You are on page 1of 79

This is only for Sample Materials

for Full Book order online and available at all Leading Bookstores

COMPUTER APPLICATIONS

m
co
HIGHER SECONDARY FIRST YEAR
VOLUME I & II

s.
ok
Based on the updated new textbook for the year 2019 - 20

Salient Features
o
 Prepared as per the updated new textbook for the year 2019-20.

www.kalviexpress.in
ab
 Exhaustive Additional Questions in all Sections.

ovt. Model Question Paper-2018, (Govt. MQP-2018) Questions are


 G
incorporated at appropriate sections.
ur

 Govt. Model Question Paper - 1 (2018) with Answer Key.

 Sura’s Model Question Paper - 1 - 2 with Answer Key.

March 2019 Question Paper with Answer Key.


.s


w
w
w

SURA PUBLICATIONS
Chennai

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

2019-20 Edition Note from Publisher


© Reserved with Publishers
It gives me great pride and pleasure in bringing to you Sura’s
Computer Applications Guide Volume-I & II for +1 Standard. A
ISBN : 978-93-5330-069-2
deep understanding of the text and exercises is rudimentary to have
Code No : SG 272 an insight into Computer Applications. The students and teachers

m
Author : have to carefully understand the topics and exercises.
Mr. Shanmugasundaram Sura’s Computer Applications +1 Standard Guide encompasses
all the requirements of the students to comprehend the text and the

co
(Post Graduate Teacher, Chennai)
evaluation of the textbook.
Head Office:  It will be a teaching companion to teachers and a learning
companion to students.
1620, ‘J’ Block, 16th Main Road,
 As the guide has been framed based on the ‘New 100 Marks

s.
Anna Nagar, Chennai - 600 040.
Pattern’ and the public exam question paper is 70 Marks,
Phones : 044-26161088, 26161099.
it provides a precise and clear understanding of text and
Mobile : 96001 75757 / 81242 01000 / exercises from the examination perspective.

ok
81243 01000
 Exhaustive Additional MCQs, VSA, SA, LA questions with
Whatsapp : 81242 01000
answers are given in each chapter.
e-mail : orders@surabooks.com
website : www.surabooks.com Though these salient features are available in our Sura’s
Computer Applications Guide 11th Standard, I cannot negate the
Our Guides for XI Standard
o
indispensable role of the teachers in assisting the student to

www.kalviexpress.in
Sura’s Tamil understand the Computer Applications.
ab
✤ Sura’s Smart English
I sincerely believe this guide satisfies the needs of the students
✤ Sura’s Mathematics (EM/TM )
✤ Sura’s Physics (EM/TM) and bolsters the teaching methodologies of the teachers.
✤ Sura’s Chemistry (EM/TM)
✤ Sura’s Biology (EM/TM)
I pray the almighty to bless the students for consummate
success in their examinations.
ur

✤ Sura’s Computer Science (EM/TM)


✤ Sura’s Commerce (EM/TM) - Publisher
✤ Sura’s Economics (EM/TM)
✤ Sura’s Accountancy (EM/TM)
Sura Publications
✤ Sura’s Business Maths (EM)
All the Best
.s

Also available 1 Mark Q & A (EM/TM),2,3 Marks


(EM/TM) and 5 Marks Q & A (EM / TM) for all
Subjects.
w

For More Information - Contact


w

Doubts in Our Guides : enquiry@surabooks.com


For Order : orders@surabooks.com
Contact : 96001 75757 / 8124301000
w

Whatsapp : 8124201000 / 9840926027


Online Site : www.surabooks.com
For Free Study Materials Visit http://tnkalvi.in

(ii)

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Contents
Chapter P. No
No
Title
Volume - I

m
UNIT I - FUNDAMENTALS OF COMPUTER AND WORKING
WITH A TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX)

co
1. Introduction to Computers 1-18
2. Number Systems 19-40
3. Computer Organization 41-58

s.
4. Theoretical Concepts of Operating System 59-72
Working with typical Operating System
5. Part-I Working with Windows 73-92

ok
Part-II Working with Linux
UNIT II - OFFICE AUTOMATION TOOLS
(WORD PROCESSOR, SPREADSHEET AND PRESENTATION)
6. Introduction to Word Processor
7.
o
Working with OpenOffice Calc
93-110

www.kalviexpress.in
111-128
ab
8. Presentation Basics 129-136
Volume - II
UNIT III - WEB PAGE DEVELOPMENT USING HTML AND CSS
ur

9. Introduction to Internet and Email 137-158


10. HTML - Structural Tags 159-170
11. HTML - Formatting text, Creating Tables, List and Links 171-182
.s

12. HTML - Adding multimedia elements and Forms 183-196


13. CSS - Cascading Style Sheets 197-204
UNIT IV - JAVASCRIPT
w

14. Introduction to Javascript 205-218


15. Control Structure in JavaScript 219-230
w

16. JavaScript Functions 231-236


UNIT V – COMPUTER ETHICS AND CYBER SECURITY
w

17. Computer Ethics and Cyber Security 237-248

18. Tamil Computing 249-252

Govt. Model Question Paper & Sura’s Model Question Paper - 1 - 2 with Answer Key
253-284
March 2019 Question Paper with Answer Key.

(iii)

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

TO ORDER WITH US

SCHOOLS and TEACHERS:

m
We are grateful for your support and patronage to ‘SURA PUBLICATIONS’
Kindly prepare your order in your School letterhead and send it to us.

co
For Orders contact: 81242 01000 / 81243 01000

DIRECT DEPOSIT
A/c Name : Sura Publications A/c Name : Sura Publications

s.
Our A/c No. : 36550290536 Our A/c No. : 21000210001240
Bank Name : STATE BANK OF INDIA Bank Name : UCO BANK
Bank Branch : PADI Bank Branch : Anna Nagar West

ok
IFSC : SBIN0005083 IFSC : UCBA0002100

A/c Name : Sura Publications A/c Name : Sura Publications


Our A/c No. : 6502699356 o Our A/c No. : 1154135000017684
Bank Name : INDIAN BANK Bank Name : KVB BANK

www.kalviexpress.in
Bank Branch : ASIAD COLONY Bank Branch : Anna Nagar
ab
IFSC : IDIB000A098 IFSC : KVBL0001154

After Deposit, please send challan and order to our address.


email : orders@surabooks.com / Whatsapp : 81242 01000.
ur

DEMAND DRAFT / CHEQUE


Please send Demand Draft / cheque in favour of ‘SURA PUBLICATIONS’
payable at Chennai.
.s

The Demand Draft / cheque should be sent with your order in School letterhead.

STUDENTS :
w

Order via Money Order (M/O) to


w

Sura Publications
1620, ‘J’ Block, 16th Main Road, Anna Nagar,
Chennai - 600 040.
w

Phones : 044-26162173, 26161099.


Mobile : 96001 75757/ 81242 01000/81243 01000.
email : orders@surabooks.com Website : www.surabooks.com

(iv)

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

m
co
s.
COMPUTER APPLICATIONS
www.kalviexpress.in
o ok
ab

VOLUME - I
ur
.s
w
w
w

[1]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

m
co
Contents

s.
Volume - I
UNIT I - FUNDAMENTALS OF COMPUTER AND WORKING

ok
WITH A TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX)

1. Introduction to Computers 1-18


2. Number Systems 19-40
3. Computer Organization
o 41-58

www.kalviexpress.in
ab
4. Theoretical Concepts of Operating System 59-72
Working with typical Operating System
5. Part-I Working with Windows 73-92
Part-II Working with Linux
ur

UNIT II - OFFICE AUTOMATION TOOLS


(WORD PROCESSOR, SPREADSHEET AND PRESENTATION)
6. Introduction to Word Processor 93-110
7. Working with OpenOffice Calc
.s

111-128
8. Presentation Basics 129-136
w
w
w

[2]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

UNIT- I FUNDAMENTALS OF COMPUTERS

m
Introduction to Computers

co
Chapter

s.
CHAPTER SNAPSHOT

ok
 1.1. Introduction to Computers
 1.2. Generations of Computers
 1.3. Sixth Generation Computing
 1.4. Data and Information
o
 1.5. Components of a Computer

www.kalviexpress.in
ab
 1.5.1. Input Unit
 1.5.2. Central Processing Unit
 1.5.3. Output Unit
 1.5.4. Memory Unit
ur

 1.5.5. Input and Output devices


 1.6. Booting of Computer
.s
w
w
w

[3]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
4 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1

Evaluation
Section - A 9. Which one of the following is the main memory?
(a) ROM (b) RAM
Choose the Correct Answer (c) Flash drive (d) Hard disk

m
 [Ans. (b) RAM]
1. First generation computers used
(a) Vacuum tubes (b) Transistors 10. Which generation of computer used IC’s?
(c) Integrated circuits (d) Microprocessors (a) First (b) Second (c) Third d) Fourth

co
 [Ans. (a) Vacuum tubes]  [Ans. (c) Third]

2. Name the volatile memory


Section - B
(a) ROM (b) PROM (c) RAM (d) EPROM
 [Ans. (c) RAM] Short Answer

s.
3. Identify the output device
(a) Keyboard (b) Memory 1. What is a computer?
Ans. (i) A computer is an electronic device that

ok
(c) Monitor (d) Mouse
 [Ans. (c) Monitor] manipulates information, or data. It has the
ability to store, retrieve, and process data.
4. Identify the input device (ii) Computer works faster than human being and
(a) Printer (b) Mouse
o given the values more accuracy and reliable
(c) Plotter (d) Projector
2. Distinguish between data and information.
 [Ans. (b) Mouse]

www.kalviexpress.in Ans. Data Information


ab
5. …………… Output device is used for printing
Data is defined as an Information is a
building plan, flex board, etc.
unprocessed collection collection of facts from
(a) Thermal printer (b) Plotter
of raw facts, suitable which conclusions may
(c) Dot matrix (d) Inkjet printer for communication, be drawn.
 [Ans. (b) Plotter]
ur

interpretation or
6. Which one of the following is used to in ATM processing.
Machines (Eg) 134, 16, 'Kavitha', (Eg) Kavitha is 16 years
(a) Touch Screen (b) Speaker 'C' old.
.s

(c) Monitor (d) Printer 3. What are the components of a CPU?


 [Ans. (a) Touch Screen] Ans. The CPU has three components which are Control
unit, Arithmetic and logic unit (ALU) and Memory
w

7. When a system restarts which type of booting is


used. unit.
(a) Warm booting (b) Cold booting 4. What is the function of an ALU?
(c) Touch boot (d) Real boot.
w

Ans. (i) The ALU performs arithmetic operations.


 [Ans. (a) Warm booting] (ii) The result of an operation is stored in internal
8. Expand POST  [Govt.MQP-2018] memory of CPU.
w

(a) Post on self Test (iii) The logical operations of ALU promote the
(b) Power on Software Test decision making ability of a computer.
(c) Power on Self Test 5. Write the functions of control unit.
(d) Power on Self Text Ans. The control unit controls the flow of data between
 [Ans. (c) Power on Self Test] the CPU, memory and I/O devices. It also controls
the entire operation of a computer.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Computers 5

6. What is the function of memory? 3. What is an input device? Give two examples.
Ans. The primary memory is used to temporarily store the Ans. Input device is used to feed any form of data to the
programs and data when the instructions are ready to computer, which can be stored in the memory unit
execute. The secondary memory is used to store the for further processing.
data permanently. Example: Keyboard, mouse, Scanner, Fingerprint
scanner, Track Ball, Retinal Scanner, Light pen etc.

m
7. Differentiate Input unit and Output unit.
4. Name any three output devices.
Ans. Input Unit Output Unit
Ans. (i) Monitor (ii) Printer
Input unit is used An output unit is any
(iii) Plotter (iv) Speaker

co
to feed any form of hardware component
data to the computer, that conveys (v) Multimedia projectors are the output devices.
which can be stored in information to users in 5. Differentiate optical and Laser mouse.
the memory unit for an understandable form.
Ans. Optical Mouse Laser Mouse
further processing.

s.
Measures the motion Measures the motion and
Example : Example : and acceleration of acceleration of pointer.
Keyboard, mouse etc. Moniter, Printer etc. pointer.

ok
8. Distinguish Primary and Secondary memory. It uses light source Laser Mouse uses Laser
instead of ball to Light.
Ans. Primary Memory Secondary memory judge the motion of
It is used to It is used to store the the pointer.
temporarily store the data permanently. Optical mouse is less Laser Mouse is highly
programs and data
o sensitive towards sensitive and able to work

www.kalviexpress.in
when the instructions
are ready to execute.
surface. on any hard surface.
ab
6. Write short note on impact printer.
It is volatile, the It is non-volatile, the
Ans. Impact printers :
content is lost when content is available even
the power supply is (i)  These printers print with striking of hammers or
after the power supply is
switched off. pins on ribbon. These printers can print on multi-
switched off. Eg. ROM,
ur

part (using carbon papers) by using mechanical


Eg. RAM. CD-ROM, DVD ROM.
pressure. For example, Dot Matrix printers and
Section - C Line matrix printers are impact printers.
(ii) A Dot matrix printer that prints using a fixed
Explain in brief
.s

number of pins or wires.


1. What are the characteristics of a computer? (iii) Line matrix printers use a fixed print head for
Ans. (i) Computer is the powerful machine. printing.
w

(ii) It can perform large number of tasks.


7. Write the characteristics of sixth generation.
(iii) The main capacities of computer are work
length, speed accuracy, diligence, versatility
 [Govt.MQP-2018]
Ans. (i) In the Sixth Generation, computers could be
w

memory and automation and lots of more tasks.


defined as the era of intelligent computers based
2. Write the applications of computer.
on Artificial Neural Networks.
Ans. The various applications of computers are,
(ii) One of the most dramatic changes in the sixth
w

(i) Business (ii) Education generation will be the explosive growth of


(iii) Marketing (iv) Banking
Wide Area Networking.
(v) Insurance (vi) Communication
(vii) Health care (iii) Natural Language Processing (NLP) is a
(viii) Engineering - Robotics, Nano technology, Bio component of Artificial Intelligence (AI).
Engineering (iv) It provides the ability to develop the computer
program to understand human language.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
6 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1
8. Write the significant features of monitor. (ii) Central Processing Unit : CPU is the major
Ans. Monitor:
component which interprets and executes
software instructions. It also control the
(i) Monitor is the most commonly used output operation of all other components such as
device to display the information. It looks like a TV. memory, input and output units.
(ii) Pictures on a monitor are formed with picture
(iii) Arithmetic and Logic Unit : The ALU is

m
elements called PIXELS.
a part of the CPU where various computing
(iii) Monitors may either be Monochrome which functions are performed on data. The ALU
display text or images in Black and White or performs arithmetic operations such as addition,
can be color, which display results in multiple

co
subtraction, multiplication, division and logical
colors.
operations.
(iv) There are many types of monitors available
such as CRT (Cathode Ray Tube), LCD (Liquid
Control Unit
Crystal Display) and LED (Light Emitting

s.
Diodes).
ALU
(v) The video graphics card helps the keyboard to Input Unit Output Unit
communicate with the screen. Internal
Memory Data Path
(vi) It acts as an interface between the computer and

ok
Control Path
display monitor. Main Memory

Section - D Secondary Storage


Explain in detail o Components of a Computer

1. Explain the basic components of a computer with (iv) Control Unit : The control unit controls the

www.kalviexpress.in
a neat diagram.  flow of data between the CPU memory and I/o
ab
Ans. Components of a Computer : devices. It also controls the entire operation of a
 The computer is the combination of hardware and computer.
software. Hardware is the physical component of a
(v) Output Unit : An output unit is any hardware
computer like motherboard, memory devices, mon-
itor, keyboard etc., while software is the set of pro- component that convey information to users in
ur

grams or instructions. Both hardware and software an understandable form. Example : Monitor,
together make the computer system to function. Printer etc.
Every task given to a computer follows an Input- (vi) Memory Unit : The Memory Unit is of
process - output cycle (IPO cycle). two types which are primary memory and
.s

secondary memory. The primary memory is


used to temporarily store the programs and data
when the instructions are ready to execute. The
w

secondary memory is used to store the data


permanently. The Primary Memory is volatile,
that is, the content is lost when the power supply
w

is switched off. The Random Access Memory


(RAM) is an example of a main memory. The
Secondary memory is non volatile, that is, the
content is available even after the power supply
w

(i) 
Input unit : Input unit is used to feed any form is switched off. Hard disk, CD-ROM and DVD
of data to the computer, which can be stored ROM are examples of secondary memory.
in the memory unit for further processing.
Example : keyboard, mouse etc.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Computers 7

2. Discuss the various generations of computers. 

Main Component
Ans. S.N Generation Period Merits/ Demerits
used
1 First Generation 1942-1955 Vaccum tubes ‰‰Big in size
‰‰Consumed more power

m
‰‰Malfunction due to overheat

‰‰Machine Language was used

co
First Generation Computer - ENIAC, EDVAC, UNIVAC 1
ENIAC weighed about 27 tons, size 8 feet × 100 feet × 3 feet and consumed around 150 watts of power

2. Second Generation 1955-1964 Transistors ‰‰Smallercompared to First Generation

s.
‰‰GeneratedLess Heat
‰‰Consumed less power compared to first
generation

ok
‰‰Punched cards were used

‰‰First operating system was developed -


Batch Processing and Multiprogramming
o Operating System
‰‰Machine language as well as Assembly
language was used.

www.kalviexpress.in
ab
Second Generation Computers - IBM 1401, IBM 1620, UNIVAC 1108
3. Third 1964-1975 Integrated Circuits ‰‰Computers were smaller, faster and more
Generation (IC) reliable
‰‰Consumed less power.

‰‰High Level Languages were used


ur

Third Generation Computers - IBM 360 series, Honeywell 6000 series


4. Fourth 1975-1980 Microprocessor ‰‰Smallerand Faster.
Generation Very Large Scale ‰‰Microcomputer series such as IBM and
.s

Integrated Circuits APPLE were developed.


(VLSI) ‰‰Portable Computers were introduced.

5. Fifth 1980- Ultra Large Scale ‰‰Parallel Processing


w

Generation till date Integration (ULSI) ‰‰Super conductors


‰‰Computers size was drastically reduced.
‰‰Can recognize Images and Graphics
‰‰Introduction of Artificial Intelligence and
w

Expert Systems
‰‰Able to solve high complex problems
including decision making and logical
reasoning
w

6. Sixth In future ‰‰Parallel and Distributed computing


Generation ‰‰Computers have become smarter, faster
and smaller
‰‰Development of robotics

‰‰Natural Language Processing

‰‰Development of Voice Recognition


Software

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
8 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1
Explain the following : Multimedia Projectors:
a. Inkjet Printer b.Multimedia projector c. Bar (i) Multimedia projectors are used to produce
code / QR code Reader computer output on a big screen.
Ans. Inkjet Printers: (ii) These are used to display presentations in
(i)  Inkjet Printers use colour cartridges which meeting halls or in classrooms.

m
combined Magenta, Yellow and Cyan inks to Bar Code / QR Code Reader:
create color tones. A black cartridge is also used (i) A Bar code is a pattern printed in lines of
for monochrome output. Inkjet printers work by
different thickness. The Bar code reader scans
spraying jonised ink at a sheet of paper.

co
(ii) They use the technology of firing ink by heating the information on the bar codes transmits to the
it so that it explodes towards the paper in Computer for further processing.
bubbles or by using piezoelectricity in which (ii) The system gives fast and error free entry of
tiny electric currents controlled by electronic information into the computer.

s.
circuits are used inside the printer to spread ink QR (Quick response) Code:
in jet speed.
The QR code is the two dimension bar code
(iii) An Inkjet printer can spread millions of dots of
which can be read by a camera and processed to
ink at the paper every single second.

ok
interpret the image.

additional questions and Answers

Choose the Correct Answers 1 MARK


o 6. Which component used in third generation

www.kalviexpress.in computers?
ab
1. Which of the following led us today to extremely (a) Vacuum Tubes (b) Transistors
high speed calculating device? (c) IC (d) Microprocessor
(a) Laptop (b) Tabulating Machine  [Ans. (c) IC]
(c) Abacus (d) ENIAC 7. Which of the following is a Third generation
ur

 [Ans. (c) Abacus] computers? 


