Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 11 Network Examples and Protocols Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 11 Network Examples and Protocols

12th Computer Applications Guide Network Examples and Protocols Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
The ……………., “the Net,” is a worldwide system of computer networks.
a) Internet
b) mobile
c) communication
d) protocol
Answer:
a) Internet

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 2.
Which one of the following will be easy the way to uses Internet technology and the public telecommunication system to securely share business’s information with suppliers, vendors,partners and customers,
a) Extranet
b) Intranet
c) arpanet
d) arcnet
Answer:
a) Extranet

Question 3.
Natch the following and choose the correct answer
i. HTTP -The core protocol of the World Wide Web.
ii. FTP – enables a client to send and receive complete files from a server.
iii. SMTP – Provide e-mail services.
iv. DNS- Refer to other host computers by using names rather than numbers.
a) i, ii, iii, iv
b) ii, iii, iv, I
c) iii, iv, i, ii
d) iv, iii, ii, i
Answer:
a) i, ii, iii, iv

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 4.
Communication over…………….. is be made up of voice, data,images and text messages.
a) Social media
b) mobile network
c) whatsapp
d) software
Answer:
b) mobile network

Question 5.
Wi-Fi stands for………………
a) Wireless Fidelity
b) wired fidelity
c) wired optic fibre
d) wireless optic fibre
Answer:
a) Wireless Fidelity

Question 6.
A TCP/IP network with access restricted to members of an organization
a) LAN
b) MAN
c) WAN
d) Intranet
Answer:
d) Intranet

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 7.
RFID stands for …………………
a) Radio Free identification
b) real Frequency identity
c) Radio Frequency indicators
d) Radio Frequency Identification.
Answer:
d) Radio Frequency Identification.

Question 8.
If guarantees the sending of data is successful and which checks error on operation at OSI layer is……….
a) Application layer
b) Network layer
c) Transport Layer
d) Physical layer
Answer:
c) Transport Layer

Question 9.
Which one of the following will secure data on transmissions?
a) HTTPS
b) HTTP
c) FTP
d) SMTP
Answer:
a) HTTPS

Question 10.
………………. provides e-mail service
a) DNS
b) TCP
c) FTP
d) SMTP
Answer:
d) SMTP

Question 11.
……………. refer to other host computers by using names rather than numbers.
a) DNS
b) TCP
c) FTP
d) SMTP
Answer:
a) DNS

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 12.
TCP/IP is a combination of two protocols:
i. Transmission Control Protocol (TCP)
ii. Internet Protocol (IP)
iii. Selection Protocol (SP)
iv. Captial Protocol (CP)
a) i, ii
b) i, iii
c) iii, iv
d) ii, iii
Answer:
a) i, ii

Part II

Short Answers

Question 1.
Define Intranet
Answer:

  • It is a private network within an enterprise to share company data and computing resources between the employees.
  • It may consist of many interlinked local area networks.

Question 2.
What are the uses of mobile networks?
Answer:

  • Can connect the network without cable
  • Less consumption of power
  • Huge capacity than a large transmitter
  • Covering large area than a single transmitter

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 3.
List out the benefits of WiFi
Answer:

  1. It provides mobility.
  2. It provides connection to Internet.
  3. Flexibility of LAN.
  4. Ensures connectivity.
  5. It allows places that are remote to benefit from connectivity.
  6. Low cost, high benefit.

Question 4.
How many types of RFID system available and what are they?
Answer:
Two types of RFID were

  1. Active RFID and
  2. Passive RFID systems.

1. Active RFID system: The tag has its own power source.
2. Passive RFID system: The tag gets power through power from a reader antenna to the tag antenna.

Question 5.
Expand HTTP, HTTPS, FTP
Answer:

  1. HTTP – Hypertext Transfer Protocol
  2. HTTPS – Hypertext Transfer Protocol Secure
  3. FTP – File Transfer Protocol

Part III

Explain in brief answer

Question 1.
Compare Internet, Intranet, and Extranet
Answer:

Type Definition Example
Internet A global network, public TCP/IP network used by over a billion people all over the world Sending an email to a friend
Intranet A TCP/IP network with access restricted to members of an organization Accessing your record in the employee personnel file
Extranet TCP/IP network with restricted access to Members Checking availability of inventory from an outside supplier

Question 2.
List out the components of an RFID enabled system.
Answer:

  • An RFID tag: It has a silicon microchip attached to a small antenna and mounted on a substrate,
  • A Reader: It has a scanner with antennas to trans¬mit and receives signals, used for communication.
  • A Controller: It is the host computer with a Microprocessor which receives the reader input and process the data.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 3.
Write short notes on HTTP, HTTPS, FTP.
Answer:

  1. HTTP – A protocol used between a web client and a webserver to protect non-secure data transmissions. The core protocol of the World Wide Web.
  2. HTTPS – A protocol used between a web client and a web server permits secure data transmissions.
  3. FTP – Used between computers for sending and receiving data. Enables a client to send and receive complete files from a server.

Question 4.
What are the layers available in TCP/IP Reference Model?
Answer:

  1. Application Layer
  2. Transport Layer
  3. Internet Layer
  4. Network Access Layer

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 5.
Expand ARP, ICMP, SMTP, and DNS.
Answer:

  1. Address Resolution Protocol (ARP)
  2. Internet Control Message Protocol (ICMP)
  3. Transfer mission Control Protocol (TCP)
  4. Simple Mail Transfer Protocol (SMTP)
  5. Domain Name System (DNS).

Part IV

Explain in detail

Question 1.
Explain about Internet, Intranet and Ex¬tranet.
Answer:
INTERNET:

  • The Internet, “the Net,” is a worldwide system of computer networks
  • It is the network of networks where the users at any one computer can if they have permission, get information from any other computer.
  • The Internet is a network of global connections.
  • It comprises private, public, business, academic, and government networks
  • It linked by guided, wireless, and fiber-optic technologies.
  • The Internet denotes the global communication system, including infrastructure and hard¬ware whereas the web is one of the services interconnected over the Internet.

INTRANET:

  • It is a private network within an enterprise to share company data and computing resources between the employees.
  • It may consist of many interlinked local area networks.
  • It includes connections through one or more gateway (connects two networks using different protocols together known as protocol convertor) computers to the outside Internet.

EXTRANET:
It is a private network that uses Internet technology and the public telecommunication system to securely share business information with suppliers, vendors, partners, customers, or other businesses.

Question 2.
Discuss OSI model with its layers.
Answer:
OSI Model

  • Open System Interconnection (OSI) model was found in the year 1934, a general framework that enables network protocols along with software and systems to be developed based on a general set of guidelines.
  • It describes the standards for the inter-computer communication.

OSI Layers:
1. Physical Layer:

  • It is the 1st layer.
  • It defines the electrical and physical specifications for devices.

2. Data Link Layer:

  • It is the 2nd layer.
  • It guarantees that the data transmitted are free of errors.
  • This layer has simple protocols like “802.3 for Ethernet” and “802.11 for Wi-Fi”.

3. Network Layer:

  • It is the 3rd layer.
  • It is used to determine the path of the data packets.
  • At this layer, routing of data packets is found using IP Addressing.

4. Transport Layer:

  • It is the 4th layer.
  • It guarantees the transportation/sending of data is successful.
  • It includes the error checking operation.

5. Session Layer:

  • It is the 5th layer
  • It is used to identify the established system session between different network entities.
  • It controls dialogues between computers.
  • For instance, while accessing a system remotely, the session is created between your computer and the remote system.

6. Presentation Layer:

  • It is the 6th layer.
  • It does the translation of data to the next layer (Prepare the data to the Application Layer). Encryption and decryption protocols occur in this layer such as Secure Socket Layer (SSL).

7. Application Layer:

  • It is the 7th layer.
  • It acts as the user interface platform comprising software within the system.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 3.
Difference between TCP/IP and OSI Reference Model.
Answer:
Expands To TCP/IP- Transmission Control Protocol/OSI- Open system Interconnect

Basic for comparison TCP/IP model OSI Model
Expands To TCP/IP- Transmission Control Protocol/Internet Protocol OSI- Open system Interconnect
Meaning It is a client-server model used for the transmission of data over the internet. It is a theoretical model which is used for a computing system.
No. Of Layers 4 Layers 7 Layers
Developed by Department of Defense (DoD) ISO (International Standard Organization)
Tangible Yes No
Usage Mostly used Never use

Question 4.
Explain the development, merits, and demerits of Mobile networks.
Answer:

Merits of Mobile Networks:

  1. Higher efficiency.
  2. Increased ability to communicate in and out of the workspace.
  3. Greater access to modem apps and services.
  4. Improved networking capabilities.
  5. Quality and flexibility of services.
  6. Rapid developments in cloud technologies.

Demerits of Mobile Networks:

  1. Cost
  2. Vulnerable to security risks.
  3. Additional training is needed to use new technology.
  4. Cybercrime

Development:
The generations of mobile networks are as follows.

  1. First Generation (1G) 1981 – NMT Launch
  2. Second Generation (2G) 1991 – GSM Launch
  3. Second to Third Generation Bridge (2.5)2000 – GPRS launch
  4. Third Generation (3G) 2003 – first UK 3G launch
  5. Fourth Generation (4G) 2007
  6. Fifth Generation (5G) 2019+

1. First Generation (1G) 1981 – NMT launch:

  • During the initial periods, the mobile systems were based on analog transmission.
  • NMT stands for Nordic Mobile Telephone communication.
  • And a very poor voice quality.

2. Second Generation(2G) 1991-GSM Launch:

  • Later the second generation of mobile systems was placed on digital transmission with GSM.
  • GSM stands for (Global System for Mobile communication) was the most popular standard which is used in the second generation, using 900MHz and 1800MHz for the frequency bands.
  • The transfer mission used as TMDA stands for (Time Division Multiple Access) and CDMA One stands for (Code Division Multiple’Access) method to increase the amount of information transported on the network

3. Second to Third Generation Bridge (2.5)2000 – GPRS launch:

  • GPRS was introduced here GPRS stands for (General Packet Radio Service).
  • GPRS is a data service which enables mobile devices to send and receive messages, picture messages, and e-mails.
  • GSM data transfer mission rates typically reached 9.6kbit/s.

4. Third Generation( 3G) 2003- first UK 3G launch:

  • This generation of mobile systems merges different mobile technology standards and uses higher frequency bands for transfer mission and Code Division Multiple Access to deliver data rates of up to 2Mbit/s supports multimedia services (MMS: voice, video, and data).
  • The data transfer mission used a WCDMA. WCDMA stands for (Wideband Code Division Multiple Access).
  • Few 3G suppliers use ATMs (Asynchronous Transfer Mode) for their ‘over the air’ network within MPLS (Multiprotocol Label Switching) or IP for their backbone network.

5. Fourth Generation (4G) 2007:

  • 4G is at the research stage. 4G was based on an Adhoc networking model where there was no need for a fixed infrastructure operation.
  • Adhoc networking requires global mobility features (e.g. Mobile IP) and connectivity to a global IPv6 network to support an IP address for each mobile device.
  • Logically roaming in assorted IP networks (for example 802.11 WLAN, GPRS and UMTS) were be possible with higher data rates, from 2Mbit/s to 10-100Mbit/s, offering reduced delays and new services.

6. Fifth Generation (5G) 2019+:

  • 5G is the stage that succeeds the 4G (LTE/ WiMAX), 3G(units), and 2G(GSM) systems.
  • 5G targets to performance the high data rate, reduced latency, energy saving, cost reduction, higher system, capacity, and massive device connectivity.
  • The ITU IMT – 2020 provides speeds up to 20 gigabits per second it has been demonstrated with millimeter waves of 15 gigahertz and higher frequency.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

12th Computer Applications Guide Network Examples and Protocols Additional Important Questions and Answers

Part A

Choose the correct answers:

Question 1.
Internet Protocol delivers packets from source to destination through
(a) TCP
(b) datagram
(c) packets header
(d) HTTP
Answer:
(c) packets header

Question 2.
…………….. over the mobile network is being made up of voice, data, images, and text messages,
a) Internet
b) Intranet
c) Extranet
d) Communication
Answer:
d) Communication

Question 3.
IP connectionless datagram service was developed by
(i) Vint cerf
(ii) Bob FrAnswer:ton
(iii) Bob Kahnin
(iv) Dan Bricklin
(a) i, ii
(b) ii, iii
(c) ii, iv
(d) i, iii
Answer:
(d) i, iii

Question 4.
The second generation of the mobile system was based on …………………… transmission.
a) Digital
b) Analog
c) Both (a) and (b)
d) None of these
Answer:
a) Digital

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 5.
Which protocols have to do the end-to-end process of secure on time and manage data or communication.
(a) Physical
(b) TCP
(c) Network
(d) ARPC
Answer:
(c) Network

Question 6.
The RFID tag gets power from the reader through the …………… Method.
a) Direct
b) propagation
c) Inductive Coupling
d) Indirect
Answer:
c) Inductive Coupling

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 7.
A passive RFID system using …………….. Method.
a) EM wave Propagation
b) Direct
c) Inductive Coupling
d) Indirect
Answer:
a) EM wave Propagation

Question 8.
Find the wrongly matched pair.
(a) Network Communication Protocol – HTTP, TCP/IP
(b) Network Security Protocol – ICMP
(c) Network Management Protocol – SNMP
Answer:
(b) Network Security Protocol – ICMP

Question 9.
………………. mainly deals with financial transactions or transfer User personal data were highly sensitive.
a) HTTP
b) SMTP
c) HTTPS
d) FTTP
Answer:
c) HTTPS

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 10.
The ……………………….. is one of the services interconnected over the Internet.
Answer:
web

Abbreviations

  1. ARPA – Advanced Research Projects Agency
  2. NMT – Nordic Mobile Telephone Communication
  3. GSM – Global System For Mobile communication
  4. SIM – Subscriber Identity Module
  5. TMDA – Time Division Multiple Access
  6. CDMA – Code Division Multiple Access
  7. GPRS – General Packet Radio Service
  8. EDGE – Enhanced Data Rates for Global Evolution.
  9. LI FI – light Fidelity
  10. UMTS – Universal Mobile Telecommunication System
  11. WCDMA – Wideband Code Division Multiple Access
  12. ATM – Asynchronous Transfer Mode
  13. MPLS – Multiprotocol Label Switching
  14. ITU – International Telecommunication Union
  15. RFID – Radio Frequency Identification
  16. FTP – File Transfer Protocol
  17. HTTP – HyperText Transfer Protocol
  18. SMTP – Simple Mail Transfer Protocol
  19. ARP – Address Resolution Protocol
  20. ICMP – Internet Control Message Protocol

Assertion and reason

Question 1.
Assertion (A): Internet Protocol (IP) is the principle of the communications protocol. Reason (R): IP is referred to as TCP/IP Transmission Control Protocol/Internet Protocol.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 2.
Assertion (A): Network protocols Manages Data.
Reason (R): Network protocols do not manage the network communication.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 3.
Assertion (A): Network communication protocols are that Basic data communication.
Reason (R): Network communication protocols which specific as SMTP
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): Advanced Research Projects Agency (ARPA) of the U.S. government in 1969 and was first recognized as the ARPANet.
Reason (R): The Internet is a network of global connections – comprising private, public, business, academic, and government networks.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 5.
Assertion (A): The Internet is a global network, public TCP/IP network used by over a billion people all over the world
Reason (R): An example of the internet is that Sending an email to a friend
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 6.
Assertion (A): Intranet a TCP/IP network with access restricted to members of an organization
Reason (R): An example of Intranet is that Checking the availability of inventory from an outside sup¬plier.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 7.
Assertion (A): NMT stands for Nordic Mobile Telephone communication
Reason (R): NMT had a very low traffic density of one call per radio channel and a very poor voice quality.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 8.
Assertion (A): RFID – Radio Frequency Identification.
Reason (R): RFID uses RF wireless technology to identify.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 9.
Assertion (A): Physical Layer defines the electrical and physical specifications for devices.
Reason (R) Physical layer has simple protocols like “802.3 for Ethernet” and “802.11 for WiFi”.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 10.
Assertion (A): Network Layer is the 3rd layer determining the path of the data Packets.
Reason (R): Network Layer helps in routing of data, packets is found using IP Addressing
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 11.
Assertion (A): TCP/IP is a set of protocols that governs communications among all computers on the Internet
Reason (R): TCP/IP protocol tells how informa-tion should be packaged, sent, and received, as well as how to get to its destination.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 12.
Assertion (A): Routable protocol which uses IP addresses to deliver packets
Reason (R): It is a reliable protocol and guarantees the delivery of information
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Find the odd one on the following

1. (a) Routers
(b) Servers
(c) Computers
(d) URLs
Answer:
(d) URLs

2. (a) HTTP
(b) TCP/IP
(c) SFTP
(d) SSL
Answer:
(b) TCP/IP

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

3. (a) Suppliers
(b) Vendors
(c) Customers
(d) Employee
Answer:
(d) Employee

4. (a) Social Media
(b) E-mail
(c) Chatting
(d) Claims
Answer:
(d) Claims

5. (a) Voice
(b) Video
(c) Data
(d) Images
Answer:
(b) Video

6. (a) 1G-1984
(b) 2G-1991
(c) 3G-2003
(d) 4G-2007
Answer:
(b) 2G-1991

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

7. (a) TMDA
(b) GSM
(c) MMT
(d) CDMA
Answer:
(c) MMT

8. (a) UMTS
(b) WCDMA
(c) 1900-2200
(d) 900-180QMhz
Answer:
(d) 900-180QMhz

9, (a) 802.11
(b) CDMA
(c) UMTS
(d) WLAN
Answer:
(b) CDMA

10. (a) Reader
(b) Chip
(c) Antenna Coil
(d) Substrate
Answer:
(a) Reader

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

11. (a) Network Layer
(b) DataLink Layer
(c) Session Layer
(d) Presentation Layer
Answer:
(b) DataLink Layer

12. (a) Bytes
(b) Bits
(c) Packet
(d) Segments
Answer:
(a) Bytes

13. (a) IP
(b) SFTP
(c) ICMP
(d) ARP
Answer:
(b) SFTP

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

14. (a) HTTP
(b) SMTP
(c)TCP
(d) FTP
Answer:
(c)TCP

15. (a) X.25
(b) Ethernet
(c) Frame
(d) Relay
Answer:
(b) Ethernet

Match the following;

Question 1.
HTTP – Host Computers
ICMP – Network Communication Protocol
SFTP – Network Management Protocol
DNS – Network Security Protocol
a) 1234
b) 4321
c) 4123
d) 2134
Answer:
c) 4123

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 2.
Internet – Claims
Intranet – Median Access Control
Extranet – Global Network
ARP – Submission of Reports
a) 3412
b) 1234
c) 2143
d) 3421
Answer:
a) 3412

Question 3.
E-Commerce – Facebook
Access Employee Database – Internet
Online Discussion – Extranet
Social Media – Intranet
a) 1234
b) 3412
c) 4312
d) 4132
Answer:
d) 4132

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 4.
First Generation – GSM Launch
Second Generation – NMT Launch
Third Generation – 2007
Fourth Generation – UK 3G Launch
a) 3412
b) 1234
c) 2143
d) 3421
Answer:
c) 2143

Question 5.
First Layer – Data Link Layer
Second Layer – Transport Layer
Third Layer – Physical Layer
Fourth Layer – Session Layer
a) 1234
b) 3412
c) 4312
d) 4132
Answer:
b) 3412

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 6.
Application Layer – ARP
Network Layer – FDDI
Presentation Layer – SNMP
Data Link Layer – TSL
a) 3412
b)1234
c)2143
d) 2413
Answer:
d) 2413

Important years to remember;

1974 IP connectionless datagram service was in the transmission control program
1969 (ARPA) of the U.S. government was first recognized as the ARPANet.
1981 First Generation
1991 Second Generation
2000 Second to Third Generation Bridge
2003 Third Generation
2007 Fourth Generation
2019+ Fifth Generation
1934 Open System Interconnection(OSI)

Protocols and Their usage

PROTOCOLS USAGE
TCP/IP set of protocols permitting communications among all computers on the Internet.
HTTP A protocol used between a web client and a web server protects nonsecure data transmissions
HTTPS A protocol used between a web client and a web server permits secure data transmissions.
FTP It is Used between computers for sending and receiving data. Enables a client to send and receive complete files from a server.
Internet Protocol (IP). It is a routable protocol which uses IP addresses to deliver packets
Address Resolution Protocol (ARP) It Resolves IP addresses to MAC (Medium Access Control) addresses.
Internet Control Mes­sage Protocol (ICMP) It is used by network devices to send error messages and operational information.
Transmission Control Protocol (TCP). It Provides reliable connection-oriented transmission between two hosts. It guarantees the delivery of packets between the hosts.
Simple Mail Transfer Protocol (SMTP) It Provides e-mail services

Part B

Short Answer Questions

Question 1.
Write a note on Extranet?
Answer:
EXTRANET:
It is a private network that uses Internet technology and the public telecommunication system to securely share business information with suppliers, vendors, partners, customers, or other businesses.

Question 2.
What is mean Network Protocol?
Answer:
Network protocols are that the usual procedures, rules, formal standards, and policies comprised of formats which allocate communication between more than one device connected to the network.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 3.
What is meant by Li-Fi?
Answer:
Li-Fi is a wireless technology which uses light-emitting diodes (LEDs) for data transmission Li-Fi is the short form of Light Fidelity.

Question 4.
What is mean by cell?
Answer:

  • A mobile network or cellular network is made up of a large number of signal areas called cells.
  • These cells join to form a large coverage area. Users can cross into different cells without losing their connection.

Question 5.
Write a note on Network protocols?
Answer:
Network protocols are that the usual procedures, rules, formal standards, and policies comprised of formats which allocate communication between more than one device connected to the network.

Question 6.
What is the use of Address Resolution Protocol?
Answer:

  • It Resolves IP addresses to MAC (Medium Access Control) addresses.
  • A MAC address is a hardware identification num¬ber that uniquely identifies each device on a network.

Question 7.
What is mean by DNS?
Answer:

  • DNS-Domain Name System
  • A method of referring to other host computers by using names rather than numbers.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Part C

Explain in detail

Question 1.
Explain the types of Networking protocols?
Answer:
The broad types of networking protocols, including:

  1. Network communication protocols are that the Basic data communication protocols specific to HTTP and TCP/IP.
  2. Network security protocols is that implement security over network communications and include HTTP, SFTP, and SSL.
  3. Network management protocols will Provide network governance and maintenance and include ICMP and SNMP.

Question 2.
List some applications of the Internet.
Answer:

  • Download programs and files
  • Social media
  • E-Mail
  • E-Banking
  • Audio and Video Conferencing
  • E-Commerce
  • File Sharing
  • E-Governance
  • Information browsing
  • Search the web addresses for access through a search engine
  • Chatting

Question 3.
Write about Mobile Networks?
Answer:
Mobile Networks:
A mobile network or cellular network is made up of a large number of signal areas called cells. These cells join to form a large coverage area. Communication over the mobile networks is being made up of voice, data, images, and text messages.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 4.
List some Applications of the Extranet.
Answer:

  • Customer communications
  • Online education/ training
  • Account status enquiry
  • Inventory enquiry
  • Online discussion
  • Supply – chain management
  • Order status enquiry
  • Warranty registration
  • Claims
  • Distributor promotions

Question 5.
Write a note on Network protocols?
Answer:
Network protocols are that the usual procedures, rules, formal standards, and policies comprised of formats which allocate communication between more than one device connected to the network.

Question 6.
Explain the working process of TCP
Answer:

  • TCP/IP is a combination of two protocols: Transmission Control Protocol (TCP) and Internet Protocol (IP).
  • The Internet Protocol typically specifies the logistics of the packets that are sent out over networks; it specifies the packets which have to go, where to go, and how to get there.
  • The Transmission Contra Protocol is accountable for guaranteeing the trustworthy transmission of data. It seems that the packets for errors and submits the requests for re-transmissions in case any of them are missing.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 6.
Write the disadvantages of the First Generation of Mobile Networks?
Answer:

  • They had a very low traffic density of one call per radio channel, A very poor voice quality.
  • They used unsure and unencrypted transmission, which leads to the spoofing of its identities.

Question 7.
Write short notes on Second to Third Generation Bridge of Mobile Networks
Answer:

  • GPRS was introduced here, it is seen as an excess period of mobile networking development, between 2G and 3G.
  • GPRS is a data service which enables mobile devices to send and receive messages, picture messages, and e-mails.
  • It allows the most popular operating speeds of up to 115kbit/s, latterly maximum of 384kbit/s by using EDGE.

Question 8.
Write short notes on Wi-Fi.
Answer:

  • Wi-Fi stands for Wireless Fidelity.
  • It is a wireless network technology that permits computers and alternative devices to be connected to every alternative into a local area network and to the net without wires and cables.
  • Wi-Fi is additionally stated as a wireless local area network that stands for wireless local area network, and 802.11, that is that the technical code for the protocol.

Part D

Detailed Answers

Question 1.
Explain in detail about Second Generation of Mobile Networks.
Answer:

  • The second generation of mobile systems was placed on digital transmission with GSM.
  • GSM stands for (Global System for Mobile communication)was the most popular standard which is used in the second generation, using 900MHz and 1800MHz for the frequency bands.-
  • GSM mobile systems have grown digital transmission using SIM. SIM stands for (Subscriber Identity Module) technology to authenticate a user for identification and billing purposes and to encrypt the data to prevent listen without permission (eavesdropping).
  • The transmission used as TDMA. TMDA stands for (Time Division Multiple Access) and CDMA One stands for (Code Division MultipleAccess ) method to increase the amount of information transported on the network.
  • Mobility is supported at layer 2, which stops seamless roaming across assorted access networks and routing domains. This means each operator must cover the entire area or have agreements in place to permit roaming.

Question 2.
Explain the important protocols present in

  1. Network layer
  2. Transport Layer

Answer:

1. Network Layer:
It is the layer where data is addressed, packaged, and routed among networks.
The important Internet protocols that operate at the Network layer are:

  • Internet Protocol (IP): A routable protocol which uses IP addresses to deliver packets. It is an unreliable protocol, does not guarantee the delivery of information.
  • Address Resolution Protocol (ARP): Resolves IP addresses to MAC (Medium Access Control) addresses. (A MAC address is a hardware identification number that uniquely identifies each device on a network.)i.e., to map IP network addresses to the hardware addresses.
  • Internet Control Message Protocol (ICMP): Used by network devices to send error messages and operational information. Example: A host or router might not be reached or requested service is not presented.
  • Internet Group Management Protocol (IGMP): It is a communication protocol used by hosts and routers to send Multicast (group Communication) messages to multiple IP addresses at once.

2. Transport Layer: The sessions are recognized and data packets are swapped between hosts in this layer.
Two main protocols established at this layer are:

  • Mission Control Protocol (TCP): Provides reliable connection-oriented Transmission between two hosts. It ensures the delivery of packets between the hosts.
  • User Datagram Protocol (UDP): Provides connectionless, unreliable, one-to-one, or one-to-many delivery.

Samacheer Kalvi 12th Computer Applications Guide Chapter 11 Network Examples and Protocols

Question 3.
Write short notes on Fourth Generation of Mobile Networks
Answer:

  • 4G is at the research stage. 4G was based on an Adhoc networking model where there was no need for a fixed infrastructure operation.
  • Adhoc networking requires global mobility features (e.g. Mobile IP) and connectivity to a global IPv6 network to support an IP address for each mobile device. Logically roaming in assorted IP networks (for example 802.11 WLAN,
  • GPRS and UMTS) were possible with higher data rates, from 2Mbit/s to 10-100Mbit/s, offering reduced delays and new services.
  • Mobile devices will not expect on a fixed infrastructure, they will require enhanced intelligence to self-configure in ad-hoc networks and having routing capabilities to route over packets switched network.

