TN Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 1.
What is meant by coaxial cables?
Answer:

  1. The coaxial cable got its name by the word coax it is a geometric word where the axis between the insulator and the shield.
  2. Here the shield is meant the copper inside the cable.

Question 2.
Write the some of the Coaxial cable names.
Answer:
Some of the coaxial cable names are Media Bridge 50-feet Coaxial Cable, Amazon basics CL2-Rated Coaxial Cables etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 3.
What is the main uses fibre optics cable?
Answer:

  1. Fibre optics cable is of strand’s of glass and pulse of light is used to se i d the information.
  2. They are mainly used in Wide Area Network (WAN). The WAN is a network that extends to very large distance to connect the computes.

Question 4.
What is Dongles?
Answer:
The Dongle is a small peripheral device which has a compatible of mobile broadband with a sim slot in it and connects the Internet and acts as a modem to the computer.

Question 5.
Write the uses of different version in USB.

  1. USB 2.0 has 480 Mbps.
  2. USB 3.0 has the data transfer rate 4.85 Gbps.
  3. Micro USB is a miniaturized version of the USB used for connecting smart phones.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 6.
What is null modem able?
Answer:
The parallel cables are used to connect to the printer and other disk drivers. RS232 is one type of serial cable, also known as Null modem cable.

Question 7.
What is Ethernet cables?
Answer:
Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.

Question 8.
What is the main purpose of the Ethernet cables?
Answer:
The main purpose of the Ethernet cables connects wired devices within the Local Area Network (LAN) for sharing the resources and accessing Internet.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 9.
What is Crossover Ethernet Cable?
Answer:
The Crossover Ethernet cable is an example of the Null modem cables. This cable is used to join two computers or two network devices of the same type.

Question 10.
Write the some types of Wired media in network.
Answer:
Computers can be connected on the network with the help of wired media. They are Unshielded Twisted Pair, Shielded Twisted Pair, Co-axial Cables and Optical Fibre.

Question 11.
Write the some types of Wireless media in networking?
Answer:
Wireless media are Infra Red, Bluetooth, WiFi etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 12.
What are the components are used in the Ethernet cables?
Answer:

  1. Patch Cable (Twisted Pair),
  2. RJ45 Connector,
  3. Ethernet ports,
  4. Crimping Tool.

Question 13.
What is difference between Wired and Wireless networks?
Answer:

Wired Network Wireless Network
Wired networks for larger area are more expensive. Wireless networks for larger area are less expensive and more comfortable.
Wired networks are still used widely in the offices where need increased speed and secure connections. Wireless networks enable more devices                including mobiles sharing the resources and Internet connections remotely.

Question 14.
Write a note on Patch cable.
Answer:

  1. Patch cable are generally made up of 8 wires in different colours. Four of them are solid colours, and the others are striped.
  2. The eight colours are White green, Green, White orange, Blue, White blue, Orange, White brown, and Brown.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 15.
What is RJ45 Ethernet connector?
Answer:
RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.

Question 16.
Expand RJ45.
Answer:
The RJ45, “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.

Question 17.
What is meant by coaxial cables?
Answer:

  1. The coaxial cable got its name by the word coax it is a geometric word where the axis between the insulator and the shield.
  2. Here the shield is meant the copper inside the cable.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 18.
Write the some of the Coaxial cable names.
Answer:
Some of the coaxial cable names are Media Bridge 50-feet Coaxial Cable, Amazon basics CL2-Rated Coaxial Cables etc.,

Question 19.
What is the main uses fibre optics cable?
Answer:

  1. Fibre optics cable is of strands of glass and pulse of light is used to se id the information.
  2. They are mainly used in Wide Area Network (WAN). The WAN a network that extends to very large distance to connect the computers.

Question 20.
What is Dongles?
Answer:
The Dongle is a small peripheral device which has a compatible of mobile broadband with a sim slot in it and connects the Internet and acts as a modem to the computer.

Question 21.
Write the uses of different version in USB.
Answer:

  1. USB 2 0 has 480 Mbps.
  2. USB 3.0 has the data transfer rate 4.85 Gbps.
  3. Micro USB is a miniaturized version of the USB used for connecting smart phones.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 22.
What is null modem cable?
Answer:
The parallel cables are used to connect to the printer and other disk drivers. RS232 is one type of serial cable, also known as Null modem cable.

Question 23.
What is Ethernet cables?
Answer:
Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.

Question 24.
What is the main purpose of the Ethernet cables?
Answer:
The main purpose of the Ethernet cables connects wired devices within the Local Area Network (LAN) for sharing the resources and accessing Internet.

Question 25.
What is known as 8P8C Connector?
Answer:

  1. The RJ45 Connector has eight pins and connected to each end of the Ethernet cable.
  2. It has 8-Position, 8-Contact modular plug, so it is also known as 8P8C connector.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 26.
What are wiring schemes available in RJ45?
Answer:

  1. Wiring schemes specifies how the wires to be connected with RJ45 connector.
  2. There are two wiring schemes available to terminate the twisted-pair cable on each end, which are T-568A and T-568B.

Question 27.
What are the usage of four pairs wires in RJ45 Connector?
Answer:
Four pairs of wires are available in the cable, Ethernet uses only two pairs Orange and Green. The other two colors blue and brown can be used ISDN or Phone connections.

Question 28.
What is an Ethernet Card?
Answer:
An Ethernet card is a Network Interface Card (NIC) that allows computers to connect and transmit data to the devices on the network.

Question 29.
Where can you found in Ethernet Port?
Answer:
Ethernet port is found on personal computers, laptops, routers, switches, hubs and modems.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 30.
What is the use an Ethernet dongles?
Answer:

  1. Some of them not having an Ethernet port use an Ethernet dongles to form a network with other devices.
  2. Devices or Computers which use WiFi only for networking eliminates both the cable and its port.

Question 31.
How can to find the Internet is connected?
Answer:

  1. When inject the plug into the port the two lights will glow in the computer, the one is green and another one is orange.
  2. The orange light will start blinks then it means the Internet is connected.

Question 32.
What is Crimping?
Answer:
Crimping is the process of joining two or more pieces of metal or wire by deforming one or both of them to hold each other.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 33.
What is Crimping Tool?
Answer:

  1. The crimping tool is a physical tool which is to connect the patch wire and the Ethernet connector.
  2. The crimping tool looks like a small cutting handle with two mold of Ethernet port.

Question 34.
What is Registered Jack?
Answer:
A Registered Jack commonly known as RJ is a network interface used for network cabling, wiring and Jack construction.

Question 35.
What is the primary function of the Registered Jack?
Answer:
The primary function of the Registered Jack is to connect different data equipment and telecommunications devices.

Question 36.
What are commonly known Registered Jacks?
Answer:
The commonly known Registered Jacks are RJ-11, RJ-45, RJ-21, and RJ-28.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 37.
What registered jacks refers when its wiring?
Answer:
The registered jack refers to the male physical connector (Plug), a female . physical connector (Jack) and its wiring.

Question 38.
Write short note on RJ-14 and RJ-61.
Answer:

  1. The RJ-14 is the same as RJ-11 which will be used for telephone lines where same it as 6 pins whereas the RJ-61 will have 8 pins.
  2. This RJ-61 will use the twisted pair cable with a modular 8 connection.

Question 39.
What is Amphenol?
Answer:
The Amphenol is a connector manufacturer. They manufactured RJ-21 connector. It has 50 pins with 25 pins at one end and 25 pins at the other end.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 40.
What are the types of wiring techniques to construct the Ethernet Cable?
Answer:
There are three types of wiring techniques to construct the Ethernet cable. It is also known as coding techniques. They are,

  1. Straight-Through Wiring
  2. Cross-Over Wiring
  3. Roll-Over Wiring

Question 41.
What is known as Rollover Cable?
Answer:

  1. Rollover cable is also known as yost cable or console cable.
  2. It is typically flat (and light blue color) to distinguish it from other types of network cabling.

Question 42.
What is USB?
Answer:
USB is Universal Serial Bus, it connects all the peripheral devices with the computers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 43.
What is WWW?
Answer:

  1. WWW (World Wide Web) definition comes from the World Wide Web Consortium (W3C).
  2. The World Wide Web is the universe of network – accessible information, an embodiment of human knowledge.

Question 44.
Write the usage of UTP and STP.
Answer:
UTP (Unshielded Twisted Pair) is used nowadays as modem cables for Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.
STP (Shielded Twisted Pair) is similar to UTP, but it is covered by an additional jackets to protect the wires from external interference.
These cables which are twisted to ignore electromagnetic interference.

Question 45.
What are the main uses of fiber optics cable?
Answer:

  1. The fiber optics cable is of glass and pulse of light is used to send the information.
  2. They are mainly used in Wide Area Network (WAN). The WAN is a network that extends to very large distance to connect the computers.
  3. The fiber optics cables are placed in deep underground to avoid any damage to the cables.
  4. The optic cable uses light to transmit the information from one place to another.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 46.
What are the different industrial standards Ethernet cables?
Answer:

  1. Ethernet cables are normally manufactured in several industrial standards such as Cat 3, cat 5, cat 6, cat 6e, and cat 7.
  2. ‘cat’ simply stands for category, and the following number indicates the version.
  3. Latest version denotes faster and higher frequencies, measured in Mhz.
  4. Increasing the size of the cable also lead to slower transmission speed.

Question 47.
Briefly details of the pin details in the Ethernet ports.
Answer:

  1. The Ethernet ports, the pin 1 shows the transmission positive, the pin 2 shows the transmission negative, the pin 3 shows the receiver positive.
  2. The pin 4 shows the reserved position it is nothing but tells the connection . for some other use.
  3. The pin 5,7,8 are also used as reserved position.
  4. The pin 6 shows the receiver negative.
  5. The two main signals of the pins, the one is the TX which is transmission of data and RX which is receiver of data.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 48.
Write the short note on Expansion card.
Answer:
Expansion card is a separate circuit board also called as PCI Ethernet card which is inserted into PCI slot on motherboard of a computer. Now a days Expansion card is built in type come with Ethernet cards which resides on motherboard. Wireless Ethernet cards are also available, which uses radio waves to transmit data.

Question 49.
Write the Alternative names for networking devices or Technology.
Answer:

Devices or Technology Alternative Names
Ethemet Technology RJ45, 802.3 (According to IEEE)
RJ45 Connector (Male) RJ45 plug, Ethemet connector, 8P8C connector.
RJ45 socket (Female) RJ45 Jack, Ethemet port
RJ45 cable Ethemet cable

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 50.
Write a short note on RJ-11 Registered Jack.
Answer:
RJ-11 is the most popular modem form of Registered Jack. It is found in home and office. RJ-11 is mainly used in telephone and landlines. RJ-11 has 6 pins. Where the two pins give the transmission configuration, the two pins give the receiver configuration and the other two pins will be kept for reserved. The two pin will have the positive terminal and the negative terminal.

Question 51.
Define Straight – Through wiring.
Answer:
The Ethernet cables used for ethemet connections are straight-through cables. These cable wires are in the same sequence at both ends of the cable, which means that pin 1 of the plug on one end is connected to pin 1 of the plug on the other end. The straight – through wiring cables are mostly used for connecting PC / NIC card to a hub. This is a simple physical connection used in printers, computers and other network interfaces.

Question 52.
Explain Cross – Over Wiring.
Answer:

  1. A cable to connect two computers or Ethernet devices directly together without a hub, then you will need to use a cross-over cable.
  2. The pairs (TX and RX lines) will be crossed which means pin 1 and 2 of the plug on one end are connected with pin 3 and 6 of the plug on other end, and vice versa.
  3. The easiest way to make a crossover cable is to make one end to T-568A color coding and the other end to T-568B.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 53.
Explain Roll-Over Wiring.
Answer:

  1. Roll over is a type of null-modem cable that is often used to connect a device console port to make programming changes to the device.
  2. The roll over wiring have opposite pin arrangements, all the cables are rolled over to different arrangements.
  3. The roll over cable, the coloured wires are reversed on other end. That is the pins on one end are connected with other end in reverse order.

Question 54.
How to determine the type of Ethernet cables?
Answer:

  1. Straight – through:
    The coloured wires are in the same sequence at both ends of the cable.
  2. Cross – Over:
    The first coloured wire at one end of the cable is the third coloured wire at the other end of the cable.
  3. Roll – Over:
    The coloured wires are in the opposite sequence at either end of the cable.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 55.
Discuss about wiring schemes with colour codes of the connector.
Answer:
There are two wiring schemes available to terminate the twisted-pair cable on each end, which are T-568A and T-568B.
The pinouts and colour coding of these schemes.

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling 1

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling 2

Question 56.
Explain the Tx transmission of data and Rx receiver of data in the pin position details using colour codes of the connector.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling 3
The Ethernet wiring schemes (T568 A & T5698)
From the first figure,

(i) The position of pin 1:
It describes the transmit data. It can be sent to both connection with the Tx (positive). Tx + is used in this position is white green.

(ii) The position of pin 2:
It describes the transmit data. The Tx has negative terminal and the color is used in the position is Green.

(iii) The position of pin 3:
The Rx is compatible to receive the data which has positive terminal and the color is used in this position is white orange.

(iv) The position of pin 4:
There will be no transmitting or receiving will exist. The color used in this pin is blue.

(v) The position of pin 5:
It is not connected or bidirectional and the color is white blue.

(vi) The position of pin 6:
Here, the Rx negative which has a negative terminal and the color used in this position is orange.

(vii) The position of pin 7:
It is not connected or bidirectional and the color is white brown.

(viii) The position of pin 8:
It is not connected or bidirectional and the color is brown.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 57.
Write the steps of crimping process for making Ethernet cables.
Answer:

  1. Cut the cable with desired length.
  2. Strip the insulation sheath about 1 inch from both end of the cable and expose the twisted pair.
  3. Untwist the smaller wires and arrange them into the proper wiring scheme, T568B preferred generally.
  4. Bring the wires tighter together and cut them down so that they all have the same length.
  5. Use the crimping tool to lock the RJ45 Connector on the cable. It should be strong enough to handle manual traction.
  6. Use a cable tester to verify the proper connectivity of the cable, if need.

Question 58.
Write about history of Internet.
Answer:

  1. Bob Metcalfe invented Ethernet in 1973.
  2. It was used for interconnecting advanced computer work stations, making it possible to send data to one another and to high-speed laser printers.
  3. Metcalfe and others then finalized an open Ethernet standard in 1980, and by 1985 it had become an IEEE standard.
  4. An Industry was bom, and Ethernet was ready for its meteoric rise.
  5. There have been a number of networking standards published in the 802 branch of the IEEE, including the 802.3 Ethernet and 802.5 Token Ring standards.
  6. However, most people still use the Ethernet name when referring to the network system described in the 802.3 standard.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 59.
Write a note on twisted pair cable.
Answer:

  1. Twisted pair cable is type of cable with two or more insulated wires twisted together.
  2. There are two types of twisted pair cables, Unshielded- Twisted Pair (UTP) and Shielded Twisted Pair.(STP)

Question 60.
What are the uses of USB cables?
Answer:

  1. USB (Universal Serial Bus) are used to connect keyboard, mouse and other peripheral devices.
  2. There are some special network devices used to connect the Internet through the USB called dongles.

Question 61.
Write a note on the types of RJ45 connector.
Answer:

  1. The RJ45 (Registered Jack 45) Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
  2. The RJ45 connector looks similar like a telephone jack but it looks a slightly wider. The Ethernet cables are sometimes called as RJ45 cables.

Question 62.
What is an Ethernet port?
Answer:

  1. Ethernet port is an opening which is a part of an Ethernet card. It accepts RJ45 connector with Ethernet cable.
  2. Now, most of the computers and laptops have a built- in Ethernet port for connecting the device to a wired network.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 63.
What is the use of Crimping tool?
Answer:

  1. The crimping tool is a physical tool which is used to connect the patch wire and the Ethernet connector.
  2. The crimping tool will puncture the connector and makes the wire set in the connector. Use the crimping tool to lock the RJ45 connector on the cable.

Question 64.
What are the types of twisted pair cables?
Answer:

  • Unshielded Twisted Pair (UTP) and
  • Shielded Twisted Pair (STP)

Question 65.
What is meant by champ connector?
Answer:

  1. The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end. It is also called as champ connector or Amphenol connector.
  2. The Amphenol is a connector manufacturer. The RJ21 interface is typically used for data communication trucking application.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 66.
Write a note on crossover cables.
Answer:

  1. The crossover cable is an example of the Null modem cables. This cable is used to join two PCs or two network devices of the same type.
  2. Crossover cable is the sophisticated Ethernet cable used to connect the Internet to the system. This cable works at a speed of 10 gbps and more.
  3. The Ethernet crossover cable is identical on both the ends.
  4. Nowadays Routers are being connected through the crossover cables to provide wireless network from the local network.

Question 67.
Write a short note on RJ45 connector.
Answer:

  1. The RJ45 (Registered Jack) Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
  2. The RJ45 connector looks like a telephone jack but it looks a slightly wider.
  3. The Ethernet cables are sometimes called as RJ45 cables. In RJ45 the V ‘RJ’ stands for the Registered Jack and the ‘45’ simply refers to the number of interface standard in the cable.
  4. RJ45 connector has eight pins and it has 8 – Position, 8 – Contact (8P8C) modular plug. It is also known as 8P8C connector.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 68.
What are the differences between serial and parallel ports?
Answer:

Serial Port

 Parallel Port

The serial port will send 1 bit at one time. The parallel port will send 8 bit at one time.
A serial port is a type of interface found on computers for connecting peripherals and Internet to the system. A Parallel port is also type of interface found on computers for connecting peripherals and Internet to the system.
It have been newer technologies such as Ethernet, Fireware and USB which transfers the data serially. These ports transfer data in parallel and it have been used Zipdrives, Scanners, External modems, audio cards, Web cams, hard disk, CD Roms etc.,
RS232 is one type of serial cable, also known as Null modem cable.The parallel port allows for a one – way transmission of data from the source to a secondary device, such as a printer.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 69.
What is meant by null modem cable?
Answer:

  1. The crossover cable, RS – 232 cable is also used for interconnecting two computers without modem. So it is also a Null modem cable.
  2. A cable interconnecting two devices directly is known as a null modem . cable.
  3. Null modem cable is a communication method to directly connect two DTEs (computer, terminal, printer etc.,) using on RS – 232 serial cable with a null modem connection the transmit and receive lines are crosslinked.
  4. Depending on the purpose, sometimes also one or more handshake lines are crosslinked.

Question 70.
What are the components involved in Ethernet cabling?
Answer:
Ethernet cabling is the process of connecting the computers with other devices using Ethernet cables. The four main components are involved in the Ethernet cabling components are:
(i) Patch Cable (Twisted pair):
These are generally made up of 8 wires in different colors. Four of them are solid colours, and the others are striped.

(ii) RJ45 Connector:
It has eight small pins inside to connect eight small wires in the patch cable. The eight cables has eight different colours.

(iii) Ethernet ports:
It is the jack where the Ethernet cable is to be connected.

(iv) Crimping Tool:
It is a physical tool which is used to connect the patch wire and the Ethernet Connector (RJ45).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 71.
What are the types of Fibre optic cables?
Answer:
There are two types of fibre, optic cables available, they are
(i) Single – mode (100 Base BX): A single mode cables are used for long distance transmission and at a high cost.
(ii) Multimode (100 Base SX): The Multimode cables are used for short distance transmission at a very low cost. The optic cables are easy to maintain and install.

Question 72.
What is meant by Registered Jack? Explain briefly the types of Jacks.
Answer:

  1. A Registered Jack commonly known as RJ is a network interface used for network cabling, wiring and jack construction.
  2. The primary function of the registered jack is to connect different data equipment and telecommunications devices.
  3. The commonly known registered jacks are RJ-11, RJ-45, RJ-21, and RJ-28.
  4. RJ-11: It is the most popular modem form of registered jack. This registered jack is mainly used in telephone and landlines.
  5. RJ-14 and RJ-61: The RJ – 14 is the same as RJ-11 which will be used for telephone lines where same it as 6 pins whereas the RJ-61 will have 8 pins.
  6. RJ-21: The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end. It is also called as champ connector or Amphenol connector manufacturer. The RJ-21 interface is typically used for data communication trucking applications.
  7. The Registered Jack refers to the male physical connector (plug), a female physical connector (Jack) and its wiring.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 73.
Explain wiring techniques used in Ethernet cabling.
Answer:
There are three types of wiring techniques to construct the Ethernet Cable. It is also known as color coding techniques. They are:

(i) Straight – Through Wiring:
In general, the Ethernet cables used for Ethernet connections are straight through cables. These cable wires are in the same sequence at both ends of the cable, which means that pin 1 of the plug on one end is connected to pin 1 of the plug on the other end.

The straight throw wiring cables are mostly used for connecting PC / NIC card to a hub. This is a simple physical connection used in printers, computers and other network interfaces.

(ii) Cross – Over Wiring:
A cable to connect two computers or Ethernet devices directly together without hub, then you will need to use a crossover cable.

The pairs (TX and RX lines) will be crossed which means pin 1 and 2 of the plug on one end are connected with pin 3 and 6 of the plug on other end, and vice versa (3 and 6 to pin 1 and 2)

(iii) Roll – Over Wiring:
Roll over cable is a type of null-modem cable that is often used to connect a device console part to make programming changes to the device.

The roll over wiring have opposite pin arrangements, all the cables are rolled over to different arrangements.
In the rollover cable, the pins on one end are connected with other end in reverse order, (i.e., pin 1 to 8, 2 to 7, 3 to 6, 4 to 5, 5 to 4, 6 to 3, 7 to 2,8 to 1).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 74.
Explain about RJ45 connector.
Answer:

  1. The RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
  2. The RJ45 connector looks similar a telephone jack but it looks a slightly wider.
  3. The Ethernet cables are sometimes called as RJ45 cables. In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
  4. Each RJ45 connector has eight pins and connected to each end of the Ethernet cable. Since it has 8 – Position, 8 – Contact (8P8C) modular plug. It is also known as 8P8C connector.
  5. The RJ45 connector has eight small jack inside to connect eight small wires of the patch cable. The eight cables are in eight different colours.
  6. The RJ45 has four pairs of wires are available in the cable, Ethernet uses only two pairs orange and green. The other two colors (blue and brown) can be used ISDN or Phone connections.
  7. The commonly known Registered Jacks are RJ-11, RJ-45, RJ-21, and RJ-28. The Registered Jack refers to the male physical connector (plug), a female physical connector (Jack) and its wiring.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 75.
Explain the components used in Ethernet cabling.
Answer:
The four main components are used in the Ethernet cabling components are:
(a) Patch cables:
Patch cables are generally made up of 8 wires in different colours. Four of them are solid colours, and the others are stripped. The eight colours are white green, green, white orange, blue, white blue, orange, white brown and brown.

(b) RJ45 Connector:
(i) RJ45 connector looks similar like a telephone jack but it looks a slightly wider. The Ethernet cables are sometime called as RJ45 cables.
(ii) In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
(iii) The RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.

(c) Ethernet card and Port:
(i) Ethernet card and port is a .Network Interface Card (NIC) that allows computers to connect and transmit data to the devices on the network.
(ii) Wireless Ethernet cards are also available, which uses radio waves to transmit data.
(iii) Ethernet port is an opening which is a part of an Ethernet card. It is found on personal computers, laptops, routers, switches, hub and modems.

(d) Crimping Tool:
(i) Crimping tool is the process of joining two or more piece of metal or wire by deforming one or both of them to hold each other.
(ii) The crimping tool is a physical tool which is used to connect the patch
wire and the Ethernet connector.
(iii) The crimping tool looks like a small cutting handle with two mold of Ethernet port.
(iv) The tool will puncture the connector and makes the wire set in the connector.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 76.
Explain the types of network cables.
Answer:
There are many types of cabling available in the networking. Here we discuss about six different cables.

(a) Coaxial Cables:
(i) The coaxial cable is used to transfer the information in a lOmbps. The cable is divided into thinnet and thicknet cables.
(ii) These cables have a copcer wire inside and insulation is covered on the top of the copper wire to provide protection to the cable.
(iii) Nowadays, coaxial cables are used for dish TV where the setup box and the Television is connected using the coaxial cable only.

(b) Twisted Pair cables:
(i) Twisted pair cables are type of table with two or more insulated wires twisted together.
(ii) The twisted cable has 8 wires which are twisted to ignore electromagnetic interference.
(iii) Therearetwotypesoftwistedpaircables,UnshieldedTwistedPair(UTP)and Shielded Twisted Pair (STP).
(iv) The UTP is used now a days as modem cables for Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.

(c) Fibre Optics:
(i) Fibre optics cable is a strands of glass and pulse of light is used to send the information.
(ii) It is used in Wide Area Network (WAN), these cables are placed in deep underground to avoid any damage to the cables. The optic cable are easy to maintain and install.

(d) USB Cables:
(i) The USB (Universal Serial Bus) cables are used to connect keyboard, mouse and other peripheral devices.
(ii) There are some special network devices used to connect the Internet through the USB called dongles.

(e) Serial and Parallel cables:
(i) The serial and parallel interface cables are used to connect the Internet to the system before 1980s and 1990s.
(ii) The serial port will send 1 bit at one time whereas the parallel port will send 8 bits at one time. The parallel cables are used to connect to the printer and other disk drivers.

(f) Ethernet Cables:
(i) Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.
(ii) This cable connects wired devices within the Local Area Network (LAN) for sharing the resources and accessing Internet.
(iii) The crossover Ethernet cable is an example of the Null Modem Cables. This cable is used to join two PCS or two network services of the same type.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 77.
Make your own crossover cable.

A. Purchase the following:
Answer:
(i) a patch cable (UTP cat 5e / 6) with desired length.
UTP CAT 5e or CAT 6 is available in electrical shops or Online providers. CAT 6 has higher performance than CAT 5e.

(ii) RJ45 Connector (8P8C modular plug) of both wiring schemes (T568A and T568B):
RJ45 connector for CAT 5e or CAT 6.

(iii) Crimping Tool:
RJ45

B. Construct the cable using the method described in the text book, with the help of crimping tool.
Answer:
The purpose of a crossover Ethernet cable is to directly connect one computer to another computer without going through a router, switch or hub.
(i) Cut into plastic sheath about 1 inch from end of the cut cable.
(ii) Unwind and pair the similar colors.
(iii) Pinch the wires and straighten them.
(iv) Carefully push all 8 unstripped colored wires into the connector. Note how the wires go all the way to the end.
(v) Carefully, place the connector into the Ethernet crimper and down on the handles directly.
(vi) When we remove the cable from crimmer tool, the cable is ready to use.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 78.
Connect two computers using crossover cable for sharing resources.
Answer:
(i) Configure IP Addresses:
First, we need to configure static IP address for each computer. Both computers should have IP addresses on same subnet.
Eg: IP address for computer 1 – 192.168.0.1
IP address for computer 2 – 192.168.0.2
Technically leave the “Default Gateway” and “Preferred DNS Server” field blank.

(ii) Crossover Cable:
A standard crossover cable where green and orange pairs are swapped and brown and blue pairs stay in same position.

(iii) Local user accounts:
Create user account on each computer that has same name and same password.

(iv) Disable Firewalls:
Disable the firewall on both computers to ensure that none of the file sharing ports can be blocked.
Control panel → Windows Firewall → Click off.
Finally, Two computers can access each other Start → Type “cmd” → type “Ping followed by IP address of other computers”.
Now we access “My network places” in window explorer and access other computer for sharing files, we need setup shared folder.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Choose the correct answer:

Question 1.
Who was invented by computer?
(a) Tim Berners Lee
(b) Charles Babbage
(c) Blaise Pascal
(d) John Napier
Answer:
(b) Charles Babbage

Question 2.
Which is used to transfer the information in a 10 mbps?
(a) Coaxial cables
(b) Twisted pair cables
(c) Fibre optics
(d) USB cables
Answer:
(a) Coaxial cables

Question 3.
Which cable is divided into thinnet and thicknet cables?
(a) Coaxial cables
(b) Twisted pair cables
(c) Fibre optics
(d) USB cables
Answer:
(a) Coaxial cables

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 4.
Which cables have a copper wire inside and insulation is covered on the top of the copper wire to provide protection to the cable?
(a) Coaxial
(b) Twisted pair
(c) Fibre
(d) USB
Answer:
(a) Coaxial

Question 5.
Which is type of cable with two or more insulated wires twisted together?
(a) Coaxial
(b) Twisted
(c) Fibre
(d) USB
Answer:
(b) Twisted

Question 6.
How many wires are twisted to ignore electromagnetic interference in Twisted pair cables?
(a) 4
(b) 6
(c) 8
(d) 10
Answer:
(c) 8

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 7.
How many types of twisted pair cables are available?
(a) 2
(b) 4
(c) 6
(d) 8
Answer:
(a) 2

Question 8.
Expansion of STP is:
(a) Strands Twisted Pair
(b) Similar Twisted Pair
(c) Shielded Twisted Pair
(d) Speed Twisted Pair
Answer:
(c) Shielded Twisted Pair

Question 9.
Which cable is of strands of glass and pulse of light is used to send the information?
(a) Coaxial cables
(b) Twisted pair cables
(c) Fibre optics
(d) USB cables
Answer:
(c) Fibre optics

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 10.
Which cable uses light to transmit the information from one place to another?
(a) Coaxial
(b) Twisted pair
(c) Fibre
(d) USB
Answer:
(c) Fibre

Question 11.
Which mode cables are used for long distance transmission and at a high cost?
(a) Open
(b) Close
(c) Single
(d) Multi
Answer:
(c) Single

Question 12.
Which mode cables are used for short distance transmission and at a very low cost?
(a) Open
(b) Close
(c) Single
(d) Multi
Answer:
(d) Multi

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 13.
Which cables are used to connect keyboard, mouse and other peripheral devices?
(a) Coaxial
(b) Twisted pair
(c) Fibre
(d) USB
Answer:
(d) USB

Question 14.
How many bit will send in serial port at one time?
(a) 1
(b) 2
(c) 6
(d) 8
Answer:
(a) 1

Question 15.
How many bit will send in parallel port at one time?
(a) 1
(b) 2
(c) 6
(d) 8
Answer:
(d) 8

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 16.
Which is one type of serial cable and known as Null modem cable?
(a) RS 213
(b) RS 215
(c) RS 231
(d) RS 232
Answer:
(d) RS 232

Question 17.
Which cable is the most common type of network cable mainly used for connecting the computers or devices?
(a) Coaxial
(b) Fibre
(c) Ethernet
(d) USB
Answer:
(c) Ethernet

Question 18.
Which cable is used to connect LAN for sharing the resources and accessing Internet?
(a) Coaxial
(b) Fibre
(c) Ethernet
(d) USB
Answer:
(c) Ethernet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 19.
Which Ethernet cable is an example of the Null modem cables?
(a) Crossover
(b) Fibre
(c) USB
(d) Serial
Answer:
(a) Crossover

Question 20.
Which are being connected through the crossover cables to provide wireless network from the local network?
(a) Crossover
(b) Fiber
(c) USB
(d) Routers
Answer:
(d) Routers

Question 21.
A cable interconnecting two devices directly is known as:
(a) Crossover
(b) Routers
(c) Null modem
(d) USB
Answer:
(c) Null modem

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 22.
Which cable is the basic component of the Local Area Network?
(a) Crossover
(b) Coaxial
(c) Fiber
(d) Ethernet
Answer:
(d) Ethernet

Question 23.
How many main components are used in the Ethernet cable?
(a) 2
(b) 4
(c) 6
(d) 8
Answer:
(b) 4

Question 24.
Which cables are generally made up of 8 wires in different colours?
(a) Coaxial
(b) RJ45 Connector
(c) Patch cable
(d) Ethernet ports
Answer:
(c) Patch cable

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 25.
Which Ethernet cable is specially designed for making connection between two computers?
(a) Crossover
(b) Fibre
(c) USB
(d) Pointers
Answer:
(a) Crossover

Question 26.
Which Ethernet connector is a small plastic cup that will be used wire inside the connector?
(a) RS-11
(b) RJ-21
(c) RJ-28
(d) RJ-45
Answer:
(d) RJ-45

Question 27.
Which connector is looks similar like a telephone jack but it looks a slightly wider?
(a) RJ-11
(b) RJ-21
(c) RJ-28
(d) RJ-45
Answer:
(d) RJ-45

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 28.
In RJ45 the ‘RJ’ Stands for:
(a) Registered Jack
(b) Reserved Jack
(c) Reverse Jack
(d) Reuse Jack
Answer:
(a) Registered Jack

Question 29.
Which is a Network Interface card that allows computers to connect and transmit data to the devices on the network?
(a) Ethernet card
(b) Crimping Tool
(c) Registered Jack
(d) RJ45 connector
Answer:
(a) Ethernet card

Question 30.
Which is a separate circuit board also called as PCI Ethernet card?
(a) Ethernet card
(b) Expansion card
(c) Registered Jack
(d) RJ45 connector
Answer:
(b) Expansion card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 31.
Which is the process of joining two or more pieces of metal or wire by deforming one?
(a) Ethernet card
(b) Registered Jack
(c) Crimping Tool
(d) RJ45 connector
Answer:
(c) Crimping Tool

Question 32.
Which is a physical tool and is used to connect the patch wire?
(a) Ethernet card
(b) Registered Jack
(c) Crimping Tool
(d) RJ45 connector
Answer:
(c) Crimping Tool

Question 33.
Expand CSMA/CD:
(a) Carrier Sense Multiple Access with Collision Detection.
(b) Common Sense Many Access with Correct Deductions.
(c) Common Sense Multiple Access with Control Detection.
(a) Carrier Sound Muiupie Access with Collision Default.
Answer:
(a) Carrier Sense Multiple Access with Collision Detection.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 34.
Who was invented Ethernet?
(a) Tim Berners Lee
(b) Charles Babbage
(c) Blaise Pascal
(d) Bob Metcalfe
Answer:
(d) Bob Metcalfe

Question 35.
PARC Expansion of:
(a) Palo Alto Research Center
(b) Post Alto Research Center
(e) Past Alto Research Center
(d) Public Alto Research Center
Answer:
(a) Palo Alto Research Center

Question 36.
What is known as the male physical connector in Registered Jack?
(a) Plug
(b) Jack
(c) Wire
(d) Cable
Answer:
(a) Plug

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 37.
What is known as the Female physical connector in Registered Jack?
(a) Plug
(b) Jack
(c) Wire
(d) Cable
Answer:
(b) Jack

Question 38.
Which one of the following is the most popular modern form of Registered Jack?
(a) RJ-11
(b) RJ-45
(c) RJ-21
(d) RJ-28
Answer:
(a) RJ-11

Question 39.
Which will be used for telephone lines where same it as 6 pins?
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-11
Answer:
(b) RJ-14

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 40.
Which will be used the twisted pair cable with a modular 8 connection?
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-11
Answer:
(c) RJ-61

Question 41.
Which is called Amphenol Connector? .
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-21
Answer:
(d) RJ-21

Question 42.
Which is act as for data communication trucking application?
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-21
Answer:
(d) RJ-21

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 43.
How many types of wiring techniques to construct Ethernet cable?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 44.
Which is known as color coding techniques?
(a) Ethernet
(b) RJ-21
(c) RJ-45
(d) RJ-61
Answer:
(a) Ethernet

Question 45.
Which is used for Ethernet connection are straight through cables?
(a) Ethernet cables
(b) RJ-21
(c) RJ-45
(d) RJ-61
Answer:
(a) Ethernet cables

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 46.
Which is a type of null modem cable?
(a) Straight-through wiring
(b) Cross-over wiring
(c) Roll-over wiring
(d) Ethernet cables
Answer:
(c) Roll-over wiring

Question 47.
Rollover cable is also known as:
(a) Yost cable
(b) Console cable
(c) (a) and (b)
(d) None of these
Answer:
(c) (a) and (b)

Question 48.
Which is coloured wires are in the same sequence at both ends of the cable?
(a) Straight-through
(b) Cross-over
(c) Roll-over
(d) Ethernet
Answer:
(a) Straight-through

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 49.
Which is the first coloured wire at one end of the cable is the third coloured wire at the other end of the cable?
(a) Straight-through
(b) Cross-over
(c) Roll-over
(d) Ethernet
Answer:
(b) Cross-over

Question 50.
Which is the coloured wires are in the opposite sequence at either end of the cable?
(a) Straight-over
(b) Cross-over
(c) Roll-over
(d) Ethernet
Answer:
(c) Roll-over

Question 51.
Match the following:

(A) Coaxial cables (i) 10 BASE – T Cable
(B) Twisted pair cables (ii) dongles
(C) Fibre optics (iii) Copper wire
(D) USB cables (iv) Strands class

(a) (A) – (iii); (B) – (ii); (C) – (iv); (B) – (i)
(b) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
Answer:
(b) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 52.
Match the following:

(A) Patch cable (i) Physical Tool
(B) RJ45 Connector (ii) Network Interface Card (NIC)
(C) Ethernet Port (iii) Plastic cup
(D) Crimping Tool (iv) Twisted Pair

(a) (A) – (i); (B) – (iii); (C) – (ii); (B) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
(c) (A) – (iii); (B) – (i); (C) – (ii); (D) – (iv)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 53.
Match the following:

(A) Ethernet Technology (i) 8P8C connector
(B) RJ45 Connector (ii) IEEE
(C) RJ45 Socket (iii) Ethernet Cable
(D) RJ45 Cable (iv) RJ45 Jack

(a) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 54.
Match the following:

(A) RJ(i) Land lines
(B) RJ – 11(ii) Amphenol connector
(C) RJ – 61(iii) Network Interface
(D) RJ – 21(iv) Twisted Pair cable

(a) (A) – (iiî); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(c) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(a) (A) – (iiî); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 55.

(A) USB(i) directly connects two computers
(B) Null Modem(ii) Sim slot
(C) TX/RX(iii) Connect to peripheral devices
(D) Dongles(iv) Transmit / Receive signals

(a) (A) – (iii); (B)-(ii); (C) – (iv); (D) – (i)
(b) (A) – (iii) (B) – (i); (C) – (iv); (D) – (ii)
(c) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(b) (A) – (iii) (B) – (i); (C) – (iv); (D) – (ii)

Question 56.
Choose the incorrect pair:
(a) ARPANET – Modem Internet
(b) Computer – Charles Babbage
(c) WWW – Tim Berners Lee
(d) Coaxial cables -1990
Answer:
(d) Coaxial cables -1990

Question 57.
Choose the incorrect pair:
(a) Coaxial cables – Aluminium cable
(b) Twisted pair cables – Insulated wires
(c) Fibre optics – Pulse of light
(d) Serial cable – RS232
Answer:
(a) Coaxial cables – Aluminium cable

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 58.
Choose the incorrect pair:
(a) Twisted pair – 8 wires
(b) RJ45 – Colour code
(c) 8P81 – Connector
(d) T – 568A – Wiring schme
Answer:
(b) RJ45 – Colour code

Question 59.
Choose the correct pair:
(a) Ethernet – Bob Metcalfe
(b) IEEE – USA company
(c) PC / NIC – Wiring method
(d) Cross over – Cable manufacturer
Answer:
(a) Ethernet – Bob Metcalfe

Question 60.
Choose the correct pair:
(a) 100 Base BX – Multi mode
(b) 100 Base SX – Single mode
(c) Serial Port – 1 bit
(d) Parallel port – 28 bits
Answer:
(c) Serial Port – 1 bit

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 61.
Choose the incorrect statement:
(a) Coaxial cable is used to connect the Television sets to home antennas.
(b) Coaxial cable is used to transfer the information in a 100 mbps.
(c) Coaxial cable is divided into thinnet and thicknet cables.
(d) Media Bridge 50 – feet coaxial cable is a type of coaxial cable.
Answer:
(b) Coaxial cable is used to transfer the information in a 100 mbps.