2. The first calculating device is (a) Vacuum tubes (b) Transistor
(a) ENIAC (b) Analytical Engine (c) Integrated Circuits (d) Microprocessor
(c) EDVAC (d) Abacus  [Ans. (b) Transistor]
.s

 [Ans. (d) Abacus] 8. The fourth generation belongs to


3. In which year the concept of the analytical engine (a) 1940-1956 (b) 1971-1980
(c) 1964-1971 (d) 1980-1990
w

was invented?
(a) 1837 (b) 1910 (c) 1991 (d) 1836  [Ans. (b) 1971-1980]
 [Ans. (a) 1837] 9. In which generation, the Voice Recognition
w

4. Which of the following period the first generation software developed?


computers belongs? (a) Sixth (b) Fourth (c) Third (d) Second
(a) 1956-1963 (b) 1940-1956  [Ans. (a) Sixth]
w

(c) 1964-1971 (d) 1980-1990


 [Ans. (b) 1940-1956] 10. Which generation gave a start to parallel
computing?
5. Which of the following is not a first generation
(a) fourth (b) fifth (c) sixth (d) seventh
computers?
 [Ans. (c) sixth]
(a) ENIAC (b) EDVAC
(c) UNIVAC 1 (d) IBM1401
 [Ans. (d) IBM1401]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Computers 9

11. Which of the following is not a form of parallel 19. Which of the following is not a non volatile
computing? memory?
(a) bit level (b) instruction level (a) ROM (b) Hard disk
(c) task parallelism (d) Robotics (c) CD-ROM (d) RAM
 [Ans. (d) Robotics]  [Ans. (d) RAM]

m
12. Which of the following holds the data and 20. Optical Mouse invented in the year.
instructions during the processing? (a) 1968 (b) 1973 (c) 1988 (d) 1981
(a) Input unit (b) output unit  [Ans. (c) 1988]

co
(c) Memory unit (d) Software 21. Who invented the computer mouse?
 [Ans. (c) Memory unit] (a) Douglas Engelbart (b) Bill English
(c) Apple Lisa (d) Henry Babbage
13. Which unit does the processing of data?  [Ans. (a) Douglas Engelbart]
(a) CPU (b) Registers

s.
22. Which device works like a xerox machine?
(c) Input unit (d) Output unit
(a) Retinal scanner (b) OCR
 [Ans. (a) CPU]
(c) OMR (d) Scanner

ok
14. Which of the following is the heart of the  [Ans. (d) Scanner]
computer?
23. Which device is very safe and convenient for
(a) CPU (b) HDD (c) SDD (d) ANN
security instead of password?
 [Ans. (a) CPU]
o (a) Scanner (b) Fingerprint Scanner
15. Expansion of CPU is (c) Track ball (d) Retinal Scanner
(a) Control processing unit

www.kalviexpress.in
(b) Central processor unique
 [Ans. (b) Fingerprint Scanner]
ab
(c) Central processing unit 24. Which of the following device uses CCD Electronic
chip?
(d) Control processor unit
(a) OCR (b) BCR
 [Ans. (c) Central processing unit]
(c) Voice Input Systems (d) Digital Camera
ur

16. Expansion of ALU is  [Ans. (d) Digital Camera]


(a) Arithmetic Logical Unit
25. Expansion of CCD is
(b) Accumulator Logical Unit
(a) Coupled Changed Device
(c) Arithmetic Language Unit
.s

(b) Changed Coupled Device


(d) None of these (c) Changed Couple Device
 [Ans. (a) Arithmetic Logical Unit] (d) Camera changed Divider
w

17. Which of the following operations of ALU  [Ans. (b) Changed Coupled Device]
promote decision -making ability of a computer? 26. Expansion of GUI is
(a) Logical (b) Relational
w

(a) Graphics User Interface


(c) Arithmetic (d) Binary (b) Graphical User Information
 [Ans. (a) Logical] (c) Geographical User Information
w

18. I dentify the Input device  (d) Graphical User Interface


(a) Printer (b) Mouse  [Ans. (d) Graphical User Interface]
(c) Plotter (d) Projector 27. In which device the keys are arranged in a cluster?
 [Ans. (b) Mouse]
(a) Keyboard (b) Keyer
(c) Barcode Reader (d) Touch Screen
 [Ans. (b) Keyer]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
10 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1
28. Expansion of CPS is 36. Which of the following is a type of computation
(a) Character Per second in which many calculations are carried out
(b) Copy Per second simultaneously?
(c) Code Per second (a) NLP (b) ANN
(d) Character Per screen (c) Parallel Processing (d) Parallel Computing
 [Ans. (d) Parallel Computing]

m
 [Ans. (a) Character Per Second]
29. Which of the following is the logical machine which 37. Which of the following has become the dominant
interprets and executes software instructions? paradigm in computer architecture?
(a) Parallel computing

co
(a) CPU (b) ALU
(c) Control Unit (d) Memory Unit (b) parallel processing
 [Ans. (a) CPU] (c) Multi tasking
30. The expansion of VLSI is (d) Multi processing
(a) Verified Logical Scale Integrated Circuits  [Ans. (a) Parallel computing]

s.
(b) Very Logical Small Integer Circuits 38. Which of the following concerned with the
(c) Very Large Scale Integrated Circuits interactions between computers and human
(d) Volatile Large Scale Integrated Circuits language?

ok
 [Ans. (c) Very Large Scale Integrated Circuits]
(a) Artificial Neurons
31. Who was the inventor of the electronic digital (b) Neural network
computer?
(c) Artificial intelligence
(a) John Vincent Atanasoft
(d) Natural language processing
(b) J. Presper Eckert
o  [Ans. (c) Artificial intelligence]

www.kalviexpress.in
(c) John Mauchly
39. The conversion of data to information is called
ab
(d) Charles babbage
 [Ans. (a) John Vincent Atanasoft] (a) Data Digitization (b) Data Processing
(b) Data Management (d) All of these
32. The first digital computer name was
 [Ans. (b) Data Processing]
(a) EDVAC (b) UNIVACI
ur

(c) ENIAC (d) IBM 1620 40. A set of instructions given to the computer is called
 [Ans. (c) ENIAC] (a) Information (b) Data
(c) Input (d) Program
33. Which company developed first digital computer?
 [Ans. (d) Program]
.s

(a) Atanasoft Berry Computer


(b) AT & T bell 41. Which of the following devices not stores the date
(c) IBM permanently?
(a) HDD (b) SSD
w

(d) Microsoft
 [Ans. (a) Atanasoft Berry Computer] (c) Tape Drives (d) RAM
 [Ans. (d) RAM]
34. Which of the following are the computer systems
w

inspired by the biological neural networks? 42. Which of the following devices stores the data
(a) NLP (b) IBM permanently?
(c) Robotics (d) ANN [Ans. (d) ANN] (a) HDD (b) Tape drives
w

(c) SSD (d) All of these


35. Artificial neurons are organized in
 [Ans. (d) All of these]
(a) Nodes (b) Layers
43. How many classification of memories in memory
(c) Signals (d) Units
unit?
 [Ans. (b) Layers] (a) 2 (b) 3
(c) 4 (d) more than 2
 [Ans. (a) 2]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Computers 11

44. How many types of Keyboards used to input the 55. The expansion of LCD is
data? (a) Liquid Cathode Diodes
(a) 3 (b) 2 (c) 4 (d) 5 (b) Liquid Cluster Display
 [Ans. (a) 3] (c) Liquid Crytal Display
45. How many types of pointing device are there? (d) Live Extract Display
 [Ans. (b) Liquid Cluster Display]

m
(a) 2 (b) 3 (c) 1 (d) Many
 [Ans. (a) 2]
56. The expansion of LED is
46. Which mouse has as many as 12 buttons?
(a) Laser (b) Optical (a) Light Extract Display

co
(c) Mechanical (d) Both a and b (b) Light Emitting Diodes
 [Ans. (a) Laser] (c) Liquid Emitting Diodes
47. The mechanical mouse introduced in the year. (d) Liquid Extract Display
(a) 1978 (b) 1988 (c) 1968 (d) 1958  [Ans. (c) Liquid Emitting Diodes]

s.
 [Ans. (c) 1968] 57. The expansion of VGA is
48. Who assisted Douglas Engelbart to invent the (a) Visual Graphics Adapter
mouse? (b) Video Graphics Adapter

ok
(a) Berry (b) Steve Kirsch (c) Video Graphics Array
(c) Bill English (d) Bill Gates (d) Voice Graphics Array
 [Ans. (c) Bill English]  [Ans. (c) Video Graphics Array]
49. Which device is used to enter information directly 58. W
 hich device produce graphical output on
into the computer's memory?
o papers?

www.kalviexpress.in
(a) Keyboard (b) Scanner (a) Scanner (b) Touch Screen
ab
(c) Mouse (d) Plotter (c) Plotter (d) Track ball
 [Ans. (b) Scanner]  [Ans. (c) Plotter]
50. The expansion of USB is
(a) Universal Serial Bus 59. Which of the following is an impact priners
(b) Uniform Serial Bus (a) Inkjet (b) Fax
ur

(c) Uniform Serious Bus (c) Dot Matrix (d) Laser


(d) Universal Serial BIOS  [Ans. (c) Dot Matrix]
 [Ans. (a) Universal Serial Bus]
51. Which device used CCD chip? 60. W
 hich printer do not use striking mechanism for
.s

(a) Light pen (b) Scanner printer?


(c) Microphone (d) Digital Camera (a) Inkjet (b) Laser
 [Ans. (d) Digital Camera] (c) Thermal (d) All of these
w

52. W
 hich device is used to input by pressing one or  [Ans. (d) All of these]
more switches?
(a) Keyboard (b) Mouse 61. W
 hich device is used to produce computer output
on a big screen?
w

(c) Touch Screen (d) Keyer


 [Ans. (d) Keyer] (a) Monitor (b) LED
53. How many types of monitors are there? (c) Projector (d) Monochrome Monitor
(a) 2 (b) 3 (c) 4 (d) Many  [Ans. (c) Projector]
w

 [Ans. (b) 3]
62. W
 hich of the following is the diagnostic testing
54. The expansion of CRT is
sequence of the computer hardware?
(a) Cathode Ray Tube
(b) Cathode Radio Tube (a) POST (b) BIOS (c) MAR (d) MBR
(c) Cathode Ray Technology  [Ans. (a) POST]
(d) Cathode Radio Technology
 [Ans. (a) Cathode Ray Tube]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
12 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1
63. W
 hich of the following issue an error message if 7. Robotics developed in .................. generation.
any computer hardware not defected? (a) Third (b) Fourth (c) Fifth (d) Sixth
(a) BIOS (b) BUS (c) RAM (d) POST  [Ans. (d) Sixth]
 [Ans. (a) BIOS]
8. ENIAC was invented by ................. .
64. Which code checks partition table for an active (a) John Vincent

m
partition in a computer? (b) Cliff Berry
(a) MBR (b) Marse (c) Binary (d) Object (c) Presper Eckert, John Mauchly
 [Ans. (a) MBR] (d) Earl R Johnson and Atanasoff

co
65. The process of loading an OS in a computer RAM  [Ans. (c) Presper Eckert, John Mauchly]
is known as 9. Expand NLP .................. .
(a) POST (b) BIOS (a) National Language Problem
(c) Booting (d) All of these (b) Natural Language Processing

s.
 [Ans. (c) Booting] (c) Network Language Program
(d) Network Local Processing
Choose and fill in the blanks
 [Ans. (b) Natural Language Processing]

ok
1. The component used in second generation 10. NLP is a component of .................. .
computers is ...................
(a) Expert systems (b) Robotics
(a) Transistors (b) ICs (c) Parallel computing (d) Artificial Intelligence
(c) Vacuum tubes (d) Microprocessors
o  [Ans. (d) Artificial Intelligence]
 [Ans. (a) Transistors]
11. Every task given to a computer-follows a(n)
2.

www.kalviexpress.in
The Second generation computers belongs to ............... cycle.
ab
period .................... (a) BPO (b) IPO
(a) 1940-1956 (b) 1956-1963 (c) ANN (d) NLP [Ans. (b) IPO]
(c) 1980-1990 (d) 1964-1971
 [Ans. (a) 1940-1956] 12. The memory unit is of .............. kinds.
(a) 3 (b) 4 (c) 2 (d) 5
ur

3. The component used in fourth generation


computers are ................ .  [Ans. (c) 2]
(a) ICS (b) Transistors 13. Laser mouse has as many as ............... buttons.
(c) VLSI (d) Vacuum tube (a) 10 (b) 11 (c) 12 (d) 3
.s

 [Ans. (c) VLSI]  [Ans. (c) 12]


4. Laptops, Notebook, Tablets are belongs to
............... generation computers. 14. The first computer monitor was released in the
year .................. .
w

(a) First (b) Second (c) Third (d) Fourth


 [Ans. (d) Fourth] (a) 1980 (b) 1983 (c) 1963 (d) 1973
 [Ans. (d) 1973]
5. The fifth generation computers belongs to ...........
15. 
The Red, Green or Blue led used mouse in
(a) 1971-1980 (b) 1980-1990
w

invented by .................
(c) 1964-1971 (d) 1940-1956
(a) John Mauchly (b) Steve Kirsch
 [Ans. (b) 1980-1990]
(c) Henry babbaje (d) Presper Eckert
w

6. Name the software introduced in fifth generation  [Ans. (b) Steve Kirsch]
computers ................... .
16. The first compute Monitor was released in the
(a) Artificial Neural Networks year ..............
(b) Artificial Intelligence (a) 1974 (b) 1972 (c) 1971 (d) 1973
(c) Robotics  [Ans. (d) 1973]
(d) Natural language processing
 [Ans. (b) Artificial Intelligence]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Computers 13

17. An error will half the boot process found in .......... 3.


(a) BIOS (b) POST
i) EDVAC 1) Second Generation
(c) HDD (d) I/O System
Computer
 [Ans. (b) POST]

Match the following ii) APPLE 2) Fifth Generation

m
Computer
1. iii) IBM 1620 3) First Generation
i) First 1) ICS Computer

co
Generation iv) Expert 4) Fourth Generation
System Computer
ii) Second 2) VLSI (a) 4, 3, 1, 2 (b) 3, 1, 2, 4
Generation
(c) 4, 1, 2, 3 (d) 3, 4, 1, 2

s.
iii) Third 3) Parallel  [Ans. (d) 3, 4, 1, 2]
Generation Processing
iv) Fourth 4) Vacuum tubes 4.
Generation

ok
i) Information 1) Set of instructions
v) Fifth 5) Parallel competing
Generation ii) Hardware 2) Set of Programs
vi) Sixth 6) Transistors iii) Data 3) Convey some
Generation meaning

(a) 2,3,5,1,4,6
o
(b) 4,6,1,2,3,5 iv) Program 4) Motherboard

www.kalviexpress.in
(c) 6,5,4,1,2,3 (d) 1,3,2,5,6,4 v) Software Set of raw facts
ab
 [Ans. (b) 4,6,1,2,3,5] (a) 3, 4, 5, 1, 2 (b) 4, 5, 1, 2, 3
(c) 1, 3, 4, 5, 2 (d) 2, 3, 5, 4,1
2.
 [Ans. (a) 3, 4, 5, 1, 2]
i) Expert System 1) Second Generation
ur

5.

i) Out device 1)  etrieve the data is


R
ii) Batch 2) Fourth Generation possible
Processing
.s

ii) CPU 2) Data and


iii) NLP 3) Sixth instructions given to
Generation the computer
w

iv) Introduction of 4) Fifth


iii) Memory 3) Temporarily stores
Laptop Generation
data
(a) 4, 1, 3,2 (b) 1, 3, 2, 4
iv) Mass Storage 4) Delivers the data
w

(c) 3, 4, 1, 2 (d) 4, 3, 1, 2 Device processed by CPU


 [Ans. (a) 4, 1, 3,2] v) Input Device Executes Instruction
(a) 5, 4, 1, 2, 3 (b) 4, 5, 3, 1, 2
w

(c) 4, 5, 3, 2,1 (d) 5, 4, 3, 2, 1


 [Ans. (b) 4, 5, 3, 1, 2]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
14 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1
6. 5. Name the softwares introduced in fifth generation
computers.
i) Used to feed 1) ALU
Ans. (i) Artificial Intelligence
data to the computer
(ii) Expert Systems
ii) Controls the operation 2) Input Unit
of memory Uni 6. Name the types of computer introduced in Fourth

m
iii) Computing functions 3) Output Unit generation computers.
are performed on data Ans. (i) Microcomputer
(ii) Portal Computers.
iv) Controls the flow of 4) CPU

co
data between memory 7. Write the developments of Sixth generation
unit and I/O Units. computers.
v) Convey information in Control Unit Ans. (i) Parallel Computing
understandable form (ii) Artificial Neural Networks

s.
(a) 2,4, 1, 3, 5 (b) 1, 3, 5, 2, 4 (iii) Robotics
(c) 2, 3, 1, 4, 5 (d) 2, 4, 1, 5, 3 (iv) Natural Language Processing
 [Ans. (d) 2, 4, 1, 5, 3] 8. What is NLP?

ok
Choose the correct statement Ans. Natural Language Processing is the ability of a
computer program to understand human language. It
1. Which of the following statements are true? is a component of artificial intelligence.
(i) Machine language programs are done in first
9. What is the use of Microphone?
generation
o
(ii) Third generation computers are not more reliable Ans. Microphone serves as a voice Input device. It

www.kalviexpress.in
(iii) Voice recognition software developed in fifth
captures the voice data and send it to the Computer.
ab
generation computer 10. Write a note on Digital Camera.
(iv) Micro processors are used in fourth generation Ans. It captures images / videos directly in the digital form.
computer It uses a CCD (Charge Coupled Device) electronic
(a) Only (i) (b) Only (i) and (iv) chip. When light falls on the chip through the lens, it
converts light rays into digital format.
ur

(c) Only (iii) and (iv) (d) Only (i) (iii) and (iv)
 [Ans. (b) Only (i) and (iv)] 11. What is use of VGA?
Ans. The screen monitor works with the VGA (Video
Very Short Answers 2 MARKS Graphics Array). The video graphics card helps the
.s

keyboard to communicate with the screen. It acts as an


interface between the computer and display monitor.
1. Name the first generation computers.
Usually the recent motherboard incorporates built in
Ans. ENIAC, EDVAC, UNIVAC 1.
w

video card.
2. Name the Second generation computers. 12. Write the two main categories of Printer.
Ans. IBM 1401, IBM 1620, UNIVAC 1108. Ans. Printers are divided into two main categories:
w

3. Name the Third generation computers. (i) Impact Printers


(ii) Non Impact printers
Ans. IBM 360 Series, Honeywell 6000 series.
13. What is booting a computer?
w

4. Expand (i) BIOS (ii) ENIAC (iii) RAM (iv) ALU


Ans. Booting a computer is to load an operating system
Ans. (i) BIOS - Basic Input Output System.
into the computer's main memory or random access
(ii) ENIAC - Electronic Numerical Integrator And
memory (RAM).
Calculator.
(iii) RAM - Random Access Memory
(iv) ALU - Arithmetic and Logic unit

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Computers 15

14. What makes Charles Babbage the father of 22. How the date travel through control bus?
computing? Ans. The date travel in both unidirectional and bidirectional
Ans. Charles Babbage radical ideas and concept of the due to the internal connection with in the computer
Analytical Engine (It contained an ALU, basic flow architecture.
control and integrated memory) makes him the father
23. Name the type of registers are essential for

m
of computing.
instruction execution.
15. What is the goal of neural network approach? Ans. (i) Program counter
Ans. The original goal of the neural network approach was (ii) Instruction Register

co
to solve problems in the same way that a human brain (iii) Memory Address Registers
would. Over time, attention focused on matching (iv) Memory Buffer Register
specific mental abilities, leading to deviations from (v) Accumulator
biology.

s.
24. Expand (a) MAR (b) MBR
16. Write the tools in which nano technology was
Ans. (a) MAR - Memory Address Register
born.
(b) MBR - Memory Buffer Register

ok
Ans. The right tools, such as the scanning tunneling
microscope (STM) and the atomic force microscope 25. Why POST is essential?
Ans. If the hardware is not detected, a particular pattern
(AFM), the age of nano-technology was born.
of beeps will inform about the error. An error
17. Define IPO Cycle. found in the POST is usually fatal (that is, it causes
o
Ans. The functional components of a computer performs.
current program to stop running) and will halt the

www.kalviexpress.in
Every task given to a computer follows an Input-
boot process, since the hardware check is absolutely
essential for the computer's functions.
ab
Process- Output Cycle (IPO cycle). 26. What does reboot mean?
18. Name the different keys available in the keyboard. Ans. It means to reload the operating system.
Ans. There are different set of keys available in the 27. Write the limitations of impact printer.
ur

keyboard such as character keys, modifier keys, Ans. (1) It is slow as compared to non-impact printers
system and GUI keys, enter and editing keys, (2) It is not best suited for graphics
function keys, navigation keys, numeric keypad and (3) It is not possible to obtain colour output.
lock keys.
.s

Short Answers 3 MARKS


19. Which device is used to draw a lines? 1. Write a note Vaccum tube.
Ans. Light Pen is an input device which is used to draw Ans. (i) Vacuum tubes contain electrodes for controlling
w

lines or figures on a computer screen. It is touched electron flow and were used in early computers
to the CRT screen where it can detect faster on the as a switch or an amplifier.
screen as it passes. (ii) Vaccum tubes are big in size and consumed
w

more power.
20. Define Pixels.
2. Define Transistor.
Ans. Pictures on a monitor are formed with picture Ans. (i) The transistor ("transfer resistance") is made up
w

elements called PIXELS. of semi-conductors.


(ii) It is a component used to control the amount
21. Name the types of Monitors available.
of current or voltage used for amplification/
Ans. The types of monitors available such as CRT modulation or switching of an electronic signal.
(Cathode Ray Tube), LCD (Liquid Crystal Display)
and LED (Light Emitting Diodes).

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
16 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1
3. Define Punched cards. feature that uses biometric technology. Fingerprint
Ans. Punch cards also known as Hollerith cards are paper Reader / Scanner is very safe and convenient device
cards containing several punched or perforated holes for security instead of password, that is vulnerable to
that were punched by hand or machine to represent fraud and is hard to remember.
data. 10. Write a note on Touch Screen.
Ans. (i) A touch screen is a display device that allows

m
4. What is Machine language?
the user to interact with a computer by using the
Ans. (i) Machine language is a collection of binary digits
finger.
or bits that the computer reads and interprets.
(i) It can be quite useful as an alternative to a
(ii) In first generation, machined language was

co
mouse or keyboard for navigating a Graphical
used. User Interface (GUI).
5. What is Integrated circuits? (iii) Touch screens are used on a wide variety of
devices such as computers, laptops, monitors,
Ans. (i) IC is short for Integrated Circuit or Integrated smart phones, tablets, cash registers, and

s.
Chip. information kiosks.
(ii) The IC is a package containing many circuits, (iv) Some touch screens use a grid of infrared beams
pathways, transistors, and other electronic to sense the presence of a finger instead of
utilizing touch-sensitive input.

ok
components all working together to perform a
particular function or a series of functions. 11. Write the sequence of steps in boot process? (or)
6. What is Robotics? Explain the types of booting in computer.
Ans. Booting process is of two types.
Ans. (i) Robot is a term coined by Karel Capek in the
(i) Cold Booting (ii) Warm Booting
o
1921 play RUR (Rossum's Universal Robots).
(i) Cold Booting: When the system starts from

www.kalviexpress.in
(ii) It is used to describe a computerized machine initial state i.e. it is switched on, we call it cold
ab
designed to respond to input received manually booting or Hard Booting. When the user presses
or from its surroundings. the Power button, the instructions are read from
the ROM to initiate the booting process.
7. What is Nano-technology? (ii) Warm Booting: When the system restarts or
when Reset button is pressed, we call it Warm
ur

Ans. Nano-technology, is an engineering, science, and


Booting or Soft Booting. The system does not
technology that develops machines or works with start from initial state and so all diagnostic tests
one atom or one molecule that is 100 nanometers or need not be carried out in this case. There are
smaller. chances of data loss and system damage as
.s

8. Define POST. the data might not have been stored properly.
Differentiate optical mouse and laser mouse.
Ans. (i) POST (Power-On Self-Test) is the diagnostic
12. Differentiate Impact Printers and Non-Impact
w

testing sequence that a computer's basic input/


output system runs to determine if the computer Printers.
keyboard, random access memory, disk drives Ans. Impact Printers Non-Impact Printers
w

and other hardware are working correctly. It uses ribbons / carbon It use ink cartridges and
(ii) If the necessary hardware is detected and found papers to leave the the impressions appear on
to be operating properly, the computer begins to impressions on the the paper with the flow
paper. of ink.
boot.
w

The quality of printing is The quality of printing is


9. Write the short note on finger print scanner. a draft quality. a high quality.
Ans. Finger print Scanner: Fingerprint Scanners is a Striking Mechanism No striking mechanism
fingerprint recognition device used for computer used to produce output. used to produce output.
security, equipped with the fingerprint recognition

