TN Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 1.
List the shared resources in internet.
Answer:

  • Some of the shared resources are file server, web camera, speakers, printer, scanner, fax machine etc.,
  • Accessing services such as WWW, digital audio, digital video which are shared to use applications, software and storage services.

Question 2.
What is nodes?
Answer:
Computer which is connected to network called as nodes. The data originates and terminates at these particular nodes is called as a source and destination.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 3.
What is 5G?
Answer:

  • 5G (Fifth Generation), the industry of telecommunication has been hard working on the development of their next generation “5G” cellular communication technology.
  • This 5G intense to boost up the speed the mobile connections dramatically.

Question 4.
What is Ethernet?
Answer:
A system for connecting a number of computer systems to form a local network, with protocols to control the passing of information and to avoid simultaneous transmission by two or more system.

Question 5.
What is Hosts?
Answer:

  • A network hosts is a computer connected to a computer network. A host may work as a server offering information resources, services and applications to users or other nodes on the network.
  • Hosts are assigned at least one network address.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 6.
What are online service providers?
Answer:
Online service providers are Flipkart, Amazon, Snap deal etc., to buy • products via internet and have the product at door steps.

Question 7.
What is E-Governance?
Answer:
E-Govemance (Electronic governance) is the application of information and communication technology for delivering government services, exchange of information, communication transactions and services between govemment- to-citizen.

Question 8.
What is E-banking?
Answer:
E-banking (Electronic banking) is a product designed for the purpose of online banking that enables you to have easy and safe access to your bank account.

Question 9.
Define merchandising.
Answer:
Merchandising is to makes merchant an easier to get a specific type of products, company, brand can be done easier via internet.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 10.
Write some internet powerful search engine?
Answer:
The some internet powerful search engine are internet explorer, yahoo, bing and later, google stepped in with user friendly gmail, youtube, google drive, google maps etc.,

Question 11.
What are two things have marked its evolution of internet growing?
Answer:
The two things have marked its evolution of internet growing now a days are mobile technology and social web.

Question 12.
What are plays powerful communication computer networks?
Answer:
Using computer networks can easily communicate at very low cost via mobile, social media, Telephone, e-mail, chatting, video telephone, video conferencing, skpye, sms, mms, whatsapp, groupware etc.,

Question 13.
What is resources sharing?
Answer:
Resource sharing means one device accessed by many systems via network.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 14.
What are resource sharing devices available?
Answer:
Resource sharing is sharing such as printers, scanners, PDA, Fax machine and modems etc.,

Question 15.
What is cloud computing?
Answer:
A cloud computing means storing and accessing data and programs over the internet instead of your computer’s hard drive.

Question 16.
What is usage of cloud computing?
Answer:

  • The usage of latest technologies as cloud computing are being used to allow globally without sacrifying security or limiting user access.
  • Here on internet conversations happen faster, quick decision making saves a lot of time.

Question 17.
What are the method easily done to pay or receive payments?
Answer:
There are two methods commonly used using internet, they are gateways and online payments.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 18.
What are the business easily done using internet?
Answer:
Company renewals, license, other certificates, bill payments, receipts, invoice, stock manitenance etc., can be done without any geographical boundaries using internet.

Question 19.
What are advantages using internet for business man?
Answer:

  • Direct human interactions are reduced using internet.
  • Buyer directly purchase any product from manufacturer with lowest cost, middle person brokerage charges are reduced.

Question 20.
What are devices used networks at home?
Answer:
Network at home is a group of devices such as computers, mobile, speakers, camera, game system,’and printer that connect via network with each other.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 21.
What are ways to connected networks at home?
Answer:
Networks at home were connected in two ways they are

  • Wired network
  • Wireless network

Question 22.
Define wired network.
Answer:
A wired netw ork system connected with network cable. Eg: speakers, CCTV, printers, outdoors, and scanners etc., with cables (Wi-Fi).

Question 23.
Define wireless network.
Answer:
A wireless network is connecting devices like tablets (tab), indoor cameras and E-readers etc., without cable.

Question 24.
What are main role plays network at home?
Answer:
Network at home plays main role to access all such as e-banking, e-leaming, e-govemance, e-health, telemedicine, telemarketing, callcenters, video conferencing, digitalization of memories, can easy to access and use by avoiding lot of time and stacked at queue.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 25.
What is mobile network?
Answer:
Mobile network is the network connecting devices without cable (wireless).

Question 26.
What are devices used fixed transceivers and moving via more than one cell during transmission?
Answer:
Mobiles, Tablets, Pagers, Laptops, Engaged with Mobile broadband just like Modems etc.,

Question 27.
List out the social network media.
Answer:
Social network media are Whatsapp, Facebook, Twitter, Blogs, Pinterest, Linkedln, Classmates and so on.

Question 28.
List out the social network attributes.
Answer:
Social networks share several attributes in common they are membership, content contribution, frequent return visits, human relationship building.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 29.
What is flame wars?
Answer:
When we have mixed group of people coming together online, many discussions arise which lead to personal attacks called flame wars.

Question 30.
What is cloud storage?
Answer:

  • Cloud storage is a service model in which data is maintained, managed, backup remotely and made available to users over a network.
  • Just a storage of data on online, access in different area no geographical limits was in neeed.

Question 31.
What is E-Readers?
Answer:
E-Readers is similarly called as e-book reader these were designed for the purpose of reading via mobile electronics device to read digital e-books and periodically.

Question 32.
What is WWW?
Answer:
The WWW (World Wide Web) is combination of all resources and users on the internet that are using the Hyper Text Transfer Protocol (HTTP).
The World Wide Web is the universe of network accessible information, an embodiment of human knowledge.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 33.
Write short note on development on mobile networks.
Answer:

  1. The first generation (1G) mobile wireless communication network was analog used for voice calls only.
  2. The second generation (2G) is a digital technology and supports text messaging.
  3. The third generation (3G) mobile technology provided higher data . transmission, rate, increased capacity and provide multimedia support.
  4. The fourth generaion (4G) LTE (Long Term Evolution) provides in addition to the usual voice and other services, but not reached many parts of the world.
  5. The fifth generation (5G) is a currently under development of their next generation. 5G intense to boost up the speed the mobile connections dramatically.

Question 34.
Write short notes on SABRE.
Answer:

  1. SABRE (Semi Automatic Business Research Environment) at commercial Airline Reservation System online connected with two main frame computers.
  2. Packets switching was developed by Paul Baran and Donald devices to transfer the information between computers and networks.
  3. NPL (National Physical Laboratory) network at United Kingdom Local Area Network (LAN) using line speed of 768 kbit/s was implemented by Davies Pioneered.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 35.
Write INTERNET stands for
Answer:

  1. INTERNET – INTERnational NETwork (Technology, telecom, intelligence)
  2. INTERNET – INTERconnected computerNETwork (science, space and environment)
  3. INTERNET – Interesting Notions Transmitted Electronically Round Newly Engineered Technology.

Question 36.
Write the steps of disadvantages of Internet.
Answer:

  1. Simply wasting the precious time on internet by surfing, searching unwanted things.
  2. Lot of unnecessary information is also there, why because anyone can post anything on their webpage, blogs.
  3. Hackers and viruses can easily theft our more valuable information available in the internet. There a lot of security issues are there in E-banking.

Question 37.
Write a short note on mobile networks.
Answer:

  1. Mobile network is the network connecting devices without cable (wireless).
  2. Mobile computers, such as laptop, tablet, and hand held computers, were fastest growing segments.
  3. At land ares network was distributed as cells, each will be served by single location transceiver, but generally three cells sites or a base transceiver station.
  4. The base station provides the cell with network coverage and other features that can be utilized for transmission of voice, data and other content as well.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 38.
Expand the following.
(i) SAGE
(ii) SABRE
(iii) ARPANET
(iv) ARCNET
Answer:
(i) SAGE – Semi Automatic Ground Environment
(ii) SABRE – Semi Automatic Business Research Environment.
(iii) ARPANET – Advanced Research Projects Agency Network.
(iv) ARCNET – Attached Resource Computer NETwork.