Question 62.
Choose the incorrect statement:
(a) The crossover Ethernet cable is an example of the Null modem cables.
(b) Computers can be connected on the network with the help of wired media or wireless media.
(c) Wired networks enable more devices including mobile sharing the resources and Internet connections remotely.
(d) The computers with wired connections must be configured with Ethernet card.
Answer:
(c) Wired networks enable more devices including mobile sharing the resources and Internet connections remotely.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 63.
Choose the incorrect statement:
(a) The Ethernet cable is the basic component of the LAN.
(b) RJ45 connector is made up of plastic cubes connected at the both the ends.
(c) The plastic covering is used to provide protection to the wires.
(d) The patch cables has eighteen small wires inside different colours.
Answer:
(d) The patch cables has eighteen small wires inside different colours.

Question 64.
Choose the correct statement:
(a) A crossover Ethernet cable is specially designed for making connection between two computers.
(b) The Ethernet cables are sometimes called as RJ65 cables.
(c) The RJ65 connector has eighteen small jack inside to connect eighteen small wires of the patch cable.
(d) There are eight wiring schemes available to terminate the twisted-pair cable on each end.
Answer:
(a) A crossover Ethernet cable is specially designed for making connection between two computers.

Question 65.
Choose the correct statement:
(a) The crimping tool is a physical tool which is used to connect the modem and computer.
(b) The crimping tool looks like a small cutting handle -with six mold of Ethernet port.
(c) The primary function of the registered jack is to connect different data equipment and telecommunication devices.
(d) The rollover wiring have some side pin arrangements.
Answer:
(c) The primary function of the registered jack is to connect different data equipment and telecommunication devices.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 66.
Assertion (A):
Twisted pair cables is type of cable with two or more insulated wires twisted together.
Reason (R):
The coaxial cables are used for Dish TV where the setup box and the Television is connected.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 67.
Assertion (A):
There are some special network devices used to connect the Internet through the USB called dongles.
Reason (R):
The dongle is a small peripheral device which has a compatible of mobile broadband with a sim slot in it.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(a) Both A and R are true, and R is the correct explanation for A

Question 68.
Assertion (A):
Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices.
Reason (R):
The crossover Ethernet cable is an example of serial cable.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true. But R is false.
(d) A is false. But R is True.
Answer:
(c) A is true. But R is false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 69.
Assertion (A):
Wireless Ethernet cards are also available, which uses magnetic and Micro waves.
Reason (R):
Ethernet port is an opening which is a part of an Ethernet card.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(d) A is false, But R is True.

Question 70.
Assertion (A):
Expansion card is a addition a card which’ is inserted into motherboard.
Reason (R):
The crimping tool is a mechanical tool which is used to connect the USB.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are false.

Question 71.
Pick the odd one out:
(a) Coaxial
(b) Twisted Pair
(c) Fibre optics
(d) Null modem
Answer:
(d) Null modem

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 72.
Pick the odd one put:
(a) Patch cable
(b) Fibre optics
(c) RJ45 Connector
(d) Ethernet ports
Answer:
(b) Fibre optics

Question 73.
Pick the odd one out:
(a) Crimping tool
(b) Straight-Through
(c) Cross-over
(d) Roll-over
Answer:
(a) Crimping tool

Question 74.
Pick the odd one out:
(a) LAN
(b) MAN
(c) USB
(d) WAN
Answer:
(c) USB

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 75.
Pick the odd one out:
(a) RJ45
(b) RJ11
(c) RJ21
(d) RJ61
Answer:
(a) RJ45

Question 76.
ARPANET stands for:
(a) American Research Project Agency Network.
(b) Advanced Research Project Area Network
(c) Advanced Research Project Agency Network
(d) American Research Programs And Network
Answer:
(c) Advanced Research Project Agency Network

Question 77.
WWW was invented by:
(a) Tim Berners Lee
(b) Charles Babbage
(c) Blaise Pascal
(d) John Napier
Answer:
(a) Tim Berners Lee

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 78.
Which cable is used in cable TV to connect with setup box?
(a) UTP cable
(b) Fibre optics
(c) Coaxial cable
(d) USB cable
Answer:
(c) Coaxial cable

Question 79.
Expansion of UTP is:
(a) Uninterrupted Twisted Pair
(b) Uninterrupted Twisted Protocol
(c) Unshielded Twisted Pair
(d) Universal Twisted Protocol
Answer:
(c) Unshielded Twisted Pair

Question 80.
Which medium is used in the optical fibre cables to transmit data?
(a) Microwave
(b) Infra red
(c) Light
(d) Sound
Answer:
(c) Light

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 81.
Which of the following is a small peripheral device with a sim slot to connect the computers to Internet?
(a) USB
(b) Dongles
(c) Memory card
(d) Mobiles
Answer:
(b) Dongles

Question 82.
Which connector is used in the Ethernet cables?
(a) RJ11
(b) RJ21
(c) RJ61
(d) RJ45
Answer:
(d) RJ45

Question 83.
Which of the following connector is called as champ connector?
(a) RJ11
(b) RJ21
(c) RJ61
(d) RJ45
Answer:
(b) RJ21

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 84.
How many pins are used in FU45 cables?
(a) 8
(b) 6
(c) 50
(d) 25
Answer:
(a) 8

Question 85.
Which wiring standard is used for connecting two computers directly?
(a) Straight Through wiring
(b) Cross Over wiring
(c) Rollover wiring
(d) None
Answer:
(b) Cross Over wiring

Question 86.
Pick the odd one out from the following cables:
(a) roll over
(b) cross over
(c) null modem
(d) straight through
Answer:
(c) null modem

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 87.
Match the following:

(A) Ethernet (i) Port
(B) RJ45 connector (ii) Ethernet
(C) RJ45 jack (iii) Plug
(D) RJ45 cable (iv) 802.3

(a) (A) – (i); (B) – (ii); (C) – (iv); (D) – (iii)
(b) (A) – (iv); (B) – (i); (C) – (iii); (D) – (ii)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 1.
What is open source software?
Answer:
Open source software is usually created and updated by many programmers around the world and made freely accessible.

Question 2.
What is proprietary software?
Answer:
Proprietary software is owned by an organisation or individual. The makers of proprietary software have not allowed the users or other developers to view or edit the source code.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 3.
What are we need, when there are more systems connected in networking?
Answer:
We need Network software, Analysis the server, system, protocol, network, traffic flow UPS and Network parts.

Question 4.
What is Freeware?
Answer:
Freeware usually refers to proprietary software that users can download at no cost, but whose source code cannot be changed.

Question 5.
What are communication tools?
Answer:
E-mail, real-time messaging, forums, and Wikis are communication tools.

Question 6.
Define network parameters.
Answer:
The network parameters define the state of the network like node placement, existing links and the events like data transmissions, link failures etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 7.
What is API?
Answer:

  1. API (Application Program Interface) is a pure event base software, tool with super simulation design.
  2. It has more models which help the user to get desired output easily.

Question 8.
List out some open source Handware.
Answer:
Some open source hardware are Remix, Remake, Remanufacture, Redistribute, Resell, Study and Learn etc… ill. Answer the following questions in brief.

Question 9.
Explain Ideals of Open Source Code.
Answer:
(i) Share the goal:
A broad group of contributors recognize the same need and agree on how to meet.

(ii) Share the work:
Projects are broken into smaller tasks, and a review process screens the best contributions.

(iii) Share the result:
Code should be available to all and improvements should be shared to all.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 10.
Write short note on goal for open NMS.
Answer:

  1. The goal is for open NMS to be an actually distributed, scalable management application platform for all features of the FCAPS,
  2. FCAPS means Fault, Configuration, Accounting, Performance, Security.
  3. The other goals is for open NMS for network management model, presently the emphasis is on Fault and Performance Management.

Question 11.
What are types of open NMS?
Answer:
There are two types, are Meridian and Horizon.

  1. When we need stability and long term support choose meridian which is best for Enterprises as well as business.
  2. Horizon used where innovation occurs frequently. It is best for IT- ecosystem new technologic monitoring.

Question 12.
Expand the following:
(a) NS2,
(b) NMS,
(c) OTCI,
(d) GNU,
(e) SSFN,
(f) API.
Answer:
(a) NS2 – Network Simulation Version 2.
(b) NMS – Network Management Software.
(c) OTCI – Object Oriented Tool Command Language.
(d) GNU – General Public License.
(e) SSFN – Scalable Simulation Framework Net Models.
(f) API – Application Program Interface.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 13.
Write the Open Source Code Principle.
Answer:

  1. Open source code enable to read code.
  2. We can see how its made.
  3. The freedom to run the program for any purpose.
  4. The freedom to redistribute copies.
  5. The freedom to improve the program.

Question 14.
Write the steps for open-source software criteria.
Answer:

  1. Redistribution software.
  2. Availability and integrity source.
  3. License must not restrict other software.
  4.  Derived works.
  5. No discrimination against person.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 15.
What are the most popular licenses that allow programmers to modify the software?
According to the Black Duck knowledge base, a database of some two • million open source projects, five of the most popular licenses are:

  1. MIT license.
  2. GNU General Public License (GPL) 2.0
  3. Apache License 2.0
  4. GNU General Public License (GPL) 3.0
  5. BSD License 2.0 (3 – clause, New or Revised)

When you change the source code, OSS requires the inclusion of what you altered as well as your methods.
The software created after code modifications may or may not be made available for tree.

Question 16.
Describes Open source software and developers.
Answer:
Open source software projects are collaboration opportunities that improve skills and build connections in the field.
Areas that developers can work on include:

(i) Communication tools:
E-mail, real-time messaging, forums, and Wikis help developers to find solutions or bounce ideas off each other.

(ii) Distributed revision control systems:
When multiple developers in different geographical locations modify data and files, these systems manage the different versions and updates.

(iii) Bug trackers and task lists:
These features allow large-sale projects to monitor issues and keep track of their fixes.

(iv) Testing and debugging tools:
These features automate testing during system integration and debug other programs.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 17.
Explain the History of open source software.
Answer:

  1. The term “Open Source” was coined by Christine Peterson to describe free software.
  2. In early 1960’s any computer academy who develop a software shared its source code under the principle of open and co-operation.

Question 18.
What is meant by network simulator?
Answer:

  1. A network simulator is a software program that replicates the functioning of a computer network.
  2. In simulators, the computer network is typically demonstrated with devices, traffic etc., and the performance are evaluated.

Question 19.
What is trace file?
Answer:
(i) A significant output of simulation is the trace files.
(ii) Trace files can document every incident that happened in the simulation and are used for examination.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 20.
Write short notes on NS2.
Answer:

  1. NS2 (Network Simulator version 2) was considered explicitly for exploration in network communication and event-driven open-source simulator in computer.
  2. OTcl and C++ used to create and run NS2. NS2 works on windows and Linux platforms, that supports wired or wireless network.

Question 21.
Explain NRCFOSS.
Answer:
NRCFOSS (National Resource Centre for Free and Open Source Software) an Institution of Government of India. To help in development of FOSS in India.

Question 22.
Write short note on Open NMS.
Answer:

  1. Open NMS (Network Management System) is a free and open-source initiative grade network monitoring and management platform.
  2. Open NMS is the worlds first software for Network monitor and management with open source options.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 23.
What are the uses of Open Source Network Software?
Answer:

  1. Open Source Network Software give us more options to choose any type of software.
  2. Using open source Network software that shape our programming knowledge and skills.
  3. Using open source Network Software, where work with more people, so can know other views.
  4. Tell the errors and rectify it in quick time for using open source software.

Question 24.
Explain free software.
Answer:

  1. Free software is software that can be freely used, modified and redistributed with only one restriction any redistributed versions of the software must be distributed with the original terms of free use.
  2. The Free Software Directory maintains a large database of free software packages.
  3. Some of the best-known examples include the Linux Kemal, the BSD and Linux operating systems.

Question 25.
List out the Popular open source software.
Answer:
The popular open source software are NS2, Open NMS, Ubuntu, MySQL, PDF creator, Open Office, 7Zip, GNUCASH, GIMP, Blender, Audacity, VLC, Mozila Firefox, Magento etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 26.
Write note on open source hardware.
Answer:

  1. Open source hardware consists of physical artifacts of technology designed and offered by the open design movement.
  2. Open source hardware are created by this Open-source culture movement.
  3. FOSH (Free Open Source Hardware) is used mechanical drawings, schematics, bills of material, PCB layout data, HDL source code and integrated circuits.
  4. Programmable logic devices, sharing of logic designs has been a form of open-source hardware.

Question 27.
What are the main functional areas of Open NMS?
Answer:
Open NMS has three main functional areas:

  1. Service monitoring, where a number of monitor modules can govern if network – based services (ICMP, HTTP, DNS etc.,) are accessible.
  2. Data gathering by using SNMP and JMX.
  3. Event management and notifications, which comprises of alarm reduction and a robust announcement system with accelerations and duty schedules.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 28.
Explain types of organisation related to Open Source.
Answer:
Types of organisations related to open source are:

  1. Apache software foundation.
  2. The documents foundation.
  3. The Eclipse foundation.
  4. Free software foundation.
  5. Linux foundation.
  6. Open course ware consortium.
  7. Open source initiative.

Question 29.
Differentiate Proprietary and Open Source Software.
Answer:

Proprietary

 Open Source Software

Proprietary software refers to the software which is solely owned by the individual or publisher who developed it. Open Source refers to the software whose source code is available for anybody to access and modify.
Proprietary software is owned by an organization. Open Source Software or code is shared freely.
Traditionally, the makers of proprietary software have not allowed the users. Open Source Software is usually created and updated by many programmers around the world and made freely accessible.
Browser – Internet Explorer Browser – Mozilla Firefox

An example of proprietary operating system is windows. An example of open source operating system is Linux.
Office suit – Microsoft office Office suit – Open Office
Web CMS – Dot Net Nuke Web CMS – Drupal

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 30.
List out the Benefits of Open Source Software.
Answer:

  1. Give us more options to choose software.
  2. Full access there is no restrictions.
  3. Share our ideas and codes with all.
  4. Shape our programming knowledge.
  5. Work with more people, so can know others views.
  6. Tell the errors and rectify it in quick time.
  7. Make necessary change as per our software needs.
  8. User friendly.
  9. Remote management.
  10. Mobile view.

Question 31.
Explain various Open Source License.
Answer:

  1. Apache License 2.0
  2. BSD 2-clause “Simplified” or “Free BSD” license.
  3. GNU General Public License (GPL)
  4. GNU Library or “Lesser” General Public License (LGPL).
  5. MIT License
  6. Mozilla public License 2.0
  7. Common Development and Distribution License.
  8. Eclipse Public License.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 32.
Mention open source software and free software names that not explain in this chapter.
Answer:
Important open source software:
Free BSD, Drupal, Postgre SQL, Torch, Putty, NETcore, Vagarant, Open KM, Flight path, ak, Miranda IM, Taiga, Rudder, Dragon fly, Koders, Apertium, Ekiga, FreePBX, FreeSWITCH, Sim, Ring, Tox, Appachecocoon, HTTP File Server, Atutor, eFront, Moodle, OLAT, Omeka, SWAD, Pencil 2D, OpenFX, F-SPOT, Blender, Dscaler, Natron, F-spot, MEncoder and many more open source software available in the internet.

Freeware:
Skype, Micro Video Converter, Mozilla thunderbird, Quicksilver, Colibri, SpyBot, Fressbooks, RSSOWL, Vienna Cabos, Miro, Mplayer, CDBumer, Yami, Handbrake, LibreOffice, Abiword, Picasa Test, GIMP, Seashore, iTunes, GoogleEarth, Audacity, SmartFTP, Filezilla, NoteTablight, Bitcoin, mIRC, KVIrc, Colloquy and many more Freesoftware available in the internet.

Question 33.
Mention Software that are accounts related.
Answer:
Tally ERP9, Profit books, Busy Accounting software, Marg Accounting Software, Saral Accounting software, Zoho Books, MProfit, Quickbooks, Freshbooks, Gnucash, wave, Wings Accounting, Xero, Billing 360, LOGIC Account, Giddh, Alignbooks, Zipbooks, Integra Trade Plus, Reach, ANU Retail, Graveinvoice, Accounting Guru, Beyond square Financial Management System, Wave Accounting, Fraxinus Book ERP, Focus, Kount. Accounting, Express Accounts and many more Accounts softwares available in the internet.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 34.
Mention open source developing and maintaining companies.
Answer:
Open sources developing and maintaining companies play a major role in the open source software that powers today’s business.
(i) Adobe: It has a strong commitment to open source.
Headquarters: San Jose, Calif.

(ii) Automatic: WordPress open source project is how handled by this foundation.
Headquarters: San Francisco, Calif.

(iii) Canonical: This is the company behind ubuntu, one of the most popular Linux distributions on the planet.
Headquarters: London, UK

(iv) Chef: Chef is the name of both an open source system integration frame work.
Headquarters: Seattle, Wash.

(v) Cloud Bees: Cloud Bees is the company behind Jenkins.
Head quarters: San Jose, Calif.

(vi) Confluent: A major role in the big dataspace.
Head quarters: Palo Alto, Calif.

(vii) Databrick: Databricks is the company that popular big data streaming project.
Head quarters: San Francisco, Calif.

(viii) Data Stax: Data stax offers a commercially supported NoSQL database.
Head quarters: Santa clara, Calif.

(ix) Docker: Docker contain erization technology has emerged as one of the most open source projects.
Head quarters: San Francisco, Calif.

(x) Elastic: Best open source Elastic search projects.
Head quarters: Mountain view, Calif.
Facebook, Github, Google, Gradle, Hashi-corp, Horton works, Huawei, IBM, Intel Linkedin, Microsoft, MongoDB, Netflix, Nginx, NPM, Puppet, Red Hat, Redis Labs, Sauce Labs, Suse, Twitter etc., are the most common open source developing and maintaining companies.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Choose the correct answer:

Question 1.
Which software is owned by an organisation or individual?
(a) Free Software
(b) Open Source
(c) Proprietary
(d) All of these
Answer:
(c) Proprietary

Question 2.
Which software is used to control when there are more systems are connected?
(a) Free software
(b) Open source
(c) Proprietary
(d) Network Software
Answer:
(d) Network Software

Question 3.
Expansion of OSI:
(a) Open Source Initiative
(b) Open Source Integration
(c) Open Source Internet
(d) Open Source Interconnecting
Answer:
(a) Open Source Initiative

Question 4.
When was founded by open source initiative?
(a) 1996
(b) 1997
(c) 1998
(d) 1999
Answer:
(c) 1998

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 5.
Who is defined by four conditions, as outlined by the non profit free software foundation?
(a) Richard Stallman
(b) Balog
(c) Matt Brozowski
(d) David Hustace
Answer:
(a) Richard Stallman

Question 6.
Which is refers to proprietary software that can download no cost but source code cannot be changed?
(a) Open source
(b) Freeware
(c) Firmware
(d) All of these
Answer:
(b) Freeware

Question 7.
Which was considered explicitly for exploration in network communication?
(a) NS2
(b) C++
(c) OPNET
(d) SSFNet
Answer:
(a) NS2

Question 8.
Expand FCAPS:
(a) Fault Configuration Accounting Performance Security
(b) Feature Configuration Accounting Performance Security
(c) Fault Configuration Access Performance Security
(d) Feature Configuration Access Performance Service
Answer:
(a) Fault Configuration Accounting Performance Security

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 9.
Which is the worlds first software for network monitor and management with open source options?
(a) C++
(b) Open NMS
(c) OPNET
(d) NS2
Answer:
(b) Open NMS

Question 10.
Which is best for IT-ecosystem for new technologic monitoring?
(a) Meridian
(b) Horizon
(c) GIMP
(d) VLC
Answer:
(b) Horizon

Question 11.
How many main functional areas in Open NMS?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 12.
Which of the following software is used without any payment?
(a) Firmware
(b) Open source
(c) Freeware
(d) Network software
Answer:
(c) Freeware

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 13.
Which one of the following is open source hardware?
(a) NS2
(b) Open NMS
(c) MySQL
(d) Remake
Answer:
(d) Remake

Question 14.
Which one of the following is object-oriented tool command language?
(a) C++
(b) OTCL
(c) NMS
(d) NS2
Answer:
(b) OTCL

Question 15.
Which of the following is the most famous example of open source software?
(a) UNIX
(b) Mac OS X
(c) Linux
(d) Windows
Answer:
(c) Linux

Question 16.
Match the following:

(A) NS2 (i) Network object
(B) Routers (ii) Open Source Software
(C) MS Office (iii) Interface
(D) API (iv) Network monitoring

(a) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(b) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 17.
Choose the incorrect pair.
(a) proprietary – Freeware
(b) debug – errors
(c) MsOffice – Open source
(d) Simulator – Software
Answer:
(c) MsOffice – Open source

Question 18.
Choose the correct pair.
(a) OTC1 – Spreadsheet
(b) GNU – Network
(c) OpenNMS – Balog
(d) DNS – Application
Answer:
(c) OpenNMS – Balog

Question 19.
Choose the incorrect statement.
(a) open source code enable to read code.
(b) open source code is the freedom to run the program for any purpose.
(c) open source code is freedom but does not improve the program.
(d) open source code is freedom to redistribute copies.
Answer:
(c) open source code is freedom but does not improve the program.

Question 20:
Choose the correct statement.
(a) open source software is no option to choose.
(b) open source software, there is restrictions.
(c) open source software, make necessary change as per our software needs.
(d) open source software do not share our ideas and codes with all.
Answer:
(c) open source software, make necessary change as per our software needs.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 21.
Assertion (A):
A network simulator is a software program that replicates the functioning of a network.
Reason (R):
Open source hardware helps us to understand and remove the unwanted harmful parts.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 22.
Assertion (A):
Open NMS is a free and open-source initiative grade network monitoring and management platform.
Reason (R):
It is established and maintained by a community of users, developers and by the open NMS Group, it offering services, training and support.
(a) Both, A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both, A and R are true, and R is the correct explanation for A

Question 23.
Pick the odd one out:
(a) NS2
(b) Ubuntu
(c) Open Office
(d) MS Office
Answer:
(d) MS Office

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 24.
Pick the odd one out:
(a) 7zip
(b) ICMP
(c) HTTP
(d) DNS
Answer:
(a) 7zip

Question 25.
Pick the odd one out:
(a) Remix
(b) Remake
(c) Freeware
(d) Resell
Answer:
(c) Freeware

Question 26.
If the source code of a software is freely accessible by the public, then it is known as:
(a) Freeware
(b) Firmware
(c) Open source
(d) Public source
Answer:
(a) Freeware

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 27.
Which of the following is a software program that replicates the functioning of a computer network?
(a) Network software
(b) Network simulation
(c) Network testing
(d) Network calculator
Answer:
(b) Network simulation

Question 28.
Which of the following can document every incident that happened in the ‘ simulation and are used for examination?
(a) Net Exam
(b) Network hardware
(c) Trace file
(d) Net document
Answer:
(c) Trace file

Question 29.
Which is an example of network simulator?
(a) simulator
(b) TCL
(c) NS2
(d) C++
Answer:
(c) NS2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 30.
Fill in the blanks : NS2 comprises of key languages?
(a) 13
(b) 3
(c) 2
(d) 4
Answer:
(c) 2

Question 31.
Choose the Correct Pair from the following to build NS2:
(a) UNIX & TCL
(b) UNIX & a. C++
(c) C++ & OTcl
(d) C++ & NS2
Answer:
(c) C++ & OTcl

Question 32.
Which of the following is not a network simulation software?
(a) NS2
(b) OPNET
(c) SSFNet
(d) C++
Answer:
(d) C++

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 33.
Which of the following is a open source network monitoring software?
(a) C++
(b) OPNET
(c) Open NMS
(d) OMNet++
Answer:
(c) Open NMS

Question 34.
Open NMS was released in:
(a) 1999
(b) 2000
(c) 2003
(d) 2004
Answer:
(a) 1999

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 35.
Open NMS Group was created by:
(a) Balog
(b) Matt Brozowski
(c) David Hustace
(d) All of them
Answer:
(a) Balog

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 1.
What do you mean by barter system?
Answer:
Barter system means, In near future commercial activities such as buying or selling of goods between merchant and consumer will be bygone and forgotten.

Question 2.
Define E-Business.
Answer:
E-Business entirely depends on the Internet for its every intra-company and inter-company activities such as procurement of raw materials, marketing, finance, manufacturing, selling and negotiation.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 3.
What are the progress of the Internet technology?
Answer:
The progress of the Internet technology and vastly developed global Internet community, large number of dot-coms, FinTech and Internet Startups.

Question 4.
What is the recently sustained significant growth of E-Commerce?
Answer:

  1. Internet has transformed from an auxiliary communication medium of academics and large organizations to an entrenched communication medium that extends nearly all parts of mainstream society.
  2. Integrated with commercialization of the Internet, personal computers and electronic payment systems together made E-Commerce flourish.

Question 5.
What is a technique proposed by Michael Aldrich?
Answer:
Michael Aldrich proposed a technique that enables online transaction processing between consumers and businesses or between businesses.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 6.
What is Teleputer?
Answer:
Michael Aldrich invented a multi-purpose home infotainment device called Teleputer, which was a fusion of Television, computer and telecom networking technologies.

Question 7.
Describe four distinct waves by Economists.
Answer:

  1. Economists describe four distinct waves that occurred in the Industrial Revolution. In each wave, different business strategies were successful.
  2. Electronic commerce and the information revolution brought about by the Internet.

Question 8.
What is web 3.0?
Answer:
The term 3.0 summarise the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web, Generic Database etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 9.
What is mean by off-shoring?
Answer:
Off-shoring means, if the work is outsourced to a company, which is outside of its own country.

Question 10.
What is called as Reverse auction model?
Answer:

  1. C2B can be described as a form of E-Commerce where, the transaction is originated by the consumers.
  2. The consumers will fix a set of requirements or specific price for a service or a commodity. C2B model is also called as reverse auction model.

Question 11.
What is B2C model?
Answer:

  1. B2C (Business to Consumer) is commercial transactions take place between business firms and their consumers.
  2. It is the direct trade between companies and end-consumers via the Internet. An example of B2C transaction is a book company selling books to customers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 12.
What is B2G Model?

  1. B2G (Business to Government) is a business model that refers to business organisations sells products, services or information to Governments or to its administrations.
  2. B2G networks models provide a way for business to bid on Government projects. An example, A Government buys laptops for students from a business.

Question 13.
What is C2G model?
Answer:

  1. C2G (Consumer to Government) is an individual consumer interacts with the Government.
  2. C2G models usually include income tax or house tax payments, fees for issuance of certificates or other documents. Eg: People paying for renewal of license online.

Question 14.
What is G2B model?
Answer:
G2B (Government to Business) refers to a Business model where Government providing services or information to business organization.
Eg: Take over bid for a road project.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 15.
What is G2C model?
Answer:
G2C (Government to Consumer) is very similar to C2G. The Government provides platform for its citizens to avail its services and information through the Internet.
Eg: The services may be issuance of certificates through online.

Question 16.
What does Affiliate site of E-Commerce activity?
Answer:
Affiliate site is a form of third party marketing in which the site owner get paid based on the performance. The affiliate site usually attracts visitors by offering more information and tutorials on some specific product.

Question 17.
What is Auction site and banner advertisement site?
Answer:

  1. Auction site is a kind of website, that auctions items on the Internet and levies some commission from the sales.
  2. Banner advertisement site displays advertisements of other companies in its websites and thereby earns revenue.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 18.
What does Bulk-buying sites and Digital Publishing sites?
Answer:

  • Bulk-buying sites collect a number of users together all of who want to buy similar items.
  • Digital publishing sites effectively host the e-books or magazines on the web.

Question 19.
What is Licensing site and Name-your-price sites?
Answer:
Licensing sites allow other websites to make use of their software.
Eg: Search engines.

Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with retailer for a particular product.

Question 20.
What is online shopping mall site?
Answer:
Online shopping mall sites allows multi E-Commerce traders to assemble together, on a single website.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 21.
Write any two advantage of E-Commerce.
Answer:

  1. E-Commerce system is operated on all days and all the day.
  2. Advanced Electronic communication systems allow messages to reach across the world instantaneously.

Question 22.
Write any two disadvantage of E-Commerce.
Answer:

  1. E-Commerce is often used to buy goods that are not available locally but from businesses all over the world.
  2. Unlike returning goods to a traditional shop returning goods through online is believed to be an area of difficulty.

Question 23.
List the benefits of E-Commerce to a business organisation.
Answer:
Access to Global Market, Lower Transaction Cost, 24 x 7 working, Low cost of entry, Computer platform-independent, Snapping middleman.

Question 24.
What is Disruptive innovations?
Answer:
The innovations which replace the existing technologies are called as disruptive innovations. Disruptive innovations creates a new market.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 25.
List out the limitations of E-Commerce.
Answer:
People won’t buy all products online, competition and corporate vulnerability, security, customer loyalty, shortage of skilled employees and size and value of transactions.

Question 26.
What are types of G2G systems?
Answer:
G2G systems can be classified into two types.

  1. Internal facing or local level joining up a single Governments bureaucracies.
  2. External facing or International level joining up multiple Governments bureaucracy.

Question 27.
What are E-Business building block?
Answer:

  1. Network Infrastructure.
  2. Multimedia content and publishings.
  3. Messaging and information distribution.
  4. Common business service Infrastructure.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 28.
What does a company can be called E-Business?
Answer:
A company can be called E-Business, they should follow the following services.

  1. It has the ability to conduct business electronically over Internet.
  2. It manages payment transactions through Internet.
  3. It has a platform for selling products and services via Internet.

Question 29.
Write the short notes on Dotcom bubble.
Answer:

  1. The Dotcom bubble was a historic excessive growth of economy that occurred roughly between 1995 and 2000.
  2.  It was also a period of extreme growth in the usage and adaptation of the Internet as well.
  3.  There was a tremendous development in US equity investments in Internet based companies.
  4. The NASDAQuestion composite index of US stock market value rising from under 1000 points to more than 5000 points.

Question 30.
Write a short note on Dotcom Burst.
Answer:

  1. The NASDAQuestion – Composite stock market index, fell from 5046.86 to 1114.11. This is infamously known as the Dotcom crash or Dotcom Burst.
  2. This began on March 11, 2000 and lasted until October 9, 2002.
  3. During the crash, thousands of online shopping companies, like pets.com failed and shut down.
  4. Some companies, like Amazon declined in value but recovered quickly.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 31.
Explain C2B Model.
Answer:

  1. C2B (Consumer to Business) can be described as a form of E-Commerce where, the transaction is originated by the consumers.
  2. The consumers will fix a set of requirements or specific price for a service or a commodity.
  3. E-Commerce business entity will match the requirements of the consumers to the best possible extent.

Question 32.
Explain C2C model.
Answer:

  1. C2C (Consumer to Consumer) in E-Commerce provides opportunity for trading of products or services among consumers who are connected through the Internet.
  2. The electronic tools and Internet infrastructure are employed to support transactions between individuals.
  3. This type of E-Commerce works as consumer to Business to Consumer (C2B2C).

Question 33.
Explain G2G model.
Answer:

  1. G2G (Government to Government) is the online interaction between Government organizations.
  2. G2G’s principle objective is to implement E-Govemance rather commerce.
  3. G2G model in E-Govemance involves distributing data or information between its departments.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 34.
What does make Augmented Reality (AR)?
Answer:

  1. Augmented Reality (AR) is a 3-dimensional experience of witnessing the virtual items by augmenting the real objects with the virtual ones.
  2. The AR technology allows customer see themselves and visualize how they would look like in a particular outfit.
  3. Customers don’t have to wear it literally instead Augmented reality.

Question 35.
What does make Virtual Reality (VR)?
Answer:

  1. Virtual Reality (VR) keep changing customer experiences and motivate shoppers to buy as they get more enhanced buying experience.
  2. Interior design and home decor sites were some of the early adopters of this technology.
  3. They allow consumers to virtually place furniture in their home and envision what the end result will look like via their mobile phones.

Question 36.
Define the following: (i) Web 1.0, (ii) Web 2.0, (iii) Web 3.0.
Answer:

  1. Web 1.0 (Web of Content) is the early Web that contained text, images and hyperlink’s and allowed users only to search for information and read it.
  2. Web 2.0 (Web of Communication) is a read-write web that allowed users to interact with each other.
  3. Web 3.0 (Web of context) is termed as the semantic web or executable web with dynamic applications, interactive services and machine-to- machine interaction.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 37.
Explain using Timeline describing various events in E-Commerce.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce 1

Question 38.
Describe the different example of tangible form.
Answer:
The goods, information or services are delivered in tangible or electronic form.
(i) Goods:
Mobile phones, digital cameras, clothes, accessories, anti-virus.

(ii) Information:
Subscription to some newspapers, scientific journals, television channels. –

(iii) Services:
Matrimonial services, Placement services.

(iv) Tangible form:
A digital camera purchased by a consumer from an online shopping website which might be delivered at the requested address.

(v) Electronic form:
A music album or a software downloaded from a site which might be delivered in electronic form.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 39.
Describes the Evolution of Electronic Commerce.
Answer:

  1. E-Commerce started few decades ago and continues to grow exponentially. It first emerged on private networks in 1970.
  2. Electronic Data Interchanges and teleshopping together paved the way for the E-Commerce.
  3. The History of modern E-Commerce is closely twisted together with the history of the Internet.
  4. E-Commerce became really possible when the Internet was opened to commercial use.
  5. Online shopping started to grow when National Science Foundation opened the Internet to the Public in 1991.
  6. Even though E-Commerce has been existing since few decades, it has recently sustained significant growth.
  7. Integrated with’ commercialization of the Internet, personal computers, and electronic payment systems together made E-Commerce flourish.

Question 40.
Explain the benefits of E-Commerce to a business organization.
Answer:
(i) Access to Global Market:
Internet helps to access the global market place. Simple local businesses are able to market and sell their products internationally using E-Commerce.

(ii) Lower Transaction Cost:
E-Commerce reduces the cost of business transactions substantially.

(iii) 24 x 7 working:
A website is open all 24 hours, 7 days in a week. E-Commerce firm can provide information about its products and services to customers around the clock.

(iv) Low Cost of Entry:
Though E-Commerce was first emerged in private networks it did not remain the same. Internet has changed the face of E-Commerce.

(v) Computer platform – Independent:
Most computers have the ability to communicate via the Internet, irrespective of operating systems and hardware. So E-Commerce applications can be more efficiently developed and distributed because they are platform independent.

(vi) Snapping middleman:
E-Commerce enjoys the benefit of bypassing middleman and reaching the end customer directly through Internet. It helps to increase the sales of the organization without any interventions.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 41.
Explain the major drawbacks of E-Commerce for a business organization.
Answer:
The following are the major drawbacks of E-Commerce for a business organization.
(i) People won’t buy all products online:
There are certain products like high price jewels, cloths or furnishings which people might not like to buy online. They might want to, inspect it, feel the texture of fabric etc., which are not possible in E-Commerce.

(ii) Competition and corporate vulnerability:
Access to Global Market is an beneficial on one hand but it also come with a competition. Open Internet has paved way to all business firms to operate in the global market.

(iii) Security:
Customers might be reluctant to give their credit card number to the website. As lot of cyber frauds takes place in E-Commerce transactions, people generally afraid to provide their personal information. .

(iv) Customer loyalty:
Business cannot survive long without loyal customers. The customers would like to buy from a website where they
are able to get the best deal. They cannot be loyal to a particular seller.

(v) Shortage of skilled employees:
Though most of die process in E-Commerce is automated, some sectors only needs manual interventions. There is a great shortage of skilled employees.

(vi) Size and value of transactions:
E-Commerce is most often conducted using credit card for payments, and as a result very small and very large transactions tend not to be conducted online.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 42.
Define the following terms:
(i) Affiliate,
(ii) Blog,
(iii) Brick and Morter,
(iv) Dotcom,
(v) WordPress.
Answer:
(i) Affiliate:
Business who promotes the products of another business for a commission.

(ii) Blog:
An online platform for writing articles about a topic.

(iii) Brick and Morter:
The term that refers to a business that has a physical store, opposite of online store.

(iv) Dotcom:
Common name for Internet based companies.

(v) WordPress:
A free, open source online blogging platform.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 43.
Define E-Commerce.
Answer:

  1. E-Commerce means Electronic Commerce. Commerce and Internet makes E-Commerce.
  2. E-Commerce allows the consumers to exchange goods and services with no barriers of time or distance.
  3. E-Commerce can be described as the process of buying or selling . products, services or information via computer networks.

Question 44.
Distinguish between E-Business and E-Commerce.
Answer:

E – Business E – Commerce
E – Business entirely depends on the Internet for its every intra company and inter company activities E – Commerce is commercial transaction through Internet.
E – Business is grounded on technologies such as Network Infrastructures like VAN, Internet, Intranet, Extranet. E – Commerce is limited with monetary transactions using Internet.

Question 45.
Differentiate tangible goods and electronic goods with example of your own.
Answer:

Tangible Goods Electronic Goods
Digital camera purchased by a consumer from an online shopping website which might be delivered at the requested address. Music album or a software downloaded from a site which might be delivered in electronic form.
A physical item that can be perceived by the sense of touch. Eg: Cars, Food items, Computers, Telephones etc… AC, Microwave oven, Refrigerators, Vacuum Cleaner, DVD, Mobiles, Ipod, Ipads, Camera, Fan, Printers, etc., are Electronic goods.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 46.
What is dotcom bubble and dotcom burst?
Answer:
Dotcom bubble:
The dotcom bubble referred to as the Internet bubble, refers the period between 1995 and 2000 when investors pumped money into internet based startups. The Dotcom bubble had attracted huge investments of first wave companies.

Dotcom burst:
The dotcom bubble was a historic speculative bubble in the USA from 1994 to 2000, a period of extreme growth in the use and adopted of the Internet. The second wave is the rebirth of E-Commerce after the dotcom burst.