Question 4.
Explain about Fifth Generation of Mobile Networks
Answer:

  • 5G is the stage that succeeds the 4G (LTE/WiMAX), 3G(UMTS), and 2G(GSM) systems.
  • 5G targets to performance the high data rate, reduced latency, energy saving, cost reduction, higher system, capacity, and massive device connectivity.
  • The two phases of 5G, First one will be Release-15 complete by March 2019, Second one Release- 16is expected to complete in March 2020, for submission to the ITU (International Telecommunication Union) as a candidate IMT- 2020 technology.
  • The ITU IMT – 2020 provides speeds up to 20 gigabits per second it has been demonstrated with millimeter waves of 15 gigahertz and higher frequency. 3 GPP standards include any network using the New Radio software. 5G New Radio can access at lower frequencies from 600 MHz to 6 GHz.
  • Speed in the lower frequencies is only modestly higher than 4G systems, estimated at 15% to 50% faster.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 13 Network Cabling Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 13 Network Cabling

12th Computer Applications Guide Network Cabling Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
ARPANET stands for
a) American Research Project Agency Network
b) Advanced Research Project Area Network
c) Advanced Research Project Agency Network
d) American Research Programs And Network
Answer:
c) Advanced Research Project Agency Network

Question 2.
WWW was invented by
a) Tim Berners Lee
b) Charles Babbage
c) Blaise Pascal
d) John Napier
Answer:
a) Tim Berners Lee

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
Which cable is used in cable TV to connect with setup box?
a) UTP cable
b) Fibre optics
c) Coaxial cable
d) USB cable
Answer:
c) Coaxial cable

Question 4.
Expansion of UTP is
a) Uninterrupted Twisted Pair
b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair
d) Universal Twisted Protocol
Answer:
c) Unshielded Twisted Pair

Question 5.
Which medium is used in the optical fibre cables to transmit data?
a) Microwave
b) infra red
c) light
d) sound
Answer:
c) light

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 6.
Which of the following is a small peripheral device with a sim slot to connect the computers to Internet?
a) USB
b) Dongles
c) Memory card
d) Mobiles
Answer:
a) USB

Question 7.
Which connector is used in the Ethernet cables?
a) RJ11
b) RJ21
c) RJ61
d) RJ45
Answer:
d) RJ45

Question 8.
Which of the following connector is called as champ connector?
a) RJ11
b) RJ21
c) RJ61
d) RJ45
Answer:
b) RJ21

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 9.
How many pins are used in RJ45 cables?
a) 8
b) 6
c) 50
d) 25
Answer:
a) 8

Question 10.
Which wiring standard is used for connecting two computers directly?
a) straight Through wiring
b) Cross Over wiring
c) Rollover wiring
d) None
Answer:
b) Cross Over wiring

Question 11.
Pick the odd one out from the following cables
a) roll over
b) cross over
c) null modem
d) straight through
Answer:
c) null modem

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 12.
Match the following
1. Ethernet – Port
2. RJ45 connector – Ethernet
3. RJ45 jack – Plug
4. RJ45 cable – 802.3
a) 1, 2, 4, 3
b) 4, 1, 3, 2
c) 4, 3, 1, 2
d) 4, 2, 1, 3
Answer:
d) 4, 2, 1, 3

Part II

Short Answers

Question 1.
Write a note on twisted pair cable?
Answer:

  • Twisted Pair Cables is a type of cable with two or more insulated wires twisted together.
  • It started with the speed of 10 Mbps (10BASE-T cable is used).
  • It started with the speed of 10 Mbps (10BA.SE-T cable is used).
  • Then the cable is improved and the speed was higher and went to 100 Mbps and the cable was renamed 100BASE-TX.

Question 2.
What are the uses of USB cables?
Answer:

  • The Universal Serial Bus is used to connect the keyboard, mouse, and other peripheral devices.
  • Micro USB is a miniaturized version of the USB used for connecting mobile devices such as smartphones, GPS devices, and digital cameras.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
Write a note on the types of RJ45 connectors?
Answer:

  1. Wiring schemes specify how the wires to be connected with the RJ45 connector.
  2. There are two wiring schemes available to terminate the twisted-pair cable on each end, which are
    • T-568A
    • T-568B.

Question 4.
What is an Ethernet port?
Answer:

  • The Ethernet port is the jack where the Ethernet cable is to be connected.
  • This port will be there In both the computers and the LAN port.

Question 5.
What is the use of the Crimping tool?
Answer:
A crimping tool is a physical tool which is used to connect the patch wire and the Ethernet connector. The tool will puncture the connector and makes the wire set in the connector.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 6.
What are the types of twisted pair cables?
Answer:
There are two types of twisted pair cables, Unshielded Twisted Pair (UTP) and Shielded Twisted pair (STP). The UTP is used nowadays as modem cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.

Question 7.
What is meant by champ connector?
Answer:
The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end. It is also called a champ connector or Amphenol connector. The Amphenol is a connector manufacturer. The RJ-21 interface is typically used for data communication trucking applications.

Part III

Explain In Brief Answer

Question 1.
Write a note on crossover cables.
Answer:

  • If you require a cable to connect two computers or Ethernet devices directly together without a hub, then you will need to use a Crossover cable instead.
  • The easiest way to make a crossover cable is to make one end to T568A colour coding and the other end to T568B.
  • Another way to make the cable is to remember the colour coding used in this type. Here Green set of wires at one end are connected with the Orange set of wires at another end and vice versa.

Question 2.
Write a short note on RJ45 connector?
Answer:
RJ45 Connector:

  1. The RJ45 connector is a small plastic cup which will be used to connect the wire inside the connector and ready to connect to the Internet.
  2. The RJ45 connector looks similar to a telephone jack but it looks slightly wider. The Ethernet cables are sometimes called RJ45 cables.
  3. In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standards in the cable.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
What are the differences between serial and parallel ports?
Answer:

Subject

Serial Port

parallel port

Pins 9 pins 25 pins
Type of port Male port Female Port
Color Usually Purple in color Usually Green in color
Data Transfer Rate Slower than Parallel Port Faster than Serial Port
Moving Bits Serial move bits inline, one at a time. Parallel moves bits next to each other
Usage of Wire Serial ports are only used 2 wires for transmitting and receiving data Parallel Port used 8 or more wire for trans­mitting and receiving data.

Question 4.
What is meant by a null modem cable?
Answer:
RS-232 cable is also used for interconnecting two computers without a modem. So it is also a null-modem cable. A cable interconnecting two devices directly are known as a null-modem cable.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 5.
What are the components involved in Ethernet cabling?
Answer:
The three main components are used in the Ethernet cabling components are

  1. Patch Cable (Twisted pair)
  2. RJ45 Connector
  3. Ethernet Ports
  4. Crimping Tool

Question 6.
What are the types of Fibre optic cables?
Answer:
There are two types of fiber optic cables available.

  1. One is single-mode (100BaseBx)
  2. Multimode (lOOBaseSX).
    • Single-mode cables are used for long-distance transmission and at a high cost
    • Multimode cables are used for short-distance transmission at a very low cost.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part IV

Explain In Detail

Question 1.
What is meant by Registered Jack? Explain briefly the types of Jacks.
Answer:
Registered Jacks:

  • A Registered Jack commonly known as RJ is a network interface used for network cabling, wiring, and jack construction.
  • The primary function of the registered jack is to connect different data equipment and telecommunication devices.
  • The commonly known registered jacks are RJ-11, RJ-45, RJ-21, and RJ-28.
  • The registered jack refers to the male physical connector (Plug), a female physical connector (Jack) and it’s the wiring.

RJ-11:

  • It is the most popular modern form of the registered jack.
  • It is found in the home and office.
  • This registered jack is mainly used in telephone and landlines.
  • There are 6 pins where
    • The two pins give the transmission configuration,
    • The two pins give the receiver configuration and
    • The other two pins will be kept for reserved.
    • The two pin will have the positive terminal and the negative terminal.

RJ-14 and RJ-61:

  • The RJ-14 is the same as RJ-11 which will be used for telephone lines where same it as 6 pins whereas the RJ-61 will have 8 pins.
  • This RJ-61 will use the twisted pair cable with a modular connection.

RJ-21:

  • The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end.
  • It is also called as champ connector or Amphenol connector.
  • The Amphenol is a connector manufacturer.
  • The RJ-21 interface is typically used for data communication trucking applications.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 2.
Explain wiring techniques used in Ethernet cabling.
Answer:

  • There are three types of wiring techniques to construct the Ethernet cable.
  • It is also known as color coding techniques. They are
    • Straight-Through Wiring
    • Cross-over Wiring
    • Roll-over Wiring

Straight-Through Wiring

  • In general, the Ethernet cables used for Ethernet connections are “straight through cables”.
  • These cable wires are in the same sequence at both ends of the cable, which means that pin 1 of the plug on one end is connected to pin 1 of the plug on the other end (for both standard – T568A & T568B).
  • The straight through wiring cables are mostly used for connecting PC / NIC card to a hub.
  • This is a simple physical connection used in printers, computers and other network interfaces.

Cross-over Wiring

  • Crossover cable is used to to connect two com¬puters or Ethernet devices directly together without a hub.
  • The pairs(Tx and Rx lines) will be crossed which means pin 1 & 2 of the plug on one end are connected with pin 3 & 6 of the plug on other end, and vice versa (3 & 6 to pin 1 & 2).
  • The Null modem Cables are the example of the crossover cables.

Roll-over Wiring

  • Rollover cable is a type of null-modem cable that is often used to connect a device console port to make programming changes to the device.
  • The rollover wiring have opposite pin arrangements, all the cables are rolled over to different arrangements.
  • In the rollover cable, the colored wires are reversed on other end i.e. the pins on one end are connected with other end in reverse order.
  • Rollover cable is also known as Yost cable or Console cable. It is typically flat (and light blue color) to distinguish it from other types of network cabling.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
Explain about RJ45 connector.
Answer:

  • The RJ45 connector is a small plastic cup which will be used to connect the wire inside the connector and ready to connect the Internet.
  • The RJ45 connector looks similar like a telephone jack but it looks a slightly wider.
  • The Ethernet cables are sometime called as RJ45 cables.
  • In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
  • Each RJ45 connector has eight pins and connected to each end of the Ethernet cable, since it has 8-position, 8-contact (8P8C) modular plug,
  • It is also known as 8P8C connector. These plugs (connector) are then inserted into Ethernet port of the network card.

Wiring schemes and color codes of the connector

  • The RJ45 connector has eight small jack inside to connect eight small wires of the patch cable.
  • The eight cables are in eight different colors. Let’s discuss that eight colors and where does that eight colors connect to the RJ45 connector.
  • Wiring schemes specifies how the wires to be connected with RJ45 connector. There are two wiring schemes available to terminate the twisted-pair cable on each end, which are T-568A and T-568B.
  • Although four pairs of wires are available in the cable, Ethernet uses only two pairs: Orange and Green. The other two colors (blue and brown) can be used ISDN or phone connections.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 4.
Explain the components used in Ethernet cabling.
Answer:

The main components are used in the Ethernet cabling are

  1. Patch Cable (Twisted pair)
  2. RJ45 Connector
  3. Ethernet Ports
  4. Crimping Tool

1. Patch Cable (Twisted Pair):
1. These Cables are generally made up of 8 wires in different colors.

2. Four of them are solid colours, and the others are striped.
3. The eight colors are white green, green, white orange, blue, white blue, orange, white brown and brown. The following figure 13.8 shows the patch cable.
Ethernet cables are normally manufactured in several industrial standards such as Cat 3, Cat 5, Cat 6, Cat 6e and cat 7. “Cat” simply stands for “Category,”. Increasing the size of the cable also lead to slower transmission speed.

4. The cables together with male connectors (RJ45) on each end are commonly referred as Ethernet cables. It is also called as RJ45 cables, since Ethernet cable uses RJ45 connectors.

2. RJ45 Connector:

  • The RJ45 connector is a small plastic cup which will be used to connect the wire inside the connector and ready to connect the Internet.
  • The RJ45 connector looks similar like a telephone jack but it looks a slightly wider.
  • The Ethernet cables are sometime called as RJ45 cables.
  • In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
  • Each RJ45 connector has eight pins and connected to each end of the Ethernet cable.
  • Since it has 8-position, 8-contact (8P8C) modular plug, It is also known as 8P8C connector. Th£se plugs (connector) are then inserted into Ethernet port of the network card.

3. Ethernet card and Port:

  • Ethernet card is a Network Interface Card (NIC) that allows computers to connect and transmit data to the devices on the network. It may be an expansion card or built-in type.
  • Expansion card is a separate circuit board also called as PCI Ethernet card which is inserted into PCI slot on motherboard of a computer.
  • Now a days most of the computers come with built-in Ethernet cards which resides on motherboard.
  • Wireless Ethernet cards are also available, which uses radio waves to transmit data.
  • Ethernet port is an opening which is a part of an Ethernet card. It accepts RJ45 connector with Ethernet cable. It is also called as RJ45 jack. It is found on personal computers, laptops, routers, switches, hubs and modems.
  • In these days, most of the computers and laptops have a built-in Ethernet port for connecting the device to a wired network.

4. Crimping Tool:

  • Crimping is the process of joining two or more pieces of metal or wire by deforming one or both of them to hold each other.
  • A crimping tool is a physical tool which is used to connect the patch wire and the Ethernet connector.
  • The tool will puncture the connector and makes the wire set in the connector.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 5.
Explain the type of Network cables?
Answer:
There are many types of cables available in networking. Here we discuss six different cables.
1. Coaxial Cables:

  • This cable is used to connect the television sets to home antennas and transfer the information in 10 Mbps,
  • It is divided into thinnet and thicknet cables.
  • These cables have a copper wire inside and insulation Is covered on the top of the copper wire to provide protection to the cable.
  • These cables are very difficult to install and maintain because they are too big to carry and replace.
  • The coaxial cable got its name by the word “coax”. Nowadays coaxial cables are also used for dish TV where the setup box and the television is connected using the coaxial cable only.
  • Some of the cable names are Media Bridge 50-feet Coaxial cable, Amazon basics CL2- Rated Coaxial cables, etc.

Twisted Pair Cables:

  • It is type of cable with two or more insulated wires twisted together.
  • It started with the speed of 10 Mbps (10BASE-T cable is used).
  • Then the cable is improved and the speed was higher and went to 100 Mbps and the cable was renamed 100BASE-TX.
  • Then finally the cable improved more made to 10 Gbps and named as 10GBASE-T.
  • This twisted cable has 8 wires which are twisted to ignore electromagnetic interference.
  • Also, the eight wires cannot be placed in a single unit there could be a difficulty in spacious, so it is twisted to make as one wire.
  • There are two types of twisted pair cables, Unshielded Twisted Pair (UTP) and Shielded Twisted pair (STP).
  • The UTP is used nowadays as modern cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.
  • STP is similar to UTP, but it is covered by an additional jacket to protect the wires from External interference.

Fiber Optics:

  • This cable is different from the other two cables.
  • The other two cables had an insulating material on the outside and the conducting material like copper inside.
  • But in this cable it is of strands of glass and pulse of light is used to send the information.
  • They are mainly used in Wide Area Network (WAN)/The WAN Is a network that extends to the very large distance to connect the computers,

Ethernet Cables:

  • Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.
  • This cable connects wired devices within the local area network (LAN) for sharing the resources and accessing the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

12th Computer Applications Guide Network Cabling Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
Which year were the co-axial cables invented?
(a) 1880
(b) 1890
(c) 1990
(d) 2000
Answer:
(a) 1880

Question 2.
The latest version of USB is ………………
a) 2.0
b) 4.0
c) 5.0
d) 3.0
Answer:
d) 3.0

Question 3.
Co-axial cables transfer the information in …………………………
(a) 10 kbps
(b) 10 Mbps
(c) 10 GBPS
(d) 10 TBPS
Answer:
(b) 10 Mbps

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 4.
……………….. cable connects wired devices within the local area network for sharing the resources and accessing the Internet.
a) wireless Cable
b) Ethernet cable
c) Coaxial Cable
d) Twisted Wire
Answer:
d) Twisted Wire

Question 5.
Co-axial cables are made up of ……………………..
(a) Steel
(b) Iron
(c) Copper
(d) Aluminium
Answer:
(c) Copper

Question 6.
………….. are used for connecting the television with the setup box.
a) UTP
b) STP
c) Twisted Cable
d) Coaxial cables
Answer:
d) Coaxial cables

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 7.
…………………….. is a type of cable with two or more insulated wires twisted together.
Answer:
Twisted pair cables

Question 8.
The ……………. uses light to transmit the information from one place to another.
a) Fibre cable
b) Network cable
c) optic cable
d) None of these
Answer:
c) optic cable

Question 9.
Assertion (A): 8 wires of the twisted cable are twisted
Reason (R): To ignore electromagnetic interference.
(a) A is true R is the reason
(b) A, R both false
(c) A is false R is true
(d) A is true, R is not the reason
Answer:
(a) A is true R is the reason

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 10.
…………….. are used for long-distance transmission and at a high cost.
a) optic cable
b) Network cable
c) Multimode cable
d) Single-mode cables
Answer:
b) Network cable

Question 11.
STP stands for ………………………
(a) Shielded Turn paper
(b) Shielded Twisted pair
(c) Soft Turn Photo
(d) Short Time processing
Answer:
(b) Shielded Twisted pair

Question 12.
The serial port will send ………….. at one time.
a) 2 bit
b) Null
c) 1 bit
d) 5 bit
Answer:
c) 1 bit

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 13.
Find the wrongly matched pair.
(a) coaxial cables – TV
(b) Twisted pair cables – ATP, UTP
(c) Fiber optic cables – Single-mode, Multimode
Answer:
(b) Twisted pair cables – ATP, UTP

Question 14.
The Null modem Cables are an example of the crossover cables.
a) coaxial
b) crossover cables
c) parallel cables
d) Serial cable
Answer:
b) crossover cables

Question 15.
The ……………. is the basic component of the Local Area Network(LAN)
a) parallel cables
b) Serial cable
c) coaxial
d) Ethernet cable
Answer:
d) Ethernet cable

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 16.
The two types of fiber optic cables are ……………………… and ………………………..
Answer:
Single-mode, Multi-mode

Fill In The Blanks

1. The …………… is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
Answer:
RJ45 Ethernet connector

2. The ………….. has eight small pins inside to connect eight small wires in the patch cable. The eight cables have eight different colours.
Answer:
RJ45 connector

3. The …………….. is the jack where the Ethernet cable is to be connected.
Answer:
Ethernet port

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

4. …………….. port will be there in both the computers and the LAN port.
Answer:
Ethernet port

5. The …………… is a physical tool which is used to connect the patch wire and the Ethernet connector(RJ45).
Answer:
crimping tool

6. A ……………. is a network interface used for connecting different data equipment and telecommunication devices.
Answer:
Registered Jack (RJ)

7. ……………… jack is mainly used in telephone and landlines.
Answer:
RJ11

8. ……………… cable is used to transfer the information in 10 Mbps.
Answer:
Coaxial

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Very Short Answers

Question 1.
What is the purpose of network cables?
Answer:
The Network cables are used to transfer the data and information to another computer.

Question 2.
What is the use of coaxial cable?
Answer:
Coaxial cables are used for connecting the television with the setup box.

Question 3.
How many wires are there in the twisted cable? Why?
Answer:
Twisted cable has 13 wires which are twisted to ignore electromagnetic interference

Question 4.
What are the two types of twisted pair cables?
Answer:
Unshielded Twisted Pair (UTP) and Shielded Twisted pair (STP).

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 5.
Expand ARPANET.
Answer:
Advanced Research Project Agency Network

Question 6.
What is ARPANET?
Answer:
It is the predecessor of the modern Internet.

Question 7.
What is the use of USB cables?
Answer:
USB cables are used to connect keyboard, mouse, and other peripheral devices

Question 8.
What is the use of parallel cables?
Answer:
The parallel cables are used to connect to the printer and other disk drivers.

Question 9.
What are the two types of fiber-optic cable?
Answer:
Single-mode ((100 Base Bx)) and Multimode ((100 Base SX))

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 10.
How serial port and parallel port differ?
Answer:
It will send 1 bit at one time whereas the parallel port will send 13 bit at one time.

Question 11.
What is the use of serial and parallel interface?
Answer:
The Serial and Parallel interface cables are used to connect the Internet to the system.

Question 12.
What is the purpose of cross-over cable?
Answer:
Cross over cable is used to join two network devices of the same type

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 13.
What is RJ Network?
Answer:
A Registered Jack (RJ) is a network interface

Question 14.
Where is the RJ11 cable used?
Answer:
RJ11 jack is mainly used in telephone and landlines

Question 15.
What is the use of a crimping tool?
Answer:
The crimping tool is used to connect the patch wire and the Ethernet connector.

Question 16.
What is an Ethernet port?
Answer:
The Ethernet port is the jack where the Ethernet cable is to be connected.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 17.
What is an Ethernet cable?
Answer:
The Ethernet cable is the basic component of the Local Area Network

Question 18.
What is the purpose of using Fiber optic cable?
Answer:
Fiber optic cables are used in Wide Area Network (WAN).

Question 19.
What is a dongle?
Answer:
The dongle is a small peripheral device which has compatible with mobile broadband.

Question 20.
How the internet is connected through a dongle?
Answer:
A sim slot in it and connects the Internet and acts as a modem to the computer.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Abbreviation:

  1. ARPANET – Advanced Research Project Agency Network
  2. WWW – World Wide Web
  3. W3C – World Wide Web Consortium
  4. LAN – Local Area Network
  5. WAN – Wide Area Network
  6. UTP – Unshielded Twisted Pair
  7. STP – Shielded Twisted pair
  8. NIC – Network Interface Card
  9. USB – Universal Serial Bus
  10. RJ – Registered Jack
  11. 8P8C – 8-position, 8-contact

Find The Odd One On The Following

l. (a) Media Bridge
(b) 50feet coaxial cable
(c) 10BASE-T
(d) CL2
Answer:
(c) 10BASE-T

2. (a) 100BaseBX
(b) 100BaseSX
(c) WAN
(d) 10 Base T
Answer:
(d) 10 Base T

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

3. (a) Keyboard
(b) Monitor
(c) Mouse
(d) peripheral devices
Answer:
(b) Monitor

4. (a) Smartphones
(b) GPS devices
(c) Digital cameras
(d) Mouse
Answer:
(d) Mouse

5. (a) Speakers
(b) Infra Red
(c) Blue tooth
(d) WiFi
Answer:
(a) Speakers

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

6. (a) RJ45Connector
(b) UTP Cable
(c) coaxial cable
(d) plastic covering
Answer:
(c) coaxial cable

7. (a) USB cable
(b) RJ45 Connector
(c) Ethernet Ports
(d) Crimping Tools
Answer:
(a) USB cable

8. (a) White Green
(b) White Red
(c) White Orange
(d) White brown
Answer:
(b) White Red

9. (a) Cat 5
(b) Cat 6e
(c) Cat 7
(d) Cat 5e
Answer:
(d) Cat 5e

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

10. (a) RJ-11
(b) RJ-21
(c) RJ-08
(d) RJ-45
Answer:
(c) RJ-08

11. (a) Registered Jack
(b) Mobile
(c) 6pin
(d) Landlines
Answer:
(b) Mobile

12. (a) ChampConnector
(b) Amphenol Connector
(c) Wireless Connector
(d) RJ21
Answer:
(c) Wireless Connector

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

13. (a) Champ over
(b) Cross Over
(c) Straight Through
(d) Roll Over
Answer:
(a) Champ over

14. (a) T568A
(b) T568B
(c) Tx, Rx lines
(d) RJ-28
Answer:
(d) RJ-28

15. (a) Twisted pair
(b) UTP
(c) FTP
(d) STP
Answer:
(c) FTP

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Choose The Incorrect Pair:

1. a) Media Bridge 50-feet Coaxial cable, Amazon basicsCL2-Rated Coaxial cables.
b) Unshielded Twisted Pair and Shielded Twisted pair.
c) USB cables and Parallel cables
d) Single-Mode and Multimode
Answer:
c) USB cables and Parallel cables

2. a) Serial and Parallel cables
b) Patch Cable, RJ45 Connector
c) Ethernet Ports, Crimping Tool
d) Coaxial cable, Serial Port
Answer:
d) Coaxial cable, Serial Port

3. a) Ethernet cable and serial cable
b) RJ45 plug, Ethernet connector.
c) Rj45 jack, Ethernet Port
d) RJ45, 802.3
Answer:
a) Ethernet cable and serial cable

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

4. a) RJ-11, RJ-45
b) RJ-45 and RJ47
c) RJ-14 and RJ-61
d) RJ-21, RJ-28
Answer:
b) RJ-45 and RJ47

5. a) USB cables, Peripheral devices
b) Coaxial cables, 10 Mbps
c) Ethernet port, LAN port
d) Parallel port, 100BaseSX
Answer:
d) Parallel port, 100BaseSX

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Match The Following:

Question 1.
A) Tim Berners Lee -1) WAN
B) Coaxial cables – 2) WWW
C) Twisted pair – 3) CL2 Related coaxial
D) Fiber optics cable – 4) STP
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
d) 2 3 4 1

Question 2.
A) Coaxial cables – 10gbps
B) Twisted pair – 100 BASE-BX
C) Fiber optics cable – 100 GBASE-T
D) Ethernet Cable -10 Mbps
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
c) 4 3 2 1

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
A) RJ45 connector -1) Crimping Tool
B) Ethernet -2) Small 8 jack inside
C) Expansion card -3) NIC
D) RJ45 Cable -4) Ethernet cable
a) 1234
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
d) 2 3 4 1

Question 4.
A) Ethernet Technology – RJ45, 802.3
B) RJ45 Connector(male) – RJ45 plug, Ethernet connector, 8P8C connector
C) RJ45 socket (female) – Rj45 jack, Ethernet Port
D) RJ45 Cable – Ethernet cable
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
a) 1 2 3 4

Question 5.
A) RJ11 Jack – Peripheral devices
B) RJ45 Connector – Telephones and landlines
C) USB Cables – Crimping Tool
D) Cross over cable – Null modem Cables
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
b) 2 31 4

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part B

Short Answers

Question 1.
Write a note on coaxial cables?
Answer:
Coaxial Cables:
This cable was invented in the late 1880s, which is used to connect television sets to home antennas. This cable is used to transfer the information in 10 Mbps.

Question 2.
What is mean by Expansion card?
Answer:

  • The expansion card is a separate circuit board also called PCI.
  • Ethernet card is inserted into a PCI slot on the motherboard of a computer.

Question 3.
Mention the different types of cables used to connect the computer on Network?
Answer:
Computers can be connected on the network with the help of wired media (Unshielded Twisted pair, shielded Twisted pair, Co-axial cables, and Optical fiber) or wireless media (Infra Red, Bluetooth, WiFi)

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 4.
List the type of Network cables
Answer:

  1. Coaxial Cables
  2. Twisted Pair Cables
  3. Fiber Optics
  4. USB Cables
  5. Serial and Parallel cables
  6. Ethernet Cables

Question 5.
Give the Pin details of RJ-11?
Answer:
Pin details of the RJ-11, there is 6 pin where the two pins give the transmission configuration, the two pins give the receiver configuration and the other two pins will be kept for reserved. The two-pin will have the positive terminal and the negative terminal.

Question 6.
What are the two types of twisted-pair cables?
Answer:
There are two types of twisted pair cables,

  1. Unshielded Twisted Pair (UTP) and
  2. Shielded Twisted pair (STP).

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 7.
What is the use of UTP?
Answer:

  • The UTP is used nowadays as modern cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.
  • STP is similar to UTP, but it is covered by an additional jacket to protect the wires from External interference.

Question 8.
Write about Fiber Optics
Answer:

  • Fiber Optics cable is different from the other two cables.
  • The other two cables had an insulating material at the outside and the conducting material like copper inside.
  • But in this cable it is of strands of glass and pulse of light is used to send the information.

Question 9.
What are the two types of fiber optic cables available,
Answer:
There are two types of fiber optic cables available

  1. Single-mode (100BaseBx) another
  2. Multimode (100BaseSX).

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 10.
What is the use of a Single-mode Cable?
Answer:
Single-mode cables are used for long-distance transmission and at a high cost.

Question 11.
What is the use of Multi-Mode Cable?
Answer:

  • Multimode cables are used for short-distance transmission at a very low cost.
  • The optic cables are easy to maintain and install.

Question 12.
What is the use of Micro USB?
Answer:
Micro USB is a miniaturized version of the USB used for connecting mobile devices such as smartphones, GPS devices, and digital cameras.

Question 13.
What is the use of cross-over Cable?
Answer:
Cross over cable is used to join two network devices of the same type for example two PCs or two network devices.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part C

Explain In Brief Answer

Question 1.
Compare UTP and STP?
Answer:
UTP: The UTP is used nowadays as modem cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.

STP: STP is similar to UTP, but it is covered by an additional jacket to protect the wires from External interference.