Question 39.
Briefly explain internet explosion.
Answer:

  1. Internet is simply defined as the World Wide Web connection of individual networks which operated by academic, industry, governments, and private parties.
  2. The internet served to interconnect with laboratories engaged at government research, and from 1994 it is expanded to serve millions of user and a multiple purpose in all parts of this universe.
  3. Internet promotes as the universal source of information of billions of people, at work, at home, at school.
  4. Mobile technology on hand made possible to great reach of internet and increase the internet user all over the world.
  5. The internet allows all to be democratic in mass media. Anyone can have a webpage in internet with very low investment.
  6. Almost anyone that who can read and write can have a access and a presence in World Wide Web very low investment.
  7. People everywhere can express and publish their ideas and opinions via blogging.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 40.
Explain growth of business using networks.
Answer:

  1. Networks are necessary for successful business operations and technology for the business interaction.
  2. Now a days computer networks were faster, the communication has been transformed the way of business performed.
  3. By the usage of latest technologies, such as cloud computing are being used to allow globally without sacrifying security or limiting user access.
  4. On the way of e-banking we already have seen that we can pay or receive money from or to the customer may be easily done via gateways or by online payments were much easier on this method.
  5. Government subsidies were available for their business to promote their business by digitalization.
  6. Direct human interactions are reduced because of internet.
  7. Buyer directly purchase any product from manufacturer with lowest cost, middle person brokerage charges are reduced.

Question 41.
Mention some features of mobile networks.
Answer:

  1. Mobile device is less consumption of power is used comparing with a single transmitter or satellite often cell towers were nearer.
  2. Huge capacity than a large transmitter, at single frequency can be used for different or many links as long as they are in different cells.
  3. Covering large area than a single transmitter, we can add more towers indefinitely and cannot be limited by any horizon limits.
  4. Private cellular networks can be used at various locations like research and about large organizations and small industries, likely as public safety agencies.
  5. Even though all the service provider giving internet cannot make a reach to computer.
  6. When the reach of mobile it makes all to access the internet via mobile or cellular phone reaches the network easier to access.
  7. Where ever we go, we can access to easily.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 42.
Explain the attributes of social networks for sharing to common people.
Answer:
(i) Membership:

  1. Social nets all generally requires user to register names and accounts for duplicate and secrecy.
  2. Many public networks offer free registration, but some charge fees for their premium services.
  3. Private networks restrict registration to people who meet certain eligibility criteria.

(ii) Content contribution:
Networks allows members to easily share comments, movies, music, short films and / or photos with others.

(iii) Frequent return visits:
Healthy social net takes a centers around a base of members who check in regularly to contribute theirs and also for new updates.

(iv) Human relationship building:
The common goal of most social networks is allowing the interactions that build stronger connections within communicates of people.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 43.
Explain usefulness of social networks.
Answer:
(i) Group information sharing over long distances:

  • Friends and family members can keep in contact via mobile phone calls or by text messages, social net suggestion a much richer environment for staying connected.
  • Many scenarios such as sharing photo, albums, video or convey their wishes someone, work better these networks because an entire group can participate together with one.

(ii) Broadcast announcements:

  • Cities can more comfort to spread work of emergencies and natural calamities.
  • Venues and local shops can advertise upcoming events on social networks.

(iii) Fostering diversity of thought:

  • Some critics of social networks point out that online communities attract people by similar interests and backgrounds.
  • When we have mixed group of people coming together online, many discussions arise which lead to personal attacks called flame wars.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 44.
Define Computer Network.
Answer:

  1. A set of computers connected together for the purpose of sharing resources is called as computer network.
  2. At present, Internet is the most common resource shared everywhere.

Question 45.
Define internet.
Answer:
Networks of network is called Internet.
The internet is a global wide area network that connects computer systems across the world. And exchanges private, public, business, academic and- government networks.

Question 46.
What are the common uses of computer network?
Answer:
The common uses of computer networks are

  1. Communication
  2. Resource sharing
  3. Data or software sharing
  4. Money saving

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 47.
List out same features of mobile network.
Answer:

  1. Less consumption of power is used in mobile devices.
  2. Huge capacity than a large transmitter, at single frequency can be used for different in cells.
  3. Covering large area than a single transmitter, we can add more towers indefinitely.

Question 48.
Difference between wired and wireless networks.
Answer:

Wired Network

 Wireless Network

A wired network system connected with network cable. A wireless network is connecting device like tablets (tab).
Eg: Speakers, CCTV, Printers, outdoors and Scanners etc., with cable (Wi – Fi) Eg: Indoor cameras and E – readers etc., without cables.

Question 49.
Define ARPANET.
Answer:

  1. ARPANET (Advanced Research Projects Agency Network) was the network that became the basis for the internet.
  2. ARPANET was an early packet-switching network and the first network to implement the TCP / IP protocol.
  3. ARPANET was developed under the direction of the U.S. Advanced Research Projects Agency (ARPA).
  4. In 1969, the idea became a modest reality with the interconnection of four university computers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 50.
What is the usage of cloud storage and cloud computing?
Answer:

  1. Cloud storage is simply storing data and files, and performing backups to an external location offsite.
  2. Cloud storage, data is stored on a virtual server, not the employees actual devices.
  3. Cloud computing is running applications through a virtual desktop over a secure internet connection.
  4. Cloud computing, No special hardware requirements. The ability to access apps and data from just about anywhere on just about my device.
  5. Combining cloud storage with cloud computing provides companies the benefits of both services.

Question 51.
Explain the growth of the computer networking.
Answer:
(i) The growth of the computer networking technology was developing in very interesting and fastest way.
(ii) Growth on popularity of cloud storage and cloud computing. On behalf of buying physical copies of games, music and movies, increasingly downloading and buy digital licenses their need via Internet.
(iii) Developments on mobile network infrastructure that have allow the people in their developed areas who can allow it to their developed areas who can allow it to their smart mobile phones as video broadcasting system and as mobile television.
(iv) Some of the people underlying and staying connected all the times, whenever they at the workplace, via a home network, via public Wi-Fi hotspot or smart phones.
(v) “5G” (fifth generation)cellular communication technology, this 5G intense to boost up the speed the mobile connections dramatically.
(vi) Artificial Intelligence (AI) will help to maintain, manage, and protect it.
(vii) Artificial network is powering algorithms will become most intelligent; it might find faster and reliable methods of anticipating threats and cleaning networks.
(viii) Artificial intelligence able to be a better predict traffic as it collects and analyzes data in real time, some of network managers were better prepared for big events such as the worldcup, Olympics, valentine’s day, which often put on the Internet under pressure.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 52.
Mention some uses of network at business, home, mobile, social application.
Answer:
The computer networks plays major role on providing information to large, small organization as well as individual common man.

(i) Network in Business:

  • In Twenty first centuries communications is necessary for successful business operations and technology for the business interaction.
  • We all know that “time is money” in business. On the way of e-banking, we can pay or receive money from or to the customer may be easily done via gateways or by online payments were much easier.
  • Commercial information, cheaper marketing, comparison of product can be very easier now a days.
  • Company renewals, licence, other certificates, bill payments, receipts, invoice, stock maintenance, can be done without any geographical boundaries required here on doing via Internet and computer networks.

(ii) Network at home:

  • Network at home were connected in two ways they are wired network and wireless network.
  • Network at home plays main role to access all such as e e-learning, e-govemance, e-health, telemedicine, callcenters, video conferencing, digitalization of memories, can easy to access and use by avoiding lot of time and stacked at queue.