Question 47.
Write a short note on out-sourcing.
Answer:

  1. Outsourcing is a business practice in which a company hires another company or an individual to perform tasks, handle operations.
  2. Some common out sourcing are Resource management, facilities management, supply chain management, accounting, customer support and service, marketing, computer aided design, research, design, content writing, engineering, diagnostic services and legal documentation.

Question 48.
Describe how E-Commerce is related to socio-technological changes.
Answer:

  1. Growth of E-Commerce is also related to the socio-technological changes.
  2. The more, the medium becomes deep rooted, the more, are the users drawn towards it.
  3. Increase of users, increase the markets. As the markets expand, more business organizations are attracted. The more business accumulate it create competition.
  4. The competition leads to innovation, innovation in turn drives the development of technology, technology facilitates E-Commerce’s growth.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 49.
Write a short note on the third wave of E-Commerce.
Answer:

  1. The third wave of Electronic Commerce is 2010 to at present. The third wave is brought on by the mobile technologies.
  2. The mobile technologies connects users via mobile devices for real-time and-on-demand transactions.
  3. The term 3.0, summarize the various characteristics of the future Internet which include Artificial Intelligence, Semantic web, Generic database etc…

Question 50.
Explain B2B module in E-Commerce.Answer:ial transactions take place between different business organizations through the Internet.
Answer:
For example, a cycle company may buy tyres from another company for their cycles. When compared to other models, the value per transaction in B2B transaction is high, because of bulk purchase.
The company also might get the advantage of discounts on bulk purchases. Out-sourcing and off-shoring are generally associated with B2B E-Commerce.

Question 51.
Write a note on name-your-price websites.
Answer:

  1. The name-your-price website, which buyers make a suggestion for a product’s price and the transactions occurs only if a seller accepts this quoted price.
  2. As the Internet is continuously being developed and the online market places are becoming increasingly more popular, consumers have more choices in terms of product pricing.
  3. Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the retailer for a particular product or service. https://in.hotels.com.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 52.
Write a note on physical product dispute of E-Commerce.
Answer:

  1. Physical product disputes are a major disadvantage in E-Commerce.
  2. E-Commerce purchases are often made on trust. This is because, we do not have physical access to the product.
  3. Though Internet is an effective channel for visual and auditory information it does not allow full scope for our senses.
  4. We can see pictures of the perfumes, but could not smell their fragrance, we can see pictures of cloth, but not its quality.

Question 53.
Write about the development and growth of Electronic Commerce.
Answer:
Economists describe four distinct waves that occurred in the development and growth of Electronic Commerce.

(i) The First Wave of Electronic Commerce (1995-2003):
The Dotcom companies of first wave are mostly American companies. There by their websites were only in English. The Dotcom bubble had attracted huge investments to first wave companies.

The Internet was mere read only web and network technology was in its beginning stage, the bandwidth and network security was very low.

(ii) The Second Wave of Electronic Commerce (2004 – 2009):
The second wave is the birth of E-Commerce after the dotcom burst. The second wave is considered as the global wave, with sellers doing business in many countries and in many languages.

The rapid development of network technologies and interactive web offered the consumers more choices of buying.

(iii) The third wave of Electronic Commerce (2010 – Present):
The third wave is brought on by the mobile technologies. It connects users via mobile devices for real-time and on-demand transactions.

The term web 3.0 summarise the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web, Generic Databases etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 54.
List all the E-Commerce business models and explain any four briefly.
Answer:
(i) Business to Business (B2B)
(ii) Business to Consumer (B2C)
(iii) Business to Government (B2G)
(iv) Consumer to Business (C2B)
(v) Consumer to Consumer (C2C)
(vi) Consumer to Government (C2G)
(vii) Government to Business (G2B)
(viii) Government to Consumer (G2C)
(ix) Government to Government (G2G)

(i) Business to Consumer (B2C):
B2C is the direct trade between companies and end-consumers via the Internet.
B2C companies sell goods, information of services to customers through online.

(ii) Business to Government (B2G):
B2G is a business model that refers to business organizations sells products, services or information to Governments or to its administrations.
B2G network models provide a way for businesses to bid on Government projects or products those Governments might need for their organizations.

(iii) Consumer to Business (C2B):
(a) C2B can be described as form of E-Commerce where, the transaction is originated by the consumers.
(b) The consumers will fix a set of requirements or specific price for a service or a commodity. C2B model, is also called as reverse action model.

(iv) Consumer to Government (C2G):
(a) Citizens as consumers and Government engage in C2G E-Commerce.
(b) An individual consumer interacts with the Government.
(c) C2G models usually include income tax or house tax payments, fees for issuance of certificates or other documents.
(d) People paying for renewal of license online may also fall under this category.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 55.
Explain any five E-Commerce revenue models.
Answer:
Today there are many ways by which companies can make money from the
Internet. The E-Commerce revenue models are –

(i) Affiliate site:
(a) Affiliate site is a form of third party marketing in which the site owner get paid based on the performance.
(b) The affiliate site may be a price comparison service or shopping directories or review sites or blogs that contain a link to a normal retailing site and are paid when a customer makes a purchase through it.
(c) The affiliate site usually attracts visitors by offering more information and tutorials on some specific product or a topic.

(ii) Auction site:
Auction site is a kind of website, that auctions items on the Internet and levies some commission from the sales.
Eg: http://WWW.ebay.com

(iii) Banner advertisement site:
Banner advertisement site displays advertisements of other companies in its websites and thereby earns revenue.

(iv) Bulk-buying site:
Bulk-buying sites collect a number of users together all of who want to buy similar items, the site negotiates a discount with the supplier and takes a commission.
Eg: http://WWW.alibaba.com

(v) Digital publishing sites:
Digital publishing sites effectively host the e-books or magazines on the web. They make profits in a number of ways such as advertising, selling etc…
Eg: http://WWW.wordpress.org

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 56.
How would you differentiate a traditional commerce and E-Commerce?
Answer:

Traditional Commerce

 E-Commerce

Traditional commerce is buying or selling of products and services physically.E – Commerce carries out commercial transactions electronically on the Internet.
Customer can easily identify, authenticate and talk to the merchant.Neither customer nor merchant see the other.
Physical stores are not feasible to be open all the time.It is always available on all time and all days of the year.
Products can be inspected physically before purchase.Products can’t be inspected physically before purchase.
Scope of business is limited to particular area.Scope of business is global. Vendors can expand their business Worldwide.
Resource focus Supply side.Resource focus Demand side.
Business Relationship is Linear.Business Relationship is End to end.
Marketing is one way marketing.One – to – one marketing.
Payment is made by cash, cheque, cards etc.Payment system is mostly credit card and through fund transfer.
Most goods are delivered instantly. It takes time to transport goods.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 57.
What are the advantages and disadvantages of E-Commerce to a consumer?
Answer:
The following are the advantages and disadvantages of E-Commerce for a consumer.
Advantages:

  1. E-Commerce system is operated on all days arid all the day. People can interact with businesses at the time of their convenience.
  2. Speed is a major advantage in E-Commerce. Communication delay is not a part of the Internet or E-Commerce world.
  3. The Internet is too easy to ‘shop around’ for products and services that may be more cheaper and effective than left to buy only in a brick and mortar shop.
  4. The whole world becomes a shop for today’s customers.
  5. Customers can shop from home or anywhere at their convenience. Payments can also be made through online.

Disadvantages:

  1. E-Commerce is often used to buy goods that are not available locally at from businesses all over the world.
  2. In E-Commerce we should wait between placing the order and having the product in hand.
  3. Unlike returning goods to a traditional shop returning goods through online is believed to be an area of difficulty.
  4. Privacy issues are serious in E-Commerce. In E-Commerce generating consumer information is inevitable.
  5. Physical product disputes are a major disadvantage in E-Commerce. E-Commerce purchase are often made on trust.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 58.
Draw a timeline describing various developments in E-Commerce.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce 2

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 59.
List the business around your society and sort it according to business modules.
Answer:
(i) B2B (Business to Business) Model:
Trade India is an online Business to Business for small businesses based in India and around the globe. For Agriculture, Automobile, Chemicals, Computer Hardware, Construction, Electronics, Energy and power, Food and Bevarage, Furniture, Machinery etc…

(ii) B2C (Business to Consumer) Model:
Adret All Ayurveda Pvt. Ltd, World’s first and largest website to buy natural and Ayurvedic products. They sell directly to consumers, that can be referred to as B2C.

(iii) B2G (Business to Government):
Dell computer, A government buys laptops for student from a company, this refers business organization sells products to Government.

(iv) C2B (Consumer to Business):
RedBus Booking Bus Ticket in RedBus Website. The Website generate revenue from consumer or travels. This is C2B business by the consumers.

(v) C2C (Consumer to Consumer):
Property.com. The two consumer intrested with each other for sale / purchase of property from this website.
So that two consumers using Internet is called C2C E-Commerce.

(vi) Consumer to Government (C2G):
chennaicorporation.in, here a consumer usually to pay house tax, water tax through this website, so people paying taxes, fees are under this type.

(vii) G2B (Government to Business):
ebiz.gov.in, Government provides information, rules, requirement and permission needed a new started business.

(viii) G2C (Government to Consumer):
https://csc.gov.in/ – This Government website provides issuance of certificates through online to consumer.

(ix) G2G (Government to Government):
https:/www.nic.in/- This is Government website, it provides e-govemance to its departments or agencies.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 60.
Interview a consumer who recently bought a product online and write his experience.
Answer:

  1. I tell you about my friend (Consumer) online shopping experience, he bought through online TNPSC Group IV Book in one of the regular publisher.
  2. My friend wanted to prepare for Group IV TNPSC Exam. He would buy it from any online shop. He would get the discount also on my book. So next day, he would use website through internet and booked a book using his debit card.
  3. The Book actual cost is ₹ 250 but in snapdeal he got it at just ₹ 160 during ordering. He just got that in 3 days in courier.
  4. He was very happy, safe and a very quick experience.
  5. Some advices that I would like to give are whenever you are going to buy anything online then first seen all sites an then compare them.
  6. After comparing see which or is the best. Once seen which one is cheaper then see that which one will be delivered soon.
  7. One more thing also check whether it has easy return or replace policy if not then don’t go for it.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Choose the correct answer:

Question 1.
Which subject of concept always profit from innovations?
(a) Accounts
(b) Commerce
(c) Business
(d) Administration
Answer:
(b) Commerce

Question 2.
What is known as near future commercial activities like buying or selling of goods between merchant and consumer?
(a) Barter system
(b) Online system
(c) Direct system
(d) Order by system
Answer:
(a) Barter system

Question 3.
________ is a subject of E-Business.
(a) Buying
(b) Selling
(c) E-Commerce
(d) Commerce
Answer:
(c) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 4.
Which is commercial transaction through Internet?
(a) E-pay
(b) E-Commerce
(c) Online system
(d) Barter system
Answer:
(b) E-Commerce

Question 5.
Which is called grounded on technologies network infrastructures?
(a) E-Business
(b) E-Commerce
(c) E-pay
(d) Online system
Answer:
(a) E-Business

Question 6.
Which is currently one of the most important aspects of the Internet era?
(a) E-Business
(b) E-Commerce
(c) E-pay
(d) Online system
Answer:
(b) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 7.
Which type of form on delivered the goods, information or services?
(a) Goods
(b) Services
(c) Electronic
(d) Tangible
Answer:
(d) Tangible

Question 8.
Which of the following one is an Electronic form?
(a) Mobiles
(b) TV
(c) Digital camera
(d) Music album
Answer:
(d) Music album

Question 9.
Which year was first emerged on private networks?
(a) 1965
(b) 1968
(c) 1970
(d) 1972
Answer:
(c) 1970

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 10.
Which is no longer an exclusive domain of large organisations or private networks?
(a) E-Business
(b) E-Commerce
(c) E-Pay
(d) Online system
Answer:
(b) E-Commerce

Question 11.
Who was proposed a technique that enables online transaction processing between consumers and businesses?
(a) Michael Aldrich
(b) Phil Brandenberger
(c) John Philips
(d) Mark Waugh
Answer:
(a) Michael Aldrich

Question 12.
What is called as a multi-purpose home infotainment device?
(a) TV
(b) Computer
(C) Telecom
(d) Teleputer
Answer:
(d) Teleputer

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 13.
Which one is Amazon sold its first item?
(a) Watch
(b) pen
(c) CD
(d) A Science Textbook
Answer:
(d) A Science Textbook

Question 14.
Which had attracted huge investments to first wave companies?
(a) E-books
(b) Dotcom bubble
(c) Dotcom burst
(d) Dot-net
Answer:
(b) Dotcom bubble

Question 15.
What will does remained as a mode of information exchange between businesses?
(a) EDI
(b) E-mail
(c) Both (a) and (b)
(d) Either (a) or (b)
Answer:
(c) Both (a) and (b)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 16.
Which is the rebirth of E-Commerce after the dotcom burst?
(a) The first wave
(b) The second wave
(c) The third wave
(d) All of these
Answer:
(b) The second wave

Question 17.
Which is considered as the global wave, with sellers doing business in many countries and in many languages?
(a) The first wave
(b) The second wave
(c) The third wave
(d) All of these
Answer:
(b) The second wave

Question 18.
The increased web users nourished E-Commerce companies during:
(a) The first wave
(b) The second wave
(c) The third wave
(d) All of these
Answer:
(b) The second wave

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 19.
Which wave is brought on by the mobile technologies?
(a) First
(b) Second
(c) Third
(d) None
Answer:
(c) Third

Question 20.
Which was a historic excessive growth of economy that occurred roughly between 1995 and 2000?
(a) Dotcom bubble
(b) Dotcom Burst
(c) E-Commerce
(d) E-Business
Answer:
(a) Dotcom bubble

Question 21.
Which is known as when Nasdaq-composite stock market index fell from 5046.86 to 1114.11?
(a) Dotcom bubble
(b) (c) and (d)
(c) Dotcom crash
(d) Dotcom burst
Answer:
(b) (c) and (d)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 22.
Which model is associated with out-sourcing and off-shoring?
(a) B2B
(B) B2C
(c) B2G
(d) C2B
Answer:
(a) B2B

Question 23.
What is called as it a company’s work is hired to another company?
(a) Out-dated
(b) Off-shoring
(c) Out-sourcing
(d) All of these
Answer:
(c) Out-sourcing

Question 24.
What is called as if the work is outsourced to a company, which is outside of its own country?
(a) Out-dated
(b) Off-shoring
(c) Out-sourcing
(d) All of these
Answer:
(b) Off-shoring

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 25.
Which model is commercial transactions take place between business firms and their consumers?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(b) B2C

Question 26.
Which model is a business model that refers to business organizations sells • products, services or informations to Government?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(c) B2G

Question 27.
Which networks models provide a way for businesses to bid on Government projects?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(c) B2G

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 28.
Which model can be described as a form of E-Commerce where the transactions is originated by the consumers?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(d) C2B

Question 29.
Which model is also called as reverse auction model?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(d) C2B

Question 30.
Which model provides opportunity for trading of products or services among consumers in Internet?
(a) C2C
(b) C2G
(c) C2B
(d) G2C
Answer:
(a) C2C

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 31.
What is called when something is bought and sold between two consumers using Internet?
(a) C2C E-Commerce
(b) C2G E-Commerce
(c) C2B E-Commerce
(d) G2C E-Commerce
Answer:
(a) C2C E-Commerce

Question 32.
Which model engage in citizens as consumers and Government?
(a) C2C
(b) C2G
(c) C2B
(d) G2C
Answer:
(b) C2G

Question 33.
Which model refers to a Government business model in E-Commerce?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(a) G2B

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 34.
G2B is closely related to:
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(c) B2G

Question 35.
Which model is a part of E-Governance?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(a) G2B

Question 36.
Which model is to reduce burdens on business, provide one-stop access to information thereby boost the economy?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(a) G2B

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 37.
Which model provides platform for its citizens to avail its services and information through Internet?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(d) G2C

Question 38.
Which model is very similar to C2G in E-Commerce?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(d) G2C

Question 39.
Which model is the online interaction between Government organizations?
(a) G2B
(b) C2G
(c) G2C
(d) G2G
Answer:
(d) G2G

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 40.
What is a form of third party marketing in which the site owner get paid based on the performance?
(a) Affiliate site
(b) Auction site
(c) Bulk-buying site
(d) Digital publishing site
Answer:
(a) Affiliate site

Question 41.
Which form usually attracts visitors by offering more information and tutorials on some specific product?
(a) Affiliate site
(b) Auction site
(c) Bulk-buying site
(d) Digital publishing site
Answer:
(a) Affiliate site

Question 42.
Which form is that auctions items on the Internet and levies some commission from the sales?
(a) Affiliate site
(b) Auction site
(c) Bulk-buying site
(d) Digital publishing site
Answer:
(b) Auction site

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 43.
Which form is collect a number of users together all of who want to buy similar items?
(a) Digital publishing site
(b) Licensing site
(c) Name-your-price site
(d) Bulk-buying site
Answer:
(d) Bulk-buying site

Question 44.
Which form is allow other websites to make use of their software?
(a) Digital publishing site
(b) Licensing site
(c) Name-your-price site
(d) Bulk-buying site
Answer:
(b) Licensing site

Question 45.
Which form is just like normal retail sites?
(a) Digital publishing site
(b) Licensing site .
(c) Name-your-price site
(d) Bulk-buying site
Answer:
(c) Name-your-price site

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 46.
Which form allows multi E-Commerce traders to assemble together on a single website?
(a) Online shopping mall site
(b) Bulk-buying site
(c) Name-your-price site
(d) Licensing site
Answer:
(a) Online shopping mall site

Question 47.
Which commerce is buying or selling of products and services physically?
(a) Traditional
(b) E-Commerce
(c) Commerce
(d) Business
Answer:
(a) Traditional

Question 48.
Which of the following is carries out commercial transactions electronically on the Internet?
(a) Traditional Commerce
(b) E-Commerce
(c) Commerce
(d) Business
Answer:
(b) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 49.
Which system is operated, customers can shop from home or anywhere at . their convenience?
(a) Traditional Commerce
(b) E-Commerce
(c) Commerce
(d) Business
Answer:
(b) E-Commerce

Question 50.
product disputes are a major disadvantage in E-Commerce?
(a) Physical
(b) Electrical
(c) Electronic
(d) Household
Answer:
(a) Physical

Question 51.
The innovations which replace the existing technologies are called as:
(a) Market
(b) E-Commerce
(c) Disruptive innovation
(d) E-Business
Answer:
(c) Disruptive innovation

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 52.
The term disruptive innovation was first coined by:
(a) Clayton
(b) Michael Aldrich
(c) Phil Brandenberger
(d) Mark Waugh
Answer:
(a) Clayton

Question 53.
Clayton M wrote in his book is:
(a) E-Commerce
(b) E-Business
(c) Innovation
(d) The innovator’s Dilemma
Answer:
(d) The innovator’s Dilemma

Question 54.
Which technology is allows customer see themselves and visualize how they would look like in a particular outfit?
(a) Augmented Reality (AR)
(b) Virtual Reality (VR)
(c) Product Reality
(d) Customer Reality
Answer:
(a) Augmented Reality (AR)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 55.
Which can be enjoys the benefit of by passing middle man and reaching the end customer directly through Internet?
(a) E-Business
(b) E-leaming
(c) E-shopping
(d) E-Commerce
Answer:
(d) E-Commerce

Question 56.
Which business firms establish a direct contact with their customers by eliminating middle man?
(a) E-BuSiness
(b) E-Commerce
(c) E-Shopping
(d) Online sales
Answer:
(b) E-Commerce

Question 57.
Which is an effective means for buying known and established services?
(a) E-Business
(b) E-Commerce
(c) E-Shopping
(d) Online sales
Answer:
(b) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 58.
Which is always takes advantage when it is perishables and touch and feel products?
(a) Traditional Commerce
(b) E-Commerce
(c) Commerce
(d) Business Commerce
Answer:
(a) Traditional Commerce

Question 59.
Which has paved way to all business firms to operate in the global market?
(a) E-Market
(b) Open Internet
(c) A website
(d) E-Commerce
Answer:
(b) Open Internet

Question 60.
Which is the illegal activity of extracting business intelligence from competitor’s web pages?
(a) Web server
(b) Web sites
(c) Web harvesting
(d) Web market
Answer:
(c) Web harvesting

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 61.
……………………………… might be reluctant to give their credit card number to the website.
(a) Sellers
(b) Buyers
(c) Customers
(d) All of these
Answer:
(c) Customers

Question 62.
………………………. arise when the customer’s data falls in the hands of strangers.
(a) Legal issues
(b) Fraudulent
(c) Security problems
(d) Cyber Fraud
Answer:
(a) Legal issues

Question 63.
Which activities in traditional commerce is comparatively less as there is personal interaction between the buyer and the seller?
(a) Legal issues
(b) Fraudulent
(c) Security problems
(d) Cyber Fraud
Answer:
(b) Fraudulent

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 64.
Which has difficulty in recruiting, training retaining talented people?
(a) E-Business
(b) E-Leaming
(c) E-Commerce
(d) E-Pay
Answer:
(c) E-Commerce

Question 65.
Which takes place in E-Commerce transactions, people generally afraid to provide their personal information?
(a) Legal issues
(b) Fraudulent
(c) Security problems
(d) Cyber Frauds
Answer:
(d) Cyber Frauds

Question 66.
Match the following:

(A) Goods (i) Placement
(B) Services (ii) Music album
(C) Tangible form (iii) Mobile form
(D) Electronic form (iv) Digital camera

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(c) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
(d) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 67.
Match the following:

(A) First wave(i) Electronic mail
(B) Second wave(ii) Mobile technologies
(C) Third wave(iii) Dotcom burst
(D) CompuServe(iv) Dotcom bubble

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 68.
Match the following:

(A) B2B(i) Out-sourcing
(B) B2C(ii) Bid on governments
(C) B2G(iii) Reverse auction
(D) C2B(iv) Retail store

(a) (A) – (iv); (B) – (ii); (C) – (iii); (D) – (i)
(b) (A) – (i); (B) – (iv); (C) – (ii); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(b) (A) – (i); (B) – (iv); (C) – (ii); (D) – (iii)

Question 69.
Match the following:

(A) Affiliate site (i) More users same item
(B) Bulk buying site (ii) Third party marketing
(C) Licensing site (iii) Single website
(D) Onine shopping mall site (iv) Allow websites

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 70.
Match the following:

(A) Blog(i) Common Name Internet based
(B) Dotcom(ii) Online platform
(C) Teleputer(iii) Blogging platform
(D) WordPress(iv) Fusion of television

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (iv); (B) – (i); (C) – (iii); (D) – (ii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 71.
Choose the incorrect pair:
(a) E-Commerce – E-Business
(b) E-Business – Internet
(c) Tangible – Services
(d) Teleputer – E-data
Answer:
(d) Teleputer – E-data

Question 72.
Choose the incorrect pair:
(a) 1984 – Electronic mail
(b) 1994 – First B2B
(c) 1995 – Amazon sold its first item
(d) 1999 – Zappo’s open
Answer:
(b) 1994 – First B2B

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 73.
Choose the incorrect pair:
(a) First wave – American companies
(b) Web 1.0- Read only
(c) Dotcom bubble – Second wave
(d) Second wave – Global wave
Answer:
(c) Dotcom bubble – Second wave

Question 74.
Choose the incorrect pair:
(a) Web 2.0 – Social media
(b) B2C – Second wave
(c) Mobile Tech – Thirdwave
(d) Web 3.0 – Dotcom burst
Answer:
(d) Web 3.0 – Dotcom burst

Question 75.
Choose the incorrect pair:
(a) B2B – Web generic database
(b) Off-shoring – B2B
(c) B2C – Direct trade
(d) Bulk Purchase
Answer:
(a) B2B – Web generic database

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 76.
Choose the correct pair:
(a) C2B2C – Matrimonial web
(b) C2B – C2C
(c) G2G – Certificate online
(d) G2C – Internal facing
Answer:
(a) C2B2C – Matrimonial web

Question 77.
Choose the correct pair:
(a) Affiliate site – Joining up
(b) Auction site – Internal facing
(c) Bulk-buying site – Advertisement
(d) Digital publishing sites – e-books
Answer:
(d) Digital publishing sites – e-books

Question 78.
Choose the correct pair:
(a) Traditional – Physically
(b) E-Commerce – By cheque
(c) Physical store – All time
(d) Shop around – Mortar shop
Answer:
(a) Traditional – Physically

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 79.
Choose the correct pair:
(a) Innovation – existing
(b) AR – 2-dimensional
(c) Perishable – supply chain
(d) VR – hardware
Answer:
(c) Perishable – supply chain

Question 80.
Choose the correct pair:
(a) Web harvesting – legal activity
(b) Credit card – Cyber Frauds
(c) Illegal – Stranger
(d) Traditional – Fraudulent
Answer:
(b) Credit card – Cyber Frauds

Question 81.
Choose the incorrect statement:
(a) E-Commerce is a subset of E-Business.
(b) E-Commerce is commercial transaction through Internet.
(c) E-Commerce is limited with monetary transactions.
(d) E-Commerce is completely new type of commerce.
Answer:
(d) E-Commerce is completely new type of commerce.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 82.
Choose the incorrect statement:
(a) Economists describe four distinct waves that occurred in the Industrial Revolution.
(b) The Dotcom companies of first-wave are mostly British companies.
(c) The Dotcom bubble had attracted huge investments to first wave companies.
(d) The second wave is the rebirth of E-Commerce.
Answer:
(b) The Dotcom companies of first-wave are mostly British companies.

Question 83.
Choose the incorrect statement:
(a) The third wave is brought on by the mobile technologies.
(b) The term web 3.0 summarise the various characteristics of the future Internet
(c) Out-sourcing is generally associated with B2G E-Commerce.
(d) B2C is the direct trade between companies and end-consumers.
Answer:
(c) Out-sourcing is generally associated with B2G E-Commerce.

Question 84.
Choose the incorrect statement:
(a) G2C in E-Commerce is very similar to C2G.
(b) G2G is the online interaction between Government organizations.
(c) G2G systems can be classified into many types.
(d) G2G model in E-Govemance involves distributing data or information between its departments
Answer:
(c) G2G systems can be classified into many types.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 85.
Choose the incorrect statement:
(a) Auction site is a kind of website, that auctions items on the Internet.
(b) Banner advertisement site displays advertisements of other companies in its websites.
(c) Bulk-buying sites collect a number of users together all of who want to buy similar items.
(d) Licensing sites effectively host the e-books on the web
Answer:
(d) Licensing sites effectively host the e-books on the web

Question 86.
Choose the correct statement:
(a) Physical stores are feasible to be open all the time.
(b) E-Commerce are not feasible to be open all the time.
(c) E-Commerce products can be inspected physically before purchase.
(d) E-Commerce carries out commercial transactions electronically on the Internet
Answer:
(d) E-Commerce carries out commercial transactions electronically on the Internet

Question 87.
Choose the correct statement:
(a) The whole world becomes a shop for today’s customers.
(b) Speed is a major disadvantage in E-Commerce.
(c) Advanced Electronic Communication systems are not possible to reach across the world.
(d) Communication delay is a part of the Internet
Answer:
(a) The whole world becomes a shop for today’s customers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 88.
Choose the correct statement:
(a) Traditional customers can shop from home. .
(b) Traditional customers can pay his payment through online.
(c) E-Commerce is often used to buy goods that are not available locally.
(d) In E-Commerce generating consumer information is not invitable.
Answer:
(c) E-Commerce is often used to buy goods that are not available locally.

Question 89.
Choose the correct statement:
(a) People are often much more comfortable in buying the generic goods.
(b) E-Commerce is increases the cost of business transactions substantially.
(c) As E-Commerce firm cannot provide information about its products and services to customers.
(d) Internet has not changed the face of E-Commerce.
Answer:
(a) People are often much more comfortable in buying the generic goods.

Question 90.
Choose the correct statement:
(a) E-Commerce transaction, people generally very interest to provide their personal information.
(b) Open Internet has paved way to all business firms to operate in the global market.
(c) Traditional commerce always takes disadvantage when it is perishables and touch and feel products.
(d) Traditional commerce is most often using credit cards for payments.
Answer:
(b) Open Internet has paved way to all business firms to operate in the global market.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 91.
Assertion (A):
E-Commerce can be described as the process of buying or selling products.
Reason (R):
Commerce and Internet makes E-Commerce.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Question 92.
Assertion (A):
E-Commerce is currently one of the most important aspects of the Internet era.
Reason (R):
E-Commerce manages payment transaction through cheque.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 93.
Assertion (A):
The Dotcopi companies of first wave are mostly British companies.
Reason (R): The Dot-com bubble had attracted huge investments to first wave companies.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 94.
Assertion (A):
The second wave is the rebirth of E-Commerce after the Dotcom burst.
Reason (R):
The third wave is brought on by the mobile technologies.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 95.
Assertion (A):
G2B is closely related to G2G.
Reason (R):
G2G is the online interaction between Government and people.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are false.

Question 96.
Pick the odd one out.
(a) VAN
(b) EDI
(c) SCM
(d) Commerce
Answer:
(d) Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 97.
Pick the odd one out.
(a) Mobile phones
(b) Digital camera
(c) Accessories
(d) Music album
Answer:
(d) Music album

Question 98.
Pick the odd one out.
(a) B2B
(b) C2C
(c) B2C
(d) B2G
Answer:
(b) C2C

Question 99.
Pick the odd one out.
(a) Affiliate site
(b) Auction site
(c) Internal facing
(d) Bulk-buying site
Answer:
(c) Internal facing

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 100.
Pick the odd one out.
(a) Web 1.0
(b)-Web 2.0
(c) Web 3.0
(d) Web server
Answer:
(d) Web server

Question 101.
A company can be called E-Business if:
(a) it has many branches across the world.
(b) it conduct business electronically over the Internet.
(c) it sells commodities to a foreign country.
(d) it has many employees.
Answer:
(b) it conduct business electronically over the Internet.

Question 102.
Which of the following is not a tangible good?
(a) Mobile
(b) Mobile apps
(c) Medicine
(d) Flower bouquet
Answer:
(b) Mobile apps

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 103.
SME stands for:
(a) Small and medium sized enterprises
(b) Simple and medium enterprises
(c) Sound messaging enterprises
(d) Short messaging enterprises
Answer:
(a) Small and medium sized enterprises

Question 104.
The dotcom phenomenon deals with:
(a) Textile industries
(b) Mobile phone companies
(c) Internet based companies
(d) All the above
Answer:
(c) Internet based companies

Question 105.
Which of the following is not correctly matched?
(a) The First Wave of Electronic Commerce: 1985 -1990
(b) The Second Wave of Electronic Commerce: 2004 – 2009
(c) The Third Wave of Electronic Commerce: 2010 – Present
(d) Dotcom burst: 2000 – 2002
Answer:
(a) The First Wave of Electronic Commerce: 1985 -1990

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 106.
Assertion (A):
The websites of first wave dotcom companies were only in English.
Reason (R):
The dotcom companies of first wave are mostly American companies.
(a) Both A and R are correct and R is the correct explanation of A.
(b) Both A and R are correct, but R is not the correct explanation of A.
(c) A is true and R is false.
(d) A is false and R is true.
Answer:
(a) Both A and R are correct and R is the correct explanation of A.

Question 107.
Off-shoring means:
(a) Work outsourced to a branch of its own company
(b) Work outsourced to new employees
(c) Work outsourced to a third party locally
(d) Work outsourced to a third party outside its own country
Answer:
(a) Work outsourced to a branch of its own company

Question 108.
G2G systems are classified into:
(a) Internal facing and external facing
(b) Internet facing and Extranet facing
(c) Internal flag and external flag
(d) Internet flag and Extranet flag
Answer:
(a) Internal facing and external facing

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 109.
host the e-books on their websites.
(a) Bulk-buying sites
(b) Community sites
(c) Digital publishing sites
(d) Licensing sites
Answer:
(c) Digital publishing sites

Question 110.
Which of the following is not a characteristics of E-Commerce:
(a) Products cannot be inspected physically before purchase.
(b) Goods are delivered instantly.
(c) Resource focus supply side.
(d) Scope of business is global.
Answer:
(c) Resource focus supply side.

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Science Important Questions Chapter 11 Database Concepts

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 1.
Write the components of the Database management system?
Answer:
There are five major components of the Data base management system. They are

  1. Hardware
  2. Software
  3. Data
  4. Methods
  5. Database Access Language

Question 2.
What is an object model?
Answer:

  1. Object model is to store the data in the form of objects, attributes and methods, classes and Inheritance.
  2. This model handles more complex applications, such as GIS, Engineering design.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 3.
What is the roll of End user?
Answer:

  1. All modem computer Applications, web or mobile, store user data.
  2. The End users are one who store, retrieve, update and delete data.

Question 4.
What is known as EF codd Rules?
Answer:
Database normalization was first proposed by Dr. Edgar F Codd as an integral part of . RDBMS in order to reduce data redundancy and improve data integrity. These rules are known as EF codd mles.

Question 5.
What are unary Relational operations in Relational Algebra?
Answer:
Unary Relational operations are

  • SELECT (σ)
  • PROJECT (Π)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 6.
What are Relational Algebra operations from set theory?
Answer:

  • UNION (∪)
  • INTERSECTION (∩)
  • DIFFERENCE (-)
  • CARTESIAN PRODUCT (×)

Question 7.
What is use of SELECT operation?
Answer:
The SELECT operation used for selecting a subset with tuples according to a given condition.
The general form is σ<sub>c</sub> (R)
R – relation
C – attributes of R<sub>c</sub>

Question 8.
What is a PROJECT?
Answer:

  1. The projection eliminates all attributes of the input relation but those mentioned in the projection list.
  2. The projection method defines a relation that contains a vertical subset of Relation.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 9.
What are types of data model?
Answer:
Types of data model are Hierarchical, Relational, Network, ER and object.

Question 10.
What is Data?
Answer:
Data are raw facts stored in a computer. A data may contain any character, text, word or a number.

Question 11.
What are different types of Relationship?
Answer:
Different types of Relationship are One-to- one, One-to-many, Many-to-one and many- to-many relationship.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 12.
What is main difference for Data and Information?
Answer:

  • Data is unprocessed data, which has no meaning.
  • Information is processed data, organized and formatted.

Question 13.
What is Data Base?
Answer:
A Database is an organized collection of data, generally stored and accessed electronically from a computer system.

Question 14.
What is a advantage for using DBMS?
Answer:

  1. DBMS provides protection and security to the data bases.
  2. It also maintain data consistency in case of multiple users.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 15.
List the components of DBMS.
Answer:

  1. Hardware
  2. Software
  3. Data
  4. Procedures / methods
  5. Database Access Language

Question 16.
What are Advantages of DBMS?
Answer:

  1. Segregation of application program.
  2. Minimal data duplication or Data Redundancy.
  3. Easy retrieval of data using the Query Language.
  4. Reduced development time and maintenance.

Question 17.
Explain the Data model.
Answer:

  1. A data model describes how the data can be represented and accessed from a software after complete implementation.
  2. It is a simple abstraction of complex real world data gathering environment.
  3. The main purpose of data model is to give an idea as how the final system or software will look like after development is completed.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 18.
Write the different types of a Data model?
Answer:
The different types of a Data Model are

  1. Hierarchical Model
  2. Relational Model
  3. Network Database Model
  4. Entity Relationship Model
  5. Object Model

Question 19.
What is the uses of object model?
Answer:

  1. Object model is used in File management system.
  2. It represents real world objects, attributes and behaviours.
  3. It provides a clear modular structure.
  4. It is easy to maintain and modify the existing code.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 20.
Explain components of DBMS.
Answer:
The Database management system can be divided into five major components. They are Hardware, software. Data, Procedure/methods and Data base Access language.

(i) Hardware:
The computer, hard disk, I/O channels for data and any other physical component involved in storage of data.

(ii) Software:
The main component is a program that controls everything.

(iii) Data:
It is that resource for which DBMS is designed. DBMS creation is to store and utilize data.

(iv) Procedure/methods:
They are general instructions to use a database management system such as backups, report generation etc.,

(v) Database Access language:
They are the languages used to write commands to access, insert, update and delete data stored in any database.

Question 21.
Explain Entity Relationship Model. (ER model).
Answer:

  1. ER model is a database model, relationship are created by dividing the object into entity and its characteristics into attributes.
  2. It is very simple and easy to design logical view of data.
  3. The developer can easily understand the system by looking at ER model constructed.
  4. Ellipse represents the attributes, Example D-id, D-name, p-id, P-name.
  5. Attributes describes the characteristics and each entity becomes a major part of the data stored in the database.
  6. Diamond represents the relationship in ER diagrams.
    Eg: Doctor Diagnosis the patient.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 22.
Mention few examples of a database.
Answer:
Dbase, Foxpro, Clipper, Ms Access, MySQL, quick base etc.,

Question 23.
List some examples of RDBMS.
Answer:
SQL server, Oracle, MySQL, Maria DB, SQLite etc.

Question 24.
What is data consistency?
Answer:
On live data, it is being continuously updated and added, maintaining the consistency of data can become a challenge. But DBMS handles it by itself.

Question 25.
What is the difference between Hierarchical and Network data model?
Answer:

Hierarchical model Network data model
In hierarchical mode, a child record has only one parent mode. In a network model, a child may have many parent nodes.
This model represents a one – to – many relationship i.e., parent – child relationship. It represents the data in many – to – many relationship.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 26.
What is normalization?
Answer:

  1. Normalization is the process of minimizing redundancy from the relation or set of relations.
  2. Redundancy in relation may cause insertion, deletion and updation anomalies.
  3. Normal forms are used to eliminate or reduce redundancy in database tables.

Question 27.
What is the difference between Select and Project command?
Answer:

Select

 Project

Select operation is used to select rows from a table that specifies a given logic, which is called as a predicate. Project operation, if the user is interested in selecting the values of a few attributes, rather than selection all attributes of the table.
The select operation is used for selecting a subset with tuples according to a given condition. The projection eliminates all attributes of the input relation but those mentioned in the projection list.
Select just changes cardinality of the result table. Project does change both degree of relation and cardinality.

