straight Through wiring (b) Cross Over wiring
(c) Rollover wiring (d) None
5. Which medium is used in the optical fiber cables
to transmit data? 11. Pick the odd one out from the following cables
(a) Microwave (b) infra red (a) roll over (b) cross over
(c) light (d) sound (c) null modem (d) straight through

6. Which of the following is a small peripheral 12. Match the following


device with a SIM slot to connect the computers to (1) Ethernet - Port
Internet? (2) RJ45 connector - Ethernet
(a) USB (b) Dongles (3) RJ45 jack - Plug
(c) Memory card (d) Mobiles (4) RJ45 cable - 802.3
(a) 1, 2, 4, 3 (b) 4, 1, 3, 2
(c) 4, 3, 1, 2 (d) 4, 2, 1, 3

Chapter - 14
OPEN SOURCE CONCEPTS
1. If the source code of a software is freely 4. Which is an example of network simulator?
accessible by the public, then it is known as (a) Simulator (b) TCL
(a) freeware (b) Firmware (c) NS2 (d) C++
(c) Open source (d) Public source
5. Fill in the blanks: NS2 comprises of …………….
2. Which of the following is a software program that key languages?
replicates the functioning of a computer network? (a) 13 (b) 3 (c) 2 (d) 4
(a) Network software (b) Network simulation
(c) Network testing (d) Network calculator 6. Choose the Correct Pair from the following to
build NS2
3. Which of the following can document every (a) UNIX & TCL (b) UNIX & C++
incident that happened in the simulation and are (c) C++ & OTCL (d) C++ & NS2
used for examination?
(a) Net Exam (b) Network hardware 7. Which of the following is not network simulation
(c) Trace file (d) Net document software?
(a) Ns2 (b) OPNET (c) SSFNet (d) C++

11
8. Which of the following is a open source network 9. Open NMS was released in …………………
monitoring software? (a) 1999 (b) 2000 (c) 2003 (d) 2004
(a) C++ (b) OPNET
(c) Open NMS (d) OMNet++ 10. Open NMS Group was created by …….
(a) Balog (b) Matt Brozowski
(c) David Hustace (d) All of them
Chapter - 15
E-COMMERCE
1. A company can be called E-Business if Reason (R): The dotcom companies of first wave
(a) it has many branches across the world are mostly American companies.
(b) it conduct business electronically over the (a) Both (A) and (R) are correct and (R) is the
Internet correct explanation of (A)
(c) it sells commodities to a foreign country (b) Both (A) and (R) are correct, but (R) is not the
(d) it has many employees correct explanation of (A)
(c) (A) is true and (R) is false
2. Which of the following is not a tangible good? (d) (A) is false and (R) is true
(a) Mobile (b) Mobile Apps
(c) Medicine (d) Flower bouquet 7. Off-shoring means
(a) Work outsourced to a branch of its own
3. SME stands for company
(a) Small and medium sized enterprises (b) Work outsourced to new employees
(b) Simple and medium enterprises (c) Work outsourced to a third party locally
(c) Sound messaging enterprises (d) Work outsourced to a third party outside its
(d) Short messaging enterprises own country

4. The dotcom phenomenon deals with …………. 8. G2G systems are classified into
(a) Textile industries (b) Mobile phone companies (a) Internal facing and external facing
(c) Internet based companies (b) Internet facing and Extranet facing
(d) All the above (c) Internal flag and external flag
(d) Internet flag and Extranet flag
5. Which of the following is not correctly matched?
(a) The First Wave of Electronic Commerce: 9. …………… host the e-books on their websites.
1985- 1990 (a) Bulk-buying sites (b) Community sites
(b) The Second Wave of Electronic Commerce: (c) Digital publishing sites (d) Licensing sites
2004 – 2009
(c) The Third Wave of Electronic Commerce: 2010 10. Which of the following is not a characteristic of
– Present E-Commerce?
(d) Dotcom burst: 2000 – 2002 (a) Products cannot be inspected physically before
purchase.
6. Assertion (A): The websites of first wave dotcom (b) Goods are delivered instantly.
companies were only in English (c) Resource focus supply side
(d) Scope of business is global.
Chapter – 16
ELECTRONIC PAYMENT SYSTEMS
1. Based on the monetary value epayment system
can be classified into
a) Mirco and Macro b) Micro and Nano
c) Maximum and Minimum d) Maximum and Macro
12
2. Which of the following is not a category of
micropayment? 7. Which of the following is true about Virtual
a) Buying a movie ticket payment address (VPA)
b) Subscription to e journals a) Customers can use their e-mail id as VPA
c) Buying a laptop b) VPA does not includes numbers
d) Paying for smartphone app c) VPA is a unique ID
d) Multiple bank accounts cannot have single
3. Assertion (A): Micro electronic payment systems VPA
support higher value payments.
Reason (R): Expensive cryptographic operations 8. Pick the odd one in the credit card transaction
are included in macro payments a) card holder b) merchant
a) Both (A) and (R) are correct and (R) is the c) marketing manager d) acquirer
correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the 9. Which of the following is true about debit card
correct explanation of (A) i. debit cards cannot be used in ATMs
c) (A) is true and (R) is false ii. debit cards cannot be used in online transactions
d) (A) is false and (R) is true iii. debit cards do not need bank accounts
iv. debit cards and credit cards are identical in
4. Which of the following is correctly matched physical properties
a) Credit Cards - pay before a) i, ii, iii b) ii, iii, iv
b) Debit Cards - pay now c) iii alone d) iv alone
c) Stored Value Card - pay later
d) Smart card – pay anytime 10. Match the following
List A List B
5. ECS stands for A1) First Digit B1) Account number
a) Electronic Clearing Services A2) 9th to 15th Digit B2) MII Code
b) Electronic Cloning Services A3) First 6 Digits B3) BIN Code
c) Electronic Clearing Station A4) Last Digit B4) Check digit
d) Electronic Cloning Station a) A1-B4, A2-B3, A3-B2, A3-B1
b) A1-B2, A2-B1, A3-B3, A4-B4
6. Which of the following is not a Altcoin c) A1-B2, A2-B3, A3-B4, A4-B1
a) Litecoin b) Namecoin d) A1-B2, A2-B4, A3-B3, A4-B1
c) Ethereum d) Bitcoin
Chapter – 17
E-COMMERCE SECURITY SYSTEMS

1. In E-Commerce, when a stolen credit card is 4. The security authentication technology does not
used to make a purchase it is termed as include
a) Friendly fraud b) Clean fraud i) Digital Signatures
c) Triangulation fraud d) Cyber squatting ii) Digital Time Stamps
iii) Digital Technology
2. Which of the following is not a security element iv) Digital Certificates
involved in E-Commerce? a) i, ii & iv b) ii & iii
a) Authenticity b) Confidentiality c) i, ii & iii d) all the above
c) Fishing d) Privacy
5. PGP stands for
3. Asymmetric encryption is also called as a) Pretty Good Privacy
a) Secure Electronic Transaction b) Pretty Good Person
b) Certification Authority c) Private Good Privacy
c) RSA algorithm d) Private Good Person
d) Payment Information

13
6. _____ protocol is used for securing credit cards 8. The websites secured by Secure Socket Layer
transactions via the Internet protocols can be identified using
a) Secure Electronic Transaction (SET) a) html:// b) http://
b) Credit Card Verification c) htmls:// d) https://
c) Symmetric Key Encryption
d) Public Key Encryption 9. 3-D Secure, a protocol was developed by
a) Visa b) Master
7. Secure Electronic Transaction (SET) was c) Rupay d) PayTM
developed in
a) 1999 b) 1996 c) 1969 d) 1997 10. Which of the following is true about
Ransomware
a) Ransomware is not a subset of malware
b) Ransomware deletes the file instantly
c) Typopiracy is a form of ransomware
d) Hackers demand ransom from the victim
Chapter – 18
ELECTRONIC DATA INTERCHANGE - EDI

1. EDI stands for 5. Which of the following is a type of EDI?


a) Electronic Details Information a) Direct EDI b) Indirect EDI
b) Electronic Data Information c) Collective EDI d) Unique EDI
c) Electronic Data Interchange
d) Electronic Details Interchange 6. Who is called as the father of EDI?
a) Charles Babbage b) Ed Guilbert
2. Which of the following is an internationally c) Pascal d) None of the above
recognized standard format for trade,
transportation, insurance, banking and 7. EDI interchanges starts with ____ and ends
customs? with ____
a) TSLFACT b) SETFACT a) UNA, UNZ b) UNB, UNZ
c) FTPFACT d) EDIFACT c) UNA, UNT d) UNB, UNT

3. Which is the first industry-specific EDI 8. EDIFACT stands for


standard? a) EDI for Admissible Commercial Transport
a) TDCC b) VISA b) EDI for Advisory Committee and Transport
c) Master d) ANSI c) EDI for Administration, Commerce and
Transport
4. UNSM stands for? d) EDI for Admissible Commerce and Trade
a) Universal Natural Standard message
b) Universal Notations for Simple message 9. The versions of EDIFACT are also called as
c) United Nations Standard message a) Message types b) Subsets
d) United Nations Service message c) Directories d) Folders

10. Number of characters in an single EDIFACT


messages
a) 5 b) 6 c) 4 d) 3
PART - II
ANSWER TO ALL THE QUESTIONS:

1. Define Multimedia and their features animation, video etc on a single medium in
• The term multimedia comprises of two the same information unit.
words, “multi” and “media”/ “medium”. • Multimedia provides services like storage,
• Multimedia is an integration of many types communication, presentation and
of media like text, graphics, images, audio, Input/output interactions of text, video,
image, graphics and audio.
14
2. List out Multimedia Components
• Text, 7. List out audio file formats
• Images, • WAV (Waveform Audio File Format)
• Sound, • MP3 (MPEG Layer-3 Format)
• Video and • OGG
• Animation. • AIFF (Audio Interchange File Format)
• WMA (Windows Media Audio)
3. Classify the TEXT component in multimedia • RA (Real Audio Format)
(i) Static Text:
• The text or the words will remain static as a 8. List out video file formats
heading or in a line, or in a paragraph. • AVI (Audio/Video Interleave)
• MPEG (Moving Picture Experts Group)
(ii) Hypertext:
• A hypertext is a system which consists of 9. Define Multimedia Production
nodes, the text and the links between the • Adequate time and efficient planning is
nodes, which defines the paths the user; required for multimedia production, which
need to follow for the text access in non- assures that the project will be proceed
sequential ways. smoothly and certainly ensures that the
information reaches the target audience.
4. Classify the IMAGE component in multimedia
(i) Raster or Bitmap Images: 10. List out Multimedia Production team
• The common and comprehensive form of members
storing images in a computer is raster or • Script writer,
bitmap image. • Production manager,
• Editor,
(ii) Vector Images: • Graphics Architect,
• Drawing elements or objects such as lines, • Multimedia Architect and
rectangles, circles and so on to create • Web Master.
images are based on Vector images.
11. What is desktop publishing?
5. Define Animation and their features
• Desktop publishing (abbreviated DTP) is the
• Animation is the process displaying still
images so quickly so that they give the creation of page layouts for documents
impression of continuous movement. using DTP software.
• In animation the screen object is a vector
image in animation. 12. Give some examples of DTP software.
• Using numerical transformations the • Adobe PageMaker,
movement of that image along its paths is • Adobe InDesign,
calculated for their defining coordinates.
• QuarkXPress,
• The least frame rate of at least 16 frames
per second gives the impression of
smoothness and for natural looking it should 13. Write the steps to open PageMaker.
be at least 25 frames per second. Start→All Programs → Adobe → Pagemaker 7.0 →
Adobe PageMaker 7.0.
6. List out image file formats
• TIFF (Tagged Image File Format) 14. How do you create a New document in
• BMP (Bitmap)
PageMaker?
• DIB (Device Independent Bitmap)
• GIF (Graphics Interchange Format) • Choose File → New in the menu bar. (or)
• JPEG (Joint Photographic Experts Group) Press Ctrl + N in the keyboard.
• TGA (Tagra) • Now Document Setup dialog box appears.
• PNG (Portable Network Graphics)
15
• Enter the appropriate settings for your new
document in the Document Setup dialog 22. How do you insert a page in PageMaker?
box. 1. Go to the page immediately before the page
• Click on OK. you want to insert.
2. Choose Layout → Insert Pages in the menu
15. What is a Pasteboard in PageMaker? bar. The Insert Pages dialog box appears.
• The area outside of the dark border is 3. Type the number of pages you want to
referred to as the pasteboard. insert.
4. To insert pages after the current page,
16. Write about the Menu bar of PageMaker. choose ‘after’ from the pop-up menu.
• It contains the following menus File, Edit, 5. Click on Insert.
Layout, Type, Element, Utilities, View,
Window, Help. When you click on a menu 23. Define Data Model and list the types of data
item, a pulldown menu appears. There may model used.
be sub-menus under certain options in the Definition:
pull-down menus. • The database technology came into
existence in terms of models with relational
17. Differentiate Ellipse tool from Ellipse frame and object-relational behavior.
tool. Types of data model:
• Ellipse tool - Used to draw circles and • Hierarchical Database Model
ellipses. • Network model
• Ellipse frame tool - Used to create elliptical • Relational model
placeholders for text and graphics. • Object-oriented database model

18. What is text editing? 24. List few disadvantages of file processing
• Editing means making changes to the text. system.
• Data Duplication wasting spaces
When you edit a document, you revise its
• High Maintenance Cost
text.
• less security provided to the data.
• Editing encompasses many tasks, such as
inserting and deleting words and phrases, 25. Define Single and multi valued attributes.
correcting errors, and moving and copying • A single valued attribute contains only one
text to different places in the document. value for the attribute and they don’t have
multiple numbers of values.
19. What is text block? • A multi valued attribute has more than one
A text block contains text you type, paste, or import. value for that particular attribute.
You can’t see the borders of a text block until you
select it with the pointer tool. 26. List any two DDL and DML commands with
its Syntax.
20. What is threading text blocks? (1) DDL – Data Definition Language
A Text block can be connected to other text block • Create
so that the text in one text block can flow into Syntax: CREATE DATABASE
another text block. database_name;
• Alter
21. What is threading text?
Syntax: ALTER TABLE table_name ADD
The process of connecting text among Text blocks
new_column_name
is called threading text.
column_definition;

16
34. What is Webserver?
(2) DML – Data Manipulation Language: A Web server is a Software that uses HTTP
• Insert (Hypertext Transfer Protocol) to serve the files that
form Web pages to users
Syntax: INSERT INTO table_name ( field1,
field2,...fieldN ) VALUES ( value1, 35. What are the types scripting language?
value2,...valueN ); Microsoft ASP (Active Server Page) and JSP (Java
• Update Server page)
Syntax: UPDATE table_name SET
field1=new-value1, field2=new-value2 36. Difference between Client and Server?
[WHERE Clause]; Server Client
The server is a high The client is a
performance separate hardware
hardware machine it machine which is
27. What are the ACID properties? could run more than connected with server
• Atomicity, Consistency, Isolation and one application in the network
Durability. concurrently
It could send the It count receive the
request and receive request and send the
28. Which command is used to make permanent
the response from response from the
changes done by a transaction? the server client
• Commit Server are also called Client are also called
as Service Provider as Service Requester
29. What is view in SQL?
• Views – A set of stored queries. 37. Give few examples of Web Browser?
Mozilla Firefox, Google Chrome, Internet Explorer,
Opera
30. Write the difference between SQL and
MySQL. 38. What is URL?
• SQL - structured query language is not a Uniform Resource Locator, the address of a
database. specific Web page or file on the Internet.
• MySQL is open source software that allows
managing relational databases. 39. Is PHP a case sensitive language?
Yes, PHP is a case sensitive language.
31. What is Relationship? and List its types. 40. How to declare variables in PHP?
• One-to-One relationship The variable in PHP begins with a dollar ($)
• One-to-Many relationship symbol. Eg $a;
• Many-to-Many relationship
41. Define Client Server Architecture.
The server is a high performance hardware
32. State few advantages of Relational machine it could run more than one application
databases. concurrently. The client is a separate hardware
• High Availability machine which is connected with server in the
• High Performance network (Internet/intranet). It could send the
• Robust Transactions and support request and receive the response from the server
• Ease of management hardware. The Server and client are also called as
• Less cost service provider and service requester respectively.

33. What are the common usages of PHP? 42. Define Webserver.
PHP creates dynamic and interactive Webpages in A Web server is a Software that uses HTTP
the real time Web development projects. (Hypertext Transfer Protocol) to serve the files that
form Web pages to users

17
43. Define Function in PHP. 48. Define Array in PHP.
A block of segment in a program that performs a Array is a concept that stores more than one value
specific operation tasks. This segment is also of same data type (homogeneous) in single array
known as Function. A Function is a type of sub variable. They are 3 types of array concepts in
routine or procedure in a program. PHP.