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Computers 17

13. Differentiate Dot Matrix Printer and Laser 2. Explain in detail the different types of Mouse.
Printer.  [Govt.MQP-2018]
Ans. (i) Mechanical Mouse : A small ball is kept inside
Ans. Dot Matrix Printer Laser Printer
and touches the pad through a hole at the bottom
Printing speed is slow. Printing speed is high. of the mouse. When the mouse is moved, the ball
Suitable for black and Suitable of colour rolls. This movement of the ball is converted

m
white printing. printing. into signals and sent to the computer.
It makes noise while It is silent while printing.
printing. (ii) Optical Mouse: Measures the motion and
acceleration of pointer. It uses light source

co
instead of ball to judge the motion of the pointer.
Long Answers 5 MARKS Optical mouse has three buttons.Optical mouse
is less sensitive towards surface.
1. Explain any two input and output devices.
(iii) Laser Mouse: 

s.
Ans. Input Devices :
Measures the motion and acceleration of pointer.
(i) Scanner: Scanners are used to enter the Laser Mouse uses Laser Light Laser. Mouse is
information directly into the computer’s memory. highly sensitive and able to work on any hard

ok
This device works like a xerox machine. The surface.
scanner converts any type of printed or written
information including photographs into a digital 3. Explain Impact Printers with an Example.
format, which can be manipulated by the computer. Ans. Impact Printers : 
(i) These printers print with striking of hammers
o
(ii) Finger print Scanner: Finger print Scanner is a
fingerprint recognition device used for computer or pins on ribbon. These printers can print

www.kalviexpress.in
security, equipped with the fingerprint recognition on multi-part (using carbon papers) by using
ab
feature that uses biometric technology. Fingerprint mechanical pressure.
Reader / Scanner is a very safe and convenient (ii) For example, Dot Matrix printers and Line
device for security instead of using passwords, matrix printers are impact printers.
which is vulnerable to fraud and is hard to (iii) A Dot matrix printer that prints using a fixed
ur

remember. number of pins or wires. Each dot is produced


Output Devices : by a tiny metal rod, also called a “wire” or
“pin”, which works by the power of a tiny
(i) Monitor: Monitor is the most commonly
electromagnet or solenoid, either directly or
.s

used output device to display the information.


through a set of small levers.
It looks like a TV. Monitors may either be
Monochrome which display text or images in (iv) It generally prints one line of text at a time. The
printing speed of these printers varies from 30
w

Black and White or can be color, which display


results in multiple colors. There are many types to 1550 CPS (Character Per Second).
of monitors available such as CRT (Cathode Ray 4. Explain Non-Impact printers with an examples.
w

Tube), LCD (Liquid Crystal Display) and LED Ans. Non-Impact Printers : 
(Light Emitting Diodes). The video graphics (i) These printers do not use striking mechanism
card helps the keyboard to communicate with for printing. They use electrostatic or laser
the screen. It acts as an interface between the
w

technology.
computer and display monitor. (ii) Quality and speed of these printers are better
(ii) Plotter: Plotter is an output device that is used to than Impact printers. For example, Laser
produce graphical output on papers. It uses single printers and Inkjet printers are non-impact
color or multi color pens to draw pictures. printers.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
18 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 1
Laser Printers : (ii) A black cartridge is also used for monochrome
(i) Laser printers mostly work with similar output. Inkjet printers work by spraying ionised
technology used by photocopiers. ink at a sheet of paper.
(ii) It makes a laser beam scan back and forth across (iii) They use the technology of firing ink by heating
a drum inside the printer, building up a pattern. it so that it explodes towards the paper in
It can produce very good quality of graphic

m
bubbles or by using piezoelectricity in which
images. tiny electric currents controlled by electronic
Inkjet Printers: circuits are used inside the printer to spread ink
(i) Inkjet Printers use colour cartridges which in jet speed.

co
combined Magenta, Yellow and Cyan inks to
(iv) An Inkjet printer can spread millions of dots of
create color tones.
ink at the paper every single second.

s.


www.kalviexpress.in
o ok
ab
ur
.s
w
w
w

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Chapter
2 Number Systems

m
CHAPTER SNAPSHOT

co
 2.1 Number Systems - Introduction 2.4.11 Hexadecimal to Decimal
 2.2 Data Representations 2.4.12 Hexadecimal to Binary
 2.3 Different Types of Number Systems  2.5  Binary Representation for Signed

s.
2.3.1 Decimal Number System Numbers
2.3.2 Binary Number System 2.5.1 Signed Magnitude
2.3.3 Octal Number System representation

ok
2.3.4 Hexadecimal Number System 2.5.2 1’s Complement
representation
 2.4 Number System Conversions
2.5.3 2’s Complement
2.4.1 Decimal to Binary representation
Conversion
o  2.6 Binary Arithmetic

www.kalviexpress.in
2.4.2 Decimal to Octal Conversion 2.6.1 Binary Addition
ab
2.4.3 Decimal to Hexadecimal 2.6.2 Binary Subtraction
Conversion  2.7 Representing Characters in
2.4.4 Conversion of fractional Memory
ur

Decimal to Binary 2.7.1 Binary Coded Decimal


(BCD)
2.4.5 Binary to Decimal
2.7.2 American Standard
Conversion
Code for Information
.s

2.4.6 Binary to Octal Conversion


Interchange (ASCII)
2.4.7. Binary to Hexadecimal
2.7.3 Extended Binary Coded
Conversion
w

Decimal Interchange Code


2.4.8 Conversion of fractional (EBCDIC)
Binary to Decimal equivalent
2.7.4 Indian Standard Code for
w

2.4.9. Octal to Decimal Conversion Information Interchange


2.4.10 Octal to Binary Conversion (ISCII)
w

2.7.5 Unicode

[19]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
20 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2

Evaluation
Part - I Part - II
Choose the Best Answer Very Short Answers

m
1. What is data?
1. Which refers to the number of bits processed by a Ans. The term data comes from the word datum, which
computer’s CPU? means a raw fact. The data is a fact about people,
(a) Byte (b) Nibble

co
places or some objects.
(c) Word length (d) Bit 2. Write the 1’s complement procedure.
 [Ans. (c) Word length] Ans. Step 1: Convert given Decimal number into Binary
2. How many bytes does 1 KiloByte contain? Step 2: Check if the binary number contains 8 bits,
(a) 1000 (b) 8

s.
if less add 0 at the left most bit, to make it
(c) 4 (d) 1024[Ans. (d) 1024] as 8 bits.
Step 3: Invert all bits (i.e. Change 1 as 0 and 0 as 1).
3. Expansion for ASCII

ok
(a) American School Code for Information 3. Convert (46)10 into Binary number.
Interchange
(b) American Standard Code for Information 2 46
Interchange 2 23 – 0
(c) All Standard Code for Information Interchange
o
(d) American Society Code for Information
2 11 – 1

www.kalviexpress.in
Interchange 2 5 –0
ab
[Ans. (b) 
American Standard Code for 2 2 –0
Information Interchange] Ans. 2 1 –0
4. 2^50 is referred as
(a) Kilo (b) Tera Answer - 4610 = (101110)2
ur

(c) Peta (d) Zetta


 [Ans. (c) Peta] 4. We cannot find 1’s complement for (28)10. State

5. How many characters can be handled in Binary reason.


.s

Coded Decimal System? Ans. (28)10 is positive number. 1’s Complement represent
(a) 64 (b) 255 signed numbers (Negative numbers) only. So, (28)10
(c) 256 (d) 128 [Ans. (a) 64]
cannot find 1’s complement.
w

6. For 11012 the equalent Hexadecimal equivalent


is? 5. List the encoding systems that represents
(a) F (b) E characters in memory.
w

(c) D (d) B Ans. (i) BCD – Binary Coded Decimal.


 [Ans. (c) D]
(ii) EBCDIC – Extended Binary Coded Decimal
7. What is the 1’s complement of 00100110?
w

Interchange Code.
(a) 00100110 (b) 11011001
(iii) ASCII – American Standard Code for
(c) 11010001 (d) 00101001
 [Ans. (b) 11011001] Information Interchange.
(iv) Unicode.
8. Which amongst this is not an Octal number?
(v) ISCII - Indian Standard Code for Information
(a) 645 (b) 234
(c) 876 (d) 123 [Ans. (c) 876] Interchange.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 21

Part - III 4. Write short note on ISCII.


Ans. (i)  ISCII is the system of handling the character of
Short Answers Indian local languages. This as a 8-bit coding
1. What is radix of a number system? Give example system.
(ii) Therefore it can handle 256 (28) characters.
Ans. A numbering system is a way of representing
This system is formulated by the department

m
numbers. Each number system is uniquely identified
of Electronics in India in the year 1986-88
by its base value or radix. Radix or base is the count
and recognized by Bureau of Indian Standards
of number of digits in each number system. Radix or
(BIS).
base is the general idea behind positional numbering

co
system. (iii) Now this coding system is integrated with
Unicode.
Example :
Binary Number System - Radix 2 5. Add a) -2210+1510 b) 2010+2510
Octal Number System - Radix 8 Ans. (a) -2210+1510 

s.
Decimal Number System - Radix 10 15010 = ?2 2210 = ?2
Hexadecimal Number System - Radix 16.
2 22 2 15
2. Write note on binary number system.

ok
2 11 – 0 2 7 –1
Ans. (i)  There are only two digits in the Binary system,
namely, 0 and 1. The numbers in the binary 2 5 –1 2 3 –1
system are represented to the base 2 and the 2 2 –1 2 1 –1
positional multipliers are the powers of 2.
– 0 1
o
(ii) The left most bit in the binary number is called
as the Most Significant Bit (MSB) and it has the

www.kalviexpress.in
largest positional weight.
(1111)2 ⇒ (00001111)2
ab
(iii) The right most bit is the Least Significant Bit (10110)2 ⇒ (00010110)2
(LSB) and has the smallest positional weight. 1's complement = 11101001
3. Convert (150)10 into Binary, then convert that 2's complement = 11101010
Binary number to Octal.
ur

(- 22)10 + (15)10 = 11101001


Ans. 15010 = ?
= 00001111
2 150 11111001
.s

2 75 – 0 (b) 2010+2510
2 37 – 1 2 20 2 25
w

2 18 – 1 2 10 – 0 2 12 – 1
2 9 –0 2 5 –0 2 6 –0
2 4 –1 2 2 –1 2 3 –0
w

2 2 –0 1 – 0 1 –1
1 –0
(10100)2 = (11001)2
w

15010 = (10010110)2
8 bit format of 2010 = 00010100
100101102 = ? 8 bit format of 2510 = 00011001
10 010 110
2010 + 2510 = 00101101
2 2 6
100101102 = 2268. 2010 + 2510 = 001011012

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
22 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2

Part - IV 2 98

Detail Answers 2 49 – 0

1. a) 
Write the procedure to convert fractional 2 24 – 1
Decimal to Binary
2 12 – 0
b) Convert (98.46)10 to Binary

m
Ans. a)  The method of repeated multiplication by 2 2 6 –0
has to be used to convert such kind of decimal 2 3 –0
fractions. 1 –1

co
The steps involved in the method of repeated = 9810 = 1100010
multiplication by 2: 8 bit format of 9810 = 01100010
Step 1: M
 ultiply the decimal fraction by 2 and note 1's complement = 10011101
the integer part. The integer part is either 0 Add 1 bit = +1

s.
or 1.
2's complement = 10011110
Step 2: D
 iscard the integer part of the previous
product. Multiply the fractional part of the b) -135

ok
previous product by 2. Repeat Step 1 until 2 135
the same fraction repeats or terminates (0).
2 67 – 1
Step 3:  The resulting integer part forms a sequence of
0s and 1s that become the binary equivalent 2 33 – 1
of decimal fraction. 2 16 – 1
Step 4: T
o
 he final answer is to be written from first 2 8 –0

www.kalviexpress.in
integer part obtained till the last integer part
ab
2 4 –0
obtained.
2 2 –0
b) 98.4610
1. Integer part 1 –0
2 98 13510 = 10000111
ur

2 49 – 0 1's complement = 01111000


2 24 – 1 Add 1 bit = +1
12 – 0 2's complement = 01111001
.s

2
2 6 –0 3. a) Add 11010102+1011012
2 3 –0 b) Subtract 11010112 - 1110102
w

1 –1 Ans. a)  11010102+1011012
2. Fractional part 1101010
0.46 × 2 = 0.92 = 0
w

+101101
0.92 × 2 = 1.84 = 1 10010111
0.84 × 2 = 1.68 = 1
0.68 × 2 = 1.36 = 1 = 100101112
w

0.36 × 2 = 0.72 = 0 b) 11010112 – 1110102


0.72 × 2 = 1.44 = 1 1101011
98.4610 = (1100010.011101....)2 +111010
2. Find 1’s Complement and 2’s Complement for the 110001
following Decimal number. a) -98 b) -135
Ans. a) -98 = 1100012

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 23

Workshop
1. Identify the number system for the following 192010 = 111100000002
numbers.
192010 = ?8
Ans. S.No NUMBER NUMBER SYSTEM

m
8 1920
1. (1010)10 Decimal Number
system 8 240 – 0
2. (1010)2 Binary Number 8 30 – 0

co
System 3 –6
3. (989)16 Hexadecimal
Number System 1920 = 36008
4. (750)8 Octal Number = 111100000002 = ?16

s.
System 111 1000 0000
5. (926)10 Decimal Number =
System 7 8 0

ok
2. State whether the following numbers are valid or = 78016
not. If invalid, given reason. 16 1920
Ans. S.No STATEMENT
YES / REASON (IF 16 120 – 0
NO INVALID)
7 –8
1. 786 is an Octal
number
o
In. octal
number, the = 192010 = 78016

www.kalviexpress.in No allowable digits 2) 25510


ab
is between 0
and 7 2 255
2. 101 is a Binary No Radix is
No 2 127 – 1
number mentional
2 63 – 1
ur

3. Radix of Octal Radix of octal


No number is 8
number is 7 2 31 – 1
3. Convert the following Decimal numbers to its 2 15 – 1
equivalent Binary, Octal, Hexadecimal. 2 7 –1 25510 = 111111112
.s

1) 1920 2) 255 3) 126 2 3 –1


Ans. 1) 192010 = ?2 2 1 –1
w

2 1920
25510 = ?8
2 960 – 0
8 255
2 480 – 0
w

8 31 – 7
2 240 – 0
3 –7
2 120 – 0
w

2 60 – 0 25510 = ?16
2 30 – 0
16 255
2 15 – 0
15 – 15
2 7 –1
15 – F
2 3 –1
25510 = ff16
1 –1

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
24 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
3) 12610 2) 10110102
2 126 Decimal Equivalent :
2 63 – 0 = 1 × 26 + 0 × 25 + 1 × 24+1 × 23 + 0 × 22 + 1
 × 21 + 0 × 20
2 31 – 1

m
2 15 – 1 12610 = 11111102 = 64 + 16 + 8 +2 = 9010

2 7 –1 Octal Equivalent :
2 3 –1 = 10 110 110

co
1 –1
1 3 2
12610 = ?8
= 1328
8 126
Hexadecimal Equivalent :

s.
8 15 – 6
= 101 1010
1–7
12610 = 1768 5 10

ok
12610 = ?16 5 A
16 126 = 5416
7 – 14
o 10110102 = 9010 = 1328 = 5A16

www.kalviexpress.in
14 – F
3) 101011111
ab
12610 = 7E16
Decimal Equivalent :
4. Convert the given Binary number into its = 1 × 28 + 0 × 27 + 1 × 26 + 0 × 25 + 1 × 24 + 1
equivalent Decimal, Octal and Hexadecimal
 × 23 + 1 × 22 + 1 × 21 + 1 × 20
ur

number.
1) 101110101 2) 1011010 3) 101011111 = 256 + 64 + 16 + 8 + 4 + 2+ 1 = 35110
Ans. 1) 101110101 Octal Equivalent :
Decimal Equivalent :
.s

= 101 011 111


= 1 × 28 + 0 × 27 + 1 × 26+1 × 25 + 1 × 24 +
 0 × 23 + 1 × 22 + 0 × 21 + 1 × 20 5 3 7
w

= 256 + 64 + 32 + 16 + 4 +1 = 37310 = 5378


Octal Equivalent : Hexadecimal Equivalent :
w

101 110 101 = 10 101 1111


=
5 6 5
1 5 15
w

= 5658
1 5 F
Hexadecimal Equivalent :
= 10 1110 101 = 15F16

1 7 5 1010111112 = 35110 = 5378 = 15F16

= 17516 ; 101101012 = 37310 = 5658 = 17516

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 25

5. Convert the following Octal numbers into Binary A 6


numbers. (A) 472 (B) 145 (C) 347 (D) 6247 (E) 645
Ans. A) 4728 10 6
4 7 2
1010 0110 A= 10
100 111 010

m
2 4 2 7 A616= 101001102
2 2
2 2–0 2 3–1 (B) BE16
2 1–0

co
1–0 1–1 B E

4728= 1001110102 14
11
(B) 145 B = 11 ; E = 14

s.
1 4 5 1010 1110
2 4 2 5 BE16= 101111102
1 100 101  2 2–0 2 2–1
(C) 9BC816

ok
1458= 11001012 1–0 1–0
9 B C 8
(C) 3478
9 11 12 8
3 4 7
o 1001 1011 1100 1000

www.kalviexpress.in
11 100 111
ab
9BC816= 10011011110010002
2 3 2 4 2 7
D) BC916
2 1–1 2 2–0 2 3–1
1–0 1–0 B C 9
1–1
ur

3478= 111001112 11 12 9

(D) 62478 1011 1100 1001


.s

6 2 4 7 BC916= 1011110010012
2 6

110 010 100 111 2 3–0 7. Write the 1’s complement number and 2’s
w

1–1 complement number for the following decimal


62478= 1100101001112 numbers: (A) 22 (B) -13 (C) -65 (D) - 46
(E) 6458 Ans. (A) 22
w

6 4 5 2 22
2 11 – 0
110 100 101 2 5 –1
w

6458= 1101001012 2 2 –1

6. Convert the following Hexadecimal numbers to 1 –0


Binary numbers (A) A6 (B) BE (C) 9BC8 (D) BC9 Binary equivalent of + 22 = 10110

Ans. (A) A616 8 bit format = 00010110

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
26 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
(B) - 13 8. Perform the following binary computations:
2 13 (A) 1010 + 1510 (B) -1210 + 510
2 6 –1 (C) 1410 – 1210 (D) (-210) – (– 610).
2 3 –0 Ans. (A) 1010 + 1510

m
1 –1 Binary equivalent of 10 and 15
Binary equivalent of + 13 = 1101 1010 = 00001010
8 bit format = 00001101 1510 = 00001111

co
1's complement = 11110010
Add 1 to LSB = +1 2510 = 00011001
2's complement of -13 = 11110011 (B) - 1210 + 510
(C) - 65
Binary addition of -12 and 5

s.
2 65 1210 = 00001100
2 32 – 1 1's complement = 11110011

ok
2 16 – 1 Add 1 to LSB = +1
2 8 –1 2's complement = 11110100
2 4 –1 -1210 = 11110100
2 2 –0
2 1 –0
o 510 = 00000101

www.kalviexpress.in -710 = 11111001


ab
Binary equivalent of + 65 = 1000001
8 bit format = 01000001 (C) - 1410 + 1210 = 1410 + (-12)10
1's complement = 10111110 1210 = 00001100
Add 1 to LSB = +1 1's complement = 11110011
ur

2's complement = 11110100


2's complement of -65 = 10111111
Binary addition of 14 -1210
(D) - 46
1410 = 00001110
2 46 -1210 = 00001100
.s

2 23 – 0 210 = 00000010
2 11 – 1 (D) - (210 ) - (-610) = - 210 + 610
w

2 5 –1 (-210) :
2 2 –1 8 bits = 00000010
1's complement = 11111101
w

1 –0
= +1
Binary equivalent of + 46 = 101110
8 bit format = 00101110 2's complement = 11111110
w

1's complement = 1101000 -2 = 11111110


Add 1 to LSB = +1 +6 = 00000110

2's complement of -46 = 11010010 +4 = 100000100

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 27

additional questions and Answers


10. Expansion of LSB is
Choose the Correct Answer 1 MARK (a) Least Significant Byte

m
1. How the information entered in a computer? (b) Least Sign Bit
(a) Knowledge (b) data
(c) Least Significant Bit
(c) ASCII Value (d) BCD [Ans. (b) data]
(d) Left Significant Bit

co
2. In a computer, a data is converted into
(a) ASCII form (b) BCD form  [Ans. (c) Least Significant Bit]
(c) Binary form (d) Octal form
11. How many parameters can be considered to know
 [Ans. (c) Binary form] the magnitude of the number?

s.
3. Which establishment done convention using (a) 2 (b) 4 (c) 3 (d) 5
groups of 8 bits as a basic unit of storage medium?  [Ans. (c) 3]
(a) Apple (b) Microsoft

ok
(c) IBM (d) DELL[Ans. (c) IBM] 12. What are the two symbols used in Binary number
system?
4. Which is considered as the basic unit of measuring (a) 0, 1 (b) + , –
the memory size in the computer?
(a) Bit (b) Byte
o (c) 2, 4 (d) 20, 21 [Ans. (a) 0, 1]
(c) Nibble (d) Word[Ans. (b) Byte] 13. How many unique symbols in Octal number
5.

www.kalviexpress.in
Which is used to measure the number of bits in system?
ab
each word? (a) 4 (b) 16 (c) 2 (d) 8
(a) Word length (b) length  [Ans. (d) 8]
(c) Size (d) word size 14. How many procedures are there to convert from
 [Ans. (a) Word length] decimal to binary?
(a) 2 (b) 4 (c) 8 (d) 3
ur

6. Who coined the term byte?  [Ans. (a) 2]


(a) Charles Babbage (b) John von newmann
(c) Werner Buchholz (d) Herman Hollerith
 [Ans. (c) Werner Buchholz] 15. How many ways are there to represent signed
.s

binary number?
7. How many bytes does 1 zetta byte contain. (a) 2 (b) 4 (c) 1 (d) 6
[Govt.MQP-2018]  [Ans. (c) 1]
w

(a) 290 (b) 270 (c) 230 (d) 240 16. In binary numbers, the signed negative number
 [Ans. (b) 270] has a prefix?
(a) – (b) 0 (c) 1 (d) 2
8. Which of the following is not a standard number
w

 [Ans. (c) 1]
system?
(a) Pentagon (b) Hexadecimal 17. Which term refers to a part which together with
(c) Decimal (d) Binary another makes up a whole?
w

 [Ans. (a) Pentagon] (a) Signed


9. Expansion of MSB is (b) Unsigned
(a) Most Sign Bit (b) Most Significant Bit (c) Complement
(c) Medium Signal Bit (d) Most Significant Byte (d) Uncomplement
 [Ans. (c) Complement]
 [Ans. (b) Most Significant Bit]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
28 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
18. Which complement performs the logical negation (c) Indian Standard Code for Information
on each individual bit? Interchange
(a) Signed (b) Unsigned (d) Indian System Coding for Information
Interchange
(c) 2's (d) 1's
[Ans. (c) Indian Standard Code for Information
 [Ans. (b) Unsigned] Interchange]

m
19. How many common coding schemes are used to 25. Expansion of TSCII is
represent a character? (a) Tamil Standard Code for Information Interchange
(a) 2 (b) 3 (c) 4 (d) 5 (b) Tamil Sanskrit Code for Information Interchange

co

[Ans. (c) 4] (c) Tamil Script Code for Interchange Information
(d) Tamil System Code for Information Interchange
20. How many coding schemes are used to represent
character in India?  [Ans. (a) Tamil Standard Code for Information
(a) 2 (b) 3 (c) 4 (d) 5 Interchange]

s.
 [Ans. (a) 2]
21. Expansion of BCD is 26. Which coding scheme is used to LCD?
(a) Unicode (b) ASCII

ok
(a) Bar Code Decoding
(b) Binary Code Digit (c) EBCDIC (d) BCD[Ans. (d) BCD]
(c) Binary Coded Decimal
(d) Byte Coded Decimal 27. Which of the following programs uses ASCII
code?