Question 28.
What is the role of DBA?
Answer:

  1. Database Administrator (DBA) is the one who manages the complete Database Management system.
  2. DBA takes care of the Software Installation and Maintenance, Data Extraction, Transformation and Loading.
  3. DBA another important role for Database backup and Recovery, specialized data handing and security.
  4. DBA setting up employee access i.e., Authentication, capacity planning, performance monitoring, database tuning and Trouble shooting.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 29.
Explain Cartesian Product with a suitable example.
Answer:

(i) The Cartesian product, also referred to as cross-join, returns all the rows in all the tables listed in the query.
(ii) Cross product is a way combining two relations. The resulting relation contains, both relation being combined.
(iii) Eg: A × B means A times B, where the relation A and B have different attributes. This types of operation is helpful to merge columns from two relations.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 2

Question 30.
Explain Object Model with example.
Answer:
(i) Object model stores the data in the form of objects, attributes and methods, classes and inheritance.
(ii) It provides a clear modular structure it is easy to maintain and modify the existing code.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 3

(iii) Circle has the attribute radius.
(iv) Rectangle has the attribute length and breadth.
(v) Triangle has the attributes base and height.
(vi) The objects circle, Rectangle and Triangle inherit from the object shape.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 31.
Write a note on different types of DBMS users.
Answer:

  1. Different Types of database users in DBMS, this differentiation is made according to the interaction of users to the database.
  2. As its name shows, application programmers are the one who writes application programs that uses the database.
  3. They interact with DBMS through DML (Data manipulation language) calls.
  4. Different types of database users are Application programmers. End users, casual users, DBA, system analyst etc.,

Question 32.
Explain the different types of data model.
Answer:
The different types of data model are
(i) Hierarchical model
(ii) Relational model
(iii) Network Database model
(iv) Entity Relationship model
(v) Object model

(i) Hierarchical model:
This model represents a one-to-many relationship i.e., parent-child relationship.
This model is mainly used in IBM main frame computers.

(ii) Relational model:
The basic structure of data in relational model is tables. All the information’s related to a particular type is stored in rows of that table.Hence tables are also known as relations in a relational model.

(iii) Network Database model:
In a Network model, a child may have many parent nodes. It represents the data in many-to-many relationships.
This model is easier and faster to access the data.

(iv) Entity Relationship model (ER mode):
In this model, relationship are created by dividing the object into entity and its characteristics into attributes.
Eg: Rectangle represents the entities, Doctor and patient.

(v) Object model: This model stores the data in the form of objects, attributes and methods, classes and inheritance.
This model handles more complex applications, such as Geographic information system (GIS), scientific experiments, engineering design and manufacturing.
Eg: Rectangle has the attributes length and breadth.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 33.
Explain the different types of relationship mapping.
Answer:
The different types of relationship map used in a database are:
(i) One – to – One Relationship
(ii) One – to – Many Relationship
(iii) Many – to – One Relationship
(iv) Many – to – Many Relationship

(i) One – to – One Relationship:
One entity is related with only one other entity.
One row in a table is linked with only one row in another table and vice versa.
Eg: A student can have only one exam number.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 4

(ii) One – to – Many Relationship:
One entity is related to many other entities.
Eg: Department has many staff members.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 5

(iii) Many – to – One Relationship:
Many entities can be related with only one in the other entity.
Eg: Many staff members working in one department.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 6

(iv) Many – to – Many Relationship:
A many – to – many relationship occurs when multiple records in a table are associated with multiple records in another table.
Eg: Many books in a Library are issued to many students.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 7

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 34.
Differentiate DBMS and RDBMS.
Answer:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 8

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 9

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 35.
Explain the different operators in Relational algebra with suitable examples.
Answer:
Relational Algebra is a procedural query language used to query the database tables using SQL.
Relational Algebra is divided into various groups.
Unary Relational operations
SELECT (symbol :σ)
PROJECT (symbol :Π)

SELECT (σ):
The SELECT operation is used for selecting a subset with tuples according to a given condition.
The general form ac (R) with a relation R and a condition C on the attributes of R.
Eg:

Student No.NameClass
1001Raju12
1002Vasanth11
1003Murugan 12

σ = 12

Student No.Name

 Class

1001Raju

12

1003

Murugan

12

PROJECT(Π):
The projection eliminates all attributes of the input relation but those mentioned in the projection list.
Eg:
ΠClass (student)
Class
12
11
12
Relational Algebra operations from set theory
• UNION (∪)
• INTERSECTION (∩)
• DIFFERENCE (-)
• CARTESIAN PRODUCT (×)

UNOIN:
Set A union Set B would be expressed as A∪B
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 10

Result:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 11

SET DIFFERENCE:
A-B is a relation which includes all tuples that are in A but not in B.
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 12

INTERSECTION:
A relation consisting of a set of all tuple that are in both in A and B.
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 13

CARTESIAN PRODUCT:
A×B means A times B, where the relation A and B have different attributes.
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 14

Table A = 3
Table B = 2
Table A × B = 6

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 36.
Explain the characteristics of DBMS.
Answer:
(i) Data stored into Tables:
Data is never directly stored into the database. Data is stored into tables, created inside the database. DBMS also allows to have relationship between tables which makes the data more meaningful and connected.

(ii) Reduced Redundancy:
In the modem world hard drives are very cheap, but earlier when hard drives were too expensive, unnecessary repetition of data in database was a big problem But DBMS follows Normalisation which divides the data in such a way that repetition is minimum.

(iii) Data Consistency:
On live data, it is being continuously updated and added, maintaining the consistency of data can become a challenge.But DBMS handles it by itself.

(iv) Support Multiple user and Concurrent Access:
DBMS allows multiple users to work on it (update, insert, delete data) at the same time and still manages to maintain the data consistency.

(v) Query Language:
DBMS provides users with a simple query language, using which data can be easily fetched, inserted, deleted and updated in a database.

(vi) Security:
The DBMS’also takes care of the security of data, protecting the data from unauthorized access. In a typical DBMS, we can create user accounts with different access permissions, using which we can easily secure our data by restricting user access.

(vii) DBMS Supports Transactions:
It allows us to better handle and manage data integrity in real world applications where multi-threading is extensively used.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Choose the best answer:

Question 1.
_________ is an organized collection of data.
(a) Database
(b) Record
(c) File
(d) Data
Answer:
(a) Database

Question 2.
Which software that allows us to create, define and manipulate database.
(a) DBMS
(b) OS
(c) Spreadsheet
(d) word
Answer:
(a) DBMS

Question 3.
Which is maintaining the consistency of data can become a challenge when it live data is being continuously updated and added?
(a) Reduced Redundancy
(b) Data consistency
(c) Concurrent Access
(d) DBMS Supports
Answer:
(b) Data consistency

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 4.
Which is called the entire collection of related data in one Table?
(a) Record
(b) File
(c) Field
(d) database
Answer:
(b) File

Question 5.
Each row in a Table represents a:
(a) Table
(b) File
(c) record
(d) field
Answer:
(c) record

Question 6.
Each Table column represents a:
(a) Table
(b) File
(c) record
(d) field
Answer:
(d) field

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 7.
A Table is known as:
(a) Relation
(b) Tuple
(c) Attribute
(d) Model
Answer:
(a) Relation

Question 8.
A Row is known as:
(a) Relation
(b) Tuple
(c) Attribute
(d) Model
Answer:
(b) Tuple

Question 9.
A column is known as:
(a) Relation
(b) Tuple
(c) Attribute
(d) Model
Answer:
(c) Attribute

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 10.
Who was developed Hierarchical model system?
(a) IBM
(b) WIPRO
(c) HCL
(d) MICRO SOFT
Answer:
(a) IBM

Question 11.
Which model is easier and faster to access the data?
(a) ER Model
(b) Network model
(c) Relational model
(d) Hierarchical model
Answer:
(b) Network model

Question 12.
Who manages the complete database management system?
(a) Database Administrator (DBA)
(b) Programmer
(c) System model
(d) Operation Engineer
Answer:
(a) Database Administrator (DBA)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 13.
Match the following:

(i) Hard ware (A) Program
(ii) Soft ware (B) Backups
(iii) Data (C) Component
(iv) Method (D) Fact

(a) (i) – C, (ii) – A, (iii) – D, (iv) – B
(b) (i) – C, (ii) – D, (iii) – B, (iv) – A
(c) (i) – D, (ii) – B, (iii) – A, (iv) – C
(d) (i) – D, (ii) – C, (iii) – A, (iv) – B’
Answer:
(a) (i) – C, (ii) – A, (iii) – D, (iv) – B

Question 14.
Match the following:

(i) Table (A) Tuple
(ii) Row (B) Relation
(iii) Column (C) Table
(iv) File (D) Attribute

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C
(c) (i) – C, (ii) – B, (iii) – D, (iv) – A
(d) (i) – C, (ii) – A, (iii) – D, (iv) – B
Answer:
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 15.
Match the following:

(i) Hierarchical (A) Relation Key
(ii) Relational (B) Many – to – many
(iii) Network (C) Modular structure
(iv) Object (D) One – to – many

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – D, (ii) – B, (iii) – C, (iv) – A
(c) (i) – B, (ii) – C, (iii) – A, (iv) – D
(d) (i) – B, (ii) – D, (iii) – A, (iv) – C
Answer:
(a) (i) – D, (ii) – A, (iii) – B, (iv) – C

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 16.
Match the following:

(i) Hierarchical (A) Relation Key
(ii) Relational (B) Many – to – many
(iii) Network (C) Modular structure
(iv) Object (D) One – to – many

(a) (i) – B, (ii) – D, (iii) – A, (iv) – C
(b) (i) – B, (ii) – C, (iii) – A, (iv) – D
(c) (i) – C, (ii) – B, (iii) – D, (iv) – A
(d) (i) – C, (ii) – A, ( iii) – D, (iv) – B
Answer:
(d) (i) – C, (ii) – A, ( iii) – D, (iv) – B

Question 17.
Match the following:

(i) SELECT (A) π
(ii) PROJECT (B) ×
(iii) UNION (C) σ
(iv) CARTESIAN PRODUCT (D) ∪

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – D, (iii) – A, (iv) – C
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B
(d) (i) – D, (ii) – A, (iii) – B, (iv) – C
Answer:
(a) (i) – B, (ii) – C, (iii) – D, (iv) – A

Question 18.
Choose the incorrect pair:

(a) data fact
(b) database C++
(c) RDBMS MySQL
(d) DBMS FoxPro

Answer:
(b)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 19.
Choose the incorrect pair:

Column I

 Column II

(a) Table Tuple
(b) File Table
(c) Column Attribute
(d) Row Record

Answer:
(a)

Question 20.
Choose the incorrect pair:
(a) IBM – Hierarchical
(b) Network – Many
(c) ER-Model – EF codd
(d) GIS – Object model
Answer:
(c) ER-Model – EF codd

Question 21.
Choose the correct pair:
(a) DBA – Database Agent
(b) End user – Programmer
(c) Chen – ER model
(d) SQuestion lite – Compiler
Answer:
(c) Chen – ER model

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 22.
Choose the correct pair:
(a) DBMS – Multiple user
(b) Duplication – Segregation
(c) Redundancy – Program
(d) Query – Application
Answer:
(a) DBMS – Multiple user

Question 23.
Choose the incorrect statement.
(a) A database is an organized collection of data.
(b) The term database is also used to refer to any of the DBMS.
(c) DBMS allows only single user to work on and access it.
(d) Dot is never directly stored into the database.
Answer:
(c) DBMS allows only single user to work on and access it.

Question 24.
Choose the incorrect statement.
(a) The data are fact stored in a computer.
(b) A day may contain any number and special character.
(c) Information is formatted data.
(d) Database also maintain data consistency in case multiple users.
Answer:
(b) A day may contain any number and special character.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 25.
Choose the incorrect statement.
(a) The computer, hard disk and any other physical component involved in storage of data.
(b) The main component is software that control I/O devices storage and everything.
(c) An example of DBMS is C++
(d) Data is that resource for which DBMS is designed.
Answer:
(c) An example of DBMS is C++

Question 26.
Choose the correct statement.
(a) Each row in a table represents a record.
(b) A row is known as a Relation.
(c) A Table is known as a Tuple.
(d) A column is known as a file.
Answer:
(a) Each row in a table represents a record.

Question 27.
Choose the correct statement.
(a) Hierarchical model was developed by Google.
(b) In Hierarchical model, data is represented as a simple tree like structure form.
(c) Hierarchical model represents a many – to – many relationship.
(d) Hierarchical model is mainly used single user operational system.
Answer:
(b) In Hierarchical model, data is represented as a simple tree like structure form.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 28.
Assertion (A):
A basic structure of data in relational model is tables.
Reason (R):
All the information related to a particular type is stored in rows of that table.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(a) Both A and R are True and A is the correct explanation for R.

Question 29.
Assertion (A):
In a Network model, a child may have many parent nodes.
Reason (R):
It represents the data in many -to – one relationship.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(c) A is True but R is False.

Question 30.
Assertion (A):
Object model stores the data in the form of objects, attributes and methods, classes and inheritance.
Reason (R):
DBA is the one who manages the complete database management system.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True
Answer:
(b) Both A and R are True but A is not the correct explanation for R.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 31.
Assertion (A):
In One – to – one Relationship, on entity is related with many other entity.
Reason (R):
One row in a table is linked with many rows.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(d) A is False but R is True.

Question 32.
Assertion (A):
Relational Algebra was used for modeling the data stored in relational databases and defining queries on it.
Reason (R):
Relational Algebra is a procedural query language used to query the database tables using SQL.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(a) Both A and R are True and A is the correct explanation for R.

Question 33.
Pick the odd one out.
(a) dBase
(b) FoxPro
(c) Clipper
(d) UNIX
Answer:
(d) UNIX

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 34.
Pick the odd one out.
(a) RELATION
(b) MySQL
(c) TUPLE
(d) ATTRIBUTE
Answer:
(b) MySQL

Question 35.
Pick the odd one out.
(a) Object
(b) Methods
(c) DBA
(d) Classes
Answer:
(c) DBA

Question 36.
Which of the following is an organized collection of data?
(a) Database
(b) Spreadsheet
(c) Word processor
(d) Worksheet
Answer:
(a) Database

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 37.
Which of the following characteristics of DBMS is challenged one?
(a) Data redundancy
(b) Data security
(c) Data consistency
(d) Data integrity
Answer:
(c) Data consistency

Question 38.
How many components are there in DBMS?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(d) 5

Question 39.
How many types of data model are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(d) 5

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 40.
What is the basic structure of data in relational model?
(a) Rows
(b) Tables
(c) Columns
(d) Fields
Answer:
(b) Tables

Question 41.
Which year ER – model was developed?
(a) 1972
(b) 1974
(c) 1976
(d) 1978
Answer:
(c) 1976

Question 42.
Expand GIS:
(a) Geographic Information System
(b) Global Information System
(c) Global Information Service
(d) Geographic Information Service
Answer:
(a) Geographic Information System

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 43.
Expand DBA:
(a) Data Base Analyst
(b) Data Bound Analyst
(c) Data Base Administrators
(d) Data Base Advisor
Answer:
(c) Data Base Administrators

Question 44.
How many types of relationships used in a database?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 45.
Expand SQL:
(a) Structured Query Language
(b) Standard Query Language
(c) Structured Quick Learner
(d) Standard Quick Learner
Answer:
(a) Structured Query Language

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 46.
Which of the following data model work with Geographic Information System?
(a) Class
(b) Object
(c) Database
(d) Data
Answer:
(b) Object

Question 47.
How many types of users are there in DBMS?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 48.
Who is care of the security in DBMS?
(a) DBA
(b) System Analyst
(c) Program
(d) Data Analyst
Answer:
(a) DBA

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 49.
Expand RDBMS:
(a) Relational Data Base Management System
(b) Redundancy Data Base Management System
(c) Relational Data Base Multiple System
(d) Relative Data Base Management Service.
Answer:
(a) Relational Data Base Management System

Question 50.
Which symbol represent unary relational operation for SELECT?
(a) σ
(b) π
(c) +
(d) –
Answer:
(a) σ

Question 51.
Which symbol represent unary relational opration for PROJECT?
(a) σ
(b) π
(c) +
(d) –
Answer:
(c) +

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 52.
What is the main purpose of data model?
(a) Idea
(b) Data storage
(c) Data Access
(d) Information
Answer:
(a) Idea

Question 53.
Which data model is represented as a simple tree like structure form?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) Object
Answer:
(b) Hierarchical

Question 54.
Which key is an attribute that uniquely identifies a particular tuples?
(a) Relation
(b) Entity
(c) Primary
(d) object
Answer:
(a) Relation

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 55.
Which model represent a child has only one parent?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) object
Answer:
(b) Hierarchical

Question 56.
Which model represent a child may have many parent?
(a) Relational
(b) Hierarchical
(c) Network
(d) Object
Answer:
(c) Network

Question 57.
Which model represent Doctor and patient?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) Object
Answer:
(c) Entity Relationship

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 58.
Which model is easy to maintain and modify the existing code?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) Object
Answer:
(d) Object

Question 59.
Who is involved in developing and designing the parts of DBMS?
(a) Application Programmer
(b) Software Developer
(c) Computer Operator
(d) (a) or (b)
Answer:
(d) (a) or (b)

Question 60.
Which type of relationship for a student can have only one exam number?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(a) one-to-one

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 61.
Which type of relationship for a school has many students?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(b) one-to-many

Question 62.
Which type of relationship for the teachers are working in one school
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(c) many-to-one

Question 63.
Which type of relationship for students can register many courses?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(d) many-to-many

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 64.
Which operation is used for selAnswer:ecting a subset with tuples according to a given condition?
(a) SELECT
(b) PROJECT
(c) UNION
(d) CARTESIAN PRODUCT
Answer:
(d) CARTESIAN PRODUCT

Question 65.
Which method eliminates all attributes of the input relation but those mentioned in the projection list?
(a) PROJECT ON
(b) SELECT
(c) UNION 4
(d) CARTESIAN PRODUCT
Answer:
(a) PROJECT ON

Question 66.
Which method defines a relation that contains a vertical subset of Relation?
(a) PROJECTION
(b) SELECT
(c) UNION
(d) CARTESIAN PRODUCT
Answer:
(a) PROJECTION

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 67.
Which Relational algebra operation is eliminates duplicates?
(a) DIFFERENCE (-)
(b) UNION (∪)
(c) INTERSECTION (∩)
(d) PRODUCT (×)
Answer:
(b) UNION (∪)

Question 68.
Which Relational algebra operation that includes all tuples that are in A but not in B?
(a) UNION (∪)
(b) DIFFERENCE (-)
(c) INTERSECTION (∩)
(d) PRODUCT (×)
Answer:
(b) DIFFERENCE (-)

Question 69.
Which type of operation is helpful to merge column from two relations?
(a) UNION (∪)
(b) DIFFERENCE (-)
(c) INTERSECTION (∩)
(d) PRODUCT (×)
Answer:
(d) PRODUCT (×)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 70.
What is the acronym of DBMS?
(a) DataBase Management Symbol
(b) Database Managing System
(c) DataBase Management System
(d) DataBasic Management System
Answer:
(c) DataBase Management System

Question 71.
A table is known as:
(a) tuple
(b) attribute
(c) relation
(d) identity
Answer:
(c) relation

Question 72.
Which database model represents parent- child relationship?
(a) Relational
(b) Network
(c) Hierarchical
(d) Object
Answer:
(c) Hierarchical

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 73.
Relational database model was first proposed by:
(a) E F Codd
(b) EE Codd
(c) E F Cadd
(d) E F Codder
Answer:
(a) E F Codd

Question 74.
What type of relationship does hierarchical model represents?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(b) one-to-many

Question 75.
Who is called Father of Relational Database from the following?
(a) Chris Date
(b) Hugh Darween
(c) Edgar Frank Codd
(d) Edgar Frank Cadd
Answer:
(c) Edgar Frank Codd

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 76.
Which of the following is an RDBMS?
(a) Dbase
(b) Foxpro
(c) Microsoft Access
(d) SQLite
Answer:
(d) SQLite

Question 77.
What symbol is used for SELECT statement?
(a) σ
(b) Π
(c) X
(d) Ω
Answer:
(a) σ

Question 78.
A tuple is also known as:
(a) table
(b) row
(c) attribute
(d) field
Answer:
(b) row

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 79.
Who developed ER model?
(a) Chen
(b) EF Codd
(c) Chend
(d) Chand
Answer:
(a) Chen

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 1.
What is known as Nested list?
Answer:
A list contains within another list as an element. This type of list is known as Nested list.

Question 2.
What is known as index value in python?
Answer:
(i) In python, index value is an integer number which can be positive or negative.
(ii) Positive value of index counts from the beginning of the list and negative value means counting backward from end of the list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 3.
What is the output?
Answer:
>>>marks = [10, 20, 30, 40]
>>> marks 1 = [100, 200, 300,400]
>>> print (marks [0])
>>> print (marks 1 [-1])
Output:
10
400

Question 4.
What is the output?
Answer:
>>> Name = [‘Anand’, ‘Arul’, ‘Nithya’,
‘Vani’]
>>> print (Name [1])
>>> print (Name [-2])
Output:
Arul
Nithya

Question 5.
What is the use of index from and index to?
Answer:

  • Index from is the beginning index of the range.
  • Index to is the upper limit of the range which is excluded in the range.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 6.
What is difference between append ( ) and extend ( )?
Answer:

  • append ( ) function is used to add single element in a list.
  • extend ( ) function is used to add more than one element to an existing list.

Question 7.
What is difference between append ( ) and insert ()?
Answer:

  • Append () function is used to add more elements, but it includes elements at the end of list.
  • Insert ( ) function is used to insert an element at any position of a list.

Question 8.
What is the use of pop ( ) and clear ( ) function?
Answer:
pop ( ) function deletes and returns the last element of a list if the index is not given.
Clear ( ) function is used to delete all the elements in list, it delete only the elements and retains the list.

Question 9.
What is the output?
Answer:
for x in range (3, 12, 3)
print, (x)
Output:
3
6
9

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 10.
What is Tuples in python?
Answer:

  • Tuples is similar to list, tuples consists of a number of values separated by comma and enclosed within parenthesis.
  • In a tuple values cannot be changed in the lists.

Question 11.
What is tuple () function?
Answer:
The tuple () function is used to create Tuples from a list. When you create a tuple, from a list, the elements should be enclosed within square brackets.

Question 12. What is called singleton tuple?
Answer:
(i) While creating a tuple with a single element, add a comma (,) at the end of the element.
(ii) In the absence of a comma, python will consider the element as an ordinary data type. Creating a Tuple with one element is called singleton Tuple.

Question 13.
What is Tuple assignment?
Answer:

  • Tuple assignment is a powerful feature in python.
  • It allows a tuple variable on the left of the assignment operator to be assigned to the values on the right side of the assignment operator.
  • Each value is assigned to its respective variable.

Question 14.
How can you creating a set?
Answer:

  • A set is created by placing all the element separated by comma within pair of curly brackets.
  • The set ( ) function can also used to create sets in python.

Question 15.
What are the set operator supports in python?
Answer:
There are four types of set operations supports in python.

They are union (|), Intersection (&), Difference(-) and symmetric difference (A).

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 16.
What is known as Dictionaries?
Answer:
A dictionary is a mixed collection of elements. The keys in a python dictionary is separated by a colon (:) while the commas work as a separator for the elements. The key value pairs are enclosed with curly braces {}.

Question 17.
What is output?
Answer:
Diet = {x:3*x for x in range (2,3)}
print (Diet)
Output:
{2:9,3:9}

Question 18.
What is mean by modification of a value in dictionary?
Answer:
(i) Modification of a value in dictionary is very similar as adding elements.
(ii) When you assign a value to a key, it will simply overwrite the old value.

Question 19.
What is output?
Answer:
Marks = {10, 23, 41, 75}
i=-1
while i> = -4:
print (marks[i])
i = i + -1
Output:
75
41
23
10

Question 20.
What is output?
Answer:
>>>Name = [“Arun”, “Senthil”, “Kumar”]
>>> len(Name)
Output:
3

Question 21.
What is output?
Answer:
for x in range (2,11,2)
print (x)
Output:
2
4
6
8
10

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 22.
What is output?
Answer:
>>> sQuestion = [x**2 for x in range (1,6)]
>>> print (sq)
Output:
[1, 4, 9, 16, 25]

Question 23.
What is output?
Answer:
>> (x, y, z, p) = (2**2, 5/3+4,15%2, 34>65)
>>> print (x,y,z,p)
Output:
45.666666666666667 1 False

Question 24.
How can you create a list in python?
Answer:
Python, a list is simply created by using square bracket.
The element of list should be specified within square brackets.
The syntax is variable = [element-1, element-2, element-3 element -n]
Eg: class = [“RAJA”, “RANI”, 50,100]

Question 25.
Write a python program to print reverse indexing.
Answer:
Marks = [5, 25, 10, 50, 35]
i = -1
while i >= -5
print (marks [i])
i=i+-1
Output:
35
50
10
25
5

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 26.
Write a short note on List Length in python?
Answer:
The len ( ) function in python is used to find the length of a list. The len ( ) function is used to set the upper limit in a loop to read all the elements of a list. If a list contains another list as an element, len ( ) function returns that inner list as a single element.
Eg; . s .
>>>Item = [“soap”, “pen”, “INK”]
>>>len (Item)
Output is 3.

Question 27.
Write short note on list comprehensions.
Answer:
List comprehensions is a simplest way of creating sequence of elements that satisfy a certain condition.
The syntax is List = [expression for variable in range]
Eg:
>>>cubes = [x**3 for x in range (1,6)]
>>>print(cubes)
Output:
1 8 16 32 64
In this example x**3 in the expression is evaluated each time it is iterated. This is the shortcut method of generating series of values.

Question 28.
Write a program to define a list of cities that are metro in India or not.
Answer:
# program for metro city or not
city = [“CHENNAI”, “DELHI”, “MUMBAI”, “KOLKATTA”]
Metro_city = input “Type name of the city”) if metro_city in city:
print (metro_city, “is the metro city in India”) else: ‘
print (metro_city,“is no the *metro city in India”)

Question 29.
Write a program to find the area and circumference of the circle using function with tuple assignment.
Answer:
pi = 22/7
def circle (r):
return (pi * r*r, 2*pi*r)
radius = float (input (“Type radius”))
(area, circum) = circle (radius)
print (“Area of the circle =”, area)
print (“Circumference of the circle-’, circum)

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 30.
Write a program to swap two values using tuples assignment.
Answer:
a = int(input(“Enter value of A:”))
b = int (input(“Enter value of B:”))
print(“Value of A =”, a, “\n Value of B=”,b) (a,b) = (b,a)
print(“Value of A =”,a,”\n value of B =”,b)
Output:
Enter value of A: 54
Enter value of B: 38
Value of A= 54
Value of B = 38
Value of A= 38
Value of B = 54

Question 31.
Write a program to print positive numbers from the list.
Answer:
Numbers = (5,-8,6,8,-4, 3, 1)
Positive = ( )
for i in Numbers:
if i > 0:
positive +=(i,)
print(“Positive Numbers: “, Positive)
Output:
Positive Numbers: (5, 6, 8, 3, 1)

Question 32.
What is output?
Answer:
set_A = {‘A’, 2,4/D’}
set_ B = {‘A’/B’/C’/D’}
print (set A A set B)
output:
{2, 4,’B’, C’}

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 33.
Explain copy (), count (), sum () functions.
Answer:
(i) Copy ( ) – is used returns the copy of the list.
The syntax is list.copy ()
Eg: orilist = [10,20, 30]
x = orilist. copy ()
print (x)
Output [10,20, 30]

(ii) Count () – is used to returns the number of similar elements present in last.
The syntax is list count (value)
Eg: orilist = [10, 20, 30]
x = orilist.count (30)
Output 2

(iii) Sum ( ) – is used returns the sum of values in a list
The syntax is sum (list)
Eg:
orilist = [10, 20, 30]
print (sum(orilist))
Output 60

Question 34.
Write a program that create a list of numbers upto 50 that are divisible by 5.
Answer:
# program for divisible by 5
divby5 = [ ]
for i in range (51):
if (i % 5 =0):
divby5.append (i)
print (divby5)
output [0, 5, 10, 15, 20, 25, 30, 35, 40, 45, 50]

Question 35.
Write a program to read six subject marks and print the total marks.
Answer:
# program for six subjects with Total marks
marks = [ ]
subjects = [“Tamil”, “English”, “physics”, “chemistry”, “maths”, “comp.Science”]
for i in range (6):
m = int (input(“Type mark”))
marks.append (m)
for j in range (len(marks)):
print (“{}.{} mark ={}”. format (j1+, subjects!]], marks[j]))
print (“Total marks”, sum (marks))

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 36.
Write a program to delete all the even numbers from the list.
Answer:
# program for delete all the even numbers
Num=[ ]
for x in range (1, 11):
Num.append (x)
print (“the numbers from 1 to 10 =”, Num)
for index, i in enumerate (Num):
if (i %2 = = 0):
delNum [index]
print (“The list after deletingeven numbers”,
Num)

Question 37.
Write a program that generate a set of prime numbers another set of even numbers.
Answer:
Demonstrate the result of union, intersection, difference and symmetric difference operations.
even=set([x*2 for x in range(l, 11)])
primes=set( )
for i in range(2, 20):
j=2
f=0
while j<i/2:
if i%j==0
f=1
j+=1
if f==0
primes.add(i)
print(“Even Numbers: even)
print(“Prime Numbers: “, primes)
print(“Union: even.union(primes))
print(“Intersection:”, even. intersection(primes))
print(“Difference: even.difference(primes))
print(“Symmetric Difference: even.
symmetric_difference(primes))
Output:
Even Numbers: {2, 4, 6, 8, 10, 12, 14, 16, 18, 20}
Prime Numbers: {2, 3, 4, 5, 7, 11, 13, 17, 19}
Union: {2, 3, 4, 5, 6, 7, 8, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20}
Intersection: {2, 4}
Difference: {6, 8,10, 12, 14, 16, 18, 20}
Symmetric Difference: {3, 5, 6, 7, 8, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20}

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 38.
What is List in Python?
Answer:
List is an ordered collection of values enclosed within square brackets [ ]. A list in python is known as a sequence data types like string. Each value of a list is called as element. It can be of any type such as numbers, characters, strings and even the nested lists.

Question 39.
How will you access the list elements in reverse order?
Answer:
Python enables reverse or negative indexing for the list elements.The python sets -1 as the index value for the last element in list and -2 for the preceding element and so on. This is called as Reverse order.

Question 40.
What will be the value of x in following python code?
List1=[2,4,6[l,3,5]] x=len( List1)
Answer:
The output will be printed as
4
Note: Inner list considered as single element in python.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 41.
Differentiate del with remove( ) function of List.
Answer:

Del

remove ()

del statement is used to delete known element.remove () function is used to remove elements of a list if its index is unknown.
The del statement can also be used to delete entire list.The remove () function can also be used to delete one or

more elements.

Question 42.
Write the syntax of creating a Tuple with n number of elements.
Answer:
Tuple_Name = tuple ([list of element])
Eg: Prime_Num = tuple ([2, 3, 5, 7, 11])

Question 6.
What is set in Python?
Answer:
A set is created by placing all the elements separated by comma within a pair of curly brackets.
The set ( ) function can also used to create sets in python.
Eg: >>>s = {1, 2, 3, ‘M’, 56, 100}

Question 43.
What are the advantages of Tuples over a list?
Answer:
(i) The elements of a list are changeable (mutable) whereas the elements of a tuple are unchangeable (immutable), this is the key difference between tuples and list.
(ii) The elements of a list are enclosed within square brackets. But, the elements of a tuple are enclosed by paranthesis.
(iii) Iterating tuples is faster than list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 44.
Write a shot note about sort( ).
Answer:
Sort( ) function sorts the elements in list.
The syntax is
List.sort(reverse= True|False, key = my func)
• Both arguments are optional.
• Ascending is default.
• If reverse is set as True, list sorting is in descending order.

Question 45.
What will be the output of the following code?
Answer:
list = [2**x for x in range(5)]
print(list)
1 2 4 8 16

Question 46.
Explain the difference between del( ) and clear( ) in dictionary with an example.
Answer:

Del

clear ( )

Del statement is used to delete known element.The Clear () function is used to delete all the elements in a dictionary.
The del statement can also be used to delete entire list.It deletes only the elements and retains the list.
Eg:>>> del name [1] deletes an element whose index value is 1.Eg;»>Name_list. clear () This example removes only the elements and retain the list in Name_list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 47.
List out the set operations supported by python.
Answer:
In python is supports the set operations such as union, intersection, difference and symmetric difference.
(i) Union – It includes all element from two or more sets. The operator is used to union of two sets.
(ii) Intersection – It includes the common elements in two sets. The operator & is used to intersect two sets in python.
(iii) Difference – It includes all elements that are in first set (set A) but not in the second set (set B). The – (minus) operator is used to difference set operation in python.
(iv) Symmetric difference – It includes all the elements that are in two sets (set A and B) but not the one that are common to two sets. The caret (A) operator is used to symmetric difference set operation in python.

Question 48.
What are the difference between List and Dictionary?
Answer:

List

 Dictionary

List is an ordered set of elements. Dictionary is a data structure that is used for matching one element with another.
The index value can be used to access a particular element. In dictionary key represents index.
Lists are used to look up a value. Dictionary is used to take one value and look up another value.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 49.
What the different ways to insert an element in a list. Explain with suitable example.
Answer:
In python, to insert an element in a list for different ways, that are append ( ), extend ( ) and insert ( ) functions.

(i) append ( ) – is used to add a single element. The syntax is
List.append (element to be added)
Eg:
>>> Mark list = [90, 95, 98]
>>> Marklist.append (99)
>>> Print (marklist)
The output is [90, 95, 98, 99]
In this example, marklist is created with three elements.
Through >>>marklist.append (99) is that additional value (99) is included with the existing list as last element.

(ii) extend ( ) is used to add more than one element to an existing list.
The syntax is List.extend ([elements to be added])
Eg:
>>>Namelist.extend ([50,60,70])
>>> print (Namelist)
The output is [90, 95, 98, 99, 50, 60, 70]
In this example, extend ( ) function is used to include multiple elements, it shows all the elements of list after the inclusion of additional elements.

(iii) Insert () – is used to insert an element at any position of a list.
The syntax is:
List.insert (position index, element)
Eg:
>>>Namelist = [50, 60, ‘RAJA’, 4OUNA’, ‘YUVA’] *
>>>Namelist.insert (4, ‘SEKAR’)
>>> Print(Namelist)
The output is
[50, 60, ‘RAJA’, ‘GUNA’, ‘SEKAR’, ‘YUVA’]
In this example insert ( ) function a new element ‘sekar’ at the index value.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 50.
What is the purpose of range( )? Explain with an example.
Answer:
The range () is a function used to generate a series of values in python.
Using range () function, you can create list with series of values. The range () function has three arguments.
The syntax is
range (start value, end value, step value) Where
start value – beginning value of series. Zero is the default beginning value.
end value – upper limit of series. Python takes the ending value as upper limit -1.
step value – It is optional argument, which is used to generate different interval of values. Eg:
for m in range (5, 50, 5)
print (m)
The output will be printed as 5
10
15 „
20
25
30
35
40
45
In this example, start value 5 and end value is 50 with step size is 5, so it will be printed 5, 10, 15….

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 51.
What is nested tuple? Explain with an example.
Answer:
(i) A tuple can be defined inside another tuple is called Nested tuple.
(ii) In a nested tuple, each tuple is considered as an element.
(iii) The for loop will be useful to access all the elements in a nested tuple.
(iv All the functions used in list can be applicable even for tuples.
(v) Tuple is similar to list, values in a list can be changed but not in a tuple.
Eg:
Rankers = ((“ RAJA”, “I”), (“RANI”, “II”), (“LATHA”, “HI”), (“MANI”, “IV”))
for m in Rankers:
print (m)
The output will be printed as
(“RAJA”, “I”)
(“RANI”, “II”)
(“LATHA”, “III”)
(“MANI”, “IV”)

Question 52.
Explain the different set operations supported by python with suitable example.
Answer:
The python is supports the set operations such as union, intersection, difference and symmetric difference.