Mobile Networks:

  • Mobile network is the network connecting devices without cable.
  • Mobile network is used for searching some important points, checking mail can be done, watching the progress can be easier on this way. Computer knowledge not necessary to easily access the internet via mobile network.

(iv) Social Application:

  • Social network media is very fast and easiest way to cover the all the people, who they are connected in network.
    Eg: Whatsapp, Facebook, Twitter, Blogs, Pinterest, Linkedln, classmates and so on. .
  • Through the above social media we share our thoughts in diffr^nt formats and different size of files. The corporate also ores intram
  • Usefulness of social networks are group information sharing ove’ long distance, Broadcast announcements, fostering diversity 01 thoughts etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 53.
List out the wireless network?
Answer:

  1. Wireless PAN (Personal Area Network)
  2. Wireless LAN (Local Area Network)
  3. Wireless Adhoc Network.
  4. Wireless MAN (Metropolitan Area Network)
  5. Cellular Network.
  6. Global Area Network.
  7. Space Network

Question 54.
Find out how your family members and public members uses the network?
Answer:
Our family members using computer networks on mobiles. My mother using youtube by searching on videos for different cooking. My younger brother playing network gaming and other entertainments. My father to access network for email, paying phone bill, electricity bill, corporation taxes and other E-Govemance, E-banking etc., My elder sister using network for video conferencing with his friends and searching research materials for her higher studies. Myself using social media and ordered delicious food from various hotels.

The public members are probably using network for mail searching, Social media, Reservation Ticket Booking etc., Now a days on this current situation of people are using individual networks such as mobile, tab etc.,
(Students are requested to write about your family members and nearer people Using network).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 55.
Instead of landline (wired network) what were the types of wireless network you know.
Answer:

  1. Wireless LAN
  2. Cellular network

Question 56.
Some of example devices with wireless networks.
Answer:
Tablets (tab), Indoor cameras, E-readers, Laptops, Smartphones, Bluetooth etc.,

Question 57.
How social media has its memory management?
Answer:

  1. Social media has shared memory, it provides a buffer-type functionality that speeds up the delivery of temporal/historical data.
  2. The main idea is to have a central point in the memory(RAM) of the platform that will manage and provide a temporal/ historical data.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 58.
Do you have a account on social media (or) create an account.
Answer:
If you have social media account you can use social media through registered login id and password.
Create an account in social media for example to create an account in facebook should follow the steps.
(i) Go to facebook.com / r. php (Displaying registration form)
(ii) Enter the new login name go by in everyday life.
(iii) Enter your date of birth.
(iv) Enter the mobile number, to use email instead of mail or sign-up with email.
(v) Tap male or female to select your gender.
(vi) Choose a password and tap signup.
(vii) If we finish creating an account, we need to confirm our email or mobile numbers.
Using Facebook account, we can create other social media accounts.

Question 59.
Analyse how the social media applications transfer a huge data.
Answer:
(i) Social media is defined as web-based and mobile based internet applications.
(ii) Social media data is clearly the largest, richest and most dynamic guidance base of human behaviour, bringing new opportunities to understand individuals, groups and society.
(iii) All the status updates, pictures and videos posted by the people on their social media contains information.
(iv) These user behaviour data – can be transferred via applications for individual or business purposes.
(v) For example, facebook collects information from all devices that we have installed it or access its service from do depending on the permission, it will collect things from our devices like location via GPS, time zone etc., This information are collected as data, these datas can be used for individual, public and commercial purpose.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Choose the correct answer:

Question 1.
Networks of network is called:
(a) WAN
(b) MAN
(c) Internet
(d) LAN
Answer:
(c) Internet

Question 2.
What is called computer networking exchanges the data with each other through wired or wireless connections between different terminals?
(a) Nodes
(b) Internet
(c) Networking
(d) All of these
Answer:
(a) Nodes

Question 3.
Which one of the following cable media which is transferred the data through wires?
(a) WAN
(b) Nodes
(c) MAN
(d) Fiber optics
Answer:
(d) Fiber optics

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 4.
An example of wireless media:
(a) cable
(b) Wi-Fi
(c) nodes
(d) All of these
Answer:
(b) Wi-Fi

Question 5.
Which is identified by networking nodes?
(a) Computer name
(b) Server name
(c) Mail address
(d) IP addresses
Answer:
(d) IP addresses

Question 6.
Which is called connecting more than one computer?
(a) Server
(b) Hub
(c) Node
(d) Network
Answer:
(d) Network

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 7.
Who were developed by packet switching?
(a) Paul Baran
(b) Donald devices
(c) Both (a) and (b)
(d) Vintcerf
Answer:
(c) Both (a) and (b)

Question 8.
Which company was introduced first telephone switch?
(a) Western electric
(b) European electric
(c) Southern electric
(d) West European electric
Answer:
(a) Western electric

Question 9.
Expand ARPANET:
(a) Advanced Research Project Agency Network.
(b) American Research Project Agency Network.
(c) Australian Research Project Agency Network.
(d) All Research Project Agency Network.
Answer:
(a) Advanced Research Project Agency Network

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 10.
Expand ARCNET:
(a) Advanced Research Computer Network.
(b) Attached Resource Computer Network.
(c) American Research Computer Network.
(d) All Resource Computer Network.
Answer:
(b) Attached Resource Computer Network

Question 11.
How many nodes were connected by ARPANET in 1969?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 12.
Which French network named was the first for making hosts?
(a) Western Electric
(b) French Network
(c) Cyclades
(d) Normalades
Answer:
(c) Cyclades

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 13.
Which is responsible for reliable delivery of data?
(a) Hosts
(b) HUB
(c) Node
(d) Server
Answer:
(a) Hosts

Question 14.
Which was created by John Murphy of data point corporation?
(a) ARPANET
(b) ARCNET
(c) ETHERNET
(d) HOSTS
Answer:
(b) ARCNET

Question 15.
Which was token passing network used first to share the storage device in 1976?
(a) ARCNET
(b) ETHERNET
(c) ARPANET
(d) HOSTS
Answer:
(a) ARCNET

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 16.
INTERNET stands for:
(a) ESITER national NETwork
(b) INTER connected computer NETwork.
(c) Interesting Notions Transmitted Electronically Round Newly Engineered Technology
(d) All of these
Answer:
(d) All of these

Question 17.
Which is made easier to collect their certificates through online?
(a) E-Banking
(b) E-Govemance
(c) E-Leaming
(d) E-Business
Answer:
(b) E-Govemance

Question 18.
Which was can easily theft our more valuable information available in the Internet?
(a) Hackers
(b) Viruses
(c) (a) and (b)
(d) Anti-viruses
Answer:
(c) (a) and (b)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 19.
Which cellular communication technology to boost up the speed the mobile connections dramatically?
(a) 2G
(b) 3G
(c) 4G
(d) 5G
Answer:
(d) 5G

Question 20.
Which will help to maintain, manage, and protect mobile networks?
(a) Cloud computing
(b) Artificial Intelligence (AI)
(c) Browsers
(d) Hackers
Answer:
(b) Artificial Intelligence (AI)

Question 21.
Which method is powering algorithms will become most intelligent and . anticipating threats and cleaning networks?
(a) Artificial Network
(b) Cloud computing
(c) Browsers
(d) Hackers
Answer:
(a) Artificial Network

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 22.
What does sharing means one device accessed by many system?
(a) Communication
(b) Resource
(c) Data
(d) Money
Answer:
(b) Resource

Question 23.
What will be stored at central computer or server, when using computer network?
(a) Software
(b) Data sharing
(c) Resources sharing
(d) All of these
Answer:
(d) All of these

Question 24.
Which are being used to allow globally without sacrifying security or limiting user access?
(a) Cloud computing
(b) Server
(c) Hub
(d) Node
Answer:
(a) Cloud computing

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 25.
What is known as that we can pay or receive money from or to the customer may be easily done?
(a) gate ways
(b) online payment
(c) (a) or (b)
(d) cheque
Answer:
(c) (a) or (b)