44. Define User define Function. 49. Usage of Array in PHP.


User Defined Function (UDF) in PHP gives a One of the most useful aspects of using arrays in
privilege to user to write own specific operation PHP is when combined with the for each statement.
inside of existing program module. This allows you to quickly loop though an array with
function functionName() very little code.
{
Custom Logic code to be executed; 50. List out the types of array in PHP.
} They are 3 types of array concepts in PHP.
a. Indexed Arrays,
45. What is parameterized Function. b. Associative Array and
• Paramaterized functions are functions with c. Multi-Dimensional Array.
parameters.
• The parameter is also called as arguments, 51. Define associative array.
it is like variables. Associative arrays are a key-value pair data
• The arguments are mentioned after the structure. Instead of having storing data in a linear
function name and inside of the parenthesis. array, with associative arrays you can store your
• There is no limit for sending arguments, just data in a collection and assign it a unique key
separate them with a comma notation. which you may use for referencing your data.
Example : Example:
<?php $Marks=array(“Student1”=>“35”,“Student2”=>“17”,“
function Student3”=>“43”);
School_Name($sname,$Strength) {
echo $sname.”in Tamilnadu 52. Write array Syntax in PHP.
and Student Strength is”.$Strength; Array Syntax:
} ?> Array defines with the keyword array()
array(key=>value, key=>value, key=>value, etc.);
46. List out System defined Functions.
A function is already created by system it is a key = Specifies the key (numeric or string)
reusable piece or block of code that performs a value = Specifies the value
specific action. Functions can either return values
when called or can simply perform an operation
without returning any value. 53. Define Conditional Statements in PHP
Conditional statements are useful for writing
47. Write Syntax of the Function in PHP. decision making logics. It is most important feature
function FunctionName() of many programming languages, including PHP.
{
Statement; 54. Define if statement in PHP.
} If statement executes a statement or a group of
Example: statements if a specific condition is satisfied as per
function insertMsg() { the user expectation.
echo “Student Details Inserted Syntax:
Successfully!”; if (condition)
} {
insertMsg(); // call the function Execute statement(s) if condition is true;
}

18
55. What is if else statement in PHP? case label3:
If statement executes a statement or a group of code to be executed if
statements if a specific condition is satisfied by the n=label3;
user expectation. When the condition gets false break;
(fail) the else block is executed. ...
Syntax: default:
if (condition) code to be executed if n is
{ different from all labels;
Execute statement(s) if condition is true; }
}
else 61. Compare if and if else statement.
{ If If else
Execute statement(s) if condition is Does not execute any Executes else block
false; code when condition is when condition is
} false false

56. List out Conditional Statements in PHP. Example Example


• if Statement if (a>b) if (a>b)
• if...else Statement echo “a is greater” echo “a is greater”
• if...elseif....else Statement else
• switch Statement echo “b is greater”

57. Write Syntax of the If else statement in PHP. 62. Define Looping Structure in PHP.
Syntax: Looping Structures are useful for writing iteration
if (condition) logics. It is the most important feature of many
{ programming languages, including PHP. They are
Execute statement(s) if condition is true; implemented using the following categories.
} • for Loop
else • foreach Loop
{ • While Loop
Execute statement(s) if condition is false; • Do While Loop
}
63. Define for loop in PHP.
58. Define if...elseif....else Statement in PHP. For loop is an important functional looping system
If-elseif-else statement is a combination of if-else which is used for iteration logics when the
statement. More than one statement can execute programmer know in advance how many times the
the condition based on user needs. loop should run.
Syntax:
59. Usage of Switch Statement in PHP. for (init counter; test counter; increment counter)
• The switch statement is used to perform {
different actions based on different code to be executed;
conditions. }

60. Write Syntax of Switch statement. 64. What is foreach loop in PHP?
switch (n) foreach loop is exclusively available in PHP. It
{ works only with arrays. The loop iteration deepens
case label1: on each KEY Value pair in the Array. For each,
code to be executed if loop iteration the value of the current array element
n=label1; is assigned to $value variable and the array pointer
break; is shifted by one, until it reaches the end of the
case label2: array element.
code to be executed if
n=label2;
break;
19
65. List out Looping Structure in PHP. 71. Usage of for each loop in PHP
• for Loop The foreach construct provides an easy way to
• foreach Loop iterate over arrays. foreach works only on arrays
• While Loop and objects, and will issue an error when you try to
• Do While Loop use it on a variable with a different data type or an
uninitialized variable.
66. Write Syntax of for loop in PHP.
Syntax: 72. Define HTML form controls.
for (init counter; test counter; increment counter) In the web development, user access website or
{ web pages from remote client machine and feed
code to be executed; the data to server. These data are collected via
} HTML form controls like textbox, dropdown box and
radio button etc., and sent to server using server
67. Write Syntax of foreach loop in PHP. side programming like PHP.
Syntax:
for each ($array as $value) 73. Define for Form Handling method in PHP.
{ When the user keying the input data in HTML
code to be executed; controls and clicks the submit button the request
} will be generated and reaches a PHP file which is
mentioned in the FORM tag under the Action
68. Write Syntax of while loop in PHP. attribute. All input values are synchronized and sent
Syntax: to the server via POST method or GET method.
while (condition is true) Method is an attribute form tag in HTML.
{
code to be executed; 74. What is Form Validation in PHP?
} Validation is a process of checking the input data
submitted by the user from client machine. There
69. Write Syntax of Do while loop in PHP. are two types of validation available in PHP. They
Syntax: are Client-Side Validation and Server Side
do Validation
{
code to be executed; 75. List out HTML control to support PHP
} while (condition is true); language.
The following control types are available in HTML
70. Compare For loop and for each loop. form controlling:
for loop foreach loop • Text inputs
For loop is used to For each loop is used to • Buttons
execute a block of traverse through the • Checkbox
code repeatedly for a arrays and objects • Radio box
fixed number of times • File Select
Terminates when Terminates when • Form Tag
condition becomes reaches the end of an
false array or object 76. Write Syntax of Text box in HTML.
Example: Example: Username: <input type=”text” name=”name”
<?php <?php required>
for ($i = 0; $i<= 10; $a = array(2,4,6,8,10);
$i++) { foreach ($a as $value) 77. Define File handling in PHP.
echo “The number is: { File handling is an important activity of all web
$i<br>”; echo “$value <br>”; application development process. Files are
} } processed for different tasks using the following
?> ?> events:
• PHP Open a File,
• PHP Read a File,
• PHP Close a File,
20
• PHP Write a File, 84. What are the types MySQLi function
• PHP Appending a File and available PHP?
• PHP uploading a File. • Database Connections
• Managing Database Connections
78. Define Browse button in HTML. • Performing Queries
File upload is the best feature to select one file from • Closing Connection
the local machine to server machine. Form tag is
used to mention a method as POST or GET and 85. Difference between Connection and Close
encrypt attribute mentioned as “multipart/ form- function?
data”. In the <Input> tag mention type=”file” Connection function Close function
attribute shows the input field as a file-select Connection function Close function closes
control, with a “Browse” button next to the input establishes connection the established
control. to a database connection

79. Write Syntax of Browse button in HTML. 86. Give few examples of MySQLi Queries.
<input type=”file” name=”fileToUpload” “mysqli_query” is a function, helps to execute the
id=”fileToUpload”> SQL query statements in PHP scripting language.

80. Compare Text box and Text Area. Syntax:


Text Box Text Area mysqli_query(“Connection Object”,”SQL Query”)
Text Box is a single Text area is a multiple
line box line box Example:
Text boxes are Text area’s are $con=mysqli_connect(“localhost”,”my_user”,”my_p
generally used for generally used to assword”,”Student_DB “);
collecting information gather feedback or $sql=”SELECT student_name,student_age FROM
such as names, email comments student”;mysqli_query($con,$sql);
addresses It has a limit of 32700
characters. 87. What is Connection string?
Before accessing MySQL Database, connect to
81. Usage of File open function. Database Server machine via PHP scripting
fopen() is a system function available in PHP. This language using Mysqli_connect() Function.
function helps to open a file in the server. It
contains two parameters one for the file and the Syntax:
other one specifies in which mode the file should be mysqli_connect(“Server Name “,”User
opened (Read/Write). Name”,”Password”,”DB Name”);

82. What are the MySQLi function available 88. What is web Database?
PHP? A web database is a wide term for managing data
The functions which are related to MySQL online. A web database gives you the ability to build
database connectivity and management. your own databases.
• Mysqli_connect() Function
• Mysqli_close() Function 89. What is mysqli_fetch_assoc() Function?
• mysqli_select_db() Function mysqli_fetch_assoc();
• mysqli_affected_rows() Function Fetches a result row as an associative array.
• mysqli_connect_error() Function
• mysqli_fetch_assoc() Function Syntax :
mysqli_fetch_assoc(result);
83. What is MySQLi function?
In PHP Scripting language many functions are 90. Define mysqli_connect_error() Function.
available for MySQL Database connectivity and mysqli_connect_error();
executing SQL queries. MySQLi is extension in It returns the error description from the last
PHP scripting language which gives access to connection error.
the MYSQL database. Syntax:
mysqli_connect_error();
21
91. Define mysqli_affected_rows() Function. 98. What is the uses of mobile networks?
mysqi_affected_rows(); Communication over mobile network is be made up
mysqli_affected_rows() returns the number of voice, data, images and text messages.
of affted rows in the previous MYSQL
operation. 99. List out the benefits of WiFi
• It provides mobility.
Syntax: • It provides connection to Internet.
Mysqli_affected_rows(connection) • Flexibility of LAN.
• Ensures connectivity.
• It allows places that are remote to benefit
92. Define Computer Network. from connectivity.
A set of computers connected together for the • Low cost, high benefits.
purpose of sharing resources is called as computer
networks. 100. How many types of RFID system available
and what are they?
93. Define Internet. There are two types of RFID
Networks of network is called Internet. 1. Active RFID and
2. Passive RFID systems.
94. What are the common uses of computer
network? 101. Expand HTTP, HTTPS, FTP.
• Communication HTTP - Hypertext Transfer Protocol
• Resource sharing HTTPS - Hypertext Transfer Protocol Secure
• Data (or) software sharing FTP - File Transfer Protocol
• Money saving
102. List any four domain names.
95. List out some features of mobile network. • tn.gov.in
• Less consumption of power is used by • google.co.in
mobile devices comparing with a single • yahoo.com
transmitter or satellite often cell towers were • wikipedia.org
nearer.
• Huge capacity than a large transmitter, at 103. What is an IP address?
single frequency can be used for different or • Internet Protocol (IP) address is simply the
many links as long as they are in different in logical address in the network layer.
cells.
• Covering large area than a single 104. What are the types of IP address?
transmitter, we can add more towers • IPv4
indefinitely and cannot be limited by any • IPv6.
horizon limits.
105. What is an URL?
96. Difference between wired and wireless
• URL (Uniform Resource Locator) is the
networks.
address of a document on the Internet.
• A Wired network system connected with
• URL is made up four parts–protocols,
network cable.
hostname, folder name and file name.
• A Wireless network is connecting devices
like tablets(tab), indoor cameras and E- 106. List out four URLs you know.
readers, etc., without cables (WiFi).
• www.tn.gov.in/department
• www.tn.nic.in/tnhome/tngov.html
97. Define Intranet • https://en.wikipedia.org/wiki/Tamil
It is a private network within an enterprise to share • www.tnscert.org/tnscert/ebooks/
company data and computing resources between
the employees.

22
107. What are the types of URL? o The RJ45 connector has eight
• Absolute URL small pins inside to connect eight
• Relative URL small wires in the patch cable.
• RJ-11:
108. What is a domain?
o Mainly used in telephone and
• A domain is a single node of the Domain
Namespace. landlines.
o No. of pins: 6 pins
109. What is a zone? • RJ-14 and RJ-61:
• A zone is a subset of the Domain o RJ-14, used for telephone lines
namespace generally stored in a file. o No. of pins: 6 pins
• RJ-61
110. What is a resolver?
o No. of pins: 8 pins
• The resolver is a program which is
responsible for initiating the translation of a • RJ-21:
domain name into an IP address. o Total no. of pins 50 pins with 25
pins at one end and 25 pins at
111. What are the categories available in the other end.
domain name space? o It is also called as champ
• Root domain connector or Amphenol
• Top level domain
connector.
• Second level domain
• Sub domain
116. What is an Ethernet port?
112. Write any four generic Top Level Domain. • Ethernet port is an opening which is a part
• Com - Commercial Organisation of an Ethernet card.
• Edu - Educational Institutions • It accepts RJ45 connector with Ethernet
• Gov - Government (US) cable.
• org - Nonprofit Organization • It is also called as RJ45 jack.

113. Write a note on twisted pair cable. 117. What is the use of Crimping tool?
• It is type of cable with two or more insulated The crimping tool is a physical tool which is used to
wires twisted together. connect the patch wire and the Ethernet connector.
• The speed is 10 to 100 mbps.
• The twisted cable has 8 wires. 118. What are the types of twisted pair cables?
• There are two types of twisted pair cables, • Unshielded Twisted Pair (UTP)
o Unshielded Twisted Pair (UTP) and • Shielded Twisted pair (STP)
o Shielded Twisted pair (STP).
119. What is meant by champ connector?
114. What are the uses of USB cables? Champ connector mean the RJ-21 connector which
• The Universal Serial Bus is used to connect has 50 pins with 25 pins at one end and 25 pins at
keyboard, mouse and other peripheral the other end.
devices. 120. What is meant by network simulator?
• It is also used to connect the Internet A network simulator is a software program that
through the USB called dongles. replicates the functioning of a computer network.

115. Write a note on the types of RJ connectors. 121. What is trace file?
• RJ-45: A document file, consists of every incident happens
in a simulation.
23
economy that occurred roughly
122. Write short notes on NS2. between 1995 and 2000.
• NS2 is the abbreviation of NETWORK o It was also a period of extreme
SIMULATOR version 2. growth in the usage and
• It was considered explicitly for exploration in adaptation of the Internet as
network communication and event driven well.
open-source simulator in computer. • Dotcom Burst
o The Nasdaq-Composite stock
123. Explain NRCFOSS. market index, fell from 5046.86
National Resource Centre for Free and Open to 1114.11. This is infamously,
Source Software an Institution of Government of known as the Dotcom Crash or
India. To help in development of FOSS in India Dotcom Burst.
o This began on March 11, 2000
124. Write short note on Open NMS? and lasted until October 9, 2002.
Open NMS (Network Management System) is a o During the crash, thousands of
free and open-source initiative grade network online shopping companies
monitoring and network management platform. failed and shut down.

125. Define E-Commerce. 129. Write a short note on out-sourcing.


E-Commerce can be described as the process of If a company’s work is hired to another
buying or selling products, services or information company, it would be termed as out-sourcing.
via computer networks.
130. Define electronic payment system.
126. Distinguish between E-Business and E- An Electronic payment system is a financial
arrangement that consists an intermediator to
Commerce
facilitate transfer of money-substitute between a
e-Business e-Commerce payer and a receiver.
The e-Business entirely The e-Commerce is
depends on the Internet commercial transaction 131. List the types of micro electronic payments
for its every intra- through Internet based on its algorithm
company and inter- Based on the algorithm used, it is classified into the
company activities following categories.
The e-Business is The e-Commerce is • Hash chain based micro electronic payment
grounded on limited with monetary systems.
technologies transactions using • Hash collisions and hash sequences based
Internet micro electronic payment systems.
• Shared secrete keys based micro electronic
127. Differentiate tangible goods and electronic payment systems.
goods with example of your own. • Probability based micro electronic payment
Tangible goods Electronic goods systems.
They have physical They are not having
existence physical existence 132. Explain the concept of e-wallet
TV, Computer, Mobile Software such as • Electronic wallets (e-wallets) or electronic
phones, etc., Windows, MS-Office, purses allow users to make electronic
Photoshop, etc., transactions quickly and securely over the
Internet through smartphones or computers.
128. What is dotcom bubble and dotcom burst? • The electronic wallet functions almost the
• Dotcom Bubble same as a physical wallet in term that it
holds our money.
o The Dotcom Bubble was a
• Electronic wallets were first recognized as a
historic excessive growth of method for storing money in electronic form,
24
and became popular because it provides a c. Authentication protocols
convenient way for online shopping.
138. Write about digital signature.
133. What is a fork in cryptocurrency? • A digital signature is a mechanism that is
• Many cryptocurrencies operate on the basis used to verify that a particular digital
of the same source code, in which the document, message or transaction is
authors make only a few minor changes in authentic.
parameters like time, date, distribution of
blocks, number of coins, etc. These 139. Define EDI.
currencies are called as fork. • The Electronic Data Interchange (EDI) is the
exchange of business documents between
134. Write about information leakage in E- one trade partner and another electronically.
Commerce. • It is transferred through a dedicated channel
• The leakage of trade secrets in E- or through the Internet in a predefined
Commerce mainly includes two aspects: format without much human intervention.
a. the content of the transaction
between the vendor and customer 140. List few types of business documents that
is stolen by the third party; are transmitted through EDI.
b. the documents provided by the • delivery notes
merchant to the customer or vice • invoices
versa are illegally used by the • purchase orders
another. • advance ship notice
• This intercepting and stealing of online • functional acknowledgements
documents is called information leakage.
141. What are the 4 major components of EDI?
135. Write a short note on typopiracy. • There are four major components of EDI.
• Typopiracy is a variant of Cyber Squatting. They are
• Some fake websites try to take advantage a) Standard document format
of users’ common typographical errors in b) Translator and Mapper
typing a website address and direct users to c) Communication software
a different website. d) Communication network
• Such people try to take advantage of some
popular websites to generate accidental 142. What is meant by directories in EDIFACT?
traffic for their websites. e.g. • The versions of EDIFACT are also called as
www.goggle.com, www.faceblook.com directories.
• These EDIFACT directories is mainly
136. Define non-repudiation. divided into the following aspects:
• Non-repudiation: prevention against o basic standards
violation agreement after the deal. o code standards
• Non-repudiation ensures that the signer o message standards
who digitally signed the document cannot o document standards
deny having signed it. The digitally signed o management standards
documents strengthen its recipient integrity o application standards
claims. o communication standards and
• Therefore, the recipient can strongly insist o security standards.
on the signature of the sender so as not to
be easily denied at a later time. 143. Write a note on EDIFACT subsets.
Due to the complexity, branch-specific subsets of
137. List the different types of security EDIFACT have developed.
technologies in E-Commerce These subsets of EDIFACT include only the
• The security technologies in E-Commerce functions relevant to specific user groups.
transactions are roughly classified into Example:
a. Encryption technology • CEFIC - Chemical industry
b. Authentication technology • EDIFURN - furniture industry
25
PART - III

ANSWER TO ALL THE QUESTIONS:

1. Briefly explain about Multimedia Components o BMP (Bitmap)


Multimedia Components: o DIB (Device Independent Bitmap)
i. Text, o GIF (Graphics Interchange Format)
ii. Images, o JPEG (Joint Photographic Experts
iii. Sound, Group)
iv. Video and o TGA (Tagra)
v. Animation. o PNG (Portable Network Graphics)

(i) TEXT: (iii) SOUND:


• Text is the basic components of multimedia • Sound is a meaningful speech in any
and most common ways of communicating language and is the most serious element in
information to other person. multimedia, providing the pleasure of music,
• Text is the basic components used in special effects and so on.
multimedia. • Decibel is the measurement of volume, the
pressure level of sound.
Static Text:
o The text or the words will remain List of sound (audio) file formats:
static as a heading or in a line, or in o WAV (Waveform Audio File Format)
a paragraph. o MP3 (MPEG Layer-3 Format)
o OGG
Hypertext: o AIFF (Audio Interchange File
o A hypertext is a system which Format)
consists of nodes, the text and the o WMA (Windows Media Audio)
links between the nodes, which o RA (Real Audio Format)
defines the paths the user; need to
follow for the text access in non- (iv) VIDEO:
sequential ways. • Video is defined as the display of recorded
event, scene etc.
(ii) IMAGE: • The video can be categorized in two types
• Images acts as a vital component in as Analog video and Digital video.
multimedia.
• These images are generated by the List of video file formats
computer in two ways, as bitmap or raster o AVI (Audio/Video Interleave)
images and as vector images. o MPEG (Moving Picture Experts
Group)
Raster or Bitmap Images:
o The common and comprehensive (v) ANIMATION:
form of storing images in a computer • Animation is the process displaying still
is raster or bitmap image. images so quickly so that they give the
impression of continuous movement.
Vector Images: • The two basic types of animations are Path
o Drawing elements or objects such as animation and Frame animation.
lines, rectangles, circles and so on
to create images are based on Path animation:
Vector images. • Path animation involves moving an object
on a screen that has a constant background
List of image file formats
o TIFF (Tagged Image File Format) Frame animation:
26
• In frame animations, multiple objects are The script writer visualizes the concepts in three
allowed to travel simultaneously and the dimensional environments and if needed uses the
background or the objects also changes. virtual reality integration into the program.