Question 2.
How to determine the type of Ethernet Cable?
Answer:

  1. Straight-through: The coloured wires are in the same sequence at both ends of the cable.
  2. Cross-over: The first coloured wire at one end of the cable is the third coloured wire at the other end of the cable.
  3. Poll-over: The coloured wires are in the opposite sequence at either end of the cable.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part D

Explain In Detail

Question 1.
Explain the Crimping process to make Ethernet cables?
Answer:
Crimping process for making Ethernet cables

  1. Cut the cable with the desired length
  2. Strip the insulation sheath about 1 inch from both ends of the cable and expose the Twisted pair of wires
  3. After stripping the wire, untwist the smaller wires and arrange them into the proper wiring scheme, T568B preferred generally.
  4. Bring the wires tighter together and cut them down so that they all have the same length ( Vi inch).
  5. Insert all 8 coloured wires into the eight grooves in the connector. The wires should be, inserted until the plastic sheath is also inside the connector.
  6. Use the crimping tool to lock the RJ45 connector on the cable. It should be strong enough to handle manual traction. Now it is ready for data transmission.
  7. Use a cable tester to verify the proper connectivity of the cable, if need.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 10 Introduction to Computer Networks Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 10 Introduction to Computer Networks

12th Computer Applications Guide Introduction to Computer Networks Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
A set of computers connecting together is caiied as ……………..
a) Network
b) Server
c) Hub
d) Node
Answer:
a) Network

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 2.
Computer network devices that originates route and terminate the data were called as
a) Hub
b) Resource
c) Node
d) Cable
Answer:
c) Node

Question 3.
Match the period and methods available on the history of computer networking on the Internet
a) 1950 – X.25 TCP/IP
b) 1966 – SAGE
c) 1976 – WAN
d) 1972 – ARCNET

a) 4321
b) 3421
c) 1234
d) 2341
e) 4123
Answer:
e) 4123

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 4.
Western Electric introduced the first widely used……………… that implemented true
computer control.
a) Packet switch
b) Arpanet
c) Host
d) Telephone switch
Answer:
d) Telephone switch

Question 5.
Wi-Fi is short name for
a) Wireless Fidelity
b) Wired fidelity
c) Wired fiber optic
d) Wireless fiber optic
Answer:
a) Wireless Fidelity

Question 6.
People everywhere can express and publish their ideas and opinions via
a) Tele-medicine
b) blogging
c) Server
d) Node
Answer:
b) blogging

Question 7.
Which one of the following periods, the speed capacity supported towards gigabit on a computer network?
a) SABRE
b) SAGE
c) NEW FIBRE OPTICS
d) ARCNET
Answer:
c) NEW FIBRE OPTICS

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 8.
One among them was challenging to the business people on computer networking
a) Hacking
b) Viruses
c) Both a & b
d) none of this above
Answer:
c) Both a & b

Question 9.
……………. able to predict, manage, and protect the computer network at Internet
a) Artificial intelligence
b) Broadband provider
c) Cloud computing
d) Transceivers
Answer:
a) Artificial intelligence

Question 10.
……………….. use less power compared with single transmitter or satellite often cell towers nearer
a) Mobile devices
b) Transistors
c) WIFI
d) Communication
Answer:
a) Mobile devices

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 11.
People nowadays getting relaxed via
a) Business
b) Corporate company
c) Newspapers
d) Social media
Answer:
d) Social media

Question 12.
Which one of the following is not the social media
a) Gmail
b) Facebook
c) Twitter
d) Linkedin
Answer:
a) Gmail

Question 13.
Facebook was created at ………………………….year
a) 2002
b) 2004
c) 2013
d) 2010
Answer:
b) 2004

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 14.
In a mobile network, land areas for network coverage were distributed as
a) Firmware
b) cells
c) Range
d) Service
Answer:
b) cells

Question 15.
Which one was harmful to the computer
a) Bloggers
b) Browser
c) Hackers
d) Twitter
Answer:
c) Hackers

Question 16.
Which innovation made people use the Internet?
a) Social web
b) Mobile technology
c) Mobile App
d) Both a & b.
Answer:
d) Both a & b.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Part II

Short Answers

Question 1.
Define Computer Network.
Answer:

  1. A set of computers connected together for the purpose of sharing resources is called a computer networks.
  2. At present, the Internet is the most common resource shared everywhere.

Question 2.
Define Internet
Answer:
The Internet is a network of global connections – ‘ comprising private, public, business, academic and government networks – linked by guided, wireless and fiber-optic technologies.

Question 3.
What are the common uses of Computer Network?
Answer:
The common uses of computer network are

  1. Communication
  2. Resource sharing
  3. Data (or) software sharing
  4. Money-saving

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 4.
List out some feature of Mobile Network.
Answer:

  • Less consumption of power
  • Huge capacity than a large transmitter, at single frequency
  • Covering large area than a single transmitter

Question 5.
Difference between wired and wireless networks.
Answer:

Wired Network Wireless Network
A Wired network system connected with network cable. A Wireless network is connecting Devices without cables
Example: speakers, CCTV, printers, outdoors, and scanners, etc., with cables. Example: Tablets(tab), indoor cameras and E-readers, etc., without cables (WiFi).

Part III

Explain in brief answer

Question 1.
Define ARPANET.
Answer:
First In 1969, four nodes of ARPANET were connected between four universities namely the University of California at Los Angeles, at Santa Barbara, the Stanford Research Institute and the university of Utah using the 50 Kbit/s circuits.

Packet-switched networks was the theoretical work to model was performed by Leonard Kleinrock, ARPANET was which underpinned the development of it and his theoretical work on hierarchical routing in late 1970 s with his student Farouk Kamoun remains critical to the operation of the Internet today.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 2.
What is the use of cloud storage and cloud computing?
Answer:
Cloud storage

  • It is just storage of data on online, access in different area no geographical limits was in need.
  • Cloud storage provides users with immediate access to a broad range of resources.

Cloud computing:

  • It is the on demand availability of computer sys-tem resources.
  • Especially data storage and computing power, without direct active management by the user

Question 3.
What is mean by Artificial Intelligence?
Answer:

  1. Artificial intelligence able to be better predict traffic as it collects and analyzes data in real-time,
  2. some of the network managers were better prepared for big events such as the World cup, Olympics, Valentine’s Day, which often put on the Internet under pressure.
  3. Now the networks were monitored by an algorithm that enables for anomalous build-ups of traffic and activity which may be the result of nasty activities such as (DDoS) Distributed Denial-of-Service attacks and attempted hacks.
  4. This Artificial Network powering algorithms will become the most intelligent; it might find faster and reliable methods of anticipating threats and cleaning networks.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 4.
List out some usefulness of Social Network.
Answer:

  • Group information sharing over long distances.
  • Broadcast announcements,
  • Fostering diversity of thought.

Question 5.
How Computer Networks save money saving?
Answer:
Money-saving:
Using computer networking, it’s an important financial aspect for the organization because it saves money. It reduces the paperwork, manpower and saves time.

Part IV

Explain in detail

Question 1.
Define computer networking and Internet. Explain different developments on computer network and Internet.
Answer:
Computer networking:
Computer networking is a technique of digital telecommunications network one that permits nodes to share its resources.

This computer networking exchanges the data with each other through wired or wireless connections between different terminals called nodes.

Internet
The Internet is a network of global connections – comprising private, public, business, academic and government networks – linked by guided, wireless and fiber-optic technologies.

Computer networks and its development

Sno Period Method History
1 Late
1950
SAGE (Semi – Automatic Ground Environment) It was used at U.S Military Radar system.
2 1960 SABRE(Semi Automatic Business Research Envi­ronment) At Commercial Airline Reservation system online connected with two main frame computers.
Packet switching Packet switching was developed by Paul Baran and Donald De­vices
NPL network (National Physical Laboratory ) at united kingdom local area network (LAN) using line speed of 768kbit/s
3 1963 Intergalactic Computer network The intergalactic Computer network was sent by J.C.RLicklider
4 1965 Telephone switch At first widely used Telephone switch was introduced by Western Electric
5 1966 Wide Area Network(WAN) An experimental paper on has been published by Thomas Marill Lawrence G.Roberts published in the area of time sharing
6 1969­
1970
ARPANET First In 1969, four nodes of ARPANET were connected between four universities
7 1972 X.25 TCP/IP Using X.25 as commercial services were deployed then was using an infrastructure for expanding TCP/IP networks.
8 1973 Hosts CYCLADES was the first for making hosts which is responsible for reliable delivery of data
9 1973­
1979
Ethernet A memo at Xerox PARC was written by Robert Metcalfe describing Ethernet in 1973.
Aloha based networking system which was developed in the 1960s
In July 1976 the paper published “Ethernet: Distributed Packet Switching for Local Computer Networks” by Robert Metcalfe and David Boggs.
Collaborated on many patients received in 1977 and 1978.
Robert Metcalfe pursued making on the open standard in 1979.
10 1976 ARCNET ARCNET was created by John Murphy of Datapoint corporation in 1976
11 1995 NEW FIBRE OPTIC CA­BLES The speed capacity of transmission for Ethernet was slightly elevated from 10 Mbit/s to lOOMbit/sat 1995.
Frequently, the highest speeds up to 100 Gbit/s were appended (still 2016).

Question 2.
Explain the growth of computer networking,
Answer:
Growth on the popularity of cloud storage and cloud computing. On behalf of buying physical copies of games, music, and movies, increasingly downloading (or streaming) and buy digital licenses their need via Internet.

3G and 4G:
Developments on mobile network infrastructure- both deployments of 4Gand 3G networks (older) that have allow the people in their developed areas who can allow it to their smart mobile phones as video broadcasting system and as mobile television.

4G LTE
Even though 4G LTE mobile network was not reached by many parts of world, the industry of telecommunication has been hard working on the development of their next generation

5G:

  • It is a cellular communication Technology. This 5G intense to boost up the speed the mobile connections dramatically. Exactly how much customers was in need of this 5G connection and to go.
  • It might be tested on laboratory on by prototype versions of some elements then it may be standard 5G consumers were also interested on the promise of signal coverage with 5G.

Artificial intelligence

  • It will help to maintain, manage, and protect it.
  • It is also able to be a better predict traffic as it collects and analyzes data in real-time, some of network managers were better prepared for big events such as the World cup, Olympics, Valentine’s Day, which often put on the Internet under pressure.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 3.
Mention some uses of the network at business, home, mobile, social applications.
Answer:
(i) Networks in Business:

  1. In the twenty-first century, communications are necessary for successful business operations and technology for business interaction.
  2. Computer networks were faster, the Internet became full strength and wireless communications have been formed the way business performed.
  3. By the usage of latest technologies, such as cloud computing, are being used to allow globally without scarifying security or limiting user access.
  4. Internet conversations happen faster, Quick Decision making saves a lot of time, we all know that “time is money” in business.
  5. Through e-banking we can pay or receive money from or to the customer may be easily done via gateways or by online payments were much easier on this method.
  6. Here any type of business it might large or small scale B2C, B2B, B2G,C2B, C2C, C2G, G2B,G2C, G2G or commercial that transfer of information across the Internet can be done here.

(ii) Networks at Home:
Network at home is a group of devices such as computers, mobile, speakers, cameras, game systems, and printers that connect via the network with each other. Networks at home were connected in two ways they are

  1. Wired network
  2. Wireless network

A Wired network system connected with a network cable. For example speakers, CCTV, printers, outdoors, and scanners etc., with cables.
A Wireless network is connecting devices like tablets(.tab), indoor cameras and E-readers, etc., without cables (WiFi).
Network at home plays the main role to access all such as e-banking, e-leaming, e-governance, e-health, telemedicine, call centers, video conferencing, digitalization of memories, can easy to access and use by avoiding a lot of time and stacked at the queue.
From the home we ordered delicious food from various hotels and restaurants at a time without delay can be bought via the Internet.

(iii) Mobile Networks:
A mobile network is a network connecting devices without cable (wireless). Mobile computers, such as laptops, tablets, and handheld computers, were the fastest-growing segments.

(iv) Social Application:
The very fast and easiest way to cover all the people, who are connected to in social network media. For example WhatsApp, Facebook, Twitter, blogs, Pinterest, Linkedln, classmates, and so on. Through the above social media, we share our thoughts in different formats and the different size of files.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

12th Computer Applications Guide Introduction to Computer Networks Additional Important Questions and Answers

Part A

Choose the correct answers:

Question 1.
……………….. Method was used at the U.S Military Radar system.
a)SABRE
b)ARPANET
c) SAGE
d) Networking
Answer:
c) SAGE

Question 2.
Which one of the following resources cannot be shared?
(a) printer
(b) scanner
(c) speakers
(d) monitor
Answer:
(d) monitor

Question 3.
Packet Switching was invented in the year………………..
a)1964
b) 1958
c)1988
d)1991
Answer:
a)1964

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 4.
……………….. helps in sending and receiving money via payment gateway.
a) e-banking
b) online payment
c) e-governance
d) credit/debit card
Answer:
b) online payment

Question 5.
In networking, nodes are identified by their…………………………….
(a) Protocol
(b) Layer
(c) IP address
(d) TCL address
Answer:
(c) IP address

Question 6.
The initial name of the host is known as ………………..
a) TCP/IP
b) switch
c) nodes
d) CYCLADES
Answer:
d) CYCLADES

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 7.
In 1966……………….. was introduced for time-sharing.
a) WAN
b) MAN
c)LAN
d) Networking
Answer:
a) WAN

Question 8.
Expand SAGE
(a) Semi-Automatic Ground Environment
(b) Self – Auto General Engine
(c) Super – Automatic General Engine
(d) Super – Auto Ground Environment
Answer:
(a) Semi-Automatic Ground Environment

Question 9.
WWW was created in the year ………………..
a) 1965
b) 1993
c)1988
d)1989
Answer:
d)1989

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 10.
Network of network is called ………………..
a) Internet
c) Exnet
b) Intranet
d) Network
Answer:
a) Internet

Abbreviation

1. WWW – World Wide Web
2. IP – Internet protoco!
3. SAGE – Semi Automatic Ground environment
4. SABRE – Semi Automatic Business Research Environment
5. LAN – Locai Area Network
6. NPL – National Physical Laboratory
7. WAN – Wide Area Network
8. ARPANET – Advanced Research Projects Agency Network
9. TCP – Transmission Control Protoco!
10. ARCNET – Attached Resource Computer NETwork
11. LTE – Long Term Evolution
12. DDos – Distributed Denial of Service attacks.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Very short answers

Question 1.
What is the use of Packet switching?
Answer:
It used to transfer the information between computers and network,

Question 2.
Who use SAGE first? When?
Answer:
U.S Military Radar system used SAGE (Semi – Automatic Ground Environment) at late 1950

Question 3.
What do you mean by hosting?
Answer:
The service provider that leases this infrastructure, which is known as hosting.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 4.
What Is a Telephone switch?
Answer:
It is the first widely used to implemented true computer control.

Assertion and reason

Question 1.
Assertion (A): A set of computers connected together for the purpose of sharing resources is called as computer networks
Reason(R): Multimedia means that multiple forms of media are combined to gather and provide services
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion (A): Networks of the network is called the Internet.
Reason(R): Computer which is connected to a network called as Intranet
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 3.
Assertion (A): The data that originates and terminates at these particular nodes is called a source and destination.
Reason(R): Connecting more than one device is called a network.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 4.
Assertion (A): Packet switching was developed by Paul Baranand Donald Devices to transfer the information between computers and network.
Reason(R): NPL network (National Physical Laboratory) at UK local area network
(LAN) using line speed of 1068kbit/s was implemented by Nicholas Dech.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 5.
Assertion (A): INTERNET Stands for INTERnational NETwork (Technology, telecom, intelligence)
Reason(R): INTERNET Stands for INTER connected computer NETwork (Science, space and environment)
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 6.
Assertion (A): Mobile network is the network connecting devices without cable (wireless).
Reason(R): Mobile computers, such as laptop, tablet, and handheld computers, were the fastest-growing segments.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 7.
Assertion (A): 5G intense to boost up the speed of the mobile connections dramatically.
Reason(R): Artificial Network power algorithms will become most intelligent;
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 8.
Assertion (A): Covering a large area than a single transmitter, we can add more towers indefinitely and cannot be limited by any horizon limits.
Reason(R): Digital intelligence will help to maintain, manage, and protect it.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 9.
Assertion (A): computer networks were faster, the Internet became full strength and wireless communications has been transformed the way business performed.
Reason(R): The usage of latest technologies, such as cloud computing, are being used to allow globally without scarifying security or limiting user access.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 10.
Assertion (A): Resource sharing means one device accessed by many systems.
Reason(R); Resource sharing is sharing such as printers, scanner, PDA, fax machine, and modems
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Find the odd one on the following

1. (a) File server
(b) Web camera
(c) Speakers
(d) Websites
Answer:
(d) Websites

2. (a) WWW
(b) Digital Audio
(c) URL
(d) Digital Video
Answer:
(c) URL

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

3. (a) Mouse
(b) Storage Servers
(c) Applications
(d) Softwares
Answer:
(a) Mouse

4. (a) Source
(b) Destination
(c) Node
(d) WWW
Answer:
(d) WWW

5. (a) servers
(b) Mobile Phones
(c) Tabs
(d) Monitors
Answer:
(d) Monitors

6. (a) SAGE
(b) ARCNET
(c) ARPANET
(d) URL
Answer:
(c) ARPANET

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

7. (a) JohnMurphy
(b) PaulBoran
(c) James Gostling
(d) Leonard kliemock
Answer:
(c) James Gostling

8. (a) Technology
(b) Electronic
(c) Telecom
(d) Intelligence
Answer:
(b) Electronic

9. (a) Flipkart
(b) Amazon
(c) IOB
(d) E-bay
Answer:
(c) IOB

10. (a) YAHOO
(b) BING
(c) GOOGLE
(d) E-Banking
Answer:
(d) E-Banking

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

11. (a) Whatsapp
(b) Gmail
(c) Facebook
(d) Twitter
Answer:
(b) Gmail

12. (a) lG:2.4kb/s
(b) 2G:64kb/s
(c) 4G :100mb/s
(d) 3G:lMb/s
Answer:
(d) 3G:lMb/s

13. (a) SMS
(b) MMS
(c) video conferencing
(d) Farm ware
Answer:
(d) Farm ware

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

14. (a) printer
(b) Scanner
(c) Fax Machine
(d) Networking
Answer:
(d) Networking

15. (a) G2A
(b) B2C
(c) B2G
(d) G2G
Answer:
(a) G2A

16. (a) Speakers
(b) CCTV
(c) Scanner
(d) E-Readers
Answer:
(d) E-Readers

17. (a) Indoor Cameras
(b) Tablets
(c) Wi-fi
(d) printers
Answer:
(d) printers

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

18. (a) SAGE: 1950
(b) SABRE: 1960
(c) TCP/IP: 1975
(d) E-Readers
Answer:
(c) TCP/IP: 1975

19. (a) Hosts
(b) Ethernet
(c) F-Cables
(d) Modems
Answer:
(d) Modems

20. (a) Communication
(b) Money Saving
(c)-Learning
(d) Software Sharing
Answer:
(c)-Learning

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Matching the following

Question 1.
SABRE – 1995
Fibre Optic cables – 1960
Hosts – 1965
Telephone Switch -. 1973
a) 1234
b) 2341
c) 2143
d) 3124
Answer:
c) 2143

Question 2.
Resource Sharing – paper Work
Communication – Software
Money-Saving – PDA
Data Sharing – Groupware
a) 2341
b) 3412
c) 4312
d) 4321
Answer:
b) 3412

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 3.
Amazon – Social Media
Blog – Online Shopping
Gmail – Mobile Networks
3G/4G – E-mail
a) 1234
b) 2341
c) 2143
d) 3124
Answer:
c) 2143

Question 4.
Wired Network System – Bank Account
Wireless Network system – HandHeldComputres
Mobile Networks – indoor Cameras
Private Networks – CCTV
a) 1234
b) 4321
c) 2143
d) 3124
Answer:
b) 4321

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 5.
Cloud storage -Internet Computing
Cloud computing – Access in different Area
Flame Ware – abusive Messages
Hackers – skilled experts
a) 1234
b)4321
c) 2143
d) 2134
Answer:
a) 1234

Important years to remember:

1950 U.S Military Radar system used SAGE in late 1950
1960 SABRE for Commercial Airline Reservation system online connected with two mainframe computers.
1965 Telephone switch at first widely used telephone switch was introduced by Western Electric
1966 WAN (WIDE AREA NETWORK)was introduced for time-sharing.
1969­

1970

ARPANET was which underpinned the development
1973 TCP/IP Using X.25 as commercial services were deployed
1995 Speed capacity of transmission of the Ethernet technology was slightly increased from 10 Mbit/s to 100Mbit.
1998 Ethernet supported transmission speed capacity towards gigabit.
2004 Facebook was created

Part B

Short Answers

Question 1.
What are the disadvantages of the Internet?
Answer:
Disadvantages of the Internet:

  1. Simply wasting precious time on the Internet by surfing, searching for unwanted things.
  2. A lot of unnecessary information is also there, why because anyone can post anything on their webpage, blogs.
  3. Hackers and viruses can easily theft our more valuable information available on the Internet. There a lot of security issues are there in E-banking.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 2.
What is a node?
Answer:
The computer is connected to a network called nodes. The data that originates and terminates at these particular nodes is called a source and destination.

Question 3.
What is the use of E-Governance?
Answer:
E-Governance made it easier to collect their certificates online, in the early days a person spends more time collecting the certificates and he has to directly many more difficulties. To avoid this bribery at office e-governance via the Internet let a new path on all for the ordinary man.

Question 4.
Write a note on Software or data sharing?
Answer:

  1. Using a computer network, application or other software will be stored at a central computer or server.
  2. We can share one software from one to another. It provides a high reliable source of data.
  3. For example, all files can not be taken a backup or duplicate on more than one computer.
  4. So if one is not unavailable due to hardware failure or any other reason, the copies can be used.

Question 5.
What is Virus?
Answer:
Malware threats or computer warms that replicates it On its own is called a virus.

Question 6.
What are the innovations changed people lifestyle to use the Internet?
Answer:
Mobile Technology and Social Web are the two innovations have been changed the people lifestyle to use the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 7.
List some social media applications used on the Internet.
Answer:
WhatsApp, Facebook, Twitter, blogs, Pinterest, Linkedln, classmates.

Question 8.
What is the use of packet switching?
Answer:
Packet switching is used to transfer the information between computers and network

Question 9.
What are the two types of Networks at home?
Answer:
Networks at home were connected in two ways they are

  1. Wired network
  2. Wireless network

Question 10.
Define Flame Wars.
Answer:
Flame wars are nothing a lengthy exchange of angry or abusive messages between users of an online forum or another discussion area.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 11.
Who are Hackers?
Answer:
Hackers were skilled computer experts, some who with their technical knowledge access our accounts.

Question 12.
Define E-Readers.
Answer:
E-Readers is similarly called an e-book reader these were designed for the purpose of reading via mobile electronic device to read digital e-books and periodically.

Question 13.
What is the various Generation of Mobile Networks with their coverage?
Answer:
1G – 2.4 Kb/s
2G – 64 Kb/s
3G – 2 Mb/s
4G – lOOMb/s
5G – More than 1 Gb/s

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 14.
What is mean by Mobile Networks?
Answer:
A mobile network is a network connecting devices without cable (wireless). Mobile computers, such as laptops, tablets, and handheld computers, were the fastest-growing segments.

Part C

Explain in brief answer

Question 1.
Define Computer networking.
Answer:

  • Computer networking is a technique of digital telecommunications network one that permits nodes to share their resources from one to another.
  • This computer networking exchanges the data as the main element.
  • These links were transferred over cable media like optic cables or wire or wireless media such as Bluetooth and WIFI.

Question 2.
Write a short note on E-Banking?
Answer:

  • E-Banking plays an important role in our day-to-day life, via Internet it can be accessed anytime, anywhere 24/7.
  • The speed and efficiency were very much better than that of done by the counter at the bank.
  • Now a day’s online payments were done via the Internet to avoid standing in the queue at the office to paybiils with very low transaction fees.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 3.
What are the disadvantages of Using the Internet?
Answer:

  • Simply wasting precious time on the Internet by surfing, searching for unwanted things.
  • A lot of unnecessary’ information is also there, why because anyone can post anything on their webpage, blogs.
  • Hackers and viruses can easily theft our more valuable information available on the Internet, There a lot of security issues are there in E-banking.

Question 4.
How computer Networks helps in communication?
Answer:

  • Using computer networks, we can interact with different people from each other all over the world.
  • It provides powerful communication among widely separated employees, team, sections.
  • They can easily communicate at a very low cost via mobile, social media, telephone, e-mail, chatting, video telephone, video conferencing, SMS, MMS, groupware, etc…

Question 5.
What is Resource Sharing?
Answer:

  • Resource sharing means one device accessed by many systems.
  • It allows all kind of programs, equipment’s and available data to anyone via network to irrespective of the physical location of the resource of them.
  • Simply resource sharing is sharing such as printers, scanner, PDA, fax machine, and modems. For example, many computers can access one printer if it is in networks.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 6.
What is Data sharing?
Answer:

  • Using a computer network, application or other software will be stored at a central computer or server and share one software from one to another is called Data Sharing.
  • For example; All files cannot be taken a backup or duplicate on more than one computer. So if one is not unavailable due to hardware failure or any other reason, the copies can be used.

Part D 

Explain in detail

Question 1.
Explain how Social Networks are useful to Individuals and the community?
Answer:
The usefulness of Social Networks:
Besides being a fun place to meet and relax with people, social networking leads us some extremely useful benefits to their individuals and communities:

1. Group information sharing over long distances:
Although friends and family members can keep in contact via mobile phone calls or by text messages, social nets suggest a much richer environment for staying connected.

Too many scenarios such as sharing photo albums videos or convey their wishes someone, work better these networks because an entire group can participate together with one. Overall, group discussions became more convenient as not everyone needs to be online at the exact same moment to post comments.

2. Broadcast announcements:

  1. Cities can more comfortable to spread word of emergencies and natural calamities.
  2. Venues and local shops can advertise upcoming events on social networks.
  3. Businesses able market their products to customers (and retrieve some direct feedback).

3. Fostering diversity of thought:

  1. Some critics of social networks point out that online communities attract people by similar interests and backgrounds.
  2. Indeed, when the people with different opinions do get together on online, many discussions seem to degenerate into personal attacks and so-called “flame wars.”
  3. It can be argued, by online debates are healthy in the long run.
  4. Although individuals may begin with more extreme views, over time their thinking gets influenced may begin with more extreme views, over time their thinking gets influenced by the comments of others at least to some extent.
  5. For people who stuck with a busy schedule can have some relaxation and known current affairs, news via these social networks can easier to wish someone and keep in touch their follower, loveable person.

Samacheer Kalvi 12th Computer Applications Guide Chapter 10 Introduction to Computer Networks

Question 2.
Write in detail about The Internet Explosion.
Answer:
The Internet Explosion

  • Internet is simply defined as the Worldwide Web connection of individual networks operated by academic, industry, government, and private parties.
  • The Internet served to interconnect with laboratories engaged in government research, and from 1994 it is expanded to serve millions of users and multiple purposes in all parts of this universe.
  • In few years, the Internet built itself as a highly powerful platform that changed their way we do business and the way we communicate. The Internet promotes as the universal source of information for billions of people, at work, at home, at school. The Internet gave high communication medium, has given an international, “Globalised” at all dimension of the world.
  • Internet is growing all the time. By two things, have marked its evolution nowadays the mobile technology and the social web. These two innovations have been changed people’s lifestyles to use the Internet. We may find many communities on the social web. Facebook was created in 2004 but gowned into the worldwide networks all over more than 2,230 million active users.
  • Mobile technology on hand made it possible to great reach the Internet and increase the Internet user all over the world.
  • The Internet allows all to be democratic in mass media. Anyone can have a webpage in
  • Internet with very low investment. Similarly, any business can reach a very large market directly, economically, and fast, no matter of location or size of their business. Almost anyone who can read and write can have access and a presence in the World Wide Web with very low investment. People everywhere can express and publish their ideas and opinions via blogging.