Question 26.
What does to promote their business used by government subsidies?
(a) Digitalization
(b) Server
(c) Software
(d) Computer
Answer:
(a) Digitalization

Question 27.
What does can access more than one person in one device?
(a) Network
(b) Router
(c) Datacard
(d) (b) or (c)
Answer:
(d) (b) or (c)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 28.
Which of the following is not wired network system? ’
(a) E-readers
(b) Speakers
(c) CCTV
(d) Scanners
Answer:
(a) E-readers

Question 29.
Which of the following is used wireless network?
(a) E-readers
(b) Speakers
(c) CCTV
(d) Scanners
Answer:
(a) E-readers

Question 30.
Which can be used, from the home we ordered delicious food from various hotels and restaurants at time without delay?
(a) Internet
(b) Networks
(c) Browsers
(d) Data card
Answer:
(a) Internet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 31.
Which network is the network connecting devices without cable?
(a) Internet
(b) Mobile
(c) Cloud computing
(d) Server
Answer:
(b) Mobile

Question 32.
Which will provides the cell with network coverage and other features that can be utilized for transmission of voice, data and other content as well?
(a) Base transceiver station
(b) Server
(c) Cloud computing
(d) Internet
Answer:
(a) Base transceiver station

Question 33.
Which is used to communicate with one another with fixed transceivers and moving via more than one cell during transmission?
(a) Base transceiver station
(b) Portable transceivers
(c) Cloud computing
(d) Server
Answer:
(b) Portable transceivers

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 34.
Which is very fast easiest way to cover all the people?
(a) Server
(b) Cloud computing
(c) Social media
(d) Datacard
Answer:
(c) Social media

Question 35.
Which of the following one is not a social media?
(a) LinkedIn
(b) Twitter
(c) Blogs
(d) Tablets
Answer:
(d) Tablets

Question 36.
Which is requires user to register names and accounts for avoid duplicate and secrecy in social nets?
(a) Membership
(b) Content contribution
(c) Frequent return visits
(d) Human relationship building
Answer:
(a) Membership

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 37.
Which is allows members to easily share comments, music, photos etc., with others?
(a) Membership
(b) Content contribution
(c) Frequent return visits
(d) Human relationship building
Answer:
(b) Content contribution

Question 38.
What does healthy social net takes a centers around a base of members who check in regularly to contribute theirs?
(a) Membership
(b) Content contribution
(c) Frequent return visits
(d) Human relationship building
Answer:
(c) Frequent return visits

Question 39.
Which is common goal of most social networks is allowing the interactions that build stronger connections with in communities of people?
(a) Membership
(b) Content contribution
(c) Frequent return visits
(d) Human relationship building
Answer:
(d) Human relationship building

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 40.
When we have mixed group of people coming together online, many discussions arise which lead to personal attacks called:
(a) Flame wars
(b) Hacking
(c) Viruses
(d) None of these
Answer:
(a) Flame wars

Question 41.
Match the following:

(A) Bluetooth (i) shared resources
(B)node (ii) wireless
(C) IP address (iii) terminals
(D) printer (iv) Network addresses

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (ii); (B) – (iv); (C) – (i); (D) – (iii)
(c) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(d) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
Answer:
(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)

Question 42.
Match the following:

(A) SAGE (i) Token-passing Network
(B) SABRE (ii) Hierarchical routing
(C) ARPANET (iii) NPL network
(D)ARCNET (iv) US Military Radar

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(c) (A) – (iv); (B) – (iii); (C) – (ii)- (D) – (i)
(d) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii)- (D) – (I)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 43.
Match the following:

(A)Yahoo (i) online providers
(B) gmail (ii) unauthorized access
(C) Hackers (iii) search Engine
(D) Flipkart (iv) mailing operations

(a) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(c) (A) – (ii); (B) – (iv); (C) – (i); (D) – (iii)
(d) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
Answer:
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)

Question 44.
Match the following:

(A) Communication (i) Reduce paper
(B) Resource sharing (ii) e – mail
(C) Data sharing (iii) PDA
(D) Money sharing (iv) Back up

(a) (A) – (ii); (B) – (iv); (C) – (i); (D) – (iii)
(b) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(c) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(d) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
Answer:
(c) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)

Question 45.
Match the following:

(A) Whatsapp (i) 2004
(B) Facebok (ii) 2002
(C) Twitter (iii) 2009
(D) Linkedln (iv) 2006

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (ii); (C) – (iv; (D) – (i)
(c) (A) – (ii); (B) – (iv); (C) – (i); (D) – (iii)
(d) (A) – (ii); (B) (i); (C) – (iii); (D) – (iv)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 46.
Choose incorrect pair:
(a) Network – sharing
(b) Internet – Network
(c) Wi-Fi – node
(d) IP addresses – Network addresses
Answer:
(c) Wi-Fi – node

Question 47.
Choose incorrect pair:
(a) Paul Baran – Packet switching
(b) WAN – Lawrence Roberts
(c) Ethernet – Robert metcalfe
(d) ARCNET – John Murphy
Answer:
(b) WAN – Lawrence Roberts

Question 48.
Choose the incorrect pair:
(a) Bing – Browser
(b) Facebook – Social web
(c) DDos1 Hacks
(d) MMS – Networks
Answer:
(d) MMS – Networks

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 49.
Choose the incorrect pair:
(a) 1G -1 GB / s
(b) 2G – 64 kb / s
(c) 3G – 2 mb / s
(d) 4G -100 mb / s
Answer:
(a) 1G -1 GB / s

Question 50.
Choose the incorrect pair:
(a) CCTV – Wired network
(b) Indoor cameras – Wireless network
(c) e-market – Online shopping
(d) mobile – Social Network
Answer:
(d) mobile – Social Network

Question 51.
Choose the correct pair:
(a) WWW – Accessing server
(b) Bluetooth – Server
(c) Network – Software
(d) Data – Server
Answer:
(a) WWW – Accessing server

Question 52.
Choose the correct pair:
(a) SABRE – Mainframe
(b) Packet switching – Reservation
(c) WAV – Resource sharing
(d) Arecnet – time sharing
Answer:
(a) SABRE – Mainframe

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 53.
Choose the correct pair:
(a) Cells – Wired Network
(b) Flame war – Abusive message
(c) Hosts – Service provider
(d) Malware – Hardware
Answer:
(c) Hosts – Service provider

Question 54.
Choose the correct pair:
(a) e-Govemance – online buying
(b) e-Banking – online certificate
(c) e-Readers – online purchase
(d) e-Waste – Unwanted electronic things
Answer:
(d) e-Waste – Unwanted electronic things

Question 55.
Choose the correct pair:
(a) Network – Resource
(b) Wi-Fi – Wireless Fidelity
(c) Blogging – virus
(d) Gmail – social media
Answer:
(b) Wi-Fi – Wireless Fidelity

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 56.
Choose the incorrect statement:
(a) Digital Audio is a shared resource in internet.
(b) A set of computers connected together is called network.
(c) Computer networking is a technique of digital telecommunications network.
(d) Computer which is connected to network called as nodes.
Answer:
(a) Digital Audio is a shared resource in internet.

Question 57.
Choose the incorrect statement:
(a) Artificial intelligence will help to maintain, manage, and protect mobile networks.
(b) DDoS (Distributed Denial of Service) attacks and attempted backs.
(c) Artificial network are difficulties faced by the service provider.
(d) Artificial intelligence able to be a better predict traffic as it collects and analyzes data in real time.
Answer:
(c) Artificial network are difficulties faced by the service provider.