2. Describe the features and techniques of 4. Text Editor


animation The content of a multimedia production always
Animation: must flow logically and the text should always be
• Animation is the process displaying still structured and correct grammatically.
images so quickly so that they give the
impression of continuous movement. 5. Multimedia Architect
• The two basic types of animations are Path The multimedia architect integrates all the
animation and Frame animation. multimedia building blocks like graphics, text,
• Animations may be in two or three audio, music, video, photos and animation by using
dimensional. an authoring software.
• The two dimensional animation, bring an
image alive, that occur on the flat X and Y 6. Computer Graphic Artist
axis of the screen. The role of Computer Graphic Artist is to deal with
• The three dimensional animation it occurs the graphic elements of the programs like
along the three axis X, Y and Z. backgrounds, bullets, buttons, pictures editing, 3-D
objects, animation, and logos etc.
Path animation:
• Path animation involves moving an object 7. Audio and Video Specialist
on a screen that has a constant background The roles of audio and video specialists are needed
for dealing with narration and digitized videos to be
Frame animation: added in a multimedia presentation. They are
responsible for recording, editing sound effects and
• In frame animations, multiple objects are
digitizing.
allowed to travel simultaneously and the
background or the objects also changes.
8. Computer Programmer
The computer programmer writes the lines of code
or scripts in the appropriate language.
3. Write roles and responsibilities of Production
team members
9. Web Master
Multimedia Production Team:
The responsibility of the web master is to create
1. Production Manager
and maintain an Internet web page. They convert a
2. Content Specialist
multimedia presentation into a web page.
3. Script Writer
4. Text Editor
4. Describe the various file formats in
5. Multimedia Architect
multimedia
6. Computer Graphic Artist
(1) Text Formats:
7. Audio and Video Specialist
RTF - Rich Text Format
8. Computer Programmer
9. Web Master • It is the primary file format introduced in
1987 by Microsoft with the specification of
1. Production Manager their published products and for cross-
The role of production manager is to define, and platform documents interchange.
coordinate, the production of the multimedia project
in time and with full quality. Plain text
• Plain text files can be opened, read, and
2. Content Specialist edited with most text editors. The commonly
Content specialist is responsible for performing all used are Notepad (Windows), Gedit or nano
research activities concerned with the proposed (Unix, Linux), TextEdit (Mac OS X) and so
application’s content. on.

3. Script Writer (2) Image Formats


27
TIFF (Tagged Image File Format) OGG
• This format is common in desktop • A free, open source container format that is
publishing world (high quality output), and is designed for obtaining better streaming and
supported by almost all software packages. evolving at high end quality digital
multimedia.
BMP (Bitmap)
• Initially this format is in use with Windows AIFF (Audio Interchange File Format)
3.1. It is quite large and uncompressed and • A standard audio file format used by Apple
hence BMP is used for the high-resolution which is like a WAV file for the Mac.
or large images.
WMA (Windows Media Audio)
DIB (Device Independent Bitmap) • It is a popular windows media audio format
• This format which is similar to BMP, allows owned by Microsoft and designed with
the files to be displayed on a variety of Digital Right Management (DRM) abilities
devices. for copyright protection.

RA (Real Audio Format)


GIF (Graphics Interchange Format) • Real Audio format is designed for streaming
• GIF is a compressed image format. Most of audio over the Internet.
the computer color images and
backgrounds are GIF files. (4) Digital Video File Formats:
AVI (Audio/Video Interleave)
JPEG (Joint Photographic Experts Group) • AVI is the video file format for Windows.
• JPEG was designed to attain maximum • Here sound and picture elements are stored
image compression. in alternate interleaved chunks in the file.
• It works good with photographs, naturalistic
artwork, and similar material but functions MPEG (Moving Picture Experts Group)
less on lettering, live drawings or simple • MPEG is a standard for generating digital
cartoons. video and audio compression under the
International Standards Organization (ISO)
TGA (Tagra) by the group of people.
• It is the first popular format for high
resolution images. 5. Explain animation industry and their scope
The animation industry in India is growing faster.
PNG (Portable Network Graphics) As of 2015, the animation industry has mature in
• An extensible file format for the less loss, India and has moved on from being just an
portable and well compressed storage of outsourcing facility to a creator of indigenous
raster images. intellectual property as well. There are more than
• PNG acts as replacement for GIF and also 300 animation studios in India as of 2015, which
replaces multiple common uses of TIFF. are estimated to have employed more than 15,000
animation professionals.
(3) Digital Audio File Formats The scope of animation industry lie in the areas like
WAV (Waveform Audio File Format) • Advertising
• It is the most popular audio file format in • Online and Print News Media
windows for storing uncompressed sound • Film & Television
files. • Cartoon production
• In order to attain the reduced file size it can • Theater
also be converted to other file formats like • Video Gaming E-learning
MP3. • E-learning

MP3 (MPEG Layer-3 Format)


• MPEG Layer-3 format is the most popular
format for storing and downloading music.

28
6. What is PageMaker? Explain its uses. • Then place the cursor on the bottom handle
• Adobe PageMaker is page layout software. of the first text block, and click and drag the
• It is used to design and produce documents bottom handle down if necessary.
that can be printed.
• We can create anything from a simple 10. How do you link frames containing text?
business card to a large book. • Draw a second frame with the Frame tool of
• Using PageMaker, we could create a your choice.
newsletter that includes articles and pictures • Click the first frame to select it.
on each page. • Click on the red triangle to load the text
• We can place pictures and text next to each icon.
other, on top of each other, or beside each • Click the second frame. PageMaker flows
other—wherever you want them to go. the text into the second frame.

7. Mention three tools in PageMaker and write 11. What is the use of Master Page?
their keyboard shortcuts. • Any text or object that you place on the
Keyboard master page will appear on the entire
S. No Tool
shortcut document pages to which the master is
1 Pointer Tool F9 applied.
• It shortens the amount of time because you
2 Rotating Tool Shift + F2
don’t have to create the same objects
3 Line Tool Shift + F3 repeatedly on subsequent pages.

12. How to you insert page numbers in Master


8. Write the use of any three tools in PageMaker pages?
along with symbols. • Click on Master Pages icon.
(1) Pointer Tool • Then click on Text Tool. Now the cursor
changes to I - beam.
• Then Click on the left Master page where
you want to put the page number.
• Used to select, move, and resize text • Press Ctrl + Alt + P.
objects and graphics. • The page number displays as ‘LM’ on the
left master page.
(2) Line tool
• Similarly click on the right Master page
where you want to put the page number.
• Press Ctrl + Alt + P.
• Used to draw straight lines in any direction. The page number displays as ‘RM’ on the right
master page, but will appear correctly on the actual
(3) Rectangle tool pages.

13. Explain on Evolution of DBMS.


• In earlier days punched card technology
• Used to draw squares and rectangles.
were used to store the data.
• The file systems which were known as
9. How do you rejoin split blocks? predecessor of database system.
• Place the cursor on the bottom handle of • Indexed, random and sequential access are
the second text block, click and drag the various access methods in file system.
bottom handle up to the top.
29
• Database systems became popular to • Various access methods in file system were
overcome the above limitations of file indexed, random and sequential access.
system. • The file system had more limitations like
o Data Duplication – Same data is
14. What is relationship in databases? List its
types. used by multiple resources for
• In ER Model, relationship exists between processing, thus created multiple
two entities. copies of same data wasting the
• Each instance of the relationship between spaces.
members of these entity types is called a o High Maintenance – Access control
relationship instance. and verifying data consistency
• Three types of relationships are available needs high maintenance cost.
1. One-to-One relationship
o Security – less security provided to
2. One-to-Many relationship
3. Many-to-Many relationship the data.
• So database systems became popular to
15. Discuss on Cardinality in DBMS. overcome the above limitations of file
• Cardinality is defined as the number of system.
items that must be included in a
relationship. 19. What is relationship in databases? List its
• Number of entities in one set mapped with
types.
the number of entities of another set via the
relationship. • Relationship exists between two entities.
• Three classifications in Cardinality are one- • Three types of relationships are available,
to-one, one-to-many and Many-to-Many. o One-to-One relationship
o One-to-Many relationship
16. List any 5 privileges available in MySQL for o Many-to-Many relationship
the User.
1. Select_priv .
2. Insert_priv • One-to-One relationship: Consider two
3. Update_priv entities A and B. one-to-one (1:1)
4. Delete_priv relationship is said to exist in a relational
5. Create_priv database design, if 0 or 1 instance of entity
6. Alter_priv A is associated with 0 or 1 instance of entity
B, and 0 or 1 instance of entity B is
17. Write few commands used by DBA to
control the entire database. associated with 0 or 1 instance of entity A.
• USE Database
• SHOW Databases • One-to-Many relationship: Consider two
• SHOW Tables entities A and B. one-to-many (1:N)
• SHOW COLUMNS FROM tablename relationship is said to exist in a relational
• SHOW INDEX FROM tablename database design, for 1 instance of entity A
• SHOW TABLE STATUS LIKE tablename there exists 0 or 1 or many instances of
entity B, but for 1 instance of entity B there
18. Explain on Evolution of DBMS. exists 0 or 1 instance of entity A.
• The concept of storing the data started
before 40 years in various formats. • Many-to-Many relationship: Consider two
• In earlier days they have used punched entities A and B. many-to-many (M:N)
card technology to store the data. Then files relationship is said to exist in a relational
were used. database design, for 1 instance of entity A
• The file systems were known as there exists 0 or 1 or many instances of
predecessor of database system.
30
entity B, and for 1 instance of entity B there Syntax:
exists 0 or 1 or many instance of entity A. mysql > show databases;

20. Discuss on Cardinality in DBMS. 3. SHOW Tables – Lists all the tables
• It is defined as the number of items that available in the current database we are
must be included in a relationship. ie) working in.
number of entities in one set mapped with Syntax:
the number of entities of another set via the mysql > show tables;
relationship.
• Three classifications in Cardinality are one- 4. SHOW COLUMNS FROM tablename –
to-one, one-to-many
many and Many-to-Many.
Many Lists all the attributes, attribute type, Is Null
value permitted, key information, default
value and other information
informa for the given
table.
Syntax:
• In the above example we have two entities mysql > show columns from sports;
Person and Vehicle. If we consider the
current vehicle, the driver is operating, then 5. SHOW INDEX FROM tablename – The
we have one-to-one
one relationship between query shows all the indexes for the given
Person and Vehicle. table.
Syntax:
21. List any 5 privileges
ges available in MySQL for mysql > show indexes from sports;
the User.
Action Performed (If 23. Write the features of server side scripting
SN Privileges language.
Granted)
User can select rows Web scripting languages are classified into two
1 Select_priv types, client side and server side scripting
from database tables.
User can insert rows language. PHP is completely different from Client
2 Insert_priv side scripting language like Java script. The PHP
into database tables.
User can update rows of code entirely executes on Webserver which is
3 Update_priv installed in the remote
emote machine and it is generating
database tables.
User can delete rows of HTML code which is sent to the user. The user
4 Delete_priv receives the HTML code and sees the Website
database tables.
contents via Internet browser in their computer or
User can create new
5 Create_priv laptop.
tables in database.
User can make changes
24. Write is the purpose of Web servers?
6 Alter_priv to the database
Purpose of Web server is to compile and interpret
structure.
the PHP code which is available in remote
machine.
22.. Write few commands used by DBA to
control the entire database. 25. Differentiate Server side and Client Side
1. USE Database – This command is used Scripting language.
to select the database in MySQL for Server side scripting Client side scripting
working. language language
Syntax: Server side scripting Client side scripting
language executes on language executes on
mysql > use test;
Webserver which is client machine itself
installed in the remote
2. SHOW Databases – Lists all the machine and it is
databases available in the database server. generating HTML code
31
which is sent to the The var_dump() system define function, returns
user. structured information (type and value) about
Eg. PHP, Miscrosoft Eg. HTML, CSS, Java variables in PHP.
ASP (Active Server Script
Page), JSP (Java 29. Write the purpose of parameterized
Server Page) Function.
Required information can be shared between
26. In how many ways you can embed PHP function declaration and function calling part inside
code in an HTML page? the program.
3 ways to embed PHP code in a HTML page. Example :
They are as follows <?php
Default Syntax function
The default Syntax begins with “<?php” and School_Name($sname,$Strength) {
closes with “?>”. echo $sname.”in Tamilnadu
Eg. and Student Strength is”.$Strength;
<? php echo “Hello world...” ; ?> } ?>

Short open Tags 30. Differentiate user define and system define
The Short open Tags begins with “<?” and closes Functions.
with “?>”. User defined System defined function
Eg. function
<? echo “Hello world...” ; ?> Performs users Performs operation
own specific predefined in the PHP
HTML Script embed Tags operation
HTML Script embed Tags looks just like HTML Code will be written Code already present in the
scripts tags. by the user PHP
Eg. Name of the All functions of this type are
<script language =”php”> function will be already named
echo “This is HTML script tgs”; defined by the user
</script>
31. Write Short notes on Array.
27. Write short notes on PHP operator. Array is a concept that stores more than one value
Operator is a symbol which is used to perform of same data type (homogeneous) in single array
mathematical and logical perations in the variable. They are 3 types of array concepts in
programing languages. Different types of operator PHP.
in PHP are: a. Indexed Arrays,
1. Arithmetic operators, b. Associative Array and
2. Assignment operators, c. Multi-Dimensional Array
3. Comparison operators, Array Syntax:
4. Increment/Decrement operators, Array defines with the keyword array()
5. Logical operators, and array(key=>value, key=>value, key=>value, etc.);
6. String operators. key = Specifies the key (numeric or string)
value = Specifies the value

28. Write the features System define Functions. Example:


A function is already created by system it is a $teacher_name=array(“Iniyan”, “Kavin”, “Nilani”);
reusable piece or block of code that performs a
specific action. Functions can either return values 32. Differentiate Associate array and
when called or can simply perform an operation Multidimensional array.
without returning any value. Associative array Multidimensional array
Example: Associative array will A multi-dimensional array
var_dump($x); have their index as each element in the main
string so that you can array can also be an
establish a strong array. And each element
32
association between in the sub-array can be an switch ($favcolor) { else
key and values array, and so on case “red”: echo “b is greater”;
Values in the Values in the multi- echo “Your favorite color
associate array are dimensional array are is red!”;
accessed using keys accessed using multiple break;
indices case “blue”:
Associative arrays can Multidimensional array echo “Your favorite color
be viewed as two have sub-array depth of is blue!”;
column table more than 5 also break;
case “green”:
33. Write the features Conditional Statements in echo “Your favorite color
PHP. is green!”;
• The if statement contains boolean break;
expression inside brackets followed by a default:
single or multi line code block. echo “Your favorite color
• if-else Statement also provides for a second is neither red, blue, nor
part to the if statement, that is else. The green!”;
else statement must follow if or else if }
statement. ?>
• else if Statement The ‘if ’ statement can also
follow an ‘else’ statement, if you want to
check for another condition in the else part. 36. Write Short notes on Switch statement.
• The switch statement is used to perform
34. Write is the purpose of if elseif else stament. different actions based on different
• If-elseif-else statement is a combination of conditions.
if-else statement. More than one statement Syntax:
can execute the condition based on user switch (n) {
needs. case label1:
if (1stcondition) code to be executed if n=label1;
{ break;
Execute statement(s) if condition is true; case label2:
} code to be executed if n=label2;
elseif(2ndcondition) break;
{ case label3:
Execute statement(s) if 2ndcondition is true; code to be executed if n=label3;
} break;
else ...
{ default:
Execute statement(s) if both code to be executed if n is different
conditionsarefalse; from all labels;
} }

