Professional Documents
Culture Documents
for Full Book order online and available at all Leading Bookstores
COMPUTER APPLICATIONS
m
co
HIGHER SECONDARY FIRST YEAR
VOLUME I & II
s.
ok
Based on the updated new textbook for the year 2019 - 20
Salient Features
o
Prepared as per the updated new textbook for the year 2019-20.
www.kalviexpress.in
ab
Exhaustive Additional Questions in all Sections.
w
w
w
SURA PUBLICATIONS
Chennai
m
Author : have to carefully understand the topics and exercises.
Mr. Shanmugasundaram Sura’s Computer Applications +1 Standard Guide encompasses
all the requirements of the students to comprehend the text and the
co
(Post Graduate Teacher, Chennai)
evaluation of the textbook.
Head Office: It will be a teaching companion to teachers and a learning
companion to students.
1620, ‘J’ Block, 16th Main Road,
As the guide has been framed based on the ‘New 100 Marks
s.
Anna Nagar, Chennai - 600 040.
Pattern’ and the public exam question paper is 70 Marks,
Phones : 044-26161088, 26161099.
it provides a precise and clear understanding of text and
Mobile : 96001 75757 / 81242 01000 / exercises from the examination perspective.
ok
81243 01000
Exhaustive Additional MCQs, VSA, SA, LA questions with
Whatsapp : 81242 01000
answers are given in each chapter.
e-mail : orders@surabooks.com
website : www.surabooks.com Though these salient features are available in our Sura’s
Computer Applications Guide 11th Standard, I cannot negate the
Our Guides for XI Standard
o
indispensable role of the teachers in assisting the student to
✤
www.kalviexpress.in
Sura’s Tamil understand the Computer Applications.
ab
✤ Sura’s Smart English
I sincerely believe this guide satisfies the needs of the students
✤ Sura’s Mathematics (EM/TM )
✤ Sura’s Physics (EM/TM) and bolsters the teaching methodologies of the teachers.
✤ Sura’s Chemistry (EM/TM)
✤ Sura’s Biology (EM/TM)
I pray the almighty to bless the students for consummate
success in their examinations.
ur
(ii)
Contents
Chapter P. No
No
Title
Volume - I
m
UNIT I - FUNDAMENTALS OF COMPUTER AND WORKING
WITH A TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX)
co
1. Introduction to Computers 1-18
2. Number Systems 19-40
3. Computer Organization 41-58
s.
4. Theoretical Concepts of Operating System 59-72
Working with typical Operating System
5. Part-I Working with Windows 73-92
ok
Part-II Working with Linux
UNIT II - OFFICE AUTOMATION TOOLS
(WORD PROCESSOR, SPREADSHEET AND PRESENTATION)
6. Introduction to Word Processor
7.
o
Working with OpenOffice Calc
93-110
www.kalviexpress.in
111-128
ab
8. Presentation Basics 129-136
Volume - II
UNIT III - WEB PAGE DEVELOPMENT USING HTML AND CSS
ur
Govt. Model Question Paper & Sura’s Model Question Paper - 1 - 2 with Answer Key
253-284
March 2019 Question Paper with Answer Key.
(iii)
TO ORDER WITH US
m
We are grateful for your support and patronage to ‘SURA PUBLICATIONS’
Kindly prepare your order in your School letterhead and send it to us.
co
For Orders contact: 81242 01000 / 81243 01000
DIRECT DEPOSIT
A/c Name : Sura Publications A/c Name : Sura Publications
s.
Our A/c No. : 36550290536 Our A/c No. : 21000210001240
Bank Name : STATE BANK OF INDIA Bank Name : UCO BANK
Bank Branch : PADI Bank Branch : Anna Nagar West
ok
IFSC : SBIN0005083 IFSC : UCBA0002100
www.kalviexpress.in
Bank Branch : ASIAD COLONY Bank Branch : Anna Nagar
ab
IFSC : IDIB000A098 IFSC : KVBL0001154
The Demand Draft / cheque should be sent with your order in School letterhead.
STUDENTS :
w
Sura Publications
1620, ‘J’ Block, 16th Main Road, Anna Nagar,
Chennai - 600 040.
w
(iv)
m
co
s.
COMPUTER APPLICATIONS
www.kalviexpress.in
o ok
ab
VOLUME - I
ur
.s
w
w
w
[1]
m
co
Contents
s.
Volume - I
UNIT I - FUNDAMENTALS OF COMPUTER AND WORKING
ok
WITH A TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX)
www.kalviexpress.in
ab
4. Theoretical Concepts of Operating System 59-72
Working with typical Operating System
5. Part-I Working with Windows 73-92
Part-II Working with Linux
ur
111-128
8. Presentation Basics 129-136
w
w
w
[2]
m
Introduction to Computers
co
Chapter
s.
CHAPTER SNAPSHOT
ok
1.1. Introduction to Computers
1.2. Generations of Computers
1.3. Sixth Generation Computing
1.4. Data and Information
o
1.5. Components of a Computer
www.kalviexpress.in
ab
1.5.1. Input Unit
1.5.2. Central Processing Unit
1.5.3. Output Unit
1.5.4. Memory Unit
ur
[3]
Evaluation
Section - A 9. Which one of the following is the main memory?
(a) ROM (b) RAM
Choose the Correct Answer (c) Flash drive (d) Hard disk
m
[Ans. (b) RAM]
1. First generation computers used
(a) Vacuum tubes (b) Transistors 10. Which generation of computer used IC’s?
(c) Integrated circuits (d) Microprocessors (a) First (b) Second (c) Third d) Fourth
co
[Ans. (a) Vacuum tubes] [Ans. (c) Third]
s.
3. Identify the output device
(a) Keyboard (b) Memory 1. What is a computer?
Ans. (i) A computer is an electronic device that
ok
(c) Monitor (d) Mouse
[Ans. (c) Monitor] manipulates information, or data. It has the
ability to store, retrieve, and process data.
4. Identify the input device (ii) Computer works faster than human being and
(a) Printer (b) Mouse
o given the values more accuracy and reliable
(c) Plotter (d) Projector
2. Distinguish between data and information.
[Ans. (b) Mouse]
interpretation or
6. Which one of the following is used to in ATM processing.
Machines (Eg) 134, 16, 'Kavitha', (Eg) Kavitha is 16 years
(a) Touch Screen (b) Speaker 'C' old.
.s
(a) Post on self Test (iii) The logical operations of ALU promote the
(b) Power on Software Test decision making ability of a computer.
(c) Power on Self Test 5. Write the functions of control unit.
(d) Power on Self Text Ans. The control unit controls the flow of data between
[Ans. (c) Power on Self Test] the CPU, memory and I/O devices. It also controls
the entire operation of a computer.
6. What is the function of memory? 3. What is an input device? Give two examples.
Ans. The primary memory is used to temporarily store the Ans. Input device is used to feed any form of data to the
programs and data when the instructions are ready to computer, which can be stored in the memory unit
execute. The secondary memory is used to store the for further processing.
data permanently. Example: Keyboard, mouse, Scanner, Fingerprint
scanner, Track Ball, Retinal Scanner, Light pen etc.
m
7. Differentiate Input unit and Output unit.
4. Name any three output devices.
Ans. Input Unit Output Unit
Ans. (i) Monitor (ii) Printer
Input unit is used An output unit is any
(iii) Plotter (iv) Speaker
co
to feed any form of hardware component
data to the computer, that conveys (v) Multimedia projectors are the output devices.
which can be stored in information to users in 5. Differentiate optical and Laser mouse.
the memory unit for an understandable form.
Ans. Optical Mouse Laser Mouse
further processing.
s.
Measures the motion Measures the motion and
Example : Example : and acceleration of acceleration of pointer.
Keyboard, mouse etc. Moniter, Printer etc. pointer.
ok
8. Distinguish Primary and Secondary memory. It uses light source Laser Mouse uses Laser
instead of ball to Light.
Ans. Primary Memory Secondary memory judge the motion of
It is used to It is used to store the the pointer.
temporarily store the data permanently. Optical mouse is less Laser Mouse is highly
programs and data
o sensitive towards sensitive and able to work
www.kalviexpress.in
when the instructions
are ready to execute.
surface. on any hard surface.
ab
6. Write short note on impact printer.
It is volatile, the It is non-volatile, the
Ans. Impact printers :
content is lost when content is available even
the power supply is (i) These printers print with striking of hammers or
after the power supply is
switched off. pins on ribbon. These printers can print on multi-
switched off. Eg. ROM,
ur
m
elements called PIXELS.
a part of the CPU where various computing
(iii) Monitors may either be Monochrome which functions are performed on data. The ALU
display text or images in Black and White or performs arithmetic operations such as addition,
can be color, which display results in multiple
co
subtraction, multiplication, division and logical
colors.
operations.
(iv) There are many types of monitors available
such as CRT (Cathode Ray Tube), LCD (Liquid
Control Unit
Crystal Display) and LED (Light Emitting
s.
Diodes).
ALU
(v) The video graphics card helps the keyboard to Input Unit Output Unit
communicate with the screen. Internal
Memory Data Path
(vi) It acts as an interface between the computer and
ok
Control Path
display monitor. Main Memory
1. Explain the basic components of a computer with (iv) Control Unit : The control unit controls the
www.kalviexpress.in
a neat diagram. flow of data between the CPU memory and I/o
ab
Ans. Components of a Computer : devices. It also controls the entire operation of a
The computer is the combination of hardware and computer.
software. Hardware is the physical component of a
(v) Output Unit : An output unit is any hardware
computer like motherboard, memory devices, mon-
itor, keyboard etc., while software is the set of pro- component that convey information to users in
ur
grams or instructions. Both hardware and software an understandable form. Example : Monitor,
together make the computer system to function. Printer etc.
Every task given to a computer follows an Input- (vi) Memory Unit : The Memory Unit is of
process - output cycle (IPO cycle). two types which are primary memory and
.s
(i)
Input unit : Input unit is used to feed any form is switched off. Hard disk, CD-ROM and DVD
of data to the computer, which can be stored ROM are examples of secondary memory.
in the memory unit for further processing.
Example : keyboard, mouse etc.
Main Component
Ans. S.N Generation Period Merits/ Demerits
used
1 First Generation 1942-1955 Vaccum tubes Big in size
Consumed more power
m
Malfunction due to overheat
co
First Generation Computer - ENIAC, EDVAC, UNIVAC 1
ENIAC weighed about 27 tons, size 8 feet × 100 feet × 3 feet and consumed around 150 watts of power
s.
GeneratedLess Heat
Consumed less power compared to first
generation
ok
Punched cards were used
www.kalviexpress.in
ab
Second Generation Computers - IBM 1401, IBM 1620, UNIVAC 1108
3. Third 1964-1975 Integrated Circuits Computers were smaller, faster and more
Generation (IC) reliable
Consumed less power.
Expert Systems
Able to solve high complex problems
including decision making and logical
reasoning
w
m
combined Magenta, Yellow and Cyan inks to Bar Code / QR Code Reader:
create color tones. A black cartridge is also used (i) A Bar code is a pattern printed in lines of
for monochrome output. Inkjet printers work by
different thickness. The Bar code reader scans
spraying jonised ink at a sheet of paper.
co
(ii) They use the technology of firing ink by heating the information on the bar codes transmits to the
it so that it explodes towards the paper in Computer for further processing.
bubbles or by using piezoelectricity in which (ii) The system gives fast and error free entry of
tiny electric currents controlled by electronic information into the computer.
s.
circuits are used inside the printer to spread ink QR (Quick response) Code:
in jet speed.
The QR code is the two dimension bar code
(iii) An Inkjet printer can spread millions of dots of
which can be read by a camera and processed to
ink at the paper every single second.
ok
interpret the image.
www.kalviexpress.in computers?
ab
1. Which of the following led us today to extremely (a) Vacuum Tubes (b) Transistors
high speed calculating device? (c) IC (d) Microprocessor
(a) Laptop (b) Tabulating Machine [Ans. (c) IC]
(c) Abacus (d) ENIAC 7. Which of the following is a Third generation
ur
was invented?
(a) 1837 (b) 1910 (c) 1991 (d) 1836 [Ans. (b) 1971-1980]
[Ans. (a) 1837] 9. In which generation, the Voice Recognition
w
11. Which of the following is not a form of parallel 19. Which of the following is not a non volatile
computing? memory?
(a) bit level (b) instruction level (a) ROM (b) Hard disk
(c) task parallelism (d) Robotics (c) CD-ROM (d) RAM
[Ans. (d) Robotics] [Ans. (d) RAM]
m
12. Which of the following holds the data and 20. Optical Mouse invented in the year.
instructions during the processing? (a) 1968 (b) 1973 (c) 1988 (d) 1981
(a) Input unit (b) output unit [Ans. (c) 1988]
co
(c) Memory unit (d) Software 21. Who invented the computer mouse?
[Ans. (c) Memory unit] (a) Douglas Engelbart (b) Bill English
(c) Apple Lisa (d) Henry Babbage
13. Which unit does the processing of data? [Ans. (a) Douglas Engelbart]
(a) CPU (b) Registers
s.
22. Which device works like a xerox machine?
(c) Input unit (d) Output unit
(a) Retinal scanner (b) OCR
[Ans. (a) CPU]
(c) OMR (d) Scanner
ok
14. Which of the following is the heart of the [Ans. (d) Scanner]
computer?
23. Which device is very safe and convenient for
(a) CPU (b) HDD (c) SDD (d) ANN
security instead of password?
[Ans. (a) CPU]
o (a) Scanner (b) Fingerprint Scanner
15. Expansion of CPU is (c) Track ball (d) Retinal Scanner
(a) Control processing unit
www.kalviexpress.in
(b) Central processor unique
[Ans. (b) Fingerprint Scanner]
ab
(c) Central processing unit 24. Which of the following device uses CCD Electronic
chip?
(d) Control processor unit
(a) OCR (b) BCR
[Ans. (c) Central processing unit]
(c) Voice Input Systems (d) Digital Camera
ur
17. Which of the following operations of ALU [Ans. (b) Changed Coupled Device]
promote decision -making ability of a computer? 26. Expansion of GUI is
(a) Logical (b) Relational
w
m
[Ans. (a) Character Per Second]
29. Which of the following is the logical machine which 37. Which of the following has become the dominant
interprets and executes software instructions? paradigm in computer architecture?
(a) Parallel computing
co
(a) CPU (b) ALU
(c) Control Unit (d) Memory Unit (b) parallel processing
[Ans. (a) CPU] (c) Multi tasking
30. The expansion of VLSI is (d) Multi processing
(a) Verified Logical Scale Integrated Circuits [Ans. (a) Parallel computing]
s.
(b) Very Logical Small Integer Circuits 38. Which of the following concerned with the
(c) Very Large Scale Integrated Circuits interactions between computers and human
(d) Volatile Large Scale Integrated Circuits language?
ok
[Ans. (c) Very Large Scale Integrated Circuits]
(a) Artificial Neurons
31. Who was the inventor of the electronic digital (b) Neural network
computer?