(i) Union:
It includes all elements from two or more sets.
The operator | is used to union of two sets. The function union ( ) is also used to join two sets in python.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 1

Eg:
set_A={ 10,20}
set_B={‘M’,‘N’}
U set = set _A | set_B
print (U_set)
Output
{10,20,‘M’,‘N’}

(ii) Intersection:
It includes the common elements in two sets.
The operator & is used to intersect two sets in python.
The function intersection ( ) is also used to intersect two sets on python.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 2

Eg:
set_A={5,10, ‘Y’}
set_B={‘X’,‘Y’}
print (set_A&set_B)
Output:
{‘Y’}

(iii) Difference:
It includes all elements that are in first set (set A) but not in the second set (set B)
The minus (-) operator is used to difference set operation. The function difference () is used to difference operation.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 3

Eg:
set_A={‘A’,2,4,’D’}
set_B={‘A\ ‘B\ ‘C’, ‘D’}
print (set_A-set_B}
Output:
{2,4}

(iv) Symmetric difference:
It includes all the elements that are in two sets (set A and B) but not the one that are common to two sets.
The caret (^) operator is used to symmetric difference set operation. The function symmetric difference () is also used to do the same operation.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 4

Eg:
set_A= {‘ A’ ,2,4, ‘ D ’}
print (set_A A set_B)
output:
{2,4,‘B’, ‘C’}

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 53.
Write a program to remove duplicates from a list.
Answer:
# program to remove duplicates from a list,
n = [10,20,30,20,10,50,60,40,80,50,40]
dupnumber = set ()
uniq_number=[ ]
for x in n:
if x not in dupnumber:
uniq_number.append (x)
dup number.add (x)
print (dup number)

Question 54.
Write a program that prints the maximum value in a Tuple.
Answer:
# program that prints maximum value in tuple.
tuple l,tuple2 = (‘TAMIL’, ‘ENGLISH’,’ ‘MATHEMATICS’, ‘COMPUTER SCIENCE’), (256, 500, 2720)
print (“The maximum value element”, max (tuple 1))
print (“The maximum value element”, max (tuple2))
The output is
The maximum value element COMPUTER SCIENCE
The maximum value element 2720.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 55.
Write a program that finds the sum of all the numbers in a Tuples using while loop.
Answer:
# program for sum of all the numbers in tuples using while loop.
n= int (input (“Type maximum number”))
sum = 0
while (n>0):
sum+=n
n-=1
print (“The sum is”, sum)

Question 56.
Write a program that finds sum of all even numbers in a list.
Answer:
# program for sum of all even numbers in a list
m = int (input (“Type the maximum value”))
T= 0
for n in range (1, m+1):
if (n % 2 =0):
print (“{0}’’.format (n)/format (n))
T =T+N
print (“The sum Even numbers from 1 to {0}
= {1}”.format (n,t))

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 57.
Write a program that reverse a list using a loop.
Answer:
# program that reverse a list using loop.
word_list= [‘RAM’, ‘MAN’, ‘RAJ’,’SUN’]
i = len (word_list)-1
while i>=0:
print (word list [i])
i-=l
Word_list[‘RAM’,(or)‘MAN’, ‘RAJ’, ‘SUN’]
for i in range (len(word_list)-1,-1,-1)
print (wordlist[i])

Question 58.
Write a program to insert a value in a list at the specified location.
Answer:
# program to insert a value in a list at the specified location
defmain( )
Listl= [‘RAM’, ‘BALU’, ‘CHAN’, ‘WHAT’,‘THAT’]
print (List 1)
list1.insert (3, ‘WHY’)
print(list1)
Listl.insert (0, ‘city’)
print (list1)
List2 = [3, 5, 7,1]
for elem in reversed (list2): //insert all the elements
list1.insert (3, elem)
print (list1)
List1 = list1 [:3]+list2 +listl[3:]
print (list+1)
if name —‘main’ main()
Output:
l.[‘RAM’, ‘BALU’,’CHAN’, ‘WHAT’, ‘THAT’]
2.[‘RAM’, ‘BALU’, ‘CHAN’, ‘WHY’, ‘WHAT’, ‘THAT’]
3.[‘CITY’, ‘RAM’, ‘BALU’, ‘CHAN’, ‘WHY’, ‘WHAT, ‘THAT’]
4.[‘CITY’, ‘RAM’, ‘BALU’, 3,5,7,1, ‘CHAN’, ‘WHAT’, ‘THAT’].
5.[‘RAM’ ‘BALU’, ‘CHAN’, 3,5,7,1, ‘WHAT’, ‘THAT’]

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 59.
Write a program that creates a list of numbers from 1 to 50 that are either divisible by 3 or divisible by 6.
Answer:
# program for list of numbers from 1 to 50
that are either divisible by 3 or divisible by 6.
for i in range (1, 50+1):
if (i % 3 =0 or i % 6==0):
print (i)

Question 60.
Write a program to create a list of numbers in the range 1 to 20. Then delete all the numbers from the list that are divisible by 3.
Answer:
# program list numbers from 1 to 20 and delete all from divisible by 3
number_list – (1:20)
print (numberlist)
for i in range (1,20+1):
if (i %3 =0):
del (i)

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 61.
Write a program that counts the number of times a value appears in the list. Use a loop to do the same.
Answer:
# program counts the number of times a
value appears in the list
1st = [2, 1, 5, 10, 5, 3, 4, 9, 12, 5, 5, 4]
def count (1st, x):
count = 0
for i in 1st:
if (i =x)
count = count+1
return count
x=5
print (countx (1 st, x))
Output: 4

Question 62.
Write a program that prints the maximum and minimum value in a dictionary.
Answer:
# program maximum and minimum value in a dietionary.
my_dict = {‘x’:500, ‘y’:5000, ‘z’: 8000}.
key_max = max (my_dict.keys( ), key = (lambda k: my_dict[k]))
keyjnin =? min (my_dict.keys( ), key = (lambda k: my dict[k]))
print (‘maximum value’,my_dict [key_max])
print (‘minimum value’ ,my_dict[key_min])
output
maximum value 8000
minimum value 500.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Choose the best answer:

Question 1.
What is a position of an element is indexed with starting number?
(a) 0
(b) 1
(c) -1
(d) None
Answer:
(a) 0

Question 2.
What is used, a list is simply created in python?
(a) ( )
(b) [ ]
(c) {}
(d) All of them
Answer:
(b) [ ]

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 3.
Which value of index counts from the beginning of the list elements?
(a) Positive
(b) Negative
(c) Both (a) and (b)
(d) None of these
Answer:
(a) Positive

Question 4.
Which value of index counts backward from end of the list?
(a) Positive
(b) Negative
(c) Both (a) and (b)
(d) None of these
Answer:
(b) Negative

Question 5.
Which are used to access all elements from a list?
(a) loop
(b) statements
(c) function
(d) none of these
Answer:
(a) loop

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 6.
What is the range [0 : 5] in python?
(a) 0 to 5
(b) 0 to 4
(c) 1 to 5
(d) 1 to 4
Answer:
(b) 0 to 4

Question 7.
Which function is used to add a single element to an existing list?
(a) append ( )
(b) extend( )
(c) Add ( )
(d) more( )
Answer:
(a) append ( )

Question 8.
What happen in the following statement? marks.append (99)
(a) 99 is included with the existing list in mark list.
(b) 99 is added to existing values in mark list.
(c) 99 is removed from existing list in mark list.
(d) 99 is added to the first value of existing list.
Answer:
(a) 99 is included with the existing list in mark list.

Question 9.
Which function is used to deletes only element and retains the list?
(a) del ( )
(b) clear ( )
(c) remove ( )
(d) erase ( )
Answer:
(b) clear ( )

Question 10.
Which function can be used to delete an element using the given index value?
(a) del ( )
(b) clear ( )
(c) pop ( )
(d) remove ( )
Answer:
(c) pop ( )

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 11.
Which function can be used to delete the elements if the index value is not known?
(a) del ( )
(b) clear ()
(c) pop ( )
(d) remove ( )
Answer:
(d) remove ( )

Question 12.
Which function is used to generate a series of values in Python?
(a) pop ( )
(b) range ( )
(c) len ( )
(d) count ( )
Answer:
(b) range ( )

Question 13.
What is the output?
>>> n= [for x in range (1,10):
>>> print (n)
(a) [1, 2, 3, 4, 5, 6, 7, 8, 9]
(b) [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]
(c) both (a) and (b)
(d) [2, 3, 4, 5, 6, 7, 8]
Answer:
(a) [1, 2, 3, 4, 5, 6, 7, 8, 9]

Question 14.
What is the output.
>>> m = [4,3,4,2,4]
>>> n = m.count (4)
>>> print (n)
(a) 4
(b) 3
(c) 2
(d) 5
Answer:
(b) 3

Question 15.
Choose the incorrect pair:
(a) Positive index – Beginning onwards
(b) Negative index – Reverse order
(c) List – Initial value 1
(d) Tuples – Similar to list
Answer:
(c) List – Initial value 1

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 16.
Choose the incorrect pair:
(a) Set – Data type
(b) Index from – Beginning index
(c) Index to – Upper limit
(d) Dictionary – Numeric constant
Answer:
(d) Dictionary – Numeric constant

Question 17.
Choose the incorrect pair:
(a) List – data type
(b) Tuples – numeric constant
(c) Set – floating constant
(d) Dictionary – exponent
Answer:
(a) List – data type

Question 18.
Choose the incorrect pair:
(a) remove ( ) – delete element
(b) pop ( ) – delete index value
(c) clear ( ) – delete all element
(d) del ( ) – delete single element
Answer:
(d) del ( ) – delete single element

Question 19.
Choose the correct pair:
(a) list – immutable
(b) Tuple – mutable
(c) dictionary – mixed
(d) group – single
Answer:
(c) dictionary – mixed

Question 20.
Choose the correct pair:
(a) union – more sets
(b) intersection – two but not one
(c) difference – common sets
(d) symmetric – first set
Answer:
(a) union – more sets

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 21.
Choose the incorrect statement:
(a) Python has four collection of data types.
(b) A list is a numeric constant.
(c) Each value list is called as element
(d) The elements can be modified or replaced.
Answer:
(b) A list is a numeric constant.

Question 22.
Choose the incorrect statement:
(a) A list is simply created by using curly brackets.
(b) Nested list containing another list as an element.
(c) Python assigns automatic in^ex value.
(d) Index value of a list begins with zero.
Answer:
(a) A list is simply created by using curly brackets.

Question 23.
Choose the incorrect statement:
(a) Python enables reverse or negative indexing list.
(b) Python negative lists index in sequence order.
(c) Python sets -1 as the index value for the last element.
(d) Loops are used to access all elements.
Answer:
(b) Python negative lists index in sequence order.

Question 24.
Choose the correct statement:
(a) In python, the lists are mutable.
(b) Append ( ) function is used to add more element.
(c) Extend ( ) function is used to add single element
(d) Insert ( ) function is used to insert at last element only.
Answer:
(a) In python, the lists are mutable.

Question 25.
Choose the correct statement:
(a) del statement is used to delete unknown elements.
(b) remove ( ) is used to delete known elements.
(c) clear () is used to delete all the elements in list.
(d) pop () is used to delete single element and not returns the any element.
Answer:
(c) clear () is used to delete all the elements in list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 26.
Match the following:

(i) Union (A) —
(ii) intersection (B) |
(iii) difference (C) ^
(iv) symmetric (D) &

(a) (i) – B, (ii) – D, (iii) – A, (iv) – C
(b) (i) – B, (ii) – A, (iii) – C, (iv) – D
(c) (i) – C, (ii) – D, (iii) – A, (iv) – B
(d) (i) – C, (ii) – A, (iii) – B, (iv) – D
Answer:
(a) (i) – B, (ii) – D, (iii) – A, (iv) – C

Question 27.
Match the following:

(i) del ( ) (A) delete unknown element
(ii) remove ( ) (B) delete known element
(iii) Pop( ) (C) delete only elements
(iv) clear ( ) (D) delete and returns

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C
(c) (i) – D, (ii) – A, (iii) – B, (iv) – C
(d) (i) – D, (ii) – C, (iii) – B, (iv) – A
Answer:
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 28.
Match the following:

(i) index from (A) Upper limit
(ii) index to (B) Add single
(iii) append ( ) (C) Add more
(iv) extend ( ) (D) Lower limit

(a) (i) – B, (ii) – D, (iii) – C, (iv) – A
(b) (i) – B, (ii) – C, (iii) – A, (iv) – D
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B
(d) (i) – D, (ii) – A, (iii) – B, (iv) – C
Answer:
(d) (i) – D, (ii) – A, (iii) – B, (iv) – C

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 29.
Match the following:

(i) list(A) from list
(ii) Tuple(B) mixed
(iii) set(C) element
(iv) dictionary(D) unordered

(a) (i) – C, (ii) – A, (iii) – B, (iv) – D
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B
(c) (i) – B, (ii) – D, (iii) – A, (iv) – C
(d) (i) – B, (ii) – C, (iii) – A, (iv) – D
Answer:
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B

Question 30.
Match the following:

(i) range (1) (A) 5
(ii) range (5, 6) (B) 3
(iii) range (1, 4, 2) (C) 1
(iv) range (1, 1 + 1) (D) 0

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – D, (ii) – B, (iii) – C, (iv) – A
(c) (i) – B, (ii) – D, (iii) – C, (iv) – A
(d) (i) – B, (ii) – C, (iii) – A, (iv) – D
Answer:
(a) (i) – D, (ii) – A, (iii) – B, (iv) – C

Question 31. Assertion (A):
In python, each value of a list is called as element.
Reason (R):
It can be of any type such as numbers, characters, strings and even the nested lists.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is falset
(d) A is false, but R is true.
Answer:
(a) Both A and R are true and R is the correct explanation for A.

Question 32.
Assertion (A):
Python assign an automatic index value for each element of list begin with zero.
Reason (R):
Positive value of index counts from the end of the list.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 33.
Assertion (A):
Index to is the lower limit of the range.
Reason (R):
Index from is the upper limit of the range.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Question 34.
Assertion (A):
The Insert ( ) is used to insert an element at any position of a list.
Reason (R):
Python is used to add more elements in a list. .
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both A and R are true and R is the correct explanation for A.

Question 35.
Assertion (A):
The Tuple ( ) function is used to create Tuples from a list.
Reason (R):
When you create a tuple, from a list, the elements should be enclosed curlly brackets.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 36.
Pick the odd one out:
(a) Tuples
(b) Set
(c) Dictionary
(d) For
Answer:
(d) For

Question 37.
Pick the odd one out:
(a) append ( )
(b) count ( )
(c) extend ( )
(d) insert ( )
Answer:
(b) count ( )

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 38.
Pick the odd one out:
(a) remove ( )
(b) clear ( )
(c) index ( )
(d) pop ( )
Answer:
(c) index ( )

Question 39.
Pick the odd one out:
(a) Dictionary
(b) Union
(c) Intersection
(d) Symmetric
Answer:
(a) Dictionary

Question 40.
Pick the odd one out:
(a) copy ( )
(b) count ( )
(c) index ( )
(d) tuple ( )
Answer:
(d) tuple ( )

Question 41.
Which function is used to add a single element to an existing list?
(a) append ( )
(b) add ( )
(c) extend ( )
(d) insert ( )
Answer:
(a) append ( )

Question 42.
Which function is used to add more than one element in an existing list?
(a) append ( )
(b) add ()
(c) extend ( )
(d) insert ( )
Answer:
(c) extend ( )

Question 43.
How many ways to delete element from a list?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 44.
What is output?
m = list(range(0, 5, 2))
(a) [2, 4]
(b) [0, 2, 4]
(c) [1, 3, 5]
(d) [0, 3, 5]
Answer:
(b) [0, 2, 4]

Question 45.
When using sort ( ) function, the default sorting is:
(a) Ascending
(b) Descending
(c) No sorting
(d) Multiple sorting
Answer:
(a) Ascending

Question 46.
Which of the following can be used to access a particular element in a dictionary?
(a) [ ]
(b) {}
(c) ( )
(d) < >
Answer:
(a) [ ]

Question 47.
What is a powerful feature in python assignment?
(a) Tuple Assignment
(b) List Assignment
(c) Pair Assignment
(d) Assignment statement
Answer:
(a) Tuple Assignment

Question 48.
Which key is separated by python dictionary?
(a) ,
(b) :
(c) ::
(d) .
Answer:
(b) :

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 49.
What is output?
>>> marks = [10, 23, 41, 75]
>>> print (marks[-l])
(a) 10
(b) 23
(c) 75
(d) 41
Answer:
(c) 75

Question 50.
The key value pair are enclosed with:
(a) [ ]
(b) { }
(c) ( )
(d) All of these
Answer:
(b) { }

Question 51.
What is the acronym of DBMS?
(a) DataBase Management Symbol
(b) Database Managing System
(c) DataBase Management System
(d) DataBasic Management System
Answer:
(c) DataBase Management System

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 52.
A table is known as:
(a) tuple
(b) attribute
(c) relation
(d) identity
Answer:
(c) relation

Question 53.
Which database model represents parent- child relationship?
(a) Relational
(b) Network
(c) Hierarchical
(d) Object
Answer:
(c) Hierarchical

Question 54.
Relational database model was first proposed by:
(a) E F Codd
(b) E E Codd
(c) E F Cadd
(d) E F Codder
Answer:
(a) E F Codd

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 55.
What type of relationship does hierarchical model represents?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(b) one-to-many

Question 56.
Who is called Father of Relational Database from the following?
(a) Chris Date
(b) Hugh Darween
(c) Edgar Frank Codd
(d) Edgar Frank Cadd
Answer:
(c) Edgar Frank Codd

Question 57.
Which of the following is an RDBMS?
(a) Dbase
(b) Foxpro
(c) Microsoft Access
(d) SQLite
Answer:
(d) SQLite

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 58.
What symbol is used for SELECT statement?
(a) σ
(b) Π
(c) X
(d) Ω
Answer:
(a) σ

Question 59.
A tuple is also known as:
(a) table
(b) row
(c) attribute
(d) field
Answer:
(b) row

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 60.
Who developed ER model?
(a) Chen
(b) EF Codd
(c) Chend
(d) Chand
Answer:
(a) Chen

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 1.
What is physical money?
Answer:
Physical money is cash, which is the traditional and most widely used payment instrument that consumers use, in their daily lives to buy goods and services.

Question 2.
What is an electronic payment?
Answer:
The term electronic payment refers to a payment made from one bank account to another bank account using any one electronic methods.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 3.
What are newer electronic payment system?
Answer:
UPI, Bitcoin, Mobile payment, Digicash, eway, Paypal, Paytm, Applepay etc…

Question 4.
Write the classification of electronic payment methods.
Answer:
Electronic payment systems are generally classified into two types. They are

  • Micro electronic payment systems.
  • Macro electronic payment systems.

Question 5.
What is Micro Electronic Payment systems?
Answer:
Micro electronic payment systems is an on-line payment system designed to allow efficient and frequent payments of small amounts.
Eg: Watch a movie online.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 6.
What is Macro electronic payment systems?
Answer:
Macro electronic payment systems is an on-line payment systems, supports payment of higher value.
Eg: Card based payment.

Question 7.
What is payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments.
Eg: Debit card.

Question 8.
What is credit card?
Answer:

  1. Credit card is an electronic payment system normally used for retail transactions.
  2. Credit card enables the bearer to buy goods or services from a vendor to payback the value later with an agreed interest.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 9.
Who is Bearer?
Answer:
The holder of the credit card account who is responsible for payments of invoice in full or a portion of the balance and carried forward.

Question 10.
Who is merchant?
Answer:
Storekeeper or vendor who sell or providing service, receiving payment made by its customers through the credit card.

Question 11.
Who Acquirer?
Answer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant send authorization requests to the issuing bank.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 12.
Define credit card network?
Answer:
Credit card network acts as the intermediate between the banks. The company responsible for communicating the transaction between the acquirer and the credit card issuer.

Question 13.
Who is Issuer?
Answer:
Bearer’s bank, that issue the credit card, set limit of purchases, decides the approval of transactions, issue invoices for payments, charges, offer card linked products, insurance, additional cards etc.

Question 14.
Write the size of the payment cards.
Answer:
All payment cards are usually plastic cards of size 85.60 mm width x 53.98 mm height, rounded comers with a radius of 2.88 mm to 3.48 mm and thickness of 0.76 mm.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 15.
What is EMV chip?
Answer:
EMV (Europay, Mastercard, Visa) is integrated chip in addition to magnetic stripe to store cardholder’s information.

Question 16.
What is RFID symbols?
Answer:
RFID symbols are four curved lines radiating rightwards similar to a titled Wi-Fi symbol. It indicates contactless smart card.

Question 17.
What is card brand logo?
Answer:

  1. Card brand logo is the name of the credit card network company.
  2. Visa, Mastercard, Rupay are leading credit card network companies.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 18.
What is magnetic stripe?
Answer:
Magnetic stripe is an iron based magnetic material containing encrypted data about the card holder and account number.

Question 19.
What is Hologram?
Answer:
Hologram is a security feature that prevents duplication. It is a 3-dimensional image formed by interference of light beams.

Question 20.
What is CVC / CW?
Answer:
CVC is a Card Verification Code / Card Verification Value is a 3 digit code usually printed to the left of signature pane validates the card.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 21.
What is debit card?
Answer:
Debit card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account.

Question 22.
What are the ways of processing debit card transactions?
Answer:
Now, there are three ways of processing debit card transaction. They are

  • EFTPOS (also known as online debit or PIN debit)
  • Offline debit, (also known as signature debit)
  • Electronic purse card system.

Question 23.
What is stored value cards?
Answer:
Stored value card is a type of debit card that is pre-loaded with certain amount, with which a payment is made. It is a card that has default monetary value on to it.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 24.
What are the types of stored value card?
Answer:
There are two types of stored value card, they are

  1. Closed loop: Closed loop cards are issued by a specific merchant.
  2. Open loop: Open loop cards can be used to make debit transactions at variety of retailers.

Question 25.
What is a smart card?
Answer:
A smart card is a physical card that has an embedded integrated chip that acts as a security. A smart card is the card with which we can exchange the data, store it and manipulate data.

Question 26.
What is ECS?
Answer:
ECS (Electronic Clearing Services) can be defined as repeated transfer of funds from one bank account to multiple bank accounts or vice versa.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 27.
What is EFT?
Answer:
EFT (Electronic Funds Transfer) is the electronic transfer of money over an online network. EFT is a widely used method for moving funds in B2B business models used.

Question 28.
What is E-cash?
Answer:
E-cash (Electronic Cash) is a currency that flows in the form of data. It is a digital money product that provides a way to pay for products and services without resorting to paper or coin currency.

Question 29.
What are function of cryptocurrency?
Answer:
The function of cryptocurrency is based on technologies such as mining, block chain, directed acyclic graph, distributed register etc.,

Question 30.
What is called Digicash?
Answer:
In 1989, David chaum an American cryptographer invented the first form of cryptocurrency called Digicash in the Netherlands.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 31.
Define the term Bitcoin.
Answer:
The term cryptocurrency began to be used after the appearance of the Bitcoin. Bitcoin is the most popular and the first decentralized cryptocurrency.

Question 32.
What is Altcoins?
Answer:

  1. Altcoins is the collective name for all cryptocurrencies that appeared after bitcoin.
  2.  Many altcoins are inherently very similar to bitcoin in characteristics and structure.

Question 33.
What is mobile banking?
Answer:
Mobile banking is another form of net banking. The term mobile banking also called m-banking. M-banking refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 34.
What are the transaction made by the m-banking?
Answer:

  1. Balance checking, account transfers, payments, purchases etc…
  2. Transactions can be done at anytime and anywhere using m-banking.

Question 35.
What is known as Internet Banking?
Answer:
Internet banking is a collective term for E-banking, online banking, virtual banking, direct banks, web banking and remote banking.

Question 36.
What is self service banking?
Answer:

  1. Self service banking means, a branch of bank exclusively operating of an individual customer.
  2. The online banking system will typically connect to the core banking system operated by customers themselves.

Question 37.
Write the advantages of Internet banking.
Answer:

  1. In Internet banking access it can be used anywhere in the world and at any time.
  2. Internet banking does not need installing any additional software, that is any standard browser is adequate.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 38.
Expand the following,
(a) PIN;
(b) OTP;
(c) ACH;
(d) COD.
Answer:
(a) PIN – Personal Identification Number
(b) OTP – One Time Password
(c) ACH – Automated Clearing House
(d) COD – Cash On Delivery

Question 39.
What is UPI?
Answer:
UPI (Unified Payments Interface) is a real-time payment system developed by National Payments Corporation of India (NCPI) to facilitate inter-bank transactions.

Question 40.
What are the types of UPI of address?
Answer:
There are two types of UPI address, they are,

  • Global address – It includes bank account numbers and IFSC.
  • Local address – It is a virtual payment address.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 41.
What is VPA?
Answer:
VPA (Virtual Payment Address) is enable us to send and receive money from multiple banks and prepaid payment issuers. VPA also called as UPI-ID, is a unique ID similar to email-id.

Question 42.
What is MPIN?
Answer:
MPIN (Mobile Banking Personal Identification Number) is required to confirm each payment.

Question 43.
What is COD?
Answer:
COD (Cash On Delivery) also called as collection on delivery, describes a mode of payment in which the payment is made only on receipt of goods rather in advance.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 44.
What is BHIM?
Answer:
BHIM (BHarat Interface for Money) is an exclusive mobile app for UPI developed by National Payments Corporation of India (NPCI) and launched on 30 December 2016.

Question 45.
What is IFSC?
Answer:
IFSC (Indian Financial System Code) is an 11 digit alpha-numeric code issued by Reserve Bank of India.

Question 46.
What are the ways can be explained the Micro electronic payment transactions?
Answer:

  1. Customer proves his authentication and the payment processor issues micro payments.
  2. Customer pays the micro payments to the online service provider and gets the requested goods or services form them.
  3. Seryice provider deposits micro payments received from the customer to the payment processor and gets the money.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 47.
Write the steps on micro electronic payment systems work on the basis of simple cryptographic algorithms.
Answer:

  1. Hash chain based micro electronic payment system.
  2. Hash collisions and hash sequences based micro electronic payment systems.
  3. Shared secrete keys based micro electronic payment systems.
  4. Probability based micro electronic payment systems.

Question 48.
What are the popular macro on-line payment systems?
Answer:
Some of the popular macro on-line payment system are

  1. Card based payment systems.
  2. Electronic account transfer.
  3. Electronic cash payment systems.
  4. Mobile payment systems and Internet payment systems.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 49.
What are the ways used card payment system?
Answer:
There are three widely used card based payment systems. They are,

  1. Credit card based payment systems (Pay later)
  2. Debit card based payment systems (Pay now)
  3. Stored value card based payment systems (pay before)

Question 50.
Write a short note on Diners club card.
Answer:

  1. The Diners club card, which was made of paper card board.
  2. The card was accepted in only 27 restaurants and was used only by friends.
  3. Later it was enhanced and accepted worldwide.
  4. Now, the card was made of plastic and the diners club still exists today under the name Diners Club International.

Question 51.
How can be classified by smart cards?
Answer:
Smart cards can be classified into contact smart cards and contactless smart cards.
1. Contact smart cards: Contact smart cards have a contact area of approximately 1 square centimeter, comprising several gold-plated contact pads.
These cards used as a communication medium between the smart card and a host.

2. Contactless smart cards: Contactless smart card is empowered by RF induction technology.
Smart cards, whether they are contact or contactless cards do not have an internal power source.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 52.
Write the advantages of the Electronic ClearingServices (ECS).
Answer:

  1. ECS system are bulk payments, guaranteed payments and no need to remember payment dates.
  2. It can be used by institutions for making payments such as disbursing of salary, pension or dividend interest among shareholders.
  3. Individual bank customers can make small value such as paying EMI of a loan, electricity bills, telephone bills, insurance premium, as well as SIP investments.

Question 53.
Describes the users of ECS.
Answer:
ECS can be used for both credit and debit purposes.
1. ECS credit: ECS credit is used for making bulk payment of amounts. In this mode, a single account is debited and multiple accounts are credited. This type of transactions are push transactions.

2. ECS debit: ECS debit is an inverse of ECS credit. It is used for bulk collection of amounts. This type of transactions are pull transactions.

Question 54.
Explain NEFT.
Answer:

  1. NEFT (National Electronic Fund Transfer), it is called by India. In USA, they may be referred to as ‘e-cheques’.
  2. NEFT is an electronic fund transfer system initiated by the Reserve Bank of India.
  3. It is established and maintained by Institute for Development and Research in Banking Technology (IDRBT).

Question 55.
Explain the RTGS payment system.
Answer:

  1. RTGS (Real Time Gross Settlement system) is a payment system particularly used for the settlement of transactions.
  2. RTGS transactions are processed at the real-time, RTGS payments are also called push payments.
  3. RTGS transactions are unconditional and Irrevocable method.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 56.
Explain the block chain in cryptocurrency.
Answer:

  1. Blockchains are an open distributed book that records transactions of cryptocurrencies between any two parties in an efficient and verifiable manner.
  2. It is continuously growing list of records, called blocks, which are linked to each other and protected using encryption algorithm.
  3. Each block typically contains a hash pointer as link to a previous block.
  4. The validity of the coins of each cryptocurrency is also provided by a blockchain.

Question 57.
What are the ways can be implemented by mobile banking operations?
Answer:
The mobile banking operations can be implemented in the following ways

  1. Connecting the call center.
  2. Automative IVR telephone services.
  3. Using a mobile phone via SMS.
  4. WAP technology
  5. Using smartphone applications.

Question 58.
What are the advantages of credit card?
Answer:

  1. Most credit cards are accepted worldwide.
  2. It is not necessary to pay physical money at the time of purchase. The customer gets an extra period to pay the purchase.
  3. Depending on the card, there is no need to pay annuity.
  4. Alows purchases over the internet in installments.
  5. Some issuers allows “round up” the purchase price and pay the difference in cash to make the transaction easy.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 59.
Describe the modern credit card number.
Answer:

  1. The modem credit card number has 16 digit unique identification number.
  2. The first digit of the credit number is Major Industry Identifier (Mil). Eg: 4 banks.
  3. The next 5 digits uniqueiv identifies the issuing operations.
  4. The first 6 digits together called as Issuer Identification Number (IIN).
  5. The next 9 digits are the Account number.
  6. The last digit is a check digit.

Question 60.
How can you to transfer the fund using net banking?
Answer:

  1. Login to net banking account using user name with password given by the bank.
  2. Add the beneficiary as a payee to enable transfer of fund. Account number, Name, IFSC are to be filled.
  3. The beneficiary is added, choose RTGS / NEFT / IMPS as mode of fund transfer.
  4. Select the account to transfer money from, select the payee, enter the amount to be transferred.
  5. Click on submit button
  6. Now, enter the OTP received to mobile number linked to the corresponding, account for complete the transaction.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 61.
What are the advantage of mobile banking?
Answer:

  1. Immediate money transfers through mobile device round the clock 24×7.
  2. Can use single mobile application for accessing multiple bank accounts.
  3. Single click authentication for transferring of fund.
  4. There is not required to enter the details such as card number, Account number, IFSC etc., for every transaction.
  5. Electronic payments will become much easier without requiring a digital wallet, or credit or debit card.

Question 62.
Define electronic payment system.
Answer:

  1. An electronic payment system is a financial arrangement that consists an intermediator to facilitate transfer of money-substitute between a payer and a receiver.
  2. Sometimes it is also called liquidation, clearing system or clearing service.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 63.
Distinguish micro electronic payment and macro electronic payment.
Answer:

Micro electronic payment

 Macro electronic payment

Micro electronic payment system designed to allow efficient and frequent payments of small accounts. Macro electronic payment systems support payments of higher value.
As the security of micro electronic payment systems is comparatively low it could be tampered. The security requirements are more rigorous in macro payment systems because of huge money transactions.

Question 64.
List the types of micro electronic payments based on its algorithm.
Answer:

  1. Hash chain based micro electronic payment systems.
  2. Hash collisions and hash sequences based micro electronic payment systems.
  3. Shared secrete keys based micro electronic payment systems.
  4. Probability based micro electronic payment systems.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 65.
Explain the concept of e-wallet.
Answer:

  1. e-wallet (Electronic wallet) or electronics purses allow users to make electronic transactions quickly and securely over the internet through smartphones or computer.
  2. There are several electronic wallet services that are now widely used. Eg: Paypal, SBI Buddy.

Question 66.
What is a fork in cryptocurrency?
Answer:
Fork in cryptocurrency are cryptocoins, e-cash, alternative currencies or virtual currencies.
Cryptocurrency also be distributed accounting system based on cryptography, storing information about the state of ownership in conventional units.

Question 67.
Define micro electronic payment and its role in E-Commerce.
Answer:

  1. Micro electronic payment is an on-line payment system designed to . allow efficient and frequent payments of small accounts,
  2. The major role in E-Commerce is of micro electronic payment systems were designed to pay for simple goods on the Internet.
  3. And the micro on-line payments by customer, service provider and payment processor are involved.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 68.
Compare and contrast the credit card and debit card.
Answer:

Credit card

 Debit card

Credit card is an electronic payment system normally used for retail transactions. Debit card is an electronic payments and where the transactions amount is deducted directly from the card holder’s bank account.
A credit card enables the bearer to buy goods or services from a vendor, based on the cardholders limit and payback the value later. Generally, debit cards function as ATM cards and acts as a substitute for cash. In modem era the use of debit cards has become so widespread.
Every credit card account has a purchase limit set by the issuing bank or the firm. Every debit card has to purchase that amount is deduced directly from the card holders account.

Question 69.
Explain briefly Anatomy of a credit card.
Answer:
All payment cards are usually plastic cards of size 85.60 mm width x 53.98 mm height, rounded comers with a radius of 2.88mm to 3.48mm and thickness of 0.76 mm.

  1. Publisher – Emplem of the issuing bank
  2. Credit card number – 16 digit unique identification number.
  3. EMV chip – Magnetic stripe to store information.
  4. RIFD symbol – It indicates that it is a contactless smartcard.
  5. Hologram – Security feature that prevent duplication.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 70.
Briefly explain the stored value card and its types.
Answer:
(i) Stored value card is a type of debit card that is pre-loaded with certain amount with which a payment is made.
(ii) The card may be disposed when the value is used, or recharged to use it again.
(iii) There are two types of stored value card, they are,
• Closed loop (single purpose)
• Open loop (Multi purpose)

Question 71.
Write a note on mining in cryptocurrency.
Answer:

  1. The cryptocurrency units are created by the solution of cryptographic • tasks called mining.
  2. The miners not only generate new monetary units, but also initiate new transactions to the block chain.
  3. As a reward, they will receive new Bitcoins.
  4. The process of mining is extremely electrical energy consumptive.
  5. The initial value of cryptographic currency is just the cost of consumed electricity.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 72.
What is credit card? Explain the key players of a credit card payment system and bring out the merits of it.
Answer:
Credit card is an electronic payment system normally used for retail transactions. A credit card enables the bearer to buy goods or services.
Key players of a credit card payments system:

  1. Bearer – The holder of the credit card account.
  2. Merchant – Storekeeper or vendor.
  3. Acquirer – Merchant’s bank
  4. Credit card network – It acts as the intermediate between banks.
  5. Issuer – Bearer’s bank.

Merits of credit card:

  1. Most credit cards are accepted world wide.
  2. It is not necessary to pay physical money at the time of purchase.
  3.  Depending on the card, there is no need to pay annuity.
  4. Allows purchase over the internet in installments.

Question 73.
Briefly explain Electronic Account transfer and its types.
Answer:
Electronic account transfer is an alternative electronic payment system. With the advent of computers, network technologies and electronic communications a large number of alternative electronic payment systems have emerged.
They are ECS, EFT, RTGS, etc.,
(i) ECS (Electronic Clearing Services) can be defined from one bank account to multiple bank accounts or vice versa using computer and Internet technology.
ECS system provides the convenience of paperless payments. ECS can be used for both credit and debit purposes.
(ii) EFT (Electronic Funds Transfer) is the ‘electronic transfer’ of money over an online network.
The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on the same day in batches.
(iii) RTGS (Real Time Gross Settlement) system is a payment system particularly used for the settlement of transactions between the banks. Real time gross settlement transactions are unconditional and irrevocable.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 74.
Write a note on:
(a) Internet banking
(b) Mobile banking.
Answer:
(a) Internet banking:

  1. Internet banking is a collective term for E-banking, online banking, virtual banking, direct banks, web banking and remote banking.
  2. Internet banking allows customers of a financial institution to conduct various financial transactions on a secure website.
  3. It enables customers of a bank to conduct a wide range of financial transactions through its website.
  4. The online banking system will typically connect to the core banking operated by customers themselves.

(b) Mobile banking:

  1. Mobile banking is another form of net banking .
  2. The term mobile banking (m-banking) refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones.
  3. Transactions can be done at any time and anywhere. Transactions include balance checking, account transfers, payments, purchases etc.,
  4. Mobile banking operations can be implemented in the callcenter, IVR service,SMS, WAP and smartphone applications.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 75.
What is cryptocurrency? Explain the same.
Answer:
(i) Cryptocurrency can be defined as distributed accounting system based on cryptography, storing information about the state of ownership in conventional units.
(ii) Cryptocurrency is also called as cryptocoins, e-cash, alternative . currencies or virtual currencies and are classified as a subset of digital currencies.
(iii) The function of Cryptocurrency is based on technologies such as Bitcoin, Altcoins, mining, Block chain, directed Acylic Gaph, Distributed Register etc.,
(iv) Bitcoin is the most popular Cryptocurrency, but there are many other Cryptocurrencies, which are referred to as altcoins.
(v) Altcoins is the collective name for all Cryptocurrencies that appeared after Bitcoin.
(vi) Many altcoins are inherently very similar to Bitcoin in characterises, and structure.
(vii) The cryptocurrency units are created by the solutions of erytographic tasks called mining.
(viii) The process of mining is extremely electrical energy consumptive.
(ix) Block chains are an open distributed book that records transactions of cryptocurrencies between any two parties in an efficient and verifiable manner.

Question 76.
Explain in detail: Unified payments interface.
Answer:
(i) Unified Payments Interface (UPI) is a real-time payment system developed by National Payments Corporation of India (NCPI) to facilitate inter-bank transactions. –
(ii) UPI is simple, secure and instant payment facility. This interface is regulated by the Reserve Bank of India.
(iii) UPI withdraws and deposits funds directly from the bank aecc at wherever a transaction is requested. .
(iv) UPI is also available as an Unstructured Supplementary Service D .ui (USSD) service.
(v) UPI is developed on the basis of Immediate Payment Service (IMPS).
(vi) To initiate a transaction, UPI applications use two types of address, Global address and Local address.
(vii) Virtual Payment Address (VPA) also called as UPI-ID, is a unique ID enable us to send and receive money from multiple banks.
(viii) The MPIN (Mobile banking Personal Identification Number) is required • to confirm each payment.
(ix) UPI allows operating multiple bank accounts in a single mobile application.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 77.
Choose any presentation tool (e.g, Open office impress)
Answer:
Start the program ‘open office impress’ for creating presentation on title ‘various payment system’.
Click open office impress → presentation → Empty presentation → Select background colour, slide transition, presentation type,then click create.
Slide layout is created, now we can type the title as ‘various payment methods’.

Question 78.
Create a slide describing a payment method.
Answer:
Type the sub heading as ‘Description’ and then type description as “The method of payment” depend on.

  1. The item we are buying
  2. The cost of the item
  3. The method of payment accepted by the seller. The payment methods are cash, debit or credit cards, cheque, electronic transfer payments and EMI payment.

Question 79.
List the futures of the particular payment method.
Answer:

  1. An electronic payment is a non-cash payment though electronic medium.
  2. There are various features like credit payment system, E-wallet, smart card, real time payment system.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 80.
List the advantages and disadvantages of the same.
Answer:
Advantages:

  • Increase sales.
  • Reduced transaction costs.
  • Increased speed and convenience.
  • Easily accessible and user friendly.

Disadvantage:

  • Security concerns
  • Disputed transactions
  • Increased business costs.
  • Necessity of Internet Access.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 81.
Repeat the steps for other payment methods.
Answer:
Cash:
Cash payment using banknotes and coins. It is most common method of payment.

Advantage:
Widely accepted, fast and convenient.

Disadvantage:
Cash and coins are heavy to carry around.
Cannot used for online transaction.

Debit and credit card:
A card issued by the bank. The purchase amount is deducted immediately from bank accounts.