Question 58.
Choose the incorrect statement:
(a) Connecting more than one device is called as network.
(b) The well-known networking for all is Internet.
(c) Now a days the internet plays a vital role.
(d) Snap deal is a type of network in early days.
Answer:
(d) Snap deal is a type of network in early days.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 59.
Choose the incorrect statement:
(a Vint cerf is called Internet founding father.
(b) Lawrence Roberts is considered one of the father of the Internet.
(c) SAGE method was used as private online reservation system.
(d) Packet switching was developed by Paul Baran.
Answer:
(c) SAGE method was used as private online reservation system.

Question 60.
Choose the incorrect statement:
(a) NPL (National Physical Laboratory) at United Kingdom local area network.
(b) Integalactic computer Network was developed by J.C. RLicklider.
(c) First Telephone switch was introduced by Western electric.
(d) WAN (Wide Area Network) at Newyork local area network.
Answer:
(d) WAN (Wide Area Network) at Newyork local area network.

Question 61.
Choose the correct statement.
(a) E-Govemance made easier to bought products from online service providers.
(b) E-Banking plays an important role only in Merchandising.
(c) Internet Explorer is a search engine.
(d) Youtube is a service provider.
Answer:
(c) Internet Explorer is a search engine.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 62.
Choose the correct statement:
(a) Hackers and viruses can easily theft our more valuable information.
(b) Facebook was created in 2006.
(c) The Internet does not allows all to be democratic in mass media.
(d) Any one can have a webpage in internet with very high investment.
Answer:
(a) Hackers and viruses can easily theft our more valuable information.

Question 63.
Choose the correct statement:
(a) Resource sharing means one device accessed by single system.
(b) PDA is used as Data sharing.
(c) Networks at home were connected in four ways.
(d) CCTV is a wired network system.
Answer:
(d) CCTV is a wired network system.

Question 64.
Choose the correct statement:
(a) Mobile network is the network connecting devices without cable.
(b) Computer knowledge is must to access the internet through mobile.
(c) Blogs is a service provider.
(d) Classmates is one of the browser.
Answer:
(a) Mobile network is the network connecting devices without cable.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 65.
Choose the correct statement:
(a) The corporate also uses internets.
(b) Cloud storage is storage in hard disk.
(c) Cloud computing is to share resources, software and information.
(d) Hosts is a internet browser.
Answer:
(c) Cloud computing is to share resources, software and information.

Question 66.
Assertion (A):
ARPANET is the Hierarchical routing after 1970’s internet today.
Reason (R):
First in 1969, four nodes of ARPANET were connected between four universities using 50 k bits / s circuit.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both A and R are True, and R is the correct explanation for A.

Question 67.
Assertion (A):
Online service provides are filpkart, amazon, snapdeal etc., to buy products via internet and have the product at door steps.
Reason (R):
E-Governance made easier to collect their certificates through online.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are True, but R is not the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 68.
Assertion (A):
Internet promotes as the universal source of information of billions of people, at work, at home, at school.
Reason (R):
Google drive is used on internet by surfing, searching unwanted things.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is True, but R is false.

Question 69.
Assertion (A):
Resource sharing means one device accessed by one system.
Reason (R):
Using computer networks, we can interact with the different people with each other at all over the world. .
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but Rjs false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Question 70.
Assertion (A):
Malware is a internet browser.
Reason (R):
Flame wars is called as virus.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 71.
Which one of the following protocol is not used in internet?
(a) HTTP
(b) DHCP
(c) DNS
(d) None
Answer:
(d) None

Question 72.
Internet works on:
(a) Packet switching
(b) Circuit switching
(c) Both (a) and (b)
(d) None of these
Answer:
(a) Packet switching

Question 73.
Which protocol assigns IP address to the client connected in the internet?
(a) DHCP
(b) IP
(c) RPC
(d) DNS
Answer:
(a) DHCP

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 74.
Bluetooth is the wireless technology for: ,
(a) Local Area Network
(b) Personal Area Network
(c) Both (a) and (b)
(d) None of these
Answer:
(b) Personal Area Network

Question 75.
An RPC (Remote Procedure Call) is initiated by the:
(a) server
(b) Client
(c) Both (a) and (b)
(d) None of these
Answer:
(b) Client

Question 76.
_______ allows LAN users to share computer program and data.
(a) Communication server
(b) Print server
(c) File server
(d) Network
Answer:
(c) File server

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 77.
TCP /IP is a:
(a) Network hardware
(b) Network software
(c) Protocol
(d) None of these
Answer:
(c) Protocol

Question 78.
_______ are hardware and software combinations that connect devices running different native protocol.
(a) Protocol
(b) Models
(c) Gateways
(d) Ports
Answer:
(c) Gateways

Question 79.
Which agency assign IPs?
(a) IEEE
(b) ANST
(c) ICANN
(d) BSNL
Answer:
(c) ICANN

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 80.
Which protocol is used for browsing website?
(a) TCP
(b) HTTP
(c) FTP
(d) TFTP
Answer:
(b) HTTP

Question 81.
Who was widely known as father of the Internet?
(a) Vint cerf
(b) Tim Berners Lee
(c) Robert E. Khan
(d) Lawrence Roberts
Answer:
(a) Vint cerf

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 82.
Who was founding father of the Internet?
(a) Vint cerf
(b) Tim Berners Lee
(c) Robert E. Khan
(d) Lawrence Roberts
Answer:
(d) Lawrence Roberts

Question 83.
A set of computers connecting together is called as:
(a) Network
(b) Server
(c) Hub
(d) Node
Answer:
(a) Network

Question 84.
Computer network devices that originates route and terminate the data were called as:
(a) Hub
(b) Resource
(c) Node
(d) Cable
Answer:
(c) Node

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 85.
Match the period and methods available on history of computer networking in the Internet:

(a)1950 (i) X.25 TCP/IP
(b) 1966 (ii) SAGE
(c) 1976 (iii) WAN
(d) 1972 (iv) ARCNET

(a) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(c) (A) – (D); (B) – (ii); (C) – (iii); (D) – (iv)
(d) (A) – (ii)); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(c) (A) – (D); (B) – (ii); (C) – (iii); (D) – (iv)

Question 86.
Western Electric introduced the first widely used ……………… that implemented true computer control.
(a) Packet switch
(b) Arpanet
(c) Host
(d) Telephone switch
Answer:
(d) Telephone switch

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 87.
Wi-Fi is short name for:
(a) Wireless Fidelity
(b) Wired Fidelity
(c) Wired Fiber optic
(d) Wireless Fiber optic
Answer:
(a) Wireless Fidelity

Question 88.
People everywhere can express and publish their ideas and opinions via:
(a) Tele-medicine
(b) blogging
(c) Server
(d) Node
Answer:
(b) blogging

Question 89.
Which one of the following periods, the speed capacity supported towards gigabit on computer network?
(a) SABRE
(b) SAGE
(c) NEW FIBRE OPTICS
(d) ARCNET
Answer:
(c) NEW FIBRE OPTICS

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 90.
One among them was challenging to the business people on computer networking:
(a) Hacking
(b) Viruses
(c) Both (a) and (b)
(d) none of this above
Answer:
(c) Both (a) and (b)

Question 91.
…………. able to predict, manage, and protect the computer network at Internet.
(a) Artificial intelligence
(b) Broadband provider
(c) Cloud computing
(d) Transceivers
Answer:
(a) Artificial intelligence

Question 92.
………… use less power comparing with single transmitter or satellite often cell towers nearer.
(a) Mobile devices
(b) Transistors
(c) WiFi
(d) Communication
Answer:
(a) Mobile devices

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 93.
People now a days getting relaxed via:
(a) Business
(b) Corporate company
(c) News papers
(d) Social media
Answer:
(d) Social media

Question 94.
Which one of the following is not the social media?
(a) Gmail
(b) Facebook
(c) Twitter
(d) Linkedin
Answer:
(a) Gmail

Question 95.
Facebook was created at year.
(a) 2002
(b) 2004
(c) 2013
(d) 2010
Answer:
(b) 2004

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 96.
In mobile network, land areas for network coverage was distributed as:
(a) Firmware
(b) cells
(c) Range
(d) Service
Answer:
(b) cells

Question 97.
Which one were harmful to computer?
(a) Bloggers
(b) Browser
(c) Hackers
(d) Twitter
Answer:
(c) Hackers

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 10 Introduction to Computer Networks

Question 98.
Which innovation made the people to use Internet?
(a) Social web
(b) Mobile technology
(c) Mobile App
(d) Both (a) and (b)
Answer:
(d) Both (a) and (b)

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 1.
What are buttons used in HTML Form controls?
Answer:
Buttons may contains submit button, Reset button and cancel button.