(c) Artificial intelligence
(a) John Vincent Atanasoft
(d) Natural language processing
(b) J. Presper Eckert
o [Ans. (c) Artificial intelligence]
www.kalviexpress.in
(c) John Mauchly
39. The conversion of data to information is called
ab
(d) Charles babbage
[Ans. (a) John Vincent Atanasoft] (a) Data Digitization (b) Data Processing
(b) Data Management (d) All of these
32. The first digital computer name was
[Ans. (b) Data Processing]
(a) EDVAC (b) UNIVACI
ur
(c) ENIAC (d) IBM 1620 40. A set of instructions given to the computer is called
[Ans. (c) ENIAC] (a) Information (b) Data
(c) Input (d) Program
33. Which company developed first digital computer?
[Ans. (d) Program]
.s
(d) Microsoft
[Ans. (a) Atanasoft Berry Computer] (c) Tape Drives (d) RAM
[Ans. (d) RAM]
34. Which of the following are the computer systems
w
inspired by the biological neural networks? 42. Which of the following devices stores the data
(a) NLP (b) IBM permanently?
(c) Robotics (d) ANN [Ans. (d) ANN] (a) HDD (b) Tape drives
w
44. How many types of Keyboards used to input the 55. The expansion of LCD is
data? (a) Liquid Cathode Diodes
(a) 3 (b) 2 (c) 4 (d) 5 (b) Liquid Cluster Display
[Ans. (a) 3] (c) Liquid Crytal Display
45. How many types of pointing device are there? (d) Live Extract Display
[Ans. (b) Liquid Cluster Display]
m
(a) 2 (b) 3 (c) 1 (d) Many
[Ans. (a) 2]
56. The expansion of LED is
46. Which mouse has as many as 12 buttons?
(a) Laser (b) Optical (a) Light Extract Display
co
(c) Mechanical (d) Both a and b (b) Light Emitting Diodes
[Ans. (a) Laser] (c) Liquid Emitting Diodes
47. The mechanical mouse introduced in the year. (d) Liquid Extract Display
(a) 1978 (b) 1988 (c) 1968 (d) 1958 [Ans. (c) Liquid Emitting Diodes]
s.
[Ans. (c) 1968] 57. The expansion of VGA is
48. Who assisted Douglas Engelbart to invent the (a) Visual Graphics Adapter
mouse? (b) Video Graphics Adapter
ok
(a) Berry (b) Steve Kirsch (c) Video Graphics Array
(c) Bill English (d) Bill Gates (d) Voice Graphics Array
[Ans. (c) Bill English] [Ans. (c) Video Graphics Array]
49. Which device is used to enter information directly 58. W
hich device produce graphical output on
into the computer's memory?
o papers?
www.kalviexpress.in
(a) Keyboard (b) Scanner (a) Scanner (b) Touch Screen
ab
(c) Mouse (d) Plotter (c) Plotter (d) Track ball
[Ans. (b) Scanner] [Ans. (c) Plotter]
50. The expansion of USB is
(a) Universal Serial Bus 59. Which of the following is an impact priners
(b) Uniform Serial Bus (a) Inkjet (b) Fax
ur
52. W
hich device is used to input by pressing one or [Ans. (d) All of these]
more switches?
(a) Keyboard (b) Mouse 61. W
hich device is used to produce computer output
on a big screen?
w
[Ans. (b) 3]
62. W
hich of the following is the diagnostic testing
54. The expansion of CRT is
sequence of the computer hardware?
(a) Cathode Ray Tube
(b) Cathode Radio Tube (a) POST (b) BIOS (c) MAR (d) MBR
(c) Cathode Ray Technology [Ans. (a) POST]
(d) Cathode Radio Technology
[Ans. (a) Cathode Ray Tube]
m
partition in a computer? (b) Cliff Berry
(a) MBR (b) Marse (c) Binary (d) Object (c) Presper Eckert, John Mauchly
[Ans. (a) MBR] (d) Earl R Johnson and Atanasoff
co
65. The process of loading an OS in a computer RAM [Ans. (c) Presper Eckert, John Mauchly]
is known as 9. Expand NLP .................. .
(a) POST (b) BIOS (a) National Language Problem
(c) Booting (d) All of these (b) Natural Language Processing
s.
[Ans. (c) Booting] (c) Network Language Program
(d) Network Local Processing
Choose and fill in the blanks
[Ans. (b) Natural Language Processing]
ok
1. The component used in second generation 10. NLP is a component of .................. .
computers is ...................
(a) Expert systems (b) Robotics
(a) Transistors (b) ICs (c) Parallel computing (d) Artificial Intelligence
(c) Vacuum tubes (d) Microprocessors
o [Ans. (d) Artificial Intelligence]
[Ans. (a) Transistors]
11. Every task given to a computer-follows a(n)
2.
www.kalviexpress.in
The Second generation computers belongs to ............... cycle.
ab
period .................... (a) BPO (b) IPO
(a) 1940-1956 (b) 1956-1963 (c) ANN (d) NLP [Ans. (b) IPO]
(c) 1980-1990 (d) 1964-1971
[Ans. (a) 1940-1956] 12. The memory unit is of .............. kinds.
(a) 3 (b) 4 (c) 2 (d) 5
ur
invented by .................
(c) 1964-1971 (d) 1940-1956
(a) John Mauchly (b) Steve Kirsch
[Ans. (b) 1980-1990]
(c) Henry babbaje (d) Presper Eckert
w
6. Name the software introduced in fifth generation [Ans. (b) Steve Kirsch]
computers ................... .
16. The first compute Monitor was released in the
(a) Artificial Neural Networks year ..............
(b) Artificial Intelligence (a) 1974 (b) 1972 (c) 1971 (d) 1973
(c) Robotics [Ans. (d) 1973]
(d) Natural language processing
[Ans. (b) Artificial Intelligence]
m
Computer
1. iii) IBM 1620 3) First Generation
i) First 1) ICS Computer
co
Generation iv) Expert 4) Fourth Generation
System Computer
ii) Second 2) VLSI (a) 4, 3, 1, 2 (b) 3, 1, 2, 4
Generation
(c) 4, 1, 2, 3 (d) 3, 4, 1, 2
s.
iii) Third 3) Parallel [Ans. (d) 3, 4, 1, 2]
Generation Processing
iv) Fourth 4) Vacuum tubes 4.
Generation
ok
i) Information 1) Set of instructions
v) Fifth 5) Parallel competing
Generation ii) Hardware 2) Set of Programs
vi) Sixth 6) Transistors iii) Data 3) Convey some
Generation meaning
(a) 2,3,5,1,4,6
o
(b) 4,6,1,2,3,5 iv) Program 4) Motherboard
www.kalviexpress.in
(c) 6,5,4,1,2,3 (d) 1,3,2,5,6,4 v) Software Set of raw facts
ab
[Ans. (b) 4,6,1,2,3,5] (a) 3, 4, 5, 1, 2 (b) 4, 5, 1, 2, 3
(c) 1, 3, 4, 5, 2 (d) 2, 3, 5, 4,1
2.
[Ans. (a) 3, 4, 5, 1, 2]
i) Expert System 1) Second Generation
ur
5.
m
iii) Computing functions 3) Output Unit generation computers.
are performed on data Ans. (i) Microcomputer
(ii) Portal Computers.
iv) Controls the flow of 4) CPU
co
data between memory 7. Write the developments of Sixth generation
unit and I/O Units. computers.
v) Convey information in Control Unit Ans. (i) Parallel Computing
understandable form (ii) Artificial Neural Networks
s.
(a) 2,4, 1, 3, 5 (b) 1, 3, 5, 2, 4 (iii) Robotics
(c) 2, 3, 1, 4, 5 (d) 2, 4, 1, 5, 3 (iv) Natural Language Processing
[Ans. (d) 2, 4, 1, 5, 3] 8. What is NLP?
ok
Choose the correct statement Ans. Natural Language Processing is the ability of a
computer program to understand human language. It
1. Which of the following statements are true? is a component of artificial intelligence.
(i) Machine language programs are done in first
9. What is the use of Microphone?
generation
o
(ii) Third generation computers are not more reliable Ans. Microphone serves as a voice Input device. It
www.kalviexpress.in
(iii) Voice recognition software developed in fifth
captures the voice data and send it to the Computer.
ab
generation computer 10. Write a note on Digital Camera.
(iv) Micro processors are used in fourth generation Ans. It captures images / videos directly in the digital form.
computer It uses a CCD (Charge Coupled Device) electronic
(a) Only (i) (b) Only (i) and (iv) chip. When light falls on the chip through the lens, it
converts light rays into digital format.
ur
(c) Only (iii) and (iv) (d) Only (i) (iii) and (iv)
[Ans. (b) Only (i) and (iv)] 11. What is use of VGA?
Ans. The screen monitor works with the VGA (Video
Very Short Answers 2 MARKS Graphics Array). The video graphics card helps the
.s
video card.
2. Name the Second generation computers. 12. Write the two main categories of Printer.
Ans. IBM 1401, IBM 1620, UNIVAC 1108. Ans. Printers are divided into two main categories:
w
14. What makes Charles Babbage the father of 22. How the date travel through control bus?
computing? Ans. The date travel in both unidirectional and bidirectional
Ans. Charles Babbage radical ideas and concept of the due to the internal connection with in the computer
Analytical Engine (It contained an ALU, basic flow architecture.
control and integrated memory) makes him the father
23. Name the type of registers are essential for
m
of computing.
instruction execution.
15. What is the goal of neural network approach? Ans. (i) Program counter
Ans. The original goal of the neural network approach was (ii) Instruction Register
co
to solve problems in the same way that a human brain (iii) Memory Address Registers
would. Over time, attention focused on matching (iv) Memory Buffer Register
specific mental abilities, leading to deviations from (v) Accumulator
biology.
s.
24. Expand (a) MAR (b) MBR
16. Write the tools in which nano technology was
Ans. (a) MAR - Memory Address Register
born.
(b) MBR - Memory Buffer Register
ok
Ans. The right tools, such as the scanning tunneling
microscope (STM) and the atomic force microscope 25. Why POST is essential?
Ans. If the hardware is not detected, a particular pattern
(AFM), the age of nano-technology was born.
of beeps will inform about the error. An error
17. Define IPO Cycle. found in the POST is usually fatal (that is, it causes
o
Ans. The functional components of a computer performs.
current program to stop running) and will halt the
www.kalviexpress.in
Every task given to a computer follows an Input-
boot process, since the hardware check is absolutely
essential for the computer's functions.
ab
Process- Output Cycle (IPO cycle). 26. What does reboot mean?
18. Name the different keys available in the keyboard. Ans. It means to reload the operating system.
Ans. There are different set of keys available in the 27. Write the limitations of impact printer.
ur
keyboard such as character keys, modifier keys, Ans. (1) It is slow as compared to non-impact printers
system and GUI keys, enter and editing keys, (2) It is not best suited for graphics
function keys, navigation keys, numeric keypad and (3) It is not possible to obtain colour output.
lock keys.
.s
lines or figures on a computer screen. It is touched electron flow and were used in early computers
to the CRT screen where it can detect faster on the as a switch or an amplifier.
screen as it passes. (ii) Vaccum tubes are big in size and consumed
w
more power.
20. Define Pixels.
2. Define Transistor.
Ans. Pictures on a monitor are formed with picture Ans. (i) The transistor ("transfer resistance") is made up
w
m
4. What is Machine language?
the user to interact with a computer by using the
Ans. (i) Machine language is a collection of binary digits
finger.
or bits that the computer reads and interprets.
(i) It can be quite useful as an alternative to a
(ii) In first generation, machined language was
co
mouse or keyboard for navigating a Graphical
used. User Interface (GUI).
5. What is Integrated circuits? (iii) Touch screens are used on a wide variety of
devices such as computers, laptops, monitors,
Ans. (i) IC is short for Integrated Circuit or Integrated smart phones, tablets, cash registers, and
s.
Chip. information kiosks.
(ii) The IC is a package containing many circuits, (iv) Some touch screens use a grid of infrared beams
pathways, transistors, and other electronic to sense the presence of a finger instead of
utilizing touch-sensitive input.
ok
components all working together to perform a
particular function or a series of functions. 11. Write the sequence of steps in boot process? (or)
6. What is Robotics? Explain the types of booting in computer.
Ans. Booting process is of two types.
Ans. (i) Robot is a term coined by Karel Capek in the
(i) Cold Booting (ii) Warm Booting
o
1921 play RUR (Rossum's Universal Robots).
(i) Cold Booting: When the system starts from
www.kalviexpress.in
(ii) It is used to describe a computerized machine initial state i.e. it is switched on, we call it cold
ab
designed to respond to input received manually booting or Hard Booting. When the user presses
or from its surroundings. the Power button, the instructions are read from
the ROM to initiate the booting process.
7. What is Nano-technology? (ii) Warm Booting: When the system restarts or
when Reset button is pressed, we call it Warm
ur
8. Define POST. the data might not have been stored properly.
Differentiate optical mouse and laser mouse.
Ans. (i) POST (Power-On Self-Test) is the diagnostic
12. Differentiate Impact Printers and Non-Impact
w
and other hardware are working correctly. It uses ribbons / carbon It use ink cartridges and
(ii) If the necessary hardware is detected and found papers to leave the the impressions appear on
to be operating properly, the computer begins to impressions on the the paper with the flow
paper. of ink.
boot.
w
13. Differentiate Dot Matrix Printer and Laser 2. Explain in detail the different types of Mouse.
Printer. [Govt.MQP-2018]
Ans. (i) Mechanical Mouse : A small ball is kept inside
Ans. Dot Matrix Printer Laser Printer
and touches the pad through a hole at the bottom
Printing speed is slow. Printing speed is high. of the mouse. When the mouse is moved, the ball
Suitable for black and Suitable of colour rolls. This movement of the ball is converted
m
white printing. printing. into signals and sent to the computer.
It makes noise while It is silent while printing.
printing. (ii) Optical Mouse: Measures the motion and
acceleration of pointer. It uses light source
co
instead of ball to judge the motion of the pointer.
Long Answers 5 MARKS Optical mouse has three buttons.Optical mouse
is less sensitive towards surface.
1. Explain any two input and output devices.
(iii) Laser Mouse:
s.
Ans. Input Devices :
Measures the motion and acceleration of pointer.
(i) Scanner: Scanners are used to enter the Laser Mouse uses Laser Light Laser. Mouse is
information directly into the computer’s memory. highly sensitive and able to work on any hard
ok
This device works like a xerox machine. The surface.
scanner converts any type of printed or written
information including photographs into a digital 3. Explain Impact Printers with an Example.
format, which can be manipulated by the computer. Ans. Impact Printers :
(i) These printers print with striking of hammers
o
(ii) Finger print Scanner: Finger print Scanner is a
fingerprint recognition device used for computer or pins on ribbon. These printers can print
www.kalviexpress.in
security, equipped with the fingerprint recognition on multi-part (using carbon papers) by using
ab
feature that uses biometric technology. Fingerprint mechanical pressure.
Reader / Scanner is a very safe and convenient (ii) For example, Dot Matrix printers and Line
device for security instead of using passwords, matrix printers are impact printers.
which is vulnerable to fraud and is hard to (iii) A Dot matrix printer that prints using a fixed
ur
Tube), LCD (Liquid Crystal Display) and LED Ans. Non-Impact Printers :
(Light Emitting Diodes). The video graphics (i) These printers do not use striking mechanism
card helps the keyboard to communicate with for printing. They use electrostatic or laser
the screen. It acts as an interface between the
w
technology.
computer and display monitor. (ii) Quality and speed of these printers are better
(ii) Plotter: Plotter is an output device that is used to than Impact printers. For example, Laser
produce graphical output on papers. It uses single printers and Inkjet printers are non-impact
color or multi color pens to draw pictures. printers.
m
bubbles or by using piezoelectricity in which
images. tiny electric currents controlled by electronic
Inkjet Printers: circuits are used inside the printer to spread ink
(i) Inkjet Printers use colour cartridges which in jet speed.
co
combined Magenta, Yellow and Cyan inks to
(iv) An Inkjet printer can spread millions of dots of
create color tones.
ink at the paper every single second.
s.
www.kalviexpress.in
o ok
ab
ur
.s
w
w
w
Chapter
2 Number Systems
m
CHAPTER SNAPSHOT
co
2.1 Number Systems - Introduction 2.4.11 Hexadecimal to Decimal
2.2 Data Representations 2.4.12 Hexadecimal to Binary
2.3 Different Types of Number Systems 2.5 Binary Representation for Signed
s.