Advantage:
(i) Easy to carry and use.
(ii) Cashless payments

Disadvantage:
(i) Lost card can be misused.
(ii) In credit card, interest will be charged.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Choose the correct answer:

Question 1.
Which is the traditional and most widely used payment instrument that consumer use, in their daily lives?
(a) Electronic payment
(b) Physical money
(c) Account transfer
(d) Mobile payment
Answer:
(b) Physical money

Question 2.
Which is also called as liquidation, clearing system or clearing service?
(a) Electronic payment
(b) Physical money
(c) Account transfer
(d) Cash payment
Answer:
(a) Electronic payment

Question 3.
Which system is an essential part of a companies financial operations?
(a) Payment
(b) Account
(c) e-wallet
(d) Internet
Answer:
(a) Payment

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 4.
Which of the following is of newer payment system?
(a) Paytm
(b) UPT
(c) Bitcoin
(d) All of these
Answer:
(d) All of these

Question 5.
How many types of electronic payment system classified?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Question 6.
Which one of the payment system is designed to allow payments of small amounts?
(a) Micro
(b) Macro
(c) cheque
(d) All of these
Answer:
(a) Micro

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 7.
Which electronic payment that use expensive public key cryptography?
(a) Micro
(b) Macro
(c) cheque
(d) All of these
Answer:
(b) Macro

Question 8.
Which electronic payment systems support payment of higher value?
(a) Micro
(b) Macro
(c) cheque
(d) All of these
Answer:
(b) Macro

Question 9.
Which are called plastic cards that enable cashless payments?
(a) Credit card
(b) Debit card
(c) Payment card
(d) All of these
Answer:
(d) All of these

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 10.
Which known as electronic payment system normally used for retail transactions and payback to the issuer?
(a) Debit card
(b) Traveler card
(c) Credit card
(d) All of these
Answer:
(c) Credit card

Question 11.
Who is holder of the credit card account and responsible for payment?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(a) Bearer

Question 12.
Who is receiving payment made by its customers through the credit card?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(b) Merchant

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 13.
_________ is responsible for receiving payment on behalf of merchant?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(c) Acquirer

Question 14.
Who is that issue the credit card, set limit of purchases, and is bearer’s bank?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(d) Issuer

Question 15.
How many digit has modern credit card identification number?
(a) 12
(b) 14
(c) 16
(d) 20
Answer:
(c) 16

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 16.
The first 6 digits together called in credit card number?
(a) UN
(b) ISO
(c) IEC
(d) CVC
Answer:
(a) UN

Question 17.
Which chip is magnetic stripe to store card holder’s information?
(a) IIN
(b) ISO
(c) CVC
(d) EMV
Answer:
(d) EMV

Question 18.
EMV stands for:
(a) Electronic Machine Verifier
(b) European Machine Verification
(c) Electronic Model Verifier
(d) Europay Mastercard Visa
Answer:
(d) Europay Mastercard Visa

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 19.
Which is Indian domestic open loop card launched in 2012?
(a) Master card
(b) Rupay
(c) Paytm
(d) Visa
Answer:
(b) Rupay

Question 20.
Which is an iron based magnetic material containing encrypted data?
(a) EMV chip
(b) RFID symbol
(c) Hologram
(d) Magnetic stripe
Answer:
(d) Magnetic stripe

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

 

Question 21.
Which is a security feature that prevents duplication in credit card?
(a) Hologram
(b) Card logo
(c) RFID symbol
(d) Magnetic strip
Answer:
(a) Hologram

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 22.
How many digit is Card Verification Code (CVV) in credit card usually printed?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 23.
Which card is transaction amount directly deducted the cardholder’s bank account?
(a) Credit
(b) Traveller
(c) Debit
(d) Pre paid card
Answer:
(c) Debit

Question 24.
How many ways are there processing debits card transactions?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 25.
Which type of card is pre-loaded with certain amounts for future use?
(a) Credit
(b) Stored value
(c) Traveller
(d) Paytm
Answer:
(b) Stored value

Question 26.
How many type of store value card available?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Question 27.
Which is modern version of card based on payments?
(a) debit card
(b) credit card
(c) smartcard
(d) pre-paid card
Answer:
(c) smartcard

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 28.
Which type of smart cards have a contact area of approximately square centimeter?
(a) Contact
(b) contactless
(c) EFT
(d) All of these
Answer:
(a) Contact

Question 29.
Which type of smart card is empowered by RF induction technology?
(a) Contact
(b) contactless
(c) EFT
(d) All of these
Answer:
(b) contactless

Question 30.
What is called as repeated transfer of funds from one bank account to multiple bank account or vice verse?
(a) ECS
(b) EFT
(c) RTGS
(d) NEFT
Answer:
(a) ECS

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 31.
Which type of transactions are called push transactions?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(a) ECS credit

Question 32.
Which is an inverse of ECS credit and is used for bulk collection of amounts?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(b) ECS debit

Question 33.
Which type of transactions are called as pull transactions?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(b) ECS debit

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 34.
Which is the ‘electronic transfer’ of money over an online network?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(d) EFT

Question 35.
Which method is widely used and B2B business models?
(a) EFT
(b) ECS credit
(c) ESC debit
(d) NEFT
Answer:
(a) EFT

Question 36.
Which systems world wide is driven primarily by the central bank of a country?
(a) NEFT
(b) RTGS
(c) ESC
(d) Either (a) or (b)
Answer:
(d) Either (a) or (b)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 37.
Which is a currency that flows in the form of data?
(a) E-cash
(b) Cash
(c) Cheque
(d) all of these
Answer:
(a) E-cash

Question 38.
Which is a unique virtual asset designed to work as a medium of exchange using cryptographic algorithm?
(a) Conditional
(b) Unconditional
(c) Irrevocable
(d) Cryptocurrency
Answer:
(d) Cryptocurrency

Question 39.
Which is as distributed accounting system based on cryptography?
(a) Conditional
(b) Unconditional
(c) Irrevocable
(d) Cryptocurrency
Answer:
(d) Cryptocurrency

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 40.
Which is the state of ownership of a cryptocurrency is related to individual system blocks?
(a) Portfolios
(b) Conditional
(c) Unconditional
(d) Irrevocable
Answer:
(a) Portfolios

Question 41.
David chaum an American cryptographer invented the first form of crytocurrency called.
(a) Mining
(b) Digicash
(c) Block chain
(d) Bitcoin
Answer:
(b) Digicash

Question 42.
Which is the most popular and the first decentralized cerptocurrency?
(a) Mining
(b) Digicash
(c) Block chain
(d) Bitcoin
Answer:
(d) Bitcoin

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 43.
Which is the collective name for all crypotocuurencies that appeared after bitcoin?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chain
Answer:
(a) Altcoins

Question 44.
Which is inherently very similar to Bitcoin in characteristics and structure?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chain
Answer:
(a) Altcoins

Question 45.
Which are called the cryptocurrency units are created by the solution of cryptographic tasks?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chain
Answer:
(b) Mining

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 46.
The process of mining is extremely consumptive.
(a) Electrical energy
(b) Thermal energy
(c) Wind energy
(d) Solar energy
Answer:
(a) Electrical energy

Question 47.
Which are an open distributed book that records transactions of cryptocurrencies?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chains
Answer:
(d) Block chains

Question 48.
Which are by default resistant to data modification without approval of a trusted authority?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chains
Answer:
(d) Block chains

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 49.
Which are safely designed with high fault tolerance it is best suited to distributed computing system?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chains
Answer:
(d) Block chains

Question 50.
Which are allow users to make electronic transactions quickly and securely over smartphones?
(a) e-wallets
(b) Blockchain
(c) e-purses
(d) (a) and (c)
Answer:
(d) (a) and (c)

Question 51.
Which is first recognized and popular method for storing money in electronic form?
(a) e-wallets
(b) Blockchain
(c) Digicash
(d) Mining
Answer:
(a) e-wallets

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 52.
Paypal is a:
(a) e-wallets
(b) Blockchain
(c) Digicash
(d) Mining
Answer:
(a) e-wallets

Question 53.
How many digits are IFSC alpha numeric code that uniquely identify individual bank branch?
(a) 6
(b) 9
(c) 11
(d) 13
Answer:
(c) 11

Question 54.
Which is a real time payment system developed by NPCI?
(a) Unified Payment Interface (UPI)
(b) Cash On Delivery (COD)
(c) ECS
(d) RTGS
Answer:
(a) Unified Payment Interface (UPI)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 55.
Virtual Payment Address (VPA) also called as:
(a) UPI – ID
(b) MPIN
(c) IMPS
(d) IFSC
Answer:
(a) UPI – ID

Question 56.
MPIN stands for:
(a) Mobile Banking Personal Identification Number
(b) Money Banking Personal Identification Number
(c) Mobile Banking Personal Individual Number
(d) Mobile Banking Paying Identified Number
Answer:
(a) Mobile Banking Personal Identification Number

Question 57.
Which is required to confirm each payment?
(a) UPI-ID
(b) MPIN
(c) IMPS
(d) IFSC
Answer:
(b) MPIN

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 58.
USSD stands for:
(a) Unstructured Supplementary Service Data.
(b) United Supplementary Service Device.
(c) United Secondary System Device.
(d) Unstructured Secondary System Data.
Answer:
(a) Unstructured Supplementary Service Data.

Question 59.
What will become much easier without requiring a digital wallet or credit or debit card?
(a) Cash on delivery
(b) Electronic payment
(c) e-pay
(d) e-service
Answer:
(b) Electronic payment

Question 60.
Which is also called so collection on delivery and describes a mode of payment?
(a) Cash on delivery(COD)
(b) e-payment
(c) e-pay
(d) e-service
Answer:
(a) Cash on delivery(COD)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 61.
BHIM stands for:
(a) Bank Hologram Intemational.Money
(b) Bharat Interface for Money
(c) Bank Host Imediate Money
(d) Bharat Help Insurance Money
Answer:
(b) Bharat Interface for Money

Question 62.
NPCL stands for:
(a) Natural Payments Corporation of India
(b) National Pacific corporation of India
(c) National Payments Corporation of India
(d) Network Payments Corporation of India
Answer:
(c) National Payments Corporation of India

Question 63.
Match the following (Operations of credit card).

(A) Bearer (i) Shopkeeper
(B) Merchant (ii) Bearer’s Bank
(C) Acquirer (iii) Card holder
(D) Issuer (iv) Merchant’s bank

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (i); (B) – (ii); (C) – (iv); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iii); (U) – (iv)
(d) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 64.
Match the following (Anatomy of a Credit card).

(A) EMV chip (i) Wi Fi symbol
(B) RFID symbol (ii) Chip and PIN
(C) Magnetic Strip (iii) Prevent duplicate
(D) Hologram (iv) encrypted data

(a) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (ii); (B) – (iii)- (C) – (i); (D) – (iv)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 65.
Match the following (Electronic Account Transfer):

(A) ECS (i) Electronic Transfer
(B) ECS Credit (ii) Pull transactions
(C) ECS Debit (iii) Push transactions
(D) EFT (iv) Electronic Clearing System

(a) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 66.
Match the following (Cryptocurrency):

(A) Bitcoin (i) First cryptocurrency
(B) Altcoin (ii) blocks
(C) Mining (iii) Similar to Bitcoin
(D) Block chain (iv) Cryptographic tasks

(a) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(b) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(c) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(d) (A) – (i); (B) – (iii); (C) – (iv); (D) – (ii)
Answer:
(d) (A) – (i); (B) – (iii); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 67.
Match the following (Unified Payment Interface):

(A) UP (i) Inter bank transactions
(B) NCPI (ii) Mode of fund transfer
(C) IFSC (iii) real time payment
(D) RTGS (iv) Global address

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (ii); (C) -(i); (D) – (iv)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Question 68.
Choose the incorrect pair:
(a) Physical money – Cash
(b) Paytm – Payment system
(c) Debit card – Pay cater
(d) Traveller card – Pay before
Answer:
(c) Debit card – Pay cater

Question 69.
Choose the incorrect pair .
(a) Debit card – Physical Properties
(b) EFT pos – PIN debit
(c) offline debit – signature debit
(d) Rupay – closed loop card
Answer:
(d) Rupay – closed loop card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 70.
Choose the incorrect pair:
(a) EFT – B2B
(b) NEFY – pull transaction
(c) RTGS – Large payments
(d) RBI – Central Bank
Answer:
(b) NEFY – pull transaction

Question 71.
Choose the correct pair:
(a) Digicash – e-cheque
(b) Namecoin- DNS server
(c) e-wallets – e-purses
(d) e-wallet – SBI Buddy
Answer:
(a) Digicash – e-cheque

Question 72.
Choose the correct pair:
(a) m-banking – net banking
(b) e-banking – web banking
(c) Google chrome – direct banks
(d) e-payments – cashless
Answer:
(c) Google chrome – direct banks

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 73.
Choose the incorrect statement:
(a) Cash is a physical money and traditionally widely used as payment.
(b) An electronic payment system is also called liquidation.
(c) Many electronic payment system have been developed by internet technologies.
(d) Payment system is not an essential part of financial operations.
Answer:
(d) Payment system is not an essential part of financial operations.

Question 74.
Choose the incorrect statement:
(a) Hash chain based macro electronic payment systems.
(b) Hash collisions based micro electronic payment systems.
(c) Hash sequences based micro electronic payment systems.
(d) Shared secrete keys based micro electronic payment systems.
Answer:
(a) Hash chain based macro electronic payment systems.

Question 75.
Choose the incorrect statement:
(a) The Diners club card which was made of paper-card board.
(b) The Diners club card still exists today the name of diners club international.
(c) Credit card only accepted within the country.
(d) Depending on the credit card, there is no need to pay annuity.
Answer:
(c) Credit card only accepted within the country.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 76.
Choose the correct statement:
(a) Card verification code (CVC / CW) value is a 4 digit code.
(b) A credit card or debit card it is a plastic and has a magnetic strip on its back.
(c) The modem based payment system is e-cheque.
(d) The credit card is that pre-loaded with certain amounts.
Answer:
(b) A credit card or debit card it is a plastic and has a magnetic strip on its back.

Question 77.
Choose the correct statement:
(a) Electronic cash is (E-Cash) is a currency that flows in the form of data.
(b) Many E-commerce websites that use e-wallets as a smart card.
(c) Mobile banking also called as e-banking.
(d) Virtual Payment Address (VPA) also called as United Payment Interface (UPI).
Answer:
(a) Electronic cash is (E-Cash) is a currency that flows in the form of data.

Question 78.
Assertion (A):
Credit card is an electronic payment system normally used for retail transactions.
Reason (R):
A credit card enables the bearer to buy goods or services from a vendor, to pay back the value later.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false. .
(d) A is false, but R is true.
Answer:
(a) Both A and R are True, and R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 79.
Assertion (A):
The modern version of card based payment is smart cards.
Reason (R):
Open loop cards can be used to make debit transaction at variety of retailers, is also called as prepaid – debit cards.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are True, but R is not the correct explanation for A.

Question 80.
Assertion (A):
Electronic Clearing Service (ECS) can be defined as repeated transfer of funds.
Reason (R):
ECS system provides only small amounts transaction.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is True, but R is false.

Question 81.
Assertion (A):
RTGS payments are generally small-value^ayment.
Reason (R):
RTGS payments are also called as push payments that are triggered by the payer.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 82.
Assertion (A):
The process of mining is extremely Bio energy consumptive.
Reason (R):
e-wallets transactions are not securely through smart phones.
(a) Both A and R are True.
(b) Both A and R false.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R false.

Question 83.
Pick the odd one out: (Micro electronic payment).
(a) Subscriptions of online games
(b) read journals
(c) a movie online
(d) Mobile payment
Answer:
(d) Mobile payment

Question 84.
Pick the odd one out: (Cards)
(a) Credit card
(b) Debit card
(c) PAN card
(d) Stored value card
Answer:
(c) PAN card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 85.
Pick the odd one out: (Credit card Operations)
(a) Bearer
(b) Publisher
(c) Merchant
(d) Acquirer
Answer:
(b) Publisher

Question 86.
Pick the odd one out:
(a) Visa
(b) Master card
(c) ATM card
(d) Rupay
Answer:
(c) ATM card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 87.
Pick the odd one out: (Electronic Account Transfer)
(a) DNS
(b) ECS
(c) EFS
(d) RTGS
Answer:
(a) DNS

Question 88.
Based on the monetary value e payment system can be classified into:
(a) Micro and Macro
(b) Micro and Nano
(c) Maximum and Minimum
(d) Maximum and Macro
Answer:
(a) Micro and Macro

Question 89.
Which of the following is not a category of micropayment?
(a) Buying a movie ticket
(b) Subscription to e journals
(c) Buying a laptop
(d) Paying for smartphone app
Answer:
(d) Paying for smartphone app

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 90.
Assertion (A):
Micro electronic payment systems support higher value payments.
Reason (R):
Expensive cryptographic operations are included in macro payments.
(a) Both A and R are correct and R is the correct explanation of A .
(b) Both A and R are correct, but R is not the correct explanation of A
(c) A is true and R is false
(d) A is false and R is true
Answer:
(d) A is false and R is true

Question 91.
Which of the following is correctly matched?
(a) Credit Cards – pay before
(b) Debit Cards – pay now
(c) Stored Value Card – pay later
(d) Smart card – pay anytime
Answer:
(b) Debit Cards – pay now

Question 92.
ECS stands for:
(a) Electronic Clearing Services
(b) Electronic Cloning Services
(c) Electronic Clearing Station
(d) Electronic Cloning Station
Answer:
(a) Electronic Clearing Services

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 93.
Which of the following is not a Altcoin?
(a) Litecoin
(b) Namecoin
(c) Ethereum
(d) Bitcoin
Answer:
(c) Ethereum

Question 94.
Which of the following is true about Virtual payment address (VPA)?
(a) Customers can use their e-mail id as VPA
(b) VPA does not includes numbers
(c) VPA is a unique ID
(d) Multiple bank accounts cannot have single VPA
Answer:
(c) VPA is a unique ID

Question 95.
Pick the odd one in the credit card transaction:
(a) card holder
(b) merchant
(c) marketing manager
(d) acquirer
Answer:
(c) marketing manager

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 96.
Which of the following is true about debit card?
(i) debit cards cannot be used in ATMs
(ii) debit cards cannot be used in online transactions
(iii) debit cards do not need bank accounts
(a) (i), (ii), (iii)
(b) (ii), (iii), (iv)
(c) (iii) alone
(d) (iv) alone
Answer:
(d) (iv) alone

Question 97.
debit cards and credit cards are identical in physical properties

List A

 List B

(A1) First Digit (B1) Account number
(A2) 9th to 15th Digit (B2) Mil Code
(A3) First 6 Digits (B3) BIN Code
(A4) Last Digit (B4) Check digit

TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems 1

Answer:
(d)

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 1.
What is security in E-Commerce?
Answer:

  1. Security has become the critical factor and core issue in any emerging E-business.
  2. E-Commerce security is a set of protocols that safely guide E-Commerce transactions through the Internet.

Question 2.
Define Viruses.
Answer:
Viruses cause harm to the computers. Some viruses destroy all the information stored in a computer and cause huge loss of revenue and time.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 3.
What is Tampering in E-Commerce?
Answer:

  1. E-Commerce has the problem of the authenticity and integrity -f business information.
  2. When hackers grasp the data transmitted on the network, there 7 destroying the authenticity and integrity- of the data.

Question 4.
What is DDo5 Attacks?
Answer:
DDoS (Distributed Denial of Service) attacks is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server.

Question 5.
What is Cyber squatting?
Answer:

  1. Cyber squatting is the illegal practice of registering an Internet domain name.
  2. Cyber squatters also involve in trading on the reputation and goodwill of such third parties by inducing a customer to believe that it is an official web page.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 6.
What is Typopiracy?
Answer:
Typopiracy is a variant of cyber squatting. Some fake websites try to take advantage of users common typographical errors in typing website address and direct users to a different website.

Question 7.
What is Hacking?
Answer:
Hacking refers to unauthorized intrusion into a computer or a network. That is to say breaking security to gain access to a website illegally and intercept confidential information.

Question 8.
What is Ransomware?
Answer:
Ransomware is a type of Malware that usually encrypt all the files in a targets computer.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 9.
What is Encryption technology?
Answer:

  1. Encryption technology is an effective information security protection.
  2. It is defined as converting a plain text into meaningless cipher text using encryption algorithm thus ensuring the confidentiality of the data.

Question 10.
What are the types of Encryption technology?
Answer:
There are two types of Encryption Technology, they are:

  • Symmetric key encryption system and
  • Asymmetric key encryption system

Question 11.
What is DES?
Answer:

  1. DES (Data Encryption Standard) is a symmetric key data encryption method.
  2. DES is the typical block algorithm that takes a string of bits of clear text with a fixed length.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 12.
What is Asymmetric encryption?
Answer:

  1. Asymmetric encryption also called as RSA (Rivest – Shamir – Adleman) algorithm.
  2. Its uses public-key authentication and digital signatures.

Question 13.
What is a Public-key encryption method?
Answer:
A Public-key encryption method is a method for converting a plain text with a public key into a cipher text from which the plain text can be retrieved with a private key.

Question 14.
What is the main role of security certification?
Answer:
The main role of security certification is to ensure Authentication, Integrity and Non-repudiation. This can be achieved through digital signatures and digital certificates.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 15.
Define Digital Certificates.
Answer:
A digital certificate is an electronic document used to prove the ownership of a public key. This certificates includes the information about the sender’s identity, digital signature and a public key.

Question 16.
What is the X.509 system?
Answer:

  1. The X.509 system is a centralized system in which the authenticity of the key is guaranted by the hierarchy of certification authorities.
  2. X.509 is currently World Wide accepted certification technology.

Question 17.
Who are licensed Certifying Authority (CA) in digital certificate?
Answer:

  • The digital certificate are being issued by a licensed Certifying Authority (CA).
  • NIC, Safe script, TCS, MTNL, e-Mudhra are some of the authorized Certifying Authorities under Government of India.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 18.
What is PKI?
Answer:

  • Digital signatures use a standard, World Wide accepted format, called Public Key Infrastructure (PKI).
  • PKI to provide the highest levels of security and universal acceptance.

Question 19.
What is use of Digital signatures?
Answer:
Digital signatures are widely used for avoiding forging or tampering of important documents such as financial documents or Credit Card Data.

Question 20.
What is a Security Token?
Answer:
A security token is a hardware component that are used to identify and authenticate users.

Question 21.
What are security authentication protocols?
Answer:
There are two kinds of security authentication protocols widely used in E-Commerce. They are:

  • Secure Electronic Transaction (SET), and
  • Secure Sockets Layer (SSL)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 22.
What is the major participants of SET purchase?
Answer:
The SET purchase involves three major participants,

  • The customer
  • The seller and
  • The payment gateway

Question 23.
Write the guarantees of SET Protocol.
Answer:

  1. The SET Protocol guarantees the security of online shopping using credit cards on the open network.
  2. It has the advantages of ensuring the integrity of transaction data and the non-repudiation of transactions.

Question 24.
Define Secure Sockets Layers.
Answer:

  • The most common cryptographic protocol is Secure Sockets Layers (SSL).
  • SSL is a hybrid encryption protocol for securing transaction over the Internet.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 25.
Who was developed by SSL Standard?
Answer:
The SSL standard was developed by Netscape in Collaboration with Master Card, Bank of America, MCI and Silicon Graphics.

Question 26.
What is the principle of Secure Socket Layers?
Answer:
The Secure Socket Layers (SSL) principle is to establish a secure communication channel between a client and a server after an authentication step.

Question 27.
What is 3-D Secure?
Answer:

  • 3-D Secure is a Secure Payment Protocol on the Internet.
  • It was developed by visa to increase the level of transaction security, and ft has been adapted by Master Card.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 28.
What is the basic concept of XML based protocol?
Answer:
The basic concept ofXML based protocol is to link the financial authorization process with an online authentication system.

Question 29.
Write the types of 3-D Secure authentication model.
Answer:
The authentication model comprise three domains which are:

  • The Acquirer Domain
  • The Issuer Domain
  • The interoperability Domain

Question 30.
Write the types of payment frauds.
Answer:
The different types of payment frauds are:

  1. Friendly Fraud – When customer demands false reclaim or refund.
  2. Clean Fraud – When a stolen credit card is used to make a purchase.
  3. Triangulation fraud – Fake online shops offering cheapest price and collect credit card data.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 31.
Write a note on Malicious code threats.
Answer:

  1. An E-Commerce site, there are multiple vulnerable areas that can serve as an intrusion point for a hac
  2. Using Malware, cross site scripting or SQL Injection, an attracker will extract the credit card information and sell the acquired data on black markets.
  3. Fraud is then committed to extract the greatest value possible through E-Commerce transactions or ATM withdrawals etc.,

Question 32.
Write the key features of SET system.
Answer:
SET (Secure Electronic Transaction) system incorporates the following key features:

  1. Using public key encryption and private key encryption ensure data confidentiality.
  2. Use information digest technology to ensure the integrity of information.
  3. Dual signature technology to secure the identity of both parties in the transaction.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 33.
Explain the types of E-Commerce Threats.
Answer:
E-Commerce business would face the following specific threats. Information Leakage: The leakage of trade secrets in E-Commerce in two types.

  1. The content of the transaction between the vendor and customer is stolen by the third party.
  2. The documents provided by the merchant to the customer or vice versa are illegally used by the another.

Tampering:
E-Commerce has the problem of the authenticity and integrity of business information. When hackers grasp the data transmitted on the network, thereby destroying the authenticity and integrity of the data.

Payment frauds:
Payment frauds have subsets like Friendly fraud, clean fraud, Triangulation fraud etc.,

Malicious code threats:
Within an E-Commerce site, there are multiple vulnerable areas that can serve as an intrusion point for a hacker to gain payment and user information. Using malware, Cross Site Scripting or SQL Injection, an attacker will extract the credit card information and sell the acquired data on black markets.

Distributed Denial of Service (DDoS) Attacks:
It is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server. DDoS attacks is also called as network flooding.

Cyber Squatting:
Cybersquatting is the illegal practice of registering an Internet domain name. Cyber squatters also involve in trading on the reputation and goodwill of such third parties by inducing a customer to believe that it is an official web page.

Typopiracy:
Typopiracy is a variant of Cyber Squatting. Some fake websites try to take advantage of users’ common typographical errors in typing a website address and direct users to a different website.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 34.
Write the steps difference between Symmetric key Encryption and Asymmetric key Encryption.
Answer:

Symmetric Key Encryption Asymmetric Key Encryption
Same key is used for both encryption and decryption. Different keys are used for encryption and decryption
Speed of encryption or decryption is very fast. Speed of encryption or decryption is comparatively slow.
Plain text and cipher text are of same size. The size of cipher text is always greater than plain text.
Algorithms like DES, AES, RC4 uses symmetric key encryption. Algorithms like RSA, ECC, DSA use asymmetric key encryption.
Provides confidentiality. Provides confidentiality, authenticity and non repudiation.
The number of key used grows exponentially with the number of users. The number of key used grows linearly with the number of users.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 35.
Write about information leakage in E-Commerce.
Answer:
The leakage of trade secrets in E-Commerce mainly two aspects:
(i) The content of the transaction between the vendor and customer is stolen by the third party.
(ii) The documents provided by the merchant to the customer or viceversa are illegally used by another.
This intercepting and stealing of Online documents is called information leakage.

Question 36.
Write a short note on typopiracy.
Answer:
Typopiracy is a variant of cyber squatting. Some fake websites try to take advantage of users common typographical errors in typing a website address and d: eei users to a different website.

Question 37.
Define non-repudiation.
Answer:

  1. Non-repudiation refers to a situation where a statements author cannot successfully dispute its authorship or the validity of an associated contract.
  2. Non-repudiation that prevention against violation agreement after the deal.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 38.
List the different types of security technologies in E-Commerce.
Answer:
The security technologies in E-Commerce transactions are classified into:

  • Encryption technology
  • Authentication technology
  • Authentication protocols

Question 39.
Write about digital signature.
Answer:
Digital Signature is a mechanism that is used to verify that a particular digital document, message or transaction is authentic.

Question 40.
Write a note on certification authorities (CA).
Answer:

  1. Digital certificates function is similar to the function of identification cards such as passports and driving licenses.
  2. Digital certificates are issued by recognized Certification Authorities (CA).
  3. When someone requests a digital certificate, the authority verifies the identity of the requester, and if the requester fulfills all requirements, the authority issues it.
  4. When the sender uses a certificate to sign a document digitally, receiver can trust the digital signature.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 41.
List some E-Commerce Security Threats.
Answer:
Information Leakage:
The intercepting and stealing of online document is called information leakage.

Tampering:
E-Commerce has the problem of the authenticity and integrity of business information.

Payment frauds:
Payment frauds have subsets like friendly fraud, clean fraud, triangulation fraud etc.,

Distributed Denial of Service Attacks (DDoS):
This attack will be conducted from numerous unidentified computers using botnet.

Cyber Squatting:
Cyber squatting is the illegal practice of registering an Internet domain name.

Question 42.
Differentiate asymmetric and symmetric algorithms.
Answer:

Asymmetric Symmetric
Different keys are used for encryption and decryption. Same key is used for both encryption and decryption
Speed of encryption or decryption is comparatively slow. Speed of encryption or decryption is very fast.
Algorithms like RSA, ECC, DSA use asymmetric key encryption. Algorithms like DES, AES, RC4 uses symmetric key encryption.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 43.
Write a note on PGP.
Answer:

  1. PGP (Pretty Good Privacy) is developed by Phil Zimmermann in 1991.
  2. It is a decentralized encryption program that provides cryptographic privacy and authentication for data communication.
  3. PGP encryption uses a serial combination of bashing, data compression, symmetric – key cryptography and asymmetric – key cryptography and works on the concept of ‘Web of Trust’.

Question 44.
Explain 3D secure payment protocols.
Answer:

  1. 3-D secure is a secure payment protocol on the Internet.
  2. It was developed by visa to increase the level of transaction security, and it has been adapted by Master card.
  3. It gives a better authentication of the holder of the Payment Card, during purchases made on websites.
  4. The basic concept of this protocol is to link the financial authorization process with an online authentication system.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 45.
Write about dimensions of E-Commerce Security.
Answer:
The dimensions of E – Commerce security elements are:

  • Authenticity – Conforming genuineness of data shared.
  • Availability – Prevention against data delay or removal.
  • Completeness – Unification of all business information.
  • Confidentiality – Protecting data against unauthorized disclosure.
  • Effectiveness – Effective handling of hardware, software and data.
  • Integrity – Prevention of the data being unaltered or modified.
  • Non – repudiation – Prevention against violation agreement after the deal.
  • Privacy – Prevention of customers personal data being used by others.
  • Reliability – Providing a reliable identification of the individuals or businesses.
  • Review ability – Capability of monitoring activities to audit and track the operations.

Question 46.
Explain encryption technology.
Answer:
Encryption technology is an effective information security protection.

  1. It is defined as converting a plain text into meaningless cipher text using encryption algorithm thus ensuring the= confidentiality of the data.
  2. The encryption or decryption process use a key to encrypt or decrypt the data.
  3. Now, two encryption technologies are widely used. They are symmetric key encryption system and an asymmetric key encryption system.
  4. The Data Encryption Standard (DES) is a symmetric key data encryption method.
  5. DES is the typical block algorithm that takes a string of bits of clear’ text with a fixed length and through a series of complicated operations, transforms it into another encrypted text of the same length.
  6. Asymmetric encryption also called as RSA (Rivest – Shamir – Adleman) algorithm.
  7. RSA uses public – key authentication and digital signatures.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 47.
Differentiate digital signatures and digital certificates.
Answer:

Digital Signature

 Digital Certificate

A digital signature is a mechanism that is used to verify that a particular digital document, message or transaction is authentic. A digital certificate is a computer file which officially approves the relation between the holder of the certificate and a particular public key.
These are used to verify the trustworthiness of the data being sent. These are used to verify the trustworthiness of the sender.
This is to ensure that a data remain secure from the point. It binds a digital signature to an entity.
It provides authentication, non repudiation and integrity. It provides authentication and security.
A digital signature is created using a Digital Signature Standard (DSS). A digital certificate works on the principles of public key cryptography standards (PKCS).
The document is encrypted at the sending end and decrypted at the receiving end using asymmetric keys. A digital certificate consist of certificate’s owner name and public key, expiration date, a Certificate Authority’s name , a Certificate Authority’s digital signature.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 48.
Define Secure Electronic Transaction (SET) and its features.
Answer:

  1. Secure Electronic Transaction (SET) is a security protocol for electronic payments with credit cards, in particular via the Internet.
  2. SET was developed in 1996 by VISA and Master Card, with the participation of GTE, IBM, Microsoft and Netscape.
  3. SET is based on the use of digital signatures and the encryption of transmitted data with asymmetric and symmetric encryption algorithms.
  4. SET system incorporates the following key features.
    (a) Using public key encryption and private key encryption ensure data confidentiality.
    (b) Use information digest technology to ensure the integrity of information.
    (c) Dual signature technology to ensure the identity of both parties in • the transaction.

Question 49.
Briefly explain SSL.
Answer:

  1. SSL (Secure Sockets Layers) is the most common cryptographic protocol..
  2. SSL is a hybrid encryption protocol for securing transactions over the Internet.
  3. The SSL Standard was developed by Netscape in collaboration with Master card, Bank of America, MCI and Silicon Graphics.
  4. The SSL system acts as an additional layer, to ensure the security of data, located between the application layer and the transport layer in TCP.
  5. All browsers in the market support SSL and most of the secure communications are proceeded through this protocol.
  6. SSL works completely hidden for the user, who does not have to intervene in the protocol.
  7. The user has to do is make sure the URL starts with http:// instead of http:// where S-means secured.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 50.
Identifying the security protocols used in the particular payment gateway.
• Create a chart for a payment process.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems 1
TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems 2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 51.
Describe the security technology used in that payment method.
Answer:
To secure online payments:
(i) SSL Protocol:
The SSL protocol in our website shows website is secure.

(ii) PCI Compliance:
PCI Compliance helps improve security. They decrease the risk of payment and data fraud.

(iii) Tokenization:
It is the technology that makes it easier to improve payment security and provide payment process without vulnerabilities.

(iv) 3D Secure:
It helps prevent fraud in online credit and debit card transactions. It will be extra protection with many benefits.

(v) Address Verification Service:
It requires customers to provide the billing address associated with their credit card.

• Repeat the process for few other payment process.
Mobile E-Wallet (online) payment process:

TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Choose the correct answer:

Question 1.
Which transaction based on network resources have been accepted by the public?
(a) E-Commerce
(b) E-Business
(c) E-sales
(d) Commerce
Answer:
(a) E-Commerce

Question 2.
Which security threats not only result in loss of revenue but also in reputation?
(a) E-Commerce
(b) E-Business
(c) E-sales
(d) All of these
Answer:
(b) E-Business

Question 3.
Which security threats can be accidental or intentional?
(a) E-Commerce
(b) E-Business
(c) Both (a) and (b)
(d) None of these
Answer:
(a) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 4.
Which is cause harm to the computers there by harms the efficient and smooth functioning of E-commerce?
(a) Frauds
(b) Cyber squatting
(c) Viruses
(d) Phishing
Answer:
(c) Viruses

Question 5.
Which has turned to be the best medium for the spread of viruses?
(a) Network
(b) Internet
(c) E-Business
(d) E-Commerce
Answer:
(b) Internet

Question 6.
The intercepting and stealing of online document is called
(a) Information Leakage
(b) Tampering
(c) Payment frauds
(d) Cyber squatting
Answer:
(a) Information Leakage

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 7.
Which is a E-Commerce thread in which a target is contacted by e-mail, telephone or text message?
(a) Frauds
(b) Cyber squatting
(c) Viruses
(d) Phishing
Answer:
(d) Phishing

Question 8.
Which will extract the credit card information and sell the acquired data on black markets?
(a) Malware
(b) SQL
(c) Attacker
(d) All of these
Answer:
(d) All of these

Question 9.
Which is committed to extract the greatest value possible through ATM withdrawals?
(a) Fraud
(b) Malware
(c) SQL
(d) Attacker
Answer:
(a) Fraud

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 10.
What is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server?
(a) DDoS Attack
(b) Fraud
(c) Tampering
(d) Malware
Answer:
(a) DDoS Attack

Question 11.
Which attack will be conducted from numerous unidentified computers using botnet?
(a) DDoS
(b) Fraud
(c) Tampering
(d) Malware
Answer:
(a) DDoS

Question 12.
Which attacks is also called as network flooding?
(a) DDoS
(b) Fraud
(c) Tampering
(d) Malware
Answer:
(a) DDoS

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 13.
Which is the illegal practice of registering an Internet domain name?
(a) Tampering
(b) Frauds
(c) Threats
(d) Cyber squatting
Answer:
(d) Cyber squatting

Question 14.
Which is also involve in trading on the reputation and goodwill of such third parties?
(a) Tampering
(b) Cyber squatters
(c) Frauds
(d) Threats
Answer:
(b) Cyber squatters

Question 15.
Which is a variant of cyber squatting?
(a) Tampering
(b) Cyber squatters
(c) Frauds
(d) Typopiracy
Answer:
(d) Typopiracy

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 16.
Which refers to unauthorized intrusion into a computer?
(a) Hacking
(b) Viruses
(c) Threats
(d) Malware
Answer:
(a) Hacking

Question 17.
Which is conforming genuineness of data shared in E-Commerce security?
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(a) Authenticity

Question 18.
Which is the prevention against data delay or removal?
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(b) Availability

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 19.
Which is the unification of all business information in E-Commerce security0
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(c) Completeness

Question 20.
Which is protecting data against unauthorized disciosura in E-Comrr-“-ce security?
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(d) Confidentiality

Question 21.
Which is the effective handling of hardware, software and data in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(a) Effectiveness

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 22.
Which is the prevention of the data being unaltered or modified in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(b) Integrity

Question 23.
Which is the prevention against violation agreement after the deal in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(c) Non-repudiation

Question 24.
Which is the prevention of customers’ personal data being used by others in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(d) Privacy

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 25.
Which is providing a reliable identification of the businesses in E-Commerce security?
(a) Integrity
(b) Privacy
(c) Reliability
(d) Review ability
Answer:
(c) Reliability

Question 26.
Which is the capability of monitoring activities to audit and track the operations in E-Commerce security?
(a) Integrity
(b) Privacy
(c) Reliability
(d) Review ability
Answer:
(d) Review ability

Question 27.
Which is a type of Malware that usually encrypt ail the files in a target’s “computer?
(a) Ransomware
(b) Virus
(c) Malware
(d) All of these
Answer:
(a) Ransomware

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 28.
How many types of E-Commerce transactions are classified?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 29.
Which is the technology an effective information security protection?
(a) Encryption
(b) Authentication
(c) Authentication protocols
(d) All of these
Answer:
(a) Encryption

Question 30.
At present, How many types of encryption technologies used?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 31.
Which is a symmetric key data encryption method?
(a) Data Encryption Standard (DES)
(b) Encryption
(c) Authentication
(d) Protocol
Answer:
(a) Data Encryption Standard (DES)

Question 32.
Expansion of FIPS:
(a) First Information Processing Standard
(b) Federal Information Processing Standard
(c) File Information Processing Standard
(d) Format Information Processing Standard
Answer:
(b) Federal Information Processing Standard

Question 33.
How many bits are apparently used in Data Encryption Standard (DES) key?
(a) 64
(b) 32
(c) 16
(d) 128
Answer:
(a) 64

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 34.
Which method is a method for converting a plain text with a public key?
(a) Public key Encryption
(b) Symmetric Encryption
(c) Asymmetric Encryption
(d) All of these
Answer:
(a) Public key Encryption

Question 35.
Which can be achieved through digital signatures and digital certificates?
(a) Authentication
(b) Integrity
(c) Non-repudiation
(d) All of these
Answer:
(d) All of these

Question 36.
Which key is same key is used for both encryption and decryption?
(a) Symmetric key
(b) Asymmetric key
(c) (a) or (b)
(d) (a) and (b)
Answer:
(a) Symmetric key

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 37.
Which is different keys are used for encryption and decryption?
(a) Symmetric key
(b) Asymmetric key
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) Asymmetric key

Question 38.
Which is also known as Public Key Certificate?
(a) Digital certificates
(b) Digital signature
(c) Digital banner
(d) All of these
Answer:
(a) Digital certificates