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 9 Connecting PHP and MYSQL Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 9 Connecting PHP and MYSQL

12th Computer Applications Guide Connecting PHP and MYSQL Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Which one of the following statements
instantiates the mysqil class?
a)mysqli = new mysqli()
b) $mysqli = new mysqli()
c) $mysqfl->new.mysq!i()
d) mysqli->new.mysqli()
Answer:
b) $mysqli = new mysqli()

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 2.
Which one is correct way, we can retrieve the data in the result set of MySQL using PHP?
a) mysql_fetch_row.
b) mysql_fetch_array
c) mysql_fetch_object
d) All the above
Answer:
d) All the above

Question 3.
How Can we Create a Database Using PHP and MySQL?
a) mysqli_create_db(“Database Name”)
b) mysqli_create_ db(” Data”)
c) create_db(“Database Name”)
d) create_db(“Data”)
Answer:
a) mysqli_create_db(“Database Name”)

Question 4.
Which is the correct function to execute the SQL queries in PHP ?
a) mysqli_query(“Connection Object’/’SQL Query”)
b) query(“Connection Object”,”SQL Query”)
c) mysql_query(”Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)
Answer:
a) mysqli_query(“Connection Object’/’SQL Query”)

Question 5.
Which is the correct function Closing Connection in PHP ?
a) mysqli_close(“Connection Object”);
b) close(“Connection Object”);
c) mysql_close(“Connection Object”);
d) mysqli_close(“Database Object”);
Answer:
c) mysql_close(“Connection Object”);

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 6.
Which is the correct function to establish Connection in PHP ?
a) mysqli_connect(“Server Name “,” ‘User Name “,”- Password “,” DB Name”);
b) connect(“‘Server Name “,” User Name”,”Pass-word”,”DB Name”);
c) mysql_connect(“Server Name “,” User Name “,” Password “,” DB Name”);
d) mysqli_connect (“Database Object'”‘);
Answer:
c) mysql_connect(“Server Name “,” User Name “,” Password “,” DB Name”);

Question 7.
Which is the not a correct MySQL Function in PHP ?
a) Mysqli_connect() Function
b) Mysqli_close() Function
c) mysqli_select_data() Function
d) mysqli_affected_rows() Function
Answer:
c) mysqli_select_data() Function

Question 8.
How many parameter are required for MYSQLi connect function in PHP ?
a) 2
b) 3
c) 4
d) 5
Answer:
c) 4

Question 9.
How many parameter are required for MYSQLI query function in PHP ?
a) 2
b) 3
c) 4
d) 5
Answer:
a) 2

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 10.
How many parameter are required for MYSQLI Close function in PHP ?
a) 1
b) 2
c) 3
d) 5
Answer:
a) 1

Question 11.
Which version of PHP supports MySQLi fuctions?
a) Version 2.0
b) Version 3.0
c) Version 4.0
d) Version 5.0
Answer:
d) Version 5.0

Part II

Short Answers

Question 1.
What are the MySQLi function available PHP?
Answer:

  1. Mysqli_connect( ) Function
  2. Mysqli_close( ) Function
  3. mysqli_select_db( ) Function
  4. mysqli_affected_rows( ) Function
  5. mysqli_connect_error( ) Function
  6. mysqlifetchassoc( ) Function

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 2.
What is the MySQLi function?
Answer:

  • MySQLi is an extension in PHP scripting language which gives access to the MYSQL database.
  • MySQLi extension was Introduced in version 5.0.0.

Question 3.
What are the types MySQLi function available PHP?
Answer:
Types of MySQL Functions in PHP:

  1. Database connections
  2. Managing Database connections
  3. Performing Queries
  4. Closing connection

Question 4.
Difference between the Connection and Close function?
Answer:

Connection function Close function
This function is used to connect the Database Server machine via PHP scripting language This function is used to close an existing opened database connection between PHP scripting and MySQL Database Server.
This function requires four parameters to con­nect to the database server. This function requires only one parameter to connect to the database server.

Question 5.
Give few examples of MySQLi Queries.
Answer:

  • mysqli_query($con “SELECT FROM Persons”);
  • mysqli_query($con,’INSERT INTO Persons
    (FirstName,LastName,Age)      VALUES
    OGIenn’,’Quagmire’,33)”);

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 6.
What is the connection string?
Answer:
The variables are used to connect to the database server. They are

  1. $servername → Database Server IP address
  2. $usemame → Database Server User Name
  3. $password → Database Server Password
  4. $DB_Name → Database Name

The mysqli connect function uses these variables and connect Database server from PHP scripting. If the connection gets fail, output will be printed with MySQL error code. Otherwise, the connection is a success.

Question 7.
What is a web Database?
Answer:

  • A Web database is a database application de¬signed to be managed and accessed through the Internet.
  • In other words, the light databases that support the web applications are also known as Web Databases.

Question 8.
What is mysqli_fetch_assoc() Function?
Answer:
mysqli_fetch_assoc( );
Fetches a result row as an associative array.
Syntax:
mysqli_fetch_assoc(result);

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 9.
Define mysqli_connect_error() Function.
Answer:
The mysqli_connect_error() function returns the error description from the last connection error, if any.

Syntax
mysqli_connect_error();

Question 10.
Define mysqIi_affected_rows() Function.
Answer:
my sqli_affected_rows( ):
mysqli_affected_rows( ) returns the number of affected rows in the previous MYSQL operation.

Syntax:
mysqli_affected_rows(connection)

Part III

Explain in brief answers

Question 1.
Write the Syntax for MySQLi Queries.
Answer:
Syntax:
mysqli_query(“Connection Object”,”SQL Query”)

Parameter Description
connection Required. Specifies the MySQL connection to use
query Required. Specifies the query string
resultmode Optional. A constant. Either: MYSQLI_USE_RESULT (Use this if we have to retrieve large amount of data)
MYSQLI_STORE_RESULT (This is default)

Question 2.
Write is the purpose of MySQLi function available.
Answer:

  • MySQLi is extension in PHP scripting language which gives access to the MYSQL database.
  • The mysqli functions are designed to communicate with MySQL
  • The mysqli_query() function performs a query against the database.

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 3.
Differentiate mysq I i_jaffected_ rows()
Function and mysqli_fetch_assoc() Function.
Answer:

mysqli_affected_ rows() mysqli_fetch_assoc()
It returns the number of affected rows in the pre­vious SELECT, INSERT, UPDATE, REPLACE, or DELETE query. It fetches a result row as an associative ar­ray.
Specifies the MySQL connection to use Specifies a result set identifier returned by mysqli_queryO, mysq-li_store_result()      or mysqli_use_result()
Syntax:
mysqli_affected_rows (connection);
Syntax:
mysqli_fetch_as-soc(result);

Question 4.
Write MySQL Connection Syntax with example.
Answer:
Syntax:
mysqli_eonnect(“Server Name”, “User Name”, “password”, “DB Name”);
Example:
<?php
Sservername = “localhost”;
Susername = “username”;
Spassword = “password”;
$DB_name = “SchooLDB”;
// Create connection
$conn = mysqli_connect($servemame, Susername, Spassword,$DB_name);

Question 5.
Write a note PHP MySQL database connection.
Answer:

  • The combination of PHP and MySQL has become very popular server-side web scripting language in the Internet.
  • MySQL and PHP scripting language connectivity, which covers Database connection establishment, Database Selection, SQL statement execution, and Connection termination.

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Part IV

Explain in detail

Question 1.
Discuss in detail MySQL functions for example.
Answer:

  • In PHP Scripting language many functions are available for MySQL Database connectivity and executing SQL queries.
  • MySQLi is extension in PHP scripting language which gives access to the MYSQL database.
  • MySQLi extension was introduced version 5.0.0.
  • Some of the MySQL functions are following
  • MySQL COUNT Function The MySQL COUNT aggregate function is used to count the number of rows in a database table.
    Example: mysql>SELECT COUNT(*) FROM employee_tbl;
  • MySQL MAX Function The MySQL MAX aggregate function allows us to select the highest (maximum) value for a certain column.
    Example: mysql > SELECT MAX(daily_typing_ pages)-> FROM employee_tbl;
  • MySQL MIN Function The MySQL MIN aggregate . function allows us to select the lowest (minimum)
    value for a certain column.
    Example: MySQL > SELECT MIN(daily_typing_ pages)-> FROM employee_tbl;
  • MySQL AVG Function The MySQL AVG aggregate function selects the average value for certain table column.
    Example: MySQL > SELECT AVG(daily_typing_ pages)-> FROM employee_tbl;
  • MySQL SUM Function The MySQL SUM aggregate function allows selecting the total for a numeric column.
    Example: mysql> SELECT SUM(daily_typing_ pages)-> FROM employee_tbl;

Question 2.
Explain the Database error handling and management process in PHP?
Answer:

  • When an error occurs, depending on your config- j □ration settings, PHP displays the error message in the web browser with information relating to the error that occurred.
  • PHP offers a number of ways to handle errors.
  • We are going to look at three commonly used methods;

Die statements;

  • • The die function combines the echo and exit function in one.
  • • It is very useful when we want to output a message and stop the script execution when | an error occurs.

Custom error handlers: These are user-defined functions that are called whenever an error occurs.

PHP error reporting:

  • The error message depending on your PHP error reporting settings.
  • This method is very useful in development: environment when you have no idea what; caused the error.
  • The information displayed can help you debug your application

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 3.
Explain in details types of MySQL connection method in PHP.
Answer:
Open a Connection to MySQL
There are several methods for connecting to a MySQL database using PHP:

  • MySQL Improved (mysqli) extension
  • PDO (PHP Data Objects)
  • Legacy MySQL (mysql_) functions
  • Connecting to a remote MySQL database using PHP

Connecting to MySQL using the MySQL Improved extension
The MySQL Improved extension uses the mysqli class, which replaces the set of legacy MySQL functions.

Connecting to MySQL using PDO (PHP Data Objects)

  • The MySQL Improved extension can only be used with MySQL databases.
  • PDO, on the other hand, abstracts database access and enables you to create code that can handle different types of databases.

Connecting to MySQL using the legacy MySQL functions

  • The original PHP MySQL functions (whose names begin with mysql_) are deprecated in PHP 5.5, and will eventually be removed from PHP.
  • Therefore, you should only use these functions when absolutely necessary for backward compatibility.
  • If possible, use the MySQL Improved extension or PDO instead.

Connecting to a remote MySQL database using PHP

  • The previous examples all assume that the PHP script runs on the same server where the MySQL database is located.
  • But what if you want to use PHP to connect to a MySQL database from a remote location.
  • For example, you may want to connect to your A2 Hosting database from a home computer or from another web server.

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 4.
Explain MySQLi Queries with examples.
Answer:
Performing Queries:
The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from MySQL database server. The SQL query statements are helping with PHP MySQL extension ^to achieve the objective of MySQL and PHP connection. “mysqli_query” is a function, helps to execute the SQL query statements in PHP scripting language.

Syntax:
mysqli_query(“Connection Object” “SQL Query”)
Example:
$con=mysqli_connect(“localhost”,“my_user”,“my_password”,“Student_DB”); $sql=“SELECT student_name,student_age FROM student”;mysqli_query($con,$sql);

Closing Connection:
mysqli_close( ) Function is used to close an existing opened database connection between. PHP scripting and MySQL Database Server.

Syntax:
mysqli_close(“Connection Object”);
<?php
$con=mysqli_connect(“localhost”,“$user”,“$password”,“SCHOOLDB”);
// ….some PHP code… mysqli_close($con);
?>

Example of PHP and MySQL Program:
<?php .
$servemame = “localhost”;
$usemame = “username”;
$password = “password”;
$dbname = “schoolDB”;
$connection = mysqli_connect(“$servemame”, “$usemame”, “$password” “$dbname”);
if (mysqli_connect_error ( ))
{
echo “Failed to connect to MySQL:”
mysqli_connect_error( );
}
sql stmt = “SELECT * FROM mycontacts”; //SQL select query
$result = mysqli_query($connection,$sql_stmt);//execute SQL statement$rows =
mysqli__num_r°ws($result);// get number of rows returned
if($rows) {
while ($row = mysqli_fetch_array($result)) {
echo ‘ID:’. $row[‘id’]. ‘<br>’;

12th Computer Applications Guide Connecting PHP and MYSQL Additional Important Questions and Answers

Part A

Choose the correct answers:

Question 1.
The combination of PHP and MYSQL has become very popular …………………………. web scripting language on the internet.
Answer:
Server-side

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 2.
Which of the following is not an RDBMS?
a) Oracle
b) IBM DB2
c) Microsoft SQLSERVER
d) None of these
Answer:
d) None of these

Question 3.
Which is used to convert PHP code into C++?
(a) LPLP
(b) HPHP
(c) BPBP
(d) APAP
Answer:
(b) HPHP

Question 4.
…………… is a function, helps to execute the SQL query statements in PHP scripting language.
a) mysqli_close()
b) mysqli_connect_error()
c) mysqli_query()
d) mysqli_connect()
Answer:
c) mysqli_query()

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 5.
Which of the following has written an alternative version of PHP?
(a) Facebook
(b) Twitter
(c) Instagram
(d) Whatsapp
Answer:
(a) Facebook

Fill in the blanks:

1. RDMS stands ……………….
Answer:
Relational Database Management System

2. SQL stands ……………….
Answer:
Structure query language

3. MySQLi extension was introduced version……………….
Answer:
5.0.0

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

4. ……………….is an extension in PHP scripting language which gives access to the MYSQL database.
Answer:
MySQLi

5. Connect function requires ………………. a number of parameters to connect to database server.
Answer:
four

Choose the incorrect statements:

1. a) PHP is an Open source & Community support scripting language
b) PHP is a server-side scripting language designed for Web development.
c) Only twenty Percentage of Website has been built by PHP and MySQL
d) Data is important to all computer and Internet-related applications.
Answer:
c) Only twenty Percentage of Website has been built by PHP and MySQL

2. a) mysqli_connect() function requires two parameters to connect to the database server.
b) Major of the web servers can support PHP scripting language
c) PHP can embed easily with HTML and client-side scripting language
d) PHP has a built-in function which is easily connected to the MySQL database
Answer:
a) mysqli_connect() function requires two parameters to connect to database server.

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

3. a) PHP scripting language has been supported by many Software frameworks
b) MySQLi is extension in HTML.
c) MySQLi gives access to the MYSQL database.
d) MySQLi extension was introduced in version 5.0.0.
Answer:
b) MySQLi is extension in HTML.

4. a) mysqli_connect() function is used to connect to
database server
b) If the connection gets fails, the output will be printed with MySQL error code.
c) If the connection gets true, there is no output to display.
d) The main goal of HTML and PHP connectivity is to retrieve and manipulate the data
Answer:
c) If the connection gets true, there is no output to display.

5. a) The SQL query statements are helping with PHP
MySQL extension
b) mysqli_connect() function, helps to execute the SQL query statements in PHP scripting language
c) MySQL is an open-source relational database management system.
d) mysqli_close() function requires two parameters to close an existing opened database connection
Answer:
d) mysqli_close() function requires two parameters to close an existing opened database connection

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Short Answers

Question 1.
Mention Some RDBMS Softwares?
Answer:
Relational Database Management System (RDMS) softwares are MySQL, Oracle, IBM DB2, and Microsoft SQLSERVER etc.

Question 2.
What is MySQLi?
Answer:
MySQLi is an extension in PHP scripting language which gives access to the MYSQL database.

Question 3.
What are the major operations of the database?
Answer:
INSERT, SELECT, UPDATE and DELETE

Question 4.
How many parameters to connect to the database server in Mysqli_connect() Function?
Answer:
This function requires four parameters to connect to database server

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 5.
What is the mash goal of MySQL and PHP connectivity?
Answer:
To retrieve and manipulate the data from the MySQL database server.

Find the odd one on the following

Question 1.
a) MySQL
b) Java
c) DB2
d) Oracle
Answer:
b) Java

Question 2.
a) TRUNCATE
c) UPDATE
b) SELECT
d) INSERT
Answer:
a) TRUNCATE

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 3.
a) $servername
b) $client name
c) $username
d) $password
Answer:
c) $username

Question 4.
a) Mysqli_connect() Function
b) Mysqli_close() Function
c) Mysqli_create_db() Function
d) Mysqli_select_db() Function
Answer:
c) Mysqli_create_db() Function

Question 5.
a) MysqlLaffected_rows() Function
b) Mysqli_connect_error() Function
c) Mysqli_fetch_assoc() Function
d) Mysqli_delete_db() Function
Answer:
d) Mysqli_delete_db() Function

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Match the following

Question 1.
A) DB2 – 1) Connect database server
B) INSERT – 2) RDBMS
C) Mysqli_close() Function – 3) One of the major operation
D) Mysqli_connect() Function – 4) Close an existing opened database
a) 1 2 3 4
b) 4 3 2 1
c) 2 3 4 1
d) 2 4 3 1
Answer:
c) 2 3 4 1

Question 2.
A) DB2 -1) Open source
B) SQLSERVER – 2) IBM
C) MySQL – 3) Microsoft
D) Oracle – 4) Oracle Corporation
a) 2 3 1 4
b) 4 3 2 1
c) 2 3 4 1
d) 2 4 3 1
Answer:
a) 2 3 1 4

Question 3.
A) Mysqli_close() Function -1) Four parameters
B) Mysqli_connect() Function -2) Two parameters
C) mysqli_queryO Function -3) No parameters
D) mysqli_connect_errno() -4) One Parameter
a) 2 3 1 4
b) 4 3 2 1
c) 2 3 4 1
d) 4 1 2 3
Answer:
d) 4 1 2 3

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 4.
A) Mysqli_close() Function -1) Fetches a result row
B) Mysqli_connect() Function -2) To execute the SQL query
C) mysqli_query() Function -3) To connect to database server
D) mysqli_fetch_assoc() -4) To close an existing opened database
a) 2 3 1 4
b) 4 3 2 1
c) 2 3 4 1
d) 4 1 2 3
Answer:
b) 4 3 2 1

Question 5.
A) mysqli_affected_rows()Returns the number of affected rows
B) mysqli_connect_error() – Returns the error description
C) MySQL MAX Function – Select the highest value for a certain column.
D) MySQL MIN Function- – Select the lowest value for a certain column.
a) 2 3 1 4
b) 1 2 3 4
c) 2 3 4 1
d) 4 1 2 3
Answer:
b) 1 2 3 4

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

SYNTAX:

1. Closing Connection:
mysqli_close(“Connection Object”);

2. Performing Queries
mysqli_query(“Connection Object”,”SQL Query”)

3. Database Connections:
mysqli_connect(“Server Name Password””DB Name”);

Part B

Short Answers

Question 1.
What is MySQL?
Answer:

  • MySQL is the most popular Open Source Relational SQL Database Management System.
  • MySQL is one of the best RDBMS being used for developing various web-based software, applications.

Question 2.
Write a Snippet code to check database connection?
Answer:
// Check connection
if(!$conn){
die(“Connection failed: “ . mysqli_connect_error( ));
}
echo “Connected successfully”;
?>

Question 3.
What is the use of SQL statements in PHP?
Answer:
The SQL query statements are helping with PHP MySQL extension to achieve the objective of MySQL and PHP connection.

Samacheer Kalvi 12th Computer Applications Guide Chapter 9 Connecting PHP and MYSQL

Question 4.
How the connection will get success in the mysqli_connect() function?
Answer:

  • The MySQL connect function uses these variables and connects the Database server from PHP scripting.
  • If the connection gets fail, the output will be printed with MySQL error code. Otherwise, the connection is a success.

Part C

Brief Answers

Question 1.
Write any 3 special features of PHP?
Answer:

  1. PHP can embed easily with HTML and client-side scripting language
  2. PHP has a built-in function that is easily connected to the MySQL database
  3. PHP scripting language has been supported by many Software frameworks

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 14 Open Source Concepts Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 14 Open Source Concepts

12th Computer Applications Guide Open Source Concepts Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
If the source code of a software is freely accessible by the public, then it is known as
a) freeware
b) Firmware
c) Open source
d) Public source
Answer:
c) Open source

Question 2.
Which of the following is a software pro¬gram that replicates the functioning of a computer network?
a) Network software
b) Network simulation
c) Network testing
d) Network calculator
Answer:
b) Network simulation

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Which of the following can document every incident that happened in the simulation and are used for examination?
a) Net Exam
b) Network hardware
c) Trace file
d) Net document
Answer:
c) Trace file

Question 4.
Which is an example of network simulator?
a) simulator
b) TCL
c) Ns2
d) C++
Answer:
c) Ns2

Question 5.
Fill in the blanks: NS2 comprises of key languages?
a) 13
b) 3
c) 2
d) 4
Answer:
c) 2

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 6.
Choose the Correct Pair from the following to build NS2
a) UNIX & TCL
b) UNIX & C++
c) C++ & OTCL
d) C++ & NS2
Answer:
c) C++ & OTCL

Question 7.
Which of the following is not a network simulation software?
a) Ns2
b) OPNET
c) SSFNet
d) C++
Answer:
a) Ns2

Question 8.
Which of the following is a open source network monitoring software?
a) C++
b) OPNET
c) Open NMS
d) OMNet++
Answer:
c) Open NMS

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 9.
Open NMS was released in
a) 1999
b) 2000
c) 2003
d) 2004
Answer:
d) 2004

Question 10.
OpenNMS Group was created by
a) Balog
b) Matt Brozowski
c) David Flustace
d) All of them.
Answer:
d) All of them.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Part II

Short Answers

Question 1.
Explain the History of open-source software.
Answer:
History of open source software:

  1. In the early day of computing, programmers and developers shared software in order to learn from each other
  2. Eventually, it moved to the wayside of commercialization of software in 1970-1980
  3. The Netscape communication corporation released their popular Netscape Communicator Internet suite as free software. This made others look into how to bring the free software ideas.
  4. The Open Source Initiative was founded in Feb 1998 to encourage the use of the new term open-source.

Question 2.
What is meant by a network simulator?
Answer:

  • A network simulator is a software program that replicates the functioning of a computer network.
  • In simulators, the computer network is typically demonstrated with devices, traffic etc. and the performance is evaluated.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
What is a trace file?
Answer:
A significant output of the simulation is the trace files. Trace files can document every incident that happened in the simulation and are used for examination.
C++ and Object-oriented Tool Command Language (OTCL) and network monitoring.

Question 4.
Write short notes on NS2.
Answer:
NS2 is the abbreviation of NETWORK SIMULA-TOR version 2. NS2 has C++ and Object-oriented Tool Command Language (OTcl) of languages 2. It is one the open-source application software

Question 5.
Explain NRCFOSS.
Answer:
NRCFOSS: National Resource Centre for Free and Open Source Software an Institution of Government of India. To help in the development of FOSS in India.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 6.
Write a short note on Open NMS?
Answer:
There are two types in this Meridian and Horizon.

  • Meridian: When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses.
  • Horizon: Horizon used where innovation occurs frequently. It is Best for IT-ecosystem, new technologies monitoring.

Part III

Explain In Brief Answer

Question 1.
What are the uses of Open source Network Software?
Answer:

  • There are many opensource softwares, so, we can select and use any software that suits our needs.
  • The software can be used without any cost and restrictions.
  • We can share our ideas with the team.
  • We can learn many ideas and make our program writing skills more efficient.
  • We can add the most required features to the software User friendly.

Question 2.
Explain Free software.
Answer:
Free software a concept developed in the 1980s by an MIT computer science researcher, Richard Stallman is defined by four conditions, as outlined by the nonprofit Free Software Foundation.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
List out the Popular open-source software.
Answer:

  • NS2 , OPEN NMS, Ubuntu , MySQL, PDF Creator, Open Office, 7zip, GnuCash, GIMP, BLENDER,
  • AUDACITY, VLC, MOZILAi FIREFOX, MAGENTO, ANDROID, PHP

Question 4.
Write note on open source hardware.
Answer:
In this period of increased competition and cyber crimes, the computers used by indivudals or business organisations may have spy hardwares of rivals. Open source hardware technology helps in such threats. In this technique we get the components of the hardware and its circuit diagram, so that we can remove suspicious spyware if found.

Question 5.
What are the main functional areas of Open NMS?
Answer:

  1. Service monitoring, where a number of monitor modules can govern if network-based services (ICMP, HTTP, DNS, etc.) are accessible.
  2. Data Gathering by using SNMP and JMX.
  3. Event management and notifications, which comprises alarm reduction and a robust announcement system with accelerations and duty schedules.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 6.
Explain Types of Organizations related to Open Source.
Answer:

  1. Organizations related to Open Source
  2. Apache Software Foundation
  3. The Document Foundation The Eclipse Foundation
  4. Free Software Foundation
  5. Linux Foundation
  6. OpenCourseWare Consortium
  7. Open Source Initiative

Part IV

Explain In Detail

Question 1.
Differentiate Proprietary and open-source software.
Answer:

                      Open Source Software

Proprietary Software

It is developed and tested through open collaboration It is owned by the indi­vidual or the organiza­tion that developed if
Anyone with the aca­demic knowledge can access, inspect, modi­fy and redistribute the source code. Only the owner or pub­lisher who holds the legal property rights of the source code can ac­cess it.
The project is managed by an open-source community of develop­ers and programmers The project is managed by a dosed group of in­dividuals or a team that developed it
They are not aimed at unskilled users outside of the programming community There are focused on a limited market of both skilled and unskilled end users
It Provides better flex­ibility which means more freedom which encourages innovation There is a very limit­ed scope of innovation with the restrictions and all
Example; Android, Firefox etc Example: Windows, macOS

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 2.
List out the Benefits of Open Source Software.
Answer:
There are many open source softwares, so, we can select and use any software that suits our needs.

  • The complete options of the software can be used without any cost and restrictions.
  • We can share our ideas with the team, write the required code and share it with many.
  • As we can identify the programming techniques of group members, we can learn many ideas and make our program writing skills more efficient.
  • The coding in open source softwares is being groomed by many enthusiastic members of the group. So if we report problems that we have in the program they are quickly mended by the group’s effort.
  • As we can make changes to the open-source softwares, we can add the most required features in the software.
  • Much open-source software is very user friendly.

Question 3.
Explain various Open Source Licenses.
Answer:
Types of open source license

  1. Apache License 2.0
  2. BSD 3-Clause “New” or “Revised” license
  3. BSD 2-Clause “Simplified” or “FreeBSD” license
  4. GNU General Public License (GPL)
  5. GNU Library or “Lesser” Genera! Public License (LGPL)
  6. MIT license
  7. Mozilla Public License 2.0
  8. Common Development and Distribution License
  9. Eclipse Public License
  10. When you change the source code. OSS requires the inclusion, of what you altered as well as your methods.
  11. The software created after code modifications may or may not be made available for free.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

12th Computer Applications Guide Open Source Concepts Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
…………… software has been developed by a variety of programmers.
a) Open source
b) Free Software
c) Proprietary’ Software
d) All of these
Answer:
a) Open source

Question 2.
Proprietary Software is owned by an …………………………
(a) Organization
(b) Individual
(c) both a and b
(d) none of these
Answer:
(c) both a and b

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Which of the following organization is not related to Open Source?
a) Apache Software Foundation
b) The Document Foundation
c) The Eclipse Foundation
d) Initiative Foundation.
Answer:
d) Initiative Foundation.

Question 4.
The free software concept is developed in ……………
a) 1980s
b) 1970s
c) 1990s
d) None of the above
Answer:
a) 1980s

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 5.
Pick the odd one out
(a) Apache Software Foundation
(b) The document Foundation
(c) The Eclipse Foundation
(d) The round Foundation
Answer:
(d) The round Foundation

Question 6.
Which of the following is not an open-source application?
a) AUDACITY
b) VLC
c) Mozilla Firefox
d) MS Office
Answer:
d) MS Office

Question 7.
BOSS developed by ……………………..
(a) A-DAC
(b) M-DAC
(c) D-MAC
(d) C-DAC
Answer:
(d) C-DAC

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 8.
…………… a pure event base software tool with super simulation design
a) OpenNMS
b) API
c) NS2
d) OTCL
Answer:
b) API

Question 9.
How many Indian Languages are supported by BOSS?
(a) 15
(b) 10
(c) 5
(d) many
Answer:
(d) many

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 10.
In OpenNMS, Data are Gathering by using ……………..
a) SNMP
b) JMX
c) Both a and b
d) None of these
Answer:
c) Both a and b

Question 11.
Which of the following is a network-based service?
a) ICMP
b) HTTP
c) DNS
d) All of the above
Answer:
d) All of the above

Question 12.
The free software was developed in the year …………………….
(a) 1972
(b) 1978
(c) 1980
(d) 2003
Answer:
(c) 1980

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Abbreviation

  1. NRCFOSS- National Resource Centre for Free and Open Source Software
  2. BOSS – Bharat Operating System Solutions
  3. C-DAC – Centre for Development of Advanced Computing
  4. GNU – General Public License
  5. FCAPS – Fault, configuration, accounting, performance, security
  6. NMS – Network Management System)
  7. OTCL – Object-oriented Tool Command Language
  8. SSFNet – Scalable Simulation Framework Net Models
  9. API – Application Program Interface
  10. SOURCE CODE – Set of Instructions that decide, how the software should work
  11. NS2 – Network Simulation 2
  12. OpenNMS – Open Source Network Management Software

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Assertion And Reason

Question 1.
Assertion (A): In a computer network, network simulation is a method whereby a software program models the activities of a network by calculating the communication between the different network objects such as(routers, nodes, switches, access points, links etc.).
Reason(R): A network simulator is a software program that replicates the functioning of a computer network.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:

Question 2.
Assertion (A): There is much Open Source software. So, we can select and use any software that suits our needs.
Reason(R): The complete options of the software can be used without any cost and restrictions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Assertion (A): Open NMS (Network Management System) is a free and open-source initiative grade network monitoring and management platform.
Reason(R); It is established and maintained by a community of users, developers and by the Open NMS Group, it offering services, training and support.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 4.
Assertion (A); Service monitoring, where a number of monitor modules can govern if network-based services (ICMP, HTTP, DNS, etc.) are accessible.
Reason(R): Data Gathering by using HTML and JSP.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 5.
Assertion (A): AJAX has C++and Object-oriented Tool Command Language (OTCL) of languages
Reason(R): NS2 link together for C++ and the OTCL using TCLCL.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Match The Following:
1. Richard Stallman – Software Program
2. BOSS – Open-source Application software
3. BSD 2-Clause – LGPL
4. BSD 3-Clause – Free software concept
5. GNU Library – Data Gathering
6. NS2 – Revised license
7. Open NMS – C++, OTCL
8. Network Simulation – FCAPS
9. BLENDER – Free BSD license
10. SNMP – C-DAC
Answers
1. Free software a concept
2. C-DAC
3. FreeBSD license
4. Revised license
5. LGPL
6. C++, OTCL
7. FCAPS
8. Software Program
9. Open source Application software
10. Data Gathering

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Very Short Answers

Question 1.
What is a trace file?
Answer:
Trace file is a document file, consists of every incident that happens in a simulation.