o
[Ans. (c) Binary Coded Decimal]
(a) only C (b) only C++

www.kalviexpress.in
22. Expansion of EBCDIC is (c) both C, C++ (d) Java
ab
(a) Extended Byte Code Decimal Information Code  [Ans. (c) both C, C++]
28. Which of the programs used Unicode?
(b) Extended Binary Coded Decimal Interchange
(a) C (b) C++
Code
(c) Java (d) None of these
ur

(c) Exchanged Binary Coded Decimal Interchange  [Ans. (c) Java]


Code 29. Sixteen raised to the power zero is equivalent to
(d) Exchanged Byte Code Decimal Information (a) 0 (b) 1 (c) 16 (d) 0 and 1
.s

Code  [Ans. (b) 1]


Extended Binary Coded Decimal
[Ans. (b) 
Interchange Code]
30. In a hexadecimal number system 'B' represents
w

23. Which of the following is not a common coding the digit.


schemes to represent a character? (a) 11 (b) 12 (c) 14 (d) 13
(a) BCD (b) Unicode  [Ans. (a) 11]
w

(c) ASCII Code (d) Byte code 31. The hexadecimal equivalent of 1011 is
 [Ans. (d) Byte code] (a) 14 (b) 15 (c) 11 (d) 12
24. Expansion of ISCII is  [Ans. (c) 11]
w

(a) International Standard Code for Information 32. How many parameters are considered to find the
Interchange magnitude of a number.
(b) International Standard Code for Interchange (a) 3 (b) 4 (c) 2 (d) 5
Information  [Ans. (a) 3]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 29

33. Which of the following is the idea behind positional 10. The number of bits a processor can read / write at
numbering systems? a time is called ............ .
(a) Absolute Value (b) Place Volume (a) nibble (b) word
(c) Radix (d) All of these
(c) byte (d) none of these
 [Ans. (c) Radix]  [Ans. (c) byte]

m
Choose and fill in the blanks
11. A word can have a length of ............... .
1. Data means ............... . (a) 2,5,10 bits (b) 15,25,50 bits
(a) a set of values (b) a set of information
(c) 16,32,64 bits (d) 64,128,255 bits

co
(c) a set of records (d) a set of files
 [Ans. (a) a set of values]  [Ans. (c) 16,32,64 bits]

2. A number system can be derived from a ........... . 12. The Radix of Hexadecimal is ........... .
(a) bit (b) byte (a) 6 (b) 10 (c) 16 (d) 8

s.
(c) base or radix (d) nibble or word  [Ans. (c) 16]
 [Ans. (c) base or radix]
13. Which digit is not allowed in hexadecimal number
3. 1 Byte = ...................... bits . system?

ok
(a) 8 (b) 16 (c) 1024 (d) 512 (a) G (b) B (c) E (d) D
 [Ans. (a) 8]  [Ans. (a) G]
4. The singular form of data is ............. .
(a) Record (b) File 14. A Latin prefix Deci means ................. .
(c) Datum (d) Values (a) 2 (b) 8 (c) 16 (d) 10

o [Ans. (c) Datum]  [Ans. (d) 10]
5.
www.kalviexpress.in
"75% of Men likes cricket" is ............. .
ab
(a) Information (b) data 15. The base value of a number is also known as ....... .
(c) knowledge (d) Record (a) length (b) radix
 [Ans. (c) knowledge] (c) data (d) Position
6. The processed data is called ............. .  [Ans. (b) radix]
ur

(a) Information (b) Knowledge


16. Each binary digit weight is expressed as a power
(c) datum (d) files
of .............. .
 [Ans. (a) Information]
(a) 1 (b) 0 (c) 0, 1 (d) 2
.s

7. The most basic unit of information in a digital  [Ans. (d) 2]


computer is called a ................... .
(a) word (b) data 17. The decimal value of 1010.012 is ........... .
w

(c) nibble (d) bit [Ans. (d) bit] (a) 10.5 (b) 10.25
8. Expansion of BIT is ............... . (c) 10.05 (d) 10.025
(a) BASIC DIGITS  [Ans. (b) 10.25]
w

(b) BINARY DIGIT 18. The left most bit on the binary digit carries the
(c) BINARY INFORMATION TECHNOLOGY largest weight is called ............. .
(a) LSB (b) MSB
w

(d) BASE DIGIT [Ans. (b) BINARY DIGIT]


(c) Word (d) Byte[Ans. (b) MSB]
9. 4 bits = ................... .
(a) Bit (b) Byte 19. The Right most bit on the binary digit carries the
(c) Nibble (d) Word smallest weight is called .............. .
 [Ans. (c) Nibble] (a) LSB (b) MSB (c) RMB (d) LMB
 [Ans. (a) LSB]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
30 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
20. The most commonly used number system is ........ 30. Unicode is a ............... bit code.
(a) Binary (b) Hexademical (a) 8 (b) 4 (c) 16 (d) 32
(c) Decimal (d) Octal  [Ans. (c) 16]
 [Ans. (c) Decimal] 31. The Tamil alphabets have ............. .
(a) soup (b) grantha
21. Repeated division method is also known as ........

m
(a) Expansion method (c) numerals (d) All of these
 [Ans. (d) All of these]
(b) Divide by 2 method

co
(c) Double dabble method 32. The number of Tamil glyphs is about ............ .
(d) None of these[Ans. (c) Double dabble method] (a) 255 (b) 128 (c) 170 (d) 256
 [Ans. (c) 170]
22. The decimal equivalent of 0.0112 is .............. .
33. ISCII has been used by .............. .
(a) 0.6875 (b) 0.1875

s.
(a) IBM (b) Apple
(c) 0.1785 (d) 0.5 [Ans. (b) 0.1875] (c) Microsoft (d) IBM & Apple 
23. The 4 bit binary equivalent of –5 is .......... .  [Ans. (d) IBM & Apple]

ok
34. TSCII is proposed by ............. .
(a) 1101 (b) 0101 (c) 1100 (d) –101
(a) IWG - TSC (b) Apple
 [Ans. (a) 1101]
(c) IBM (d) Microsoft
24. The most popular way of representing negative  [Ans. (a) IWG - TSC]
numbers in computer systems is .............. .
(a) 1's complement (b) Signed bit
o 35. Entire Tamil alphabets handled by the coding

www.kalviexpress.in schemes ............... .


ab
(c) 2's complement (d) All of these (a) EBCDIC (b) ASCII
 [Ans. (c) 2's complement] (c) ISCII (d) TSCII
25. BCD is ............. bit code  [Ans. (d) TSCII]
(a) 16 (b) 8 (c) 4 (d) 2 36. Binary Multiplication is possible with ..........
ur

 [Ans. (c) 4]
(a) 0 and 1 (b) 0 and 0
26. Enhanced BCD is .............. bit code.
(c) 1 and 1 (d) All the above
(a) 2 (b) 4 (c) 6 (d) 8  [Ans. (d) All the above]
.s

 [Ans. (c) 6]
37. The base of an octal number system is represented
27. EBCDIC primarily used in ................ computers. by ............
(a) 2 (b) 8 (c) 7 (d) None
w

(a) IBM (b) APPLE


 [Ans. (b) 8]
(c) PENTIUM (d) LAPTOP
38. To convert an hexadecimal number to trinary
 [Ans. (a)IBM] equivalent, each hexadecimal digit is expressed as
w

.............
28. EBCDIC uses ................... bit coding scheme.
(a) 2 (b) 4 (c) 8 (d) 16 (a) 3 bits form
w

 [Ans. (c) 8] (b) 4 bits form


29. The total number of characters coded using (c) 8 bits form
EBCDIC is ............. .
(d) 2 bits form [Ans. (b) 4 bits form]
(a) 32 (b) 64 (c) 128 (d) 256
 [Ans. (d) 256] 39. An octal number system uses the digits from .........
(a) 0 to 8 (b) 1 to 8 (c) 0 to 7 (d) 1 to 7
 [Ans. (c) 0 to 7]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 31

40. The binary equivalent of a hexadecimal digit C is 3. Write the radix of Decimal, Binary, Octal,
repressed by .............. Hexadecimal Number systems.
(a) 1010 (b) 1011 (c) 1101 (d) 1100 Ans. The radix of Decimal is 10, Binary is 2, Octal is 8
 [Ans. (d) 1100] and Hexadecimal is 16.
41. The base value is also known as .............. 4. What is information?
Ans. Information is a set of processed data.

m
(a) Absolute (b) Place
5. What is knowledge? Give example.
(c) Radix (d) System
Ans. Knowledge is identified from the information.
 [Ans. (c) Radix]
Example : 10% of Men around the worlds likes

co
football.
Match the following
6. How the data classified based of their size?
1. Ans. Bits, Nibble, Bytes and Word.
7. What is bit?
i) Binary Number 1) Base 16

s.
System Ans. The most basic unit of information in a digital computer
is called a bit. A bit is a binary digit which can be 0, or 1.
ii) Bexa Decimal 2) Base 8
Number System 8. What is byte?

ok
iii) Decimal 3) Base 2 Ans. Byte is a group of 8 bits which is used to represent
Number System a character. A byte is considered as the basic unit of
iv) Octal Number 4) Base 10 measuring the memory size in the computer.
System 9. What is Nibble?
o
(a) 3,1,2,4 (b) 1,2,4,3 (c) 3,1,4,2 (d) 4,3,1,2 Ans. A nibble is half a byte, which is usually a grouping

www.kalviexpress.in
 [Ans. (c) 3,1,4,2] of 4 bits. Word is the number of bits a processor can
ab
2. bundle (read/write) at a time.
i) 0 to 9 , A o F 1) Binary 10. What is word length?
Ans. The term word length is used as the measure of the
ii) 0, 1 2) Hexadecimal
number of bits in each word. For example, a word
ur

iii) 0 to 9 3) Octal can have a length of 16 bits, 32 bits and 64 bits.


iv) 0 to 7 4) Decimal 11. What is a number system?
(a) 2,1,4,3 (b) 2,1,3,4 (c) 3,4,1,2 (d) 4,3,1,2 Ans. A number system is a set of digits used to represent
the values derived from a common base or radix.
.s

 [Ans. (c) 3,4,1,2]


12. Why do we need Radix or Base for the number
system?
Very Short Answers 2 MARKS
w

1. List the types of information stored in a computer. Ans. Radix (or Base) is the general idea behind positional
Ans. (i) Numbers numbering systems. In the numbering system, any
(ii) Text numeric value will be represented through increasing
w

(iii) Graphics powers of a radix (or base).


(iv) Animations
(v) Audio 13. Which parameters are used to determine the
w

(vii) Video etc. magnitude of a number or the value of each digit


2. Name the four types of Number system. in a number?
Ans. (i) Decimal Number system Ans. (i) Absolute value
(ii) Binary Number system (ii) Place value or positional value
(iii) Octal Number system (iii) Base value
(iv) Hexadecimal Number system

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
32 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
14. Convert (128) 8 → (?)10 21. Write the one's complement of 10102 and 1001012?
Ans. (128)8 Ans. (i) One's complement of 10102 is 01012 (replace 1 by
(128)8 = 1 × 82 +2× 81 +8× 80 0 and 0 by 1)
= 64 + 16 + 8 (ii) One's complement of 1001012 is 0110102
(128)8 = 8810 22. What is use of coding scheme?

m
Ans. The coding scheme is used to represent a character
15. Which number system is called positional value in the bits.
system?
23. Expand EBCDIC and BCD.

co
Ans. Decimal, octal, binary and hexadecimal number
Ans. (i) EBCDIC - Extended Binary Coded Decimal
systems are called Positional value system.
Interchange Code
16. Name the frequently used number system. (ii) BCD - Binary Coded Decimal
Ans. Decimal number system is the frequently used 24. Expand ASCII and ISCII.

s.
number system. Ans. (i) ASCII - 
American Standard Code for
17. How many procedures for converting from Information Interchange.

ok
decimal to binary? (ii) ISCII - Indian Standard Code for Information
Ans. (i) There are two procedures for converting from Interchange.
decimal to binary. 25. What is BCD?
(ii) They are
o Ans. Binary Coded Decimal is a 4-bit code used to
represent the numeric data alone.
‰‰Expansion Method
26. What is Standard BCD?

www.kalviexpress.in
‰‰Repeated division by 2. Ans. A standard Binary Coded Decimal, an enhanced
ab
format of Binary Coded Decimal, is a 6-bit
18. What is double dabble method?
representation scheme which can represent non-
Ans. The conversion of decimal number into the binary numeric characters.
using Repeated-division method is called double 27. If a user types 256 (in Decimal ) using BCD coding.
ur

dabble method. What is the number stored in the memory of the


19. Convert 1011012 to its decimal equivalents using computer?
double dabble method. Ans. The number stored as 001001010110.
.s

Ans. The Left Most Bit (LSB) : 1 28. What is EBCDIC?


Multiply by 2, add next bit (2 × 1) + 0 = 2 Ans. Extended Binary Coded Decimal Interchange Code

Multiply by 2, add next bit (2 × 0) + 1 = 5 (EBCDIC) is an 8-bit character-coding scheme used


w

primarily on IBM computers.


Multiply by 2, add next bit (2 × 5) + 1 = 11
Multiply by 2, add next bit (2 × 11) + 0 = 22 29. What is ASCII?
w

Multiply by 2, add next bit (2 × 22) + 1 = 45 Ans. American Standard Code for Information Interchange
(ASCII) is a 7-bit code, which means that only 128
(101101)2 = 4510
(27) characters can be represented.
w

20. How the binary number represented by signed 30. Name any four languages which supports ISCII.
and unsigned bit?
Ans. (i) Devanagari
Ans. In binary, a negative number may be represented (ii) Tamil
by prefixing a digit 1 to the number while a positive
number may be represented by prefixing a digit 0. (iii) Telugu
(iv) Kannada

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 33

31. What is TSCII? 37. Convert 110111101011102 to hexadecimal


Ans. Tamil Standard Code for Information Interchange is Ans. 110111101011102
the Tamil encoding scheme designed to handle the
entire Tamil alphabet. TSCII is proposed by Internet Group in fours 11 0111 1010 1110
Working Group for the Tamil Standard Code (IWG- Convert each number 3 7 A E
TSC).

m
= 37AE16
32. What is sign bit?
Ans. The sign bit indicates the sign of a number and 38. Convert 4A8C16 to binary
determines whether the numerical value is positive
Ans. Given 4 A 8 C

co
or negative.
33. What is Tamil glyphs? Convert each Digit 0100 1010 1000 1100
Ans. Meaning in Tamil, Audio pronunciation, synonyms. = 1001010100011002
34. Convert 22.2510 to binary
39. Convert the decimal 0.25 to binary.

s.
Ans. Integer part Fractional part
Ans. 0.2510  [Govt.MQP-2018]

2 22 0.25 × 2 = 0.50 0
0.25 × 2 = 0.5 = 0

2 11 – 0 0.50 × 2 = 1.00 1 0.5 × 2 = 1= 1

ok
Binary = 0.012.
2 5 –1
2 2 –1 40. Convert EB4A16 to decimal
Ans. EB4A16 = 14 × 163 + 11 × 162 + 4 × 161 + 10 × 160
1 –0
= 57344 + 2816 + 64 + 10
= 10110.012
o
www.kalviexpress.in = 6023410
ab
35. Convert -21 to binary and write its 2’s complement. 41. Convert 729510 to hexadecimal
Ans. (-21)10  [Govt.MQP-2018] Ans. Successive Division Remainders Hex Notation
2 21 9 9
16 72905
2 10 – 1 12 C
ur

2 5 –0 16 4556
12 C
2 2–1 16 284 1 1
1–0 .
16 17 1 1
Binary equivalent of + 21 = 101012
.s

1
8 bit format = 00010101
1’s complement = 11101010 = 9CC1116
Add the negative integer = +1
Short Answers
w

3 MARKS
2’s complement of - 21 = 111010110
1. Why is the number conversion necessary?
36. Convert 1010100.0112 to decimal number. Ans. The number conversion is necessary because the user
w

Ans. 1010100.0112 enters the data into the computer in decimal form
only and the computer is then expected to convert
= 1 × 26 + 0 × 25+ 1 × 24 + 0 × 23 + 1 × 22 + 0 × the decimal number to other number system which
21 + 0 × 2–1 + 1 × 2–2 + 1 × 2–3 it understands.
w

= 64 + 0 + 16 + 0 + 4 + 0 + 0 +0 + 0.25 + 0.125 2. (101010)2 → (?10) → (?10)


= 84.32510 Ans. 1010102
= 0010 1010
= 2 10
= 2 A
(101010)2 = (2A)16

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
34 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
(101010)2 = (1 × 25) + (0 × 24) + (1 × 23) + (0 × 22) (367)8 = 3 × 82 + 6 × 81 + 7 × 80
 + (1 × 21) + (0 × 20) = 192 + 42 + 6 = (247)10
= 32 + 0 + 8 + 0 + 2 + 0 = 4210
In decimal form, the given sequence will be 245,
(101010)2 = (2A)16 = (42)10 246, 247, 248, 249, 250. To complete the sequence
of Octal number, we need to find the octal equal of

m
3. (300)10 → (?2) → (?8) → (?)16 248, 249 and 250.
Ans.
2 300 8 300 16 300 (248)10=
8 248
2 150 – 0 8 37 –4 16 18 – 12

co
8 31 – 0
2 75 –0 4 –5 1 –2
3 – 7
2 37 –1
(249)10=
18 –1 8 249
2

s.
2 9 –0 8 31 – 1
2 4 –1 3 – 7

2 2 –0 (250)10=

ok
8 250
1 –0 8 31 – 2
3 – 7
(300)10 → (100101100)2 → (454)8 → (12C)16 So the sequence is 365, 366, 367,370,371,372.
4. Perform the following expressions.
o
www.kalviexpress.in 6. Describe the parameters are used to determine
ab
(i) (FACE)16 = (?)2 (ii) (C0FFEE)16 = (?)2 the value of each digit in a number.
Ans. (i) (FACE)16
Ans. (i) The absolute value is the magnitude of a digit in a
F A C E
number.
↓ ↓ ↓ ↓ (ii) For example, the digit 5 in 7458 has an absolute
ur

1110 1111 1010 1110 value of 5 according to its value in the number
(FACE)10 = (1111101011001110)2 line.
(ii) (C0FFEE)16 (iii) The place value of a digit in a number refers to
.s

the position of the digit in that number such as


C 0 F F E E tens, hundreds, and thousands.
↓ ↓ ↓ ↓ ↓ ↓ (iv) The total value of a number is the sum of the
w

1100 0000 1111 1111 1110 1110 absolute value x place value of each digit that
the number consists of.
(C0FFEE)16 =(110000001111111111101110)2
(v) The base value of a number is also known as the
w

5. Complete the following Octal numbers. radix, which depends on the type of the number
systems that are being used.
365, 366, 367, .... , .... , .... .
(vi) The value of any number depends on the radix.
Ans. (365)8
w

= 3 × 82 + 6 × 81 + 5 × 80 7. Write a note on Decimal Number system.


= 192 + 48 + 5 = (245)10 Ans. (i) The term Decimal is derived from a Latin prefix
deci, which means ten.
(366)8 = 3 × 82 + 6 × 81 + 6 × 80
(ii) The Decimal number system has ten digits
= 192 + 48 + 6 = (246)10
ranging from 0-9.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 35

(iii) Because this system has ten digits. It is also called 12. Write the three common ways of representing a
as a base ten number system or denary number signed binary number?
system.
Ans. In computer technology, there are three common
(iv) Decimal number should always be written with a
ways of representing a signed Binary number.
subscript 10.
(i) Prefixing an extra sign bit to a Binary number.
8. Describe binary number system.

m
(ii) Using one’s complement.
Ans. (i) Computers use binary number system for (iii) Using two’s complement.
counting and arithmetic operations. 13. What are the advantages of two's complement
(ii) The number system has base 2 and it uses 2

co
number?
digits 0 and 1. Ans. The most popular way of representing negative
(iii) A string which have any combination of these numbers in computer systems is two's complement.
two digits is called binary number. It would be The advantages of using this method are :
written as (1001)2. (i) There are no two ways of representing a zero as

s.
in the case with the above two methods.
9. Describe Octal Number system.
(ii) Addition and subtraction can be performed
Ans. (i) The octal number system is playing a vital role effectively.
in digital computer work.

ok
(ii) The octal number system has a base of 8. It 14. Write the steps to find 2's complement.
means that it has eight unique symbols such as Ans. Step 1 : Find 1's complement (Replace 1 by 0 and
0,1 ,2 ,3,4,5 ,6 and 7. 0 by 1
(iii) Thus, each digit of an octal number can have Step 2 : Add 1 to the 1's complement.
any value from 0 to 7.
10. What is MSB, LSB and Binary point? Give
o 15. Find the answer for the following

www.kalviexpress.in
example.
(a) 10112 + 1112 (b) 1002 + 12
ab
Ans. (a) 10112 + 1112
Ans. (i) MSB (Most Significant Bit) – The left most bit
carries the largest weight and hence, is called 1011
the MSB. + 111
(ii) LSB (Lease Significant Bit) – The right most bit 100102
ur


carries the smallest weight and hence, is called
the LSB. 10112 + 1112 = 100102
(iii) Binary Point – It is used to separate the integer (b) 1002 – 12
and fractional part of the binary number.
.s


Eg. (1011.011)2 0 1 2

1 0 1 1 . 0 1 1 100
w

| | | + −1
MSB Binary point LSB 0 11
11. Write a note on hexadecimal number system. 1002 – 12 = 0112
w

Ans. (i) The base or radix is 16. Thus it has 16 possible 16. Write the common coding schemes.
digit symbols. It uses the digits 0 to 9 plus the Ans. The common coding schemes are:
letters A, B, C, D, E and F (with respect to 10, (i) Binary Coded Decimal (BCD),
w

11, 12, 13, 14, 15). (ii) Extended Binary Coded Decimal Interchange
Code (EBCDIC) and
(ii) It is generally used in micro computers.
(iii) American Standard Code for Information
Eg. (ABC)16. Interchange (ASCII).
(iv) Unicode

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
36 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
17. What is use of BCD? 25. Complete the sequence of following octal
Ans. (i) Binary Coded Decimal is mostly used in numbers:
simple electronic devices like calculators and 525, 526, 527,_____, _____, _____
microwaves. Ans. 525, 526, 527, 530, 531, 532
(ii) This is because it makes it easier to process
26. Add 71A316 + 142B16

m
and display individual numbers on their Liquid
Crystal Display (LCD) screens. Ans. 71A3 3 + B = 3 + 11 = 14 = E
18. What negative value does 1001 1011 represent? = 142B A + 2 = 10 + 2 = 12 = C
Ans. The 2's complement fo 10011011 is 01101010 This

co
85CE
represents a 10110.
Therefore 100110112 = –10110 27. Complete the table.
19. Convert B2F16 to octal. 1. 0 + _____ =0
Ans. B2F16 = 1011 0010 1111 (Convert to binary)
2. _____ + 0 = 1

s.
= 101 100 101 111 (Group bits by 3s)
3. 1 + 1 = _____
= 54578 (Convert to octal)
4. 0 + 1 = _____
20. Add the binary numbers 1101012 and 1011112
Ans. 1. 0 2. 1 3. 1 4. 1

ok
Ans. 110101
28. Complete the table.
+
101111
1. 0 – 0 = _____
1100100
o 2. _____ – 0 = 1
3. 1 – 1 = _____
21. Subtract 101111 from 110101

www.kalviexpress.in
Ans. 110101
4. 0 – 1 = _____
ab
Ans. 1. 0 2. 1 3. 0 4. 1
– 101111
000110 29. Complete the table.