Question 39.
Which is an electronic document used to prove the ownership of a public key?
(a) Digital cash
(b) Digital Signature
(c) Digital Certificates
(d) All of these
Answer:
(c) Digital Certificates

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 40.
Which function is similar to the functions of identification cards such as driving licenses?
(a) Digital cash
(b) Digital Signature
(c) Digital Certificates
(d) All of these
Answer:
(c) Digital Certificates

Question 41.
Digital certificates are issued by recognized
(a) Certification Authorities (CA)
(b) System Analyst
(c) Special Officer (SO)
(d) Digital Department
Answer:
(a) Certification Authorities (CA)

Question 42.
Which is a mechanism that is used to verify that a particular digital document?
(a) Digital signature
(b) Digital certificates
(c) (a) or (b)
(d) (a) and (b)
Answer:
(a) Digital signature

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 43.
Which format to provide the highest levels of security and universal acceptance?
(a) Public Key Infrastructure (PKI)
(b) Private key
(c) Common key
(d) All of these
Answer:
(a) Public Key Infrastructure (PKI)

Question 44.
Which are widely used for avoiding forging or tampering of important documents?
(a) Digital certificates
(b) Digital signatures
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) Digital signatures

Question 45.
Which is used as dual signatures to ensure the privacy?
(a) PKI
(b) GTE
(c) SET
(d) SSL
Answer:
(c) SET

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 46.
The most common cryptographic protocol is
(a) Secure Sockets Layers (SSL)
(b) Transport Layer Security (TLS)
(c) Secure Electronic Transaction (SET)
(d) Pretty Good Privacy (PGP)
Answer:
(a) Secure Sockets Layers (SSL)

Question 47.
Which is a hybrid encryption protocol for securing transactions over the Internet?
(a) Secure Sockets Layers (SSL)
(b) Transport Layer Security (TLS)
(c) Secure Electronic Transaction (SET)
(d) Pretty Good Privacy (PGP)
Answer:
(a) Secure Sockets Layers (SSL)

Question 48.
Which system acts as an additional layer, to ensure the security of data?
(a) PGP
(b) SET
(c) TLS
(d) SSL
Answer:
(d) SSL

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 49.
Which was renamed as Transport Layer Security (TLS) in 2001?
(a) Secure Sockets Layers (SSL)
(b) Transport Layer Security (TLS)
(c) Secure Electronic Transactions (SET)
(d) Pretty Good Privacy (PGP)
Answer:
(a) Secure Sockets Layers (SSL)

Question 50.
Which is a secure payment protocol on the Internet?
(a) 2-D secure
(b) 3-D secure
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) 3-D secure

Question 51.
Which was developed by visa to increase the level of transaction security?
(a) 2-D secure
(b) 3-D secure
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) 3-D secure

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 52.
Which is an additional security layer for online credit or debit card transactions?
(a) 2-D secure
(b) 3-D secure
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) 3-D secure

Question 53.
Which is the encrypted data usually the output of an encryption algorithm?
(a) 3-D secure
(b) Cipher text
(c) Decipher
(d) Cracker
Answer:
(b) Cipher text

Question 54.
A person who breaks computer network’s security maliciously to gain access to critical data ________
(a) Cipher text
(b) Cryptanalysis
(c) Cracker
(d) Cyber squatting
Answer:
(c) Cracker.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 55.
Which is standard algorithm for decrypting data?
(a) Cipher text
(b) Cryptanalysis
(c) Cracker
(d) Desipher
Answer:
(d) Desipher

Question 56.
Match the following: (E-Commerce Threats)

(A) Payment Fraud (i) ATM withdrawals
(B) Fraud (ii) Network flooding
(C) DDoS (iii) Friendly Fraud
(D) Typopiracy (iv) Cyber squatting

(a) (A) – (iii); (B) – (i); (C) – (ii): (D) – (iv)
(b) (A) – (i); (B) – (ii); (C) – (iv); (D) – (iii)
(c) (A) – (ii): (B) – (iii): (C) – (i); (D) – (iv)
(d) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (ii): (D) – (iv)

Question 57.
Match the following:

(A) Encryption technology (i) Data Encryption Standard
(B) Symmetric key (ii) Security protection
(C) Asymmetric key (iii) Non repudiation
(D) Authentication technology (iv) Public key

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
Answer:
(d) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 58.
Match the following:

(A) Digital certificates (i) Hardware
(B) Digital signature (ii) Phil Zimmermann
(C) Pretty Good Privacy (iii) Digital document
(D) Security token (iv) Certification Authority

(a) (A) – (iv); (B) – (ii); (C) – (iii); (B) – (i)
(b) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 59.
Match the following:

(A) Secure Electronic Transaction (i) Secure Socket Layer
(B) Secure Sockets Layer (ii) VISA
(C) Transport Layer Security (iii) Security protocol
(D) 3 – D Secure (iv) Hybrid encryption

(a) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
(b) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (iii); (B) (i); (C) – (ii); (D) – (iv)
Answer:
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)

Question 60.
Match the following:

(A) Message digest (i) Input Chip
(B) One Time Password (OTP) (ii) Hashing formula
(C) PIN (Personal Identification Number) (iii) Dynamic password
(D) Plain text (iv) Static number

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
Answer:
(b) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (I)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 61.
Choose the Incorrect pair:
(a) Phishing – Threat
(b) OTP – Password
(c) Malware – Viruse type
(d) Botnet – Tampering
Answer:
(d) Botnet – Tampering

Question 62.
Choose the Incorrect pair:
(a) Ransomware – Hardware
(b) domain – google.com
(c) Typopiracy – Cyber squatting
(d) Hacking – Intrusion
Answer:
(a) Ransomware – Hardware

Question 63.
Choose the Incorrect pair:
(a) Clear text – Plain text
(b) Triple DES – DESede
(c) Same key – Asymmetric key
(d) RSA – Algorithm
Answer:
(c) Same key – Asymmetric key

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 64.
Choose the correct pair:
(a) e-muthra – Symmetric key
(b) Safe script – Asymmetric key
(c) Digital signature – Public key Infrastructure
(d) SET – Cracker
Answer:
(c) Digital signature – Public key Infrastructure

Question 65.
Choose the correct pair:
(a) Secured Sockets Layers – Transport Layers Security
(b) 3-D Secure – URL
(c) Decipher – Website Address
(d) Domain name – Algorithm
Answer:
(a) Secured Sockets Layers – Transport Layers Security

Question 66.
Choose the incorrect statement:
(a) Friendly fraud mean when customer demands false reclaim or refund.
(b) Clean fraud mean when a stolen credit card is used to make a purchase.
(c) Triangulation fraud mean fake online shops offering cheapest price and collect credit card data
(d) Cyber squatting is the legal practice of registering an Internet domain – name.
Answer:
(d) Cyber squatting is the legal practice of registering an Internet domain – name.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 67.
Choose the incorrect statement:
(a) The Data Encryption Standard (DES) is a asymmetric encryption algorithm.
(b) Encryption technology is an effective information security protection.
(c) Cipher text using encryption algorithm.
(d) The encryption or decryption process use a key to encrypt or decrypt the data.
Answer:
(a) The Data Encryption Standard (DES) is a asymmetric encryption algorithm.

Question 68.
Choose the incorrect statement:
(a) Same key is used for both encryption and decryption in symmetric key encryption.
(b) The speed of encryption or decryption is very slow in symmetric key encryption.
(c) Plain text and cipher text are of same size in symmetric key encryption.
(d) Symmetric key encryption that provides confidentiality.
Answer:
(b) The speed of encryption or decryption is very slow in symmetric key encryption.

Question 69.
Choose the correct statement:
(a) A digital certificate also known as Public Key Certificate.
(b) Digital certificates are issued by Government of India.
(c) Digital signature is to ensure that a data remain unsecure.
(d) A digital signature is created using digital documents.
Answer:
(a) A digital certificate also known as Public Key Certificate.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 70.
Choose the correct statement:
(a) 3-D secure is a Unsecure Payment Protocol on the Internet.
(b) The most common cryptographic protocol is Secure Sockets Layers (SSL)
(c) The SSL Standard was developed by windows.
(d) TLS and SSL are the same in the generation of symmetric keys.
Answer:
(b) The most common cryptographic protocol is Secure Sockets Layers (SSL)

Question 71.
Assertion (A):
Viruses cause harm to the computers.
Reason (R):
Viruses destroy all the information stored in a computer.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(a) Both A and R are true, and R is the correct explanation for A

Question 72.
Assertion (A):
Hacking refers to unauthorized intrusion into a computer.
Reason (R):
Typopiracy is a variant of cyber squatting.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 73.
Assertion (A):
Ransomware is a type of Malware.
Reason (R):
A person who breaks computer network security is called cipher text.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(c) A is true, But R is false.

Question 74.
Assertion (A):
Digital certificates are provides non-repudiation and integrity.
Reason (R):
Digital certificates provides authentication and security.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(d) A is false, But R is True.

Question 75.
Assertion (A):
PIN is a dynamic password that is valid for one login session.
Reason (R):
OTP is a static number that is assigned to consumers.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 76.
Pick the odd one out.
(a) TDES
(b) 3DES
(c) DESede
(d) DDoS
Answer:
(d) DDoS

Question 77.
Pick the odd one out.
(a) Hacking
(b) Ransomware
(c) Tampering
(d) Malware
Answer:
(c) Tampering

Question 78.
Pick the odd one out.
(a) DES
(b) RSA
(c) ECC
(d) DSA
Answer:
(a) DES

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 79.
Pick the odd one out.
(a) NIC
(b) AES
(c) e-mudhra
(d) MTNL
Answer:
(b) AES

Question 80.
Pick the odd one out.
(a) Domain Name
(b) Acquirer Domain
(cj Issuer Domain
(d) Interoperability Domain
Answer:
(a) Domain Name

Question 81.
In E-Commerce, when a stolen credit card is used to make a purchase it is termed as:
(a) Friendly fraud
(b) Clean fraud
(c) Triangulation fraud
(d) Cyber squatting
Answer:
(b) Clean fraud

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 82.
Which of the following is not a security element involved in E-Commerce?
(a) Authenticity
(b) Confidentiality
(c) Fishing
(d) Privacy
Answer:
(c) Fishing

Question 83.
Asymmetric encryption is also called as:
(a) Secure Electronic Transaction
(b) Certification Authority
(c) RSA algorithm
(d) Payment Information
Answer:
(c) RSA algorithm

Question 84.
The security authentication technology does not include:
(i) Digital Signatures
(ii) Digital Time Stamps
(iii) Digital Technology
(iv) Digital Certificates
(a) (i), (ii) and (iv)
(b) (ii) and (iii)
(c) (i), (ii) and (iii)
(d) all the above
Answer:
(b) (ii) and (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 85.
PGP stands for:
(a) Pretty Good Privacy
(b) Pretty Good Person
(c) Private Good Privacy
(d) Private Good Person
Answer:
(a) Pretty Good Privacy

Question 86.
__________ for securing crsen cards transactions via the Internet.
(a) Secure Electronic Transaction (SET)
(b) Credit Card Verification
(c) Symmetric Key Encryption
(d) Public Key Encryption
Answer:
(a) Secure Electronic Transaction (SET)

Question 87.
Secure Electronic Transaction (SET) was developed in:
(a) 1999
(b) 1996
(c) 1969
(d) 1997
Answer:
(b) 1996

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 88.
The websites secured by Secure Socket Layer protocols can be identified using:
(a) html:/7 .
(b) http://
(c) htmls://
(d) https://
Answer:
(d) https://

Question 89.
3-D Secure, a protocol was developed by:
(a) Visa
(b) Master
(c) Rupay
(d) PayTM
Answer:
(a) Visa

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 90.
Which of the following is true about Ransomware?
(a) Ransomware is not a subset of malware
(b) Ransomware deletes the file instantly
(c) Typopiracy is a form of ransomware
(d) Hackers demand ransom from the victim
Answer:
(b) Ransomware deletes the file instantly

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 1.
What are used to transfer documents in EDI?
Answer:
The transfer of documents such as delivery notes, invoices, purchase orders, advance ship notice, functional acknowledgments etc…

Question 2.
What are EDI includes data exchange?
Answer:
EDI includes data exchange between buyers and sellers, trade partners, and also internal data exchange within departments of a company.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 3.
What are internationally accepted EDI standard?
Answer:
There are many internationally accepted EDI standard, for example EDIFACT, XML, ANSI ASC X12 etc…

Question 4.
Who was father of EDI?
Answer:

  • Ed Guilbert is called as the Father of EDI.
  • Ed Guilbert with his team developed the first standardized system for business documents.

Question 5.
What is the purpose of EDI?
Answer:

  1. EDI will smoothen the business transactions and increase the profit
  2. EDI made ordering and shipping faster, more organized, and less expensive.
  3. EDI documents were transmitted electronically by the use of Radio teletype, telex messages, or telephone.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 6.
Who were exchanging electronic messages in late 1960s?
Answer:
In late 1960s, shipping line, railroads, airlines, and truck companies of USA were exchanging electronic messages for their business.

Question 7.
Expand the following:
(i) TDCC,
(ii) EDIA.
Answer:
(i) TDCC: Transportation Data Coordinating Committee.
(ii) EDIA: Electronic DATA Interchange Association.

Question 8.
Short note on first EDI messages.
Answer:

  1. The first EDI messages was sent in 1965 from the Holland – American steamship line to Trans-Atlantic shipping company using telex messages.
  2. The computer had sent a full page of information in roughly two minutes.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 9.
What is Direct EDI?
Answer:

  1. A Direct EDI also called as point-to-point EDI.
  2. It establishes a direct connection between various business stakeholders and partners individually.

Question 10.
Write the short note on EDI via VAN.
Answer:
EDI (Electronic Data Interchange) via VAN'(Value Added Network) is where EDI documents are transferred with the support of third party network service providers.

Question 11.
What is VAN?
Answer:

  1. VAN (Value Added Network) is a company, that is based on its own network, offering EDI services to other businesses.
  2. A Value Added Network acts as an intermediary between trading partners.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 12.
What are protocols used for exchange of EDI based documents?
Answer:
The protocols used for exchange of EDI based documents like FTP / VPN, SFTP and FTPS.

Question 13.
What is an Mobile EDI?
Answer:

  1. When smart phones or other such hanheld devices are used to transfer EDI documents it is called as mobile EDI.
  2. Mobile EDI applications considerably increase the speed of EDI transactions.

Question 14.
What is EDI standards?
Answer:

  1. EDI standard is the most critical part of the entire EDI.
  2. EDI is the data transmission and information exchange in the form of an agreed message format, it is important to develop a unified EDI standard.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 15.
What is Integrated EDI standard?
Answer:
The European region has also developed an Integrated EDI standard known as GTDI (Guideline for Trade Data Interchange).

Question 16.
What are two regional EDI standards?
Answer:
ANSI X12 and GTDI have become the two regional EDI standards in North America and Europe respectively.

Question 17.
What is international EDI standard?
Answer:
The United Nations Economic Commission for Europe.(UNIECE / WP.4) hosted the task of the development of international EDI standards.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 18.
What are most widely used EDI message standard?
Answer:

  1. The most widely used EDI message standards are the United Nations EDIFACT and the ANSI X12. ,
  2. UN / EDIFACT is officially proposed.

Question 19.
What are EDIFACT includes?
Answer:
EDIFACT includes a set of internationally agreed standards, catalogs, and . guidelines for electronic exchange of structured data between independent computer systems.

Question 20.
What is EDI Interchange?
Answer:

  1. EDI Interchange is also called as envelope. The top level of EDIFACT structure is Interchange.
  2. An interchange may contain multiple messages. It starts with UNB and end with UNZ.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 21.
What is EDIFACT segment?
Answer:

  1. EDIFACT segment is the subset of message. A segment is a three character alpha-numeric code.
  2. Segments may contain one, or several related user data elements

Question 22.
What is EDIFACT elements?
Answer:
The EDIFACT elements are the piece of actual data. These data elements may be either simple or composite.

Question 23.
Which is represent documents other than monetary instruments?
Answer:

  1. Represent documents other than monetary instruments by According to the National Institute of Standard and Technolcv.
  2. EDI is the computer-to-computer interchange of strictly formatted messages.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 24.
What is feature of UN created the EDIFACT?
Answer:

  • UN created the EDIFACT to assist with the global reach of technology in E-Commerce.
  • Direct EDI is also called as point-to-point EDI.
  • Every EDI message consist of six uppercase English alphabets.

Question 25.
What is purchase order?
Answer:
A commercial and first official document issued by a buyer to a seller indicating types, quantities, and agreed prices for products or services.

Question 26.
What are the aspects mainly divided by the EDI standard?
Answer:
Basic standards, Code standards, Message standards, Document standards, Management standards, Application standards, Communication standards, and Security standards.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 27.
Which is affiliated to the UN Economic Commission for Europe (UNECE)?
Answer:

  1. A Cross Industry, Standard data format of electronic data for commercial transactions.
  2. Maintenance and further development of this standard goes through the United Nations Center for Trade Facilitation and Electronic Business (UN/CEFACT).
  3. These are affiliated to the UN Electronic Commission for Europe (UNECE).

Question 28.
Explain the EDIFACT segment tables.
Answer:

  1. EDIFACT segment table lists the message tags. It contains the tags, tag names, requirements designator and repetitation field.
  2. The requirement designator may be mandatory (M) or conditional (C). The (M) denotes that the segment must appear atleast once.
    The (C) denotes that the segment may be used if needed.

Question 29.
Explain the EDIFACT message.
Answer:
EDIFACT message has two types, they are service messages and Data exchange.
(i) Service messages: To confirm / reject a message, CONTRL and APERAK messages are sent.

  • CONTRL – Syntax check and confirmation of arrival of message
  • APERAK – Technical error messages and acknowledgement.

(ii) DATA Exchange:

  • CREMUL – Multiple Credit advice
  • DELFOR – Delivery Forecast.
  • IFTMBC – Booking Configuration

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 30.
Write about History of Electronic Data Interchange (EDI).
Answer:

  1. Today, many companies and organizations use computers to store and process data.
  2. Different organizations use different applications systems, and the format of the data generated is not the same.
  3. When organizations need to communicate for their business needs they . have to re-key.
  4. This was time consuming and a major obstacle in the business operations.
  5. In order to solve this problem, some enterprises have agreed a specific standard format, which can be regarded as the origin of EDI application concept.

Question 31.
Explain EDI layers with its functions.
Answer:
EDI layers describes how data flows from one computer to another.

  1. EDI semantic layer – Application level services.
  2. EDI standard layer – EDIFACT business form standards.
    – ANSI X12 business form standards.
  3. EDI Transport layer – Electronic Mail X.435, MIME.
    – Point to point FTP, TELNET.
    – World Wide Web HTTP.
  4. Physical layer – Dial-up line, internet, I-way

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 32.
Explain with suitable example an EDIFACT message.
Answer:
Eg: DTM + 11 : 200 606 200 730 : 203
In this example, the whole line is called segment.
The meaning of each code is as follows:

  1. DTM is the segment identifier and it indicates that the following data is date / time information.
  2. 11 is a data element. A qualifier describes what kind of event is meant. The code 11 means time of dispatch / delivery of goods.
  3. 200 606 200 730 is another element. Here it represents the date in the format CCYYMMDDHHMM.
    Here,
    CC – Century, YY – year, MM – Month, DD – Date, HH – hour, MM – Minute.
  4. 203 is also an element. 203 is an identifier for the date format.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 33.
Define EDI.
Answer:

  1. EDI (Electronic Data Interchange) is the exchange of business documents between one trade partner and another electronically.
  2. It is transferred through a dedicated channel or through the Internet in a predefined format without much human intervention.

Question 34.
List few types of business documents that are transmitted through EDI.
Answer:
Direct EDI, EDI via VAN, EDI via FTP / VPN, SFTP, FTPS, Web EDI, Mobile EDI etc…

Question 35.
What are the four major components of EDI?
Answer:

  1. Standard Document Format
  2. Translator and Mapper
  3. Communication Software
  4. Communication Network

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 36.
What is meant by directories in EDIFACT?
Answer:

  1. EDIFACT (Electronic Data Interchange for Administration, Commerce and Transport) is an International EDI-Standard developed under the supervision of the United Nations.
  2. EDIFACT includes a set of internationally agreed standards, catalogs and guidelines for electronic exchange of structured data between independent computer systems.

Question 37.
Write a note on EDIFACT subsets.
Answer:
(i) Due to the complexity, branch-specific subsets of EDIFACT have developed.
(ii) These sunsets of EDIFACT include only the functions relevant to specific user groups.
Eg: CEFIC – Chemical industry
EDIFORN – Furniture industry
EDIGAS – Gas business

Question 38.
Write a short note on EDI.
Answer:

  1. EDI (Electronic Data Interchange) is the exchange of business documents between one trade partner and another electronically.
  2. It is used to transfer documents such as delivery notes, invoices, purchase orders, advance ship notice, functional acknowledgements etc…
  3. EDI includes data exchange between buyers and sellers, trade partners, and also internal data exchange within departments of a company.
  4. There are many internationally accepted EDI standard. Eg: EDIFACT, XML, ANSI ASCI2, etc., EDI is paperless trade.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 39.
List the various layers of EDI.
Answer:
Electronic data interchange (EDI) architecture specifies four different layers
namely,
(i) Semantic layer
(ii) Standards translation layer
(iii) Transport layer
(iv) Physical layer.
These EDI layers describes how data flows from one computer to another.

Question 40.
Write a note on UN/EDIFACT.
Answer:

  1. UN/EDIFACT (United Nations / Electronic Data Interchange for Administration, commerce and Transport) is an International EDI- standard developed under the supervision of United Nations.
  2. EDIFACT includes a set of internationally agreed standards, catalogs and guidelines for electronic exchange of structured data between independent computer systems.
  3. UN/EDICACT is a cross-industry, standard data format of electronic data for commercial transactions.
  4. Maintenance and further development of this standard goes through, the United Nations center for Trade Facilitation and Electronic business (UN / CEFACT), which is affiliated to the UN Economic Commission for Europe (UNECE).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 41.
Write a note on EDIFACT message.
Answer:

  1. The basic standardization concept of EDIFACT is that there are uniform message types called United Nations Standard Message (UNSM).
  2. The message types, all of which always have exactly one nickname consisting of six uppercase English alphabets.
  3. The message begins with UNH and end with UNT.
  4. The EDIFACT messages are service messages and data exchange.

Question 42.
Write about EDIFACT separators.
Answer:
EDIFACT has the following punctuation marks that are used as standard separators.

  • (’) Apostrophe – Segment terminator
  • (+) Plus sign – Segment tag and data element separator
  • (:) Colon – Component data element separator.
  • (?) Question mark – Release character.
  • (.) Period – Decimal point.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 43.
Briefly explain various types of EDI.
Answer:
The types of EDI were Constructed based on how EDI communication
connections and the conversions were organized.
The EDI types are –
(i) Direct EDI
(ii) EDI via VAN
(iii) EDI via FTP / VPN, SFTP, FTPS
(iv) WEB EDI
(v) Mobile EDI

(i) Direct EDI / Point-to-point:
Direct EDI is also called as point-to-point EDI. It establishes a direct connection between various business stake¬holders and partners individually.

(ii) EDI via VAN:
EDI via VAN (Value Added Network) is where EDI documents are transferred with the support of third party network service providers.

(in) EDI via FTP/VPN, SFTP, FTPS:
When protocols like FTP / VPN, SFTP and FTPS are used for exchange of EDI based documents through the Internet or Intranet it is called as EDI via FTP/VPN, SFTP, FTPS.

(iv) Web EDI:
Web based EDI conducts EDI using an web browser via the Internet. Web based EDI is easy and convenient for small and mediun organizations.

(v) Mobile EDI:
When smart phones or other such handheld devices ar used to transfer EDI documents it is called as Mobile EDI.
Mobile EDI applications considerably increase the speed of EDI transactions.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 44.
What are the advantages of EDI?
Answer:

  1. EDI was developed to solve the problems inherent in paper-based transaction processing and in other forms of electronic communication.
  2. EDI system offers a company greater control over its supply chain and allow it to trade more effectively.
  3. It also increases productivity and promotes operational efficiency.
  4. The other advantages of EDI are
    • Improving service to end users.
    • Increasing productivity.
    • Minimizing errors.
    • Slashing response times.
    • Automation of operations.
    • Cutting costs.
    • Integrating all business and trading partners.
    • Providing information on process status.
    • Optimizing financial ratios.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 45.
Write about structure of EDIFACT.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI 1

(i) EDIFACT is a hierarchical structure where the top level is referred to as an interchange, and lower levels contain multiple message.
(ii) The messages consist of segments, which in turn consist of composites.
(iii) Segment table lists the message tags. It contains the tags, tag names, requirements designator and repetitation field.
(iv) The requirement designator may be mandatory (M) or conditional (C).
(v) The (M) denotes that the segment must appear atleast once.
(vi) The (C) denotes that the segment may be used if needed.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 46.
Prepare a chart explaining various types of EDI standards. (Eg: web EDI)
Answer:
EDI standards developers design and publish EDI standard formats for various kinds of documents, such as purchase orders or invoices, that you might exchange with your trading partners. Also called messages, transaction sets are groups of segments.

TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI 2

All EDI standards include the following components:
• Element – The smallest component in an EDI standard.
• Segments – Groups of elements.
• Transaction sets – Messages, transaction sets are groups of segments.

(i) EDIFACT:
• Electronic Data Interchange for Administration, Commerce and Transport is the International EDI standard developed under the United Nations.
• The EDIFACT standard provides a set of syntax rules to structure data.

(ii) VAD (Vereinigung and Automobile industries):
The VDA standard used within the European automative industry mainly in Germany.

(iii) ODETTE (Organization for Data Exchange by Tele Transmission in Europe):
The ODETTE standard used within the European automative industry.

(iv) EANCOM:
(EAN + COMmunication) standard messages were developed by GS1, with the support of GS1 UK and other national member organization.
Eancom messages are equivalent of traditional paper business documents that cover master data setup, business transactions, financial documents and reporting.

(v) ANSIX12:
The EDI ANSIX12 standard is most prevalent in the United States and has counterparts used in other parts of the world, like the UN / EDIFACT standard that is the equivalent of EDI ANSIX12 outside the USA.

(vi) HIPAA (Healthcare Insurance Portability and Accountability Act):
HIPAA is used exclusively in the medical community including private practices, hospitals, health insurance, and any other environment dealing with medical records or patient care.

(vii) TRADACOMS:
TRAding DAta COMmunications Standard is the intema-tional EDI standard developed by the UK ANA (Article Numbering Association).
TRADACOMS support requires the ITX pack for supply chain EDI. Other EDI standards ar RosettaNet, SWIFT, VICS etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Choose the correct answer:

Question 1.
Which is the exchange of business documents between one trade partner and another electronically?
(a) Electronic Data Interchange (EDI)
(b) Electronic Data Interchange Association (EDLA)
(c) UN Economic Commission for Europe (UNECE)
(d) UN Standard Message (UNSM)
Answer:
(a) Electronic Data Interchange (EDI)

Question 2.
EDI is:
(a) Electronic transfer
(b) Paperless payment
(c) Electronic payment
(d) Paperless trade
Answer:
(d) Paperless trade

Question 3.
Which of the following one is internationally accepted EDI standard?
(a) EDIFACT
(b) XML
(c) ANSI ASCXI2
(d) All of these
Answer:
(d) All of these

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 4.
Expansion of the TDCC is:
(a) Transportation Data Coordinating Committee
(b) Transmitted Data Coordinating Committee
(c) Transfer Data Coordinating Committee
(d) Transaction Data Coordinating Committee
Answer:
(a) Transportation Data Coordinating Committee

Question 5.
Who develop EDI standard format?
(a) EDIA
(b) TDCC
(c) EDIFACT
(d) ANSI
Answer:
(b) TDCC

Question 6.
The First EDI messages was sent in 1965 from:
(a) America-Canada
(b) England-Holland
(c) France-Germany
(d) Holland-America
Answer:
(d) Holland-America

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 7.
Direct EDI is also called as:
(a) point-to-point
(b) EDI via VAN
(c) Mobile EDI
(d) All of these
Answer:
(a) point-to-point

Question 8.
Which network is a company, that is based on its own network, offering EDI services?
(a) Value Added Network (VAN)
(b) Direct EDI
(c) Web EDI
(d) Mobile EDI
Answer:
(a) Value Added Network (VAN)

Question 9.
Which network acts as an intermediary between trading partners?
(a) Web EDI
(b) Mobile EDI
(c) Direct EDI
(d) Value Added Network (VAN)
Answer:
(d) Value Added Network (VAN)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 10.
Which networks are the allocation of access rights and providing high (data security?
(a) Value Added Network (VAN)
(b) Web EDI
(c) Mobile EDI
(d) Direct EDI
Answer:
(a) Value Added Network (VAN)

Question 11.
Which EDI is easy and convenient for small and medium organisations?
(a) Mobile based
(b) EDI based
(c) Web based
(d) All of these
Answer:
(c) Web based

Question 12.
Which was developed to solve the problems inherent in paper-base d transaction processing?
(a) EDI
(b) VPN
(c) FTP
(d) SFTP
Answer:
(a) EDI

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 13.
Which system offers a company greater control over its supply chain and allow it to trade more effectively?
(a) EDI
(b) VPN
(c) FTP
(d) SFTP
Answer:
(a) EDI

Question 14.
How many layers specifies in Electronic data interchange architecture?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 15.
How many major components in EDI?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 16.
The most widely used EDI message standards are the United Nations:
(a) EDIFACT
(b) ANSIX12
(c) (a) and (b)
(d) TDCC
Answer:
(c) (a) and (b)

Question 17.
Which is a hierarchical structure where the top level is referred to as an interchange?
(a) EDIFACT
(b)ANSIX12
(c) TDCC
(d) None of these
Answer:
(a) EDIFACT

Question 18.
EDI Interchange is also called as:
(a) message
(b) segment
(c) element
(d) envelope
Answer:
(d) envelope

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 19.
The top level of EDIFACT structure is:
(a) message
(b) segment
(c) Interchange
(d) envelope
Answer:
(c) Interchange

Question 20.
The basic standardization concept of EDIFACT is that there are uniform message types called:
(a) United Nations Standard Message (UNSM)
(b) United Nations Economic Commission for Europe (UNECE)
(c) American National Standards Institute (ANSI)
(d) National Institute of Standards and Technology (AIST)
Answer:
(a) United Nations Standard Message (UNSM)

Question 21.
The EDIFACT message begins with and ends with:
(a) UNA, UNZ
(b) UNB/UNZ
(c) UNA, UNT
(d) UNH, UNT
Answer:
(d) UNH, UNT

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 22.
Which EDIFACT service message is to sent confirm?
(a) CONTRL
(b) APERAK
(c) CREMUL
(d) DEL FOR
Answer:
(a) CONTRL

Question 23.
Which EDIFACT service message is to reject?
(a) CONTRL
(b) APERAK
(c) CREMUL
(d) DEL FOR
Answer:
(b) APERAK

Question 24.
Which is EDIFACT data exchange in multiple credit advice?
(a) CONTRL
(b) APERAK
(c) CREMUL
(d) DEL FOR
Answer:
(c) CREMUL

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 25.
Which is EDIFACT data exchange in Delivery forecast?
(a) APERAK
(b) CREMUL
(c) DEL FOR
(d) IFTMBC
Answer:
(c) DEL FOR

Question 26.
Which is EDIFACT data exchange for booking confirmation?
(a) APERAK
(b) CREMUL
(c) DEL FOR
(d) IFTMBC
Answer:
(d) IFTMBC

Question 27.
Which is the subset of message?
(a) EDI Interchange
(b) EDIFACT message
(c) EDIFACT segment
(d) EDPFACT elements
Answer:
(c) EDIFACT segment

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 28.
How many alpha nemeric code in EDIFACT segment?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 29.
Which of the following character is used as segment terminator?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (.) Period
Answer:
(a) (’) Apostrophe

Question 30.
Which of the following character is used as segment tag and data element separator?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (?) Question Mark
Answer:
(b) (+) Plus sign

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 31.
Which of the following character is used as component data element separator?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (?) Question Mark
Answer:
(c) (:) Colon

Question 32.
Which of the following character is used as to release character?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (?) Question Mark
Answer:
(d) (?) Question Mark

Question 33.
Which of the following character is used as decimal point?
(a) (,) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (.) Period
Answer:
(d) (.) Period

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 34.
Which are used to separate segments or elements?
(a) Separators
(b) Punctuation marks
(c) Either (a) or (b)
(d) Both (a) and (b)
Answer:
(d) Both (a) and (b)

Question 35.
Which one of the following is a type of tele-printer?
(a) Dot matrix printer
(b) Telex
(c) Laser Printer
(d) All of these
Answer:
(b) Telex

Question 36.
Match the following:

(A) EDI (i) EDI standard
(B) EFT (ii) Standard format
(C) EDIFACT (iii) Paperless trade
(D)TDCC (iv) Paperless Payment

(a) (A) – (iii); (B) – (i); (C) – (ii); (D) – (iv)
(b) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (ii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (iii,); (C) – (i); (D) – (ii)
Answer:
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 37.
Match the following:

(A) Direct EDI(i) Speed of EDI
(B) VAN(ii) Point to point
(C) Web EDI(iii) Third Party Network
(D) Mobile EDI(iv) Small organisaton

(a) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(b) (A) – (ii); (B) – (iii,); (C) – (iv); (D) – (i)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(b) (A) – (ii); (B) – (iii,); (C) – (iv); (D) – (i)

Question 38.
Match the following:

(A) EDIFACT directories(i) UNSM
(B) EDIFACT subsets(ii) Versions of EDIFACT
(C) EDIFACT structure(iii) Branch – specific subset
(D) EDIFACT message(iv) Hierarchical structure

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (iv); (B) – (i); (C) – (ii,); (D) – (iii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (I)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 39.
Match the following:

(A) (‘) Apostrophe(i) Release character
(B) plus sign(ii) Component data
(C) (:) Colon(iii) Segment tag
(D) (?) Question Mark(iv) Segment terminator

(a) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(b) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
(c) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
(d) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
Answer:
(a) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 40.
Match the following (EDIFACT Messages):

(A) CONTROL(i) Technical error
(B) APERAK(ii) Syntax check
(C) CREMUL(iii) Delivery forecast
(D) DELFOR(iv) Multiple credit

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(c) (A) – (ii); (B) – (i); (C) – (iv)- (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
Answer:
(c) (A) – (ii); (B) – (i); (C) – (iv)- (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 41.
Choose the incorrect pair:
(a) XML – EDI standard
(b) Guilbert – Father of EDI
(c) Telex – EDI documents
(d) EDI – Cheque payment
Answer:
(d) EDI – Cheque payment

Question 42.
Choose the incorrect pair:
(a) Direct EDI – EDI component
(b) Point-to-point – Direct EDI
(c) VAN – EDI services .
(d) FTPS – EDI exchange
Answer:
(a) Direct EDI – EDI component

Question 43.
Choose the incorrect pair:
(a) ANSIX12 – EDI standard
(b) Version of EDIFACT – EDIFACT directories
(c) (:) Colon – EDI logical operator
(d) Interchange – Envelope
Answer:
(c) (:) Colon – EDI logical operator

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 44.
Choose the correct pair (EDIFACT message):
(a) CREMUL – Delivery forecast
(b) IFT MBC – Booking confirmation
(c) DEL FOR – Multiple credit
(d) CONTRL – Syntax check
Answer:
(d) CONTRL – Syntax check

Question 45.
Choose the correct pair:
(a) FTP – Network protocol
(b) Invoice – Top level message
(c) Separators – Computer network
(d) Interchange – Standard network
Answer:
(a) FTP – Network protocol

Question 46.
Choose the incorrect statement:
(a) EDI will smoothen the business transactions and increase the profit.
(b) EDI document were transmitted electronically.
(c) USA were exchanging electronic messages for their businesses.
(d) EDI is the exchange of money between two countries.
Answer:
(d) EDI is the exchange of money between two countries.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 47.
Choose the incorrect statements:
(a) Web based EDI conducts using an web browser, via the Internet.
(b) Electronic data interchange architecture specifies six different layers.
(c) Mobile EDI applications increase the speed of EDI transactions.
(d) EDI is improving service to end users.
Answer:
(b) Electronic data interchange architecture specifies six different layers.

Question 48.
Choose the incorrect statement:
(a) The standard is the most critical part of the entire EDI.
(b) The first industry-specific EDI standard was the TDCC.
(c) ANSIX12 is a Internet protocol.
(d) GTDI provides guideline for Trade Data Interchange.
Answer:
(c) ANSIX12 is a Internet protocol.

Question 49.
Choose the correct statement:
(a) The most widely used EDI message standards are the United Nations EDIFACT and ANSIX12.
(b) EDIFACT is a sequential structure where the low level is Interchanged.
(c) Segment Tables lists the EDIFACT subsets.
(d) The messages consists of subsets of EDIFACT.
Answer:
(a) The most widely used EDI message standards are the United Nations EDIFACT and ANSIX12.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 50.
Choose the correct statement:
(a) A EDIFACT segment is a three character alphanumeric code.
(b) The EDIFACT elements are the subset of message.
(c) EDIFACT segment contain only one user data element.
(d) The EDIFACT elements are components data.
Answer:
(a) A EDIFACT segment is a three character alphanumeric code.

Question 51.
Assertion (A):
Ed Guilbert is called as the father of EDI.
Reason (R):
Ed Guilbert with his team developed the first standardized system for business documents.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both A and R are true, and R is correct explanation for A.