Question 2.
What is POST method?
Answer:
The input data sent to the server with POST method is stored in the request body of the client’s HTTP request.

Question 3.
What is GET method?
Answer:
The input data sent to the server with POST method via URL address is known as query string. All input data are visible by user after they clicks the submit button.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 4.
What are back-end application used in HTML?
Answer:
The back-end application are CGI. ASP script. ISP, PHP script etc.,

Question 5.
What purpose using ‘required’ attribute in HTML input tag?
Answer:
Before sending the data to serve side program, the programmer can write few validations from browser in the client machine. For this validation, we have to add additional ‘required’ attribute in HTML input tag.

Question 6.
How can we access the data sent through the URL with the GET method?
Answer:
To access the data sent via the GET method, we use $-GET array, that is $ variable = $_GET [“var”];

Question 7.
How can we access the data sent through the URL with the POST method?
Answer:
To access the data sent this way, you use the $_POST array, like this $_P.ast [“var”];

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 8.
How can we check the value of a given variable is a number?
Answer:
It is possible to use the dedicated function, is_numeric( ) to check, num or not.

Question 9.
How do I check if a given variable is empty?
Answer:
If we want to check whether a variable has a value or not, it is possible to use the empty () function.

Question 10.
What does $_SERVER mean?
Answer:
$_SERVER is an array including information created by the web server such as paths, headers, and script locations.

Question 11.
What does $_Files means?
Answer:
$_Files is an associate array composed of items sent to the current script via the HTTP POST method.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 12.
List the different tasks using files in PHP.
Answer:
Files are processed for different tasks using the following events:

  • PHP open a File
  • PHP read a File
  • PHP close a File
  • PHP write a File
  • PHP appending a file and
  • PHP uploading a file

Question 13.
Write a suitable example for client side validation.
Answer:
<input> required Attribute in HTML
<form action = “example.php”>
username:cinput type = “text”
name = “name” required>
<input type = “submit”>
</form>.
output like this:

TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files 1

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 14.
Write fwrite() function syntax with example in PhP.
Answer:
The write () function is used tb write to a file.
Syntax: fwrite (Smyfile.Stxt) ;
Eg:
<?PhP
$myfile = fopen (“new_school_file.txt, “w”)
or die (“unable to open file”) ;
$txt = “school’name\n”; fwrite (Smyfile, Stxt);
$txt = “student Name /n”;
fwrite (Smyfile, Stxt) ;
fclose. (Smyfile) ; >
?>

Question 15.
Write a PHP Basic form Handling script using HTML controls.
Answer:
<html>
<body>
cform action= “welcome.php” method= “post”> Name: <input type= “text” name= “name”><br> E-mail: <input type= “text” name= “email”xbr> <input type= “submit”>
</form>
</body>
</html>
Welcome.php:
<html>
<body>
Welcome <?php echo $_POST[“name”]; ?><br>
Your email address is: <?php echo $_POST[“email”]; ?> </body> .
</html>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 16.
Write the validation rules for HTML input field.
Answer:
Validation Rules for the HTML input field are .

  1. Name (Text Input) – It should be require letters and white spaces.
  2. E-mail (Text Input) – It should be require @ and strings.
  3. Website (Text Input) – Should require a valid URL.
  4. Radio – Must be selected minimum one value.
  5. Check box – Must be checkable minimum one value.
  6. Drop Down menu – Must be selectable minimum one value.

Question 17.
Write various parameters used in PHP appending a file.
Answer:
Syntax: file_put_contents (file, data, mode, context)
Here, file, data, mode, context are parameters ‘ File – specifies the file to write to. If the file does not exist, this function will create one. (Required)
data – The data to write to the file can be a string, an array or a data stream. (Required) mode – specifies how to open/write to the file possible values (optional)
context – specifies the context of the file handle.
Context is a set of options that can modify the behaviour of a stream.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 18.
Explain validation and its types in PHP.
Answer:
Validation is a process of checking the input data submitted by the user from client machine.
There are two types of validation available in PHP. They are
(i) Client-side validation:
The input data validations are performed on the client machine’s web browsers using client side scripts like java scripts or adding “required” attribute in HTML input tags.

(ii) Server-side validation:
After the submission of data, validations are performed on the server side-using the programming like PHP, ASP or JSPetc., available in the server machine.

The HTML input field validation are Name (Text input), E-mail (Text input),
Website (Text input), Radio, check box and Drop down menu.
In client-side validation, before sending the data to server side program (PHP) fee programmer can write few validations from browser in the client machine.

For this validation, we have to add additional “required” attribute in HTML input tag.

Question 19.
PHP form validation with example – Explain.
Answer:
In PHP form validation, contains various input fields: required and optional text fields, radio buttons, and a submit button.

TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files 2

The validation rules for the form above are as follows^ (field with rules)]
Name – Required, Must contain letters and white spaces.
E-mail – Required, must contain a valid email address (with @ and)
Website – Optional, multi-line input field (text area).
Gender – Required, must select one.
HTML code for the form.
Welcome <?php echo $_POST[“name”]; ?><br>
Your email address is: <?php echo $_POST[“email”]; ?>
</body>
</html>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 20.
Write the validation rules for HTML input field.
Answer:
Validation Rules for the HTML input field are

  1. Name (Text Input) – It should be require letters and white spaces.
  2. E-mail (Text Input) – It should be require @ and strings.
  3. Website (Text Input) – Should require a valid URL.
  4.  Radio – Must be selected minimum one value.
  5. Check box – Must be checkable minimum one value.
  6. Drop Down menu – Must be selectable minimum one value.

Question 21.
Write various parameters used in PHP appending a file.
Answer:
Syntax:
file_put_contents (file, data, mode, context)
Here, file, data, mode, context are parameters
File – specifies the file to write to. If the file does not exist, this function will create one. (Required)
data – The data to write to the file can be a string, an array or a data stream. (Required)
mode – specifies how to open/write to the file possible values (optional)
context – specifies the context of the file handle.
Context is a set of options that can modify the behaviour of a stream.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 22.
Explain validation and its types in PHP.
Answer:
Validation is a process of checking the input data submitted by the user from client machine.
There are two types of validation available in PHP.
They are
(i) Client-side validation:
The input data validations are performed on the client machine’s web browsers using client side scripts like java scripts or adding “required” attribute in HTML input tags.
Text fields:
The name, e-mail, and website fields are text input elements, and the comment field is a text area.
Name: <input type = “text”
name = “name”>
E-mail: <input type = “text”
name = “email”>
Website: <input type ‘= “text”
name= “website”>
comment: <text area name = “comment”
rows = “5” cols = “40” > </text area>

Radio Buttons:
Gender:
<input type = “radio” name = “gender”
value = “female” > female
<input type = “radio” name = “gender”
value = “male” > male
<input type = “radio” name = “gender”
value = “other” > other

Form element:
<form method = “post” action = “<?php
echo
html special chars ($_SERVER [“PHP_SELF”1); ? >”>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 23.
Define HTML form controls.
Answer:

  1. HTML form controls are to collect data from users.
  2. In the web development, users access website or web pages from remote client machine and feed the data to server.
  3. These data are collected via HTML form controls like textbox, drop down box and radio button etc.