Question 2.
What is the use of Network monitoring software notifications?
Answer:
It is used to help the user or administrator for fixed errors.

Question 3.
Mention some large enterprise management products?
Answer:
HP Open View, IBM Micro muse or IBM Tivoli.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 4.
How NS2 links C++ and OTCL?
Answer:
It links together for C++ and the OTCL using TCLCL.

Question 5.
What is the use of trace files?
Answer:
Trace files can document every incident that happened in the simulation and are used for examination.

Question 6.
What does open-source denote?
Answer:
Open Source denotes some program whose I source code is made available for usage

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Find The Odd One On The Following

1. (a) Support
(b) Training
(c) Edit Source By User
(d) Security
Answer:
(c) Edit Source By User

2. (a) Apache
(b) Microsoft
(c) Linux
(d) Document
Answer:
(b) Microsoft

3. (a) GUI
(b) GPL
(c) LG PL
(d) MIT
Answer:
(a) GUI

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

4. (a) Routers
(b) Nodes
(c) OpenSource
(d) Access points
Answer:
(c) OpenSource

5. (a) Openoffice
(b) VLC
(c) Microsoft word
(d) NS2
Answer:
(c) Microsoft word

6. (a) Fault
(b) Communication
(c) Accounting
(d) Performance
Answer:
(b) Communication

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

7. (a) Event Management
(b) Service Monitoring
(c) Data Collection
(d) MAGENTO
Answer:
(d) MAGENTO

8. (a) ICMP
(b) HTTP
(c) JMX
(d) DNS
Answer:
(c) JMX

9. (a) Mozilla Firefox
(b) Chrome
(c) Internet Explorer
(d) Android
Answer:
(d) Android

10. (a) Bjarne Stroustrup
(b) Steve Giles
(c) Brian Weaver
(d) LukeRindfuss.
Answer:
(a) Bjarne Stroustrup

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Important Years To Remember:

1980 Free software concept developed
1999 Open NMS was released by Steve Giles, Brian Weaver, and Luke Rindfuss
2004 OpenNMS Group was created by Balog, Matt Brozowski, and David Hustace

Part B

Short Answers

Question 1.
Write a short note on open source software and developers?
Answer:
Open-Source Software and Developers:
OSS projects are collaboration opportunities that improve skills and build connections in the field. Domains that developers can contribute to the open-source community include:

  1. Communication tools.
  2. Distributed revision control systems.
  3. Bug trackers and task lists.
  4. Testing and debugging tools.

Question 2.
What is the network simulator?
Answer:

  • A network simulator is a software program that replicates the functioning of a computer network.
  • In simulators, the computer network is typically demonstrated with devices, traffic etc. and the performance is evaluated.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Write a short note on BOSS.
Answer:

  • BOSS (Bharat Operating System Solutions) Operating System Developed in India by C-DAC (Centre for Development of Advanced Computing) Help to prompt the use of open-source software in India.
  • It Supports many Indian languages.

Part C

Explain In Brief Answer

Question 1.
Write some Organizations related to Open Source.
Answer:

  • Apache Software Foundation
  • The Document Foundation
  • The Eclipse Foundation
  • Free Software Foundation
  • Linux Foundation
  • Open Courseware Consortium
  • Open Source Initiative

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 2.
List the various types of open NMS?
Answer:
There are two types in this Meridian and Horizon.

  • Meridian: When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses.
  • Horizon: Horizon used where innovation occurs frequently. It is Best for IT-ecosystem, new technologies monitoring.

Question 3.
Write a short note on Open-Source Software and Developers
Answer:

  • OSS projects are collaboration opportunities that improve skills and build connections in the field.
  • Domains that developers can contribute to the open-source community include:
    • Communication tools.
    • Distributed revision control systems.
    • Bug trackers and task lists.
    • Testing and debugging tools.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Part D

Explain In Detail

Question 1.
Differentiate Open Source Software with free software?
Answer:
Open-Source Software vs. Free Software:
Although the terms are often used interchangeably, OSS is slightly different from free software. Both deal with the ability to download and modify software without restriction or charge.

However, free software a concept developed in the 1980s by an MIT computer science researcher, Richard Stallman is defined by four conditions, as outlined by the nonprofit Free Software Foundation. These “four freedoms” emphasize the ability of users to use and enjoy software as they see fit.

In contrast, the OSS criteria, which the Open Source Initiative developed a decade later, place more emphasis on the modification of software, and the consequences of altering source code, licensing, and distribution.

Obviously, the two overlap; some would say the differences between OSS and free software are more philosophical than practical. However, neither should be confused with freeware. Freeware usually refers to proprietary software that users can download at no cost, but whose source code cannot be changed.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 2.
Explain in detail about Open NMS.
Answer:

  • Open NMS (Network Management System) is a free and open-source initiative-grade network monitoring and management platform.
  • It is established and maintained by a community of users, developers, and the Open NMS Group.
  • It offering services, training, and support.

The goal is for Open NMS

  • The goal is for Open NMS to be an actually distributed, scalable management application platform for all features of the FCAPS (Fault, Configuration, Accounting, Performance, Security) network management model.
  • Presently the emphasis is on Fault and Performance Management.
  • It was intended to cope with tens of thousands of devices from a single server as well as achieve unlimited devices using a cluster of servers.

Features:

  • OpenNMS comprises a discovery engine to routinely configure and manage network devices without operator intervention. It is written in Java and is issued under the GNU (General Public License.)
  • OpenNMS is the World’s first software for Network monitor and management with open-source options.

OpenNMS- Types:
There are two types in this Meridian and Horizon.
Meridian: When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses.
Horizon:

  • It is used where innovation occurs frequently.
  • It is Best for IT-ecosystem, new technology monitoring.

History:

  • OpenNMS was Released in 1999 by Steve Giles, Brian Weaver, and Luke Rindfuss.
  • In 2004 OpenNMS Group was created by Balog, Matt Brozovvski, and David Hustace.
  • It is written in Java and can run on all type of platform,
  • It gives us Event management & Notification, Discovery & Provisioning, service monitoring, and Data Collection.
  • Won lot of awards for best of open-source software.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Explain in Detail Open NMS?
Answer:
Open NMS

  • Open NMS (Network Management System)is a free and open-source initiative-grade network monitoring and management platform.
  • It is established and maintained by a community of users, developers, and by the Open NMS
    Group, it offering services, training, and support.
  • The goal is for Open NMS to be an actually distributed, scalable management application platform for all features of the FCAPS (Fault, configuration, accounting, performance,
    security) network management model.
  • Presently the emphasis is on Fault and Performance Management.
    It was intended to cope with tens of thousands of devices from a single server as well as achieve unlimited devices using a cluster of servers.
  • Open NMS comprises a discovery engine to routinely configure and manage network devices without operator intervention.
  • It is written in Java and is issued under the GNU (General Public License.)
  • Open NMS is the Worlds first software for Network monitor and management with open source options. There are two types in this Meridian and Horizon.
  • When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses, for Horizon used where innovation occurs frequently. It is Best for IT-ecosystem, new technologies monitoring.

Open Source Hardware:

  1. Remix
  2. Remake
  3. Remanufacture
  4. Redistribute
  5. Resell
  6. Study and Learn

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 8 Forms and Files Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 8 Forms and Files

12th Computer Applications Guide Forms and Files Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
When you use the $_GET variable to collect data, the data is visible to.
a) none
b) only you
c) everyone
d) selected few
Answer:
c) everyone

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 2.
Which one of the following should not be used while sending passwords or other sensitive information?
a) GET
b) POST
c) REQUEST
d) NEXT
Answer:
a) GET

Question 3.
Which directive determines whether PHP scripts on the server can accept file up¬loads?
a) file_uploads
b) file_upload
c) file_input
d) fiie_intake
Answer:
a) file_uploads

Question 4.
In HTML form cinput type=”text”> is used for
a) One line text
b) Block of text
c) One paragraph
d) None
Answer:
a) One line text

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
HTML classes that are already defined and allow us to apply styles on it are called as
a) Pseudo classes
b) Css classes
c) Javascript classes
d) None
Answer:
b) Css classes

Question 6.
If you would like to read a file character by character which function do you use?
a) fopen ()
b) fread ()
c) fgetc ()
d) file ()
Answer:
c) fgetc ()

Question 7.
PHP is a ……………… typed language.
a) User
b) Loosely
c) Server
d) System
Answer:
b) Loosely

Question 8.
What does fopen() function do in PHP?
a) It used to open files in PHP
b) It used to open Remote Server
c) It used to open folders in PHP
d) It used to open Remote Computer
Answer:
a) It used to open files in PHP

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 9.
How PHP files can be accessed?
a) Through Web Browser
b) Through HTML files
c) Through Web Server
d) All of Above
Answer:
a) Through Web Browser

Question 10.
Which of the following functions reads the entire contents of a file?
a) fgets()
b) file_get_contents()
c) fread()
d) readfile()
Answer:
b) file_get_contents()

Part II

Short answers

Question 1.
Define HTML form controls.
Answer:

  • Text inputs contain textbox and text area controls,
  • Buttons may contain Submit button, Reset but-ton and Cancel Button,
  • Checkbox is the important feature which selects more than one value from the HTML form,
  • Radio box is simiiar to checkbox but one value can be chosen at a time,
  • File select is the best feature to select one file from the local machine to server machine at a time.
  • Form tag is used to mention a method (POST or GET) and control the entire form controls in the HTML document.

Question 2.
Define for Form Handling method in PHP.
Answer:

  • Form tag is used to mention a method (POST or GET) and control the entire form controls in the HTML document.
  • All input values are synchronized and sent to the server via the POST or GET method.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 3.
What is Form Validation In RHP?
Answer:

  • Validation is a process of checking the input data submitted by the user from the client machine.
  • There are two types of validation available in PHP. They are as follows, Client-Side Validation, Server Side Validation.

Question 4.
List out HTML control to support PHP language.
Answer:

  • Text inputs
  • Buttons
  • Checkbox
  • Radio box
  • File Select
  • Form Tag

Question 5.
Write Syntax of Text box in HTML,
Answer:

Type Description
<input type=”text”> Defines a one-line text input field

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 6.
Define File handling in PHP.
Answer:
Files: File handling is an important activity of all web application development process.
Files are processed for different tasks using the following events:

  1. PHP Open a File
  2. PHP Read a File
  3. PHP Close a File
  4. PHP Write a File
  5. PHP Appending a File and
  6. PHP uploading a File.

Question 7.
Define Browse button in HTML.
Answer:

  • It is one of the types of button, which is used to upload a single file or multiple files.
  • The <input type=”file”> defines a file-select field and a “Browse” button for file uploads.
  • To define a file-select field that allows multiple files to be selected, add the “multiple” attribute.

Question 8.
Write Syntax of Browse button in HTML.
Answer:
Syntax:
cinput type=”file” name=”myFile”>

Question 9.
Compare Text box and Text area
Answer:

Text box Text Area
They are generally used for collecting information such as names, email ad­dresses, URLs, etc. These are larger versions of the TEXT BOX. They give more room for visi­tors input. TEXTAREAs are generally used to gather feedback or comments.
The <input> tag specifies an input field where the user can enter data. The <textarea> tag defines a multi-line text input control.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 10.
Usage of File open function.
Answer:

  1. fopen( ) is a system function available in PHP.
  2. This function helps to open a file in the server.
  3. It contains two parameters one for the file and the other one specifies in which mode the file should be opened (Read/Write).

Part III

Explain in brief answer

Question 1.
Write the features Form Handling.
Answer:

  • HTML Forms are required, when you want to collect some data from the site visitor.
  • A form will take input from the site visitor and then will post it to a back-end application such as CGI, ASP Script or PHP script etc.
  • The back-end application will perform required processing on the passed data based on defined business logic inside the application.

Question 2.
Write the purpose Get method and Post method.
Answer:
All input values are synchronized and sent to the server via POST method or GET method. Method is an attribute form tag in HTML. Once the data reaches the server, two PHP variables such as $_POST and $_GET collects the data and prepares the response accordingly.

Post Method:
The input data sent to the server with POST method is stored in the request body of the client’s HTTP request.

Get Method:
The input data sent to the server with POST method via URL address is known as query string. All input data are visible by user after they clicks the submit button.

Question 3.
Differentiate Get and Post Method
Answer:

Get Method

Post method

It is designed to get data from server It is designed to send data to the server
It is suitable to carry limited data It can carry unlimited of data
Faster to send the re­quest It is little slow compare to get method

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 4.
Write short notes on File handling.
Answer:

  • File handling is an important activity of all web application development process.
  • It is needed for any application. For some tasks to be done file needs to be processed.
  • File handling in PHP is similar as file handling is done by using any programming language.

Question 5.
Write short notes on File handling functions.
Answer:

  1. fopen( ) – PHP Open a File
  2. fread( ) – PHP Read a File,
  3. fclose( ) – PHP Close a File,
  4. fwrite( ) – PHP Write a File,
  5. file_put_contents( ) – PHP Appending a File

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Part IV

Explain in detail

Question 1.
Explain Form handling methods.
Answer:
PHP Basic Form Handling

  • When the user keying the input data in HTML controls and clicks the submit button the request will be generated and reaches a PHP file which is mentioned in the FORM tag under the Action attribute.
  • All input values are synchronized and sent to the server via POST method or GET method.
  • Method is an attribute form tag in HTML. Once the data reaches the server, two PHP variables such as $_POST and $_GET collects the data and prepares the response accordingly.

Post Method:

  • The input data sent to the server with POST method is stored in the request body of the client’s HTTP request.

Get Method:

  • The input data sent to the server with POST method via URL address is known as query string.
  • All input data are visible by user after they clicks the submit button.

Question 2.
Discuss in detail about HTML form controls.
Answer:

Value of type attribute Description
Text Create a Text Box.
The element used to get all kind of text input such as name, address etc.,
Password Similar as Text box.

But, while entering data, the characters are appearing as coded symbois such as asterisk.

Checkbox Check box is an element appearing like a small square box. When the user dick on the square a tiny tick mark will appear inside the square.
This element is used to select multiple options.
Radio Button Radio button is used to select any one of the multiple options from the list.
This element locks like a small circle, when the user select an item, a tiny dot will appear within the circle.
If the user selects another option, previously selected option will be deselected. This means, user can select any one of the given option form a group.
Reset It is a special command button used to dear ail the entries made in the form.
Submit It is also a special command button used to submit all the entries made in the form to the backend server.
Button This is a standard graphical button on the form used to call functions on click.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 3.
Explain the process File handling.
Answer:

  • File handling is an important part of any web ap¬plication. You often need to open and process a file for different tasks.
  • File handling is needed for any application. For some tasks to be done file needs to be processed.
  • File handling in RHP is similar as file handling is done by using any programming language like C.

Five major operations can he performed on file are:

  • Creation of a new file.
  • Opening an existing file.
  • Reading data from a file.
  • Writing data in a file.
  • Closing a file.

Steps for Processing a Fite

  • Declare a file pointer variable.
  • Open a file using open() function.
  • Process the file using the suitable function.
  • Close the file using fclose() function.

Question 4.
Explain concepts of HTTP Uploading process.
Answer:
File Upload:

  1. File upload is the best feature to select one file from the local machine to server machine. Form tag is used to mention a method as POST or GET and encrypt attribute mentioned as “multipart/form-data”.
  2. In the <Input> tag mention type=”file” attribute shows the input field as a file-select control, with a “Browse” button next to the input control.
  3. The form above sends data to a file called “Student_photo_upload.php”.
  4. First, ensure that PHP is configured to allow file uploads.
  5. In Server machine “php.ini” file, search for the file_uploads directive, and set it to On: “file_upIoads = On”
  6. After submitting the upload button the request reaches to Student_photo_upload.php file. In the file $_FILES variable collects all uploaded file information such as the name of the file, size of the file and extension of the file etc.
  7. All the details are checked thoroughly and the errors are saved in an array variable.
  8. The file finally moves under the image directory if the array error variable is empty.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
Explain in detail of File handling functions.
Answer:

  • PHP Manipulating Files: PHP has several functions for creating, reading, uploading, and editing files.
  • PHP readfile() Function: The readfile() function reads a file and writes it to the output buffer.
  • PHP Open File – fopen(): A better method to open files is with the fopen() function.
    This function gives you more options than the readfile() function.
  • PHP Read File – read(): The fread() function reads from an open file.
  • PHP Close File – close(): The fclose() function is used to close an open file.
  • PHP Create File – fopen(): The fopen() function is also used to create a file.
  • Maybe a little confusing, but in PHP. a file is created using the same function used to open files.
  • PHP Write to File – write(): The fwrite() function is used to write to a file.

12th Computer Applications Guide Forms and Files Additional Important Questions and Answers

Part A

Choose the correct answers:

Question 1.
The main objective of PHP and HTML form controls are …………..
a) To collect data from users.
b) To create data from users.
c) To delete data from users.
d) to manipulate data from users.
Answer:
a) To collect data from users.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 2.
Pick the odd one out.
(a) Submit
(b) Reset
(c) File
(d) Cancel
Answer:
(c) File

Question 3.
Match the following:
(A) Check box – (1) Query String
(B) Email – (2) Client’s Request
(C) POST – (3) Should require @ and .strings
(D) GET – (4) Must be checkable minimum one value
Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files 1
Answer:
(D) GET – (4) Must be checkable minimum one value

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 4.
…………………………. is used to select one value can be chosen at a time.
(a) Checkbox
(b) Radio box
(c) Textbox
(d) File
Answer:
(b) Radio box

Question 5.
…………….. and ……………. are the most important concepts that the PHP web development processes.
a) Forms and files
b) Tables and Links
c) Both a and b
d) None of these
Answer:
a) Forms and files

Question 6.
……………. is a process of checking the input data submitted by the user from the client machine.
a) File
b) Form
c) Validation
d) All of these
Answer:
c) Validation

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 7.
Which tag is used to mention POST or GET method?
(a) Frame
(b) Form
(c) File
(d) Input
Answer:
(b) Form

Question 8.
Which of the following is a back-end application?
a) CGI
b) ASP Script
c) PHP Script
d) All of these
Answer:
d) All of these

Question 9.
……………….. is the best feature to select one file from the local machine to server machine,
a) File upload
b) Files
c) Forms
d) All of these
Answer:
a) File upload

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 10.
………………………. is a process of checking the input data submitted by the user from the client machine.
(a) collection
(b) verification
(c) validation
(d) Report
Answer:
(c) validation

Choose odd man out:

1. a) Submit
b) Cancel
c) File select
d) Reset
Answer:
c) File select

2. a) file_put_contents()
b) fopen ()
c) fread ()
d) fgetc ()
Answer:
d) fgetc ()

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

3. a) Append
b) Frame
c) File select
d) Form Tag
Answer:
a) Append

4. a) File
b) Data
c) Mode
d) Action
Answer:
d) Action

5. a) PHP
b) AJAX
c) JSP
d) ASP
Answer:
b) AJAX

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Very Short Answers

Question 1.
Give the syntax for fopen( ) function?
Answer:
Syntax:
$file_Object= fopen(“FileName”, “ReadAVriteMode”) or die(“Error Message!”);

Question 2.
What is the main objective of PHP and HTML?
Answer:
The main objective of PHP and HTML form controls is to collect data from users.

Question 3.
What is fopen() function?
fopen() is a system function available in PHP.

Question 4.
What is the purpose of fopen() function?
Answer:
fopen function helps to open a file in the server.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
How many parameters are there in fopen() function?
Answer:
There are two parameters in fopen() function.

Question 6.
What is the purpose of fread() function?
Answer:
The fread() function reads from an open file.

Question 7.
How files are uploaded to the server?
Answer:
A PHP script can be used with an HTML form to allow users to upload files to the server.

Question 8.
What is file handling?
Answer:
File handling is used to open and process a file for different tasks.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 9.
What is the purpose of form validation?
Answer:
To protect your form from hackers and spammers!

Question 10.
What is HTML?
Answer:
HTML is the standard markup language for creating web pages and web applications.

Question 11.
Expand HTML.
Answer:
HTML stands Hypertext Markup Language.

Question 12.
What are the methods to be used to upload data?
Answer:
GET and POST methods are used to upload the data most frequently.

Question 13.
What is the purpose of encrypting attribute?
Answer:
This attribute is used to specify, how the browser encodes the data before it sends it to the server.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 14.
Expand AJAX.
Answer:
Asynchronous JavaScript And XML.

Question 15.
IS AJAX, a programming language?
Answer:
AJAX is not a programming language.

Match the following:

1. Text – More than one value
2. Buttons – Only one value
3. Checkbox – Post and Get
4. Radio box – Select file
5. File Select – Submit Reset and Cancel.
6. Form – Textbox and text area
7. URL address – _blank, _se!f, __parent
8. Target window – Query string
9. file_put_contents() – php.ini
10. Server machine – Append
Answer:
1. Textbox and text area
2. Submit, Reset and Cancel.
3. More than one value
4. Only one value
5. Select file
6. Post and Get
7. Query string
8. _blank, _self, _parent
9. Append
10. php.ini

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Syntax

1. fopen():
$file_Object= fopen(“FileName”, “Read/Write-Mode”) or die(“Error Message!”);

2. fread():
fread($file_Object,filesize(“FileName”));

3. fcloseQ:
fclose($file_Object);

4. fwriteQ:
fwrite($myfile, $txt);

Additional programs using forms:

1. Sample’PHP program to open and dosing a file:
i) Text(Notepad) file:
AJAX = Asynchronous JavaScript and XML CSS = Cascading Style Sheets HTML = Hyper Text Markup Language PHP = PHP Hypertext Preprocessor SQL = Structured Query Language SVG = Scalable Vector Graphics XML = Extensible Markup Language

ii) PHP File:
<?php
$myfile = fopen(“webdictionary.txt”, “r”) or dieC’Unable to open file!”); echo fread($myfile,filesize(“webdictionary. txt”)); fclose($myfile);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

iii) OUTPUT
AJAX = Asynchronous JavaScript and XML CSS = Cascading Style Sheets HTML = Hyper Text Markup Language PHP = PHP Hypertext Preprocessor SQL = Structured Query Language SVG = Scalable Vector Graphics XML = Extensible Markup Language

2. An HTML code to demonstrate Form and Form controls (Login form)
<html>
<head>
<title> Login Form </title>
<body>
<h3 align=center> TamilNadu State Council of Educational Research and Training, Chennai </h3>
<Form Action = “mailto:abcd.xyz@com” method=post >
<p> User Name:
<Input type = text name=”user_name” size = 20 maxlength = 15> </p>
<p> Password:
clnputtype = password name=”pass”size = 20 maxlength = 15> </p>
<Input type = reset value = “Clear”>
<Input type = submit value = “Login”> </Form>
</body>
</html>
Output:
Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files 2

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Part B 

Short Answers

Question 1.
Write a note on client-side validation?
Answer:
Client-Side Validation: The input data validations are performed on the client machine’s web browsers using client-side scripts like Javascript or adding “required” attributes in HTML input tags.

Question 2.
What is the process of Server Side Validation:
Answer:
After the submission of data, validations are performed on the server-side using programming like PHP, ASP, or JSP, etc. available in the server machine.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Brief Answers

Question 1.
Write the Validation rules for HTML input fields.
Answer:
Validation rules for HTML input field
Name (Text Input) : Should require letters and white-spaces
Email (Text Input) : Should require @ and .strings
Website (Text Input) : Should require a valid URL
Radio: Must be selectable minimum one value
Check Box: Must be checkable minimum one value
Drop-Down Menu: Must be selectable minimum one value

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 2.
Explain briefly about fopen() function.
Answer:
PHP Open a File

  • fopen() is a system function available in PHP.
  • This function helps to open a file in the server.
  • It contains two parameters one for the file and the other one specifies in which mode the file should be opened (Read/Write).

Syntax:
$file_Object= fopen(“FileName” “Read/WriteMode”) or dieC’Error Message!”);
Example:
<?php
$myfile = fopen(“Student.txt”, “r”) or
die(“Unable to open file!”);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 3.
Explain briefly about fread() function.
Answer:
PHP Read a File:
The fread() function reads from an open file. The file object comes from fopen function.

Syntax:
fread($file_Object,filesize(“FileName”));

Example:
<?php
fread($myfile,filesize(“Student.txt”));
?>

Question 4.
Explain briefly about fclose() function.
Answer:
PHP Close a File:
The fclose() function is used to close an opened file.
The file object comes from fopen function.

Syntax:
fclose($file_Object);

Example:
<?php
$myfile = fopenC’student.txt”, “r”);
// some code to be executed….
fclose($myfile);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
Explain briefly about fwrite() function.
Answer:
PHP write a File:
The fwrite() function is used to write to a file.

Syntax:
fwrite($myfile, $txt);

Example:
<?php
$myfile = fopen(“new_schooL_file.txt”, “w”)
or dieC’Unable to open file!”);
$txt = “School Name\n”;
fwrite($myfile, $txt);
$txt = “Student Name\n”;
fwrite($myfile, $txt);
fclose($myfile);
?>

Question 6.
Write a short note on Appending a File
Answer:
The file_put_contents() function is used to Ap-
pend to a file.

Syntax:
file_put_contents(file,data,mode,context)

Example:
<?php
$txt = “Student id “;
$myfile = file_put_contentsClogs.txt’, $txt.
PHP_EOL , FILE_APPEND | LOCK_EX);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Part D

Detailed Answers

Question 1.
Explain the file uploading method in PHP.
Answer:

  • File upload is the best feature to select one file from the local machine to the server machine.
  • The form tag is used to mention a method as POST or GET and encrypt attribute mentioned as “multipart/form-data”.
  • In the <Input> tag mention type=”file” attribute shows the input field as a file-select control, with a “Browse” button next to the input control.
  • The form above sends data to a file.
  • In Server machine “php.ini” file, search for the file_uploads directive, and set it to On: “file_up- loads = On”
  • After submitting the upload button the request reaches the file.
  • In the file $_FILES variable collects all uploaded file information such as the name of the file, size of the file and extension of the file, etc.
  • All the details are checked thoroughly and the errors are saved in an array variable.
  • The file finally moves under the image directory if the array error variable is empty.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 15 E-Commerce Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 15 E-Commerce

12th Computer Applications Guide E-Commerce Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
A company can be called E-Business if
a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country.
d) it has many employees.
Answer:
b) it conduct business electronically over the Internet.