1. 0 × 0 = _____
22. Multiply 111 with 101 2. 1 × 1 = _____
ur

Ans. 11×101 3. 1 × _____ = 0


1 1 1 4. _____ × 0 = 0
0 0 0 Ans. 1. 0 2. 1 3. 0 4. 0
1 1 1
.s

30. Complete the table.


100011
1. 0 ÷ _____ =0
w

23. Divide 11110 by 110 2. 0 ÷ 1 = _____


101
Ans. 3. 1 ÷ _____ = 1
101 11110
4. 0 ÷ 1 = _____
w

110
Ans. 1. 0 2. 0 3. 1 4. Infinite
110
110 31. Answer the following.
w

0 1. A real number consists of _____ part and


24. Complete the sequence of following binary _____ part
numbers : 2. 1's complement of 110012 = _____
100, 101, 110, _____, _____, _____, _____
3. ASC16 stands for _____
Ans. 100, 101, 110, 111, 1000, 1001, 1010

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 37

4. 4793 = 0.4793 × _____ 2–1 2–2 2–3 2–4


Ans. 1. Integral and Fraction
0 1 0 1
2. 001102
3. American standard code for information = (0×2–1) + (1×2–2) + (0×2–3) + (1×2–4)
interchange = 0 + 0.25 + 0 + 0.0625

m
4. 104 = 0.375
32. Answer the following. Long Answers 5 MARKS

co
1. In a decimal to binary conversion, the
first remainder is known as _____ and last 1. Explain Unicode.
remainder is _____. Ans. (i) Unicode is the newest concept in digital
coding. In Unicode, every number has a unique
2. The binary system consists of _____ and character.

s.
_____. (ii) Unicode is the universal character encoding
standard used for representation of text for
3. The hexadecimal number system uses the computer processing.

ok
digits from _____ and _____. (iii) It can be used to store and process all significant
4. 2° = _____ current and past languages. Unicode provides a
unique hex encoded number for every character.
Ans. 1. LSB and MSB 2. 0 and 1
(iv) Unicode is a 16 bit code, which allows for
3. 0 and F 4. 1
o
33. Name the different types of operations that can be
about 65,000 different representations. This is
enough to encode the popular Asian languages

www.kalviexpress.in
performed in Binary arithmetics. (Chinese, Korean, Japanese, etc.).
ab
(v) It also turns out that ASCII codes are preserved.
Ans. 1. Addition 3. Multiplication
Therefore, conversion between ASCII and
2. Subtraction 4. Division Unicode is a simple method (take all one byte
34. How will you convert decimal number into Octal ASCII codes and zero-extend them to 16 bits).
ur

number? (vi) This will be the Unicode version of the ASCII


Ans. The Conversion of a decimal number to an octal characters.
number can be performed by successively dividing (vii) The C, C++ programs use the ASCII Code, and
number by 8 and collect the remainder from top to Java programs have already used Unicode.
.s

bottom. The remainders also must be taken in octal. (viii) The Unicode Standard has been adopted by
industry leaders such as Apple, HP, IBM,
35. How will you convert decimal number into
Microsoft, Oracle, SAP, Sun, Sybase, and
hexadecimal number?
w

Unisys.
Ans. The conversion of the given decimal number into
(ix) Unicode is required by web users and modern
a hexadecimal number requires the application of
standards.
hex-dabble method which is similar to the double-
w

dabble method with the exception that one has to 2. Suppose a number system has been designed
successively divide the given number by 16 instead with radix 10 with symbols (ordered from small
of 2. to large) A, B, C, D, G, H, I, L, M, N. Convert
w

the following number to equivalent hexadecimal


36. Illustrate with an example how binary fraction
number; (INDIAN)10.
converted into decimal.
Ans. A, B, C, D, G, H, I, L, M, N are presents 0, 1, 2, 3, 4,
Ans. To find the decimal equivalent of binary fraction,
5, 6, 7, 8, 9 respectively of decimal number system
take the sum of the product of each digit value (0 to
(base 10) so, (INDIAN)10 = (693609)10
1) and its positional value. To illustrate:
To find its hexadecimal equivalent.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
38 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
(ii) For instance, it is very difficult to design
16 693609
electronic equipment so that it can work with 10
16 43350 –9 different voltage levels (each one representing
16 2709 –6 one decimal character, 0 through 9).
(iii) On other hand, it is very easy to design simple,
16 169 –5 accurate electronic circuits that operate with

m
10 –9 only 2 voltage levels.

(iv) For this reason, almost every digital system
Thus (INDIAN)10 = (693609)10 = (A9569)16 utilizes the binary number system (base 2) as
3. Write the steps for converting Decimal to Binary

co
the basic number system of its operation;
numbers. (v) In a binary system, there are only two symbols
Ans. Steps for Decimal to Binary Conversion. or possible digit values, 0 and 1.
Step 1: Divide the decimal number which is to be
Octal Number System :
converted by two which is the base of the
(i) The octal number system is playing a vital role

s.
binary number.
in digital computer work.
Step 2: The remainder which is obtained from
step 1 is the least significant bit of the new (ii) The octal number system has a base of 8.
binary number. (iii) It means that it has eight unique symbols such

ok
Step 3: Divide the quotient which is obtained as 0,1 ,2 ,3,4,5 ,6 and 7.
from the step 2 and the remainder obtained
(iv) Thus, each digit of an octal number can have
from this is the second least significant bit
of the binary number. o any value from 0 to 7.
Step 4: Repeat the process until the quotient (v) The places to the left of the octal point are
positive powers of 8 and places to the right are

www.kalviexpress.in
becomes zero.
ab
Step 5: The last remainder obtained from the negative powers of 8.
division is the most significant bit of Hexademical Number System :
the binary number. Hence, arrange the (i) The hexadecimal system uses base 16 in digital
number from the most significant bit to
systems.
the least significant bit (i.e., from bottom
ur

to top). (ii) It has 16 possible symbols.


(iii) It uses the digits 0 through 9 plus the letters A,
4. What is number system? Describe different
B, C, D, E and F as the 16 different symbols.
number systems in detail.
(iv) Hexadecimal System is a positional value
.s

Ans. A number system is a set of digits used to represent


the values derived from a common base or radix. system, wherein each hexadecimal digit has its
Decimal Number System : own value or weight expressed as a power of 16.
w

(i) The term Decimal is derived from a Latin prefix 5. Explain the following terms in detail. (1) ASCII
deci, which means ten. (2) BCD (3) EBCDIC (4) Unicode (or) Discuss
(ii) The Decimal number system has ten digits various encoding systems used for computers.
ranging from 0-9. Because this system has ten
w

digits. [Govt.MQP-2018]
(iii) It is also called as a base ten number system or Ans. (i)  ASCII : American Standard Code for Information
denary number system. Interchange (ASCII).  [Govt.MQP-2018]
w

(iv) Decimal number should always be written with (ii) BCD : Binary Coded Decimal (BCD)
a subscript 10. (iii)  EBCDIC : Extended Binary Coded Decimal
Binary Number System : Interchange Code (EBCDIC)
(i) The decimal number system is not convenient to (i) ASC11 : American Standard Code for
implement in digital system.
Information Interchange (ASCII) is a 7-bit
code, which means that only 128 (27) characters

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Number Systems 39

can be represented. This coding scheme with 6. Explain the following terms in detail. (1) ISCII
which it is possible to represent 256 characters. (2) TSCII
This 8-bit coding scheme is referred to as an Ans. ISCII. (Indian Script Code for Information
8-bit American standard code for information Interchange)
interchange. The symbolic representation of (i) In order to encode Indian languages on

m
letter A using this scheme is 10000012(6510). computers, a common standard for coding
It is a character encoding standard developed Indian scripts is developed which is called
several decades ago to provide a standard way as ISCII. In 1991, the Bureau of Indian

co
for digital machines to encode characters. Standards adopted the Indian Standard Code for
The ASCII code provides a mechanism for Information Interchange (ISCII).
encoding alphabetic characters, numeric digits, (ii) ISCII standard is evolved by a standardization
and punctuation marks. committee during 1986-88. The ISCII document

s.
(ii) BCD : Binary Coded Decimal is a 4-bit code is available as IS13194:1991 from the BIS
used to represent the numeric data alone. For offices.
example, a number like 9 can be represented

ok
using Binary Coded Decimal as 10012 . (iii) Assamese, Bengali (Bangla), Devanagari,
Binary Coded Decimal is mostly used in Gujarati, Gurumukhi, Kannada, Malayalam,
simple electronic devices like calculators and Oriya, Tamil, and Telugu are supported in
microwaves. This is because it makes it easier ISCII. ISCII has been used by IBM for PC-
DOS, Apple for ILK, and several companies are
o
to process and display individual numbers on
developing products and solutions based on this

www.kalviexpress.in
their Liquid Crystal Display (LCD) screens.
representation.
ab
A Standard Binary Coded Decimal, an
enhanced format of Binary Coded Decimal, TSCII. (Tamil Standard Code for Information
is a 6-bit representation scheme which can Interchange)
represent non-numeric characters. This allows
(i) Tamil Standard Code for Information
ur

64 characters to be represented. Interchange is the Tamil encoding scheme


(iii) EBCDIC : Extended Binary Coded Decimal designed to handle the entire Tamil alphabet.
Interchange Code (EBCDIC) is an 8-bit TSCII is proposed by Internet Working Group
.s

character-coding scheme used primarily on for the Tamil Standard Code (IWG-TSC).
IBM computers. A total of 256 (28) characters (ii) The Tamil alphabets have soup (247), grantha
can be coded using this scheme. characters (13) and the Tamil numerals (13).
w

(iv) Unicode : This coding system is used in most The number of unique Tamil glyphs to consider
of the modern computers. The popular coding is about 170. Since the number of slots available
in upper-ASCII segment (#128-255) is much
w

scheme after ASCII is Unicode. ASCII can


less than the required slot for each character in
represent only 256 characters. Therefore
Tamil.
English and European Languages alone can be
w

handled by ASCII. This coding system is used (iii) Therefore, few Tamil alphabets are to be
in most of the modern computers. included in the native form, and the others are
generated using modifiers (several keystrokes
in sequence).

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
40 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit I ➠ Chapter 2
7. Convert the following.
a. (101.10)16 → (?2) = (?)10
b. (3648)8 → (?2) = (?)10
c. (101011001)2 → (?16) = (?)8
Ans. (a) (101.10)16 → (?2) = (?)10

m
(101.10)16 in binary form
= 1 0 1 . 1 0
0001 0000 0001 . 0001 0000

co
(101.10)2 = (000100000001.00010000)2
(101.10)16 in decimal form
(101.10)2 = 1 × 162 + 0 × 161 + 1 × 160 + 1 × 16–1 + 0 × 16-2

s.

= 256 + 0 + 1 + 0.0625 + 0 = (275.0625)10
Thus (101.10)16 1 = (257.0625)10 (0000100000001.00010000)2

ok
(b) (3674)8 → (?2) = (?)10
(3674)8 in binary from
3 6 7 4
011 110 111 100
o
www.kalviexpress.in (3674)8 = (011110111100)2
ab
(3674)8 in decimal form
(3674)8 = 3 × 83 + 6 × 82 + 7 × 81 + 4 × 80

= 1536 + 384 + 56 + 4 = (1980)10
Thus (3674)8 → (011110111100)2 = (1980)10
ur

(c) (101011001)2 → (?16) = (?)8


(101011001)2 in hexadecimal form
.s

= 1 0101 1001
(101011001)2 = (159)16
(101011001)2 = (159)16
w

(101011001)2 Octal form


101 011 001
w

↓ ↓ ↓
5 3 1
w

(101011001)2 = (531)8
Thus (101011001)2 → (159)16 = (531)8



orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Chapter
3 Computer Organisation

m
co
CHAPTER SNAPSHOT

s.
 3.1. Introduction

ok
 3.2. Basics of Microprocessors
 3.3. Data Communication between CPU and memory
 3.4. Types of Microprocessors
3.4.1. Classification of Microprocessors based on the Data Width
o
3.4.2. Classification of Microprocessors based on Instruction set

www.kalviexpress.in
ab
 3.5. Memory Devices
3.5.1. Random Access Memory(RAM)
3.5.2. Types of RAM
3.5.3. Read Only Memory (ROM)
ur

3.5.4. Cache Memory


 3.6. Secondary Storage Devices
3.6.1. Hard Disks
.s

3.6.2. Compact Disc (CD)


3.6.3. Digital Versatile Disc (DVD)
w

3.6.4. Flash Memory Devices


3.6.5. Blu-Ray Disc
w

 3.7. Ports and Interfaces


w

[41]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
136 Sura’s  XI Std - Computer Applications ➠ Volume I ➠ Unit II ➠ Chapter 8
(viii) Click Next. The Presentation Wizard step 3 (vi) Slide Sorter view shows a thumbnail of each
appears (Figure 8.7). In this step, you can choose slide in order. Use this view to rearrange the
the desired slide transition from the Effect drop- order of slides, produce a timed slide show, or
down menu. Select the desired speed for the add transitions between selected slides.
transition between the different slides in the (viii) Handout view lets you print your slides for
presentation from the Speed drop-down menu. a handout. You can choose one, two, three,

m
Medium is a good choice. Click Create. A new four, or six slides per page from Tasks pane →
presentation is created. Layouts. Thumbnails can be re-arranged in this
view by dragging and dropping them.
2. Explain view buttons in Impress.

co
Ans. (i) Normal, Outline, Notes, Handout and Slide 3. Explain the purposes served by outline view in
Sorter, These five tabs are called View Buttons. Impress.
There are many toolbars that can be used during Ans. Outline view serves for two purposes.
the slide creation; they are revealed by selecting Making changes in the text of a slide:

s.
them with View → Toolbars. (i) Add or delete text in a slide just as in the Normal
(ii) The actual Workspace section is below the view.
View Buttons. This is where you assemble the (ii) Move the paragraphs of text in the selected slide
various parts of your selected slide. Each view

ok
up or down by using the up and down arrow
is designed to ease the completion of certain buttons (Move Up or Move Down) on the Text
tasks. Formatting toolbar.
(iii) Normal view is the main view for creating (iii) Change the outline level for any of the
individual slides. Use this view to format and
o paragraphs in a slide using the left and right
design slides and to add text, graphics and arrow buttons (Promote or Demote).
animation effects.

www.kalviexpress.in
(iv) Outline view shows topic titles, bulleted lists
(iv) Both move a paragraph and change its outline
ab
level using a combination of these four arrow
and numbered lists for each slide in outline buttons.
format. Use this view to rearrange the order of (v) Comparing the slides with outline that another
slides, edit titles and headings, rearrange the slide is needed, create it directly in the Outline
order of items in a list and add new slides. view then return to review all the slides against
ur

(v) Notes view lets you add notes to each slide that your outline in the Outline view.
are not seen when the presentation is shown.
.s


w
w
w

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

m
co
s.
COMPUTER APPLICATIONS
www.kalviexpress.in
o ok
ab

VOLUME - II
ur
.s
w
w
w

[137]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

m
co
Contents

s.
Volume - II
UNIT III - WEB PAGE DEVELOPMENT USING HTML AND CSS

ok
9. Introduction to Internet and Email 139-158
10. HTML - Structural Tags 159-170
11. HTML - Formatting text, Creating Tables, List and Links 171-182
12.
o
HTML - Adding multimedia elements and Forms 183-196

www.kalviexpress.in
13. CSS - Cascading Style Sheets 197-204
ab
UNIT IV - JAVASCRIPT
14. Introduction to Javascript 205-218
15. Control Structure in JavaScript 219-230
ur

16. JavaScript Functions 231-236


UNIT V – COMPUTER ETHICS AND CYBER SECURITY
17. Computer Ethics and Cyber Security 237-248
.s

18. Tamil Computing 249-252


Govt. Model Question Paper & Sura’s Model Question Paper - 1 - 2 with Answer Key
w

253-284
March 2019 Question Paper with Answer Key.
w
w

[138]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

UNIT- III Web Page Development


U sing HTML and CSS

m
co
Chapter Introduction to Internet and Email

s.
CHAPTER SNAPSHOT

ok
 9.1. Necessity of Internet
 9.2. Types of Network
 9.3. Internet and WWW
9.3.1. Domain Name

o 9.3.2. What is URL?

www.kalviexpress.in
9.3.3. Who Governs the Internet?
ab
9.3.4. What is W3C?
 9.4. Types of Internet Service
9.4.1. Internet connection and Access Methods
ur

 9.5. Internet Applications


 9.6. Email
9.6.1. Structure of email
.s

9.6.2. Advantage of email


9.6.3. What is sent in an email
 9.7. Internet Threat
w

 9.8. Browsers
9.8.1. Familiar Internet Browser
w

 9.9. Web Page Vs Web Site


 9.10. Static and Dynamic Web Pages
 9.11. Web-Applications
w

9.11.1. E-commerce
9.11.2. E-governance
 9.12 Safe Surfing on Internet

[139]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
140 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9

Evaluation
Part - I 9. Looking for information on the internet is called
(a) Surfing (b) Searching
Choose the Correct Answer : (c) Finding (d) glancing

m
 [Ans. (a) Surfing]
1. What is the expansion of WLAN?
(a) Wireless Local Area Network 10. Safari web browser was developed by
(b) Wired Local Area Network (a) Google

co
(c) Wireless Local Area Netware (b) Apple
(d) Wireless Area Netbande (c) Microsoft
 [Ans. (a) Wireless Local Area Network] (d) Linux Corpn. [Ans. (b) Apple]

2. Range of Campus Network is 11. How many types of websites are available?

s.
(a) 10 KM (b) 5 KM (c) 25 KM (d) 20 KM (a) 3 (b) 2
 [Ans. (b) 5 KM] (c) 4 (d) 6 [Ans. (b) 2]

ok
3. Each computer on net is called
Part - II
(a) host (b) server
(c) workstation (d) node  [Ans. (a) host] Answer to the following questions :
4. The Internet is governed by
o  (2 Marks)
(a) ICANM (b) ICANN
1. List any four types of available networks.

www.kalviexpress.in
(c) ICMA (d) ICNNA
ab
Ans. (i) Local Area Network(LAN)
 [Ans. (b) ICANN]
(ii) Metropolitan Area Network (MAN)
5. Expansion of W3C (iii) Wide Area Network(WAN)
(a) World Wide Web Consortium (iv) Personal Area Network(PAN)
(b) Wide World Web Consortium (v) Campus Area Network(CAN)
ur

(c) World Web Wide Consortium (vi) Wireless Local Area Network(W-LAN)
(d) World Wide Web Consortum
 [Ans. (a) World Wide Web Consortium] 2. Name the two important protocols for internet?
Ans. The internet uses TCP/IP (Transmission Control
.s

6. W3C was established in 1994 by Protocol/Internet Protocol to transmit data via


(a) Tim Berners-Lee various types of media.
(b) Tim Burnard Lee
3. What is a network?
w

(c) Kim Berners


Ans. A network is a collection of interconnected devices
(d) Kim Bernard Lee
(such as computers, printers, etc.).
 [Ans. (a) Tim Berners-Lee]
What is the role of ICANN?
w

4.
7. Hotspot uses which type of network services?
Ans. Internet Corporation for Assigned Names and
(a) LAN (b) PAN
Numbers(ICANN) administers the domain name
(c) WLAN (d) CAN
w

registration. It helps to avoid a name which is already


 [Ans. (c) WLAN]
registered.
8. USB Wifi adapters are often called as
(a) Data Card 5. What is a search engine?
(b) Pen Drive Ans. A search engine is a software system that is designed
(c) Dongles to search for information on the World Wide Web.
(d) Memory Card [Ans. (c) Dongles] Example : Yahoo, Lycos, Hotbot and Google.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 141

6. What is a browser? 13. What is Phishing?


Ans. A browser is used to access websites and web pages Ans. Phishing scams are fraudulent attempts by cyber
whereas search engine is used to search for particular criminals to obtain private information. Phishing
information. scams often appear in the guise of email messages
Example : Chrome, Firefox, Safari, etc., designed to appear as though they are from legitimate

m
sources.
7. What are the components of url addressing?
Ans. Protocol, domain, path, hash and query string.
Part - III
Answer to the following questions :

co
8. What is a website?
Ans. A website is a collection of webpages. For example
 (3 Marks)
if there is a company that owns sri company.com 1. Differentiate PAN and CAN network.
then this website will have several webpages like
Ans. PAN CAN
Home, About us, contact us, Testimonials, Products

s.
Range : upto 100 meter Range: upto 5 kms
Services, FAQ's and others. The first page of the
website is called a Home Page. All of these pages Speed : upto 250 kbps Speed : 40kb/s to 1 mb/s
together make up a website. Easy to mange Difficult to manage

ok
9. What is CC and BCC in an email? Used for shorter Used for longer distance
Ans. (i) CC (Carbon Copy) : The CC (Carbon Copy) distance
field allows you to specify recipients who are 2. What is TCP/IP?
not direct addressees (listed in the ''To" field).
This field is optional.
o Ans. The Internet works by using a protocol called TCP/

www.kalviexpress.in
(ii) BCC(Blind Carbon Copy) : The BCC (Blind
IP. TCP/IP allows one computer to talk to another
ab
computer via the Internet through compiling packets
Carbon Copy) field is similar to CC, except the
of data and sending them to right location.
recipients are secret.
10. What is a Static web Page? 3. Write a note on Hotspot internet service.
Ans. Hotspots are sites that offer Internet access over a
ur