Question 24.
Define for Form Handling method in PHP.
Answer:

  1. In PHP form Handling method, when the user keying the input data in HTML controls and clicks the submit button the request will be generated and reaches a PHP file which is mentioned in the FORM tag under the Action Attribute.
  2. The two PHP variables such as $_POST and $_GET collects the data and prepares the response accordingly.

Question 25.
What is Form Validation in PHP?
Answer:
PHP Form validation is a process of checking the input data submitted by the user from client machine.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 26.
List out HTML control to support PHP language.
Answer:
The following HTML control to support PHP Language are;

  1. Text inputs
  2. Radio box
  3. Buttons
  4. File select
  5. Check box
  6. Forming.

Question 27.
Write Syntax of Text box in HTML.
Answer:
Syntax:
<input type = “text”>
Eg:
<form>
First name: <br>
<input type = “text”
name = “First name”> <br>
Last name: <br>
<input type = “text”
name = “Last name”>
</form>

Question 28.
Define File handling in PHP.
Answer:
File handling is an important part of any web application. We often need to open and process a file for different tasks.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 29.
Define Browse button in HTML.
Answer:

  1. The button isn’t called the browse button, that’s just the name our browser gives for it.
  2. In a form, the file value of the type attribute allows we to define an input element for file uploads. This displays a browse button, which the user can click on to select a file on their local computer.

Question 30.
Write Syntax of Browse button in HTML.
Answer:
Syntax:
<input type = “file” name = “myfile”>
<input type ‘= “file”>
defines a file – select field and a Browse button for file uploads.
To define a file – select field allows multiple files to be selected, and the ‘multiple’ attribute.

Question 31.
Compare Text box and Text Area.
Answer:

Text box

 Text area

Text boxes are most common in Forms. Text area are larger versions of the text box.
Text boxes generally used for collecting information such names, email addresses, URLs, etc. Text area are generally used to gather feedback or comments.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 32.
Usage of File open function.
Answer:

  1. The Fopen ( ) function in PHP is an inbuilt function which is used to open a file or an URL.
  2. It is used to bind a resource to a steam using a specific filename.

Question 33.
Write the features Form Handling.
Answer:

  1. Forms are used to get data from the users.
  2. Forms are created using HTML Tags.
  3. Forms can be submitted to the server for processing using either Post or GET method.
  4. Forms values submitted via the POST method are encapsulated in the HTTP body.
  5. Forms values submitted via the GET method are appended and displayed in the URL.

Question 34.
Write the purpose GET method and POST method.
Answer:
Purpose of GET method:

  1. The variable names and values will be visible in URL, if HTML forms submitted by the GET method.
  2. The GET method data can be accessed using PHP Query-string environment variable.
  3. PHP$_GET associative array is used to access all the sent information by GET method.

Purpose of POST method:

  1. The POST method does not have any restriction on data size to be sent.
  2. The POST method c,an be used’ to send ASCII as well as binary data.
  3. PHP $_POST associative array is used to access all the sent information by POST method.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 35.
Differentiate GET and POST Method.
Answer:

Basis comparison GET method

 POST method

Purpose URL Body
Security Vulnerable, as present in plain text Safer than GET method.
Form data length Should be kept as minimum as possible. Could lie in any range.
Visibility Can be seen by anyone. Doesn’t display variable in URL.
Variable size Upto 2000 characters. Upto 8 Mb.

Question 36.
Write short notes on File handling.
Answer:
File handling starts with creating a file, reading its content, writing into a file to appending data into an existing file and finally closing the file.
PHP provides modes on file handling,
These are

TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files 3

File handling is an important activity of all web application development process.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 37.
Write short notes on File handling functions.
Answer:

  1. A file is a resource for storing data. PHP has a rich collection of built in functions that simplify working with files.
  2. fopen ( ) is a system function available in PHP. This function helps to open a file in the server. .
  3. fread ( ) function reads from an open file. The file object comes from fopen function. ,
  4. fclose( ) function is used to close an opened file. The file object comes . from fopen function.
  5. fwrite ( ) function is used to write to a file.

Question 38.
Explain Form Handling methods.
Answer:
(i) In PHP form Handling method, when the user keying the input data in HTML controls and clicks the submit button the request will be generated and reaches a PHP file which is mentioned in the FORM tag under the Action Attribute.
(ii) All input values are synchronized and sent to the server via POST method or GET method.
(iii) Method is an attribute form tag in HTML.
(iv) Once the data reaches the server, two PHP variable such as $_Post and $_GET collects the data and prepares the response accordingly.

POST method:
The input data sent to the server with POST method is stored in the request body of the clients HTTP request.

Syntax:
<? php
$POST [variable_name];
?>
Here,
$_Post {…] is the php array,
variable_name is the URL variable name.

GET method:
The input data sent to the server with POST method via URL address is known as query string. All input data are visible by user after they clicks the submit button.

Syntax:
<?php
$_GET [ ‘variable_name’];
?>
Here,
$_GET is the php array
Variable_name is the URL variable name.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 39.
Discuss in detail about HTML form controls.
Answer:
(i) An HTML form is a section of a document containing normal content, markup, special elements called controls.
(ii) Check boxes, radio buttons, menus etc., and labels are called Form controls.
(iii) A controls control Name is given” by its name attribute. The scope of the name attribute for a control within a FORM element is the FORM element.
(iv) Buttons may create three types that are submit buttons, Reset buttons and Push buttons.
(v) Several checkboxes in a form may control by the same control name. The INPUT element is used to create a checkbox control.
Radio buttons are like check boxes except that when several share the same… control name, they are mutually exclusive.
Menus offer users options from which to choose. The SELECT element creates a menu, in combination with the OPTGROUP and OPTION elements.
Text Input may creates two types, the INPUT element creates a single-line input control and the TEXTAREA element creates a multiline input control.

Question 40.
Explain the process File handling.
Answer:
File handling is an important activity of all web application development process.
Files are processed for different tasks using the following events.

(i) PHP open a File:
fopen( ) is a system function available in PHP. This function helps to open a file in the server. It contains two parameters one for the file and other one specifies in which mode the file should be opened (Read / write).
Syntax:
$file_object = fopen (“fil’ename”, “Read / Write mode”) or die (“Error message”);
Eg:
<?php
$myfile = fopen (“Student.txt”, “r”) or die
(“unable to open file”) ;
?>

(ii) PHP Read a file:
The fread( ) function reads from an open file. The file object comes from fopen function.
Syntax:
fread ($file_object, filesize (“Fileneme”));
Eg:
<?php
fread ($myfile, file size (“student.txt”));
?>

(iii) PHP close file:
The fclose ( ) function is used to close an opened file. The file object comes from fopen function.
Syntax:
fclose ($file_object);
Eg:
<?php
//Some code to be executed…
fclose ($myfile);
?>

(iv) PHP write a File:
The write ( ) function is used to write to a file.
Syntax:
fwrite (Smyfile, Stxt);
Eg:
<?PhP
//some code to be executed…
fwrite ($myfile, $txt) ;
?>

(v) PhP Appending a file:
The file_put_contents( ) function is used to append to a file.
Syntax:
file_put_co‘ntents (file, data, mode, context);
Eg:
<?php
$tx = “student_id”;
Smyfile = file_put_contents (“logs.txt”, $txt,
PHP_EoL, FILE_APPEND | LOCK_Ex);