Question 2.
Which of the following is not a tangible good?
a) Mobile
b) Mobile Apps
c) Medicine
d) Flower bouquet
Answer:
b) Mobile Apps

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
SME stands for
a) Small and medium sized enterprises
b) Simple and medium enterprises
c) Sound messaging enterprises
d) Short messaging enterprises
Answer:
a) Small and medium sized enterprises

Question 4.
The dotcom phenomenon deals with
a) Textile industries
b) Mobile phone companies
c) Internet based companies
d) All the above
Answer:
c) Internet based companies

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 -2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
Answer:
a) The First Wave of Electronic Commerce: 1985 -1990

Question 6.
Assertion (A): The websites of first wave dot.com companies were only in En-glish
Reason (R The dot com companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 7.
Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
Answer:
d) Work outsourced to a third party outside its own country

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 8.
G2G systems are classified into
a) Internal facing and external facing
b) Internet facing and Extranet facing
c) Internal flag and external flag
d) Internet flag and Extranet flag
Answer:
a) Internal facing and external facing

Question 9.
host the e-books on their websites.
a) Bulk-buying sites
b) Community sites
c) Digital publishing sites
d) Licensing sites
Answer:
c) Digital publishing sites

Question 10.
Which of the following is not a characteristics of E-Commerce
a) Products cannot be inspected physically before purchase.
b) Goods are delivered instantly.
c) Resource focus supply side
d) Scope of business is global.
Answer:
d) Scope of business is global.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part II

Short Answers

Question 1.
Define E-Commerce.
Answer:
E-Commerce can be described as the process of buying or selling products, services, or information via computer networks.

Question 2.
Distinguish between E-Business and E-Commerce
Answer:

E-Commerce

E-business

1. E-commerce in­volves commercial transactions done over the internet. 1. E-business is the conduct of business processes on the internet
2. E-commerce is a subset of E-business. 2. E-business is a superset of E-business.
3. E-commerce usu­ally requires the use of just a website. 3. E-business involves the use of CRM’S, ERP that connect different business processes.
4. E-commerce just involves buying and selling of products and services. 4. E-business includes all kind of pre-sale and post-sale efforts.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Differentiate tangible goods and electronic goods with an example of your own.
Answer:

Tangible goods

Electronic goods

A physical item that can be perceived by the sense of touch. Components for controlling the flow of electrical currents for the purpose of informa­tion processing and system control.
Example:  cars,  food items, com­puters, Example: Goods with tran­sistors and diodes.

Question 4.
What are dotcom bubble and dotcom burst?
Answer:
Dotcom Bubble:

  1. The Dotcom Bubble was a historic excessive growth (excessive assumption) of the economy that occurred roughly between 1995 and 2000.
  2. During the dotcom bubble, the value of equity markets grew exponentially with the NASDAQ composite index of US stock market rising from under 1000 points to more than 5000 points.

Dotcom Burst:

  1. The Nasdaq-Composite stock market index fell from 5046.86 to 1114.11. This is infamous, known as the Dotcom Crash or Dotcom Burst.
  2. This began on March 11, 2000, and lasted until October 9, 2002. During the crash, thousands of online shopping companies, like Pets.com failed and shut down.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Write a short note on out-sourcing.
Answer:
Out-sourcing is generally associated with B2B E-Commerce. If a company’s work is hired by another company, it would be termed as out-sourcing.

Part III

Explain In Brief Answer

Question 1.
Describe how E-Commerce is related to socio-technological changes.
Answer:

  • The growth of E-Commerce is also related to socio-technological changes.
  • The more, the medium becomes deep-rooted, the more, are the users drawn towards it.
  • An increase of users increases the markets.
  • As the markets expand, more business organizations are attracted.
  • The more businesses accumulate it creates competition.
  • The competition leads to innovation.
  • Innovation in turn drives the development of technology.
  • Technology facilitates E-Commerce’s growth.

Question 2.
Write a short note on the third wave of E-Commerce.
Answer:
The Third Wave of Electronic Commerce: 2010 – Present

  1. The third wave is brought on by mobile technologies. It connects users via mobile devices for real-time and on-demand transactions, mobile technologies.
  2. It connects users via mobile devices for real-time and on-demand transactions.
  3. Not only the information is filtered by time, but also the geographic coordinates are used to screen the specific location-tailored information properly.
  4. The term Web 3.0, summarizes the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web, Generic Database, etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Explain B2B module in E-Commerce.
Answer:

  • In B2B E-Commerce, commercial, transactions take place between different business organizations, through the Internet.
  • For example, a cycle company may buy tyres from another company for their cycles.
  • When compared to other models, the value per transaction in B2B transactions is high, because of bulk purchases.
  • The company also might get the advantage of discounts on bulk purchases.

Question 4.
Write a note on name-your-price websites.
Answer:
Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the retailer for a particular product or service, https://in.hotels.com/

Question 5.
Write a note on the physical product dispute of E-Commerce.
Answer:

  • Physical product disputes are a major disadvantage in E-Commerce.
  • E-Commerce purchases are often made on trust.
  • This is because; we do not have physical access to the product.
  • Though the Internet is an effective channel for visual and auditory information it does not allow full scope for our senses.
  • We can see pictures of the perfumes, but could not smell their fragrance; we can see pictures of a cloth, but not its quality.
  • If we want to inspect something, we choose what we look at and how we look at it. But in online shopping, we would see only the pictures the seller had chosen for us.
  • People are often much more comfortable in buying generic goods (that they have seen or experienced before and in which there is little ambiguity) rather than unique or complex things via the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part IV

Explain in Detail

Question 1.
Write about the development and growth of Electronic Commerce.
Answer:
The Development and Growth of Electronic Commerce:
Economists describe four distinct waves (or phases) that occurred in the Industrial Revolution. In each wave, different business strategies were successful. Electronic commerce and the information revolution brought about by the Internet likely go through such a series of waves.

The First Wave of Electronic Commerce: 1995 -2003

  • The Dotcom companies of the first wave are mostly American companies. Thereby their websites were only in English. The Dotcom bubble had attracted huge investments to first wave companies.
  • As the Internet was a mere read-only web (web 1.0) and network technology was in its beginning stage, the bandwidth and network security were very low.
  • Only EDI and unstructured E-mail remained as a mode of information exchange between businesses.
  • But the first wave companies enjoyed the first-move advantage and customers had left with no options.

The Second Wave of Electronic Commerce: 2004 – 2009

  • The second wave is the rebirth of E-Commerce after the dot-com bust. The second wave is considered as the global wave, with sellers doing business in many countries and in many languages.
  • Language translation and currency conversion were focused on the second wave websites.
    The second wave companies used their own internal funds and gradually expanded their E-Commerce opportunities.
  • As a result, E-Commerce grows more steadily, though more slowly. The rapid development of network technologies and interactive web (web 2.0, a period of social media) offered the consumers more choices of buying. The increased web users nourished E-Commerce companies (mostly B2C companies) during the second wave.

The Third Wave of Electronic Commerce: 2010 – Present

  • The third wave is brought on by mobile technologies. It connects users via mobile devices for real-time and on-demand transactions, mobile technologies.
  • It connects users via mobile devices for real-time and on-demand transactions. Not only the information is filtered by time, but also the geographic coordinates are used to screen the specific location-tailored information properly.
  • The term Web 3.0, summarize the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web. Generic Database etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 2.
List all the E-Commerce business models and explain any four briefly.
Answer:
The various E-Commerce business models are

  1. Business to Business (B2B)
  2. Business to Consumer (B2C)
  3. Business to Government (B2G)
  4. Consumer to Business (C2B)
  5. Consumer to Consumer (C2C)
  6. Consumer to Government (C2G)
  7. Government to Business (G2B)
  8. Government to Consumer (G2C)
  9. Government to Government (G2G)

1. Business to Business (B2B)

  • In B2B E-Commerce, commercial transactions take place between different business organizations, through the Internet.
  • For example, a cycle company may buy tyres from another company for their cycles.
  • B2B transaction is high, because of bulk purchases.

2. Business to Consumer (B2C)

  • In B2C E-Commerce, commercial transactions take place between business firms and their consumers.
  • It is the direct trade between companies and end-consumers via the Internet.
  • Example: A book company selling books to customers. This mode is intended to benefit the consumer and can say B2C E-Commerce works as a ‘retail store’ over the Internet.

3. Consumer to Consumer (C2C)
C2C in E-Commerce provides an opportunity for trading products or services among consumers who are connected through the Internet.

4. Consumer to Government (C2G)

  • Citizens as Consumers and Government engage in C2G E-Commerce.
  • Here an individual consumer interacts with the Government.
  • C2G models usually include income tax or house tax payments, fees for issuance of certificates or other documents. People paying for renewal of license online may also fall under this category.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Explain any five E-Commerce revenue models.
Answer:

  • Apart from the regular selling of commodities, today there are many other ways by which companies can make money from the Internet.
  • The other forms of E-Commerce activities are:

1. Affiliate site

  • It is a form of third-party marketing in which the site owner gets paid based on the performance.
  • This site may be a price comparison service or shopping directories or review sites or blogs that contain a link to a normal retailing site and are paid when a customer makes a purchase through it.
  • The affiliate site usually attracts visitors by offering more information and tutorials on some specific product or a topic.

2. Auction site:
It is a kind of website, that auctions items on the Internet and levies some commission from the sales, e.g. https://www.ebay.com/

3. Banner advertisement site:
It displays advertisements of other companies in its websites and thereby earns revenue.

4. Bulk-buying sites:
It collects a number of users together all of who want to buy similar items; the site negotiates a discount with the supplier and takes a commission. e.g. https://www.alibaba.com/

5. Digital publishing sites:

  • It effectively hosts e-books or magazines on the web.
  • They make profits in a number of ways such as advertising, selling, etc., https://wordpress. org/

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
How would you differentiate traditional commerce and E-Commerce?
Answer:

Traditional Commerce

E-Commerce

Traditional commerce is buying or selling of products and services physically. E-Commerce carries out commercial transactions electronically on the Internet.
Customers can easily identify, authenticate and talk to the merchant. Neither customer nor merchant sees the other.
Physical stores are not feasible to be open all the time. It is always available at all times and all days of the year.                                                                     ‘
Products can be inspected physically before purchase. Products can’t be inspected physically before pur­chase.
Scope of business is limited to a particular area. The scope of business is global. Vendors can expand their business Worldwide.
The resource focuses Supply side. The resource focuses Demand side.
Business Relationship is Linear. Business Relationship is End-to-end.
Marketing is one-way marketing. One-to-one marketing.
Payment is made by cash, cheque, cards, etc. The payment system is mostly credit card and through fund transfer.
Most goods are delivered instantly. It takes time to transport goods.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
What are the advantages and disadvantages of E-Commerce to a consumer?
Answer:
The pros and cons of E-Commerce affect three major stakeholders: consumers business organisations, and society.
The following are the advantages and disadvantages of E-Commerce for a consumer.

Advantages:
1. E-Commerce system is operated on all days and all the day. It is able to conduct business 24 × 7. Neither consumers nor suppliers need a physical stores to be opened to do business electronically. People can interact with businesses at the time of their convenience.

2. Speed is a major advantage in E-Commerce. Advanced Electronic communications systems allow messages to reach across the world instantaneously. There is no need to wait days for a catalogue to arrive by post. Communication delay is not a part of the Internet or E-Commerce world.

3. The Internet is too easy to ‘shop around’ for products and services that may be more cheaper and effective than left o buy only in a Brick and Mortar shop. It provides an opportunity to buy at reduced costs. It is possible to, explore the Internet, identify original manufacturers, thereby bypass wholesalers and achieve a cheaper price.

4. The whole world becomes a shop for today’s customers. They can have a wide choice by comparing and evaluating the same product at different websites before making a purchase decision.

5. Customers can shop from home or anywhere at their convenience. They don’t need a long wait to talk to a salesman. They can read the details regarding model numbers, prices, features, etc. of the product from the website and buy at their own convenience. Payments can also be made online.

Disadvantages:
1. E-Commerce is often used to buy goods that are not available locally but from businesses all over the world. Physical goods need to be transported, which takes time and costs money. In traditional commerce, when we walk out of a shop with an item, it’s ours; we have it; we know what it is, where it is, and how it looks. But in E-Commerce, we should wait between placing the order and having the product in hand. Some E-Commerce companies handle this by engaging their customers in updating the status of their shipments.

2. Unlike returning goods to a traditional shop returning goods online is believed to be an area of difficulty. The doubts about the period of returning, will the returned goods reach the source in time, refunds, exchange, and postage make one tiresome.

3. Privacy issues are serious in E-Commerce. In E-Commerce generating consumer information is inevitable. Not all companies use the personal information they obtained to improve services to consumers. Many companies misuse the information and make money out of it. It is true that privacy concerns are a critical reason why people get cold feet about online shopping.

4. Physical product disputes are a major disadvantage in E-Commerce. E-Commerce purchases are often made on trust. This is because we do not have physical access to the product. Though the Internet is an effective channel for visual and auditory information it does not allow full scope for our senses. We can see pictures of the perfumes, but could not smell their fragrance; we can see pictures of a cloth, but not it’s quality.

If we want to inspect something, we choose what we look at and how we look at it. But in online shopping, we would see only the pictures the seller had chosen for us. People are often much more comfortable in buying generic goods (that they have seen or experienced before and in which there is little ambiguity) rather than unique or complex things via the Internet.

5. We couldn’t think of ordering single ice cream or a coffee from a shop in Paris. Though specialized and refrigerated transport can be used, goods bought and sold via the Internet need to survive the trip from the supplier to the consumer. This makes the customers turn back towards traditional supply chain arrangements for perishable and non-durable goods.

6. Delivery ambiguity. Since supplying businesses can be conducted across the world, it can be uncertain whether they are indeed genuine businesses or just going to take our money. It is pretty hard to knock on their door to complain or seek legal recourse. Further, even if the item is sent, it is easy to start bothering whether or not it will ever arrive on time.
The following are some of the advantages and disadvantages of E-Commerce for a Business organisation.

The benefit of E-Commerce to a business organisation
Access to Global Market:
The Internet spans the world of E-Commerce, and it is possible to trade with any business or a person who is connected with the Internet. It helps to access the global marketplace. Simple local businesses such as herbal product stores are able to market and sell their products internationally using E-Commerce. Thus, the whole world becomes a potential market for an E-Commerce company.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

12th Computer Applications Guide E-Commerce Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
The term E-Business was coined by ……………………….
(a) Apple
(b) IBM
(c) Microsoft
(d) Sun Microsystems
Answer:
(b) IBM

Question 2.
The first online-only shop opens on ……………
a) 1991
b) 2000
c) 2005
d) 1999
Answer:
d) 1999

Question 3.
Find the wrong statement from the following.
(a) E-commerce is a subset of E-Business
(b) E-Business is a subset of E-Commerce
Answer:
(b) E-Business is a subset of E-Commerce

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
The nascent stage is a ……………. of growth.
a) Initial stage
b) Secondary stage
c) final stage
d) None of these
Answer:
a) Initial stage

Question 5.
…………… is a platform for advertising products to targeted consumers.
a) Television
b) Radio
c) Mobile phones
d) social Media
Answer:
d) social Media

Question 6.
E-Commerce first emerged on private networks in ……………………….
(a) 1965
(b) 1967
(c) 1970
(d) 1972
Answer:
(c) 1970

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 7.
The First business to a business transaction from …………….
a) Amazon
b) e-bay
c)Thompson Holidays
d) reddiffshop
Answer:
c)Thompson Holidays

Question 8.
The First business to the business transaction was established in the year …………..
a) 1995
b) 1981
c) 1985
d)1987
Answer:
b) 1981

Question 9.
Who invented Teleputer?
(a) Michael Aldrich
(b) Sting’s
(c) Bob Frankston
(d) Dan Bricklin
Answer:
(a) Michael Aldrich

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 10.
The second wave of electronic commerce was …………..
a) 1995-2003
b) 1992-2003
c) 1993-2004
d) 2004-2009
Answer:
d) 2004-2009

Assertion And Reason

Question 1.
Assertion (A): E-Commerce can be described as the process of buying or selling products, services or information via computer networks
Reason(R): E-Commerce is not a completely new type of commerce
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion (A): The growth of E-Commerce is also related to socio-technological changes.
Reason(R): Electronic commerce and the information revolution brought about by the Internet likely go through such a series of waves.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Assertion (A): The Dotcom Bubble was a historic excessive growth (excessive assumption) of economy
Reason(R): Dotcom Bubble occurred roughly between 1990 and 2000.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): if a company’s work is hired to another company, it would be termed as out-sourcing.
Reason(R): If the work is outsourced to a company, which is outside of its own country, is termed off-shoring.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Assertion (A): Traditional commerce is buying or selling of products and services Physically.
Reason(R): Scope of business is Unlimited to a particular area.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 6.
Assertion (A): In E-Commerce Payment system is mostly credit card and through fund transfer
Reason(R): Licensing sites allow other websites to make use of their software.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 7.
Assertion (A): Speed is a major disadvantage in E-Commerce.
Reason(R): The pros and cons of E-Commerce affect three major stakeholders: consumer’s business organizations, and society.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 8.
Assertion (A): FinTech Financial technology is a collective term for technologically advanced financial innovations
Reason(R): Fintech is a new financial industry that uses technology to improve financial activity.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 9.
Assertion (A): Web 2,0 (Web of Communication) If 7 is a read-write web that allowed users to interact with each other.
Reason(R): The dot-com bubble was a rapid rise in the U.S, equity market of Internet-based companies during the 1990s.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 10.
Assertion (A): Marketing plays a significant role in any business.
Reason(R): Marketing could be started as early as it could be,
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Find The Odd One On The Following

1. (a) Marketing
(b) Finance
(c) Negotiation
(d) Gateways
Answer:
(d) Gateways

2. (a) Internet
(b) Ethernet
(c) Extranet
(d) Intranet
Answer:
(b) Ethernet

3. (a) EDI
(b) email
(c) HTML
(d) http
Answer:
(c) HTML

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

4. (a) Online Transaction
(b) Electronic Payment
(c) SCM
(d) Inventory Management Systems
Answer:
(d) Inventory Management Systems

5. (a) Network Infrastructure
(b) Messaging
(c) Multimedia Content
(d) Globalization
Answer:
(d) Globalization

6. (a) Scientific Journals
(b) Dotcoms
(c) Fintech
(d) Startups
Answer:
(a) Scientific Journals

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

7.(a) B2B – 1981
(b) E-mail – 1985
(c) Zappo’s – 1999
(d) Groupon – 2008
Answer:
(b) E-mail-1985

8.(a) 24×7 Working
(b) Low Cost
(c) platform dependent
(d) low transaction cost
Answer:
(c) platform dependent

9. (a) dynamic application
(b) Interactive Services
(c) Machine to Machine Interaction
(d) Hyperlinks
Answer:
(d) Hyperlinks

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

10. (a) Television
(b) Computer
(c) Telecom
(d) Modem
Answer:
(d) Modem

11. (a) Web 1.0 : Content
(b) Web2,0: Communication
(c) Web 3,0 : Contex
(d) Web4,0 : 4G :Tech
Answer:
(d) Web4,0 : 4G :Tech

12. (a) Facebook
(b) Whatsapp
(c) twitter
(d) eBay
Answer:
(d) eBay

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Important Years To Remember:

1960 Electronic data interchange allows companies to carry out electronic transactions-a precursor to online Shopping
1979 English inventor Michael Aldrich connected a TV set to a computer with a phone line and created “teleshopping”
1981 The first business-to-business transaction from Thompson holidays
1984 The ‘Electronic mail’ is launched by CompuServe
1991 The National Science Foundation allows the internet to be used for commercial purposes
Aug 1994 Online retailer Net Market makes the ‘first secure retail transaction on the web’
Oct 1994 Joe McCambiey ran the first-ever online banner ad. It went like on Hot Wired.com and promoted 7 art museums.
July 1995 Amazon sold its first item – a science textbook
Sep 1995 eBay sold its first item – a broken laser pointer
1999 The first online-only shoe, Zappo’s, opens
2005 Social commerce (people using social me­dia in their buying decisions) is born thanks to networks like Facebook India
2008 Group on is launched
2009 India’s Total E-Commerce sale is3,9 billion American Dollar 1991 Oct 19
2018 With mobile commerce, it is expected to hike 265% up and will be $ 850 billion American Dollar

PERIOD

DEVELOPMENT AND GROWTH OF ELECTRONIC COMMERCE

1995 -2003 The First Wave of Electronic Commerce
2004 – 2009 The Second Wave of Electronic Commerce
2010- Present The Third Wave of Electronic Commerce

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Abbreviation:
1. B2B – Business to Business
2. B2C – Business to Consumer
3. B2G – Business to Government
4. C2B – Consumer to Business
5. C2C – Consumer to Consumer
6. C2G – Consumer to Government
7. G2B – Government to Business
8. G2C – Government to Consumer
9. G2G – Government to Government
10. SMEs – Small Medium-sized Enterprises
11. SCM – Supply Chain Management

Match The Following:
1. Business to Business – House tax payments
2. Business to Consumer – Bulk purchases
3. Business to Government – Similar to C2G
4. Consumer to Business – Advertisement Website
5. Consumer to Consumer – Retail store
6. Consumer to Government – Web of Context
7. Government to Business – Reduce burdens on business
8. Government to Consumer – Services by Government
9. Government to Government – Non-Commercial
10. Web 1.0 – Web of Content
11. Web 2.0 – Web of Communication
12. Web 3,0 – Travel Website
Answers
1. Bulk purchases
2. Retail store
3. Services by Government
4. Travel Website
5. Advertisement Website
6. House tax payments
7. Reduce burdens on business
8. Similar to C2G
9. Non Commercial
10. Web of Content
11. Web of Communication
12. Web of Context

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Very Short Answers

Question 1.
When a company is called an E-Business?
Answer:
A company can be called E-Business if and only if-

  1. It has the ability to conduct business electronically over the Internet.
  2. It manages payment transactions through the Internet.
  3. It has a platform for selling products & services via the Internet.

Question 2.
Expand FinTEch.
Answer:
Financial technology

Question 3.
What is FinTech?
Answer:
Fintech is a new finance industry technology to improve financial activity.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
What do you mean by dot-com bubble?
Answer:
The dotcom bubble was a rapid rise in U.S. equity market of Internet-based companies during 1990s.

Question 5.
What is Traditional commerce?
Answer:
It is buying or selling of products and services physically.

Question 6.
What is E-Commerce?
Answer:
It carries out commercial transactions electronically on the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 7.
What is another name of C2B?
Answer:
C2B is also called as reverse auction model,

Question 8.
Expand C2BC.
Answer:
Consumer to Business to Consumer

Question 9.
Mention the two types of G2G systems.
Answer:
Internal facing,
External facing.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 10.
What is the objective of G2B?
Answer:
The objective of G2B is to reduce burdens on business.

Part B

Short Answers

Question 1.
What is mean by Brick and mortar?
Answer:
Brick and mortar is the term that refers to a business that has a physical store; the opposite of online store.

Question 2.
What is mean by Mobile Commerce?
Answer:
Mobile commerce Businesses that are conducted through the Internet using mobile phones or other wireless hand-held devices.

Question 3.
Write a note on Business to Consumer?
Answer:
Business to Consumer (B2C):
In B2C E-Commerce, commercial transactions take place between business firms and their consumers. It is the direct trade between companies and end-consumers via the Internet. B2C companies sell goods, information, or services to customers online in a more personalized dynamic environment and are considered as real competitor for a traditional storekeeper. An example of a B2C transaction is a book company selling books to customers. This mode is intended to benefit the consumer and can say B2C E-Commerce works as a retail store’ over the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part C

Explain In Brief Answer

Question 1.
Write short notes on web1.0, web2.0, web3.0.
Answer:

  • Web 1.0 (Web of Content) ¡s the early web that contained text, images, and hyperlinks and allowed users only to search for information and read it. There was very little in the way of user interaction or content generation.
  • Web 2.0 (Web of Communication) ¡s a read-write web that allowed users to interact with each other.
  • Web 3.0 (Web of Context) is termed as the semantic web or executable web with dynamic applications, interactive services, and “machine-to-machine” interaction.

Question 2.
Write a note on E-business building block elements.
Answer:

  • E-Business is grounded on technologies such as Network Infrastructures (like the Internet, Intranet, Extranet)
  • Multimedia content &network publishing infrastructures (like HTML, Online Marketing)
  • Messaging and information distribution infrastructures (like EDI, e-mail, http,
    Computerized Inventory Management Systems) and
  • Other Common business service infrastructures (like electronic payments gateways, globalized Supply Chain Management (SCM), Online Transaction Processing).

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
When a company is can be called E-business?
Answer:
A company can be called E-Business if and only if

  • It has the ability to conduct business electronically over the Internet.
  • It manages payment transactions through the Internet.
  • It has a platform for selling products &services via the Internet.

Part D

Explain In Detail

Question 1.
Explain the Benefits of E-commerce to a business organisation?
Answer:
The benefit of E-Commerce to a business organisation.

1. Access to Global Market:
The Internet spans the world of E-Commerce, and it is possible to trade with any business or a person who is connected with the Internet. It helps to access the global marketplace. Simple local businesses such as herbal product stores are able to market and sell their products internationally using E-Commerce. Thus, the whole world becomes a potential market for an E-Commerce company.

2. Lower Transaction Cost:
E-Commerce reduces the cost of business transactions substantially. For instance, a significant number of customer service representatives in a bank can be reduced by using net banking. Since these interactions are initiated by customers, the customers provide a lot of data for the transactions that may otherwise need to be entered by employees. This means that some of the work and costs are effectively shifted to customers; this is referred as customer outsourcing’.

3. 24×7 working:
A website is open all 24 hours, 7 days a week. As an E-Commerce firm can provide information about its products and services to customers around the clock, it can thus, take
orders, keep an eye on delivery of goods and receive payments at any time.

4. Low cost of entry:
Though E-Commerce was fist emerged in private networks it did not remain the same. The Internet has changed the face of E-Commerce. The Internet is all about democratization. Internet is a place where the small guy can effectively fight against the giants and hope to win. Days, when E-Commerce was only for affordable large national chains, are gone.
Today, it is common for retailers to move their traditional store to online with very little add-on only for building a good website.

5. Computer platform-independent:
Most computers have the ability to communicate via the Internet, irrespective of operating systems and hardware. Consumers need not have to upgrade their computers or network to participate in E-Commerce. They are not limited by existing hardware or software.

Also, the E-Commerce company need not worry about fast changes in computer network technology. E-Commerce applications can be more efficiently developed and distributed because they are platform-independent. Internet’s altruism helps E-Commerce.

6. Snapping middleman:
E-Commerce enjoys the benefit of bypassing middlemen and reaching the end customer directly through the Internet. In B2C E-Commerce business firms establish direct contact with their customers by eliminating middlemen. It helps to increase the sales of the organization without any interventions. This results in cheaper prices for consumers and higher
profit margins for the companies.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 2.
Explain various limitations of Ecommerce for a business organisation?
Answer:
1. People won’t buy all products online:
There are certain products like high price jewels, clothes or furnishings which people might not like to buy online. They might want to, inspect it, feel the texture of the fabric, etc. which are not possible in E-Commerce. As online shopping does not allow physical inspection, customers have to rely on electronic images of the products.

E-Commerce is an effective means for buying known and established services, that is, things that are being used every day. Example booking tickets, buying books, music CDs and software. It is not suitable for dealing with the new or unexpected. Traditional commerce always takes advantage when it is perishables and touches and feel products.

2. Competition and Corporate vulnerability:
Access to Global Market is beneficial on one hand but it also comes with competition. The open Internet has paved way for all business firms to operate in the global market. Many businesses have been already facing international competition from web-enabled business opponents.

The competitors may access product details, catalogs, and other information about a business through its website and make it vulnerable. They might then indulge in web harvesting. Web harvesting is the illegal activity of extracting business intelligence from a competitor’s web pages.

3. Security:
Security remains to be a problem for E-Commerce. Customers might be reluctant to give their credit card numbers to the website. As a lot of cyber frauds take place in E-Commerce transactions, people generally afraid to provide their personal information. Legal issues arise when the customer’s data falls into the hands of strangers. Fraudulent activities in traditional commerce is comparatively less as there is the personal interaction between the buyer and the seller.

4. Customer loyalty:
Businesses cannot survive long without loyal customers. The customers would like to buy from a website where they are able to get the best deal. They cannot be loyal to a particular seller. In traditional commerce, the shopkeeper would interact with the consumer “face-to-face” and gain their loyalty too.

In E-Commerce, the interaction between the business and the consumer is “screen-to-face”. The customers would feel that they do not have received sufficient personal attention. Since there is no personal touch in E-Business, companies could not win over their loyalty easily.

5. Shortage of skilled employees:
Though most of the process in E-Commerce is automated, some sectors like packaging and delivery need manual interventions. There could be problems related to shipping delays which would need technically qualified staff with an aptitude to resolve.

E-Commerce has difficulty in recruiting, training and retaining talented people. There is a great shortage of skilled employees. Traditional organizational structures and poor work cultures in some places inhibit the growth of E-Commerce.