Ans. Web pages are called static web pages as they remain
the same whenever it is visited. Examples of static wireless local area network(WLAN) by way of
web pages are small business organizations, school a router that then connects to an Internet service
websites etc. provider. Hotspots utilize Wi-Fi technology, which
.s

allows electronic devices to connect to the Internet


11. What is a Dynamic web page?
or exchange data wirelessly through radio waves.
Ans. (i) Websites that displays marks of Public
Hotspots can be phone-based or free-standing,
Examinations and Entrance Examinations
w

which changes when different register numbers commercial or free to the public.
are given. Such websites are called as Dynamic 4. Differentiate Data Card and Dongles.
web page/websites. Ans. Data Card Dongles
w

(ii) Example : Websites of Government and It is a removable Refers to any removable
Entrance Exams. electronic card which component used for
is used for storing for enabling extra security.
w

12. What are the benefits of e-governance? data.


Ans. (i) Reduced Corruption
Types of data card are USB Dongles can be
(ii) High Transparency 1. Expansion Card divided into
(iii) Increased Convenience 2. Memory Card or 1. Wi-Fi Dongles
(iv) Reduction in Overall cost Flash Card 2. Blue Tooth Dongle
(v) Expanded reach of government. 3. Identification Card 3. Memory Dongle

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
142 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
5. Write a note on two access methods of connecting 8. What is the difference between Static and dynamic
to internet. web page?
Ans. Two access methods of connecting to internet are, Ans. Static Web Page Dynamic Web page
(i) Indirect Access: This is most common method
The content and layout The content and layout
used in home and office networks. The device of a web page is fixed. may change during run
e.g. computer connects to a network using

m
Ethernet or Wi-Fi and the network connects to time.
the Internet using Asymmetric digital subscriber Static Web pages Databases is used to
line ADSL(cable or fibre.) never use databases. generate dynamic content
(ii) Direct Access: This is most common method

co
through queries.
used when travelling. The device e.g. smart
Static web pages Dynamic web pages
phone connects directly to the Internet using
3G/4G mobile networks or public Wi-Fi. directly run on the runs on the server side
browser and do not application programs and
6. Differentiate browser and a search engine with require any server side displays the results.

s.
suitable examples. application program.
Ans. Browser Search Engine Static Web pages are Dynamic web page
easy to develop. development requires
A browser is used to A search engine is a

ok
programming skills.
access websites and software system that is
web whereas a search designed to search for 9. Write a note on W3C.
engine is used to information on the World Ans. W3C stands for world wide web consortium. It
search for particular Wide Web.
o sets standards for the www to facilitate better
information. communication ability. It was established in 1994 by
the creator of www, Tim Berners Lee.

www.kalviexpress.in
Examples Internet  xamples of popular
E
10. What are advantages of email?
ab
Explorer, Chrome, search engines are Yahoo,
Firefox, Safari etc., Lycos, Altavista, Hotbot, Ans. Advantages of email :
and are the most Google and Askjeeves. (i)  Free delivery
popular web browsers (ii) Global delivery
which Google and (iii) 
Instant Delivery
ur

Yahoo are the most (iv) File attachment


popular search
(v)  Long-term storage
engines.
(vi) Environmentally friendly.
A browser is used to The list of content
.s

access the Internet returned via a search


whereas in order to
open a search engine
engine to a user is known
as a search engine result
Part - IV
you need a browser. page (SERP). Answer to the Following Questions:
w

 (5 Marks)
7. Differentiate Website and Webpage.
1. Compare the different geographical types of
Ans. Website Web page
w

Network.
A collection of Consists of a Single
multiple documents document displayed by a Ans. (i) LAN - Local Area Network :
displayable by a browser. Range : Upto 10 Km.
browser.
w

Location : Refers to same office, same


Has its own unique Shares a unique domain building, same company and in
domain name. name.
same schools.
Contains one or more Makes up a website. Speed : Upto 10-100 Mbps.
webpages. Advantages : Low Cost, Resource Sharing,
Security.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 143

Disadvantages : Area Covered Limited When Advantages : Cost effective,Wired or Wired


number of nodes increases, Network, High Bandwith Multi-
performance Decreases. departmental Network access.
(ii) MAN - Metropolitan Area Network : Disadvantages : Difficult to manage.
Range : 10 to 15 Miles. (vi) WLAN - Wireless Local Area Network :

m
Location : MAN is a network designed to Range : Upto 50 Kms
extend over an entire city.
Location : Ranges from a single room to
Speed : Upto 5 - 10 Mbps. an entire campus Uses Wifi or

co
Advantages : Wider than LAN. Bluetooth, Radio waves.
Disadvantages : Data rate is slow compared to Speed : 1 Mbps to 54 Mbps.
LAN Cost higher than LAN. Advantages : Portable Installation is quick
(iii) WAN - Wide Area Network : and easy.

s.
Range : Above 1000 Kms Disadvantage : Low Bandwith due to
Location : It Span entire countries and interference.
continents.

ok
2. Explain any five types of internet services.
Speed : Upto 256 Kbps to 2 Mbps.
Ans. (i) Wireless: Radio frequency bands are used in
Advantages : Large geographical Area.
place of telephone or cable networks. One of
Disadvantages :  o the greatest advantages of wireless Internet
1. Complicated and Complex. High Cost. connections is the "always-on" connection that

www.kalviexpress.in
2. Requires high Performance. Devices. can be accessed from any location that falls
ab
3. Low security. Cost higher than LAN. within network coverage. Wireless connections
(iv) PAN - Personal Area Network : are made possible through the use of a modern,
which picks up Internet signals and sends them
Range : Upto 100 meters
to other devices.
Location : Used for shorter distance,
(ii) Mobile : Many cell phone and smartphone
ur

controlled by a single person providers offer voice plans with Internet access.
within a single building. Mobile Internet connections provide good
Speed : Up to 250 Kbps. speeds and allow you to access the Internet.
.s

Advantages :  (iii) Cable : Cable Internet connection is a form


1. Efficient, Cost effective and convenient. of broadband access. Through use of a cable
2. Controlled by a single person Hotspot may modem, users can access the Internet over cable
w

connect upto 8 devices. TV lines. Cable modems can provide extremely


fast access to the Internet.
Disadvantages : 
(iv) Satellite : In certain areas where broadband
1. Shorter distance upto 10 meters only.
w

connection is not yet offered, a satellite Internet


2. Data rate is low compared to other network. option may be available, Similar to wireless
(v) CAN - Campus Area Network : access, satellite connection utilizes a modem.
w

Range : Upto 5 Kms. (v) ISDN : ISDN (Integrated Services Digital


Location : Larger than LAN, but smaller Network) allows users to send data, voice and
than MAN. University, school video content over digital telephone lines or
or small business, enterprise. standard telephone wires. The installation of
an ISDN adapter is required at both ends of the
Speed : 40 KB/s TO 1 MB/s.
transmission-on the part of the user as well as
the Internet access provider.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
144 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
3. Explain any five internet applications with (ii) Opera : Opera is a web browser for windows,
suitable examples. mac. OS and linux operating system developed
Ans. (i) Internet telephony: Internet telephony by a Norwegian company opera software OS.
(e.g.Skype) is another common (iii) Kongueror : Konqueror, a free and open -
communications service made possible by source web browser and file manager, provides
web access and file - viewer functionality for

m
the creation of the Internet VoIP stands for Voice-
over-Intenet Protocol, referring, to the protocol file systems. It forms a core part of the KDE
that underlies all Internet communication. software compilation.
(ii) Job search : Nowadays, many people search (iv) Dillo : Dillo is a minimalistic web browser

co
particularly intended for older or slower
for their jobs online as it is quicker and there is
computers and embedded systems. If supports
a larger variety of job vacancies present. People
only plain HTML/ XHTML and images over
can publish resume online for prospective job. HTTP.
Some of the web sites providing this service
(v) Mosaic : Mosaic is the web browser that

s.
are naukri.com. monster.com, summerjob.com, popularized the www and the Internet. It was
recuritmentindia.com. also a client for earlier Internet protocols such
(iii) Stock market updates : Selling or buying as FTP, NNTP and Gopher.

ok
shares sitting on computer through Internet.
5. Classify and explain any five e-commerce parties
Several websites like ndtvprofit.com,
with suitable examples.
moneypore.com, provide information regarding
Ans. Classifying e-commerce according to the parties
investment.
involved:
o
(iv) Travel : One can use Internet to gather (i) Business to consumer (B2C) : Transactions

www.kalviexpress.in
information about various tourist place. It can happen between businesses and consumers.
ab
be used for booking Holiday tours, hotels, In B2C e-commerce, businesses are the ones
train, bus, flights and cabs. Some of the web selling products or services to end-users (i.e.
sites providing this service are goibibo.com, consumers).
makemytrip.com, olacabs.com. (ii) Business to business (B2B) : As its name
(v) Research : Research papers are present online states, B2B e-commerce pertains to transactions
ur

which helps in the researcher doing aliterature conducted between two businesses. Any
review. company whose customers are other businesses
operate on a B2B model.
(vi) Video conferencing : It enables direct face-
(iii) Consumer to business (C2B) : Consumer
.s

to-face communication across networks


to business e-commerce happens when a
via web cameras, microphones, and other
consumer sells or contributes monetary value
communication tools. Video conferencing to a business. Many crowd sourcing campaigns
w

can enable individuals in distant locations to fall under C2B e-commerce.


participate in meetings on short notice, with (iv) Consumer to consumer (C2C) : As you might
time and money savings. have guessed, C2C e-commerce happens when
w

4. Write a note on any five Internet browsers other something is bought and sold between two
than that given in the book.an consumers. C2C commonly takes place on
online marketplaces such as eBay, in which one
Ans. Opera. Konqueror, Lynx, Dillo, Mosaic are the other
w

individual sells a product or service to another.


Internet browesers.
(v) Government to business (G2B) : G2C
(i) Lynx : Lynx is a customizable text based web
transactions take place when a company pays
browser for use on cursor- addressable character
for government goods, services, or fees online.
cell terminals. It is the oldest web browser still
Examples could be a business paying for taxes
in active development and general use having
using the Internet.
started in 1992.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 145

6. Explain the different types of interactions in (iii) G2B (Government to Business): In this case,
e-governance. the e-governance helps the business class
to interact with the government seamlessly.
Ans. Types of Interactions in e-Governance :
It aims at eliminating red-tapism, saving
(i) G2G (Government to Government): When the time, cost and establish transparency in the
exchange of information and services is within business environment, while interacting with

m
the periphery of the government, is termed as government.
G2G interaction. This can be both horizontal,
(iv) G2E (Government to Employees): The
i.e. among various government entities and

co
government of any country is the biggest
vertical, i.e. between national, state and local
employer and so it also deals with employees on
government entities and within different levels
a regular basis, as other employers do. ICT helps
of the entity.
in making the interaction between government
(ii) G2C (Government to Citizen): The interaction and employees fast and efficient, along with

s.
amidst the government and general public raising their level of satisfaction by providing
is G2C interaction. Here an interface is set perquisites and add-on benefits.
up between government and citizens, which E-governance has a great role to play, that

ok
enables citizens to get access to wide variety of improves and supports all tasks performed
public services. The citizens has the freedom to by the government department andagencies,
share their views and grievances on government because it simplifies the task on the one hand
policies anytime, anywhere. o and increases the quality of work on the other.

additional questions and Answers


www.kalviexpress.in
ab
Choose the Correct Answers:1 MARK 5. Which of the following is not a classification of
network?
1. Which of the following is called a collection of inter (a) DAN (b) PAN
connected computers and printer like devices?
ur

(c) W-LAN (d) LAN [Ans. (a) DAN]


(a) Host
(b) Remote Computer 6. Expand W-LAN
(c) Network (a) Wired Local Area Network
.s

(d) Peripheral Equipments [Ans. (c) Network] (b) Weird Local Area Network
2. Networks increase (c) Wireless Local Area Network
w

(a) cost (b) time (d) Wireless Landline Area Network


(c) effort (d) productivity
 [Ans. (c) Wireless Local Area Network]
 [Ans. (d) productivity]
w

3. Networks optimizing 7. What is the coverage range of LAN?


(a) resource (b) cost and time (a) Upto 5 kms (b) Upto 10 kms
(c) effort (d) all of these (c) Upto 10 miles (d) Upto 5 miles 
w

 [Ans. (d) all of these]  [Ans. (b) Upto 10 kms]


4. In how many ways the network classified 8. The coverage range of MAN is
depending upon geographical area covered?
(a) Upto 10 kms (b) Upto 100 kms
(a) 4 (b) 6 (c) 5 (d) 3
 [Ans. (b) 6] (c) Upto 100 meters (d) 10 to 15 miles
 [Ans. (d) 10 to 15 miles]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
146 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
9. In which Network the coverage range is above 18. Which website used for employees can access
1000 kms? company information?
(a) LAN (b) MAN (a) Intranet (b) Extranet
(c) WAN (d) PAN [Ans. (c) WAN] (c) Internet (d) CAN
 [Ans. (b) Extranet]
10. In which network the coverage range is upto

m
5kms? 19. Who is the "father of Internet"?
(a) CAN (b) LAN (a) Charles Babbage
(c) W-LAN (d) None of these (b) Vinton Gray Cerf

co
 [Ans. (a) CAN] (c) Bob Kahh
(d) Tim Berner's lee [Ans. (b) Vinton Gray Cerf]
11. Which of the following used by Internet to
transmit data via various types of media? 20. Who involved in the formation of ICANN?
(a) TCP/IP (b) FTP (a) Vinton Gray Cerf (b) Bob Kahn

s.
(c) HTTP (d) Telnet (c) Tim Berner's lee (d) Bill Gates
 [Ans. (a) TCP/IP]  [Ans. (a) Vinton Gray Cerf]

12. How many things are needed to make 21. Which become an identity and can be access by

ok
the web browser when connected to the Internet?
communication in Internet?
(a) Protocol (b) Intranet
(a) 2 (b) 3 (c) 4 (d) only one
 [Ans. (a) 2] (c) Domain name (d) Extranet
 [Ans. (c) Domain name]
13. Which protocol is used to keep track of the
millions of users?
o 22. Which protocol used the DNS to deliver mail

www.kalviexpress.in
(a) FTP (b) HTTP (c) TCP (d) IP
and information from computer to computer in
ab
Internet?
 [Ans. (d) IP] (a) TCP (b) IP
14. Which protocol reliably transmit the message in (c) FTP (d) HTTP [Ans. (b) IP]
Internet? 23. How many types of domain names are there?
ur

(a) FTP (b) IP (c) TCP (d) HTTP (a) 3 (b) 4 (c) 6 (d) 2
 [Ans. (c) TCP]  [Ans. (d) 2]

15. Which of the following is the most cost - effective 24. Which of the following description denotes
generic domain name of Non-profit organization?
.s

method of communication in the world?


(a) .com (b) .gov
(a) Mobile phones (b) Internet
(c) .org (d) .net [Ans. (c) .org]
(c) Protocols (d) Newspaper
w

 [Ans. (b) Internet] 25. How many parts are there in IP number?
(a) 3 (b) 5 (c) 2 (d) 4
16. The internet works by using a protocol called  [Ans. (d) 4]
w

(a) FTP (b) TCP/IP 26. The parts of IP number is seperated by


(c) HTTP (d) all of these (a) ! (b) . (c) ? (d) @
 [Ans. (b) TCP/IP]  [Ans. (b) .]
w

17. Which of the following is a private network that


uses Internet and public telecommunication 27. IP numbers are represented in the form of
system to share the part of business information? (a) TCP/IP (b) FTP
(a) Internet (b) Intranet (c) HTTP (d) URL [Ans. (d)URL]
(c) Extranet (d) All of these
 [Ans. (c) Extranet]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 147

28. Which of the following is an address where a 37. Which device pick's up Internet signals and sends
webpage can be found on the www? them to other devices?
(a) TCP/IP (b) URL (a) DOT (b) Modem
(c) HTTP (d) None of these
(c) DSL (d) ISDN
 [Ans. (b) URL]
 [Ans. (b) Modem]

m
29. ICANN was created in the year
(a) 1943 (b) 1991 38. Which of the following smartphone provides offer
(c) 1988 (d) 1998 [Ans. (d) 1998] voice plans with Internet access?
(a) Jio (b) Airtel

co
30. Who runs the Internet?
(a) ICANN (b) W3C (c) Idea (d) All of these
(c) Microsoft (d) Google  [Ans. (d) All of these]
 [Ans. (a) ICANN] 39. Which offers Internet access over a WLAN?

s.
31. Which corporation helps to avoid already (a) Broadband (b) DSL
registered domain name? (c) Hotspots (d) ISBN
(a) W3C (b) Microsoft
 [Ans. (c) Hotspots]
(c) ICANN (d) Internet

ok
 [Ans. (c) ICANN] 40. Hotspots utilize the technology is
(a) DSL (b) ISDN
(c) WWW (d) Wi-Fi
32. In which international organization committed to
 [Ans. (d) Wi-Fi]
improving the web?
o
www.kalviexpress.in
(a) ICANN (b) W3C 41. Which of the following electronic devices to
ab
connect to the Internet wirelessly through radio
(c) URL (d) Microsoft
waves?
 [Ans. (b) W3C]
(a) Wi-Fi (b) Cable
33. W3C established in the year (c) ISDN (d) DSL[Ans. (a) Wi-Fi]
(a) 1993 (b) 1994
ur

(c) 1988 (d) 1998 [Ans. (b)1994] 42. Whih Internet uses multiple data channels to send
large quantities of information?
34. W3C established by (a) Dongles
(a) Tim Berners - Lee (b) Vinton Gray Cref
(b) Broadband
.s

(c) Bob Kahn (d) ICANN (c) Hotspots


 [Ans. (a) Tim Berners - Lee] (d) ISDN [Ans. (b) Broadband]
35. WWW creator was
w

43. Which of the following service provides both


(a) Vinton Gray Cref telephone calls and Internet surfing at the same
(b) Bob Kahn time?
w

(c) Tim Berners - Lee (a) Broad Band (b) ISDN


(d) Microsoft [Ans. (c) Tim Berners - Lee] (c) Modem (d) DSL [Ans. (d) DSL]

36. In wireless network, the communication happened 44. Which of the following provides extremely fast
w

access to the Internet?


between the devices through
(a) WSC
(a) Radio Waves (b) Microwaves
(b) Cable Internet Connection
(c) Digital Waves (d) Analog Waves
(c) Satellite
 [Ans. (a) Radio Waves] (d) DSL [Ans. (b) Cable Internet Connection]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
148 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
45. Which of the following utilize a modem? 54. Which access method used to connect Internet
(1) wireless (2) Satellite connection while travelling?
(3) DSL (4) ISDN (a) DSL (b) Router
(a) 1 and 2 (b) 3 and 4 (c) Indirect access (d) Direct access
(c) only 2 (d) 1 and 3  [Ans. (d) Direct access]

m
 [Ans. (a) 1 and 2]
55. How many ways are there to look for the
46. Expansion of ISDN is information on the web?
(a) Indian Standard Digital Network (a) 4 (b) 3

co
(b) International Services Digital Network (c) 2 (d) only one [Ans. (c) 2]
(c) Integrated Services Digital Network
56. Which of the following is not known, the search
(d) Integrated Services Data Network
engines are used to get information in net?
 [Ans. (c) Integrated Services Digital Network]
(a) DSL (b) URL

s.
47. USB, Wi-Fi adapters are often called (c) FTP (d) ISDN[Ans. (b) URL]
(a) Data Card (b) Dongles
57. Which of the following is not a popular search
(c) Cards (d) Pendrives engines?

ok
 [Ans. (b) Dongles] (a) Lynx (b) Lycos
48. Which allows to connect to the Internet even when (c) Google (d) Askjeeves
Wi-Fi is not available?  [Ans. (a) Lynx]
(a) Dongle (b) Data Card
(c) USB (d) Router
o 58. Which of the following is not used to search for
information on the www?

www.kalviexpress.in
 [Ans. (a) Dongle] (a) Yagoo (b) Google
ab
49. How many types of Datacard and Dongle (c) Hotspot (d) Askjeeves
available?  [Ans. (c) Hotspot]
(a) 4 (b) 5
59. A browser is used to access
(c) 6 (d) 3 [Ans. (d) 3]
ur

(a) websites (b) webpages


50. Which of the following is not a Wi-Fi dongle? (c) Internet (d) a and b
(a) Wi-Fi (b) Identification  [Ans. (d) a and b]
(c) Blue Tooth (d) Memory
.s

60. Which of the following is not a web browser?


 [Ans. (b) Identification]
(a) Chrome (b) Firefox
51. Which of the following is not a types of datacard? (c) Yahoo (d) Openoffice
w

(a) Expansion (b) Memory or flash  [Ans. (d) Openoffice]


(c) Identification (d) Blue Tooth
61. Expansion of SERP is
 [Ans. (d) Blue Tooth]
(a) Search Engine Result Page
w

52. How many ways are there to connect Internet? (b) Search Engine Report Page
(a) 2 (b) 3 (c) Social Engine Resource Page
(c) 4 (d) Many (d) System Engine Result Page
w

 [Ans. (d) Many]  [Ans. (a) Search Engine Result Page]


53. How many access methods are there to connect 62. Which of the following is a common communication
Internet? service made by the creation of the Internet?
(a) 2 (b) 4 (a) E-banking (b) E-shopping
(c) 5 (d) More than 5 (c) Internet Telephony (d) Job search
 [Ans. (a) 2]  [Ans. (b) E-Shopping]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 149

63. VOIP stands for 71. Which of the following is an interactive way of
(a) Video Online Internet Protocol communicate with teachers in a class?
(b) Voice Over Internet Protocol (a) Chatting (b) Social Networking
(c) Voice Over Internet Processing (c) E-learning (d) None of these
 [Ans. (c) E-learning]
(d) Video Order Internet Procedure

m
 [Ans. (b) Voice Over Internet Protocol] 72. The first mail was sent by
(a) Bob kahn (b) Ray Tomlinson
64. Which of the following refers buying and selling
(c) Tim Berners lee (d) Vinton Gray lerf
of goods and services using Internet?

co
 [Ans. (b) Ray Tomlinson]
(a) E-shopping
(b) E-Banking 73. The first mail was sent in the year
(c) E-paying (a) 1998 (b) 1991
(c) 1988 (d) 1971 [Ans. (d) 1971]

s.
(d) E-commerce [Ans. (d) E-commerce]
74. Which of the following is refered that
65. Which of the following Internet applications
information exchanged between two users over
gather information about various tourist place? telecommunications?

ok
(a) Moneypore.com (b) Snapdeal.com (a) Chatting (b) Social Network
(c) Goibibo.com (d) Paytm.com (c) E-mail (d) E-learning
 [Ans. (c) Goibibo.com]  [Ans. (c) E-mail]
66. Which of the following is not a largest e-commerce
company?
o 75. A first test e-mail message containing the text
(a) QWERTYVIOP (b) QWERTY

www.kalviexpress.in
(a) Olacabs (b) Flipkart
ab
(c) ELECTRONIC (d) FIRST MAIL
(c) Amazon (d) Paytm
 [Ans. (A) QWERTYVIOP]
 [Ans. (a) Olacabs]
76. How many fields are required to be filled while
67. Which of the following is used in education that sending an email?
enables direct face - to - face communication using
ur

(a) 4 (b) 6
web cameras?
(a) E-commerce (b) E-conferencing (c) 5 (d) 3 [Ans. (b) 6]
(c) Video conferencing (d) E-chatting 77. Which of the following fields should consist of a
.s

 [Ans. (c) Video conferencing] words describing the email's contents?