2.3.1 Decimal Number System Numbers
2.3.2 Binary Number System 2.5.1 Signed Magnitude
2.3.3 Octal Number System representation
ok
2.3.4 Hexadecimal Number System 2.5.2 1’s Complement
representation
2.4 Number System Conversions
2.5.3 2’s Complement
2.4.1 Decimal to Binary representation
Conversion
o 2.6 Binary Arithmetic
www.kalviexpress.in
2.4.2 Decimal to Octal Conversion 2.6.1 Binary Addition
ab
2.4.3 Decimal to Hexadecimal 2.6.2 Binary Subtraction
Conversion 2.7 Representing Characters in
2.4.4 Conversion of fractional Memory
ur
2.7.5 Unicode
[19]
Evaluation
Part - I Part - II
Choose the Best Answer Very Short Answers
m
1. What is data?
1. Which refers to the number of bits processed by a Ans. The term data comes from the word datum, which
computer’s CPU? means a raw fact. The data is a fact about people,
(a) Byte (b) Nibble
co
places or some objects.
(c) Word length (d) Bit 2. Write the 1’s complement procedure.
[Ans. (c) Word length] Ans. Step 1: Convert given Decimal number into Binary
2. How many bytes does 1 KiloByte contain? Step 2: Check if the binary number contains 8 bits,
(a) 1000 (b) 8
s.
if less add 0 at the left most bit, to make it
(c) 4 (d) 1024[Ans. (d) 1024] as 8 bits.
Step 3: Invert all bits (i.e. Change 1 as 0 and 0 as 1).
3. Expansion for ASCII
ok
(a) American School Code for Information 3. Convert (46)10 into Binary number.
Interchange
(b) American Standard Code for Information 2 46
Interchange 2 23 – 0
(c) All Standard Code for Information Interchange
o
(d) American Society Code for Information
2 11 – 1
www.kalviexpress.in
Interchange 2 5 –0
ab
[Ans. (b)
American Standard Code for 2 2 –0
Information Interchange] Ans. 2 1 –0
4. 2^50 is referred as
(a) Kilo (b) Tera Answer - 4610 = (101110)2
ur
Coded Decimal System? Ans. (28)10 is positive number. 1’s Complement represent
(a) 64 (b) 255 signed numbers (Negative numbers) only. So, (28)10
(c) 256 (d) 128 [Ans. (a) 64]
cannot find 1’s complement.
w
Interchange Code.
(a) 00100110 (b) 11011001
(iii) ASCII – American Standard Code for
(c) 11010001 (d) 00101001
[Ans. (b) 11011001] Information Interchange.
(iv) Unicode.
8. Which amongst this is not an Octal number?
(v) ISCII - Indian Standard Code for Information
(a) 645 (b) 234
(c) 876 (d) 123 [Ans. (c) 876] Interchange.
m
numbers. Each number system is uniquely identified
of Electronics in India in the year 1986-88
by its base value or radix. Radix or base is the count
and recognized by Bureau of Indian Standards
of number of digits in each number system. Radix or
(BIS).
base is the general idea behind positional numbering
co
system. (iii) Now this coding system is integrated with
Unicode.
Example :
Binary Number System - Radix 2 5. Add a) -2210+1510 b) 2010+2510
Octal Number System - Radix 8 Ans. (a) -2210+1510
s.
Decimal Number System - Radix 10 15010 = ?2 2210 = ?2
Hexadecimal Number System - Radix 16.
2 22 2 15
2. Write note on binary number system.
ok
2 11 – 0 2 7 –1
Ans. (i) There are only two digits in the Binary system,
namely, 0 and 1. The numbers in the binary 2 5 –1 2 3 –1
system are represented to the base 2 and the 2 2 –1 2 1 –1
positional multipliers are the powers of 2.
– 0 1
o
(ii) The left most bit in the binary number is called
as the Most Significant Bit (MSB) and it has the
www.kalviexpress.in
largest positional weight.
(1111)2 ⇒ (00001111)2
ab
(iii) The right most bit is the Least Significant Bit (10110)2 ⇒ (00010110)2
(LSB) and has the smallest positional weight. 1's complement = 11101001
3. Convert (150)10 into Binary, then convert that 2's complement = 11101010
Binary number to Octal.
ur
2 75 – 0 (b) 2010+2510
2 37 – 1 2 20 2 25
w
2 18 – 1 2 10 – 0 2 12 – 1
2 9 –0 2 5 –0 2 6 –0
2 4 –1 2 2 –1 2 3 –0
w
2 2 –0 1 – 0 1 –1
1 –0
(10100)2 = (11001)2
w
15010 = (10010110)2
8 bit format of 2010 = 00010100
100101102 = ? 8 bit format of 2510 = 00011001
10 010 110
2010 + 2510 = 00101101
2 2 6
100101102 = 2268. 2010 + 2510 = 001011012
Part - IV 2 98
Detail Answers 2 49 – 0
1. a)
Write the procedure to convert fractional 2 24 – 1
Decimal to Binary
2 12 – 0
b) Convert (98.46)10 to Binary
m
Ans. a) The method of repeated multiplication by 2 2 6 –0
has to be used to convert such kind of decimal 2 3 –0
fractions. 1 –1
co
The steps involved in the method of repeated = 9810 = 1100010
multiplication by 2: 8 bit format of 9810 = 01100010
Step 1: M
ultiply the decimal fraction by 2 and note 1's complement = 10011101
the integer part. The integer part is either 0 Add 1 bit = +1
s.
or 1.
2's complement = 10011110
Step 2: D
iscard the integer part of the previous
product. Multiply the fractional part of the b) -135
ok
previous product by 2. Repeat Step 1 until 2 135
the same fraction repeats or terminates (0).
2 67 – 1
Step 3: The resulting integer part forms a sequence of
0s and 1s that become the binary equivalent 2 33 – 1
of decimal fraction. 2 16 – 1
Step 4: T
o
he final answer is to be written from first 2 8 –0
www.kalviexpress.in
integer part obtained till the last integer part
ab
2 4 –0
obtained.
2 2 –0
b) 98.4610
1. Integer part 1 –0
2 98 13510 = 10000111
ur
2
2 6 –0 3. a) Add 11010102+1011012
2 3 –0 b) Subtract 11010112 - 1110102
w
1 –1 Ans. a) 11010102+1011012
2. Fractional part 1101010
0.46 × 2 = 0.92 = 0
w
+101101
0.92 × 2 = 1.84 = 1 10010111
0.84 × 2 = 1.68 = 1
0.68 × 2 = 1.36 = 1 = 100101112
w
Workshop
1. Identify the number system for the following 192010 = 111100000002
numbers.
192010 = ?8
Ans. S.No NUMBER NUMBER SYSTEM
m
8 1920
1. (1010)10 Decimal Number
system 8 240 – 0
2. (1010)2 Binary Number 8 30 – 0
co
System 3 –6
3. (989)16 Hexadecimal
Number System 1920 = 36008
4. (750)8 Octal Number = 111100000002 = ?16
s.
System 111 1000 0000
5. (926)10 Decimal Number =
System 7 8 0
ok
2. State whether the following numbers are valid or = 78016
not. If invalid, given reason. 16 1920
Ans. S.No STATEMENT
YES / REASON (IF 16 120 – 0
NO INVALID)
7 –8
1. 786 is an Octal
number
o
In. octal
number, the = 192010 = 78016
2 1920
25510 = ?8
2 960 – 0
8 255
2 480 – 0
w
8 31 – 7
2 240 – 0
3 –7
2 120 – 0
w
2 60 – 0 25510 = ?16
2 30 – 0
16 255
2 15 – 0
15 – 15
2 7 –1
15 – F
2 3 –1
25510 = ff16
1 –1
m
2 15 – 1 12610 = 11111102 = 64 + 16 + 8 +2 = 9010
2 7 –1 Octal Equivalent :
2 3 –1 = 10 110 110
co
1 –1
1 3 2
12610 = ?8
= 1328
8 126
Hexadecimal Equivalent :
s.
8 15 – 6
= 101 1010
1–7
12610 = 1768 5 10
ok
12610 = ?16 5 A
16 126 = 5416
7 – 14
o 10110102 = 9010 = 1328 = 5A16
www.kalviexpress.in
14 – F
3) 101011111
ab
12610 = 7E16
Decimal Equivalent :
4. Convert the given Binary number into its = 1 × 28 + 0 × 27 + 1 × 26 + 0 × 25 + 1 × 24 + 1
equivalent Decimal, Octal and Hexadecimal
× 23 + 1 × 22 + 1 × 21 + 1 × 20
ur
number.
1) 101110101 2) 1011010 3) 101011111 = 256 + 64 + 16 + 8 + 4 + 2+ 1 = 35110
Ans. 1) 101110101 Octal Equivalent :
Decimal Equivalent :
.s
= 5658
1 5 F
Hexadecimal Equivalent :
= 10 1110 101 = 15F16
m
2 4 2 7 A616= 101001102
2 2
2 2–0 2 3–1 (B) BE16
2 1–0
co
1–0 1–1 B E
4728= 1001110102 14
11
(B) 145 B = 11 ; E = 14
s.
1 4 5 1010 1110
2 4 2 5 BE16= 101111102
1 100 101 2 2–0 2 2–1
(C) 9BC816
ok
1458= 11001012 1–0 1–0
9 B C 8
(C) 3478
9 11 12 8
3 4 7
o 1001 1011 1100 1000
www.kalviexpress.in
11 100 111
ab
9BC816= 10011011110010002
2 3 2 4 2 7
D) BC916
2 1–1 2 2–0 2 3–1
1–0 1–0 B C 9
1–1
ur
3478= 111001112 11 12 9
6 2 4 7 BC916= 1011110010012
2 6
110 010 100 111 2 3–0 7. Write the 1’s complement number and 2’s
w
6 4 5 2 22
2 11 – 0
110 100 101 2 5 –1
w
6458= 1101001012 2 2 –1
m
1 –1 Binary equivalent of 10 and 15
Binary equivalent of + 13 = 1101 1010 = 00001010
8 bit format = 00001101 1510 = 00001111
co
1's complement = 11110010
Add 1 to LSB = +1 2510 = 00011001
2's complement of -13 = 11110011 (B) - 1210 + 510
(C) - 65
Binary addition of -12 and 5
s.
2 65 1210 = 00001100
2 32 – 1 1's complement = 11110011
ok
2 16 – 1 Add 1 to LSB = +1
2 8 –1 2's complement = 11110100
2 4 –1 -1210 = 11110100
2 2 –0
2 1 –0
o 510 = 00000101
2 23 – 0 210 = 00000010
2 11 – 1 (D) - (210 ) - (-610) = - 210 + 610
w
2 5 –1 (-210) :
2 2 –1 8 bits = 00000010
1's complement = 11111101
w
1 –0
= +1
Binary equivalent of + 46 = 101110
8 bit format = 00101110 2's complement = 11111110
w
m
1. How the information entered in a computer? (b) Least Sign Bit
(a) Knowledge (b) data
(c) Least Significant Bit
(c) ASCII Value (d) BCD [Ans. (b) data]
(d) Left Significant Bit
co
2. In a computer, a data is converted into
(a) ASCII form (b) BCD form [Ans. (c) Least Significant Bit]
(c) Binary form (d) Octal form
11. How many parameters can be considered to know
[Ans. (c) Binary form] the magnitude of the number?
s.
3. Which establishment done convention using (a) 2 (b) 4 (c) 3 (d) 5
groups of 8 bits as a basic unit of storage medium? [Ans. (c) 3]
(a) Apple (b) Microsoft
ok
(c) IBM (d) DELL[Ans. (c) IBM] 12. What are the two symbols used in Binary number
system?
4. Which is considered as the basic unit of measuring (a) 0, 1 (b) + , –
the memory size in the computer?
(a) Bit (b) Byte
o (c) 2, 4 (d) 20, 21 [Ans. (a) 0, 1]
(c) Nibble (d) Word[Ans. (b) Byte] 13. How many unique symbols in Octal number
5.
www.kalviexpress.in
Which is used to measure the number of bits in system?
ab
each word? (a) 4 (b) 16 (c) 2 (d) 8
(a) Word length (b) length [Ans. (d) 8]
(c) Size (d) word size 14. How many procedures are there to convert from
[Ans. (a) Word length] decimal to binary?
(a) 2 (b) 4 (c) 8 (d) 3
ur
binary number?
7. How many bytes does 1 zetta byte contain. (a) 2 (b) 4 (c) 1 (d) 6
[Govt.MQP-2018] [Ans. (c) 1]
w
(a) 290 (b) 270 (c) 230 (d) 240 16. In binary numbers, the signed negative number
[Ans. (b) 270] has a prefix?
(a) – (b) 0 (c) 1 (d) 2
8. Which of the following is not a standard number
w
[Ans. (c) 1]
system?
(a) Pentagon (b) Hexadecimal 17. Which term refers to a part which together with
(c) Decimal (d) Binary another makes up a whole?
w
m
19. How many common coding schemes are used to 25. Expansion of TSCII is
represent a character? (a) Tamil Standard Code for Information Interchange
(a) 2 (b) 3 (c) 4 (d) 5 (b) Tamil Sanskrit Code for Information Interchange
co
[Ans. (c) 4] (c) Tamil Script Code for Interchange Information
(d) Tamil System Code for Information Interchange
20. How many coding schemes are used to represent
character in India? [Ans. (a) Tamil Standard Code for Information
(a) 2 (b) 3 (c) 4 (d) 5 Interchange]
s.
[Ans. (a) 2]
21. Expansion of BCD is 26. Which coding scheme is used to LCD?
(a) Unicode (b) ASCII
ok
(a) Bar Code Decoding
(b) Binary Code Digit (c) EBCDIC (d) BCD[Ans. (d) BCD]
(c) Binary Coded Decimal
(d) Byte Coded Decimal 27. Which of the following programs uses ASCII
code?
o
[Ans. (c) Binary Coded Decimal]
(a) only C (b) only C++
www.kalviexpress.in
22. Expansion of EBCDIC is (c) both C, C++ (d) Java
ab
(a) Extended Byte Code Decimal Information Code [Ans. (c) both C, C++]
28. Which of the programs used Unicode?
(b) Extended Binary Coded Decimal Interchange
(a) C (b) C++
Code
(c) Java (d) None of these
ur
(c) ASCII Code (d) Byte code 31. The hexadecimal equivalent of 1011 is
[Ans. (d) Byte code] (a) 14 (b) 15 (c) 11 (d) 12
24. Expansion of ISCII is [Ans. (c) 11]
w
(a) International Standard Code for Information 32. How many parameters are considered to find the
Interchange magnitude of a number.