6. Size and value of transactions:
The delivery cost of a pen surpasses the cost of the pen itself. E-Commerce is most often conducted using credit cards for payments, and as a result, very small and very large transactions tend not to be conducted online.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 7 Looping Structure Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 7 Looping Structure

12th Computer Applications Guide Looping Structure Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Most complicated looping structure is
a) While
b) Do While
c) For
d) None of them
Answer:
c) For

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 2.
Loops that iterate for fixed number of times is called
a) Unbounded loops
b) Bounded loops
c) While loops
d) For loops
Answer:
b) Bounded loops

Question 3.
Which loop evaluates condition expression as Boolean, if it is true, it cutes statements and when it is false it will terminate?
a) For loop
b) For each loop
c) While loop
d) All of them
Answer:
d) All of them

Question 4.
Which loop evaluates condition expression as Boolean, if it is true, it executes statements and when it is false it will ter-minate?
a) For loop
b) For each loop
c) While loop
d) All of them
Answer:
d) All of them

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 5.
What will be displayed in a browser when the following PHP code is executed;
<?php
for ($counter = 20; $counter < 10;$counter++)
{
echo “Welcome to Tamilnadu “;
}
echo “Counter is: $counter”;
?>
a) Welcome to Tamilnadu
b) Counter is: 20
c) Welcome to Tamilnadu counter is: 22
d) Welcome to Tamilnadu Welcome to Tamilnadu Counter is: 22
e) Infinite loop
Answer:
e) Infinite loop

Question 6.
What will be displayed in a browser when the following PHP code is executed;
<?php
for ($counter = 10; $counter < 10; $counter = $counter + 5){ echo “Hello”;
>
?>
a) Hello Hello Hello Hello Hello
b) Hello Hello Hello
c) Hello
d) None of the above
Answer:
d) None of the above

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 7.
PHP supports four types of looping techniques;
a) for loop
b) while loop
c) foreach loop
d) all the above
Answer:
d) all the above

Question 8.
Consider the following code
<? php
$count=12;
do{
printf(“%d squared=%d<br/>”,$count,
pow($count,2));
} while($count<4);
?>
What will be the output of the code.

a) 12 squared 141
b) 12 squared=141
c) “12 squared=141
d) Execution error
Answer:
d) Execution error

Question 9.
What will be the output of the following PHP code ?
<?php
for ($x = 1; $x < 10;++$x)
{
print “*\t”;
}
?>
a) **********
b) *********
c) ***********
d) infinite l00p
Answer:
b) *********

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 10.
What will be the output of the following PH P code?
<?php
for ($x = -1; $x < 10;–$x)
{
print $x;
}
?>
a)123456713910412
b)123456713910
c) 1234567139104
d) Infinite loop
Answer:
d) Infinite loop

Part II

Short Answers

Question 1.
Define Looping Structure in PHP.
Answer:

  1. Looping Structures are useful for writing iteration logics.
  2. It is the most important feature of many programming languages, including PHP.
  3. They are implemented using the following categories,
    • for Loop
    • While Loop
    • foreach Loop
    • Do While Loop

Question 2.
Define for loop in PHP.
Answer:
For loop is an important functional looping system which is used for iteration logics when the programmer know in advance how many times the loop should run.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 3.
What is For each loop in PHP?
Answer:

  • foreach loop is exclusively available in PHP.
  • It works only with arrays. The loop iteration deepens on each KEY Value pair in the Array.
  • For each, loop iteration the value of the current array element is assigned to $value variable and the array pointer is shifted by one, until it reaches the end of the array element.

Question 4.
List out Looping Structure in PHP.
Answer:

  • for Loop
  • foreach Loop
  • While Loop
  • Do While Loop

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 5.
Write Syntax of For loop in PHP.
Answer:
for (init counter; test counter; increment counter)
{
code to be executed;
}

Question 6.
Write Syntax of For each loop in PHP.
Answer:
for each ($array as $value)
{
code to be executed;
}

Question 7.
Write Syntax of while loop in PHP.
Answer:
while (condition is true)
{
code to be executed;
}

Question 8.
Write Syntax of Do while loop in PHP.
Answer:
do
{
code to be executed;
} while (condition is true);

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 9.
Compare for loop and for each loop.
Answer:

for loop for each loop
loops through a block of code until the counter reaches a specified number. loops through a block of code for each element in an array.
for (init counter; test count­er; increment counter)
{
code to be executed;
}
for each ($array as $value)
{
code to be executed;
}

Question 10.
Usage for each loop in PHP
Answer:

  1. The foreach loop works only on arrays,
  2. It is used to loop through each key/value pair in an array.

Part III

Explain in brief answer

Question 1.
Write the features Looping Structure.
Answer:
Looping Structures are useful for writing iteration logics.
It is the most important feature of many programming languages, including PHP.
They are implemented using the following categories.

  • for loop
  • while loop
  • do-while loop
  • for each loop

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 2.
Write the purpose of Looping Structure in PHP
Answer:

  • In programming it is often necessary to repeat the same block of code a given number of times, or until a certain condition is met.
  • This can be accomplished using looping statements

Question 3.
Differentiate For each and While loop.
Answer:

While loop For Each loop
Working principle The while statement will execute a block of code If and as Song as a test ex­pression, is true. The foreach statement is used to loop through arrays.
Working principle If the test expression is true then the code block will be executed. After the code has executed the test expression will again be evaluated and the loop will continue until the test expression is found to be false. For each pass, the value of the current array element is assigned to $value and the array pointer is moved by one and in the next pass, the next element will be processed.
Syntax while(condition)
{
code to be executed;
}
for each ($array as $value)
{
code to be executed;
}

Question 4.
Write short notes on Do while Loop.
Answer:

  • Do while loop always run the statement inside of the loop block at the first time execution.
  • Then it is checking the condition whether true or false.
  • It executes the loop if the specified condition ¡s true.

Question 5.
Differentiate While and Do while loops.
Answer:

While loop Do while loop
The while state­ment will execute a block of code if and as long as a test expression is true. Do while loop always run the statement inside of the loop block at the first time execution.
If the test expres­sion is true then the code block will be executed. After the code has executed the test expression will again be evaluated and the loop will continue until the test expression is found to be false. Then it is checking the condition whether true or false. It executes the loop if the specified condition is true.
while(condition)
{
code to be execut­ed;
}
do
{
code to be executed;
}
while (condition is true);

Part IV

Explain in detail

Question 1.
Explain Looping Structure in PHP.
Answer:

  • Looping Structures are useful for writing iteration logics.
  • It is the most important feature of many programming languages, including PHP.
  • They are implemented using the following categories.
    for Loop
  • For loops execute a block of code a specified number of times.
    foreach Loop

The foreach construct provides an easy way to iterate over arrays

While Loop PHP
While loops execute a block of code while the specified condition is true.

Do While Loop
Do whileloop always run the statement inside of the loop block at the first time execution?

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 2.
Discuss in detail about Foreach loop.
Answer:

  • The foreach statement is used to loop through arrays.
  • For each pass the value of the current array element is assigned to $value and the array pointer is moved by one and in the next pass next element will be processed.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 1

Syntax
for each ($array as $value)
{
code to be executed;
}

Example:
<?php
$Student_name = a rrayÇ’MagiIan’ “Iniyan’
“NiIani’ “Sibi’ “Shini”);
foreach ($Student_name as $value) {
echo “$value <br>”;
}
?>

Question 3.
Explain the process Do while loop.
Answer:

  • Do while loop always run the statement ¡nside of the loop block at the first time execution.
  • Then it is checking the condition whether true or false. It executes the loop if the specified condition is true.

Syntax:
do
{
code to be executed;
} while (condition is true);

Example
<?php
$Student_count = 10;
$student_number= 1;
do
{
echo “The student number is: $student_num- ber<br>”;
$student_number++;
}
while($student_number<= $Student_count);
?>
Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 2

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 4.
Explain concepts of for loop with example.
Answer:
For loop is an important functional looping system which is used for iteration logic when the programmer knows in advance how many times the loop should run.
Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 3
Syntax
for (init counter; test counter; increment counter)
{
code to be executed;
>

Example:
<?php
for ($i = 0; $i<= 10; $i++)
{
echo “The number is: $i<br>”;
}
?>

Question 5.
Explain array concepts in Looping Structure.
Answer:
Using For each loop:

  • The for each statement is used to loop through arrays.
  • For each pass, the value of the current array element is assigned to $value and the array pointer is moved by one and in the next pass, the next element will be processed.

Example:
<?php
$Student_name = arrayO’Magilan”, “Iniyan”, “Nilani” “Sibi” “Shini”); foreach ($Student_name as $value) { echo “$value <br>”;
}
?>

Using For Loop:
To loop through and print all the values of an indexed array.

Example:
<?php$cars = arrayC’Volvo”, “BMW”, “Toyota”);
$arrlength = count(cars);
for($x = 0; $x < $arrlength; $x++){
echo $cars[$x];
echo “<br>”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

12th Computer Applications Guide Looping Structure Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
The ……………… construct provides an easy way to iterate over arrays
a) for each
b) for
c) while
d) do..while
Answer:
a) for each

Question 2.
Which loop is used if you know in advance how many times the loop should run?
(a) For
(b) For each
(c) While
(d) Do-while
Answer:
(a) For

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 3.
Which of the following is an entry check loop?
a) foreach
b) for
c) while
d) All of these
Answer:
d) All of these

Question 4.
Which counter decides whether the loop should continue or ends?
(a) Init
(b) Test
(c) Increment
(d) Decrement
Answer:
(b) Test

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 5.
What will be displayed in a browser when the following PHP code is executed;
<?php
for ($i=1;$i<=5; $i++)
{
echo “$i”;
}
?>
a) 12345
b) 1234
c) 123
d) None of the above
Answer:
a) 12345

Fill in the blanks:

1. There are…………….types of loops in PHP.
Answer:
4

2. ………………… Structures are useful for writing iteration logics.
Answer:
Looping

3. …………….. loop works only with arrays.
Answer:
For each

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

4. …………….. loop always run the statement inside of the loop block at the first time execution and then it is checking the condition whether true or false.
Answer:
Do while

5. The loop iteration deepens on each…………… in the Array.
Answer:
KEY Value pair

Very Short Answers

Question 1.
How “for loop” will execute?
Answer:
For loops execute a block of code a specified number of times.

Question 2.
What is Wils provide for each” loop in PHP?
Answer:
The foreach construct provides an easy way to iterate over arrays

Question 3.
How “while loop” will execute?
Answer:
PHP while loops execute a block of code while the specified condition is true.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 4.
How do,.while loop differs from other loops?
Answer:
do…while – loops through a block of code once, and then repeats the loop as long as the specified condition is true

Question 5.
Why looping structure is necessary in programming languages?
Answer:
To repeat the same block of code a given number of times, or until a certain condition is met. This can be accomplished using looping statements

Match the following:

1. For loop – Exit check loop
2. While loop – Works only with an array
3. For Each loop – Complicated looping structure
4. do-while loop – Simple iteration logics
Answer:
1. Complicated looping structure
2. Simple iteration Logics
3. Works only with array
4. Exit check loop

Syntax:

1. For loop
for (init counter; test counter; increment counter)
{
code to be executed;
}

2. While loop
while (condition is true)
{
code to be executed;
}

3. For Each loop
for each ($array as $value)
{
code to be executed;
}

4. Do… while loop:
do
{
code to be executed;
} while (condition is true);

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Additional programs:

Question 1.
Write a php program to display I to 10 numbers using while loop.
Answer:
<?php
$x = 1;
while($x <= 10)
{
echo $x;
$x++;
}
?>

Question 2.
Write a php program to display the string I “Hello World” 5 times using “for loop”.
Answer:
<?php
for ($x = 0; $x <= 5; $x++)
{
echo “Hello World <br>”;
}
?>

Question 3.
Write a PHP program to display color names using “foreach” loop
Answer:
<?php
$colors = arrayC’red”, “green”, “blue”, “yellow”);
foreach ($colors as $value)
{
echo “$value <br>”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 4.
Write a PHP program to display the following
The number is: 1
The number is:2
The number is:3
The number is:4
The number is:5
Program;
<?php
$x = 1;
do {
echo “The number is: $x <br>”;
$x++;
} while ($x <= 5);
?>

Part B

Very Short Answers

Question 1.
Write the working principle of loop parameters.
Answer:

  • init counter: Initialize the loop initial counter value
  • Test counter: Evaluated for every iteration of the loop.
  • If it evaluates to TRUE, the loop continues. If it evaluates to FALSE, the loop ends.
  • Increment counter: Increases the loop counter value.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Part C

Short Answers

Question 1.
Draw the For loop Structure and Flow chart
Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 4

Question 2.
Explain the parameters in the for loop?
Answer:
Parameters:

  1. init counter: Initialize the loop initial counter value
  2. Test counter: Evaluated for every iteration of the loop.
  3. If it evaluates to TRUE, the loop continues. If it evaluates to FALSE, the loop ends.
  4. Increment counter: Increases the loop counter value.

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 6 PHP Conditional Statements Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 6 PHP Conditional Statements

12th Computer Applications Guide PHP Conditional Statements Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
What will be the output of the following PHP code?
<?php
$x;
if ($x)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
c) error

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
What will be the output of the following PHP code ?
<?php
$x = 0;
if ($x++)
print “hi”;
else
print “how are u”;
?>
a) hi
b) no output
c) error
d) how are u
Answer:
a) hi

Question 3.
What will be the output of the following PHP code ?
<?php
$x;
if ($x == 0)
print “hi”;
else
print “how are u”;
print “hello”
?>
a) how are uhello
b) hihello
c) hi
d) no output
Answer:
a) how are uhello

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 4.
Statement which is used to make choice between two options and only option is to be performed is written as
a) if statement
b) if else statement
c) then else statement
d) else one statement
Answer:
b) if else statement

Question 5.
What will be the output of the following PHP code ?
<?php
$a =
if ($a)
print “all”;
if
else
print “some”;
?>
a) all
b) some
c) error
d) no output
Answer:
c) error

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 6.
What will be the output of the following PHP code ?
<?php
$a = “”;
if ($a)
print “all”;
if
else
print “some”;
?>
a) all
b) some
c) error
d) no output

Question 7.
What will be the output of the following PHP code ?
<?php
$x = 10;
$y = 20;
if ($x > $y + $y != 3)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
b) hi

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 8.
What will be the output of the following PHP code ?
<?php
$x = 10;
$y = 20;
if ($x > $y && 1||1)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
b) hi

Question 9.
What will be the output of the following PHP code ?
<?php
if (-100)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
a) how are u

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Part II

Short Answers

Question 1.
Define Conditional Statements in PHP
Answer:
Conditional statements are useful for writing decision-making logics. It is the most important feature of many programming languages, including PHP. They are implemented by the following types:

  1. if Statement
  2. if…else Statement
  3. if…else if….else Statement
  4. switch Statement

Question 2.
Define if statement in PHP.
Answer:
If a statement executes a statement or a group of statements if a specific condition is satisfied as per the user expectation.
Syntax:
if (condition)
{
Execute statement(s) if condition is true;
}

Question 3.
What is an if-else statement in PHP?
Answer:
If else statement in PHP:

  1. If a statement executes a statement or a group of statements if a specific condition is satisfied by the user expectation.
  2. When the condition gets false (fail) the else block is executed.

Syntax:
if (condition)
{
Execute statement(s) if condition is true;
}
else
{
Execute statement(s) if condition is false;
}

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 4.
List out Conditional Statements in PHP.
Answer:

  • if Statement
  • if…else Statement
  • if…else if….else Statement
  • switch Statement

Question 5.
Write Syntax of the If else statement in PHP.
Answer:
if (condition)
{
Execute statement(s) if condition is true;
}
else
{
Execute statement(s) if condition is false;
}

Question 6.
Define if…elseif….else Statement in PHP.
Answer:

  • If-elseif-else statement is a combination of if-else statement.
  • More than one statement can execute the condition based on user needs.

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 7.
Usage of Switch Statement in PHP.
Answer:

  • The switch statement is used to perform different actions based on different conditions.
  • Switch statements work the same as if statements but they can check for multiple values at a time.

Question 8.
Write Syntax of the Switch statement.
Answer:
switch (n)
{
case label1:
code to be executed if n=la bel1;
break;
case Iabel2:
code to be executed if n=label2;
break;
case label3:
code to be executed if n=iabel3;
break;

default:
code to be executed if n is different from all labels;
}

Question 9.
Compare if and if-else statement.
Answer:

If Statement If else Statement
if statement checks a condition and exe­cutes a set of state­ments when this con­dition is true, it does not do anything when the condition is false. if-else statement checks a condition and executes a set of statements when this condition is true, it executes another set of statements when the condition is false.

Part III

Explain in brief answer

Question 1.
Write the features Conditional Statements in PHP.
Answer:
PHP Conditional statements:

  1. Conditional statements are useful for writing decision-making logics.
  2. It is most important feature of many programming languages, including PHP.
  3. They are implemented by the following types:
  4. if Statement
  5. if…else Statement
  6. if…elseif….else Statement
  7. switch Statement

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
Write is the purpose of if elseif else stament.
Answer:

  • A user can decide among multiple options.
  • The if statements are executed from the top I down.
  • As soon as one of the conditions controlling the if is true, the statement associated with that if is executed, and the rest of the ladder is bypassed.
  • If none of the conditions is true, then the final else statement will be executed.
  • More than one statement can execute the condition based on user needs.

Question 3.
Differentiate Switch and if-else statement.
Answer:

Switch statement if-else statement
Switch statement uses single expression for multiple choices. the if-else statement uses multiple statements for multiple choices.
Switch statement test only for equality. if-else statement test for equality as well as for logical expression.
Switch statement execute one case af­ter another till a break statement is appeared or the end of switch statement is reached. Either if statement will be executed or else statement is executed.

Question 4.
Write Short notes on the Switch statement.
Answer:

  1. The switch statement is used to perform different actions based on different conditions.
  2. It tests for equality only.
  3. It uses default value when all the case values are not matched.
  4. It can have multiple ease values.

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 5.
Differentiate if statement and if-else statement.
Answer:

If statement if else if else stamen
If-else if-else statement is a combination of if-else statement. It consists of a single “if statement”. There is no “else” statement here.
More than one state­ment can execute the condition based on user needs Only one statement can execute
If the condition is false, there are more alterna­tives are there If the condition is false, there is no alternatives

Part IV

Explain in detail

Question 1.
Explain Functions of Conditional Statements in PHP.
Answer:
Function Conditional Statements:

  1. Function conditional statement is the function specified inside the conditional statements.
  2. We can’t call a conditional function before its definition.

Syntax:
if(expression)
{
function function_name( )
{
block of statements;
}
}
function_name( ); // calling function.
Eg:
<? php
display( );
if(TRUE)
{
function display( )
{
echo “condition and function”;
}
}
Output: condition and function

Question 2.
Discuss in detail about Switch statement with an example.
Answer:

  • The switch statement is used to perform different actions based on different conditions.
  • Switch statement test only for equality.
  • Switch statement execute one case after another till a break statement has appeared or the end of the switch statement is reached.

Syntax;
switch (n)
{
case label 1:
code to be executed if n=label1;
break;
case label 2:
code to be executed If n=label2;
break;
case label3:
code to be executed if n=label3;
break;

default:
code to be executed if n is different from all labels;
}

Example;
<?php
$favcolor = “red”;
switch ($favco!or) {
case “red”:
echo “Your favorite color is red!”;
break;
case “blue”:
echo “Your favorite color is blue!”;
break;
case “green”:
echo “Your favorite color is green!”;
break;
default:
echo “Your favorite color is neither red, blue, nor green!”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 3.
Explain the process of Conditional Statements in PHP?
Answer:
Conditional statements are useful for writing decision-making logics. It is the most important feature of many programming languages, including PHP. They are implemented by the following types:

(i) if Statement:
If statement executes a statement or a group of statements if a specific condition is satisfied as per the user expectation.

(ii) if…else Statement:
If statement executes a statement or a group of statements if a specific condition is satisfied by the user expectation. When the condition gets false (fail) the else block is executed.

(iii) if…elseif….else Statement:
If-elseif-else statement is a combination of if-else statement. More than one statement can execute the condition based on user needs.

(iv) Switch Case:
The switch statement is used to perform different actions based on different conditions.

Question 4.
Explain concepts of if elseif else statement.
Answer:

  • If-elseif-else statement is a combination of if-else statement.
  • More than one statement can execute the condition based on user needs.

Syntax:
if (1st condition)
{
Execute statement(s) if condition is true;
}
elseif(2nd condition)
{
Execute statement(s) if 2ndcondition is true;
}
else
{
Execute statement(s) if both conditions are false;
}

Example Program:
<?php
$Pass_Mark=35;
$first_class=60;
$Student_Mark=70;
if ($Student_Mark>= $first_class){ echo “The Student is eligible for the promotion with First Class”;
}
elseif ($Student_Mark>= $Pass_Mark){ echo “The Student is eligible for the promotion”;
}
else {
echo “The Student is not eligible for the promotion”;
}?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 5.
Explain the if-else statement in PHP.
Answer:
If else statement in PHP:
If a statement executes a statement or a group of statements if a specific condition is satisfied by the user expectation. When the condition gets false (fail) the else block is executed.
Syntax:
if (condition)
{
Execute statement(s) if condition is true;
} else
{
Execute statement(s) if condition is false;
}
Example:
<?php
$Pass_Mark=35;
$Student_Mark=70;
if ($Student_Mark>= $Pass_Mark)
{
echo “The Student is eligible for the promotion”;
}
else
{
echo “The Student is not eligible for the promotion”; }
?>

12th Computer Applications Guide PHP Conditional Statements Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
How many types of PHP conditional statements are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
What will be the output of the following PHP code ?
<?php
if(0.0)
print”hi”;
else
print”how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
a) how are u

Question 3.
The ……………………….. statement is used to perform different actions based on different conditions.
Answer:
switch

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 4.
What will be the output of the following PHP code ?
<?php
$a=”l”;
switch($a)
{
case1:
break;
print”hi”;
case2:
print’tiello”;
break;
default:
print”hil”;
>
?>
a) hihellohi1
b) hi
c) hihi1
d) hi1
Answer:
a) hihellohi1

Question 5.
What will be the output of the following PHP code ?
<?php
$x=l;
if($x=$x&0)
print$x;
else
break;
?>
a) 0
b) 1
c) error
d) no output
Answer:
c) error

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 6.
Which of the following can check for multiple values at a time?
(a) If
(b) If else
(c) Nested else
(d) Switch
Answer:
(d) Switch

Very Short Answers

Question 1.
How conditional statements perform?
Answer:
It performs different actions for different decisions in programing language

Question 2.
What is an “if statement” in PHP?
Answer:
The If Statement is a way to make decisions based upon the result of a condition.

Question 3.
How switch statement and if statement differs?
Answer:
Switch statements work the same as if statements but they can check for multiple values at a time

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Match the following:

1. Simple if statements – Multiple branching
2. If-else statement – Combination of if-else statement
3. If elseif else statement – Only one option
4. Switch case statement – Alternative statement

Part B

Short Answers

Question 1.
Write the syntax of the If statement.
Answer:
if (condition)
{
Execute statement(s) if condition is true;
}

Question 2.
What is mean by If else ladder?
Answer:

  • Else executes the following block of statements if the condition in the corresponding if is false.
  • After the else, if another condition is to be checked, then an if statement follows the else. This is else if and is called as if-else ladder.

SYNTAX:

1. If statement
Answer:
if (condition)
{
Execute statement(s) if condition is true;
}

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

2. If else statement
if (condition)
{
Execute statement(s) if condition is true;
}
else
{
Execute statement(s) if condition is false;
}

3. If elseif else statement
if (1st condition)
{
Execute statement(s) if condition is true;
}
elseif(2nd condition)
{
Execute statement(s) if 2ndcondition is true;
}
else
{
Execute statement(s) if both conditions are false;
}

4. Switch Case:
switch (n) { case label 1:
code to be executed if n=label1;
break;
case Iabel2:
code to be executed if n=label2;
break;
case Iabel3:
code to be executed if n=label3;
break;

default:
code to be executed if n is different from all labels;
}

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Part C

Explain in brief answer

Question 1.
Give the Syntax for If else statements in PHP?
Answer:
if (1st condition)
{
Execute statement(s) if condition is true;
}
elseif(2nd condition)
{
Execute statement(s) if 2nd condition is true;
}
else
{
Execute statement(s) if both conditions are false;
}

Programs

Question 1.
Write a php program to birthday greetings using if statement.
Answer:
<?php
$date=date(“m-d”);
if ($date==»01T0»)
{
echo “Wishing you a very Happy Birthday”;
}
?>

Question 2.
Write a php program to check whether the given number is positive or negative.
Answer:
<?php
$x = -12;
if ($x > 0)
{
echo “The number is positive”;
}
else{
echo “The number is negative”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 3.
Write a PHP program to display independence day and republic day the greetings using If elseif else statement
Answer:
<?php
$x = “August”;
if ($x == “January”) {
echo “Happy Republic Day”;
}
elseif ($x == “August”) {
echo “Happy Independence Day!!!”;
}
else{
echo “Nothing to show”;
}
?>

Part D

Explain in detail

Question 1.
Write a PHP code to display the days of weak using switch statement
Answer:
<?php
$today=date(“D”);
switch($today)
{
case”Mon”:
echo’Today is Monday.
break;
case”Tue”:
echo’Today is Tuesday.”;
break;
case”Wed”:
echo’Today is Wednesday.”;
break;
case’Thu”:echo’Today is Thursday.”;
break;
case”Fri”:
echo’Today is Friday. Party tonight.”;
break;
case”Sat”:echo’Today is Saturday.”;
break;
case”Sun”:
echo’Today is Sunday.”;
break;
default:
echo”No information available for that day.”;
break;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
Write a PHP program to display week days using switch case statement.
Answer:
<?php
$n = “February”;
switch($n) {
case “January”:
echo “Its January”;
break;
case “February”:
echo “Its February”;
break;
case “March”:
echo “Its March”;
break;
case “April”:
echo “Its April”;
break;
case “May”:
echo “Its May”;
break;
case “June”:
echo “Its June”;
break;
case “July”:
echo “Its July”;
break;
case “August”:
echo “Its August”;
break;
case “September”:
echo “Its September”;
break;
case “October”:
echo “Its October”;
break;
case “November”:
echo “Its November”;
break;
case “December”:
echo “Its December”;
break;
default:
echo “Doesn’t exist”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 16 Electronic Payment Systems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 16 Electronic Payment Systems

12th Computer Applications Guide Electronic Payment Systems Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Based on the monetary value e payment system can be classified into
a) Mirco and Macro
b) Micro and Nano
c) Maximum and Minimum
d) Maximum and Macro
Answer:
a) Mirco and Macro

Question 2.
Which of the following is not a category of micro payment?
a) Buying a movie ticket
b) Subscription to e journals
c) Buying a laptop
d) Paying for smartphone app
Answer:
b) Subscription to e journals

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the cor-rect explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the cor-rect explanation of (A)

Question 4.
Which of the following is correctly matched?
a) Credit Cards – pay before
b) Debit Cards – pay now
c) Stored Value Card – pay later
d) Smart card – pay anytime
Answer:
b) Debit Cards – pay now

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
ECS stands for
a) Electronic Clearing Services
b) Electronic Cloning Services
c) Electronic Clearing Station
d) Electronic Cloning Station
Answer:
a) Electronic Clearing Services

Question 6.
Which of the following is not a Altcoin?
a) Litecoin
b) Namecoin
c) Ethereum
d) Bitcoin
Answer:
c) Ethereum

Question 7.
Which of the following is true about Virtual payment address (VPA)?
a) Customers can use their e-mailid as VPA
b) VPA does not includes numbers
c) VPA is a unique ID
d) Multiple bank accounts cannot have single VPA
Answer:
d) Multiple bank accounts cannot have single VPA

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 8.
Pick the odd one in the credit card transaction
a) card holder
b) merchant
c) marketing manager
d) acquirer
Answer:
a) card holder

Question 9.
Which of the following is true about debit card?
i. Debit cards cannot be used in ATMs
ii. Debit cards cannot be used in online transactions
iii. Debit cards do not need bank accounts
iv. Debit cards and credit cards are identical in physical properties
a) i, ii, iii
b) ii, iii, iv
c) iii alone
d) iv alone
Answer:
d) iv alone

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Match the following
List A List B
A1) First Digit B1) Account number
A2) 9th to 15th Digit B2) Mil Code
A3) First 6 Digits B3) BIN Code
A4) Last Digit B4) Check digit
Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems 1
Answer:
b) B2 B1 B3 B4

Part II

Short Answers

Question 1.
Define electronic payment system
Answer:
The term electronic payment refers to a payment made from one bank account to another bank account using electronic methods forgoing the direct intervention of bank employees.