35. Differentiate Switch and if else statement. 37. Differentiate if statement and if elseif else
Switch If else statement.
More compact than Difficult to manage if statement if elseif else statement
many if…else if….else chains If statement consist only If else if else consist two
Only accepts constants Accepts Boolean one condition conditions
as cases expression If given condition is One of the three given
Switch is executed Chain of if statements false if statement by code blocks is selected
faster are executed slower passes the given code and executed
than switch Only one code block is Three block of code can
Example: Example given be given as an
<?php if (a>b) alternatives to each
$favcolor = “red”; echo “a is greater”; other base on conditions
33
Example Example checking the condition whether true or false. It
if (a>b) if (a>b) executes the loop, if the specified condition is true.
echo “a is greater”; echo “a is greater”; Syntax:
elseif (b>c) do {
echo “b is greater”; code to be executed;
else } while (condition is true);
echo “c is greater”;
42. Differentiate While and Do while loops.
While Do While loop
38. Write the features Looping Structure. Condition is checked at Condition is checked
In programming it is often necessary to repeat the the beginning at the end
same block of code a given number of times, or If condition becomes Given block of code
until a certain condition is met. This can be false at first time, the is executed once
accomplished using looping statements. Looping loop terminates even when the
Structures are useful for writing iteration logics. It is condition becomes
the most important feature of many programming false at first time.
languages, including PHP. They are implemented Example: Example:
using the following categories. <?php <?php
o for Loop $num=1; $num=1;
o foreach Loop while($num<= 10) { do {
o While Loop echo “The student echo “The student
o Do While Loop number is:$num<br>”; number
$num++; is:$num<br>”;
39. Write the purpose of Looping Structure in } $num++;
PHP ?> } while($num<= 10);
In programming it is often necessary to repeat the ?>
same block of code a given number of times, or
until a certain condition is met. This can be 43. Write the features Form Handling.
accomplished using looping statements • Main objectives of PHP and HTML form
handling is to collect data from users of
40. Differentiate For each and While loop. remote client machines
For each loop While loop • A request can be generated once the user
For each loop is used to While loop is used to inputs data in html controls and clicks the
traverse through the repeat a block of submit button.
arrays and objects code until a condition • All input values can be synchronized and
becomes false sent to the server via post method or get
Terminates when Terminates when the method
reaches the end of an condition becomes • A response can be given according to the
array or object false data collected by $_POST and $_GET
Example: Example:
<?php <?php 44. Write the purpose Get method and Post
$a = array(2,4,6,8,10); $num=1; method.
foreach ($a as $value) { while($num<= 10) { Post Method: The input data sent to the server
echo “$value <br>”; echo “The student with POST method is stored in the request body of
} number the client’s HTTP request.
?> is:$num<br>”;
$num++; Get Method: The input data sent to the server with
} POST method via URL address is known as query
?> string. All input data are visible by user after they
clicks the submit button.
41. Write short notes on Do while Loop.
Do whileloop always run the statement inside of the 45. Differentiate Get and Post Method.
loop block at the first time execution. Then it is Get Method Post Method
It is used to send data It send through clients
34
through URL address HTTP request
All the input data are It is not visible 48. Write the Syntax for MySQLi Queries.
visible “mysqli_query” is a function, helps to execute the
It is faster It is little slow SQL query statements in PHP scripting language.
It is less secure It is secured Syntax:
mysqli_query(“Connection Object”,”SQL Query”)
46. Write short notes on File handling.
File handling is an important activity of all web Example:
application development process. Files are $con=mysqli_connect(“localhost”,”my_user”,”my_p
processed for different tasks using the following assword”,”Student_DB “);
events: $sql=”SELECT student_name,student_age FROM
• PHP Open a File – The fopen () unction student”;mysqli_query($con,$sql);
helps to open a file in the server.
• PHP Read a File - The fread() function 49. Write is the purpose of MySQLi function
reads from an open file. available.
• PHP Close a File - The fclose() function is In PHP Scripting language many functions are
used to close an opened file. available for MySQL Database connectivity and
• PHP Write a File - The fwrite() function is executing SQL queries. MySQLi is extension in
PHP scripting language which gives access to the
used to write to a file.
MYSQL database. MySQLi extension was
• PHP Appending a File - The
introduced version 5.0.0.
file_put_contents() function is used to
The MySQLi extension contains the following
Append to a file.
important functions which are related to
• PHP uploading a File - File upload is the
MySQL database connectivity and management.
best feature to select one file from the local
• Mysqli_connect() Function
machine to server machine.
• Mysqli_close() Function
47. Write short notes on File handling Functions • mysqli_select_db() Function
• PHP Open a File – The fopen () unction • mysqli_affected_rows() Function
helps to open a file in the server. • mysqli_connect_error() Function
$myfile = fopen(“new_school_file. • mysqli_fetch_assoc() Function
txt”, “w”)
• PHP Read a File - The fread() function 50. Differentiate mysqli_affected_rows()
reads from an open file. Function and mysqli_fetch_assoc() Function.
fread($myfile,filesize(“Student.txt”)); mysqli_affected_ro mysqli_fetch_assoc()
• PHP Close a File - The fclose() function is ws()
used to close an opened file. Returns the number Fetches a result row as
fclose($myfile); of affected rows in an associative array
• PHP Write a File - The fwrite() function is the previous
used to write to a file. SELECT, INSERT,
fwrite($myfile, $txt); UPDATE, REPLACE
• PHP Appending a File - The or DELETE query
file_put_contents() function is used to The result of the The result of the
Append to a file. function depends function depends upon
$myfile = file_put_contents(‘logs.txt’, upon the previos the current status
$txt. PHP_EOL , FILE_APPEND | command
LOCK_EX); Example: Example:
• PHP uploading a File - File upload is the mysqli_affected_rows $sql = “select * from
best feature to select one file from the local ($connection); person”;
machine to server machine. $result=mysqli_query($
connetion,$sql);
• <input type=”file” name=”fileToUpload”
$row=mysqli_fetch_ass
id=”fileToUpload”>
oc($result);

35
51. Write MySQL Connection Syntax with
example. 54. What is the usage of cloud storage and
Syntax: cloud computing?
mysqli_connect(“Server Name “,”User • Cloud Storage Just a storage of data on
Name”,”Password”,”DB Name”); online, access in different area no
geographical limits was in need
Example: • Cloud Computing It is based on Internet
<?php computing, to share resources, software
$servername = “localhost”; and information.
$username = “username”;
$password = “password”; 55. What is meant by artificial Intelligence?
$DB_name = “School_DB”; Artificial intelligence able to be a better predict
$conn = mysqli_connect($servername, traffic as it collects and analyzes data in real time,
$username, $password,$DB_name); some of network managers were better prepared
if (!$conn) for big events such as the World cup, Olympics,
{ die(“Connection failed: “ . Valentine’s Day, which often put on the Internet
mysqli_connect_error()); } under pressure
echo “Connected successfully”;
?> 56. List out some usefulness of social
networks.
52. Write a note PHP MySQL database • Group information sharing over long
connection. distances.
Before accessing MySQL Database, connect to • Broadcast announcements.
Database Server machine via PHP scripting • Fostering diversity of thought.
language using Mysqli_connect() Function.
57. How computer networks saves the money
Syntax: saving?
mysqli_connect(“Server Name “,”User Using the computer networking, it’s important
Name”,”Password”,”DB Name”); financial aspect for organization because it saves
money.
This function requires four parameters to connect to It reduces the paper work, man power and save the
database server. Database Server name, Database time.
username, password and Database Name.
58. Compare Internet, Intranet and Extranet
The below code snippet describes managing Type Definition Example
database connection methods and features.
Internet a global network, public Sending
<?php
TCP/IP network used email to a
$servername = “localhost”;
by over a billion people friend
$username = “username”;
all over the world
$password = “password”;
Intranet a TCP/IP network with Accessing
$DB_name = “School_DB”;
access restricted to your record
$conn = mysqli_connect($servername,
members of an in the
$username, $password,$DB_name);
organization employee
if (!$conn)
personnel file
{ die(“Connection failed: “ .
Extranet TCP/IP network with Checking
mysqli_connect_error()); }
restricted access to availability of
echo “Connected successfully”;
members inventory
?>
from an
53. Define ARPANET.
outside
ARPANET at 1969-1970 was which underpinned
supplier
the development of it and his theoretical work on
hierarchical routing in late 1970 s with his student
Farouk Kamoun remains critical to the operation of
the Internet today.

36
59. List out the components of a RFID enabled • But it is easy to use domain names to refer
system. them rather than the long numbers (IP
• A RFID tag: address). To enable the use of domain
It has silicon microchip attached to a names in a network, the Domain Name
small antenna and mounted on a substrate. System (DNS) is used.
• A reader: • Domain names to IP address mapping must
It has a scanner with antennas to be consistent across the network to ensure
transmit and receive signals, used for interoperability.
communication. • DNS provides the domain name to IP
• A Controller: address mapping through Name servers.
It is the host computer with a
Microprocessor which receives the reader 64. Differentiate IPv4 and IPv6.
input and process the data. IPv4 IPv6
32-bit unique address 128-bit unique address
60. Write short notes on HTTP, HTTPS, FTP.
• HTTP – It is used between a web client and The number of The number of
a web server and it guarantees non-secure addresses that can be addresses that can be
data transmissions. formed in IPv4 is 232. formed in IPv6 is 2128.
• HTTPS – It is used between a web client Address is expressed Address is expressed in
and a web server ensures secure data in 32 bits binary or 128 bits divided into
transmissions. decimal separated by eight 16 bits blocks.
• FTP – It is used between computers for dot.
sending and receiving file. Represented in binary Represented in
Hexadecimal
61. What are the layers available in TCP/IP
Reference Model? 65. Differentiate Domain name and URL
• Network Access Layer Domain URL
Concerned with building packets. Domain name is the URL is a full web
• Internet Layer translated and simpler address used to
Describes how packets are to be form of a computers IP locate a webpage.
delivered. address (Logical
• Transport Layer address).
Ensure the proper transmission of Part of URL defines an Complete web
data. entity. address containing
• Application Layer domain name also.
Application network processes. Based on sub domains Method, host name
These processes include File Transfer (top level, intermediate (domain name), port
Protocol (FTP), Hypertext Transfer Protocol level, low level) and path.
(HTTP), and Simple Mail Transfer Protocol https://en.wikipedia.org/wi www.wikipedia.org
(SMTP). ki/Tamils.htm
62. Expand ARP, ICMP, SMTP and DNS.
• ARP - Address Resolution Protocol 66. What are the differences between Absolute
• ICMP - Internet Control Message Protocol URL and Relative URL?
• SMTP - Simple Mail Transfer Protocol Absolute URL Relative URL
• DNS - Domain Name System Absolute URL is the Relative URL is the
complete address of a partial address of a
63. Write a note on DNS. document on the document on the
• Domain Name System (DNS) maintains all Internet. Internet.
the directory of domain names/host names Absolute URL contains Relative URL contains
and help us to access the websites using all the information that is only file name or file
the domain/host names. required to find the files name with folder name.
• Internet is based on IP addresses, not on the Internet.
domain names.

37
67. Write a note on domain name. Serial port Parallel ports
• Domain name is the sequence of labels.
• In domain name the sequence of labels are Used to connect the Used to connect the
separated by dot (.). Internet Internet
• The domain name is always read from the Used for PC to PC Used for PC to PC
lower level to higher level i.e., from the leaf networking networking
node to root node. Sends 1 bit of data at Sends 8 bits of data at
• Since the root node always represent one time one time
NULL string, all the domain name
ending with dot. 71. What is meant by null modem cable?
• A cable interconnecting two devices directly
68. Write a note on crossover cables. is known as a null modem cable.
• Cross over cable is used to join two network • It is used for interconnecting two computers
devices of the same type. without modem.
• The Null modem Cables are the example of • Rollover cable is a type of null-modem cable
the crossover cables. that is often used to connect a device
• The Ethernet crossover cable is identical on console port to make programming changes
both the ends. to the device.
• Nowadays Routers are being connected
through the crossover cables to provide 72. What are the components involved in
wireless network from the local network. Ethernet cabling?
• If you require a cable to connect two • Patch Cable (Twisted pair)
computers or Ethernet devices directly o These Cables are generally made
together without a hub, then you will need to up of 8 wires in different colors.
use a Crossover cable instead. • RJ45 Connector
• The easiest way to make a crossover cable o The RJ45 connector is a small
is to make one end to T568A colour coding plastic cup which will be used to
and the other end to T568B. connect the wire inside the
connector and ready to connect the
69. Write a short note on RJ45 connector. Internet.
• In RJ45 the “RJ” stands for the Registered • Ethernet Ports
Jack and the “45” simply refers to the o Ethernet port is an opening which is
number of interface standard in the cable. a part of an Ethernet card.
• The RJ45 Ethernet connector is a small • Crimping Tool
plastic cup which will be used to connect the o The crimping tool is a physical tool
wire inside the connector and ready to use which is used to connect the patch
to connect the Internet. wire and the Ethernet connector.
• The RJ45 connector has eight small pins
inside to connect eight small wires in the 73. What are the types of Fiber optic cables?
patch cable. The eight cables has eight • Single-mode (100BaseBx)
different colours o Single-mode cables are used for
• The Ethernet cables are sometime called as long distance transmission and at a
RJ45 cables. high cost

• Multimode (100BaseSX)
70. What are the differences between serial and o Multimode cables are used for short
parallel ports? distance transmission at a very low
cost.
38
74. What are the uses of Open source Network 2. Data Gathering by using SNMP and JMX.
Software? 3. Event management and notifications, which
In a network it is not easy to find problems. comprises of alarm reduction and a robust
Especially when there are more systems are announcement system with accelerations
connected, the complexity is more, so we need and duty schedules.
Network Software to Control , Analysis the Server,
System, protocol, Network, Traffic flow and reports 79. Explain the types of organisations related to
about ups and downs of network parts. Open Source.
• Apache Software Foundation
75. Explain free software. • The Document Foundation
Free software is software that can be freely used, • The Eclipse Foundation
modified, and redistributed with only one restriction: • Free Software Foundation
any redistributed version of the software must be • Linux Foundation
distributed with the original terms of free use, • Opencourseware Consortium
modification, and distribution. • Open Source Initiative
The definition of free software is stipulated as part
of the GNU Project and by the Free Software
Foundation. 80. Describe how E-Commerce is related to
socio-technological changes.
76. List out the Popular open source software. • Growth of E-Commerce is also related to
• Mozilla Firefox the socio-technological changes.
• LibreOffice • The more, the medium becomes deep
• Linux bases operating systems rooted, the more, are the users drawn
• Android towards it. Increase of users, increases the
• GIMP markets. As the markets expand, more
• Brave business organizations are attracted.
• Chromium • The more businesses accumulate it create
competition.
77. Write note on open source hardware. • The competition leads to innovation;
Open source hardware technology helps in such innovation in turn drives the development of
threats. In this technique we get the components of technology; technology facilitates E-
the hardware and its circuit diagram, so that we can Commerce’s growth.
remove suspicious spyware if found.
Open Source Hardware 81. Write a short note on the third wave of E-
o Remix Commerce.
o Remake The Third Wave of Electronic Commerce: 2010 –
o Remanufacture Present
o Redistribute The third wave is brought on by the mobile
o Resell technologies.
o Study and Learn It connects users via mobile devices for real-time
and on-demand transactions. Not only the
78. What are the main functional areas of Open information is filtered by time, but also the
NMS? geographic coordinates are used to screen the
1. Service monitoring, where a number of specific location-tailored information properly.
monitor modules can govern if network-
based services (ICMP, HTTP, DNS, etc.)
are accessible.
39
82. Explain B2B module in E-Commerce. radius of 2.88 mm to 3.48 mm and
• In B2B E-Commerce, commercial thickness of 0.76 mm. These standards
transactions take place between different dimensions are maintained universally in
accordance with ISO/IEC 7810#ID-1.
business organizations, through the
Internet. For example, a cycle company 87. Briefly explain the stored value card and its
may buy tyres from another company for types.
their cycles. • Stored value card is a type of debit card that
• When compared to other models, the value is pre-loaded with certain amount(value),
per transaction in B2B transaction is high, with which a payment is made.
because of bulk purchases. The company • It is a card that has default monetary value
onto it.
also might get the advantage of discounts
• The card may be disposed when the value
on bulk purchases. is used, or recharged to use it again.
• There are two varieties for stored value
83. Write a note on name-your-price websites. card.
• In a travel website a consumer may specify a. Closed loop (single purpose)
his dates of travel, his source and b. Open loop (multipurpose)
destination, number of tickets required and
88. Write a note on mining in crypto currency.
range of hotel etc.
• The crypto currency units are created by the
• The website then finds out the various solution of cryptographic tasks called
options for him which best meets his mining.
requirements. • The miners not only generate new monetary
• These websites generate revenue through units, but also initiate new transactions to
affiliate links, sponsored advertisement or the blockchain.
even a small commission in every booking. • As a reward, they will receive new Bitcoins.