(b) International Standard Code for Interchange (a) 3 (b) 4 (c) 2 (d) 5
Information [Ans. (a) 3]
33. Which of the following is the idea behind positional 10. The number of bits a processor can read / write at
numbering systems? a time is called ............ .
(a) Absolute Value (b) Place Volume (a) nibble (b) word
(c) Radix (d) All of these
(c) byte (d) none of these
[Ans. (c) Radix] [Ans. (c) byte]
m
Choose and fill in the blanks
11. A word can have a length of ............... .
1. Data means ............... . (a) 2,5,10 bits (b) 15,25,50 bits
(a) a set of values (b) a set of information
(c) 16,32,64 bits (d) 64,128,255 bits
co
(c) a set of records (d) a set of files
[Ans. (a) a set of values] [Ans. (c) 16,32,64 bits]
2. A number system can be derived from a ........... . 12. The Radix of Hexadecimal is ........... .
(a) bit (b) byte (a) 6 (b) 10 (c) 16 (d) 8
s.
(c) base or radix (d) nibble or word [Ans. (c) 16]
[Ans. (c) base or radix]
13. Which digit is not allowed in hexadecimal number
3. 1 Byte = ...................... bits . system?
ok
(a) 8 (b) 16 (c) 1024 (d) 512 (a) G (b) B (c) E (d) D
[Ans. (a) 8] [Ans. (a) G]
4. The singular form of data is ............. .
(a) Record (b) File 14. A Latin prefix Deci means ................. .
(c) Datum (d) Values (a) 2 (b) 8 (c) 16 (d) 10
o [Ans. (c) Datum] [Ans. (d) 10]
5.
www.kalviexpress.in
"75% of Men likes cricket" is ............. .
ab
(a) Information (b) data 15. The base value of a number is also known as ....... .
(c) knowledge (d) Record (a) length (b) radix
[Ans. (c) knowledge] (c) data (d) Position
6. The processed data is called ............. . [Ans. (b) radix]
ur
(c) nibble (d) bit [Ans. (d) bit] (a) 10.5 (b) 10.25
8. Expansion of BIT is ............... . (c) 10.05 (d) 10.025
(a) BASIC DIGITS [Ans. (b) 10.25]
w
(b) BINARY DIGIT 18. The left most bit on the binary digit carries the
(c) BINARY INFORMATION TECHNOLOGY largest weight is called ............. .
(a) LSB (b) MSB
w
m
(a) Expansion method (c) numerals (d) All of these
[Ans. (d) All of these]
(b) Divide by 2 method
co
(c) Double dabble method 32. The number of Tamil glyphs is about ............ .
(d) None of these[Ans. (c) Double dabble method] (a) 255 (b) 128 (c) 170 (d) 256
[Ans. (c) 170]
22. The decimal equivalent of 0.0112 is .............. .
33. ISCII has been used by .............. .
(a) 0.6875 (b) 0.1875
s.
(a) IBM (b) Apple
(c) 0.1785 (d) 0.5 [Ans. (b) 0.1875] (c) Microsoft (d) IBM & Apple
23. The 4 bit binary equivalent of –5 is .......... . [Ans. (d) IBM & Apple]
ok
34. TSCII is proposed by ............. .
(a) 1101 (b) 0101 (c) 1100 (d) –101
(a) IWG - TSC (b) Apple
[Ans. (a) 1101]
(c) IBM (d) Microsoft
24. The most popular way of representing negative [Ans. (a) IWG - TSC]
numbers in computer systems is .............. .
(a) 1's complement (b) Signed bit
o 35. Entire Tamil alphabets handled by the coding
[Ans. (c) 4]
(a) 0 and 1 (b) 0 and 0
26. Enhanced BCD is .............. bit code.
(c) 1 and 1 (d) All the above
(a) 2 (b) 4 (c) 6 (d) 8 [Ans. (d) All the above]
.s
[Ans. (c) 6]
37. The base of an octal number system is represented
27. EBCDIC primarily used in ................ computers. by ............
(a) 2 (b) 8 (c) 7 (d) None
w
.............
28. EBCDIC uses ................... bit coding scheme.
(a) 2 (b) 4 (c) 8 (d) 16 (a) 3 bits form
w
40. The binary equivalent of a hexadecimal digit C is 3. Write the radix of Decimal, Binary, Octal,
repressed by .............. Hexadecimal Number systems.
(a) 1010 (b) 1011 (c) 1101 (d) 1100 Ans. The radix of Decimal is 10, Binary is 2, Octal is 8
[Ans. (d) 1100] and Hexadecimal is 16.
41. The base value is also known as .............. 4. What is information?
Ans. Information is a set of processed data.
m
(a) Absolute (b) Place
5. What is knowledge? Give example.
(c) Radix (d) System
Ans. Knowledge is identified from the information.
[Ans. (c) Radix]
Example : 10% of Men around the worlds likes
co
football.
Match the following
6. How the data classified based of their size?
1. Ans. Bits, Nibble, Bytes and Word.
7. What is bit?
i) Binary Number 1) Base 16
s.
System Ans. The most basic unit of information in a digital computer
is called a bit. A bit is a binary digit which can be 0, or 1.
ii) Bexa Decimal 2) Base 8
Number System 8. What is byte?
ok
iii) Decimal 3) Base 2 Ans. Byte is a group of 8 bits which is used to represent
Number System a character. A byte is considered as the basic unit of
iv) Octal Number 4) Base 10 measuring the memory size in the computer.
System 9. What is Nibble?
o
(a) 3,1,2,4 (b) 1,2,4,3 (c) 3,1,4,2 (d) 4,3,1,2 Ans. A nibble is half a byte, which is usually a grouping
www.kalviexpress.in
[Ans. (c) 3,1,4,2] of 4 bits. Word is the number of bits a processor can
ab
2. bundle (read/write) at a time.
i) 0 to 9 , A o F 1) Binary 10. What is word length?
Ans. The term word length is used as the measure of the
ii) 0, 1 2) Hexadecimal
number of bits in each word. For example, a word
ur
1. List the types of information stored in a computer. Ans. Radix (or Base) is the general idea behind positional
Ans. (i) Numbers numbering systems. In the numbering system, any
(ii) Text numeric value will be represented through increasing
w
m
Ans. The coding scheme is used to represent a character
15. Which number system is called positional value in the bits.
system?
23. Expand EBCDIC and BCD.
co
Ans. Decimal, octal, binary and hexadecimal number
Ans. (i) EBCDIC - Extended Binary Coded Decimal
systems are called Positional value system.
Interchange Code
16. Name the frequently used number system. (ii) BCD - Binary Coded Decimal
Ans. Decimal number system is the frequently used 24. Expand ASCII and ISCII.
s.
number system. Ans. (i) ASCII -
American Standard Code for
17. How many procedures for converting from Information Interchange.
ok
decimal to binary? (ii) ISCII - Indian Standard Code for Information
Ans. (i) There are two procedures for converting from Interchange.
decimal to binary. 25. What is BCD?
(ii) They are
o Ans. Binary Coded Decimal is a 4-bit code used to
represent the numeric data alone.
Expansion Method
26. What is Standard BCD?
www.kalviexpress.in
Repeated division by 2. Ans. A standard Binary Coded Decimal, an enhanced
ab
format of Binary Coded Decimal, is a 6-bit
18. What is double dabble method?
representation scheme which can represent non-
Ans. The conversion of decimal number into the binary numeric characters.
using Repeated-division method is called double 27. If a user types 256 (in Decimal ) using BCD coding.
ur
Multiply by 2, add next bit (2 × 22) + 1 = 45 Ans. American Standard Code for Information Interchange
(ASCII) is a 7-bit code, which means that only 128
(101101)2 = 4510
(27) characters can be represented.
w
20. How the binary number represented by signed 30. Name any four languages which supports ISCII.
and unsigned bit?
Ans. (i) Devanagari
Ans. In binary, a negative number may be represented (ii) Tamil
by prefixing a digit 1 to the number while a positive
number may be represented by prefixing a digit 0. (iii) Telugu
(iv) Kannada
m
= 37AE16
32. What is sign bit?
Ans. The sign bit indicates the sign of a number and 38. Convert 4A8C16 to binary
determines whether the numerical value is positive
Ans. Given 4 A 8 C
co
or negative.
33. What is Tamil glyphs? Convert each Digit 0100 1010 1000 1100
Ans. Meaning in Tamil, Audio pronunciation, synonyms. = 1001010100011002
34. Convert 22.2510 to binary
39. Convert the decimal 0.25 to binary.
s.
Ans. Integer part Fractional part
Ans. 0.2510 [Govt.MQP-2018]
2 22 0.25 × 2 = 0.50 0
0.25 × 2 = 0.5 = 0
2 11 – 0 0.50 × 2 = 1.00 1 0.5 × 2 = 1= 1
ok
Binary = 0.012.
2 5 –1
2 2 –1 40. Convert EB4A16 to decimal
Ans. EB4A16 = 14 × 163 + 11 × 162 + 4 × 161 + 10 × 160
1 –0
= 57344 + 2816 + 64 + 10
= 10110.012
o
www.kalviexpress.in = 6023410
ab
35. Convert -21 to binary and write its 2’s complement. 41. Convert 729510 to hexadecimal
Ans. (-21)10 [Govt.MQP-2018] Ans. Successive Division Remainders Hex Notation
2 21 9 9
16 72905
2 10 – 1 12 C
ur
2 5 –0 16 4556
12 C
2 2–1 16 284 1 1
1–0 .
16 17 1 1
Binary equivalent of + 21 = 101012
.s
1
8 bit format = 00010101
1’s complement = 11101010 = 9CC1116
Add the negative integer = +1
Short Answers
w
3 MARKS
2’s complement of - 21 = 111010110
1. Why is the number conversion necessary?
36. Convert 1010100.0112 to decimal number. Ans. The number conversion is necessary because the user
w
Ans. 1010100.0112 enters the data into the computer in decimal form
only and the computer is then expected to convert
= 1 × 26 + 0 × 25+ 1 × 24 + 0 × 23 + 1 × 22 + 0 × the decimal number to other number system which
21 + 0 × 2–1 + 1 × 2–2 + 1 × 2–3 it understands.
w
m
3. (300)10 → (?2) → (?8) → (?)16 248, 249 and 250.
Ans.
2 300 8 300 16 300 (248)10=
8 248
2 150 – 0 8 37 –4 16 18 – 12
co
8 31 – 0
2 75 –0 4 –5 1 –2
3 – 7
2 37 –1
(249)10=
18 –1 8 249
2
s.
2 9 –0 8 31 – 1
2 4 –1 3 – 7
2 2 –0 (250)10=
ok
8 250
1 –0 8 31 – 2
3 – 7
(300)10 → (100101100)2 → (454)8 → (12C)16 So the sequence is 365, 366, 367,370,371,372.
4. Perform the following expressions.
o
www.kalviexpress.in 6. Describe the parameters are used to determine
ab
(i) (FACE)16 = (?)2 (ii) (C0FFEE)16 = (?)2 the value of each digit in a number.
Ans. (i) (FACE)16
Ans. (i) The absolute value is the magnitude of a digit in a
F A C E
number.
↓ ↓ ↓ ↓ (ii) For example, the digit 5 in 7458 has an absolute
ur
1110 1111 1010 1110 value of 5 according to its value in the number
(FACE)10 = (1111101011001110)2 line.
(ii) (C0FFEE)16 (iii) The place value of a digit in a number refers to
.s
1100 0000 1111 1111 1110 1110 absolute value x place value of each digit that
the number consists of.
(C0FFEE)16 =(110000001111111111101110)2
(v) The base value of a number is also known as the
w
5. Complete the following Octal numbers. radix, which depends on the type of the number
systems that are being used.
365, 366, 367, .... , .... , .... .
(vi) The value of any number depends on the radix.
Ans. (365)8
w
(iii) Because this system has ten digits. It is also called 12. Write the three common ways of representing a
as a base ten number system or denary number signed binary number?
system.
Ans. In computer technology, there are three common
(iv) Decimal number should always be written with a
ways of representing a signed Binary number.
subscript 10.
(i) Prefixing an extra sign bit to a Binary number.
8. Describe binary number system.
m
(ii) Using one’s complement.
Ans. (i) Computers use binary number system for (iii) Using two’s complement.
counting and arithmetic operations. 13. What are the advantages of two's complement
(ii) The number system has base 2 and it uses 2
co
number?
digits 0 and 1. Ans. The most popular way of representing negative
(iii) A string which have any combination of these numbers in computer systems is two's complement.
two digits is called binary number. It would be The advantages of using this method are :
written as (1001)2. (i) There are no two ways of representing a zero as
s.
in the case with the above two methods.
9. Describe Octal Number system.
(ii) Addition and subtraction can be performed
Ans. (i) The octal number system is playing a vital role effectively.
in digital computer work.
ok
(ii) The octal number system has a base of 8. It 14. Write the steps to find 2's complement.
means that it has eight unique symbols such as Ans. Step 1 : Find 1's complement (Replace 1 by 0 and
0,1 ,2 ,3,4,5 ,6 and 7. 0 by 1
(iii) Thus, each digit of an octal number can have Step 2 : Add 1 to the 1's complement.
any value from 0 to 7.
10. What is MSB, LSB and Binary point? Give
o 15. Find the answer for the following
www.kalviexpress.in
example.
(a) 10112 + 1112 (b) 1002 + 12
ab
Ans. (a) 10112 + 1112
Ans. (i) MSB (Most Significant Bit) – The left most bit
carries the largest weight and hence, is called 1011
the MSB. + 111
(ii) LSB (Lease Significant Bit) – The right most bit 100102
ur
carries the smallest weight and hence, is called
the LSB. 10112 + 1112 = 100102
(iii) Binary Point – It is used to separate the integer (b) 1002 – 12
and fractional part of the binary number.
.s
Eg. (1011.011)2 0 1 2
1 0 1 1 . 0 1 1 100
w
| | | + −1
MSB Binary point LSB 0 11
11. Write a note on hexadecimal number system. 1002 – 12 = 0112
w
Ans. (i) The base or radix is 16. Thus it has 16 possible 16. Write the common coding schemes.
digit symbols. It uses the digits 0 to 9 plus the Ans. The common coding schemes are:
letters A, B, C, D, E and F (with respect to 10, (i) Binary Coded Decimal (BCD),
w
11, 12, 13, 14, 15). (ii) Extended Binary Coded Decimal Interchange
Code (EBCDIC) and
(ii) It is generally used in micro computers.
(iii) American Standard Code for Information
Eg. (ABC)16. Interchange (ASCII).
(iv) Unicode
m
and display individual numbers on their Liquid
Crystal Display (LCD) screens. Ans. 71A3 3 + B = 3 + 11 = 14 = E
18. What negative value does 1001 1011 represent? = 142B A + 2 = 10 + 2 = 12 = C
Ans. The 2's complement fo 10011011 is 01101010 This
co
85CE
represents a 10110.
Therefore 100110112 = –10110 27. Complete the table.
19. Convert B2F16 to octal. 1. 0 + _____ =0
Ans. B2F16 = 1011 0010 1111 (Convert to binary)
2. _____ + 0 = 1
s.
= 101 100 101 111 (Group bits by 3s)
3. 1 + 1 = _____
= 54578 (Convert to octal)
4. 0 + 1 = _____
20. Add the binary numbers 1101012 and 1011112
Ans. 1. 0 2. 1 3. 1 4. 1
ok
Ans. 110101
28. Complete the table.
+
101111
1. 0 – 0 = _____
1100100
o 2. _____ – 0 = 1
3. 1 – 1 = _____
21. Subtract 101111 from 110101
www.kalviexpress.in
Ans. 110101
4. 0 – 1 = _____
ab
Ans. 1. 0 2. 1 3. 0 4. 1
– 101111
000110 29. Complete the table.