Question 52.
Assertion (A):
Direct EDI is also called as point-to-point EDI
Reason (R):
A Value Added Network (VAN) is act as an intermediary between trading partners.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are ture, but R is not the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 53.
Assertion (A):
Mobile EDI applications considerably increase the speed of EDI transactions.
Reason (R):
Web based EDI is easy and convenient for bigger organizations.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 54.
Assertion (A):
The versions of EDIFACT are also called as EDIFACT structure.
Reason (R):
EDIFACT segment table lists the message tags.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Question 55.
Assertion (A):
EDIFACT is the subset of Elements.
Reason (R):
EDIFACT segment is a six character alphanumeric code.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 56.
Pick the odd one out. (EDI Standard)
(a) EDIFACT
(b) XML
(c) ANSIX12
(d) TDCC
Answer:
(d) TDCC

Question 57.
Pick the odd one out (EDITYPES):
(a) Direct EDI
(b) Web EDI
(c) Translator
(d) Mobile EDI
Answer:
(c) Translator

Question 58.
Pick the odd one out (EDI layers):
(a) Mapper
(b) Semantic
(c) Transport
(d) Physical
Answer:
(a) Mapper

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 59.
Pick the odd one out (EDIFACT Subset Example):
(a) CEFIC
(b) UNSM
(c) EDIFURN
(d) EDIGAS
Answer:
(b) UNSM

Question 60.
Pick the odd one out (EDIFACT Data Exchange Message):
(a) CREMUL
(b) DEL FOR
(c) CONTRL
(d) IFTMBC
Answer:
(c) CONTRL

Question 61.
EDI stands for:
(a) Electronic Details Information
(b) Electronic Data Information
(c) Electronic Data Interchange
(d) Electronic Details Interchange.
Answer:
(c) Electronic Data Interchange

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 62.
Which of the following is an internationally recognized standard format for trade, transportation, insurance, banking and customs?
(a) TSLFACT
(b) SETFACT
(c) FTPFACT
(d) EDIFACT
Answer:
(d) EDIFACT

Question 63.
Which is the first industry-specific EDI standard?
(a) TDCC
(b) VISA
(c) Master
(d) ANSI
Answer:
(a) TDCC

Question 64.
UNSM stands for:
(a) Universal Natural Standard Message
(b) Universal Notations for Simple Message
(c) United Nations Standard Message
(d) United Nations Service Message
Answer:
(b) Universal Notations for Simple Message

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 65.
Which of the following is a type of EDI?
(a) Direct EDI
(b) Indirect EDI
(c) Collective EDI
(d) Unique EDI
Answer:
(a) Direct EDI

Question 66.
Who is called as the father of EDI?
(a) Charles Babbage
(b) Ed Guilbert
(c) Pascal
(d) None of the above
Answer:
(b) Ed Guilbert

Question 67.
EDI interchanges starts with and ends with
(a) UNA, UNZ
(b) UNB, UNZ
(c) UNA, UNT
(d) UNB, UNT
Answer:
(b) UNB, UNZ

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 68.
EDIFACT stands for:
(a) EDI for Admissible Commercial Transport
(b) EDI for Advisory Committee and Transport
(c) EDI for Administration, Commerce and Transport
(d) EDI for Admissible Commerce and Trade
Answer:
(c) EDI for Administration, Commerce and Transport

Question 69.
The versions of EDIFACT are also called as:
(a) Message types
(b) Subsets
(c) Directories
(d) Folders
Answer:
(c) Directories

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 70.
Number of characters in an single EDIFACT messages:
(a) 5
(b) 6
(c) 4
(d) 3
Answer:
(b) 6

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Science Important Questions Chapter 6 Control Structures

TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 1.
What are types of alternative or branching statements python provides?
Answer:
There are three types of alternative or branching statements python provides.
They are : –

  1. Simple if statement
  2. if.. .else statement
  3. If.. .elif statement.

Question 2.
Write a note on pass statement.
Answer:
Pass statement in python programming is a null statement. Pass statement when executed by the interpreter it is completely ignored. Nothing happens when pass is executed, it results in no operation.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 3.
What is nested loop structure?
Answer:

  1. A loop placed within another loop is called as nested loop structure.
  2. One can place a while within another while, for within another for.
  3. For within while and while within for to construct such nested loops.

Question 4.
What is range ()?
Answer:

  1. In python, for loop uses the range ( ) function.
  2. The range ( ) function in the sequence to specify the initial, final and increment values.
  3. range () can also take values from string, list, dictionary etc.,
    Eg: range(1, 30, 2)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 5.
What is out put?
Answer:
i = 25
while (i< = 30):
print (i, end =’\t’)
i = i+1
Output: 25 26 27 28 29 30

Question 6.
Write the output of the following segment for word in ‘SCHOOL:
Answer:
print (word, end =”)
Output: SCHOOL

Question 7.
What are keywords to achieve jump statements in python?
Answer:
There are three keywords to achieve jump statements in python, break, continue, pass.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 8.
What is output? for i in “My school”:
Answer:
if i ==”h”:
break
print (i, end=”)
Output: My sc

Question 9.
What are the parameters used print statement in python?
Answer:

  1. Print statement can have end and sep as parameters.
  2. End parameter can be used when we need to give any escape sequences like ‘it’ for tab, ‘in’ for new line and so on.
  3. step parameter can be used to specify any special characters like , (comma), (;) semicolon as parameter between values.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 10.
What is jump statement? What are the types of statement?
Answer:

(i) In python, the jump statement is used to unconditionally transfer the control from one part of the program to another.
(ii) There are three keywords to achieve jump statement is python. They are break, continue and pass.
(a) The break statement terminates the loop containing it.
(b) The continue statement is used to skip the remaining part of a loop.
(c) The pass statement in python programming is a null statement.

Question 11.
Write a python to replace punctuation with whitespace.
Answer:

TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures 1

for i in s :
if i not in punc_list: new_s t?=i
return new s. lower()

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 12.
Write a python program to calculate sum of numbers 1 to 100.
Answer:
n= 100
sum = 0
for counter in range (1, n+1):
sum=sum + counter
print(“Sum of 1 until%d: %d” % (n,sum))
Output:
Sum of 1 until 100: 5050

Question 13.
What is output?
for i in “SCHOOL”
if i ==’C’:
continue
print (i)
Answer:
The output is S.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 14.
Write a python program use for within while loop.
Answer:
i = 1
while (i<=6):
for j in range (1, i):
print (j, end=’\t’)
print (end = ‘\n’) i+=1
output
1
1 2
1 2 3
1 2 3 4
1 2 3 4 5

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 15.
List the control structures in Python.
Answer:
There are three important control structures, they are

  • Sequential
  • Alternative or Branching
  • Iterative or Looping.

Question 16.
Write note on break statement.
Answer:
The break statement terminates the loop containing it. Control of the program flows to the statement immediately after the body of the loop. If the break statement is inside a nested loop, break will terminate the innermost loop.

Question 17.
Write is the syntax of if. else statement.
Answer:
The if…else statements provides control to check the true block as well as the false block.
The syntax of if..else statement is
if < condition> :
statements-block 1
else
statements-block 2

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 18.
Define control structure.
Answer:
A program statement that causes a jump of control from one part of the program to another is called Control structure.

Question 19.
Write note on range ( ) in loop.
Answer:
range ( ) can also take values from string, list dictionary etc, Usually in python, for loop uses the range() function in the sequence to specify the initial, final and increment values. range ( ) generates a list of values starting from start till stop-1.

Question 20.
Write a program to display A
A B
A B C
A B C D
A B C D E
# Program to display Alphabet pattern
Answer:
for i in range (1, 6):
for j in range (65, 65+i):
a = chr (j)
print (a, end= ” “)
print ( )

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 21.
Write note on if..else structure.
The if…else statement provides control to check the true block as well as the false block.
The syntax is
Answer:
if <condition>:
Statement-block 1 else:
Statement-block 2
The condition if is cheeked, if it is true, statement-block 1 is executed, otherwise statement-block 2 is executed.
If-else statement thus provides two possibilities and the condition determines which block is to be executed.
Eg:
# example pgm for if….else
structure
a= int (input (“Type the number”))
if a%2 ==0:
print (a, “is an even number”)
else:
print (a, “is an odd number”)

Question 22.
Using if..else..elif statement write a suitable program to display largest of 3 numbers.
Answer:
# Python program to display largest of three numbers using if..else., elif statement.
a = float (input (“Type first value”))
b = float (input (“Type second value”))
c = float (input (“Type Third value”))
if (a>b and a>c):
print (“{0} is greater than both {1} and {2}”. format (a, b, c))
elif (b>a and b>c):
print (“{0} is greater than both {1} and {2}”. format (b, a, c))
elif (c>a and c>b):
Print (“{0} is greater than both {1} and {2}”. format (c, a, b))
else:
Print (“Either any two values or all the three values are equal”).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 23.
Write the syntax of while loop.
Answer:
The syntax of while loop is
while <condition>:
statement block 1
else:

statement block 2:

Hence the while loop, the condition is any valid Boolean expression returning true or false. The else part of while is optional.
The statement block 1 is kept executed till the condition is true. If the else part is written, it is executed when the condition is tested false.

Question 24.
List the differences between break and continue statements.
Answer:

Break Continue
The break statement terminates the loop containing it. Continue statement unlike the break statement is used to skip the remaining skip the remaining part of a loop and start with next iteration.
A while or for loop will iterate till the condition is tested false, but one can even transfer the control out of the loop with the help of break statement. The working of continue statement in for and while loop start the next iteration.
If break statement is inside a nested loop, break will terminate the innermost loop. The use of continue statement inside the loop, after the continue statement will be executed.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 25.
Write a detail note on for loop.
Answer:
For loop is entry check loop and most comfortable loop.
The condition is checked in the beginning and the body of the loop is executed if it is only true otherwise the loop is not executed.
The syntax is
for counter-variable in sequence:
statement – block 1
else
statement – block 2

But usually python, for loop uses the range ( ) function in the sequence to specify the initial, final and increment values.
range ( ) function generates a list of values starting from start till stop-1
The syntax of range () is range (start, stop, [step])
Where
Start- refers to the initial value
Stop- refers to the final value
Step- refers to the increment value, this is optional part.
Eg:
range (1, 30, 1), when this statement is executed will start the range of values from 1 and end at 29.
range (2, 30, 2), when this statement is executed will start the range of values from 2 and end at 28.
Example for segment as for i in range (2,10, 2):
print (i, end=ll)
The output will be printed as 2 4 6 8.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 26.
Write a detail note on if..else..elif statement with suitable example.
Answer:
if…else statement:
The if…else statement provides control to check the true block as well as the false block.
The syntax is
if <condition>:
Statement-block 1
else
Statement-block 2

If….else statement thus provides two possibilities and the condition determines which block is to be executed.
Eg:
# example program to check odd or even
a = int (input (“Type the number”))
if a%2 = = 0:
print (a, “is an even number”)
else:
print (a, “is an odd number”)
elif statement combines if.. .else –
if…else statements to one if…elif.. .else.
elif can be considered to be abbreviation of else if.
In an if statement there is no limit of elif clause that can be used, but an else clause if used should be placed at the end.
Eg:
m1 = int (input (“Type the first mark”))
m2 = int (input (“Type the second mark”))
avg = (m1+m2)/2
if Avg> =80
print (“Grade A”)
elif avg>=70 and avg< 80
print (“Grade B”)

Question 27.
Write a program to display all 3 digit odd numbers.
Answer:
# To display all 3 digit odd numbers.
L = int (input (“Type the 3 digit starting number”))
U = int (input (“Type the 3 digit ending number”))
For i in range (L, U+l):
If (i %2 !=0):
print (i)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 28.
Write a program to display multiplication table for a given number.
Answer:
# Program to display multiplication table
t= int (input (“Type the table number”))
n= int (input (“Type the steps”))
print (“multiplication Table of’, t)
for i in range (1, b):
print (t, “X”, i, “=”, t*i)

Hands On Experience (TB. P.No. 86):

Question 1.
Write a program to check whether the given character is a vowel or not.
Answer:
# python program to check whether the given character is a vowel or not
ch = input (“ Enter a character”)
if (ch==‘A’ or ch==‘a’ or ch==‘E’ or ch==‘e’ or ch==T or ch==‘i’ or ch==‘O’ or ch==‘o’ or ch==‘U’ or ch==‘u’):
print (ch, “is a vowel”)
else:
print (ch, “is not a vowel”)

Question 2.
Using if..else..elif statement check smallest of three numbers.
Answer:
# Program for check smallest of three numbers.
n1, n2, n3 = map (int, input (“Enter the three numbers”).split (“ ”))
if (n1<n2 and n1< n3):
print (“{ } is smallest, format (nl))
elif (n2< n3):
print (“{ } is smallest, format (n2))
else:
Print (“{ } is smallest, format (n3))

Question 3.
Write a program to check if a number is Positive, Negative or zero.
Answer:
# Program to check if a number is positive, negative or zero.
n = float (input (“Type a number”))
if n > 0:
Print (“Positive number”)
elif n==0:
print (“zero”)
else
print (“ Negative number”)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 4.
Write a program to display Fibonacci series 0 1 12 3 4 5 (upto n terms).
Answer:
# Program to display Fibonacci series
nterms = int (input (“Type How many terms”)
n1 = 0
n2 = 1
count =0
if nterms < =0:
Print (“please type the positive number”)
elif nterms==1:
print (“Fibonacci sequence upto n terms”)
print (n1)
while count < nterms:
print (n1, end =‘,’)
nth = n1+n2
n1=n2
n2=nth
count+=1

Question 5.
Write a program to display sum of natural numbers, upto n.
Answer:
# program to display sum of natural numbers,
n = int (input (“Type the n number”))
s=0
while (n>0):
s +=n
n-= 1
print (“ The sum is”, s)

Question 6.
Write a program to check if the given number is a palindrome or not.
Answer:
# program for given number is a palindrome or not
n = int (input (“Type the number”))
temp = n
rev = 0
while (n>0):
dig=n% 10
rev = rev* 10 + dig
n=n//10
if (tern == rev):
print (“The number is a palindrome”)
else:
print (“The number is not a palindromes”)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 7.
Write a program to print the following pattern
* * * * *
* * * *
* * *
* *
*
Answer:
# program to print the half pyramid pattern,
r = input (“Type number of rows”)
r = int (r)
for i in range (r, o, -1):
for j in range (o., i+1):
print (“*”, end=‘ ’)
print (‘\r’)

Question 8.
Write a program to check if the year is leap year or not.
Answer:
# program to check if the year is leap years or not
y= int (input (“Type, year to be checked”))
if (y%4 ~0 and y% 100 ! = 0 or y%400 =0):
print (“The year is a leap year”)
else:
print (“The year is not a leap year”).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Choose the best answer:

Question 1.
Which statement allows to execute group of statements multiple times?
(a) loop
(b) continue
(c) print
(d) input
Answer:
(a) loop

Question 2.
Which statement is an entry check loop in python?
(a) while
(b) for
(c) do…while
(d) if…elif
Answer:
(a) while

Question 3.
Which statement is a null statement in python?
(a) break
(b) contime
(c) pass
(d) end
Answer:
(c) pass

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 4.
Match the following:

(i) for (A) branching statement
(ii) while (B) null statement
(iii) if… else (C) looping statement
(iv) pass (D) entry check loop

(a) (i) – C, (ii) – D, (iii) – A, (iv) – B
(b) (i) – C, (ii) – A, (iii) – B, (iv) – D
(c) (i) – B, (ii) – C, (iii) – A, (iv) – D
(d) (i) – B, (ii) – D, (iii) – A, (iv) – C
Answer:
(a) (i) – C, (ii) – D, (iii) – A, (iv) – B

Question 5.
Choose the incorrect pair:
(a) program – set of statements
(b) loop – multiple times
(c) continue – jump statement
(d) pass – skipped statement
Answer:
(d) pass – skipped statement

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 6.
Choose the incorrect statement:
(a) A sequential statement is composed statements.
(b) Simple if is the all decision making statements.
(c) A loop allows to execute the statement one by one.
(d) For loop is the most comfortable loop.
Answer:
(c) A loop allows to execute the statement one by one.

Question 7.
Pick the odd one out:
(a) for
(b) while
(c) pass
(d) if…else
Answer:
(c) pass

Question 8.
Assertion (A):
A sequential statement is composed of a sequence of statement which are executed one after another.
Reason (R):
A code to print your name, address and phone number is an example of sequential statement.
(a) Both A and R are true, And R is the correct explanation for A.
(b) Both A and R are true, But R is not the correct explanation for A
(c) A is true but R is false.
(d) Both A and R are false.
Answer:
(a) Both A and R are true, And R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 9.
Choose the correct pair:
(a) Branching – Alternative
(b) Sequencing – Jumping
(c) Iteration – Sequencing
(d) Indentation – Nested
Answer:
(a) Branching – Alternative

Question 10.
Choose the correct statement.
(a) Pass statement in python programming is a control statement.
(b) Pass statement when executed by the interpreter it is completely ignored.
(c) Pass statement is generally used as a stop the execution.
(d) Pass statement can be used at the top of the program.
Answer:
(b) Pass statement when executed by the interpreter it is completely ignored.

Question 11.
Which of the following is not a type of branching statement?
(a) while
(b) if
(c) if-else
(d) if-elif
Answer:
(a) while

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 12.
for i in range (0, 10, 2), print (I). The output is:
(a) 1, 3, 5, 7, 9
(b) 0, 2, 4, 6, 8
(c) 2, 4, 6, 8, 10
(d) 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Answer:
(b) 0, 2, 4, 6, 8

Question 13.
Which of the following is not a nested loop?
(a) Jump
(b) while
(b) for within if
(d) pass
Answer:
(d) pass

Question 14.
Which statement is used to skip the remaining part of a loop and start with next iteration?
(a) continue
(b) break
(c) pass
(d) goto
Answer:
(a) continue

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 15.
The program statements which are executed one after another is called:
(a) Sequential
(b) Looping
(c) Branching
(d) Iterative
Answer:
(a) Sequential

Question 16.
The program statements executed for multiple times are called:
(a) Sequential
(b) Looping
(c) Branching
(d) Iterative
Answer:
(b) Looping

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 17.
Which of the following optional part of while statement?
(a) if
(b) elif
(c) else
(d) if-else
Answer:
(c) else

Question 18.
How many important control structures are there in Python?
(a) 3
(b) 4
(c) 5
(d) 6
Answer:
(a) 3

Question 19.
elif can be considered to be abbreviation of
(a) nested if
(b) if.else
(c) else if
(d) if..elif
Answer:
(c) else if

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 20.
What plays a vital role in Python programming?
(a) Statements
(b) Control
(c) Structure
(d) Indentation
Answer:
(d) Indentation

Question 21.
Which statement is generally used as a placeholder?
(a) continue
(b) break
(c) pass
(d) goto
Answer:
(c) pass

Question 22.
The condition in the if statement should be in the form of
(a) Arithmetic or Relational expression
(b) Arithmetic or Logical expression
(c) Relational or Logical expression
(d) Arithmetic
Answer:
(c) Relational or Logical expression

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 23.
Which is the most comfortable loop?
(a) do..while
(b) while
(c) for
(d) if..elif
Answer:
(c) for

Question 24.
What is the output of the following snippet?
i=1
while True:
if i%3 ==0:
break
print <i,end=’ ‘)
i +=1
(a) 12
(b) 123
(c) 1234
(d) 124
Answer:
(a) 12

Question 25.
What is the output of the following snippet?
T=1
while T:
print(True)
break
(a) False
(b) True
(c) 0
(d) no output
Answer:
(b) True

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 26.
Which amongst this is not a jump statement ?
(a) for
(b) goto
(c) continue
(d) break
Answer:
(a) for

Question 27.
Which punctuation should be used in the blank?
if <condition>_
statements-block 1,
else:
statements-block 2
(a) ;
(b) :
(c) ::
(d) !
Answer:
(b) :

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 1.
Write the some examples of Data structures.
Answer:
Examples for data structures are arrays, structures, list, tuples, dictionary etc.

Question 2.
Write any four an algorithm characteristics.
Answer:
Any four an algorithm characteristics are Input, Output, Finiteness, Definiteness.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 3.
Write the Analysis of algorithms.
Answer:
Analysis of algorithms can be divided into two different phrases.

  1. A prior estimates – This is a theoretical performance analysis of an algorithm.
  2. A posteriori testing- This is a performance measurement analysis of an algorithm.

Question 4.
What are the two components of space complexity?
Answer:
The two components of space complexity are

  1. A Fixed part-is defined as the total space required to store certain data and variables for an algorithm, Eg:variables.
  2. A variable part-is defined as the total space required by variable, which sizes depends on the problem and its iteration.
    Eg: Recursion.

Question 5.
What is space-time trade off?
Answer:

  1. A space – time or time-memory trade off is a way of solving in less time by using more storage space.
  2. By solving a given algorithm in very little space by spending more time.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 6.
What is the advantage for space / time Tradeoff?
Answer:

  1. Time/space trade off can reduce the use of memory at the cost of slower program execution.
  2. To reduce the running time at the cost of increased memory usage.

Question 7.
What is a insertion sort?
Answer:
Insertion sort is a simple sorting algorithm. It works by taking elements from the list one by one and inserting then in their correct position in to a new sorted list.

Question 8.
What is mean by memorization?
Answer:
Memorization is an optimization technique used primarily to speed up computer programs by sorting the results of expensive function calls and returning the cached result when the same inputs occur again.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 9.
What is algorithmic strategy? Explain with example.
Answer:

  1. The way of defining an algorithm is called algorithmic strategy.
  2. For example to calculate factorial for the given value n.
  3. To calculate factorial for the iteration then it can be called recursively until the number of required iteration is reached.

Question 10.
Write the algorithm for preparing coffee?
Answer:
Step 1: Take a bowl with coffee powder.
Step 2: Boil the water and pour it into the bowl.
Step 3: Filter it.
Step 4: Boil Milk.
Step 5: Mix sugar and filtered coffee along with boiled milk.
Step 6: Pour the coffee into the cup to serve.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 11.
Write an algorithm to find square of this given number.
Answer:
Step 1: Start
Step 2: Get the input X
Step 3: Calculate the square by x*x
Step 4: Display the result
Step 5: Stop

Question 12.
What are the factors depends the time efficiency of an algorithm?
Answer:

  1. Speed of the machine
  2. Compiler and other system software tools
  3. Operating system
  4. Programming language used
  5. Volume of data required.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 13.
Write the steps to do Dynamic programming.
Answer:

  1. The given problem will be divided into smaller overlapping sub-problems.
  2. An optimum solution for the given problem can be achieved by using result of smaller sub-problem.
  3. Dynamic algorithms uses memorization.

Question 14.
What are the differences have algorithm and program?
Answer:

Algorithm Program
Algorithm helps to solve a given problem logically. Program is an expression of algorithm in a programming language.
Algorithm based on their implementation method, design techniques etc. It is object oriental programming approach.
There is no specific rules for algorithm writing. Program should be written for the selected language with specific syntax.
Algorithm resembles a pseudo code. Program is more specific to a programming language.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 15.
Explain Best, Worst and Average case efficiency of an algorithm.
Answer:
(i) Assume that a list of n number of values stored in an array sequentially.
(ii) The Best case would be if the first element in the list matches with the key element to be searched in a list of elements.
(iii) The efficiency in that case would be expressed as 0(1) because only one comparison is enough.
(iv) The Worst case is, if the complete list is searched and element is found only at the end of the list or not found.
(v) The efficiency of an algorithm in that case would be expressed as 0(n).
(vi) The Average case of an algorithm can be obtained by finding the average number of comparisons.
(vii) The average number of comparisons = (n + 1)/2 Hence the average case efficiency will be expressed as 0(n).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 16.
Explain the selection sort with example.
Answer:

  1. The selection sort is a simple, sorting algorithm that improves on the performance of bubble sort by making only one exchange for every pass through the list.
  2. This algorithm will first find the smallest elements in array and swap it with element in the first position of an array.
  3. Then it will find the second smallest element and swap that element with the element in the second position.
  4. And it will continue until the entire array is sorted in respective order.
  5. For example an array with values {13,16, 11,18,14,15} this algorithm repeatedly select the first element and next smallest element and swaps into the right place for every pass.
  6. Finally we will get the sorted array end of the pass.

Question 17.
Explain the insertion sort with example.
Answer:

  1. Insertion sort is a simple sorting algorithm.
  2. It works by taking element from the list one by one and inserting then in their correct position in to a new sorted list.
  3. The algorithm builds the final sorted array at the end.
  4. For example, compare with all elements in the sorted sub-list.
  5. Shift all the elements in the sorted sub – list that is greater than the value to be sorted.
  6. At the end of the pass the insertion sort algorithm gives the sorted output in ascending order.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 18.
Write the steps of Fibonacci iterative algorithm with Dynamic programming approach.
Answer:
Step 1: Initialize F0 = 0, f1 = 1,
Step 2: print the initial value of Fibonacci f0 and f1.
Step 3: Calculate fib = f0 + f1
Step 4: Assign fo = F1, f1 =f1 b
Step 5: Go to step-2 and repeat until the specified number of terms generated.
Step 6: print the value of Fibonacci terms.

Question 19.
What is an Algorithm?
Answer:

  • An algorithm is a finite set of instructions to accomplish a particular task.
  • It is a step-by-step procedure for solving a given problem.

Question 20.
Define Pseudo code.
Answer:
Pseudo code is a simpler version of a programming code in plain Bhglish which uses- short phrases to write code for a program before it is implemented in a specific programming language.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 21.
Who is an Algorist?
Answer:
One who practices algorism is known as an algorist. An Algorist is a Persian author, Abu Jafar Mohammed ibn Musa al Khowarizmi, who wrote a textbook on Mathematics.

Question 22.
What is Sorting?
Answer:

  • Sorting is nothing but arranging the data in ascending or descending order.
  • Sorting arranges data in a sequence which makes searching easier.

Question 23.
What is searching? Write its types.
Answer:

  1. Searching is a process of locating a particular element present in a given set of elements.
  2. The element may be a record, a table, or a file. Searching types are Linear search, Binary search, Jump search, Interpolation search, Exponential search, Fibonacci search etc..

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 24.
List the characteristics of an algorithm.
Answer:
The characteristics of an algorithm are:

  1. Input
  2. Output
  3. Finiteness
  4. Definiteness
  5. Effectiveness
  6. Correctness
  7. Simplicity
  8. Unambiguous
  9. Feasibility
  10. Portable

Question 25.
Discuss about Algorithmic complexity and its types.
Answer:

  1. f(n) is the complexity to an algorithm, it gives the running time and / or storage space required but the algorithm in terms of n as the size of input data.
  2. Time complexity and space complexity are two types of algorithmic complexity.
  3. Space complexity has two components, are a fixed part and variable part.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 26.
What are the factors that influence time and space complexity?
Answer:
Time Factor and Space Factor are that influence time and space complexity.
Time Factor: Time is measured by counting the number of key operations like comparisons in the sorting algorithm.
Space Factor: Space is measured by the maximum memory space required by the algorithm.

Question 27.
Write a note on Asymptotic notation.
Answer:
Asymptotic notations are languages that uses meaningful statements about time and space complexity. They are 3 types.

  1. Big O – is used to describe the worst case of an algorithm.
  2. Big Ω (omega) – is used to describe the lower bound that is best case.
  3. Big TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies 1 – When an algorithm has complexity which lower bound – upper bound, say that an algorithm has complexity.

Question 28.
What do you understand by Dynamic programming?
Answer:

  1. Dynamic programming is an algorithmic design method that can be used when the solution to a problem can be viewed as the result of a sequence of decisions.
  2. Dynamic programming approach is similar to divide and conquer.
  3. Dynamic programming is used whenever problems can be divided into similar sub problems. So that their results can be reused to complete the process.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 29.
Explain the characteristics of an algorithm
Answer:
The Characteristics of an algorithm are:

  1. Input: Zero or more quantities to be supplied.
  2. Output: At least one quantity is produced.
  3. Finiteness: Algorithms must terminate after finite number of steps.
  4. Definiteness: All operations should be well defined.
  5. Effectiveness: Every instruction must be carried out effectively.
  6. Simplicity, unambiguous, feasibility, portable and independent are other important algorithm characteristics.

Question 30.
Discuss about Linear search algorithm.
Answer:

  1. Linear search algorithm is a method of technique to find a particular value in a list.
  2. Linear search also called sequential search.
  3. Sequential method checks the search element in sequential order until the desired element is found.
  4. Linear searching algorithm, list need not be ordered.
  5. Eg:
    Input: values [ ] = {5,34, 65,12,77,35} target =12 output: 3
    In this example number 12 is found at index number 3.
    To search the number 12 in the array of 4th place at index number 3 .

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 31.
What is Binary search? Discuss with example.
Answer:

  1. (i) Binary search also called half-interval search algorithm.
  2. It finds the position of a search element within a sorted array.
  3. The binary search algorithm can be done as divide-and-conquer search algorithm and executes in algorithmic time.
  4. We use binary search, First find index of middle element of the array by using this formula mid = low + (high – low) /2 and compare the search element. If it is not found that element, using this formula again.
  5. The search element still not found, hence, we calculated the mid again by using the formula.
    high. = mid – 1
    mid = low + (high – low)/2

Question 32.
Explain the Bubble sort algorithm with example.
Answer:

  1. Bubble sort algorithm is simple sorting algorithm.
  2. This type of algorithm starts at the begining of the list of values stored in an array. W
  3. It compares each pair of adjacent elements and swaps them if they are in the unsorted order.
  4. This comparison and passed to be continued until no swaps are needed, which indicates that the list of values stored in an array is sorted.
  5. This type is too slow and less efficient when compared to other sorting methods.
  6. For example an array values {15, 11, 16, 12, 14, 13} using Bubble sort will sort the values. The swap function swaps the values of the given array elements.
  7. At the end of all the iteration we will get the sorted values as
    TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies 2

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 33.
Explain the concept of Dynamic programming with suitable example.
Answer:

  1. Dynamic programming is an algorithmic design method that can be used when the solution to a problem can be viewed as the result of a sequence of decisions.
  2. Dynamic programming approach is similar to divide and conquer.
  3. Dynamic programming is used whenever problems can be divided into similar sub-problems. So that, their results can be re-used to complete the process.
  4. the subsequent number by adding two previous numbers FibO and Fib 1.
  5. Then Fib<sub>n</sub> = Fib<sub>n – 1</sub> + Fib<sub>n – 2</sub> Hence, a Fibonacci series for the n values of can look like this Fib<sub>8</sub> = 0 1 1 2 3 5 8 1 3
  6. Input, output, Finiteness, Definiteness, Effectiveness, correctness, simplicity, unambiguous, Feasibility, portable and independent.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Choose the best answer:

Question 1.
Which one is maintained and manipulated effectively through data structures?
(a) Data
(b) File
(c) Recorde
(d) List
Answer:
(a) Data

Question 2.
Which can be developed to store, manipulate and retrieve data from such data structures?
(a) File
(b) Algorithm
(c) Sorting
(d) Searching
Answer:
(b) Algorithm

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 3.
Match the following:

(i) Finiteness (A) Well defined
(ii) Definiteness (B) Must terminate
(iii) Effectiveness (C) Clear
(iv) Unambiguous (D) Error Free

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C
(c) (i) – C, (ii) – D, (iii) – B, (iv) – A
(d) (i) – C, (ii) – B, (iii) – A, (iv) – D
Answer:
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 4.
Match the following:

(i) Big O (A) Best case
(ii) Big Ω (omega) (B) Key operation
(iii) Time (C) Memory space
(iv) Space (D) Worst case

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – D, (ii) – C, (iii) – B, (iv) – A
(c) (i) – C, (ii) – B, (iii) – A, (iv) – D
(d) (i) – C, (ii) – A, (iii) – D, (iv) – B
Answer:
(a) (i) – D, (ii) – A, (iii) – B, (iv) – C

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 5.
Match the following:

(i) Linear (A) Comparison
(ii) Binary (B) Exchange
(iii) Bubble (C) half – interval
(iv) Selection (D) Sequential

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B
(d) (i) – B, (ii) – D, (iii) – A, (iv) – C
Answer:
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B

Question 6.
Choose the incorrect pair:
(a) Search – Linear
(b) Sort – Order
(c) insert – Update
(d) Delete – Remove
Answer:
(c) insert – Update

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 7.
Choose the incorrect pair:
(a) Finiteness – Terminate
(b) Definiteness – Defined
(c) Effectiveness – Carried
(d) Correctness – Unambiguous
Answer:
(d) Correctness – Unambiguous

Question 8.
Choose the incorrect pair:
(a) A priori estimates – Theoretical
(b) A posteri testing – Measurement
(c) Time factor – Key operation
(d) Space factor – Instructions
Answer:
(d) Space factor – Instructions

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 9.
Choose the correct pair:
(a) Space complexity – Size of input
(b) A fixed part – Performance
(c) A variable part – Recursion
(d) Time complexity – Variables
Answer:
(c) A variable part – Recursion

Question 10.
Choose the correct pair:
(a) 0 (1) – Worst case
(b) 0 (n) – Best case
(c) 0 (n+1) – Best and Worst case
(d) Big Question (omega) – Best case
Answer:
(d) Big Question (omega) – Best case

Question 11.
Choose the incorrect statement:
(a) Binary search also called half-interval search algorithm.
(b) The binary search algorithm can be done as divide-and-conquer.
(c) Linear search also called Random search
(d) List of elements in an array must be sorted first for Binary search.
Answer:
(c) Linear search also called Random search

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 12.
Choose the incorrect statement:
(a) Bubble sort is a simple sorting algorithm.
(b) Insertion sort is a update sorting.
(c) The selection sort is that improves on the performance of bubble sort.
(d) Insertion sort works by taking elements from the list one by one.
Answer:
(b) Insertion sort is a update sorting.

Question 13.
Choose the incorrect statement:
(i) Dynamic programming is an algorithmic design method.
(ii) Dynamic programming approach is similar to the selection sort.
(ii) Dynamic algorithms uses memorization.
(iv) Dynamic algorithms will try to check the results of solved problems.
(a) (i) and (ii)
(b) (ii) and (iii)
(c) (iii) and (iv)
(d) (iv) and (ii)
Answer:
(a) (i) and (ii)

Question 14.
Choose the correct statement:
(a) Two main measures for the efficiency of an algorithm are Time and Space.
(b) Search is the way of defining algorithm.
(c) There is a specific rules for algorithm writing.
(d) Algorithm is not to be solve any problem logically.
Answer:
(a) Two main measures for the efficiency of an algorithm are Time and Space.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 15.
Choose the correct statement:
(a) Program is a group of files.
(b) Algorithm can be implemented by operating system.
(c) Program should be written for any language.
(d) Program is more specific to a programming language.
Answer:
(d) Program is more specific to a programming language.

Question 16.
Assertion (A):
An algorithm is a finite set of instructions.
Reason (R):
An algorithm can be implemented in any suitable programming language
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(a) Both A and R are correct and R is the correct explanation for

Question 17.
Assertion (A):
Computer resources are limited that should be utilized efficiently.
Reason (R):
The efficiency of an algorithm can be measured based on computer type.
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(b) A is True, But R is False.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 18.
Assertion (A):
The Time efficiency of an algorithm is measured by same factors.
Reason (R):
The efficiency of an algorithm depends on time and memory space.
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(c) A is False, But R is True.

Question 19.
Assertion (A):
Big O is often used to describe the best case of an algorithm.
Reason (R):
Big omega is used to describe the worst case of an algorithm.
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(d) Both A and R are False.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 20.
Assertion (A):
Dynamic programming approach is similar to divide and conquer.
Reason (R):
The given problem is divided into smaller and yet smaller possible sub¬problems.
(a) Both A and R are correct, and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(a) Both A and R are correct, and R is the correct explanation for A.

Question 21.
Pick the odd one out:
(a) Array
(b) Structure
(c) List
(d) Algorithm
Answer:
(d) Algorithm

Question 22.
Pick the odd one out:
(a) Search
(b) Sort
(c) Syntax
(d) Update
Answer:
(c) Syntax

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 23.
Pick the odd one out:
(a) Simplicity
(b) Flowchart
(c) Feasibility
(d) Portable
Answer:
(b) Flowchart

Question 24.
Pick the odd one out:
(a) Time
(b) Space
(c) Efficiency
(d) Program
Answer:
(d) Program

Question 25.
Pick the odd one out:
(a) Binary
(b) Bubble
(c) Selection
(d) Insertion
Answer:
(a) Binary

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 26.
Which of the following is a sorting technique?
(a) Quick
(b) Bubble
(c) Insertion
(d) All the above
Answer:
(d) All the above

Question 27.
Which of the following is a finite set of instructions to accomplish a particular task?
(a) Algorithm
(b) Flow chart
(c) Pseudo code
(d) Program
Answer:
(a) Algorithm

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 28.
Which is called, the way of defining an algorithm?
(a) Algorithmic strategy
(b) Program strategy
(c) Running program strategy
(d) Compiling strategy
Answer:
(a) Algorithmic strategy

Question 29.
How many asymptotic notations are mostly used to represent time complexity of algorithms?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 30.
Which of the following is to describe the worst-case algorithm?
(a) Big O
(b) Big α
(c) Big Ω
(d) Big β
Answer:
(a) Big O

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 31.
Which of the following is reverse of Big O?
(a) Big O
(b) Big α
(c) Big Ω
(d) Big β
Answer:
(c) Big Ω

Question 32.
Linear search also called:
(a) Sequential search
(b) Binary search
(c) Quick search
(d) Selection search
Answer:
(a) Sequential search

Question 33.
Binary search also called:
(a) Sequential search
(b) Quick search
(c) Half-interval search
(d) Linear search
Answer:
(c) Half-interval search

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 34.
Bubble sort is also called:
(a) Sequential search
(b) Quick search
(c) Comparison soft
(d) Binary sort
Answer:
(c) Comparison soft

Question 35.
Which of the following algorithm used memorization?
(a) Static
(b) Dynamic
(c) Modular
(d) Object
Answer:
(b) Dynamic

Question 36.
The word comes from the name of a Persian mathematician Abu Ja’far Mohammed ibn-i Musa al Khowarizmi is called?
(a) Flowchart
(b) Flow
(c) Algorithm
(d) Syntax
Answer:
(c) Algorithm

Question 37.
From the following sorting algorithms which algorithm needs the minimum number of swaps?
(a) Bubble sort
(b) Quick sort
(c) Merge sort
(d) Selection sort
Answer:
(d) Selection sort

Question 38.
Two main measures for the efficiency of an algorithm are:
(a) Processor and memory
(b) Complexity and capacity
(c) Time and space
(d) Data and space
Answer:
(c) Time and space

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 39.
The complexity of linear search algorithm is:
(a) O(n)
(b) O(logn)
(c) O(n2)
(d) O(n log n)
Answer:
(d) O(n log n)

Question 40.
From the following sorting algorithms which has the lowest worst case complexity?
(a) Bubble sort
(b) Quick sort
(c) Merge sort
(d) Selection sort
Answer:
(a) Bubble sort

Question 41.
Which of the following is not a stable sorting algorithm?
(a) Insertion sort
(b) Selection sort
(c) Bubble sort
(d) Merge sort
Answer:
(d) Merge sort

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 42.
Time complexity of bubble sort in best case is:
(a) θ (n)
(b) θ (nlogn)
(c) θ (n2)
(d) θ (n(logn) 2)
Answer:
(b) θ (nlogn)

Question 43.
The 0 notation in asymptotic evaluation represents
(a) Base case
(b) Average case
(c) Worst case
(d) NULL case
Answer:
(c) Worst case

Question 44.
If a problem can be broken into subproblems which are reused several times, the problem possesses which property?
(a) Overlapping subproblems
(b) Optimal substructure
(c) Memoization
(d) Greedy
Answer:
(b) Optimal substructure

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 45.
In dynamic programming, the technique of
storing the previously calculated values is called ?
(a) Saving value property
(b) Storing value property
(c) Memoization
(d) Mapping
Answer:
(c) Memoization

TN Board 12th Computer Science Important Questions