68. Facebook is an example for (a) To (b) From
(a) E-commerce (b) E-conferencing (c) cc (d) subject
w

(c) E-learning (d) Social Networking  [Ans. (d) subject]


 [Ans. (d) Social Networking] 78. Which of the following field(s) is/are optimal?
(a) subject (b) CC
w

69. Online banking is also called


(c) BCC (d) All of these
(a) E-banking (b) Internet Banking
 [Ans. (d) All of these]
(c) a or b (d) E-Commerce
w

 [Ans. (c) a or b] 79. BCC expansion is


(a) Bold Carbon Copy
70. Which of the following refers to an electronic
(b) Blind Carbon Copy
payment system?
(a) E-banking (b) E-learning (c) Blind Client Copy
(c) Online payment (d) E-commerce (d) Blind Closed Copy
 [Ans. (a) E-banking]  [Ans. (b) Blind Carbon Copy]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
150 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
80. Which of the following could corrupt, steal or 89. Which of the following locates the web pages on
delete data on the computer? the Internet?
(a) E-mail (b) Internet (a) URL (b) FTP
(c) Network (d) Virus (c) SERP (d) none of these
 [Ans. (d) Virus]  [Ans. (a) URL]

m
81. Which of the following is used to mean a variety of 90. How many classifications of webpages?
forms of hostile, intensive, or annoying software (a) 4 (b) 3
of program code? (c) 2 (d) only one [Ans. (c) 2]

co
(a) Spyware (b) Malware 91. Expansion of EDI is
(c) Freeware (d) Shareware (a) Electronic Data Internet
 [Ans. (b) Malware] (b) Electronic Data Interchange
82. Which of the following is not a Malware? (c) Electronic Data Information

s.
(a) Warms (b) Trojan horses (d) E-commerce Data Interchange
(c) Safari (d) Rootkits  [Ans. (b) Electronic Data Interchange]
 [Ans. (c) Safari]

ok
92. How many classifications of e-commerce?
83. Which scams are attempted by cyber criminals to (a) 6 (b) 5
obtain private information? (c) 4 (d) 7 [Ans. (d) 7]
(a) Spam (b) Botnet
93. Expansion of ICT is
(c) Rootkit (d) Phishing

o
[Ans. (d) Phishing]
(a) Information and Communication Technology

www.kalviexpress.in
84. Which of the following are used to obtain (b) Information and Commerce Trade
ab
administrator level access to a computer? (c) International and Commerce Trade
(a) Phishing (b) Rootkit (d) Indian Commerce Technology
(c) Botnet (d) Worm  [Ans. (a) Information and Communication
 [Ans. (b) Rootkit]  Technology]
ur

85. Which of the following cannot be used with out 94. e-seva centres is an example of
the browsers? (a) E-commerce (b) E-banking
(a) E-commerce (b) Facebook (c) E-governance (d) E-savings
(c) E-mail (d) All of the these  [Ans. (c) E-governance]
.s

 [Ans. (d) All of the these] 95. Which of the following is not a benefit of
86. Which of the following translates HTML document e-governance?
(a) Reduced corruption
w

into a webpage?
(a) Web browsers (b) Search engines (b) No transparency
(c) Domain name (d) ICAMN (c) Increase Convenience
(d) Reduction in cost
w

 [Ans. (a) Web browsers]


 [Ans. (b) No transparency]
87. Which of the following is a collection of web pages?
(a) Internet (b) URL 96. How many types of interactions in e-Governance?
w

(c) Web browser (d) Websites (a) 5 (b) 4


(c) 3 (d) 6 [Ans. (b) 4]
 [Ans. (d) Websites]
97. Which helps in making the interaction between
88. A unique address of a webpage is called
government and employees?
(a) HTTP (b) URL
(a) URL (b) SERP
(c) FTP (d) SERP
(c) ICT (d) DSL [Ans. (c) ICT]
 [Ans. (b) URL]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 151

98. Safer Internet day celebrated in the month of 7. Every server on the Internet identified by a unique
(a) January (b) March number called..................
(c) December (d) February (a) key (b) primary key
 [Ans. (d) February] (c) IP number (d) protocol number
 [Ans. (c) IP number]
99. Which refers to removable component used for

m
enabling software protection? 8. ISDN allows to send _____________.
(a) Dongle (b) Data card (a) Data (b) Voice
(c) Hard disk (d) VoIP (c) Video (d) All of these

co
 [Ans. (a) Dongle]  [Ans. (d) All of these]
Choose and fill in the blanks 9. ........... helps to develop standards for the www.
(a) ICANN (b) TCP/IP (c) W3C (d) WWW
1. Expand CAN..........
 [Ans. (c) W3C]
(a) Control Area Network

s.
(b) Conditional Area Network 10. The list of content returned via a search engine to
a user is known as ....................
(c) Campus Area Network
(a) DSL (b) SERP

ok
(d) Campus Area Node
(c) ISDN (d) URL
 [Ans. (c) Campus Area Network]  [Ans. (b) SERP]
2. The coverage range of WLAN is upto ______ 11. Mozila Firefox supports _____________.
(a) upto 500 kms (a) Windows (b) Mac os
(b) upto 100 kms
o (c) linux (d) Android

www.kalviexpress.in
(c) upto 50 kms (e) All of these [Ans. (e) All of these]
ab
(d) upto 1 km [Ans. (c) upto 50 kms]
12. The first page of the website is called ____________.
3. The speed of PAN is up to _______ (a) Home page (b) Default page
(a) upto 10-100 Mbps (c) Web page (d) Surf page
(b) upto 250 Kbps  [Ans. (a) Home page]
ur

(c) upto 256 kbps to 2 Mbps


(d) 1 Mbps to 54 Mbps 13. Expansion of DSL is _______________.
 [Ans. (b) upto 250 Kbps] (a) Data Subscriber Line
.s

4. A Global network is called _________. (b) Data Satellite Line


(c) Digital Subscriber Line
(a) WLAN (b) WAN
(d) Digital Satellite Loader
(c) Internet (d) Google
w

 [Ans. (c) Internet]  [Ans. (c) Digital Subscriber Line]


14. The heart of Intranets and the Internet is called
5. Expansion of TCP is _________.
as ____________.
(a) Transfer Control Protocol
w

(a) TCP (b) IP


(b) Transmission Control Protocol
(c) FTP (d) DNS [Ans. (d) DNS]
(c) Transmission Control Procedure
(d) Transmission committed Protocol Choose the correct statement
w

 [Ans. (b) Transmission Control Protocol]


1. Which of the following statement is true regarding
6. Expansion of IP is ____________. WLAN?
(a) Internet Procedure (i) Range upto 5 kms
(b) Internet Program
(ii) connected using Wi-Fi or Bluetooth or Radio
(c) Internet Protocol waves
(d) Intranet Protocol [Ans. (c) Internet Protocol]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
152 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
(iii) Installation is not quick and easy 2.
(iv) High bandwidth due to interference.
Speed Type of
(a) (ii) (b) (iii) Network
(c) (iv) (d) (i) and (ii) i) 1 Mbps to 54 Mbps 1) MAN
 [Ans. (a) (ii)]
ii) upto 10-100 Mbps 2) LAN

m
Choose the incorrect statement iii) upto 256 kbps 3) PAN
to 2 Mbps
1. Which of the following statement is false regarding
iv) upto to 5-10 Mbps 4) W-LAN

co
PAN?
v) upto to 250 kbps WAN
(i) Range upto 100 meters
(ii) Controlled by a single person (a) 5, 3, 1,2, 4 (b) 1, 5, 4, 3, 2
(iii) Speed 40 KB/s to 1 MB/S (c) 2, 4, 5, 1, 3 (d) 4, 2, 5, 1, 3

s.
(iv) Hotspot may connect upto 8 devices  [Ans. (d) 4, 2, 5, 1,3]
(v) wider than LAN 3.
(a) (iii), (v) and (i) (b) Only (iv)

ok
Generic
(c) (iii) and (v) (d) Only (iii) Description
Domain Name
 [Ans. (c) (iii) and (v)]
i) .gov 1) Network support
2. Which of the following statement is not true Group
regarding static web page? ii) .org 2) Commercial
(i) The layout of the web page is fixed
o orgranisation

www.kalviexpress.in
(ii) It uses database iii) .net 3) Government
ab
organisation
(iii) It requires server side application
iv) .com 4) None profit
(iv) It is easy to develop organisation
(a) (i) and (iv) (b) only (ii) (a) 3, 4, 1, 2 (b) 4, 3, 2, 1
ur

(c) (iii) and (iv) (d) (ii) and (iii) (c) 4, 2, 1, 3 (d) 3, 4, 2, 1
 [Ans. (d) (ii) and (iii)]  [Ans. (a) 3, 4, 1, 2 ]
4.
Match the following
.s

1. Browser Description
i) Google chrome 1) Exclusively used
Type of Network Range in Mac system
w

i) LAN 1) Above 500 Kms ii) Internet Explorer 2) Default browser


in Ubuntu
ii) MAN 2) upto 5 Kms
iii) Mozila Firefox 3) Best in speed,
iii) WAN 3) upto 10 Kms
w

simplicity,
iv) PAN 4) 10 to 15 Miles security
v) CAN upto 100 Meters iv) Safari 4) default browser
w

of windows PC.
(a) 4, 1, 5, 3, 2 (b) 3, 4, 1, 5, 2
(c) 5, 2, 1, 3, 4 (d) 1, 3, 4, 2, 5 (a) 3,4,2,1 (b) 4,3,1,2
 [Ans. (b) 3, 4, 1, 5, 2 ] (c) 3,4,1,2 (d) 4,3,2,1
 [Ans. (c) 3, 4, 1, 2]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 153

5. Match the following 3. Expand (i) VoIP (ii) ICT


Ans. (i) Voice-Over Internet Protocol
e-commerce (ii) Information and Communication Technology.
Description
classification
i) Selling products 1) G2B 4. What is E-Commerce?
to end-users Ans. E-commerce (Electronic Commerce or EC) is the

m
ii) Crowd Sourcing 2) C2C buying and selling of goods and services, or the
campaign transmitting of funds or data, over an electronic
network, primarily the Internet.
iii) Ebay.com 3) G2C

co
5. What is the use of social networking?
iv) Paying GST using 4) B2C
Internet Ans. Social networking is the use of Internet-based social
v) Car Insurance C2B media programs to make connections with friends,
Renewals family, classmates, customers and clients.

s.
(a) 5,3,1,4,2 (b) 3,5,2,1,4 6. What is voicemail?
(c) 3,5,1,2,4 (d) 3,5,1,4,2
Ans. Voicemail is a system of sending messages over the
 [Ans. (b) 3, 5, 2, 1, 4]
phone. Calls are answered by a machine which connects

ok
6.
you to the person you want to leave a message for and
Description Virus they can listen to their messages later.
i) hijacking webcam 1) oBotnet 7. What is E-mail?
ii) Keylogger 2) Spam Ans. Email is short for 'electronic mail' similar to a letter, it is

www.kalviexpress.in
software used sent via the Internet to a recipient.
ab
iii) Replicate in 3) Malicions 8. What is dongle?
great speed spyware
Ans. Dongle refers to removable component used for
iv) became "Zombie" 4) Trojan horse enabling software protection. E.g.USB, Wi-Fi.
computer
9. What is E-governance?
v) Electronic Junk mail worm
ur

Ans. Electronic governance or e-governance is the


(a) 4,3,5,1,2 (b) 5,3,4,1,2 application of information and communication
(c) 3,5,4,2,1, (d) 4,5,3,1,2 technology (ICT) for delivering government services.
 [Ans. (a) 4, 3, 5, 1, 2] 10. What is use of of IP in TCP/IP?
.s

Ans. The Internet Protocol (IP) addressing system is used


Very Short Answers: 2 MARKS to keep track of the millions of users.
w

11. What is Internet?


1. What are the needed for TCP/IP?
Ans. Several networks, small and big all over the world,
Ans. Two things required for TCT/IP needed are
are connected together to form a Global network
w

(i) Message to transmit


called the internet.
(ii) Means to reliably transmit the message.
2. Write any four examples of Internet. 12. What is Intranet?
w

Ans. Examples of Internet are Ans. It is a website used by organizations to provide a


(i) email place where employees can access company related
(ii) Instant Messaging information.
(iii) Social Networking 13. What is Extranet?
(ii) Online Shopping. Ans. It is a private network using Internet technology to
share part of business information with suppliers
partners and customers.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
154 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
14. What is SERP? 24. What is VoIP?
Ans. The list of content returned via a search engine to a Ans. VoIP stands for Voice-over-Internet Protocol,
user is known as a search engine results page. referring to the protocol that underlies all Internet
15. What is domain name? communication.
Ans. Domain name is a name or an identity which become 25. Name any three job searches services for online.

m
a online identity and can be access by the web
browser when connected to internet. Ans. Job Search service are naukri.com, monster.com,
summerjob.com,recuritmentindia.com.
16. What do you mean by IP number?
26. What is computer virus?

co
Ans. Every server on the internet has an IP number, a
unique number consisting of four parts separated by Ans. A computer virus is a small piece of software that
dots. The IP number is the server's address.
can spread from one infected computer to another.
17. What is URL? The virus could corrupt, steal, or delete data on your
Ans. A URL is an address that shows where a particular

s.
computer even erasing everything on your hard drive.
page can be found on the World Wide Web. URLis an
abbreviation for 'Uniform Resource Locator (URL)'. A virus could also use other programs like your email
program to spread itself to other computers.
18. Who Governs the internet?

ok
Ans. ICANN is the internet society, which is a voluntary 27. What is "Zombie" computer?
membership of organization takes the responsibility Ans. A botnet is a group of computers connected to the
to promote global information through the internet Internet that have been compromised by a hacker
technology. o using a computer virus or Trojan horse. An individual
19. Expand (i) DSL (iii) ISDN computer in the group is known as a "zombie"

www.kalviexpress.in
Ans. (i) Digital Subscirber Line computer.
ab
(ii) Integrated Services Digital Network. 28. What is Internet Telephony?
20. Write a note on DSL. Ans. Internet telephony (e.g. Skype) is another common
Ans. DSL, which stands for Digital Subscriber Line, uses communications service made possible by the
existing 2-wire copper telephone line connected to creation of the Internet.
ur

one's home so service is delivered at the same time as


29. What is the theme of SID?
landline telephone service. Customers can still place
calls while surfing the Internet. Ans. "Create, connect and share respect: A better internet
starts with you".
21. Write a note on ISDN.
.s

Ans. ISDN (Integrated Services Digital Network) allows Short Answers: 3 MARK
users to send data, voice and video content over
digital telephone lines or standard telephone wires. 1. Write a note on extranet.
w

22. What are the two methods are there to access the Ans. An extranet is a private network that uses Internet
internet? technology and the public telecommunication system
Ans. (i) Direct Method to securely share part of a business's information or
w

(ii) Indirect Method. operations with suppliers, vendors, partners, customers,


23. How many ways to look for the information on or other businesses.
w

the web? 2. Write a note on Intranet.


Ans. There are two ways to look for the information on
Ans. An Intranet is a website used by organizations to
the web.
provide a place where employees can access company
(i) If the URL of the website is known, enter it on
the address bar. information (eg policies, procedures, staff, directory,
department info), tools (quick links to common apps,
(ii) If is the URL is not known, then "Search
Engines" will help us to get the information. forms etc.) and (collaborate (to social sharing tools
similar facebook).

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 155

3. Write the description of the following Generic 7. Write a short note on online payment.
Domain Name. Ans. The rising boom of online payments in India has
(i) .com (ii) .gov given way to many new entrants in the industry such
(iii) .org (iv) .net (v) . edu as Paytm etc who are majorly wallet driven payment
Generic Domain companies. This growth has been driven by rapid
Ans. Description

m
Name adoption led by the increasing use of smartphones,
(i) .com Commercial Organisation tablets and speedy access to internet through
(ii) .gov Government institution broadband, 4G etc
What is the use of social networking?

co
(iii) .org Non-profit Organisation 8.
(iv) .net Network Support Group Ans. (i) Social networking is the use of internet-based
(v) .edu Educational Institution social media programs to make connections with
friends, family, classmates, customers and clients.
4. What is broadband? (ii) Social networking can be done for social

s.
Ans. (i) This high-speed Internet connection is provided purposes, business purposes or both. The
through either cable or telephone companies. One programs show the associations between
of the fastest options available, broadband Internet individuals and facilitate the acquisition of new

ok
uses multiple data channels to send large quantities contacts.
of information. (iii) Examples of social networking includes
(ii) The term broadband is shorthand for broad Facebook.
bandwidth. Broadband Internet connections such
o 9. What is e-banking?
as DSL and cable are considered highbandwidth Ans. e-banking (Online banking) , also known as internet
connections.

www.kalviexpress.in
(iii) Although many DSL connections can be considered
banking, it is an electronic payment system that
enables customers of a bank or other financial
ab
broadband, not all broadband connections are institution to conduct a range of financial transactions
DSL. through the financial institution's website.
5. Write a note on DNS. 10. Write a short note on e-learning.
Ans. The heart of intranets and the internet is called as the Ans. (i) E-learning is utilizing electronic technologies
ur

to access educational curriculum outside of a


Domain Name System(DNS), the way computers can
traditional classroom. It is a program delivered
contact each other and do things such as exchange completely online.
electronic mail or display Web pages. The Internet
(ii) E-learning is interactive in that you can also
.s

Protocol (IP) uses this Internet address information communicate with teachers, professors or other
and the DNS to deliver mail and other information students in a class.
from computer to computer (iii) Sometimes it is delivered live, where you can
w

"electronically" raise your hand and interact in


6. What is online shopping?
real time and sometimes it is a lecture that is
Ans. (i) The internet has also facilitated the introduction of prerecorded.
a new market concept consisting of virtual shops. (iv) There is always a teacher/ professor interacting/
w

(ii) They provide information about products or communicating, grading participation, giving
services for sale through www servers. Using the assignments and conducting tests.
internet services customers can submit specific 11. What do you mean by 'Malicious software'?
w

product queries and request specific sales quotes. Ans. (i) Malware is short for "malicious software:'
(iii) Example amazon.com is a www based bookshop Malware is used to mean a "variety of forms
on the internet where information on all types of of hostile, intrusive, or annoying software or
international books can be found and books can be program code.
ordered online. (ii) Malware could be computer viruses, worms,
Trojan horses, dishonest spyware, and malicious
rootkits.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
156 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
12. What is Malicious Spyware? actuators and connectivity which enables these things
Ans. Malicious spyware is used to describe the Trojan to connect and exchanges data creating opportunities
application that was created by cyber criminals to spy for more direct integration of the physical world
on their victims. An example would be key logger into computer-based systems, resulting in efficiency
software that records a victim's every keystroke
on his or her keyboard. The recorded information improvements, economic benefits, and reduced human

m
is periodically sent back to the originating cyber exertions.
criminal over the Internet. Key logging software
18. Expand (i) VSNL (ii) SERP (iii) SID
is widely available and is marketed to parents

co
or businesses that want to monitor their kids' or Ans. (i) Videsh Sanchar Nigam LTD
employees' Internet usage. (ii) Search Engine Result Page
13. What is computer worm? (iii) Safer Internet Day.
Ans. (i) A computer worm is a software program that
Long Answers:

s.
can copy itself from one computer to another, 5 MARKS
without human interaction.
(ii) Worms can replicate in great volume and with 1. Explain the structure of email.
great speed. Ans. Structure of email : Click the Compose button and

ok
(iii) For example, a worm can send copies of itself then writing an e-mail contents.
to every contact in your email address book When sending an e-mail message, several fields
and then send itself to all the contacts in your are required to be filled:
contacts' address books.
(i) The To field is where you type the e-mail address
14. Write a note on spam.
o
Ans. Spam in the security context is primarily used to describe
of the person who is the recipient of your message.

www.kalviexpress.in
email spam. Unwanted messages in your email inbox. (ii) The From filed should contain you e-mail address.
ab
Spam, or electronic junk mail, is a nuisance as it can (iii) If you are replying to a message, the To and
clutter your mailbox as well as potentially take up space From fields are automatically filled out; if
on your mail server. However, spam messages can it's a new message, you'll need to enter them
contain links that when clicked on could go to a website manually.
ur

that installs malicious software onto your computer.


15. Definition of rootkit. (iv) The Subject should consist of a few words
Ans. A rootkit is a collection of tools that are used to obtain describing the e-mail's contents. The Subject
administrator-level access to a computer or a network lets the recipient see what the e-mail is about,
.s

of computers. A rootkit could be installed on your without opening and reading the full e-mail.
computer by a cybercriminal exploiting a vulnerability This field is optional.
or security hole in a legitimate application on your PC (v) The CC (Carbon Copy) field allows you to
w

and may contain spyware that monitors and records specify recipients who are not direct addressees
keystrokes. (listed in the "To" field). This field is optional.
16. What is sandboxing? (vi) The BCC (Blind Carbon Copy) field is similar
w

Ans. Sandboxing is a software managing techinque through to CC, except the recipients are secret. Each
which programs that are suspected to be infected with BCC recipient will receive the e-mail, but will
a virus can be run. The programs are run is a separated not see who else received a copy. The addressees
w

memory area and therefore cannot damage the operating (anyone listed in the "To" field) remain visible
systems. to all recipients. This field is optional.
17. What is IoT? (vii) Finally, the Message Body is the location
Ans. The Internet of Things (IoT) is the network of physical you type your main message. It often contains
devices, such as vehicles, home appliances, and other your signature at the bottom; similar to a hand-
items embedded with electronics, software, sensors, written letter.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
Sura’s  XI Std - Computer Applications ➠ Introduction to Internet and Email 157

2. Explain the advantages of email. messages designed to appear as though they are
Ans. The main advantages of email are listed below : from legitimate sources. For example, the message
(i) Free delivery : Sending an e-mail is virtually would try to lure you into giving your personal
free, outside the cost of Internet service. There information by pretending that your bank or email
is no need to buy a postage stamp to send a service provider is updating its website and that
letter. you must click on the link in the email to verify

m
(ii) Global delivery : E-mail can be sent to nearly your account information and password details.
anywhere around the world, to any country. (v) Rootkit: A rootkit is a collection of tools that
(iii) Instant delivery : An e-mail can be instantly are used to obtain administrator-level access to

co
sent and received by the recipient over the a computer or a network of computers. A rootkit
Internet. could be installed on your computer by a cyber
(iv) File attachment : An e-mail can include one criminal exploiting a vulnerability or security
or more file attachments, allowing a person to hole in a legitimate application on your PC and

s.
send documents, pictures, or other files with an may contain spyware that monitors and records
e-mail. keystrokes.
(v) Long-term storage : E-mails are stored
electronically, which allows for storage and 4. Explain any four familiar Internet Browser.

ok
archival over long periods of time. Ans. (i) Google Chrome is a freeware familiar web browser
(vi) Environmentally friendly : Sending an e-mail developed by Google Inc. It is best for its speed,
does not require paper ( Paperless), cardboard, simplicity, security, privacy and customization
or packing tape, conserving paper resources. features. Google Chrome supports on Android
3.
o
Explain any five Internet threat to be common
4.0 or higher, iOS 6.0 or higher, Mac OSX 10.6 or

www.kalviexpress.in
people. higher and Windows (XP sp2 or higher) and Linux
ab
system.
Ans. (i) Computer worm: A computer worm is a software
program that can copy itself from one computer to (ii) Mozila Firefox is a free and open source web
another, without human interaction. Worms can browser developed by Mozilla Foundation and
replicate in great volume and with great speed. For Mozilla Corporation. FireFox is default browser in
Ubuntu . It supports Windows, Mac OS X, Linux
ur

example, a worm can send copies of itself to every


contact in your email address book and then send and Android system.
itself to all the contacts in your contacts' address (iii) Internet Explorer commonly known as Microsoft
books. Internet Explorer or Windows Internet, Explorer is
.s

(ii) Botnet: A botnet is a group of computers the first or default browser for a Windows Pc. It is
connected to the Internet that have been developed by Microsoft.
compromised by a hacker using a computer virus (iv) Safari is a web browser developed by Apple Inc.
w

or Trojan horse. An individual computer in the and comes with OS X and iOS. Some version of
group is known as a "zombie" computer. safari browser also supports in Windows Operating
(iii) Spam: Spam in the security context is primarily System. Exclusively used in Apple Mac system.
w

used to describe email spam. Unwanted messages 5. Explain the detail about the do's and don't of safe
in your email inbox. Spam, or electronic junk mail, surfing on Internet.
is a nuisance as it can clutter your mailbox as well
Ans. Following is the do's and don't of safe surfing on
w

as potentially take up space on your mail server.