1. 0 × 0 = _____
22. Multiply 111 with 101 2. 1 × 1 = _____
ur
110
Ans. 1. 0 2. 0 3. 1 4. Infinite
110
110 31. Answer the following.
w
m
4. 104 = 0.375
32. Answer the following. Long Answers 5 MARKS
co
1. In a decimal to binary conversion, the
first remainder is known as _____ and last 1. Explain Unicode.
remainder is _____. Ans. (i) Unicode is the newest concept in digital
coding. In Unicode, every number has a unique
2. The binary system consists of _____ and character.
s.
_____. (ii) Unicode is the universal character encoding
standard used for representation of text for
3. The hexadecimal number system uses the computer processing.
ok
digits from _____ and _____. (iii) It can be used to store and process all significant
4. 2° = _____ current and past languages. Unicode provides a
unique hex encoded number for every character.
Ans. 1. LSB and MSB 2. 0 and 1
(iv) Unicode is a 16 bit code, which allows for
3. 0 and F 4. 1
o
33. Name the different types of operations that can be
about 65,000 different representations. This is
enough to encode the popular Asian languages
www.kalviexpress.in
performed in Binary arithmetics. (Chinese, Korean, Japanese, etc.).
ab
(v) It also turns out that ASCII codes are preserved.
Ans. 1. Addition 3. Multiplication
Therefore, conversion between ASCII and
2. Subtraction 4. Division Unicode is a simple method (take all one byte
34. How will you convert decimal number into Octal ASCII codes and zero-extend them to 16 bits).
ur
bottom. The remainders also must be taken in octal. (viii) The Unicode Standard has been adopted by
industry leaders such as Apple, HP, IBM,
35. How will you convert decimal number into
Microsoft, Oracle, SAP, Sun, Sybase, and
hexadecimal number?
w
Unisys.
Ans. The conversion of the given decimal number into
(ix) Unicode is required by web users and modern
a hexadecimal number requires the application of
standards.
hex-dabble method which is similar to the double-
w
dabble method with the exception that one has to 2. Suppose a number system has been designed
successively divide the given number by 16 instead with radix 10 with symbols (ordered from small
of 2. to large) A, B, C, D, G, H, I, L, M, N. Convert
w
m
10 –9 only 2 voltage levels.
(iv) For this reason, almost every digital system
Thus (INDIAN)10 = (693609)10 = (A9569)16 utilizes the binary number system (base 2) as
3. Write the steps for converting Decimal to Binary
co
the basic number system of its operation;
numbers. (v) In a binary system, there are only two symbols
Ans. Steps for Decimal to Binary Conversion. or possible digit values, 0 and 1.
Step 1: Divide the decimal number which is to be
Octal Number System :
converted by two which is the base of the
(i) The octal number system is playing a vital role
s.
binary number.
in digital computer work.
Step 2: The remainder which is obtained from
step 1 is the least significant bit of the new (ii) The octal number system has a base of 8.
binary number. (iii) It means that it has eight unique symbols such
ok
Step 3: Divide the quotient which is obtained as 0,1 ,2 ,3,4,5 ,6 and 7.
from the step 2 and the remainder obtained
(iv) Thus, each digit of an octal number can have
from this is the second least significant bit
of the binary number. o any value from 0 to 7.
Step 4: Repeat the process until the quotient (v) The places to the left of the octal point are
positive powers of 8 and places to the right are
www.kalviexpress.in
becomes zero.
ab
Step 5: The last remainder obtained from the negative powers of 8.
division is the most significant bit of Hexademical Number System :
the binary number. Hence, arrange the (i) The hexadecimal system uses base 16 in digital
number from the most significant bit to
systems.
the least significant bit (i.e., from bottom
ur
(i) The term Decimal is derived from a Latin prefix 5. Explain the following terms in detail. (1) ASCII
deci, which means ten. (2) BCD (3) EBCDIC (4) Unicode (or) Discuss
(ii) The Decimal number system has ten digits various encoding systems used for computers.
ranging from 0-9. Because this system has ten
w
digits. [Govt.MQP-2018]
(iii) It is also called as a base ten number system or Ans. (i) ASCII : American Standard Code for Information
denary number system. Interchange (ASCII). [Govt.MQP-2018]
w
(iv) Decimal number should always be written with (ii) BCD : Binary Coded Decimal (BCD)
a subscript 10. (iii) EBCDIC : Extended Binary Coded Decimal
Binary Number System : Interchange Code (EBCDIC)
(i) The decimal number system is not convenient to (i) ASC11 : American Standard Code for
implement in digital system.
Information Interchange (ASCII) is a 7-bit
code, which means that only 128 (27) characters
can be represented. This coding scheme with 6. Explain the following terms in detail. (1) ISCII
which it is possible to represent 256 characters. (2) TSCII
This 8-bit coding scheme is referred to as an Ans. ISCII. (Indian Script Code for Information
8-bit American standard code for information Interchange)
interchange. The symbolic representation of (i) In order to encode Indian languages on
m
letter A using this scheme is 10000012(6510). computers, a common standard for coding
It is a character encoding standard developed Indian scripts is developed which is called
several decades ago to provide a standard way as ISCII. In 1991, the Bureau of Indian
co
for digital machines to encode characters. Standards adopted the Indian Standard Code for
The ASCII code provides a mechanism for Information Interchange (ISCII).
encoding alphabetic characters, numeric digits, (ii) ISCII standard is evolved by a standardization
and punctuation marks. committee during 1986-88. The ISCII document
s.
(ii) BCD : Binary Coded Decimal is a 4-bit code is available as IS13194:1991 from the BIS
used to represent the numeric data alone. For offices.
example, a number like 9 can be represented
ok
using Binary Coded Decimal as 10012 . (iii) Assamese, Bengali (Bangla), Devanagari,
Binary Coded Decimal is mostly used in Gujarati, Gurumukhi, Kannada, Malayalam,
simple electronic devices like calculators and Oriya, Tamil, and Telugu are supported in
microwaves. This is because it makes it easier ISCII. ISCII has been used by IBM for PC-
DOS, Apple for ILK, and several companies are
o
to process and display individual numbers on
developing products and solutions based on this
www.kalviexpress.in
their Liquid Crystal Display (LCD) screens.
representation.
ab
A Standard Binary Coded Decimal, an
enhanced format of Binary Coded Decimal, TSCII. (Tamil Standard Code for Information
is a 6-bit representation scheme which can Interchange)
represent non-numeric characters. This allows
(i) Tamil Standard Code for Information
ur
character-coding scheme used primarily on for the Tamil Standard Code (IWG-TSC).
IBM computers. A total of 256 (28) characters (ii) The Tamil alphabets have soup (247), grantha
can be coded using this scheme. characters (13) and the Tamil numerals (13).
w
(iv) Unicode : This coding system is used in most The number of unique Tamil glyphs to consider
of the modern computers. The popular coding is about 170. Since the number of slots available
in upper-ASCII segment (#128-255) is much
w
handled by ASCII. This coding system is used (iii) Therefore, few Tamil alphabets are to be
in most of the modern computers. included in the native form, and the others are
generated using modifiers (several keystrokes
in sequence).
m
(101.10)16 in binary form
= 1 0 1 . 1 0
0001 0000 0001 . 0001 0000
co
(101.10)2 = (000100000001.00010000)2
(101.10)16 in decimal form
(101.10)2 = 1 × 162 + 0 × 161 + 1 × 160 + 1 × 16–1 + 0 × 16-2
s.
= 256 + 0 + 1 + 0.0625 + 0 = (275.0625)10
Thus (101.10)16 1 = (257.0625)10 (0000100000001.00010000)2
ok
(b) (3674)8 → (?2) = (?)10
(3674)8 in binary from
3 6 7 4
011 110 111 100
o
www.kalviexpress.in (3674)8 = (011110111100)2
ab
(3674)8 in decimal form
(3674)8 = 3 × 83 + 6 × 82 + 7 × 81 + 4 × 80
= 1536 + 384 + 56 + 4 = (1980)10
Thus (3674)8 → (011110111100)2 = (1980)10
ur
= 1 0101 1001
(101011001)2 = (159)16
(101011001)2 = (159)16
w
↓ ↓ ↓
5 3 1
w
(101011001)2 = (531)8
Thus (101011001)2 → (159)16 = (531)8
Chapter
3 Computer Organisation
m
co
CHAPTER SNAPSHOT
s.
3.1. Introduction
ok
3.2. Basics of Microprocessors
3.3. Data Communication between CPU and memory
3.4. Types of Microprocessors
3.4.1. Classification of Microprocessors based on the Data Width
o
3.4.2. Classification of Microprocessors based on Instruction set
www.kalviexpress.in
ab
3.5. Memory Devices
3.5.1. Random Access Memory(RAM)
3.5.2. Types of RAM
3.5.3. Read Only Memory (ROM)
ur
[41]
m
Medium is a good choice. Click Create. A new four, or six slides per page from Tasks pane →
presentation is created. Layouts. Thumbnails can be re-arranged in this
view by dragging and dropping them.
2. Explain view buttons in Impress.
co
Ans. (i) Normal, Outline, Notes, Handout and Slide 3. Explain the purposes served by outline view in
Sorter, These five tabs are called View Buttons. Impress.
There are many toolbars that can be used during Ans. Outline view serves for two purposes.
the slide creation; they are revealed by selecting Making changes in the text of a slide:
s.
them with View → Toolbars. (i) Add or delete text in a slide just as in the Normal
(ii) The actual Workspace section is below the view.
View Buttons. This is where you assemble the (ii) Move the paragraphs of text in the selected slide
various parts of your selected slide. Each view
ok
up or down by using the up and down arrow
is designed to ease the completion of certain buttons (Move Up or Move Down) on the Text
tasks. Formatting toolbar.
(iii) Normal view is the main view for creating (iii) Change the outline level for any of the
individual slides. Use this view to format and
o paragraphs in a slide using the left and right
design slides and to add text, graphics and arrow buttons (Promote or Demote).
animation effects.
www.kalviexpress.in
(iv) Outline view shows topic titles, bulleted lists
(iv) Both move a paragraph and change its outline
ab
level using a combination of these four arrow
and numbered lists for each slide in outline buttons.
format. Use this view to rearrange the order of (v) Comparing the slides with outline that another
slides, edit titles and headings, rearrange the slide is needed, create it directly in the Outline
order of items in a list and add new slides. view then return to review all the slides against
ur
(v) Notes view lets you add notes to each slide that your outline in the Outline view.
are not seen when the presentation is shown.
.s
w
w
w
m
co
s.
COMPUTER APPLICATIONS
www.kalviexpress.in
o ok
ab
VOLUME - II
ur
.s
w
w
w
[137]
m
co
Contents
s.
Volume - II
UNIT III - WEB PAGE DEVELOPMENT USING HTML AND CSS
ok
9. Introduction to Internet and Email 139-158
10. HTML - Structural Tags 159-170
11. HTML - Formatting text, Creating Tables, List and Links 171-182
12.
o
HTML - Adding multimedia elements and Forms 183-196
www.kalviexpress.in
13. CSS - Cascading Style Sheets 197-204
ab
UNIT IV - JAVASCRIPT
14. Introduction to Javascript 205-218
15. Control Structure in JavaScript 219-230
ur
253-284
March 2019 Question Paper with Answer Key.
w
w
[138]
m
co
Chapter Introduction to Internet and Email
s.
CHAPTER SNAPSHOT
ok
9.1. Necessity of Internet
9.2. Types of Network
9.3. Internet and WWW
9.3.1. Domain Name
o 9.3.2. What is URL?
www.kalviexpress.in
9.3.3. Who Governs the Internet?
ab
9.3.4. What is W3C?
9.4. Types of Internet Service
9.4.1. Internet connection and Access Methods
ur
9.8. Browsers
9.8.1. Familiar Internet Browser
w
9.11.1. E-commerce
9.11.2. E-governance
9.12 Safe Surfing on Internet
[139]
Evaluation
Part - I 9. Looking for information on the internet is called
(a) Surfing (b) Searching
Choose the Correct Answer : (c) Finding (d) glancing
m
[Ans. (a) Surfing]
1. What is the expansion of WLAN?
(a) Wireless Local Area Network 10. Safari web browser was developed by
(b) Wired Local Area Network (a) Google
co
(c) Wireless Local Area Netware (b) Apple
(d) Wireless Area Netbande (c) Microsoft
[Ans. (a) Wireless Local Area Network] (d) Linux Corpn. [Ans. (b) Apple]
2. Range of Campus Network is 11. How many types of websites are available?
s.
(a) 10 KM (b) 5 KM (c) 25 KM (d) 20 KM (a) 3 (b) 2
[Ans. (b) 5 KM] (c) 4 (d) 6 [Ans. (b) 2]
ok
3. Each computer on net is called
Part - II
(a) host (b) server
(c) workstation (d) node [Ans. (a) host] Answer to the following questions :
4. The Internet is governed by
o (2 Marks)
(a) ICANM (b) ICANN
1. List any four types of available networks.
www.kalviexpress.in
(c) ICMA (d) ICNNA
ab
Ans. (i) Local Area Network(LAN)
[Ans. (b) ICANN]
(ii) Metropolitan Area Network (MAN)
5. Expansion of W3C (iii) Wide Area Network(WAN)
(a) World Wide Web Consortium (iv) Personal Area Network(PAN)
(b) Wide World Web Consortium (v) Campus Area Network(CAN)
ur
(c) World Web Wide Consortium (vi) Wireless Local Area Network(W-LAN)
(d) World Wide Web Consortum
[Ans. (a) World Wide Web Consortium] 2. Name the two important protocols for internet?
Ans. The internet uses TCP/IP (Transmission Control
.s
4.
7. Hotspot uses which type of network services?
Ans. Internet Corporation for Assigned Names and
(a) LAN (b) PAN
Numbers(ICANN) administers the domain name
(c) WLAN (d) CAN
w
m
sources.
7. What are the components of url addressing?
Ans. Protocol, domain, path, hash and query string.
Part - III
Answer to the following questions :
co
8. What is a website?
Ans. A website is a collection of webpages. For example
(3 Marks)
if there is a company that owns sri company.com 1. Differentiate PAN and CAN network.
then this website will have several webpages like
Ans. PAN CAN
Home, About us, contact us, Testimonials, Products
s.
Range : upto 100 meter Range: upto 5 kms
Services, FAQ's and others. The first page of the
website is called a Home Page. All of these pages Speed : upto 250 kbps Speed : 40kb/s to 1 mb/s
together make up a website. Easy to mange Difficult to manage
ok
9. What is CC and BCC in an email? Used for shorter Used for longer distance
Ans. (i) CC (Carbon Copy) : The CC (Carbon Copy) distance
field allows you to specify recipients who are 2. What is TCP/IP?
not direct addressees (listed in the ''To" field).
This field is optional.
o Ans. The Internet works by using a protocol called TCP/
www.kalviexpress.in
(ii) BCC(Blind Carbon Copy) : The BCC (Blind
IP. TCP/IP allows one computer to talk to another
ab
computer via the Internet through compiling packets
Carbon Copy) field is similar to CC, except the
of data and sending them to right location.
recipients are secret.