84. Write a note on physical product dispute of 89. Write a note on certification authorities (CA)
E-Commerce. • Digital certificates are issued by recognized
• Physical product disputes are a major Certification Authorities (CA).
disadvantage in E-Commerce. • When someone requests a digital
• E-Commerce purchases are often made on certificate, the authority verifies the identity
of the requester, and if the requester fulfills
trust. This is because; we do not have
all requirements, the authority issues it.
physical access to the product. Though
• When the sender uses a certificate to sign a
Internet is an effective channel for visual document digitally, receiver can trust the
and auditory information it does not allow digital signature because he trusts that CA
full scope for our senses. has done their part verifying the sender’s
identity.
85. Define micro electronic payment and its role
in E-Commerce. 90. List some E-Commerce Security Threats?
• It is an on-line payment system designed to a. Information leakage
allow efficient and frequent b. Tampering
• payments of small amounts. In order to c. Payment frauds
keep transaction costs very low, the d. Malicious code threats
communication and computational e. Distributed Denial of Service (DDoS)
• costs are minimized here. Attacks
f. Cyber Squatting
86. Explain briefly Anatomy of a credit card. g. Typopiracy
• All Payment cards (including debit card) are
usually plastic cards of size 85.60 mm width
× 53.98 mm height, rounded corners with a
40
91. Write a note on PGP.
• Pretty Good Privacy (PGP): Phil 95. Write a note on UN/EDIFACT.
Zimmermann developed PGP in 1991. United Nations / Electronic Data Interchange for
• It is a decentralized encryption program that Administration, Commerce and Transport (UN /
provides cryptographic privacy and EDIFACT) is an international EDI - standard
authentication for data communication. developed under the supervision of the United
• PGP encryption uses a serial combination Nations.
of hashing, data compression, symmetric-
key cryptography and asymmetric-key In 1987, the UN / EDIFACT syntax rules were
cryptography and works on the concept of approved as ISO: ISO9735 standard by the
“web of trust”. International Organization for Standardization.

92. Explain 3D secure payment protocols EDIFACT includes a set of internationally agreed
• “3-D Secure is a secure payment protocol standards, catalogs and guidelines for electronic
on the Internet. exchange of structured data between independent
• It was developed by Visa to increase the computer systems.
level of transaction security, and it has been
adapted by MasterCard. 96. Write a note on EDIFACT message.
• It gives a better authentication of the holder The basic standardization concept of EDIFACT is
of the payment card, during purchases that there are uniform message types called United
made on websites. Nations Standard Message (UNSM).
• The basic concept of this (XML-based) .
protocol is to link the financial authorization
process with an online authentication
system. In so-called subsets, the message types can be
specified deeper in their characteristics depending
• This authentication model comprise 3
on the sector.
domains which are:
1. The Acquirer Domain
The message types, all of which always have
2. The Issuer Domain
exactly one nickname consisting of six uppercase
3. The interoperability Domain
English alphabets.
93. Write a short note on EDI.
• EDI includes data exchange between
The message begins with UNH and ends with UNT
buyers and sellers, trade partners, and also
internal data exchange within departments
97. Write about EDIFACT separators
of a company.
• There are many internationally accepted EDIFACT has the following punctuation marks that
EDI standard e.g. EDIFACT, XML, ANSI are used as standard separators.
ASC X12, etc.
• EDI is “Paperless Trade” Character Uses
• major EDI types.
Apostrophe ‘ Segment terminator
a. Direct EDI
b. EDI via VAN Segment tag and data
Plus sign +
c. EDI via FTP/VPN, SFTP, FTPS element separator
d. Web EDI Component data
Colon :
e. Mobile EDI element separator
Question mark ? Release character
94. List the various layers of EDI.
• Electronic data interchange architecture Period . Decimal point
specifies four different layers namely
1. Semantic layer
2. Standards translation layer
3. Transport layer
4. Physical layer

41
PART - IV
ANSWER TO ALL THE QUESTIONS:

1. Explain in detail Process of Multimedia


1. Conceptual Analysis and Planning 8. Preparing the structure
The process of multimedia making begins with a A detailed structure must have information about all
conceptual ignition point. Conceptual analysis the steps along with the timeline of the future
identifies a appropriate theme, budget and content action. This structure defines the activities,
availability on that selected theme. Additional responsible person for each activity and the
criteria like copyright issues also are considered in start/end time for each activity.
this phase. 9. Production
In the multimedia application, after the pre-
2. Project design production activities, the production phase starts.
Once the theme is finalized objectives, goals, and This phase includes the activities like background
activities are drawn for the multimedia project. music selection, sound recording and so on. Text is
General statements are termed as goals. The incorporated using OCR software, Pictures shot by
specific statements in the project is known as the digital camera, Video clips are shot, edited and
objectives. Activities are series of actions compressed. A pilot project is ready by this time.
performed to implement an objective. These
activities contribute to the Project design phase. 10. Testing
The complete testing of the pilot product is done
3. Pre-production before the mass production to ensure that
Based on the planning and design, it is necessary everything is in place, thereby avoiding the failure
to develop the project. The following are the steps after launch. If it’s an web based product, its
involved in pre-production: functioning is tested with different browsers like
Internet Explorer, Chrome, Mozilla and Netscape
4. Budgeting Navigator. If it is a local multimedia application on a
Budgeting for each phases like consultants, LAN it must be deployed in the server for testing
hardware, software, travel, communication and purpose. After the testing process are over, the
publishing is estimated for all the multimedia product is incorporated with valid suggested
projects. changes.

5. Multimedia Production Team 11. Documentation


The production team for a high end multimedia User documentation is a mandatory feature of all
project requires a team efforts. The team comprises multimedia projects. The documentation has all the
of members playing various roles and valuable information’s starting from the system
responsibilities like Script writer, Production requirement till the completion of testing. Contact
manager, Editor, Graphics Architect, Multimedia details, e-mail address and phone numbers are
Architect and Web Master. provided for technical support and sending
suggestions and comments.
6. Hardware/Software Selection
All multimedia Application requires appropriate 12. Delivering the Multimedia Product
tools to develop and playback the application. Multimedia applications are best delivered on
Hardware includes the selection of fastest CPU, CD/DVD or in the website . In reality various
RAM and huge monitors, sufficient disc for storing challenges are faced while delivering through
the records. Selection of the suitable software and internet, like bandwidth problems, huge number of
file formats depends on the funds available for the plugins required to play audio and video and long
project being developed. downloading time. Finally, a multimedia application
is delivered in a more effective way by the
7. Defining the Content integration of two mediums CD-ROM/DVD and
Content is the “stuff ” provided by content specialist Internet.
to the multimedia architect with which the
application is developed, who prepares the 2. Explain in detail Techniques of Animation
narration, bullets, charts and tables etc. Animation:

42
• Animation is the process displaying still 1. Production Manager
images so quickly so that they give the The role of production manager is to define, and
impression of continuous movement. coordinate, the production of the multimedia project
• The two basic types of animations are Path in time and with full quality.
animation and Frame animation.
• Animations may be in two or three 2. Content Specialist
dimensional. Content specialist is responsible for performing all
• The two dimensional animation, bring an research activities concerned with the proposed
image alive, that occur on the flat X and Y application’s content.
axis of the screen.
• The three dimensional animation it occurs 3. Script Writer
along the three axis X, Y and Z. The script writer visualizes the concepts in three
dimensional environments and if needed uses the
Path animation: virtual reality integration into the program.
• Path animation involves moving an object
on a screen that has a constant background 4. Text Editor
The content of a multimedia production always
Frame animation: must flow logically and the text should always be
• In frame animations, multiple objects are structured and correct grammatically.
allowed to travel simultaneously and the
background or the objects also changes. 5. Multimedia Architect
The multimedia architect integrates all the
3. Explore the opportunities Animation field multimedia building blocks like graphics, text,
movie industry audio, music, video, photos and animation by using
an authoring software.
• The animation and visual effects industry
has been growing stronger and stronger in
6. Computer Graphic Artist
recent years.
The role of Computer Graphic Artist is to deal with
• Animation is part and parcel of the media
the graphic elements of the programs like
and entertainment industry, including the
backgrounds, bullets, buttons, pictures editing, 3-D
mobile segment.
objects, animation, and logos etc.
• Massive international projects are
outsourced to animation companies 7. Audio and Video Specialist
• The surge in demand for animation and The roles of audio and video specialists are needed
visual effects experts has led to a significant for dealing with narration and digitized videos to be
increase in the number of students added in a multimedia presentation. They are
enrollment responsible for recording, editing sound effects and
• India’s animation and visual effect industry digitizing.
is currently worth more than Rs. 70 billion
and is expected to reach more over the next 8. Computer Programmer
couple of years The computer programmer writes the lines of code
or scripts in the appropriate language.
4. Explain in detail about production team Roles
and Responsibilities 9. Web Master
Multimedia Production Team: The responsibility of the web master is to create
1. Production Manager and maintain an Internet web page. They convert a
2. Content Specialist multimedia presentation into a web page.
3. Script Writer
4. Text Editor 5. Explain about different file formats in
5. Multimedia Architect multimedia files
6. Computer Graphic Artist (1) Text Formats:
7. Audio and Video Specialist RTF - Rich Text Format
8. Computer Programmer • It is the primary file format introduced in
9. Web Master 1987 by Microsoft with the specification of
43
their published products and for cross- • It is the most popular audio file format in
platform documents interchange. windows for storing uncompressed sound
files.
Plain text • In order to attain the reduced file size it can
• Plain text files can be opened, read, and also be converted to other file formats like
edited with most text editors. The commonly MP3.
used are Notepad (Windows), Gedit or nano
(Unix, Linux), TextEdit (Mac OS X) and so MP3 (MPEG Layer-3 Format)
on. • MPEG Layer-3 format is the most popular
format for storing and downloading music.
(2) Image Formats
TIFF (Tagged Image File Format) OGG
• This format is common in desktop • A free, open source container format that is
publishing world (high quality output), and is designed for obtaining better streaming and
supported by almost all software packages. evolving at high end quality digital
multimedia.
BMP (Bitmap)
• Initially this format is in use with Windows AIFF (Audio Interchange File Format)
3.1. It is quite large and uncompressed and • A standard audio file format used by Apple
hence BMP is used for the high-resolution which is like a WAV file for --the Mac.
or large images.
WMA (Windows Media Audio)
DIB (Device Independent Bitmap) • It is a popular windows media audio format
• This format which is similar to BMP, allows owned by Microsoft and designed with
the files to be displayed on a variety of Digital Right Management (DRM) abilities
devices. for copyright protection.

RA (Real Audio Format)


GIF (Graphics Interchange Format) • Real Audio format is designed for streaming
• GIF is a compressed image format. Most of audio over the Internet.
the computer color images and
backgrounds are GIF files. (4) Digital Video File Formats:
AVI (Audio/Video Interleave)
JPEG (Joint Photographic Experts Group) • AVI is the video file format for Windows.
• JPEG was designed to attain maximum • Here sound and picture elements are stored
image compression. in alternate interleaved chunks in the file.
• It works good with photographs, naturalistic
artwork, and similar material but functions MPEG (Moving Picture Experts Group)
less on lettering, live drawings or simple • MPEG is a standard for generating digital
cartoons. video and audio compression under the
International Standards Organization (ISO)
TGA (Tagra) by the group of people.
• It is the first popular format for high
resolution images.
6. Explain the tools in PageMaker toolbox.
PNG (Portable Network Graphics) Tools Toolbox Cursor Use
• An extensible file format for the less loss, Pointer tool Used to select
portable and well compressed storage of ,move ,and
raster images. realize text
• PNG acts as replacement for GIF and also object and
replaces multiple common uses of TIFF. graphs
Text tool Used to type
(3) Digital Audio File Formats ,select ,and
WAV (Waveform Audio File Format)
44
edit text 1. Click on one of a Frame tools from the
Rotating tool Used to select Toolbox.
and rotate 2. Draw a frame with one of PageMaker’s
objects Frame tools (Rectangle frame tool or Ellipse
Cropping tool Used to trim
Frame Tool or Polygon frame Tool). Make
important
graphics sure the object remains selected.
Line tool Used to draw 3. Click on File. The File menu will appear.
straight lines 4. Click on Place. The Place dialog box will
in any appear.
direction 5. Locate the document that contains the text
Constrained Used to draw you want to place, select it.
line tool vertical or
6. Click on Open.
horizontal
lines 7. Click in a frame to place the text in it.
Rectangle Used to draw
tool squares and 8. How can you convert text in a text block to a
rectangle frame?
Rectangle Used to 1. Draw the frame of your choice using one
frame tool create of the PageMaker’s Frame tool.
rectangular 2. Select the text block you want to insert
placeholders
for text and in the frame.
graphics 3. Click the frame while pressing the Shift
Ellipse tool Used to draw key. Now both elements will be
circles and selected.
ellipses 4. Choose Element → Frame → Attach
Ellipse frame Used to Content on the Menu bar.
tool create 5. Now the text appears in the frame.
elliptical
placeholders
for text and
graphics 9. Write the steps to draw a star using polygon
Polygon tool Used to draw tool?
polygon 1. Click on the Polygon tool from the toolbox.
Polygon Used to The cursor changes to a crosshair.
frame tool create 2. Click and drag anywhere on the screen. As
polygonal
you drag, a Polygon appears.
placeholders
for text and 3. Release the mouse button when the
graphics Polygon is of the desired size.
Hand tool Used to scroll 4. Choose Element → Polygon Settings in the
the page (an menu bar. Now Polygon Settings dialogue
alternative to box appears.
the scroll bar) 5. Type 5 in the Number of sides text box.
Zoom tool Used to
6. Type 50% in Star inset textbox.
magnify or
reduce an 7. Click OK. Now the required star appears on
area of the the screen.
page.
10. Explain client side and server side scripting
language.
7. Write the steps to place the text in a frame. Client Server Architecture Model

45
Client server architecture is classified into three How PHP Script Work
types, as follows • Website or Web page is developed by
• Single Tier Architecture the programmer using PHP script.
• Two Tier Architecture • Finally the entire Website codes are
• N/Multi/Three tire architecture moved to Web server path in a remote
Single Tier Architecture server machine.
• This architecture is used for the server, • From client side, the end user opens a
accessed by client. browser, types the URL of the Website
• The client application runs inside the or Webpage and initiates the request to
server machine itself. remote server machine over the
• This acts as a single layer interaction network.
Two Tier Architecture • After receiving the request from client
• This architecture is used for the server, machine the Web server tries to compile
accessed by client as two layer and interpret the PHP code which is
interactions. available in remote machine.
• Such as Client layer in tire one and • Next a response will be generated and
server layer in tire Two. sent back to the client machine over the
Multi/Three Tier Architecture: network from Webserver.
• This architecture is used for the server, • Finally the browser which is installed in
accessed by client through more than the client machine receives the
one layer interaction. response and displays the output to
• The programmer could decide the count user.
of business logic layers according to the PHP Syntax
software requirement that is the reason Three types of PHP Syntax are available.
this model is also known as Multi Three They are as follows
Tire Architecture. 1. Default Syntax
Server side scripting language 2. Short open Tags
• Web scripting languages are classified 3. HTML Script embed Tags
into two types, client side and server Default Syntax:
side scripting language. The default Syntax begins with “<?php” and
• PHP is completely different from Client closes with “?>”.
side scripting language like Java script. Short open Tags
• The PHP code entirely executes on The Short open Tags begins with “<?” and closes
Webserver which is installed in the with “?>”. But admin user has to
remote machine and it is generating enable Short style tags settings in php.ini file on the
HTML code which is sent to the user. server.
The user receives the HTML code and HTML Script embed Tags:
sees the Website contents via Internet HTML Script embed Tags looks just like HTML
browser in their computer or laptop. scripts tags.
Embed PHP in HTML
• PHP also supports OOPs (Object
PHP script can be written in side of HTML code and
Oriented Programing) concepts. It is
save the file with extension of .php. The embedded
applicable to implement all OOPs
PHP file get executed in the Webserver, the
features such as class, object and
browser receives only the HTML and other client
inheritance etc.
side files. None of the raw PHP code is visible in
browser which means that PHP interpreter
11. Discuss in detail about Website
produces raw HTML files to browsers in the client
development activities.
machine.
Web development concept describes in detail
about Website development and hosting
12. Explain the process of Webserver
through network (Internet/Intranet). The process
installation.
of development also includes Web content
The following are the steps to install and
generation, Web page designing, Website
configure Apache Httpd Webserver and PHP
security and so on.
module in windows server machine.
46
Step 1: <?php
Go to Apache foundation Website and $x = “Computer Application!”;
download the Httpd Webserver $y = ‘Computer Application’;
Software. echo $x;
https://httpd.apache.org/download.cgi echo “<br>”;
Step2: echo $y;
After downloading .MSI file from Apache ?>
foundation Website, user launches the .MSI Integer:
file and clicks next and next button to finish Integer is a data type which contains non
the installation on server machine. The decimal numbers.
software takes default port number 130 or Example:
130130. Once the user finished, the Web <?php
server software is installed and configured $x = 59135;
on server hardware machine as a service. var_dump($x);
Step 3: ?>
To test the installation of Apache Httpd Float:
Webserver, enter the following URL from Float is a data type which contains decimal
your Web browser which is installed in your numbers.
client machine. Example:
https://localhost:130/ or https:// <?php
localhost:130130 $x = 19.15;
The output page that says “Its works” var_dump($x);
Step 4: ?>
Administrator user can start, stop and Boolean:
restart the Web server service at any time Boolean is a data type which denotes the
via windows Control panel. Once the possible two states, TRUE or FALSE
services stops, the client machine will not Example:
receive the response message from server <?php
machine. $x = true;
Step 5: $y = false;
Webserver’s configuration setting file echo $x;
“httpd.conf ” is located in the conf directory echo $y;
under the apache installation directory. Edit ?>
this file and enable the PHP module to run Array:
PHP scripting language. Array is a data type which has multiple
values in single variable.
13. Discuss in detail about PHP data types. Example:
PHP scripting language supports 13 primitive <?php
data types. $cars =
PHP supports the following data types. array(“Computer”,”Laptop”,”Mobile”);
1. String var_dump($cars);
2. Integer ?>
3. Float OUTPUT:
4. Boolean array(3) { [0]=> string(5) “Computer “ [1]=>
5. Array string(3) “Laptop “ [2]=> string(6) “Mobile “ }
6. Object
7. NULL OBJECT:
8. Resource PHP object is a data type which contains
String: information about data and function inside
String is a collection of characters within the the class.
double or single quotes like “Computer <?php
Application” or ‘Computer Application’. class School {
Space is also considered as a character. function marks() {
Example: $this->sec = “A”;