Internet :
However, spam messages can contain links that
(i) Don't give out your personal information -
when clicked on could go to a website that installs
Don't put personal details such as your home
malicious software onto your computer.
address, telephone numbers or parent's work
(iv) Phishing: Phishing scams are fraudulent attempts address online as cybercriminals can use this
by cybercriminals to obtain private information. information to create a fake profile with your
Phishing scams often appear in the guise of email details.
orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000
This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores
158 Sura’s  XI Std - Computer Applications ➠ Volume II ➠ Unit III ➠ Chapter 9
(ii) What goes online, stays online - Use privacy (v) Always protect your mobile device - Make
settings to make sure only your friends and sure your mobile phone is pin-protected so all
family can see photos you post. Avoid posting your personal information stored on it is safe.
holiday plans as criminals have been known to Download a security app which allows you to
track your movements remotely wipe any personal data, should your
mobile be lost or stolen

m
(iii) Check your security and privacy settings -
(vi) Don't talk to strangers online or offline - Don't
Make sure your social network privacy settings
meet up with strangers and let your parents
are secured so only your friends can see your know if a stranger has tried to get in contact
personal information and use your privacy

co
with you online.
settings to restrict who can see your posts, (vii) Listen to the adults who know - Adults will
videos and photos always be worried about you. Help set their
(iv) Password safety - Sharing your password mind at rest and avoid chatting online with
with your parents is a sensible idea, but avoid strangers.

s.
sharing your password with your friends, even (viii) Be wary of unsecured or unknown websites
if they promise they won't tell anyone! Also, - When shopping online, use reputable and
when setting your password, make sure it isn't known retailers.

ok
something people may guess such as your pet's (ix) Be careful what links you click on - Avoid
name. Use a mixture of letters, numbers and clicking links in an email, Instant Message or
upper and lower case characters on your social network unless you are sure the
o message is from someone you know.

www.kalviexpress.in
ab

ur
.s
w
w
w

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Chapter
10 HTML - S tructural Tags

m
co
CHAPTER SNAPSHOT

s.
 10.1. Introduction to HTML
 10.2. Writing HTML document

ok
10.2.1. HTML Document Structure
10.2.2. Structural Tags of HTML
o 10.2.3. HTML Tools
 10.3. HTML Attributes

www.kalviexpress.in 10.3.1. Attributes for Structural Tags


ab
 10.4. Headings
10.4.1. Attribute of Heading Tag
 10.5. Line Breaks and Paragraphs
ur

 10.6. Comments
 10.7. Container and Empty Elements
.s
w
w
w

[159]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Sura’s  XI Std - Computer Applications - Sura’s Model Question Papers 275


<body> executed, the current iteration of the enclosing loop
</body> is terminated, and the next iteration begins. For
</html> example,
(or) for(var n=0;n<=10;n++)
{
Web sites typically use cookies for the following

m
reasons: if(n==5)
(i) To collect demographic information about who {
has visited the Web site. continue;

co
(ii) Sites often use this information to track how }
often visitors come to the site and how long document, write (n+” <br >”);
they remain on the site. }
(iii) It helps to personalize the user’s experience on In the above example, which writes out the value of

s.
the Web site. n starting from 0, when n is equal to 5 the continue
(iv) Cookies can help store personal information statement is executed and the continue statement
about users so that when a user subsequently continues the loop without printing the value.

ok
returns to the site, a more personalized (or)
experience is provided. Attributes of <input> tag:
38. JavaScript also supports statements used to modify
(i) Type: This attribute is used define the type of
flow control, specifically break and continue. The
control to be created by <input> tag.

For example :
o
break statement will terminate the loop early.
(ii) Name: This attribute of <input> tag is used to

www.kalviexpress.in assign a name to the input controls. When the


ab
for(var n=0;n<=10;n++)
form is submitted, the data values are passed to
{
the server along with the names of the controls.
if(n==5)
(iii) Value: This attribute is used to define default
{
value to some controls.
ur

break;
} (iv) Size: This is used to set the width of the input
text in terms of characters. It is applicable only
document, write (n+” <br >”);
for textbox and password boxes.
}
.s

In the above example, which writes out the value (v) Maxlength: This attribute of <input> tag is
of n starting from 0, when n is equal to 5 the break used to set the length of the input character
statement is executed and the loop is terminated (number of characters to be inputted) to the
w

The continue statement will skip back to the loop textbox and password boxes.
condition check. When the continue statement is
w


w

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Public exam Question Paper (With Answers)


11th March - 2019
STD
Time : 2.30 hours COMPUTER APPLICATIONS Maximum Marks : 70

m
Part- A 9. Which feature is used to call attention to the reader?
Note : (i) All questions are compulsory. (a) Italics (b) Underline

co
(ii) Choose the most appropriate answer from (c) Highlight (d) Bold
the given four alternatives and write the 10. The tag used to insert an image in HTML.
option code and the corresponding answer. (a) IMG (b) PIC
 (15 × 1 = 15)
(c) Image (d) Picture

s.
1. Which type of booting is used when a system restarts?
11. The extension of CSS file is :
(a) Touch boot (b) Real boot
(a) .csc (b) .htm
(c) Warm booting (d) Cold booting
(c) .ssc (d) .css

ok
2. 2^30 is referred as :
12. The file reload into the browser uses the shortcut
(a) Peta (b) Mega
key :
(c) Giga (d) Tera
(a) F4 (b) F5 (c) F2 (d) F3
3. Display devices are connected to the computer 13. What will be the output for the following Snippet?
through :
o for(var a=0; a<15; a++)

www.kalviexpress.in
(a) SCSI port (b) VGA connector
ab
{
(c) USB port (d) PS / 2 port if(a= =4)
4. Operating System is a : {
(a) System Software (b) Component break;
(c) Application Software
ur

}
(d) Hardware
document.write(a+"<br>");
5. Which is displayed at the top most part of the
}
window?
.s

(a) Title bar (b) Format bar (a) 0 1 2 3 4 (b) 0 1


(c) Menu bar (d) Tool bar (c) 0 1 2 (d) 0 1 2 3
14. Predefined functions are also called as :
w

6. A formula in Calc may begin with :


(a) – (b) = (a) Instructions
(c) + (d) All the above (b) Commands
w

7. How many types of websites are available? (c) Library functions


(a) 4 (b) 6 (d) Storage functions
(c) 3 (d) 2
w

15. Which one of the following are self-repeating and do


8. HTML tags should be specified within : not require a computer program to attach themselves?
(a) ( ) (b) < >
(a) Spyware (b) Trojans
(c) [ ] (d) { }
(c) Viruses (d) Worms

[276]

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019 277
Part - B }
Answer any 6 questions. Question No. 24 is compulsory. else
 (6 × 2= 12) {
16. What is a Computer? alert("you are not eligible to get Driving Licence");
17. What is Open Source? }

m
18. Write a note on Library functions. 31. What are the advantages of using CSS?
19. What is Cell Pointer? 32. Write about <script> tag.
20. Explain with the help of an example the difference 33. Write an HTML code to scroll the following message

co
between container and empty elements of HTML. in a web page.
21. What are the types of list in HTML? "Welcome to HTML"
22. Write the output of the following HTML code:
Part - D
<HTML>
Answer all questions. (5 × 5 = 25)

s.
<BODY>
34. (a)  Explain the basic components of a computer
<OL>
with a neat diagram.
<L1> Keyboard
(or)

ok
<L1> Monitor
(b)  Convert (155) 10 into Binary, Octal and
<L1> Speaker
Hexadecimal equivalent.
</OL>
</BODY>
o 35. (a)  Explain in detail about the different mouse
</HTML> actions.

www.kalviexpress.in
23. List out the popular image formats.
(or)
ab
(b)  How many types of views are provided by
24. Write about the shortcut keys for LEFT, RIGHT,
Impress to its users? Explain them.
CENTER and JUSTIFIED alignments.
36. (a)  E
 xplain the five internet applications with
Part - C
suitable examples.
ur

Answer any 6 questions. Question No. 33 is compulsory. (or)


 (6 × 3 = 18)
(b)  Explain the attributes used with <table> tag in
25. (a) Add : 11012 + 10102
HTML.
.s

(b) Subtract : 101002 – 11112


37. (a) Write an HTML code to create the following
26. Explain and list out examples of Mobile Operating table :
System.
w

Class Boys Girls


27. Differentiate Thunderbird and Firefox in Ubuntu OS.
XI 75 80
28. What are the different types of page orientation?
XII 65 70
w

29. Differentiate website and webpage.


30. What message will be displayed, if the input for age (or)
is given as 20, for the following snippet? (b) Explain the <form> tag with its attributes.
w

if(age>=18) 38. (a) Explain switch case statement with example.


{ (or)
alert("you are eligible to get Driving Licence") (b)  escribe any five pre-defined functions in
D
JavaScript with examples.



orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

278 Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019

20. Container Elements :


Answer (i) The tags which are required opening and
Part - A closing is known as container elements or tags.
1. (c) Warm booting (ii) Example : <html>, <body>, <title>, <p> etc.,
2. (c) Giga Empty Elements :

m
3. (b) VGA connector (i) The tags which are required only opening tag
4. (a) System Software is known as empty elements or tags.

co
5. (a) Title bar (ii) Example : <br>.
6. (d) All of the above 21. HTML supports three types of lists viz. numbered,
unnumbered and definition. These lists are called
7. (d) 2
as Ordered List, Unordered List and Definition List
8. (b) <>

s.
respectively.
9. (c) Highlight 22. Output :
10. (a) IMG

ok
11. (d) .css
12. (b) F5 1. Keyboard
2. Monitor
13. (d) 0123 3. Speaker

14. (c) Library functions


o
15.

www.kalviexpress.in
(d) Worms
ab
23. (i) GIF : Graphical Interchange Format
Part - B
(ii) JPEG : Joint Photographic Experts Group
16. Computer is an electronic device that processes the (iii) PNG : Portable Network Graphics
input according to the set of instructions provided to
(iv) SVG : Scalable Vector Graphics.
ur

it and gives the desired output at a very fast rate.


24.
17. Open source refers to a program or software in which Alignment Shortcut key
the source code is available in the web to the general 1. LEFT Ctrl + L
public free of cost.
.s

2. RIGHT Ctrl + R
18. Pre-defined functions are already defined in the 3. CENTER Ctrl + E
JavaScript library which are also called Library 4. JUSTIFIED Ctrl + J
w

function. For example isNaN(). toUpperCase(),


Part - C
toLowercase(), length(), alert(), prompt(), write()
etc., are pre-defined functions. 25.
w

19. Cell pointer is a rectangle element which can be (a) Add : 11012 + 10102 (b) Subtract : 101002 – 11112
1101 10100
moved around the worksheet. The cell in which the
1010 1111
cell pointer is currently located is known as "Active
w

10111 0101
cell".
Ans : 101112 Ans : 01012
26. A mobile operating system controls a mobile device
and its design supports wireless communication and

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019 279
different types of mobile applications. It operates on 31. (i) 
Maintainability : CSS are also defined and
smart phones Tablets and Digital Mobile devices. stored as separate files. So, the style and
(i) Google Android appearance of a web page can be dynamically
changed and maintain with less effort.
(ii) Apple iOS
(ii) Reusability : The styles defined in CSS can

m
(iii) Blackberry
be reused in multiple HTML pages.
(iv) Symbian
27. Five fox is a browser. Thunderbird is email client (iii) Easy to understand : The tags in web pages
are well organized with style specifications and

co
which can be used view emails received.
S. therefore it is easy to understand.
Thunderbird Firefox
No 32. JavaScript can be implemented using <script>....
1. Ubuntu has in-built Firefox is a browser is </script> tags. The <script> tag containing JavaScript
email software called access internet.

s.
can be placed anywhere within in the web page, but
Thunderbird.
it is normally recommended that it should be kept
2. It is the default email It is the default browser
within the <head> tags. The <script> tag alerts the
client in ubuntu. for ubuntu.

ok
3. Thunderbird is a Firefox is also Mozilla browser program to start interpreting all the text
Mozilla product. product. between these tags as a script commands.
33. Output :
28. Page orientation refers to how the document will
be displayed on screen and printed. There are two <html>
different orientations :
o <head>

www.kalviexpress.in <title>Scrolling text using <Marquee></title>


ab
Landscape : The width of the document is more
than the height. This is best suited for displaying </head>
professional photos, invitations, albums, tables etc. <body>
Portrait : This is the most common and default <marquee> “Welcome to HTML” </marquee>
ur

orientation. Here, the height of the document is more </body>


than the width. Normally books, newspapers will be </html>
displayed in this format. Part - D
29.
.s

34.(a) Components of a Computer :


Website Web page
(i) The computer is the combination of hardware
A collection of multiple Consists of a Single
documents displayable by document displayed by a and software. Hardware is the physical
w

a browser. browser. component of a computer like motherboard,


Has its own unique Shares a unique domain memory devices, monitor, keyboard etc., while
domain name. name. software is the set of programs or instructions.
w

Contains one or more Makes up a website. Both hardware and software together make the
webpages.
computer system to function.
30. Output :
w

you are eligible to get Driving License

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

280 Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019

Memory Unit :
(i) The Memory Unit is of two types which are
primary memory and secondary memory. The
primary memory is used to temporarily store

m
the programs and data when the instructions
are ready to execute. The secondary memory
is used to store the data permanently.

co
(ii) The Primary Memory is volatile, that is, the
content is lost when the power supply is
switched off. The Random Access Memory
(ii) The computer is the combination of hardware

s.
(RAM) is an example of a main memory.
and software. Hardware is the physical
component of a computer like motherboard, (iii) The Secondary memory is non volatile, that is,
memory devices, monitor, keyboard etc., while the content is available even after the power

ok
software is the set of programs or instructions. supply is switched off. Hard disk, CD-ROM
Both hardware and software together make the and DVD ROM are examples of secondary
computer system to function. memory.
Central Processing Unit :
o
CPU is the major component which interprets and
(or)

www.kalviexpress.in
executes software instructions. It also control the
(b)
ab
(15510)
operation of all other components such as memory, Binary :
input and output units. 155
2
Arithmetic and Logic Unit : 2 77 – 1
ur

(i) The ALU is a part of the CPU where various 2 38 – 1


computing functions are performed on data. 2 19 – 0
(ii) The ALU performs arithmetic operations 2 9–1
2 4–1
such as addition, subtraction, multiplication,
.s

2 2–0
division and logical operations. 1–0
Control Unit
(155)10 = (10011011)2
w

ALU
Binary :
Input Unit Output Unit
8 155
w

Internal
Memory Data Path 8 16 – 3
Control Path 2–3
Main Memory (155)10 = (233)8
w

Hexadecimal :
Secondary Storage
Components of a Computer 16 155
9 – 11
(155)10 = (9b)16 ∴ 11 = b

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019 281
35.(a) by the creation of the Internet VoIP stands
Action Reaction for Voice-over-Intenet Protocol, referring,
Point to an item Move the mouse to place the pointer to the protocol that underlies all Internet
on the item. communication.
Click an item Point to the item on your screen and (ii) Job search : Nowadays, many people search

m
quickly press and release the left
mouse button. for their jobs online as it is quicker and there is
Right click an Point to the item on your screen and a larger variety of job vacancies present. People
item then quickly press and release the can publish resume online for prospective job.

co
right mouse button. Clicking the right Some of the web sites providing this service
mouse button displays a short cut are naukri.com. monster.com, summerjob.
menu from which you can choose
com, recruitmentindia.com
among a list of commands that apply
(iii) 
S tock market updates : Selling or

s.
to that item.
Double-click an Point to the item on your screen and buying shares sitting on computer through
item then quickly press and release the left Internet. Several websites like ndtvprofit.

ok
mouse button twice. com, moneypore.com, provide information
Drag an item Point to an item and then hold down regarding investment.
the left mouse button as you move (iv) Travel : One can use Internet to gather
the pointer.
information about various tourist place. It can
Drag and drop Point to an item and then hold down
o
the left mouse button as you move
be used for booking Holiday tours, hotels,

www.kalviexpress.in
the pointer and when you have train, bus, flights and cabs. Some of the web
ab
reached the desired position, release sites providing this service are goibibo.com,
the mouse button. makemytrip.com, olacabs.com.
(or) (v)  Research : Research papers are present online
(b) There are 5 types of views are provided by Impress. which helps in the researcher doing aliterature
ur

They are review.


Normal view : Normal view is the main view for (vi) Video conferencing : It enables direct face-
creating individual slides. to-face communication across networks
.s

Outline view : Outline view shows topic titles, via web cameras, microphones, and other
bulleted lists and numbered lists for each slide in communication tools. Video conferencing
outline format. can enable individuals in distant locations to
w

Notes view : Notes view lets you add notes to each participate in meetings on short notice, with
slide that are not seen when the presentation is shown. time and money savings.
w

Slide Sorter view : Slide Sorter view shows a (or)


thumbnail of each slide in order. (b) The <table> is a container tag. There are several
Handout view : Handout view lets you print your attributes to improve the layout of the table. They
w

slides for a handout. are listed below:


36.(a) (i) Internet telephony: Internet telephony (i) Cellspacing : It is used to set the space
(e.g.Skype) is another common between cells in a table. The value should
communications service made possible be in pixels.

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

282 Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019

(ii) Cellpadding : It is used to set the space <th>80</th>


between the contents of a cell and its </tr>
border the value should be in pixels. <tr>
(iii) Border: Border attribute with <table> tag <th>XII</th>
is used to specify the thickness of the <th>65</th>

m
border lines around the table. The value <th>70</th>
of the border attribute should be non zero </tr>
</table>

co
value in pixels. If its value is zero, HTML
displays the table without border. The </body>
default value is Zero in most the browsers. </html>
(iv) Bordercolor: It is used to apply the colour (or)

s.
to the border lines. (b) The important attributes used with the <form>
(v) Align: It is used to set the position of the tag are method and action attributes.
table within the browser window. Left is (i) Method : The method attribute of the

ok
the default position. Right or centre may form tag is used to identify how the form
be the value of align attribute. element names and values will be sent to
(vi) BGcolor: It is used to apply background the server. The get method will append
colour to the table. the names of the form elements and their
(vii) Height and Width :
o These two values to the URL. The post method will

www.kalviexpress.in send the names and values of the form


ab
attributes are used to specify the height
and width of a table in terms of pixels or elements as packets.
percentage. (ii) Action : The action attribute identifies the
37.(a) Coding : server side program or script that will
ur

<html> process the form. The action will be the


<head> name of a Common Gateway Interface
<title>table</title> (CGI) program written in programming
languages like Perl, JavaScript, PHP or
.s

</head>
<table border=11> Active Server Pages (ASP).
<tr> General Format of <form> tag
w

<th>class</th> <Form method=get/post action= “back_


<th>boys</th> end_server_script”>
<th>girls</th> Form elements
w

</tr> </Form>
<tr>
w

<th>XI</th>
<th>75</th>

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019 283
38.(a) JavaScript offers the switch statement as an var grade=0;
alternate to using multiple if...else statements. var marks=prompt(“Please enter your
The switch statement is especially useful when  marks/100:”,”0”);
testing all the possible results of an expression. if(marks>90)
The syntax of a switch structure is as given {grade=1;}

m
switch(expression) else if(marks>70)&&(marks<=90)
{ {grade=2;}
case label 1: else if(marks>50)&&(marks<=70)

co
statements 1; {grade=3;}
break; else if(marks>40)&&(marks<=50)
{grade=4;}
case label2:
else

s.
statements2;
{grade=5;}
break;
switch(grade)
case labeln;

ok
{
statements - n; case 1:
break; document.write(“Your Grade is Outstanding..”);
default: o break;
case 2:

www.kalviexpress.in
statements; document.write(“Your Grade is Excellent..”);
ab
} break;
Example : case 3:
<Html> document.write(“Your Grade is Good..”);
<Head> break;
ur

<Title>Program - To test witch command case 4:


 in JavaScript </Title> document.write(“Your Grade is Satisfactory..”);
</Head> break;
.s

<Body> default:
<script language=”javascript” type=”text/ document.write(“Your Grade is Poor and have
javascript”>  to re-appear Exam..”);
w

(or)
w
w

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000


This is only for Sample Materials
for Full Book order online and available at all Leading Bookstores

284 Sura’s  XI Std - Computer Applications - March Question Paper with Answer- 2019

(b)
Function Description Example Result
toUpperCase() Used to convert given string into uppercase x=”java” JAVA
x.toUpperCase();
toLowerCase() Used to convert given string into lowercase x=”JAVA” java
x.toLowerCase();

m
length Used to find length of the given string x=”JAVA” 4
x.length();
parseInt() Used to convert the given float value into an integer parseInt(34.234); 34

co
parseFloat() Used to convert the given string into a integer parseInt(“34.23”); 34.23



s.
www.kalviexpress.in
o ok
ab
ur
.s
w
w
w

orders@surabooks.com PH: 9600175757 / 8124201000 / 8124301000

You might also like