10. What is a Static web Page? 3. Write a note on Hotspot internet service.
Ans. Hotspots are sites that offer Internet access over a
ur
Ans. Web pages are called static web pages as they remain
the same whenever it is visited. Examples of static wireless local area network(WLAN) by way of
web pages are small business organizations, school a router that then connects to an Internet service
websites etc. provider. Hotspots utilize Wi-Fi technology, which
.s
which changes when different register numbers commercial or free to the public.
are given. Such websites are called as Dynamic 4. Differentiate Data Card and Dongles.
web page/websites. Ans. Data Card Dongles
w
(ii) Example : Websites of Government and It is a removable Refers to any removable
Entrance Exams. electronic card which component used for
is used for storing for enabling extra security.
w
m
Ethernet or Wi-Fi and the network connects to time.
the Internet using Asymmetric digital subscriber Static Web pages Databases is used to
line ADSL(cable or fibre.) never use databases. generate dynamic content
(ii) Direct Access: This is most common method
co
through queries.
used when travelling. The device e.g. smart
Static web pages Dynamic web pages
phone connects directly to the Internet using
3G/4G mobile networks or public Wi-Fi. directly run on the runs on the server side
browser and do not application programs and
6. Differentiate browser and a search engine with require any server side displays the results.
s.
suitable examples. application program.
Ans. Browser Search Engine Static Web pages are Dynamic web page
easy to develop. development requires
A browser is used to A search engine is a
ok
programming skills.
access websites and software system that is
web whereas a search designed to search for 9. Write a note on W3C.
engine is used to information on the World Ans. W3C stands for world wide web consortium. It
search for particular Wide Web.
o sets standards for the www to facilitate better
information. communication ability. It was established in 1994 by
the creator of www, Tim Berners Lee.
www.kalviexpress.in
Examples Internet xamples of popular
E
10. What are advantages of email?
ab
Explorer, Chrome, search engines are Yahoo,
Firefox, Safari etc., Lycos, Altavista, Hotbot, Ans. Advantages of email :
and are the most Google and Askjeeves. (i) Free delivery
popular web browsers (ii) Global delivery
which Google and (iii)
Instant Delivery
ur
(5 Marks)
7. Differentiate Website and Webpage.
1. Compare the different geographical types of
Ans. Website Web page
w
Network.
A collection of Consists of a Single
multiple documents document displayed by a Ans. (i) LAN - Local Area Network :
displayable by a browser. Range : Upto 10 Km.
browser.
w
m
Location : MAN is a network designed to Range : Upto 50 Kms
extend over an entire city.
Location : Ranges from a single room to
Speed : Upto 5 - 10 Mbps. an entire campus Uses Wifi or
co
Advantages : Wider than LAN. Bluetooth, Radio waves.
Disadvantages : Data rate is slow compared to Speed : 1 Mbps to 54 Mbps.
LAN Cost higher than LAN. Advantages : Portable Installation is quick
(iii) WAN - Wide Area Network : and easy.
s.
Range : Above 1000 Kms Disadvantage : Low Bandwith due to
Location : It Span entire countries and interference.
continents.
ok
2. Explain any five types of internet services.
Speed : Upto 256 Kbps to 2 Mbps.
Ans. (i) Wireless: Radio frequency bands are used in
Advantages : Large geographical Area.
place of telephone or cable networks. One of
Disadvantages : o the greatest advantages of wireless Internet
1. Complicated and Complex. High Cost. connections is the "always-on" connection that
www.kalviexpress.in
2. Requires high Performance. Devices. can be accessed from any location that falls
ab
3. Low security. Cost higher than LAN. within network coverage. Wireless connections
(iv) PAN - Personal Area Network : are made possible through the use of a modern,
which picks up Internet signals and sends them
Range : Upto 100 meters
to other devices.
Location : Used for shorter distance,
(ii) Mobile : Many cell phone and smartphone
ur
controlled by a single person providers offer voice plans with Internet access.
within a single building. Mobile Internet connections provide good
Speed : Up to 250 Kbps. speeds and allow you to access the Internet.
.s
m
the creation of the Internet VoIP stands for Voice-
over-Intenet Protocol, referring, to the protocol file systems. It forms a core part of the KDE
that underlies all Internet communication. software compilation.
(ii) Job search : Nowadays, many people search (iv) Dillo : Dillo is a minimalistic web browser
co
particularly intended for older or slower
for their jobs online as it is quicker and there is
computers and embedded systems. If supports
a larger variety of job vacancies present. People
only plain HTML/ XHTML and images over
can publish resume online for prospective job. HTTP.
Some of the web sites providing this service
(v) Mosaic : Mosaic is the web browser that
s.
are naukri.com. monster.com, summerjob.com, popularized the www and the Internet. It was
recuritmentindia.com. also a client for earlier Internet protocols such
(iii) Stock market updates : Selling or buying as FTP, NNTP and Gopher.
ok
shares sitting on computer through Internet.
5. Classify and explain any five e-commerce parties
Several websites like ndtvprofit.com,
with suitable examples.
moneypore.com, provide information regarding
Ans. Classifying e-commerce according to the parties
investment.
involved:
o
(iv) Travel : One can use Internet to gather (i) Business to consumer (B2C) : Transactions
www.kalviexpress.in
information about various tourist place. It can happen between businesses and consumers.
ab
be used for booking Holiday tours, hotels, In B2C e-commerce, businesses are the ones
train, bus, flights and cabs. Some of the web selling products or services to end-users (i.e.
sites providing this service are goibibo.com, consumers).
makemytrip.com, olacabs.com. (ii) Business to business (B2B) : As its name
(v) Research : Research papers are present online states, B2B e-commerce pertains to transactions
ur
which helps in the researcher doing aliterature conducted between two businesses. Any
review. company whose customers are other businesses
operate on a B2B model.
(vi) Video conferencing : It enables direct face-
(iii) Consumer to business (C2B) : Consumer
.s
4. Write a note on any five Internet browsers other something is bought and sold between two
than that given in the book.an consumers. C2C commonly takes place on
online marketplaces such as eBay, in which one
Ans. Opera. Konqueror, Lynx, Dillo, Mosaic are the other
w
6. Explain the different types of interactions in (iii) G2B (Government to Business): In this case,
e-governance. the e-governance helps the business class
to interact with the government seamlessly.
Ans. Types of Interactions in e-Governance :
It aims at eliminating red-tapism, saving
(i) G2G (Government to Government): When the time, cost and establish transparency in the
exchange of information and services is within business environment, while interacting with
m
the periphery of the government, is termed as government.
G2G interaction. This can be both horizontal,
(iv) G2E (Government to Employees): The
i.e. among various government entities and
co
government of any country is the biggest
vertical, i.e. between national, state and local
employer and so it also deals with employees on
government entities and within different levels
a regular basis, as other employers do. ICT helps
of the entity.
in making the interaction between government
(ii) G2C (Government to Citizen): The interaction and employees fast and efficient, along with
s.
amidst the government and general public raising their level of satisfaction by providing
is G2C interaction. Here an interface is set perquisites and add-on benefits.
up between government and citizens, which E-governance has a great role to play, that
ok
enables citizens to get access to wide variety of improves and supports all tasks performed
public services. The citizens has the freedom to by the government department andagencies,
share their views and grievances on government because it simplifies the task on the one hand
policies anytime, anywhere. o and increases the quality of work on the other.
(d) Peripheral Equipments [Ans. (c) Network] (b) Weird Local Area Network
2. Networks increase (c) Wireless Local Area Network
w
m
5kms? 19. Who is the "father of Internet"?
(a) CAN (b) LAN (a) Charles Babbage
(c) W-LAN (d) None of these (b) Vinton Gray Cerf
co
[Ans. (a) CAN] (c) Bob Kahh
(d) Tim Berner's lee [Ans. (b) Vinton Gray Cerf]
11. Which of the following used by Internet to
transmit data via various types of media? 20. Who involved in the formation of ICANN?
(a) TCP/IP (b) FTP (a) Vinton Gray Cerf (b) Bob Kahn
s.
(c) HTTP (d) Telnet (c) Tim Berner's lee (d) Bill Gates
[Ans. (a) TCP/IP] [Ans. (a) Vinton Gray Cerf]
12. How many things are needed to make 21. Which become an identity and can be access by
ok
the web browser when connected to the Internet?
communication in Internet?
(a) Protocol (b) Intranet
(a) 2 (b) 3 (c) 4 (d) only one
[Ans. (a) 2] (c) Domain name (d) Extranet
[Ans. (c) Domain name]
13. Which protocol is used to keep track of the
millions of users?
o 22. Which protocol used the DNS to deliver mail
www.kalviexpress.in
(a) FTP (b) HTTP (c) TCP (d) IP
and information from computer to computer in
ab
Internet?
[Ans. (d) IP] (a) TCP (b) IP
14. Which protocol reliably transmit the message in (c) FTP (d) HTTP [Ans. (b) IP]
Internet? 23. How many types of domain names are there?
ur
(a) FTP (b) IP (c) TCP (d) HTTP (a) 3 (b) 4 (c) 6 (d) 2
[Ans. (c) TCP] [Ans. (d) 2]
15. Which of the following is the most cost - effective 24. Which of the following description denotes
generic domain name of Non-profit organization?
.s
[Ans. (b) Internet] 25. How many parts are there in IP number?
(a) 3 (b) 5 (c) 2 (d) 4
16. The internet works by using a protocol called [Ans. (d) 4]
w
28. Which of the following is an address where a 37. Which device pick's up Internet signals and sends
webpage can be found on the www? them to other devices?
(a) TCP/IP (b) URL (a) DOT (b) Modem
(c) HTTP (d) None of these
(c) DSL (d) ISDN
[Ans. (b) URL]
[Ans. (b) Modem]
m
29. ICANN was created in the year
(a) 1943 (b) 1991 38. Which of the following smartphone provides offer
(c) 1988 (d) 1998 [Ans. (d) 1998] voice plans with Internet access?
(a) Jio (b) Airtel
co
30. Who runs the Internet?
(a) ICANN (b) W3C (c) Idea (d) All of these
(c) Microsoft (d) Google [Ans. (d) All of these]
[Ans. (a) ICANN] 39. Which offers Internet access over a WLAN?
s.
31. Which corporation helps to avoid already (a) Broadband (b) DSL
registered domain name? (c) Hotspots (d) ISBN
(a) W3C (b) Microsoft
[Ans. (c) Hotspots]
(c) ICANN (d) Internet
ok
[Ans. (c) ICANN] 40. Hotspots utilize the technology is
(a) DSL (b) ISDN
(c) WWW (d) Wi-Fi
32. In which international organization committed to
[Ans. (d) Wi-Fi]
improving the web?
o
www.kalviexpress.in
(a) ICANN (b) W3C 41. Which of the following electronic devices to
ab
connect to the Internet wirelessly through radio
(c) URL (d) Microsoft
waves?
[Ans. (b) W3C]
(a) Wi-Fi (b) Cable
33. W3C established in the year (c) ISDN (d) DSL[Ans. (a) Wi-Fi]
(a) 1993 (b) 1994
ur
(c) 1988 (d) 1998 [Ans. (b)1994] 42. Whih Internet uses multiple data channels to send
large quantities of information?
34. W3C established by (a) Dongles
(a) Tim Berners - Lee (b) Vinton Gray Cref
(b) Broadband
.s
36. In wireless network, the communication happened 44. Which of the following provides extremely fast
w
m
[Ans. (a) 1 and 2]
55. How many ways are there to look for the
46. Expansion of ISDN is information on the web?
(a) Indian Standard Digital Network (a) 4 (b) 3
co
(b) International Services Digital Network (c) 2 (d) only one [Ans. (c) 2]
(c) Integrated Services Digital Network
56. Which of the following is not known, the search
(d) Integrated Services Data Network
engines are used to get information in net?
[Ans. (c) Integrated Services Digital Network]
(a) DSL (b) URL
s.
47. USB, Wi-Fi adapters are often called (c) FTP (d) ISDN[Ans. (b) URL]
(a) Data Card (b) Dongles
57. Which of the following is not a popular search
(c) Cards (d) Pendrives engines?
ok
[Ans. (b) Dongles] (a) Lynx (b) Lycos
48. Which allows to connect to the Internet even when (c) Google (d) Askjeeves
Wi-Fi is not available? [Ans. (a) Lynx]
(a) Dongle (b) Data Card
(c) USB (d) Router
o 58. Which of the following is not used to search for
information on the www?
www.kalviexpress.in
[Ans. (a) Dongle] (a) Yagoo (b) Google
ab
49. How many types of Datacard and Dongle (c) Hotspot (d) Askjeeves
available? [Ans. (c) Hotspot]
(a) 4 (b) 5
59. A browser is used to access
(c) 6 (d) 3 [Ans. (d) 3]
ur
52. How many ways are there to connect Internet? (b) Search Engine Report Page
(a) 2 (b) 3 (c) Social Engine Resource Page
(c) 4 (d) Many (d) System Engine Result Page
w
63. VOIP stands for 71. Which of the following is an interactive way of
(a) Video Online Internet Protocol communicate with teachers in a class?
(b) Voice Over Internet Protocol (a) Chatting (b) Social Networking
(c) Voice Over Internet Processing (c) E-learning (d) None of these
[Ans. (c) E-learning]
(d) Video Order Internet Procedure
m
[Ans. (b) Voice Over Internet Protocol] 72. The first mail was sent by
(a) Bob kahn (b) Ray Tomlinson
64. Which of the following refers buying and selling
(c) Tim Berners lee (d) Vinton Gray lerf
of goods and services using Internet?
co
[Ans. (b) Ray Tomlinson]
(a) E-shopping
(b) E-Banking 73. The first mail was sent in the year
(c) E-paying (a) 1998 (b) 1991
(c) 1988 (d) 1971 [Ans. (d) 1971]
s.
(d) E-commerce [Ans. (d) E-commerce]
74. Which of the following is refered that
65. Which of the following Internet applications
information exchanged between two users over
gather information about various tourist place? telecommunications?
ok
(a) Moneypore.com (b) Snapdeal.com (a) Chatting (b) Social Network
(c) Goibibo.com (d) Paytm.com (c) E-mail (d) E-learning
[Ans. (c) Goibibo.com] [Ans. (c) E-mail]
66. Which of the following is not a largest e-commerce
company?
o 75. A first test e-mail message containing the text
(a) QWERTYVIOP (b) QWERTY
www.kalviexpress.in
(a) Olacabs (b) Flipkart
ab
(c) ELECTRONIC (d) FIRST MAIL
(c) Amazon (d) Paytm
[Ans. (A) QWERTYVIOP]
[Ans. (a) Olacabs]
76. How many fields are required to be filled while
67. Which of the following is used in education that sending an email?
enables direct face - to - face communication using
ur
(a) 4 (b) 6
web cameras?
(a) E-commerce (b) E-conferencing (c) 5 (d) 3 [Ans. (b) 6]
(c) Video conferencing (d) E-chatting 77. Which of the following fields should consist of a
.s
m
81. Which of the following is used to mean a variety of 90. How many classifications of webpages?
forms of hostile, intensive, or annoying software (a) 4 (b) 3
of program code? (c) 2 (d) only one [Ans. (c) 2]
co
(a) Spyware (b) Malware 91. Expansion of EDI is
(c) Freeware (d) Shareware (a) Electronic Data Internet
[Ans. (b) Malware] (b) Electronic Data Interchange
82. Which of the following is not a Malware? (c) Electronic Data Information
s.