47
} * Multiplication
} / Division
// create an object % Modulus
$school_obj = new School ();
// show object properties Assignment Operators:
echo $school_obj ->sec; Assignment operators are performed with
?> numeric values to store a value to a
NULL: variable. The default assignment operator is
Null is a special data type which contains a “=”. This operator sets the left side operant
single value: NULL value of expression to right side variable.
<?php
$x = “COMPUTER APPLICATION!”; Comparison Operators:
$x = null; Comparison operators perform an action to
var_dump($x); compare two values. These values may
?> contain integer or string data types (Number
OUTPUT: or Strings).
NULL Symbol Operator Name
RESOURCES == Equal
Resource is a specific variable, it has a === Identical
reference to an external resource. These != Not equal
variables hold specific handlers to handle <> Not equal
files and database connections in respective !== Not Identical
PHP program.
> Greater than
<?php
< Less than
// Open a file for reading
>= Greater than or equal to
$handle = fopen(“note.txt”, “r”);
<= Less than or equal to
var_dump($handle);
echo “<br>”;
// Connect to MySQL database server with Increment and Decrement Operators:
default setting Increment and decrement operators are
$link = mysql_connect(“localhost”, “root”, used to perform the task of increasing or
“”); decreasing variable’s value. This operator is
var_dump($link); mostly used during iterations in the program
?> logics.
Symbol Operator Name
14. Explain operators in PHP with example. ++$x Pre-increment
Operator is a symbol which is used to perform $x++ Post-increment
mathematical and logical operations in the --$x Pre-decrement
programing languages. $x-- Post-decrement
Different types of operator in PHP are:
1. Arithmetic operators, Logical Operators:
2. Assignment operators, Logical Operators are used to combine
3. Comparison operators, conditional statements.
4. Increment/Decrement operators, Symbol Operator
5. Logical operators, and Name
6. String operators. && And
Arithmetic operators || Or
The arithmetic operators in PHP perform ! Not
general arithmetical operations, such as xor XOR
addition, subtraction, multiplication and
division etc. String Operators:
Symbol Operator Name Two operators are used to perform string
+ Addition related operations such as Concatenation
- Subtraction and Concatenation assignment (Appends).
48
Symbol Operator Name insertMsg(); // call the function
. Concatenation ?>
.= Concatenation
16. Discuss in detail about User define
15. Explain Function concepts in PHP. Functions.
• A Function is a type of sub routine or User Defined Function
procedure in a program. A Function will User Defined Function (UDF) in PHP gives
be executed by a call to the Function a privilege to user to write own specific
and the Function returns any data type operation inside of existing program
values or NULL value to called Function module.
in the part of respective program. Two important steps the Programmer has to
create for users define Functions are:
The Function can be divided in to three types
as follows Function Declaration
• User defined Function, • A user-defined Function declaration
• Pre-defined or System or built-in begins with the keyword “function”. User
Function, and can write any custom logic inside the
• Parameterized Function. function block.

User Defined Function SYNTAX:


User Defined Function (UDF) in PHP gives function functionName()
a privilege to user to write own specific {
operation inside of existing program Custom Logic code to be executed;
module. }
Two important steps the Programmer has to
create for users define Functions are: Function Calling:
• A function declaration part will be
Function Declaration executed by a call to the function.
• A user-defined Function declaration Programmer has to create Function
begins with the keyword “function”. User Calling part inside the respective
can write any custom logic inside the program.
function block.
SYNTAX:
SYNTAX: functionName();
function functionName() Example:
{ <?php
Custom Logic code to be executed; function insertMsg() {
} echo “Student Details Inserted
Successfully!”;
Function Calling: }
• A function declaration part will be insertMsg(); // call the function
executed by a call to the function. ?>
Programmer has to create Function
Calling part inside the respective 17. Explain the Multidimensional Array.
program. • A multidimensional array is an array
containing one or more arrays.
SYNTAX: • PHP understands multidimensional arrays
functionName(); that are two, three, four, five, or more levels
Example: deep.
<?php • However, arrays more than three levels
function insertMsg() { deep are hard to manage for most people.
echo “Student Details Inserted Example:
Successfully!”; <?php
} // A two-dimensional array
49
$student=array linear array, with associative arrays you can
( store your data in a collection and assign it
array(“Iniyan”,100,96), a unique key which you may use for
array(“Kavin”,60,59), referencing your data.
array(“Nilani”,1313,139) Example:
); <?php
echo $$student[0][0].”: Tamil Mark: $Marks=array(“Student1”=>“35”,“Student2”=>“1
“.$student [0][1].”. English mark: “.$student 7”,“Student3”=>“43”);
[0] echo “Student1 mark is” . $Marks[‘Student1’] . “
[2].”<br>”; is eligible for qualification”;
echo $$student[1][0].”: Tamil Mark: echo “Student2 mark is” . $Marks[‘Student2’] . “
“.$student [1][1].”. English mark: “.$student is not eligible for qualification”;
[1] ?>
[2].”<br>”; Multidimensional Arrays
echo $$student[2][0].”: Tamil Mark: • A multidimensional array is an array
“.$student [2][1].”. English mark: “.$student containing one or more arrays.PHP
[2] understands multidimensional arrays that
[2].”<br>”; are two, three, four, five, or more levels
?> deep. However, arrays more than three
levels deep are hard to manage for most
18. Explain Array concepts and their types. people.
• Array is a concept that stores more than Example:
one value of same data type <?php
(homogeneous) in single array variable. // A two-dimensional array
They are 3 types of array concepts in PHP. $student=array
o Indexed Arrays, (
o Associative Array and array(“Iniyan”,100,96),
o Multi-Dimensional Array. array(“Kavin”,60,59),
Array Syntax: array(“Nilani”,1313,139)
Array defines with the keyword array() );
$Array_Variable=array(“value1”,”value2”,”valu echo $$student[0][0].”: Tamil Mark:
e2”); “.$student [0][1].”. English mark: “.$student
Associative Arrays Syntax [0]
array(key=>value,key=>value,key=>value,etc. [2].”<br>”;
); echo $$student[1][0].”: Tamil Mark:
key = Specifies the key (numeric or string) “.$student [1][1].”. English mark: “.$student
value = Specifies the value [1]
Indexed Arrays [2].”<br>”;
• Arrays with numeric index for the available echo $$student[2][0].”: Tamil Mark:
values in array variable which contains key “.$student [2][1].”. English mark: “.$student
value pair as user / developer can take the [2]
values using keys. Refer Figure [2].”<br>”;
Example: ?>
<?php
$teacher_name=array(“Iniyan”, “Kavin”, 19. Explain Indexed array and Associate array
“Nilani”); in PHP.
echo “The students name are “ . Indexed Arrays
$teacher_name[0] . “, “ . $$teacher_name[1] • Arrays with numeric index for the
. “ and “ . available values in array variable which
$teacher_name[2] . “.”; contains key value pair as user /
?> developer can take the values using
Associative Arrays keys. Refer Figure
• Associative arrays are a key-value pair data Example:
structure. Instead of having storing data in a <?php
50
$teacher_name=array(“Iniyan”, “Kavin”, echo “The Student is Eligible for the
“Nilani”); Promotion”;
echo “The students name are “ . }?>
$teacher_name[0] . “, “ .
$$teacher_name[1] . “ and “ . If else statement in PHP:
$teacher_name[2] . “.”; If statement executes a statement or a
?> group of statements if a specific condition is
Associative Arrays satisfied by the user expectation. When the
• Associative arrays are a key-value pair condition gets false (fail) the else block is executed.
data structure. Instead of having storing Syntax:
data in a linear array, with associative if (condition)
arrays you can store your data in a {
collection and assign it a unique key Execute statement(s) if condition is true;
which you may use for referencing your }
data. else
Example: {
<?php Execute statement(s) if condition is false;
$Marks=array(“Student1”=>“35”,“Student2”= }
>“17”,“Student3”=>“43”); Example:
echo “Student1 mark is” . <?php
$Marks[‘Student1’] . “ is eligible for $Pass_Mark=35;
qualification”; $Student_Mark=70;
echo “Student2 mark is” . if ($Student_Mark>= $Pass_Mark){
$Marks[‘Student2’] . “ is not eligible for echo “The Student is eligible for the
qualification”; promotion”;
?> }
else {
20. Explain Function Conditional Statements in echo “The Student is not eligible for the
PHP. promotion”;
Conditional statements are useful for writing } ?>
decision making logics. It is most important
feature of many programming languages, including If elseif else statement in PHP:
PHP. They are implemented by the If-elseif-else statement is a combination of
following types: if-else statement. More than one statement can
● if Statement execute the condition based on user needs.
● if...else Statement Syntax:
● if...elseif....else Statement if (1stcondition)
● switch Statement {
Execute statement(s) if condition is true;
If statement in PHP: }
If statement executes a statement or a elseif(2ndcondition)
group of statements if a specific condition is {
satisfied as per the user expectation. Execute statement(s) if 2ndcondition is true;
Syntax: }
if (condition) else
{ {
Execute statement(s) if condition is true; Execute statement(s) if both
} conditionsarefalse;
Example: }
<?php Example:
$Pass_Mark=35; <?php
$Student_Mark=70; $Pass_Mark=35;
if ($Student_Mark>= $Pass_Mark){ $first_class=60;
$Student_Mark=70;

51
if ($Student_Mark>= $first_class){
echo “The Student is eligible for the 21. Discuss in detail about Switch statement
promotion with First Class”; with an example.
} • The switch statement is used to perform
elseif ($Student_Mark>= $Pass_Mark){ different actions based on different
echo “The Student is eligible for the conditions.
promotion”; Syntax:
} switch (n) {
else { case label1:
echo “The Student is not eligible for the code to be executed if n=label1;
promotion”; break;
} ?> case label2:
Switch Statement code to be executed if n=label2;
The switch statement is used to perform different break;
actions based on different conditions. case label3:
Syntax: code to be executed if n=label3;
switch (n) { break;
case label1: ...
code to be executed if n=label1; default:
break; code to be executed if n is different
case label2: from all labels;
code to be executed if n=label2; }
break;
case label3: Example:
code to be executed if n=label3; <?php
break; $favcolor = “red”;
... switch ($favcolor)
default: {
code to be executed if n is different case “red”:
from all labels; echo “Your favorite color is
} red!”;
break;
Example: case “blue”:
<?php echo “Your favorite color is
$favcolor = “red”; blue!”;
switch ($favcolor) break;
{ case “green”:
case “red”: echo “Your favorite color is
echo “Your favorite color is green!”;
red!”; break;
break; default:
case “blue”: echo “Your favorite color is
echo “Your favorite color is neither red, blue, nor green!”;
blue!”; }
break; ?>
case “green”:
echo “Your favorite color is 22. Explain the process Conditional Statements
green!”; in PHP?
break; Conditional statements are useful for writing
default: decision making logics. It is most important
echo “Your favorite color is feature of many programming languages, including
neither red, blue, nor green!”; PHP. They are implemented by the
} following types:
?> ● if Statement
52
● if...else Statement if (1stcondition)
● if...elseif....else Statement {
● switch Statement Execute statement(s) if condition is true;
}
If statement in PHP: elseif(2ndcondition)
If statement executes a statement or a {
group of statements if a specific condition is Execute statement(s) if 2ndcondition is true;
satisfied as per the user expectation. }
Syntax: else
if (condition) {
{ Execute statement(s) if both
Execute statement(s) if condition is true; conditionsarefalse;
} }
Example: Example:
<?php <?php
$Pass_Mark=35; $Pass_Mark=35;
$Student_Mark=70; $first_class=60;
if ($Student_Mark>= $Pass_Mark){ $Student_Mark=70;
echo “The Student is Eligible for the if ($Student_Mark>= $first_class){
Promotion”; echo “The Student is eligible for the
}?> promotion with First Class”;
}
If else statement in PHP: elseif ($Student_Mark>= $Pass_Mark){
If statement executes a statement or a echo “The Student is eligible for the
group of statements if a specific condition is promotion”;
satisfied by the user expectation. When the }
condition gets false (fail) the else block is executed. else {
Syntax: echo “The Student is not eligible for the
if (condition) promotion”;
{ } ?>
Execute statement(s) if condition is true; Switch Statement
} The switch statement is used to perform different
else actions based on different conditions.
{ Syntax:
Execute statement(s) if condition is false; switch (n) {
} case label1:
Example: code to be executed if n=label1;
<?php break;
$Pass_Mark=35; case label2:
$Student_Mark=70; code to be executed if n=label2;
if ($Student_Mark>= $Pass_Mark){ break;
echo “The Student is eligible for the case label3:
promotion”; code to be executed if n=label3;
} break;
else { ...
echo “The Student is not eligible for the default:
promotion”; code to be executed if n is different
} ?> from all labels;
}
If elseif else statement in PHP:
If-elseif-else statement is a combination of Example:
if-else statement. More than one statement can <?php
execute the condition based on user needs. $favcolor = “red”;
Syntax: switch ($favcolor)

53
{ echo “The Student is not eligible for the
case “red”: promotion”;
echo “Your favorite color is } ?>
red!”;
break; 24. Explain if else statement in PHP
case “blue”: • If statement executes a statement or a
echo “Your favorite color is group of statements if a specific condition
blue!”; is satisfied by the user expectation. When
break; the condition gets false (fail) the else block
case “green”: is executed.
echo “Your favorite color is Syntax:
green!”; if (condition)
break; {
default: Execute statement(s) if condition is true;
echo “Your favorite color is }
neither red, blue, nor green!”; else
} {
?> Execute statement(s) if condition is false;
}
Example:
23. Explain concepts of if elseif else statement. <?php
• If-elseif-else statement is a combination of $Pass_Mark=35;
if-else statement. More than one statement $Student_Mark=70;
can execute the condition based on user if ($Student_Mark>= $Pass_Mark){
needs. echo “The Student is eligible for the
Syntax: promotion”;
if (1stcondition) }
{ else {
Execute statement(s) if condition is true; echo “The Student is not eligible for the
} promotion”;
elseif(2ndcondition) } ?>
{
Execute statement(s) if 2ndcondition is true;
} 25. Explain Looping Structure in PHP.
else • Looping Structures are useful for writing
{ iteration logics. It is the most important
Execute statement(s) if both feature of many programming
conditionsarefalse; languages, including PHP. They are
} implemented using the following
Example: categories.
<?php for Loop
$Pass_Mark=35; foreach Loop
$first_class=60; While Loop
$Student_Mark=70; Do While Loop
if ($Student_Mark>= $first_class){
echo “The Student is eligible for the For loop
promotion with First Class”; Syntax:
} for (init counter; test counter;
elseif ($Student_Mark>= $Pass_Mark){ increment counter) {
echo “The Student is eligible for the code to be executed;
promotion”; }
} Example:
else { <?php
for ($i = 0; $i<= 10; $i++) {
54
echo “The number is: $i<br>”;
} 26. Discuss in detail about For each loop.
?> • foreach loop is exclusively available in
PHP. It works only with arrays.
For each loop • The loop iteration deepens on each KEY
Syntax: Value pair in the Array. For each, loop
for each ($array as $value) { iteration the value of the current array
code to be executed; element is assigned to $value variable
} and the array pointer is shifted by one,
Example: until it reaches the end of the array
<?php element.
$Student_name = array(“Magilan”, Syntax:
“Iniyan”, “Nilani”, “Sibi”, “Shini”); for each ($array as $value) {
foreach ($Student_name as $value) code to be executed;
{ }
echo “$value <br>”; Example:
} <?php
?> $Student_name = array(“Magilan”, “Iniyan”,
“Nilani”, “Sibi”, “Shini”);
While loop foreach ($Student_name as $value) {
Syntax: echo “$value <br>”;
while (condition is true) { }
code to be executed; ?>
}
Example: 27. Explain the process Do while loop.
<?php • Do whileloop always run the statement
$Student_count = 10; inside of the loop block at the first time
$student_number=1; execution.
while($student_number<= • Then it is checking the condition
$Student_count) { whether true or false. It executes the
echo “The student number is: loop, if the specified condition is true.
$student_number<br>”; Syntax:
$student_number++; do {
} code to be executed;
?> } while (condition is true);
Example:
Do while loop <?php
Syntax: $Student_count = 10;
do { $student_number=1;
code to be executed; do
} while (condition is true); {
Example: echo “The student number is:
<?php $student_number<br>”;
$Student_count = 10; $student_number++;
$student_number=1; }
do while($student_number<= $Student_count)
{ ?>
echo “The student number is:
$student_number<br>”; 28. Explain concepts of for loop with example.
$student_number++; • For loop is an important functional looping
} system which is used for iteration logics
while($student_number<= when the programmer know in advance how
$Student_count) many times the loop should run.
?> Syntax:
55
for each ($array as $value) { PHP file which is mentioned in the FORM
code to be executed; tag under the Action attribute.
} • All input values are synchronized and sent
Example: to the server via POST method or GET
<?php method.
$Student_name = array(“Magilan”, “Iniyan”, • Method is an attribute form tag in HTML.
“Nilani”, “Sibi”, “Shini”); Once the data reaches the server, two PHP
foreach ($Student_name as $value) { variables such as $_POST and $_GET
echo “$value <br>”; collects the data and prepares the response
} accordingly.
?> Post Method:
• The input data sent to the server with
29. Explain array concepts in Looping POST method is stored in the request
Structure. body of the client’s HTTP request.
Arrays can be manipulated by looping Get Method:
structures. The foreach construct provides an • The input data sent to the server with
easy way to iterate over arrays. Foreach works POST method via URL address is
only on arrays and objects, and will issue an known as query string. All input data are
error when you try to use it on a variable with a visible by user after they clicks the
different data type or an uninitiazed variable. submit button.
Example:
Example 1 : Test.html:
<?php <html>
$a = array(2,4,6,8,10); <body>
foreach ($a as $value) { <form action=”welcome.php”
echo “$value <br>”; method=”post”>
} Name: <input type=”text”
?> name=”name”><br>
E-mail: <input type=”text”
Example 2 : name=”email”><br>
<?php <input type=”submit”>
$a = array(2,4,6,8,10); </form>
for ($i = 0; $i < 4; $i++) { </body>
echo “$a <br>”; </html>
} Welcome.php:
?> <html>
<body>
Example 3 : Welcome <?php echo $_POST[“name”];
<?php ?><br>
$a = array(2,4,6,8,10); Your email address is: <?php echo
$i = 0; $_POST[“email”]; ?>
while ($i < 4;) </body>
{ </html>
echo “$a <br>”; • HTML File contains two Text Box (Name
$i++; and Email), One Button and one form
} tag. The remote server PHP file
?> (welcome.php) is mentioned in form tag
under the Action Attribute.
30. Explain Form Handling methods. • In “Welcome.Php” file, PHP variables
PHP Basic Form Handling such as $_POST and $_GET collects
• When the user keying the input data in the data and prepares the response
HTML controls and clicks the submit button accordingly.
therequest will be generated and reaches a