Question 2.
Distinguish microelectronic payment and macro electronic payment
Answer:

Microelectronic payment

Macroelectronic payment

Online payment system designed to allow efficient and frequent payments of small amounts. Macro electronic payment systems support payments of higher value.
In order to keep transaction costs very low, the communica­tion and computational costs are minimized here. The security requirements are more rigorous in macro pay­ment systems because of huge money transactions.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
List the types of microelectronic payments based on their algorithm
Answer:
Based on the algorithm used, it is classified into the following categories.

  1. Hash chain based micro electronic payment systems.
  2. Hash collisions and hash sequences based on micro electronic payment systems.
  3. Shared secrete keys based micro electronic payment systems.
  4. Probability-based micro electronic payment systems.

Question 4.
Explain the concept of an e-wallet
Answer:
Electronic wallets (e-wallets) or electronic purses allow users to make electronic transactions quickly and securely over the Internet through smartphones or computers.

Question 5.
What is a fork in cryptocurrency?
Answer:
Many cryptocurrencies operate on the basis of the same source code, in which the authors make only a few minor changes in parameters like time, date, distribution of blocks, number of coins, etc. These currencies are called as fork. In fork, both cryptocurrencies can share a common transaction history in block chain until the split.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Part III

Explain In Brief Answer

Question 1.
Define microelectronic payment and its role in E-Commerce.
Answer:
Definition:
Micro electric payment is an online payment system designed to allow efficient and frequent payments of small amounts.
Role in E-Commerce

  • An e-commerce payment system facilitates the acceptance of electronic payment for online transactions
  • E-commerce payment systems have become increasingly popular due to the widespread use of internet-based shopping and banking.

Question 2.
Compare and contrast the credit card and debit card. (3-5 points)
Answer:

Basis For Comparison Credit Card Debit Card
Meaning A credit card is issued by a bank or any fi­nancial institution to allow the holder of the card to purchase goods and services on credit. The payment is made by the bank on the customer’s behalf. A debit card is issued by a bank to allow its customers to purchase goods and services, whose payment is made directly through the custom­er’s account linked to the card.
Implies Pay later Pay now
Bank Account A bank account is not a prerequisite for issuing a credit card. A bank account is a must for issu­ing a debit card.
Limit The maximum limit of withdrawing money is determined according to the credit rating of the holder. The maximum limit of withdrawing money will be less than the money lying in the saving bank account.
Bill The holder of the card has to pay the credit card bill within 30 days of every month. There is no such bill, the amount is directly deducted from the custom­er’s account.
Interest Interest is charged when payment is not made to the bank within a specified time period. No interest is charged.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Explain briefly the Anatomy of a credit card.
Answer:
Publisher: Emblem of the issuing bank
Credit card number: The modem credit card number has a 16-digit unique identification number.

Question 4.
Briefly explain the stored value card and its types.
Answer:

  • A stored-value card is a type of debit card that is pre-loaded with a certain amount (value), with which a payment is made.
  • It is a card that has default monetary value on it.
  • The card may be disposed of when the value is used or recharged to use it again.
  • The major advantage of the stored-value card is that customers don’t need to have a bank account to get prepaid cards.
  • There are two varieties for the stored-value cards.

(i) Closed Loop

  • In closed-loop cards, money is metaphorically stored on the card in the form of binary-coded data.
  • Closed-loop cards are issued by a specific merchant or merchant and can only be used to make purchases from a specific place, e.g. Chennai metro rail travel card.

(ii) Open-loop (multipurpose)

  • Open-loop cards can be used to make debit transactions at a variety of retailers.
  • It is also called prepaid-debit cards.
  • It can be used anywhere the branded cards are accepted, e.g. Visa gift cards.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
Write a note on mining in cryptocurrency.
Answer:
Mining:
The cryptocurrency units are created by the solution of cryptographic tasks called mining. The miners not only generate new monetary units but also initiate new transactions to the blockchain. As a reward, they will receive new Bitcoins.

Part IV

Explain In Detail

Question 1.
What is a credit card? Explain the key players of a credit card payment system and bring out the merits of it.
Answer:
Credit Card

  • A credit card is an electronic payment system normally used for retail transactions.
  • A credit card enables the bearer to buy goods or services from a vendor, based on the cardholder’s promise to the card issuer to pay back the value later with the agreed interest.

Key players in operations of credit card

1. Bearer:
The holder of the credit card account who is responsible for payment of invoices in full (transactor) or a portion of the balance (revolver) the rest accrues interest and carried forward.

2. Merchant:
Storekeeper or vendor who sells or providing service, receiving payment made by its customers through the credit card.

3. Acquirer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant sends authorization requests to the issuing bank through the appropriate channels.

4. Credit Card Network:

  • It acts as the intermediate between the banks.
  • The Company is responsible for communicating the transaction between the acquirer and the credit card issuer.
  • These entities operate the networks that process credit card payments worldwide and levy interchange fees. E.g. Visa, MasterCard, Rupay

5. Issuer:
Bearer’s bank, that issue the credit card, set a limit of purchases, decides the approval of transactions, issue invoices for payment, charges the holders in case of default and offer card-linked products such as insurance, additional cards, and rewards plan.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 2.
Briefly explain Electronic Account transfer and its types.
Answer:
Electronic Account transfer

  • Apart from card-based payment systems, there are many alternative electronic payment systems.
  • With the advent of computers, network technologies, and electronic communications a large number of alternative electronic payment systems have emerged.

Types of Electronic Account transfer:

  1. ECS (Electronic Clearing Services)
  2. EFT(Electronic funds transfers)
  3. Real-Time Gross Settlement system (RTGS)

1. Electronic Clearing Services (ECS):
Electronic Clearing Service can be defined as a repeated transfer of funds from one bank account to multiple bank accounts or vice versa using computer and Internet technology.

2. Electronic Funds Transfer

  • Electronic Funds Transfer (EFT) is the “electronic transfer” of money over an online network.
  • The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on the same day in batches.
  • Unlike traditional processes, EFT saves the effort of sending a demand draft through the post and the inherent delay in reaching the money to the receiver.
  • Banks may charge a commission for using this service.

3. Real Time Gross Settlement:

  • Real-Time Gross Settlement system (RTGS) is a payment system particularly used for the settlement of transactions between financial institutions, especially banks.
  • Real-time gross settlement transactions are:
  • Unconditional – the beneficiary will receive funds regardless of whether he fulfills his obligations to the buyer or whether he would deliver the goods or perform a service of a quality consistent with the order.
  • Irrevocable – a correctly processed transaction cannot be reversed and its money cannot get refunded.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Write a note on
a) Internet banking
b) Mobile Banking,
Answer:
(a) Internet banking:
Internet banking is a collective term for E-banking, online banking, virtual banking (operates only on the Internet with no physical branches), direct banks, web banking, and remote banking. Internet banking allows customers of a financial institution to conduct various financial transactions on a secure website operated by the banking institutions. This is a very fast and convenient way of performing any banking transactions.

It enables customers of a bank to conduct a wide range of financial transactions through its website. In fact, it is like a branch exclusively operating of an individual customer. The online banking system will typically connect to the core banking system operated by customers themselves (Self-service banking).

Advantages:

  1. The advantages of Internet banking are that the payments are made at the convenience of the account holder and are secured by user name and password, i.e. with Internet access it can be used from anywhere in the world and at any time.
  2. Any standard browser (e.g. Google Chrome) is adequate. Internet banking does not need .installing any additional software.

(b) Mobile banking:
Mobile banking is another form of net banking. The term mobile banking (also called m-banking) refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones. These transactions include balance checking, account transfers, payments, purchases, etc.

Transactions can be done at any time and anywhere. The WAP protocol installed on a mobile phone qualifies the device through an appropriate application for mobile session establishment with the bank’s website. In this way, the user has the option of permanent control over the account and remote management of his own finances. Mobile Banking operations can be implemented in the following ways:

  • Contacting the call center.
  • Automatic IVR telephone service.
  • Using a mobile phone via SMS.
  • WAP technology.
  • Using smartphone applications.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
What is cryptocurrency? Explain the same.
Answer:

  • A cryptocurrency is a unique virtual (digital) asset designed to work as a medium of exchange using a cryptographic algorithm.
  • This algorithm secures the transactions by recording them in blockchain and controls the creation of additional units of the currency.
  • Cryptocurrency is also called crypto coins, e-cash, alternative currencies, or virtual currencies and is classified as a subset of digital currencies.
  • Cryptocurrency can be defined as distributed accounting system based on cryptography, storing information about the state of ownership in conventional units.
  • The state of ownership of a cryptocurrency is related to individual system blocks called “portfolios”. Only the holder of the corresponding private key would have control over a given portfolio and it is impossible to issue the same unit twice.

Question 5.
Explain in detail the Unified payments interface
Answer:
(i) Unified Payments Interface (UPI) is a real-time payment system developed by the National Payments Corporation of India (NCPI) to facilitate inter-bank transactions.

(ii) It is simple, secure, and instant payment facility. This interface is regulated by the Reserve Bank of India and used for transferring funds instantly between two bank accounts through mobile (platform) devices. http://www. npci.org.in/

(iii) Unlike traditional e-wallets, which take a specified amount of money from the user and store it in its own account, UPI withdraws and deposits funds directly from the bank account whenever a transaction is requested.

(iv) It also provides the “peer-to-peer” collect request which can be scheduled and paid as per requirement and convenience.

(v) UPI is developed on the basis of Immediate Payment Service (IMPS). To initiate a transaction, UPI applications use two types of addresses – global and local.

  • The global address includes bank account numbers and IFSC.
  • Local address is a virtual payment address.

(vi) Virtual payment address (VPA) also called UPI-ID, is a unique ID similar to email id
(e.g. name@bankname) that enables us to send and receive money from multiple banks and prepaid payment issuers.

(vii) Bank or the financial institution allows the customer to generate VPA using a phone number associated with the Aadhaar number and bank account number. VPA replaces bank account details thereby completely hides critical information.

(Viii) The MPIN (Mobile banking Personal Identification Number) is required to confirm each payment. UPI allows operating multiple bank accounts in a single mobile application.

(ix) Some UPI application also allows customers to initiate the transaction using only Aadhaar number in absence VPA.

Advantages:

  1. Immediate money transfers through mobile devices round the clock 24 × 7.
  2. Can use a single mobile application for accessing multiple bank accounts.
  3. Single Click Authentication for transferring of the fund.
  4. It is not required to enter the details such as Card no, Account number, IFSC, etc. for every transaction.
  5. Electronic payments will become much easier without requiring a digital wallet or credit or debit card.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

12th Computer Applications Guide Electronic Payment Systems Additional Important Questions and Answers

Part A

Choose The Correct Answers

Question 1.
An electronic payment system is also called as …………………….
(a) liquidation
(b) clearing system
(c) clearing services
(d) all of these
Answer:
(d) all of these

Question 2.
The term credit card was first mentioned in ……………..
a) 1885
b) 1887
c) 1991
d) 1987
Answer:
b) 1887

Question 3.
I: Micro Electronic payments are expensive public-key cryptography.
II: Security of Micro Electronic Payment is low
(a) t-True, II-False
(b) I-False, II-True
(c) Both I, II are true
(d) Both I, II-False
Answer:
(b) I-False, II-True

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
…………… is an Indian domestic open-loop card.
a) visa
b) Master
c) Rupay
d) Mastro
Answer:
c) Rupay

Question 5.
Rupaywas launched in
a) 2012
b) 2005
c)2017
d) 2019
Answer:
a) 2012

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
How many card-based payment systems are available (based on the transaction settlement method)
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 7.
……………. is the first six digits of the credit card number to uniquely identify financial institutions.
a) BIN
b) UNF
c) CVC2
d) UDI
Answer:
a) BIN

Question 8.
……………………… is an electronic payment system normally used for retail transactions.
Answer:
Credit Card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
…………. is a type of fraud where the same cryptocurrency is spent in more than one transactions.
a) booting
b) Interpreting
c) Double spend
d) None of these
Answer:
c) Double spend

Question 10.
……………….. allow users to make electronic transactions quickly and Securely
a) E-banking
b) Net banking
c) E-wallets
d) None of these
Answer:
c) E-wallets

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 11.
The term credit card was first mentioned in the sci-fi normal in the year ………………………
(a) 1997
(b) 1887
(c) 1987
(d) 1897
Answer:
(b) 1887

Question 12.
………… is the activity of buying or selling commodities through online services or over the Internet.
a) Mobile Banking
b) Internet banking
c) Both A and B
d) None of these
Answer:
b) Internet banking

Assertion And Reason

Question 1.
Assertion (A): An Electronic payment system is a financial arrangement
Reason(R): K consists of an intermediator to facilitate the transfer of money-substitute between a payer and a receiver.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 2.
Assertion (A): Microelectronic Payment Systems is an online payment system designed to allow efficient and frequent payments of small amounts.
Reason(R): A payment system is an essential part of a company’s financial operations.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Assertion (A) Payment cards are plastic cards that enable cashless payments.
Reason(R): Payment cards do not contain a chip.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): Credit card Allows purchases over the Internet installments.
Reason(R): credit cards are not accepted worldwide.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 5.
Assertion (A): All Payment cards (including debit cards) are usually plastic cards of size.
Reason (R): It is of size 85.60 mm width x 53.98 mm height, rounded corners with a radius of 2.88 mm to 3.48 mm, and thickness of 0.76 mm.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
Assertion (A): EMV chip is an integrated chip in addition to magnetic stripe to store cardholder’s information
Reason(R): CVC2 is used in contact transactions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 7.
Assertion (A): The RFID symbol is four curved lines radiating rightwards similar to a tilted Wi-Fi symbol.
Reason(R): RFID indicates that it is a contactless smartcard.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 8.
Assertion (A): Cryptocurrency is a unique virtual (digital) asset designed to work as a medium of exchange using a cryptographic algorithm
Reason(R): Cryptocurrency is also called as Bitcoins.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 9.
Assertion (A): The bitcoin payment system, was developed in 2005
Reason(R): The function of cryptocurrency is based on technologies such as Mining, Blockchain, Directed Acyclic Graph, Distributed register (ledger).
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Question 10.
Assertion (A): Unified Payments Interface (UP!) is a real-time payment system developed by the National Payments Corporation of India (NCPI)
Reason(R): URI to facilitate inter-bank transactions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Find The Odd One On The Following

1. (a) Paytm
(b) Bitcoin
(c) Amazon
(d) UPI
Answer:
(c) Amazon

2. (a) Customer
(b) Fund Transfer
(c) Service provider
(d) payment processor
Answer:
(b) Fund Transfer

3. (a) Hash chain
(b) Hash collision
(c) Hash secret
(d) Hash Sequences
Answer:
(c) Hash secret

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

4. (a) Bearer
(b) Provider
(c) Acquirer
(d) Merchant
Answer:
(b) Provider

5. (a) EFTPOS
(b) Offline debit
(c) Purush card system
(d) Authorization
Answer:
(d) Authorization

6. (a) ECS
(b) EFT
(c) GST
(d) RTGS
Answer:
(d) RTGS

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

7. (a) Crypto coins
(b) E-cash
(c) Virtual currencies
(d) Statistical Currencies
Answer:
(c) Virtu! currencies

8. (a) Mining
(b) Acyclic graphics
(c) ledger
(d) Debitor\Creditor
Answer:
(d) Debitor\Creditor

9.(a) Bitshares
(b) Master coin
(c) Trading
(d) WXT
Answer:
(c) Trading

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

10. (a). Paypal
(b) SBI Buddy
(c) Paytm
(d) Flipkart
Answer:
(d) Flipkart

Match The Following:

Question 1.
EFTPOS – Signature Debit
Offline Debit – PIN Debit
Closed Loop – Multi-Purpose
Open Loop – Single Purpose
Answers
1. PIN Debit table
2. Signature Debit
3. Single Purpose
4. Multi-Purpose

Question 2.
Hologram – Contactless Smart Card
RFID Symbol – Card Holder Information
EMV Chip – Emblem
Publisher – Prevents Duplication
Answers
1. card Holder Information
2. Emblem
3. prevents Duplication
4. contactless Smart Card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Abbreviations:
1. UPI – Unified Payment Interface
2. MII – Major Industry Identifier
3. IIN – Issuer Identifier Number
4. BIN – Bank Identification Number
5. EMV – Europay, MasterCard, Visa
6. RFID –
7. CVV – Card Verification Code
8. ECS – Electronic Clearing Services
9. EFT – Electronic Fund Transfer
10 RTGS – Real Time Gross Settlement System
11. PoS – Point of Sale
12. NEFT – National Electronic Fund Transfer
13. RBI – Reserve Bank of India
14. IDRBT – Institute for Development and Research in Banking Technology
15. ICO – Initial Coin Offer
16. OTP – One-Time password
17. ACH – Automated Clearing House
18. NCPI – National Payment Corporation of India
19. IMPS – Immediate Payment Service
20. VPA – Virtual Payment Address
21. BHIM – Bharat Interface for Money
22. NPCI – National Payment Corporation of India

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Very Short Answers

Question 1.
What is the use of (POS) Point of Sale Terminal?
Answer:
It enables customers to make payments for the purchase of goods and services by means of credit and debit cards.

Question 2.
What are payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments.

Question 3.
What are the two types of electronic payment systems?
Answer:
Microelectronic payment system and Macro electronic payment system

Question 4.
What are the three types of cards using for payment systems?
Answer:
Credit card, Debit card, Stored value card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
What are the two types of payment systems?
Answer:
Cash payment system and Non-cash payment system

Question 6.
What is a credit card payment system?
Answer:
A credit card is an electronic payment system normally used for retail transactions.

Question 7.
What is a debit card payment system?
Answer:
It is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Question 8.
What is a Magnetic stripe?
Answer:
It is an iron-based magnetic material containing encrypted data about the cardholder and account number.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
What is an EMV chip?
Answer:
It is an integrated chip in addition to a magnetic stripe to store the card holder’s information.

Question 10.
What is Hologram?
Answer:
A hologram is a security feature that prevents duplication.

Question 11.
What is the use of real-time gross settlement?
Answer:
It is used for the settlement of transactions between financial institutions

Question 12.
What is Cryptocurrency?
Answer:
A cryptocurrency is a unique virtual asset designed to work as a medium of exchange.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 13.
What algorithm is used for Cryptocurrency?
Answer:
Cryptographic algorithm

Question 14.
What is Bitcoin?
Answer:
Bitcoin is the most popular and the first decentralized cryptocurrency

Question 15.
What is Altcoin?
Answer:
Altcoins is the collective name for all cryptocurrencies that appeared after Bitcoin.

Question 16.
What is Mining?
Answer:
The cryptocurrency units are created by the solution of cryptographic tasks called mining.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 17.
What is Blockchain?
Answer:
Blockchains are an open distributed book that records transactions of cryptocurrencies

Question 18.
What is the use electronic wallet?
Answer:
It is used to allow users to make electronic transactions quickly and securely over the Internet

Question 19.
What is another name of mobile banking?
Answer:
Net banking or m-banking

Question 20.
Who developed Unified Payments Interface (UPI)?
Answer:
National Payments Corporation of India (NCPI)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Years To Remember

1887 The term credit card was first mentioned
1920 The modern credit cards concept was born in the U.S.A
2011 Altcoins Litecoin and Namecoin appeared
2013 Cryptocurrency platforms began
2014 2nd generation of cryptocurrency appeared

Part B

Short Answers

Question 1.
Write a note on payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments. They are a simple embossed plastic card that authenticates the cardholder on behalf of a card issuing company, which allows the user to make use of various financial services.

Question 2.
Define liquidation or clearing system or clearing service.
Answer:

  • An Electronic payment system is a financial arrangement that consists of an intermediator to facilitate the transfer of money-substitute between a payer and a receiver.
  • It is known as liquidation, clearing system, or clearing service.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
What is the role of the Electronic payment system?
Answer:
Electronic payment system ensures the transfer of value from one subject of the economy to another and plays an important role in modern monetary systems.

Question 4.
What are the two types of payment systems?
Answer:
Payment systems are generally classified into two types. They are

  1. Microelectronic Payment Systems
  2. Macro Electronic Payment Systems

Question 5.
Define COD?
Answer:
Cash on delivery (COD) also called a collection on delivery describes a mode of payment in which the payment is made only on receipt of goods rather than in advance.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
List some popular macro on-line payment systems.
Answer:

  • Some popular macro on-line payment systems are
  • Card-based payment systems
  • Electronic account transfer
  • Electronic cash payment systems
  • Mobile payment systems and ¡nternetspayment systems

Question 7.
What are the three widely used card-based payment systems?
Answer:

  1. Credit card-based payment systems (pay later)
  2. Debit card-based payment systems (pay now)
  3. Stored value card-based payment systems (pay before)

Question 8.
What is mean by Credit Card?
Answer:

  • Credit card is an electronic payment system normally used for retail transactions.
  • A credit card enables the bearer to buy goods or services from a vendor, based on the cardholder’s promise to the card issuer to pay back the value later with the agreed interest.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
How merchant will be one of the Key Players in the operations of credit cards?
Answer:
Storekeeper or vendor who sells or providing service, receiving payment made by its customers through the credit card.

Question 10.
How Acquirer will be one of the Key Players in the operations of credit cards?
Answer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant sends authorization requests to the issuing bank through the appropriate channels.

Question 11.
What is mean by RFID symbol?
Answer:

  • RFID symbol is four curved lines radiating rightwards similar to a tilted Wi-Fi symbol.
  • It indicates that it is a contactless smartcard.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 12.
Define Hologram.
Answer:
A hologram is a security feature that prevents duplication. It is a 3-dimensional image formed by interference of light beams.

Question 13.
What is mean by CVC/CVV?
Answer:

  • CVV – Card Verification value
  • CVC – Card Verification code
  • It is a 3 digit code usually printed to the left of the signature pane that validates the card.

Question 14.
What is mean by Debit Card?
Answer:
Debit Card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 15.
What is Smart card?
Answer:

  • A plastic card with a built-in microprocessor used typically to perform financial transactions.
  • The modern version of card-based payment is smart cards.
  • Smart card along with the regular features of any card-based payment system holds an EMV chip.

Question 16.
What are the two varieties for the stored-value cards?
Answer:
There are two varieties for the stored-value card.

  1. Closed-loop (single purpose)
  2. Open-loop (multipurpose)

Question 17.
List the advantages of smart card.
Answer:
The advantage of Smart cards is that it can

  • Provide Identification
  • Authentication
  • Data Storage
  • Application Processing.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 18.
What are the two types of smart card?
Answer:
Smart cards can be classified into

  1. Contact smart cards
  2. Contactless smart cards.

Question 19.
What is mean E-cash?
Answer:

  • Electronic cash is (E-Cash) is a currency that flows in the form of data.
  • It converts the cash value into a series of encrypted sequence numbers and uses these serial numbers to represent the market value of various currencies in reality.

Question 20.
List the advantages of Internet Banking.
Answer:

  • The advantages of Internet banking are that the payments are made at the convenience of the account holder and are secured by user name and password, i.e. with Internet access it can be used from anywhere in the world and at any time.
  • Any standard browser (e.g. Google Chrome) is adequate. Internet banking does not need installing any additional software.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Part C

Explain In Brief Answer

Question 1.
How will you do the Microelectronic payment transactions?
Answer:
In general, the parties involved in the micro on-line payments are the Customer, Service Provider, and Payment processor. The Microelectronic payment transactions can be explained in the following way.

  • Step 1: Customer proves his authentication and the payment processor issues micropayments.
  • Step 2: Customer pays the micropayments to the online service provider and gets the requested goods or services from them.
  • Step 3: Service provider deposits micro payments received from the customer to the payment processor and gets the money.

Question 2.
Write a short note on Real Time Gross Settlement?
Answer:

  • Real-Time Gross Settlement system (RTGS) is a payment system particularly used for the settlement of transactions between financial institutions, especially banks.
  • As the name indicates, RTGS transactions are processed in real-time.
  • RTGS payments are also called push payments that are initiated(“triggered”) by the payer.
  • RTGS payments are generally large-value payments, i.e. high-volume transactions.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Mention the advantages of a credit card?
Answer:
Advantages of credit card:

  1. Most credit cards are accepted worldwide.
  2. It is not necessary to pay physical money at the time of purchase. The customer gets an extra period to pay for the purchase.
  3. Depending on the card, there is no need to pay an annuity.
  4. Allows purchases over the Internet in installments.
  5. Some issuers allow “round up” the purchase price and pay the difference in cash to make the transactions easy.

Question 4.
What are three ways of processing debit card transactions?
Answer:
Three ways of processing debit card transactions are

  1. EFTPOS (also known as online debit or PIN debit)
  2. Offline debit (also known as signature debit)
  3. Electronic Purse Card System

Question 5.
Define
(i) Closed Loop
(ii) Open Loop
Answer:
(i) Closed Loop

  • In closed-loop cards, money is metaphorically stored on the card in the form of binary-coded data.
  • Closed-loop cards are issued by a specific merchant or merchant and can only be used to make purchases from specific places, e.g. Chennai metro rail travel cards.

(ii) Open loop (multipurpose)

  • Open-loop cards can be used to make debit transactions at a variety of retailers.
  • It is also called prepaid-debit cards.
  • It can be used anywhere the branded cards are accepted, e.g. Visa gift cards.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
Give the two types of Real-time gross settlement transactions?
Answer:
Real-time gross settlement transactions are:
Unconditional – the beneficiary will receive funds regardless of whether he fulfills his obligations to the buyer or whether he would deliver the goods or perform a service of a quality consistent with the order.

Irrevocable – a correctly processed transaction cannot be reversed and its money cannot get refunded (the so-called settlement finality).

Part D

Explain In Detail

Question 1.
Explain Debit Card?
Answer:
Debit Card:
Debit Card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Generally, debit cards function as ATM cards and act as a substitute for cash The way of using debit cards and credit cards is generally the same but unlike credit cards, payments using a debit card are immediately transferred from the cardholder’s designated bank account, instead of them paying the money back at a later with added interest. In the modern era, the use of debit cards has become so widespread.

The debit card and credit card are identical in their physical properties. It is difficult to differentiate two by their appearance unless they have the term credit or debit imprinted. Currently, there are three ways of processing debit card transactions:

  1. EFTPOS (also known as online debit or PIN debit)
  2. Offline debit (also known as signature debit)
  3. Electronic Purse Card System

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 2.
Explain in detail the Credit card Number.
Answer:

  • Credit card number: The modern credit card number has a 16-digit unique identification number.
  • The first digit of the credit card number is Major Industry Identifier (Mil).
    • It identifies the issuer category.
    • e.g. 1 – Airlines,4 – Banks
  • The next 5 digits uniquely identify the issuing organization.
  • The first 6 digits together called as Issuer Identifier Number (IIN) or Bank Identification Number (BIN).
  • The next 9 digits are the account number.
  • The last digit is a check digit (based to the Luhn algorithm).

Question 3.
Write in detail about the classification of smart cards
Answer:
(i) Contact smart cards

  • Contact smart cards have a contact area of approximately 1 square centimeter, comprising several gold-plated contact pads.
  • These pads provide electrical connectivity only when inserted into a reader, which is also used as a communications medium between the smart card and a host. e.g. a point of sale terminal(POS).

(ii) Contactless smart cards

  • Contactless smart card is empowered by RF induction technology.
  • Unlike contact smart cards, these cards require only near proximity to an antenna to communicate.
  • Smartcards, whether they are the contact or contactless cards do not have an internal power source.
  • Instead, they use an inductor to capture some of the interrupting radio-frequency signals, rectify it, and power the card’s processes.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
Write the steps to transfer funds using Net Banking.
Answer:

  • Step 1; Login to net banking account using unique user name and password provided by the bank earlier.
  • Step 2: Add the beneficiary as a payee to enable transfer of fund. The following details like Account Number, Name, IFSC about the beneficiary are to be filled in the ‘Add New Payee’ section.
  • Step 3: Once the beneficiary Is added, choose RTGS / NEFT / IMPS as mode of Fund Transfer.
  • Step 4: Select the account to transfer money from, select the payee, enter the amount to be transferred and add remarks (optional).
  • Step 5: Click on submit.
  • Step 6: Enter the OTP received to mobile number linked to the corresponding account to complete the transaction.

Question 5.
Explain the advantages of UPI?
Answer:

  • Immediate money transfers through mobile device round the clock 24 × 7.
  • Can use single mobile application for accessing multiple bank accounts.
  • Single Click Authentication for transferring of fund.
  • It is not required to enter the details such as Card no, Account number, IFSC etc. for every transaction.
  • Electronic payments will become much easier without requiring a digital wallet or credit or debit card