(a) Warms (b) Trojan horses (d) E-commerce Data Interchange
(c) Safari (d) Rootkits [Ans. (b) Electronic Data Interchange]
[Ans. (c) Safari]
ok
92. How many classifications of e-commerce?
83. Which scams are attempted by cyber criminals to (a) 6 (b) 5
obtain private information? (c) 4 (d) 7 [Ans. (d) 7]
(a) Spam (b) Botnet
93. Expansion of ICT is
(c) Rootkit (d) Phishing
o
[Ans. (d) Phishing]
(a) Information and Communication Technology
www.kalviexpress.in
84. Which of the following are used to obtain (b) Information and Commerce Trade
ab
administrator level access to a computer? (c) International and Commerce Trade
(a) Phishing (b) Rootkit (d) Indian Commerce Technology
(c) Botnet (d) Worm [Ans. (a) Information and Communication
[Ans. (b) Rootkit] Technology]
ur
85. Which of the following cannot be used with out 94. e-seva centres is an example of
the browsers? (a) E-commerce (b) E-banking
(a) E-commerce (b) Facebook (c) E-governance (d) E-savings
(c) E-mail (d) All of the these [Ans. (c) E-governance]
.s
[Ans. (d) All of the these] 95. Which of the following is not a benefit of
86. Which of the following translates HTML document e-governance?
(a) Reduced corruption
w
into a webpage?
(a) Web browsers (b) Search engines (b) No transparency
(c) Domain name (d) ICAMN (c) Increase Convenience
(d) Reduction in cost
w
98. Safer Internet day celebrated in the month of 7. Every server on the Internet identified by a unique
(a) January (b) March number called..................
(c) December (d) February (a) key (b) primary key
[Ans. (d) February] (c) IP number (d) protocol number
[Ans. (c) IP number]
99. Which refers to removable component used for
m
enabling software protection? 8. ISDN allows to send _____________.
(a) Dongle (b) Data card (a) Data (b) Voice
(c) Hard disk (d) VoIP (c) Video (d) All of these
co
[Ans. (a) Dongle] [Ans. (d) All of these]
Choose and fill in the blanks 9. ........... helps to develop standards for the www.
(a) ICANN (b) TCP/IP (c) W3C (d) WWW
1. Expand CAN..........
[Ans. (c) W3C]
(a) Control Area Network
s.
(b) Conditional Area Network 10. The list of content returned via a search engine to
a user is known as ....................
(c) Campus Area Network
(a) DSL (b) SERP
ok
(d) Campus Area Node
(c) ISDN (d) URL
[Ans. (c) Campus Area Network] [Ans. (b) SERP]
2. The coverage range of WLAN is upto ______ 11. Mozila Firefox supports _____________.
(a) upto 500 kms (a) Windows (b) Mac os
(b) upto 100 kms
o (c) linux (d) Android
www.kalviexpress.in
(c) upto 50 kms (e) All of these [Ans. (e) All of these]
ab
(d) upto 1 km [Ans. (c) upto 50 kms]
12. The first page of the website is called ____________.
3. The speed of PAN is up to _______ (a) Home page (b) Default page
(a) upto 10-100 Mbps (c) Web page (d) Surf page
(b) upto 250 Kbps [Ans. (a) Home page]
ur
m
Choose the incorrect statement iii) upto 256 kbps 3) PAN
to 2 Mbps
1. Which of the following statement is false regarding
iv) upto to 5-10 Mbps 4) W-LAN
co
PAN?
v) upto to 250 kbps WAN
(i) Range upto 100 meters
(ii) Controlled by a single person (a) 5, 3, 1,2, 4 (b) 1, 5, 4, 3, 2
(iii) Speed 40 KB/s to 1 MB/S (c) 2, 4, 5, 1, 3 (d) 4, 2, 5, 1, 3
s.
(iv) Hotspot may connect upto 8 devices [Ans. (d) 4, 2, 5, 1,3]
(v) wider than LAN 3.
(a) (iii), (v) and (i) (b) Only (iv)
ok
Generic
(c) (iii) and (v) (d) Only (iii) Description
Domain Name
[Ans. (c) (iii) and (v)]
i) .gov 1) Network support
2. Which of the following statement is not true Group
regarding static web page? ii) .org 2) Commercial
(i) The layout of the web page is fixed
o orgranisation
www.kalviexpress.in
(ii) It uses database iii) .net 3) Government
ab
organisation
(iii) It requires server side application
iv) .com 4) None profit
(iv) It is easy to develop organisation
(a) (i) and (iv) (b) only (ii) (a) 3, 4, 1, 2 (b) 4, 3, 2, 1
ur
(c) (iii) and (iv) (d) (ii) and (iii) (c) 4, 2, 1, 3 (d) 3, 4, 2, 1
[Ans. (d) (ii) and (iii)] [Ans. (a) 3, 4, 1, 2 ]
4.
Match the following
.s
1. Browser Description
i) Google chrome 1) Exclusively used
Type of Network Range in Mac system
w
simplicity,
iv) PAN 4) 10 to 15 Miles security
v) CAN upto 100 Meters iv) Safari 4) default browser
w
of windows PC.
(a) 4, 1, 5, 3, 2 (b) 3, 4, 1, 5, 2
(c) 5, 2, 1, 3, 4 (d) 1, 3, 4, 2, 5 (a) 3,4,2,1 (b) 4,3,1,2
[Ans. (b) 3, 4, 1, 5, 2 ] (c) 3,4,1,2 (d) 4,3,2,1
[Ans. (c) 3, 4, 1, 2]
m
ii) Crowd Sourcing 2) C2C buying and selling of goods and services, or the
campaign transmitting of funds or data, over an electronic
network, primarily the Internet.
iii) Ebay.com 3) G2C
co
5. What is the use of social networking?
iv) Paying GST using 4) B2C
Internet Ans. Social networking is the use of Internet-based social
v) Car Insurance C2B media programs to make connections with friends,
Renewals family, classmates, customers and clients.
s.
(a) 5,3,1,4,2 (b) 3,5,2,1,4 6. What is voicemail?
(c) 3,5,1,2,4 (d) 3,5,1,4,2
Ans. Voicemail is a system of sending messages over the
[Ans. (b) 3, 5, 2, 1, 4]
phone. Calls are answered by a machine which connects
ok
6.
you to the person you want to leave a message for and
Description Virus they can listen to their messages later.
i) hijacking webcam 1) oBotnet 7. What is E-mail?
ii) Keylogger 2) Spam Ans. Email is short for 'electronic mail' similar to a letter, it is
www.kalviexpress.in
software used sent via the Internet to a recipient.
ab
iii) Replicate in 3) Malicions 8. What is dongle?
great speed spyware
Ans. Dongle refers to removable component used for
iv) became "Zombie" 4) Trojan horse enabling software protection. E.g.USB, Wi-Fi.
computer
9. What is E-governance?
v) Electronic Junk mail worm
ur
m
a online identity and can be access by the web
browser when connected to internet. Ans. Job Search service are naukri.com, monster.com,
summerjob.com,recuritmentindia.com.
16. What do you mean by IP number?
26. What is computer virus?
co
Ans. Every server on the internet has an IP number, a
unique number consisting of four parts separated by Ans. A computer virus is a small piece of software that
dots. The IP number is the server's address.
can spread from one infected computer to another.
17. What is URL? The virus could corrupt, steal, or delete data on your
Ans. A URL is an address that shows where a particular
s.
computer even erasing everything on your hard drive.
page can be found on the World Wide Web. URLis an
abbreviation for 'Uniform Resource Locator (URL)'. A virus could also use other programs like your email
program to spread itself to other computers.
18. Who Governs the internet?
ok
Ans. ICANN is the internet society, which is a voluntary 27. What is "Zombie" computer?
membership of organization takes the responsibility Ans. A botnet is a group of computers connected to the
to promote global information through the internet Internet that have been compromised by a hacker
technology. o using a computer virus or Trojan horse. An individual
19. Expand (i) DSL (iii) ISDN computer in the group is known as a "zombie"
www.kalviexpress.in
Ans. (i) Digital Subscirber Line computer.
ab
(ii) Integrated Services Digital Network. 28. What is Internet Telephony?
20. Write a note on DSL. Ans. Internet telephony (e.g. Skype) is another common
Ans. DSL, which stands for Digital Subscriber Line, uses communications service made possible by the
existing 2-wire copper telephone line connected to creation of the Internet.
ur
Ans. ISDN (Integrated Services Digital Network) allows Short Answers: 3 MARK
users to send data, voice and video content over
digital telephone lines or standard telephone wires. 1. Write a note on extranet.
w
22. What are the two methods are there to access the Ans. An extranet is a private network that uses Internet
internet? technology and the public telecommunication system
Ans. (i) Direct Method to securely share part of a business's information or
w
3. Write the description of the following Generic 7. Write a short note on online payment.
Domain Name. Ans. The rising boom of online payments in India has
(i) .com (ii) .gov given way to many new entrants in the industry such
(iii) .org (iv) .net (v) . edu as Paytm etc who are majorly wallet driven payment
Generic Domain companies. This growth has been driven by rapid
Ans. Description
m
Name adoption led by the increasing use of smartphones,
(i) .com Commercial Organisation tablets and speedy access to internet through
(ii) .gov Government institution broadband, 4G etc
What is the use of social networking?
co
(iii) .org Non-profit Organisation 8.
(iv) .net Network Support Group Ans. (i) Social networking is the use of internet-based
(v) .edu Educational Institution social media programs to make connections with
friends, family, classmates, customers and clients.
4. What is broadband? (ii) Social networking can be done for social
s.
Ans. (i) This high-speed Internet connection is provided purposes, business purposes or both. The
through either cable or telephone companies. One programs show the associations between
of the fastest options available, broadband Internet individuals and facilitate the acquisition of new
ok
uses multiple data channels to send large quantities contacts.
of information. (iii) Examples of social networking includes
(ii) The term broadband is shorthand for broad Facebook.
bandwidth. Broadband Internet connections such
o 9. What is e-banking?
as DSL and cable are considered highbandwidth Ans. e-banking (Online banking) , also known as internet
connections.
www.kalviexpress.in
(iii) Although many DSL connections can be considered
banking, it is an electronic payment system that
enables customers of a bank or other financial
ab
broadband, not all broadband connections are institution to conduct a range of financial transactions
DSL. through the financial institution's website.
5. Write a note on DNS. 10. Write a short note on e-learning.
Ans. The heart of intranets and the internet is called as the Ans. (i) E-learning is utilizing electronic technologies
ur
Protocol (IP) uses this Internet address information communicate with teachers, professors or other
and the DNS to deliver mail and other information students in a class.
from computer to computer (iii) Sometimes it is delivered live, where you can
w
(ii) They provide information about products or communicating, grading participation, giving
services for sale through www servers. Using the assignments and conducting tests.
internet services customers can submit specific 11. What do you mean by 'Malicious software'?
w
product queries and request specific sales quotes. Ans. (i) Malware is short for "malicious software:'
(iii) Example amazon.com is a www based bookshop Malware is used to mean a "variety of forms
on the internet where information on all types of of hostile, intrusive, or annoying software or
international books can be found and books can be program code.
ordered online. (ii) Malware could be computer viruses, worms,
Trojan horses, dishonest spyware, and malicious
rootkits.
m
is periodically sent back to the originating cyber exertions.
criminal over the Internet. Key logging software
18. Expand (i) VSNL (ii) SERP (iii) SID
is widely available and is marketed to parents
co
or businesses that want to monitor their kids' or Ans. (i) Videsh Sanchar Nigam LTD
employees' Internet usage. (ii) Search Engine Result Page
13. What is computer worm? (iii) Safer Internet Day.
Ans. (i) A computer worm is a software program that
Long Answers:
s.
can copy itself from one computer to another, 5 MARKS
without human interaction.
(ii) Worms can replicate in great volume and with 1. Explain the structure of email.
great speed. Ans. Structure of email : Click the Compose button and
ok
(iii) For example, a worm can send copies of itself then writing an e-mail contents.
to every contact in your email address book When sending an e-mail message, several fields
and then send itself to all the contacts in your are required to be filled:
contacts' address books.
(i) The To field is where you type the e-mail address
14. Write a note on spam.
o
Ans. Spam in the security context is primarily used to describe
of the person who is the recipient of your message.
www.kalviexpress.in
email spam. Unwanted messages in your email inbox. (ii) The From filed should contain you e-mail address.
ab
Spam, or electronic junk mail, is a nuisance as it can (iii) If you are replying to a message, the To and
clutter your mailbox as well as potentially take up space From fields are automatically filled out; if
on your mail server. However, spam messages can it's a new message, you'll need to enter them
contain links that when clicked on could go to a website manually.
ur
of computers. A rootkit could be installed on your without opening and reading the full e-mail.
computer by a cybercriminal exploiting a vulnerability This field is optional.
or security hole in a legitimate application on your PC (v) The CC (Carbon Copy) field allows you to
w
and may contain spyware that monitors and records specify recipients who are not direct addressees
keystrokes. (listed in the "To" field). This field is optional.
16. What is sandboxing? (vi) The BCC (Blind Carbon Copy) field is similar
w
Ans. Sandboxing is a software managing techinque through to CC, except the recipients are secret. Each
which programs that are suspected to be infected with BCC recipient will receive the e-mail, but will
a virus can be run. The programs are run is a separated not see who else received a copy. The addressees
w
memory area and therefore cannot damage the operating (anyone listed in the "To" field) remain visible
systems. to all recipients. This field is optional.
17. What is IoT? (vii) Finally, the Message Body is the location
Ans. The Internet of Things (IoT) is the network of physical you type your main message. It often contains
devices, such as vehicles, home appliances, and other your signature at the bottom; similar to a hand-
items embedded with electronics, software, sensors, written letter.
2. Explain the advantages of email. messages designed to appear as though they are
Ans. The main advantages of email are listed below : from legitimate sources. For example, the message
(i) Free delivery : Sending an e-mail is virtually would try to lure you into giving your personal
free, outside the cost of Internet service. There information by pretending that your bank or email
is no need to buy a postage stamp to send a service provider is updating its website and that
letter. you must click on the link in the email to verify
m
(ii) Global delivery : E-mail can be sent to nearly your account information and password details.
anywhere around the world, to any country. (v) Rootkit: A rootkit is a collection of tools that
(iii) Instant delivery : An e-mail can be instantly are used to obtain administrator-level access to
co
sent and received by the recipient over the a computer or a network of computers. A rootkit
Internet. could be installed on your computer by a cyber
(iv) File attachment : An e-mail can include one criminal exploiting a vulnerability or security
or more file attachments, allowing a person to hole in a legitimate application on your PC and
s.
send documents, pictures, or other files with an may contain spyware that monitors and records
e-mail. keystrokes.
(v) Long-term storage : E-mails are stored
electronically, which allows for storage and 4. Explain any four familiar Internet Browser.
ok
archival over long periods of time. Ans. (i) Google Chrome is a freeware familiar web browser
(vi) Environmentally friendly : Sending an e-mail developed by Google Inc. It is best for its speed,
does not require paper ( Paperless), cardboard, simplicity, security, privacy and customization
or packing tape, conserving paper resources. features. Google Chrome supports on Android
3.
o
Explain any five Internet threat to be common
4.0 or higher, iOS 6.0 or higher, Mac OSX 10.6 or
www.kalviexpress.in
people. higher and Windows (XP sp2 or higher) and Linux
ab
system.