56
• Eventually the user will receive the <?php
output response in the client machine’s $servername = “localhost”;
browser screen. $username = “username”;
$password = “password”;
31. Discuss in detail about HTML form controls. $DB_name = “School_DB”;
Basic HTML Form Controls // Create connection
The following control types are available in $conn = mysqli_connect($servername,
HTML form controlling: $username, $password,$DB_name);
• Text inputs // Check connection
• Buttons if (!$conn) {
• Checkbox die(“Connection failed: “ .
• Radio box mysqli_connect_error());
• File Select }
• Form Tag echo “Connected successfully”;
o Text inputs contain textbox and text area ?>
controls.
o Buttons may contain Submit button, Reset In the above code snippet, three variables
button and Cancel Button. are used to connect to the Database server.
o Checkbox is the important feature which They are
selects more than one value from the HTML • $servername -> Database Server
form. Server IP address
o Radio box is similar to checkbox but one • $username -> Database Server User
value can be chosen at a time. Name
o File select is the best feature to select one • $password -> Database Server
file from the local machine to server Password
machine at a time. • $DB_Name -> Database Name
o Form tag is used to mention a method The mysqli_connect function uses these
(POST or GET) and control the entire form variables and connect Database server from
controls in the HTML document. PHP scripting. If connection gets fail, output
will be printed with MySQL error code.
32. Discuss in detail about MySQLi functions Otherwise connection is success.
with example . Performing Queries
• Mysqli_connect() Function The main goal of MySQL and PHP
• Mysqli_close() Function connectivity is to retrieve and manipulate
• mysqli_select_db() Function the data from MySQL database server. The
• mysqli_affected_rows() Function SQL query statements are helping with PHP
MySQL extension to achieve the objective
• mysqli_connect_error() Function
of MySQL and PHP connection.
• mysqli_fetch_assoc() Function
“mysqli_query” is a function, helps to
Database Connections:
execute the SQL query statements in PHP
Before accessing MySQL Database,
scripting language.
connect to Database Server machine via
Syntax:
PHP scripting language using
mysqli_query(“Connection Object”,”SQL
Mysqli_connect() Function.
Query”)
Syntax:
Example:
mysqli_connect(“Server Name “,”User
$con=mysqli_connect(“localhost”,”my_user”,”my_p
Name”,”Password”,”DB Name”);
assword”,”Student_DB “);
This function requires four parameters to
$sql=”SELECT student_name,student_age FROM
connect to database server. Database
student”;mysqli_query($con,$sql);
Server name, Database username,
Closing Connection:
password and Database Name.
mysqli_close() Function is used to close an existing
Managing Database Connections
opened database connection between PHP
The below code snippet describes
scripting and MySQL Database Server.
managing database connection methods
Syntax:
and features.
57
mysqli_close(“Connection Object”); mysqli_connect(“Server Name “,”User
Example: Name”,”Password”,”DB Name”);
<?php This function requires four parameters to
$con=mysqli_connect(“localhost”,”$user”,”$ connect to database server. Database
password”,”SCHOOL_DB”); Server name, Database username,
// ....some PHP code... password and Database Name.
mysqli_close($con); The below code snippet describes managing
?> database connection methods and features.
Example of PHP and MySQL Program: <?php
<?php $servername = “localhost”;
$servername = “localhost”; $username = “username”;
$username = “username”; $password = “password”;
$password = “password”; $DB_name = “School_DB”;
$dbname = “school_DB”; // Create connection
$connection = $conn = mysqli_connect($servername,
mysqli_connect(‘$servername ‘, $username, $password,$DB_name);
‘$username’, ‘$password’,’$dbname’); // Check connection
if (mysqli_connect_errno()) if (!$conn) {
{ die(“Connection failed: “ .
echo “Failed to connect to MySQL: “ . mysqli_connect_error());
mysqli_connect_error(); }
} echo “Connected successfully”;
sql_stmt = “SELECT * FROM my_contacts”; ?>
//SQL select query In the above code snippet, three variables are
$result = used to connect to the Database server. They
mysqli_query($connection,$sql_stmt);//exec are
ute SQL statement$rows = • $servername -> Database Server
mysqli_num_rows($result);// get number of Server IP address
rows returned • $username -> Database Server User
if ($rows) { Name
while ($row = mysqli_fetch_array($result)) { • $password -> Database Server
echo ‘ID: ‘ . $row[‘id’] . ‘<br>’; Password
echo ‘Full Names: ‘ . $row[‘full_names’] . • $DB_Name -> Database Name
‘<br>’; The mysqli_connect function uses these
echo ‘Gender: ‘ . $row[‘gender’] . ‘<br>’; variables and connect Database server from
echo ‘Contact No: ‘ . $row[‘contact_no’] . PHP scripting. If connection gets fail, output will
‘<br>’; be printed with MySQL error code. Otherwise
echo ‘Email: ‘ . $row[‘email’] . ‘<br>’; connection is success.
echo ‘City: ‘ . $row[‘city’] . ‘<br>’;
echo ‘Country: ‘ . $row[‘country’] . 34. Explain MySQLi Queries with examples.
‘<br><br>’; The main goal of MySQL and PHP connectivity
} is to retrieve and manipulate the data from
} MySQL database server. The SQL query
mysqli_close($connection); //close the statements are helping with PHP MySQL
database connection extension to achieve the objective of MySQL
?> and PHP connection. “mysqli_query” is a
function, helps to execute the SQL query
33. Explain in details types of MySQL statements in PHP scripting language.
connection method in PHP. Syntax:
Before accessing MySQL Database, connect to mysqli_query(“Connection Object”,”SQL
Database Server machine via PHP scripting Query”)
language using Mysqli_connect() Function. Example:
Syntax: $con=mysqli_connect(“localhost”,”my_user”
,”my_password”,”Student_DB “);
58
$sql=”SELECT student_name,student_age ?>
FROM student”;mysqli_query($con,$sql);
Closing Connection:
mysqli_close() Function is used to close an 35. Explain the growth of the computer
existing opened database connection networking.
between Some keys developed that have occurred
PHP scripting and MySQL Database over past several years included Growth on
Server. popularity of cloud storage and cloud
Syntax: computing.
mysqli_close(“Connection Object”); On behalf of buying physical copies of
Example: games, music and movies, increasingly
<?php downloading (or streaming) and buy digital
$con=mysqli_connect(“localhost”,”$user”,”$ licenses their need via Internet.
password”,”SCHOOL_DB”); Developments on mobile network
// ....some PHP code... infrastructure–both deployments of 4G and
mysqli_close($con); 3G networks (older) that have allow the
?> people in their developed areas who can
Example of PHP and MySQL Program: allow it to their smart mobile phones as
<?php video broadcasting system and as mobile
$servername = “localhost”; television.
$username = “username”; Some of the people underlying and staying
$password = “password”; connected all the times, whenever they at
$dbname = “school_DB”; the workplace, via a home network, via
$connection = public WiFi hotspots or smart phones.
mysqli_connect(‘$servername ‘, Difficulties faced by the service providers
‘$username’, ‘$password’,’$dbname’); (include Google)in expanding their
if (mysqli_connect_errno()) residential fiber optic cables Internet service
{ due to increased competition and
echo “Failed to connect to MySQL: “ . installation cost from other broadband
mysqli_connect_error(); providers.
}
sql_stmt = “SELECT * FROM my_contacts”; 36. Mention some uses of network at business,
//SQL select query home, mobile, social application.
$result = Networks in Business
mysqli_query($connection,$sql_stmt);//exec Computer networks were faster, the Internet
ute SQL statement$rows = became full strength and wireless
mysqli_num_rows($result);// get number of communications has been transformed the
rows returned way of business performed.
if ($rows) { By the usage of latest technologies, such as
while ($row = mysqli_fetch_array($result)) { cloud computing, are being used to allow
echo ‘ID: ‘ . $row[‘id’] . ‘<br>’; globally without scarifying security or limiting
echo ‘Full Names: ‘ . $row[‘full_names’] . user access.
‘<br>’; Internet conversations happen faster, Quick
echo ‘Gender: ‘ . $row[‘gender’] . ‘<br>’; Decision making saves a lot of time.
echo ‘Contact No: ‘ . $row[‘contact_no’] . On e-banking pay or receive money from or
‘<br>’; to the customer via gateways or by online
echo ‘Email: ‘ . $row[‘email’] . ‘<br>’; payments.
echo ‘City: ‘ . $row[‘city’] . ‘<br>’; Transfer of information across the Internet
echo ‘Country: ‘ . $row[‘country’] . can be done here.
‘<br><br>’; Cheaper marketing was carried out.
} Company renewals, license, other
} certificates, bill payments, receipts, invoice,
mysqli_close($connection); //close the stock maintenance, can be done without
database connection any geographical boundaries required here

59
on doing via Internet and computer Through the above social media we share
networks. our taughts in different formats and different
size of files.
Networks at Home The corporate also uses intranets.
Home network gaming and entertainment
was very much needed for both parent and 37. Explain about Internet, Intranet and
children’s. Extranet.
Network at home is a group of devices such INTERNET:
as computers, mobile, speakers, camera, • The Internet, “the Net,” is a worldwide
game system, and printer that connect via system of computer networks.
network with each other. • A network of networks where the users at
Networks at home were connected in two any one computer can, if they have
ways they are Wired network and Wireless permission, get information from any other
network. computer.
o A Wired network system connected • The Internet is a network of global
with network cable. For example connections – comprising private, public,
speakers, CCTV, printers, outdoors, business, academic and government
and scanners etc., with cables. networks – linked by guided, wireless and
A Wireless network is connecting devices fiber-optic technologies.
like tablets(tab), indoor cameras and E- • It was perceived by the Advanced Research
readers, etc., without cables (WiFi). Projects Agency (ARPA) of the U.S.
Network at home plays main role to access government in 1969 and was first
all such as e-banking, e-learning, e- recognized as the ARPANet.
governance, e-health, telemedicine, call • The unique aim was to generate a network
centers, video conferencing, digitalization of that would permit users of a research
memories, can easy to access and use by computer from one university to “talk to”
avoiding lot of time and stacked at queue. research computers on other universities.
• The jargons Internet and World Wide Web
Mobile Networks are frequently used interchangeably, but
Mobile network is the network connecting they are not precisely the same thing; the
devices without cable (wireless). Internet denotes to the global
At land areas network was distributed as communication system, including
cells, each will be served by single – infrastructure and hardware, whereas the
location transceiver, but generally three cell web is one of the services interconnected
sites or a base transceiver station. over the Internet.
This base station provides the cell with
network coverage and other features that INTRANET:
can be utilized for transmission of voice, • It is a private network within an enterprise to
data and other content as well. share company data and computing
Joining together all radio coverage is called resources between the employees.
as wide geographical area.
• It may consist of many interlinked local area
This portable transceivers used to
networks.
communicate with one another with fixed
• It includes connections through one or more
transceivers and moving via more than one
gateway (connects two networks using
cell during transmission.
different protocols together known as
protocol convertor) computers to outside
Social Application
Internet.
Very fast and easiest way to cover all the
people, who they are connected in social
EXTRANET:
network media. For example WhatsApp,
Face book, twitter, blogs, pintrest, LinkedIn, • It is a private network that uses Internet
classmates and so on. technology and the public
telecommunication system to securely
share business’s information with suppliers,

60
vendors, partners, customers, or other • It is the 7th layer, which acts as the user
businesses. interface platform comprising of software
within the system.
38. Discuss about OSI model with its layers.
• Open System Interconnection (OSI) 39. Difference between TCP/IP and OSI
model was found in the year 1934, general Reference Model.
framework that enables network protocols TCP/IP OSI
along with software and systems to be TCP/IP is a set of General framework that
developed based on general set of protocols which enables network
guidelines. governs protocols along with
• It describes the standards for the inter- communications software and systems to
computer communication. among all computers be developed based on
on the Internet. general set of
OSI Layers: guidelines.
1. Physical Layer: TCP/IP protocol tells It describes the
• This is the 1st layer, it defines the electrical how information standards for the inter-
and physical specifications for devices. should be packaged, computer
sent, and received, as communication.
2. Data Link Layer: well as how to get to
• It is the 2nd layer and it guarantees that the its destination.
data transmitted are free of errors. TCP/IP Layers: OSI Layers:
• This layer has simple protocols like “802.3 1. Network Access 1. Physical Layer
for Ethernet” and “802.11 for Wi-Fi”. Layer 2. Data Link Layer
2. Internet Layer 3. Network Layer
3. Network Layer: 3. Transport Layer 4. Transport Layer
• It is the 3rd layer determining the path of the 4. Application Layer 5. Session Layer
data packets. 6. Presentation Layer
• At this layer, routing of data packets is 7. Application Layer
found using IP Addressing.
40. Explain about the development, merits and
4. Transport Layer: demerits in Mobile networks.
• It is the 4th layer that guarantees the • A mobile network or cellular network as it is
transportation/sending of data is successful. made up of a large number of signal areas
• It includes the error checking operation. called cells.
• These cells join to form a large coverage
5. Session Layer: area.
• It is the 5th layer, identifies the established • Users can cross into different cells without
system session between different network losing their connection.
entities.
• It controls dialogues between computers. The generations of mobile networks:
• For instance, while accessing a system • First Generation (1G) 1981- NMT launch
remotely, session is created between your • Second Generation (2G) 1991-GSM Launch
computer and the remote system. • Second to Third Generation Bridge
(2.5)2000 – GPRS launch
6. Presentation Layer: • Third Generation (3G) 2003 - UK 3G launch
• It is the 6th layer that does the translation of • Fourth Generation (4G) 2007
data to the next layer (Prepare the data to • Fifth Generation (5G) 2019+
the Application Layer).
• Encryption and decryption protocols occur Merits:
in this layer such as, Secure Socket Layer • Higher efficiency and productivity of staff
(SSL). • The quality and flexibility of service you offer
your customers
7. Application Layer: • The ability to accept payments wirelessly

61
• Increased ability to communicate in and out represent the department of the
of the workplace organization and so on.
• Greater access to modern apps and
services (2) Name Server
• Improved networking capabilities • Name Server is a main part in the Domain
Name System (DNS).
Demerits: • It translates the domain names to IP
• Costs - new technologies and devices are addresses.
often costly to purchase and require • Name server contains the DNS database
ongoing maintenance and upkeep. which consists of domain names and their
• Workplace distractions - as the range of corresponding IP addresses.
technologies and devices increases, so • There is a need to store large number of
does the potential for them to disrupt domain names for the world wide usage, so
productivity and workflow in the business. plenty of servers are used in the hierarchical
• Additional training needs - staff may need manner.
instructions and training on how to use new • Name servers do the important task of
technology. searching the domain names.
• Increased IT security needs - portable Types of Name Servers
devices are vulnerable to security risks, 1. Root Name Server
especially if they contain sensitive or critical 2. Primary/Master Name Server
business data. 3. Secondary/Slave Name Server

41. Explain briefly the components of DNS. (3) Zone


There are three important components in the • The entire name space is divided into many
Domain Name System. They are different zones.
(1) Namespace • It is the area up to which the server has
(2) Name server access.
(3) Zone • Zone is defined as a group of contiguous
domains and sub domains.
(1) Name Space • If the zone has a single domain, then zone
• The domain names must be very unique and domain are the same.
and appropriate. • Every zone has the server which contains a
• The names should be selected from a database called zone file.
namespace. • Using the zone file, the DNS server replies
• The name space can be organized in two the queries about hosts in its zone. There
ways are two copies of zone files available,
o Flat name space Master file and slave file.
o Hierarchical name space
42. Classify and Explain the IP address.
Flat name space: • Internet Protocol (IP) address is simply the
• It is where the name is assigned to the IP logical address in the network layer.
address. • IP address is used to find the host system in
• They do not have any specific structure. the whole network.
• In this flat name space, some meaningful
names are been given to IP address for Addressing methods:
accessing. • Due to increase in the number of system in
a network there is a need of more
Hierarchical name space: addresses which lead to two addressing
• Is is where the name is made up of several methods i.e.,
parts. (1) IPv4 Address
• The first part may represent the nature of (2) IPv6 Address
organization, the second part may represent
the name of organization, and third part may (1) IPv4 Address

62
• IPv4 address is a 32-bit unique address plenty of servers are used in the hierarchical
given to a computer system. manner. Name servers do the important
• No two systems can have same IP address. task of searching the domain names. While
• An address space is the total number of you searching a website, Local Name
addresses that can be made by that server (provided by ISP) ask the different
protocol. name servers until one of them find out your
• It is determined by the number of bits that answer. At last it returns IP address for that
the protocol uses. domain name. Your computer can now
• If the protocol uses ‘n’ bits then the address connect to the requested webpage stored
space of that protocol would be ‘2n’ on the webserver.
addresses can be formed.
• The number of addresses that can be Types of Name Servers
formed in IPv4 is 232. • There are three types of Name Servers
• There are two ways to represent the IP which control the entire Domain Name
address System:
o Binary notation (1) Root Name Server - top level server which
o Dotted-decimal notation contains entire DNS tree, maintained by
ICANN. There are 13 servers.
• In binary notation the address is expressed (2) Primary/Master Name Server– contains a
as 32-bit binary values. zone resource records. These records are
o For E.g. 00111001 10001001 updatable by domain name holders such as
00111000 00000111 organizations.
(3) Secondary/Slave Name Server – contains
a copy of primary server files. This server
• In dotted-decimal notation the address is
has no authority to update, but reduce the
written in decimal format separated by
workload of master server by sharing the
dots(.).
queries.
o For e.g. 128.143.137.144
44. What is domain name space? Explain.
(2) IPv6 Address
• Domain Name space is an entire collection
• IPv6 address is a 128-bit unique address
Domains, Sub domains and Zones
given to a computer system.
• The entire name space is divided into many
• The number of addresses that can be
different zones. It is the area up to which the
formed in IPv6 is 2128.
server has access. Zone is defined as a
• In IPv6 address, the 128 bits are divided
group of contiguous domains and sub
into eight 16-bits blocks.
domains. If the zone has a single domain,
• Each block is then changed into 4-digit then zone and domain are the same.
Hexadecimal numbers separated by colon
• Every zone has the server which contains a
symbols. E.g.
database called zone file. Using the zone
2001:0000:32313:DFE1:0063:0000:0000:F
file, the DNS server replies the queries
EFB.
about hosts in its zone. There are two
copies of zone files available, Master file
and slave file.

45. Explain how the DNS is working.


43. Explain about the name server?
• When the user enters the URL (consists of
• Name Server is a main part in the Domain
protocol, domain name, folder name, file
Name System (DNS). It translate the
name) in the browser, the system first
domain names to IP addresses.
checks its DNS cache for the corresponding
• Name server contains the DNS database IP address.
which consists of domain names and their
• If the IP address is found in the cache then
corresponding IP addresses.
the information is retrieved from cache. If
• There is a need to store large number of not, then the system needs to perform DNS
domain names for the world wide usage, so query i.e., the system needs to query the
63
resolver about the IP address from Internet
Service Provider (ISP). • Straight-Through Wiring
• Each resolver has its own cache and if it is o In general, the Ethernet cables used
found in that then that information is
for Ethernet connections are
retrieved. If not, then the query is passed to
next domain “straight through cables”.
o These cable wires are in the same
46. What is meant by Registered Jack? Explain sequence at both ends of the cable,
briefly the types of Jacks. which means that pin 1 of the plug
A Registered Jack commonly known as RJ on one end is connected to pin 1 of
is a network interface used for network the plug on the other end (for both
cabling, wiring and jack construction. standard – T568A & T568B).

Types of RJs • Cross-over Wiring


• RJ-45: o If you require a cable to connect two
o The RJ45 connector has eight computers or Ethernet devices
small pins inside to connect eight directly together without a hub, then
small wires in the patch cable. you will need to use a Crossover
• RJ-11: cable instead.
o Mainly used in telephone and o Then the pairs(Tx and Rx lines) will
landlines. be crossed which means pin 1 & 2 of
o No. of pins: 6 pins the plug on one end are connected
• RJ-14 and RJ-61: with pin 3 & 6 of the plug on other
o RJ-14, used for telephone lines end, and vice versa (3 & 6 to pin
o No. of pins: 6 pins 1&2).
• RJ-61
o No. of pins: 8 pins • Roll-over Wiring
• RJ-21: o Rollover cable is a type of null-
o Total no. of pins 50 pins with 25 modem cable that is often used to
pins at one end and 25 pins at connect a device console port to
the other end. make programming changes to the
o It is also called as champ device.
connector or Amphenol o The roll over wiring have opposite
connector. pin arrangements, all the cables are
rolled over to different
arrangements.
o Rollover cable is also known as Yost
cable or Console cable.
47. Explain wiring techniques used in Ethernet
cabling. 48. Explain about RJ45 connector.
• There are three types of wiring • In RJ45 the “RJ” stands for the
techniques to construct the Ethernet Registered Jack and the “45” simply
cable. refers to the number of interface
• It is also known as color coding standard in the cable.
techniques. They are • The RJ45 Ethernet connector is a small
o Straight-Through Wiring plastic cup which will be used to connect
o Cross-over Wiring the wire inside the connector and ready
o Roll-over Wiring to use to connect the Internet.
64
• The RJ45 connector has eight small
pins inside to connect eight small wires 50. Explain the types of network cables
in the patch cable. The eight cables 1. Coaxial Cables:
have eight different colours. • This cable was invented at late
• There are two wiring schemes available 1880’s, which is used to connect the
to terminate the twisted-pair cable on television sets to home antennas.
each end, which are T-568A and T- • This cable is used to transfer the
568B. information in 10 mbps.
• Although four pairs of wires are • The cable is divided into thinnet and
available in the cable, Ethernet uses thicknet cables.
only two pairs: Orange and Green. The • These cables have a copper wire
other two colors (blue and brown) can inside and insulation is covered on
be used ISDN or phone connections. the top of the copper wire to provide
• The Ethernet cables are sometime protection to the cable.
called as RJ45 cables.
2. Twisted Pair Cables:
49. Explain the components used in Ethernet • It is type of cable with two or more
cabling. insulated wires twisted together.
• Ethernet cabling is the process of • It started with the speed of 10 mbps
connecting the computers with other (10BASE-T cable is used). Then the
devices using Ethernet cables. cable is improved and the speed
• The three main components are used in was higher and went to 100 mbps
the Ethernet cabling components are and the cable was renamed as
1. Patch Cable (Twisted pair) 100BASE-TX.
2. RJ45 Connector • This twisted cable has 8 wires which
3. Ethernet Ports are twisted to ignore electromagnetic
4. Crimping Tool interference.
• There are two types of twisted pair
• Patch Cable (Twisted pair) cables,
o These Cables are generally o Unshielded Twisted Pair
made up of 8 wires in different (UTP) and
colors. o Shielded Twisted pair (STP).
• RJ45 Connector
o The RJ45 connector is a small 3. Fiber Optics:
plastic cup which will be used to • This cable is different from the other
connect the wire inside the two cables.
connector and ready to connect • The other two cables had an
the Internet. insulating material at the outside and
• Ethernet Ports the conducting material like copper
o Ethernet port is an opening inside. But in this cable it is of
which is a part of an Ethernet strands of glass and pulse of light is
card. used to send the information.
• Crimping Tool • They are mainly used in Wide Area
o The crimping tool is a physical Network (WAN).
tool which is used to connect the • There are two types of fiber optic
patch wire and the Ethernet cables available, Single-mode and
connector. Multimode.
65
• There are many open source software.
4. USB Cables: so, we can select and use any software
• The Universal Serial Bus are used to that suits our needs.
connect keyboard, mouse and other • The complete options of the software
peripheral devices. can be used without any cost and
• But there are some special network restrictions.
devices used to connect the Internet • We can share our ideas with the team,
through the USB called dongles. write the required code and share it with
many.
5. Serial and Parallel cables: • As we can identify the programming
• Before In the year of 1980s to 1990s techniques of group members, we can
the Ethernet and the USB were not learn many ideas and make our
developed. program writing skills more efficient.
• Then the Serial and Parallel • The coding in open source software are
interface cables are used to connect being groomed by many enthusiastically
the Internet to the system. members of the group. So if we report
problems that we have in the program
51. Differentiate Proprietary and open source they are quickly mended by the group’s
software. effort.
Open source Proprietary software • As we can make changes to the open
software source software, we can add the most
It refers to the software It refers to the software required features in the software
that is developed and that is solely owned by
• Many open source software are very
tested through open the individual or the
collaboration. organization that user friendly.
developed it.
Anyone with the Only the owner or 53. Explain various Open Source License.
academic can access, publisher who holds the • Apache License 2.0
inspect, modify and legal property rights of • BSD 3-Clause “New” or “Revised”
redistribute the source the source code can
license
code. access it.
The project is managed The project is managed • BSD 2-Clause “Simplified” or “FreeBSD”
by a open source by a closed group of license
community of individuals or term that • GNU General Public License (GPL)
development and developed it. • GNU Library or “Lesser” General Public
programmer License (LGPL)
They are not aimed at They are focused on a
unskilled users outside limited market of both • MIT license
of the programming skilled and unskilled • Mozilla Public License 2.0
community. users. • Common Development and Distribution
It provides better There is a very limited License
flexibility which means scope of innovation with • Eclipse Public License
more freedom which the restriction and all.
encourages innovation.
Example: Android, Example: Windows, 54. Write about the development and growth of
Firefox, LibreOffice, MacOS, I tunes, Google
Electronic Commerce.
Ubuntu, FreeBSD, Earth, Adobe Flash
Drupal, GNOME etc., player, etc., Economists describe four distinct waves
that occurred in the Industrial Revolution. In
52. List out the Benefits of Open Source each wave, different business strategies
Software were successful.
66
8. Government to Consumer (G2C)
• The First Wave of Electronic 9. Government to Government (G2G)
Commerce: 1995 -2003
o The Dotcom companies of first
wave are mostly American Business to Business (B2B)
companies. • In B2B E-Commerce, commercial
o Their websites were only in transactions take place between
English. different business organizations,
o The Dotcom bubble had through the Internet.
attracted huge investments to • For example, a cycle company may buy
first wave companies. tyres from another company for their
o The bandwidth and network cycles.
security was very low. • The value per transaction in B2B
• The Second Wave of Electronic transaction is high.
Commerce: 2004 – 2009 • Out-sourcing and Off-shoring are
o The second wave is the rebirth generally associated with B2B E-
of E-Commerce after the dotcom Commerce.
burst. o Out-sourcing - A company’s
o Sellers doing their business in work is hired to another
many countries in many company.
languages. o Off-shoring - The work is
o The rapid development of outsourced to a company, which
network technologies and is outside of its own country.
interactive web offered the
consumers more choices of Business to Consumer (B2C)
buying. • In B2C E-Commerce, commercial
o The increased web users transactions take place between
nourished E-Commerce business firms and their consumers.
companies during the second • It is the direct trade between companies
wave. and end-consumers via the Internet.
• The Third Wave of Electronic • For example, a book company selling
Commerce: 2010 – Present books to customers.
o The third wave is brought on by • This mode is intended to benefit the
the mobile technologies. consumer and works as ’retail store’
o It connects users via mobile over Internet.
devices for real-time and on-
demand transactions. Business to Government (B2G)
• B2G is a business model that refers to
55. List all the E-Commerce business models business organizations sells products,
and explain any four briefly. services or information to Governments
1. Business to Business (B2B) or to its administrations.
2. Business to Consumer (B2C) • For example, A Government or its
3. Business to Government (B2G) administration buys laptops for students
4. Consumer to Business (C2B) from a business.
5. Consumer to Consumer (C2C)
6. Consumer to Government (C2G) Consumer to Business (C2B)
7. Government to Business (G2B)
67
• C2B can be described as a form of E- • Digital publishing sites effectively
Commerce where, the transaction is host the e-books or magazines on
originated by the consumers. the web.
• The consumers will fix a set of • They make profits in a number of
requirements or specific price for a ways such as advertising, selling
service or a commodity. etc.,
• This model is also called as reverse
auction model. 6. Licensing sites:
• For instance, in a travel website a • Licensing sites allow other websites
consumer may specify his dates of to make use of their software.
travel, his source and destination,
number of tickets required and range of 7. Name-your-price sites:
hotel etc. • Name-your-price sites are just like
normal retail sites. In contrast, the
56. Explain any five E-Commerce revenue buyer negotiates with the retailer for
models. a particular product or service.
(Write any five points)
1. Affiliate site: 8. Online Shopping mall site:
• Affiliate site is a form of third party • Online Shopping mall site allows
marketing in which the site owner multi E-Commerce traders to
get paid based on the performance. assemble together on a single
• The affiliate site usually attracts website.
visitors by offering more information
and tutorials on some specific 57. How would you differentiate a traditional
product or a topic. commerce and E-Commerce?
Traditional Commerce E-Commerce
2. Auction site: Carries out commercial
Buying or selling of
• This kind of website auctions items transactions
products and services
electronically on the
on the Internet and levies some physically.
Internet.
commission from the sales. e.g. Customer can easily
https://www.ebay.com/ identify, authenticate Neither customer nor
and talk to the merchant see the other.
3. Banner advertisement site: merchant.
• Banner advertisement site displays Physical stores are not It is always available on
advertisements of other companies feasible to be open all all time and all days of
the time. the year.
in its websites and thereby earns
Products can be Products can’t be
revenue. inspected physically inspected physically
before purchase. before purchase.
4. Bulk-buying sites: Scope of business is
Scope of business is
• Bulk-buying sites collect a number of limited to particular
global. Vendors can
users together all of who want to buy expand their business
area.
similar items; the site negotiates a Worldwide.
discount with the supplier and takes Resource focuses Resource focuses
Supply side. Demand side.
a commission.
Business Relationship Business Relationship is
is Linear. End-to-end.
5. Digital publishing sites:

68
Marketing is one way • They can read the details regarding
One-to-one marketing.
marketing model numbers, prices, features etc.
Payment is made by Payment system is of the product from the website and
cash, cheque, cards mostly credit card and buy at their own convenience.
etc. through fund transfer.
Most goods are It takes time to transport Easy payment:
delivered instantly. goods.
• Payments can also be made through
online.
58. What are the advantages and disadvantages
of E-Commerce to a consumer?
DISADVANTAGES
ADVANTAGES
More time to deliver:
Time:
• E-Commerce is often used to buy
• E-Commerce system is operated on
goods that are not available locally
all days and all the day.
but from businesses all over the
• People can interact with businesses world. Physical goods need to be
at the time of their convenience. transported, which takes time and
costs money.
Speed:
• Speed is a major advantage in E- Difficult to return:
Commerce. • Unlike returning goods to a
• Advanced Electronic traditional shop returning goods
communications systems allow through online is believed to be an
messages to reach across the world area of difficulty. The doubts about
instantaneously. the period of returning, will the
• Communication delay is not a part of returned goods reach source in time,
the Internet or E-Commerce world. refunds, exchange and postage
make one tiresome.
Easy to shop:
• The Internet is too easy to ‘shop Privacy issues:
around’ for products and services • Privacy issues are serious in E-
that may be more cheaper and Commerce.
effective than left to buy only in a • In E-Commerce generating
Brick and Mortar shop. consumer information is inevitable.
Not all the companies use the
Reduced cost: personal information they obtained
• It provides an opportunity to buy at to improve services to consumers.
reduced costs. It is possible to, Many companies misuse the
explore the Internet, identify original information and make money out of
manufacturers, thereby bypass it.
wholesalers and achieve a cheaper
price. Physical product disputes:
• Physical product disputes are a
Near to customers: major disadvantage in E-Commerce.
• Customers can shop from home or • E-Commerce purchases are often
anywhere at their convenience. They made on trust.
don’t need a long wait to talk to a • Though Internet is an effective
salesman. channel for visual and auditory
69
information it does not allow full
scope for our senses. We can see 60. Briefly explain various types of EDI.
pictures of the perfumes, but could The types of EDI were constructed based on
how EDI communication connections and the
not smell their fragrance; we can see
conversion were organized. Thus based on the
pictures of a cloth, but not its quality. medium used for transmitting EDI documents
the following are the major EDI types.
Delivery ambiguity: • Direct EDI
• Since supplying businesses can be • EDI via VAN
conducted across the world, it can • EDI via FTP/VPN, SFTP, FTPS
be uncertain whether they are • Web EDI
indeed genuine businesses or just • Mobile EDI
going to take our money. Direct EDI/Point-to-Point
It is also called as Point-to-Point EDI. It
• It is pretty hard to knock on their establishes a direct connection between
door to complain or seek legal various business stakeholders and partners
recourse. Further, even if the item is individually. This type of EDI suits to larger
sent, it is easy to start bothering businesses with a lot of day to day business
whether or not it will ever arrive on transactions.
time. EDI via VAN
EDI via VAN (Value Added Network) is
where EDI documents are transferred with
59. Write about dimensions of E-Commerce the support of third party network service
Security. providers. Many businesses prefer this
The following are some of the security network model to protect them from the
elements involved in E-Commerce. updating ongoing complexities of network
• Authenticity: conforming technologies.
genuineness of data shared. EDI via FTP/VPN, SFTP, FTPS
• Availability: prevention against data When protocols like FTP/VPN, SFTP and
delay or removal. FTPS are used for exchange of EDI based
• Completeness: unification of all documents through the Internet or Intranet it
business information. is called as EDI via FTP/VPN, SFTP, FTPS.
• Confidentiality: protecting data Web EDI
against unauthorized disclosure. Web based EDI conducts EDI using an web
• Effectiveness: effective handling of browser via the Internet. Here the
hardware, software and data. businesses are allowed to use any browser
• Integrity: prevention of the data to transfer data to their business partners.
being unaltered or modified. Web based EDI is easy and convenient for
• Non-repudiation: prevention against small and medium organizations.
violation agreement after the deal. Mobile EDI
• Privacy: prevention of customers’ When smartphones or other such handheld
personal data being used by others. devices are used to transfer EDI documents
• Reliability: providing a reliable it is called as mobile EDI. Mobile EDI
identification of the individuals or applications considerably increase the
businesse. speed of EDI transactions.
• Review ability: capability of
monitoring activities to audit and
track the operations.

********

All the Best


70

You might also like