Ans. (i) Computer worm: A computer worm is a software
program that can copy itself from one computer to (ii) Mozila Firefox is a free and open source web
another, without human interaction. Worms can browser developed by Mozilla Foundation and
replicate in great volume and with great speed. For Mozilla Corporation. FireFox is default browser in
Ubuntu . It supports Windows, Mac OS X, Linux
ur
(ii) Botnet: A botnet is a group of computers the first or default browser for a Windows Pc. It is
connected to the Internet that have been developed by Microsoft.
compromised by a hacker using a computer virus (iv) Safari is a web browser developed by Apple Inc.
w
or Trojan horse. An individual computer in the and comes with OS X and iOS. Some version of
group is known as a "zombie" computer. safari browser also supports in Windows Operating
(iii) Spam: Spam in the security context is primarily System. Exclusively used in Apple Mac system.
w
used to describe email spam. Unwanted messages 5. Explain the detail about the do's and don't of safe
in your email inbox. Spam, or electronic junk mail, surfing on Internet.
is a nuisance as it can clutter your mailbox as well
Ans. Following is the do's and don't of safe surfing on
w
m
(iii) Check your security and privacy settings -
(vi) Don't talk to strangers online or offline - Don't
Make sure your social network privacy settings
meet up with strangers and let your parents
are secured so only your friends can see your know if a stranger has tried to get in contact
personal information and use your privacy
co
with you online.
settings to restrict who can see your posts, (vii) Listen to the adults who know - Adults will
videos and photos always be worried about you. Help set their
(iv) Password safety - Sharing your password mind at rest and avoid chatting online with
with your parents is a sensible idea, but avoid strangers.
s.
sharing your password with your friends, even (viii) Be wary of unsecured or unknown websites
if they promise they won't tell anyone! Also, - When shopping online, use reputable and
when setting your password, make sure it isn't known retailers.
ok
something people may guess such as your pet's (ix) Be careful what links you click on - Avoid
name. Use a mixture of letters, numbers and clicking links in an email, Instant Message or
upper and lower case characters on your social network unless you are sure the
o message is from someone you know.
www.kalviexpress.in
ab
ur
.s
w
w
w
Chapter
10 HTML - S tructural Tags
m
co
CHAPTER SNAPSHOT
s.
10.1. Introduction to HTML
10.2. Writing HTML document
ok
10.2.1. HTML Document Structure
10.2.2. Structural Tags of HTML
o 10.2.3. HTML Tools
10.3. HTML Attributes
10.6. Comments
10.7. Container and Empty Elements
.s
w
w
w
[159]
m
reasons: if(n==5)
(i) To collect demographic information about who {
has visited the Web site. continue;
co
(ii) Sites often use this information to track how }
often visitors come to the site and how long document, write (n+” <br >”);
they remain on the site. }
(iii) It helps to personalize the user’s experience on In the above example, which writes out the value of
s.
the Web site. n starting from 0, when n is equal to 5 the continue
(iv) Cookies can help store personal information statement is executed and the continue statement
about users so that when a user subsequently continues the loop without printing the value.
ok
returns to the site, a more personalized (or)
experience is provided. Attributes of <input> tag:
38. JavaScript also supports statements used to modify
(i) Type: This attribute is used define the type of
flow control, specifically break and continue. The
control to be created by <input> tag.
For example :
o
break statement will terminate the loop early.
(ii) Name: This attribute of <input> tag is used to
break;
} (iv) Size: This is used to set the width of the input
text in terms of characters. It is applicable only
document, write (n+” <br >”);
for textbox and password boxes.
}
.s
In the above example, which writes out the value (v) Maxlength: This attribute of <input> tag is
of n starting from 0, when n is equal to 5 the break used to set the length of the input character
statement is executed and the loop is terminated (number of characters to be inputted) to the
w
The continue statement will skip back to the loop textbox and password boxes.
condition check. When the continue statement is
w
w
m
Part- A 9. Which feature is used to call attention to the reader?
Note : (i) All questions are compulsory. (a) Italics (b) Underline
co
(ii) Choose the most appropriate answer from (c) Highlight (d) Bold
the given four alternatives and write the 10. The tag used to insert an image in HTML.
option code and the corresponding answer. (a) IMG (b) PIC
(15 × 1 = 15)
(c) Image (d) Picture
s.
1. Which type of booting is used when a system restarts?
11. The extension of CSS file is :
(a) Touch boot (b) Real boot
(a) .csc (b) .htm
(c) Warm booting (d) Cold booting
(c) .ssc (d) .css
ok
2. 2^30 is referred as :
12. The file reload into the browser uses the shortcut
(a) Peta (b) Mega
key :
(c) Giga (d) Tera
(a) F4 (b) F5 (c) F2 (d) F3
3. Display devices are connected to the computer 13. What will be the output for the following Snippet?
through :
o for(var a=0; a<15; a++)
www.kalviexpress.in
(a) SCSI port (b) VGA connector
ab
{
(c) USB port (d) PS / 2 port if(a= =4)
4. Operating System is a : {
(a) System Software (b) Component break;
(c) Application Software
ur
}
(d) Hardware
document.write(a+"<br>");
5. Which is displayed at the top most part of the
}
window?
.s
[276]
Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019 277
Part - B }
Answer any 6 questions. Question No. 24 is compulsory. else
(6 × 2= 12) {
16. What is a Computer? alert("you are not eligible to get Driving Licence");
17. What is Open Source? }
m
18. Write a note on Library functions. 31. What are the advantages of using CSS?
19. What is Cell Pointer? 32. Write about <script> tag.
20. Explain with the help of an example the difference 33. Write an HTML code to scroll the following message
co
between container and empty elements of HTML. in a web page.
21. What are the types of list in HTML? "Welcome to HTML"
22. Write the output of the following HTML code:
Part - D
<HTML>
Answer all questions. (5 × 5 = 25)
s.
<BODY>
34. (a) Explain the basic components of a computer
<OL>
with a neat diagram.
<L1> Keyboard
(or)
ok
<L1> Monitor
(b) Convert (155) 10 into Binary, Octal and
<L1> Speaker
Hexadecimal equivalent.
</OL>
</BODY>
o 35. (a) Explain in detail about the different mouse
</HTML> actions.
www.kalviexpress.in
23. List out the popular image formats.
(or)
ab
(b) How many types of views are provided by
24. Write about the shortcut keys for LEFT, RIGHT,
Impress to its users? Explain them.
CENTER and JUSTIFIED alignments.
36. (a) E
xplain the five internet applications with
Part - C
suitable examples.
ur
278 Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019
m
3. (b) VGA connector (i) The tags which are required only opening tag
4. (a) System Software is known as empty elements or tags.
co
5. (a) Title bar (ii) Example : <br>.
6. (d) All of the above 21. HTML supports three types of lists viz. numbered,
unnumbered and definition. These lists are called
7. (d) 2
as Ordered List, Unordered List and Definition List
8. (b) <>
s.
respectively.
9. (c) Highlight 22. Output :
10. (a) IMG
ok
11. (d) .css
12. (b) F5 1. Keyboard
2. Monitor
13. (d) 0123 3. Speaker
www.kalviexpress.in
(d) Worms
ab
23. (i) GIF : Graphical Interchange Format
Part - B
(ii) JPEG : Joint Photographic Experts Group
16. Computer is an electronic device that processes the (iii) PNG : Portable Network Graphics
input according to the set of instructions provided to
(iv) SVG : Scalable Vector Graphics.
ur
2. RIGHT Ctrl + R
18. Pre-defined functions are already defined in the 3. CENTER Ctrl + E
JavaScript library which are also called Library 4. JUSTIFIED Ctrl + J
w
19. Cell pointer is a rectangle element which can be (a) Add : 11012 + 10102 (b) Subtract : 101002 – 11112
1101 10100
moved around the worksheet. The cell in which the
1010 1111
cell pointer is currently located is known as "Active
w
10111 0101
cell".
Ans : 101112 Ans : 01012
26. A mobile operating system controls a mobile device
and its design supports wireless communication and
Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019 279
different types of mobile applications. It operates on 31. (i)
Maintainability : CSS are also defined and
smart phones Tablets and Digital Mobile devices. stored as separate files. So, the style and
(i) Google Android appearance of a web page can be dynamically
changed and maintain with less effort.
(ii) Apple iOS
(ii) Reusability : The styles defined in CSS can
m
(iii) Blackberry
be reused in multiple HTML pages.
(iv) Symbian
27. Five fox is a browser. Thunderbird is email client (iii) Easy to understand : The tags in web pages
are well organized with style specifications and
co
which can be used view emails received.
S. therefore it is easy to understand.
Thunderbird Firefox
No 32. JavaScript can be implemented using <script>....
1. Ubuntu has in-built Firefox is a browser is </script> tags. The <script> tag containing JavaScript
email software called access internet.
s.
can be placed anywhere within in the web page, but
Thunderbird.
it is normally recommended that it should be kept
2. It is the default email It is the default browser
within the <head> tags. The <script> tag alerts the
client in ubuntu. for ubuntu.
ok
3. Thunderbird is a Firefox is also Mozilla browser program to start interpreting all the text
Mozilla product. product. between these tags as a script commands.
33. Output :
28. Page orientation refers to how the document will
be displayed on screen and printed. There are two <html>
different orientations :
o <head>
Contains one or more Makes up a website. Both hardware and software together make the
webpages.
computer system to function.
30. Output :
w
280 Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019
Memory Unit :
(i) The Memory Unit is of two types which are
primary memory and secondary memory. The
primary memory is used to temporarily store
m
the programs and data when the instructions
are ready to execute. The secondary memory
is used to store the data permanently.
co
(ii) The Primary Memory is volatile, that is, the
content is lost when the power supply is
switched off. The Random Access Memory
(ii) The computer is the combination of hardware
s.
(RAM) is an example of a main memory.
and software. Hardware is the physical
component of a computer like motherboard, (iii) The Secondary memory is non volatile, that is,
memory devices, monitor, keyboard etc., while the content is available even after the power
ok
software is the set of programs or instructions. supply is switched off. Hard disk, CD-ROM
Both hardware and software together make the and DVD ROM are examples of secondary
computer system to function. memory.
Central Processing Unit :
o
CPU is the major component which interprets and
(or)
www.kalviexpress.in
executes software instructions. It also control the
(b)
ab
(15510)
operation of all other components such as memory, Binary :
input and output units. 155
2
Arithmetic and Logic Unit : 2 77 – 1
ur
2 2–0
division and logical operations. 1–0
Control Unit
(155)10 = (10011011)2
w
ALU
Binary :
Input Unit Output Unit
8 155
w
Internal
Memory Data Path 8 16 – 3
Control Path 2–3
Main Memory (155)10 = (233)8
w
Hexadecimal :
Secondary Storage
Components of a Computer 16 155
9 – 11
(155)10 = (9b)16 ∴ 11 = b
Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019 281
35.(a) by the creation of the Internet VoIP stands
Action Reaction for Voice-over-Intenet Protocol, referring,
Point to an item Move the mouse to place the pointer to the protocol that underlies all Internet
on the item. communication.
Click an item Point to the item on your screen and (ii) Job search : Nowadays, many people search
m
quickly press and release the left
mouse button. for their jobs online as it is quicker and there is
Right click an Point to the item on your screen and a larger variety of job vacancies present. People
item then quickly press and release the can publish resume online for prospective job.
co
right mouse button. Clicking the right Some of the web sites providing this service
mouse button displays a short cut are naukri.com. monster.com, summerjob.
menu from which you can choose
com, recruitmentindia.com
among a list of commands that apply
(iii)
S tock market updates : Selling or
s.
to that item.
Double-click an Point to the item on your screen and buying shares sitting on computer through
item then quickly press and release the left Internet. Several websites like ndtvprofit.
ok
mouse button twice. com, moneypore.com, provide information
Drag an item Point to an item and then hold down regarding investment.
the left mouse button as you move (iv) Travel : One can use Internet to gather
the pointer.
information about various tourist place. It can
Drag and drop Point to an item and then hold down
o
the left mouse button as you move
be used for booking Holiday tours, hotels,
www.kalviexpress.in
the pointer and when you have train, bus, flights and cabs. Some of the web
ab
reached the desired position, release sites providing this service are goibibo.com,
the mouse button. makemytrip.com, olacabs.com.
(or) (v) Research : Research papers are present online
(b) There are 5 types of views are provided by Impress. which helps in the researcher doing aliterature
ur
Outline view : Outline view shows topic titles, via web cameras, microphones, and other
bulleted lists and numbered lists for each slide in communication tools. Video conferencing
outline format. can enable individuals in distant locations to
w
Notes view : Notes view lets you add notes to each participate in meetings on short notice, with
slide that are not seen when the presentation is shown. time and money savings.
w
282 Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019
m
border lines around the table. The value <th>70</th>
of the border attribute should be non zero </tr>
</table>
co
value in pixels. If its value is zero, HTML
displays the table without border. The </body>
default value is Zero in most the browsers. </html>
(iv) Bordercolor: It is used to apply the colour (or)
s.
to the border lines. (b) The important attributes used with the <form>
(v) Align: It is used to set the position of the tag are method and action attributes.
table within the browser window. Left is (i) Method : The method attribute of the
ok
the default position. Right or centre may form tag is used to identify how the form
be the value of align attribute. element names and values will be sent to
(vi) BGcolor: It is used to apply background the server. The get method will append
colour to the table. the names of the form elements and their
(vii) Height and Width :
o These two values to the URL. The post method will
</head>
<table border=11> Active Server Pages (ASP).
<tr> General Format of <form> tag
w
</tr> </Form>
<tr>
w
<th>XI</th>
<th>75</th>
Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019 283
38.(a) JavaScript offers the switch statement as an var grade=0;
alternate to using multiple if...else statements. var marks=prompt(“Please enter your
The switch statement is especially useful when marks/100:”,”0”);
testing all the possible results of an expression. if(marks>90)
The syntax of a switch structure is as given {grade=1;}
m
switch(expression) else if(marks>70)&&(marks<=90)
{ {grade=2;}
case label 1: else if(marks>50)&&(marks<=70)
co
statements 1; {grade=3;}
break; else if(marks>40)&&(marks<=50)
{grade=4;}
case label2:
else
s.
statements2;
{grade=5;}
break;
switch(grade)
case labeln;
ok
{
statements - n; case 1:
break; document.write(“Your Grade is Outstanding..”);
default: o break;
case 2:
www.kalviexpress.in
statements; document.write(“Your Grade is Excellent..”);
ab
} break;
Example : case 3:
<Html> document.write(“Your Grade is Good..”);
<Head> break;
ur
<Body> default:
<script language=”javascript” type=”text/ document.write(“Your Grade is Poor and have
javascript”> to re-appear Exam..”);
w
(or)
w
w
284 Sura’s XI Std - Computer Applications - March Question Paper with Answer- 2019
(b)
Function Description Example Result
toUpperCase() Used to convert given string into uppercase x=”java” JAVA
x.toUpperCase();
toLowerCase() Used to convert given string into lowercase x=”JAVA” java
x.toLowerCase();
m
length Used to find length of the given string x=”JAVA” 4
x.length();
parseInt() Used to convert the given float value into an integer parseInt(34.234); 34
co
parseFloat() Used to convert the given string into a integer parseInt(“34.23”); 34.23
s.
www.kalviexpress.in
o ok
ab
ur
.s
w
w
w