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 41.
Explain concepts of HTTP Uploading process.
Answer:
(i) Concepts of HTTP uploading process is the best feature to select one file from the local machine to server machine.
(ii) Form tag is used to mention a method as POST or GET and encrypt attribute mentioned as “multipart / form- data”.
(iii) In the <Input>tag mention type = “file” attribute shows the input field as a file-select control, with a “Browse” button next to the input control.
(iv) In server machine “PhP.ini” file, search for the fileuploads directive, and set it to on: “file uploads – on”
(v) After submitting the upload button the request reaches to PhP file. .
(vi) In the file $_Files variable collects all uploaded file information such as name of the file, size of the file, and extension of the file etc.,
(vii) All the details are checker thoroughly and the errors are saved in an array variable.
(viii) The file finally moves under the image directory if the array error • variable is empty.
Eg:
<form action = “student_photo_upload.PhP
“method = “Post” enctype = “multipart / form-data”>
<input type + “file name” – file tc upload” id = “file to upioad”>
<input type = “submit” value = “upload image” name = “submit”>
</form>

Question 42.
Explain in detail of File handling functions.
Answer:
A file is a resource for storing data. PHP has a rich collection of built in functions that simplify working with files.
For refer Part IVquestion no.3 ((i) to (v) points)

Question 43.
Create simple student Login Form to validate username and password using java script (client side validation).
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files 4

HTML file: Javascript_login.html <html>
<head>
<title> Javascript Login Form Validation </title>
<link rel=”stylesheet” href= “css/style.css”/>
<script src = “js / login.js”> </script>
</head>
<body>
<div class= “container”>
<div class= “main”>
<h2> Javascript Login forirt validation </h2>
<form id= “form_id” method = “Post” name= “My form”>
<label>user Name: </label>
<input type=”text” name=”user name” id= “user name”/> <label> password: </labei>
<input type = “password” name = “password” id =”password”/>
<input type = “button”- value = “login” id = “submit” onclick = “validate ()”/>
</form>
<span> <b class = “note”>Note: c/b> c/div>
</div>
</body>
</html>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 44.
Create simple student registration form to inert students details like Student Name, username and password etc. using java script (client side validation).
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files 5

Form creation using HTML code, then using on submit function Java Script.
<!DOCTYPE html>
<html>
<head>
<title> Java Script Form or registration form </title>
<link rel= ‘stylesheet’ href = ‘js-form-validation.css’ type = ||text /css’/>
<script src = “sample_registration.js”>
</script>
</head>
<body on load = “document.registration. userid.focus();”>
<h1> Registration Form </h1>
<UL>
<li> <label for “userid”>userid: </labelx/li>
<li> <input type= “userid”> size = “12”/></li>
<li> <label for = “passid”> password: </label> </li>
<li> <input type = “password” name = “passid” size = “12”/> </li>
<li> <label for = “username”> name:</labe1></li>
<li> <input type = “text”name = “username” size = “50”/> </li> .
<li> <label for =”email”> Email: </label> </li>
<li> <input type =”text” name= “email” size = “50”/> </li>
<li> <input type = “submit” name = “submit” value = “submit”/> </li>
</UL>
</form>
</body>
</html>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Choose the correct answer:

Question 1.
The file size ( ) function returns the file size in:
(a) bits
(b) bytes
(c) kilobytes
(d) giga bytes
Answer:
(b) bytes

Question 2.
Which one of the following PHP function is used to determine a file’s last access time?
(a) fileltime( )
(b) filectime( )
(c) fileatime( )
(d) filetime( )
Answer:
(c) fileatime( )

Question 3.
Which one of the following function is capable of reading a file into an array?
(a) file( )
(b) arrfile( )
(c) arr_file( )
(d) file_arr( )
Answer:
(a) file( )

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 4.
Which one of the following function is capable of reading a file into a string variable?
(a) file_contents( )
(b) file_get_contents( )
(c) file_content( )
(d) file_get_content( )
Answer:
(b) file_get_contents( )

Question 5.
Which one of the following function is capable of reading a specific number of characters from a file?
(a) fgets( )
(b) fget ( )
(c) fileget( )
(d) filegets( )
Answer:
(a) fgets( )

Question 6.
Which one of the following function operates similarly to fgets()?
(a) fgetsh( )
(b) fgetsp()
(c) fgetsa( )
(d) fgetss( )
Answer:
(d) fgetss( )

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 7.
Which one of the following function outputs the contents of a string variable to the specified resource?
(a) filewrite( )
(b) fwrite( )
(c) filewrites( )
(d) fwrites( )
Answer:
(b) fwrite( )

Question 8.
Which function sets the file filename last-modified and last-accessed times?
(a) sets ( )
(b) set ( )
(c) touch ( )
(d) touched ( )
Answer:
(c) touch ( )

Question 9.
Which of the following are HTML form controls?
(a) text box
(b) drop down box
(c) radio button
(d) all of these
Answer:
(d) all of these

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 10.
Which control contain text inputs?
(a) text box
(b) text area
(c) both (a) and (b)
(d) drop down box
Answer:
(c) both (a) and (b)

Question 11.
Which selects more than one value from the HTML form?
(a) text box
(b) check box
(c) drop down box
(d) text area
Answer:
(b) check box

Question 12.
Radio box is similar to:
(a) check box
(b) text box
(c) drop down box
(d) text area
Answer:
(a) check box

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 13.
PHP file which is mentioned in the Form tag under the:
(a) Action Attribute
(b) POST
(c) GET
(d) FORM
Answer:
(a) Action Attribute

Question 14.
Which is attribute form tag in HTML?
(a) Attribute
(b) Method
(c) FORM
(d) Variable
Answer:
(b) Method

Question 15.
Which method is stored in the request body of the client’s HTTP request?
(a) Attribute
(b) FORM
(c) POST
(d) GET
Answer:
(c) POST

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 16.
Which method known as query string via URL address?
(a) Attribute
(b) FORM
(c) POST
(d) GET
Answer:
(d) GET

Question 17.
Which is a process of checking the input data submitted by the user from client machine?
(a) browser
(b) validation
(c) client
(d) server
Answer:
(b) validation

Question 18.
How many types of validation available in PHP?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 19.
Which type of validation is input data validation?
(a) Client-side
(b) Server-side
(c) Attribute
(d) Required
Answer:
(a) Client-side

Question 20.
Which one of attribute in HTML input tags using client side scripts?
(a) Action
(b) Required
(c) Server
(d) Client
Answer:
(b) Required

Question 21.
Which one of the following is client side scripts?
(a) PHP
(b) ASP
(c) JSP
(d) Java scripts
Answer:
(d) Java scripts

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 22.
Which one of the following is server side scripts?
(a) PHP
(b) Java scripts
(c) Web server
(d) Mail server
Answer:
(a) PHP

Question 23.
Choose one of the following it to a back end application.
(a) ASP
(b) Web server
(c) Mail server
(d) Web browser
Answer:
(a) ASP

Question 24.
Which is an important activity of all web application development process?
(a) Browsing
(b) Validations
(c) Activities
(d) File handling
Answer:
(d) File handling

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 25.
Which PHP function helps to open a file in the server?
(a) fread( )
(b) fopen( )
(c) fclose( )
(d) fappend( )
Answer:
(b) fopen( )

Question 26.
Which PHP function reads from an open file?
(a) fread( )
(b) fopen( )
(c) fclose( )
(d) fappend( )
Answer:
(a) fread( )

Question 27.
Which PHP function is used to Append to a file?
(a) fappend( )
(b) file_put_contents( )
(c) fread( )
(d) fopen( )
Answer:
(b) file_put_contents( )

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 28.
Which is the best feature to select one file from the local machine to server machine?
(a) fappend
(b) fread( )
(c) file upload
(d) append to a file
Answer:
(c) file upload

Question 29.
AJAX meAnswer:
(a) Asynchronous Javascript And XML
(b) ASP Javascript And XML
(c) Assembly Javascript And XML
(d) ASP JPEG And XML
Answer:
(a) Asynchronous Javascript And XML

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 30.
Which attribute action backend script ready to process your passed data?
(a) Required
(b) Action
(c) Form
(d) File
Answer:
(c) Form

Question 31.
Match the following:

(A) Text input (i) check box
(B) Radio box (ii) text box
(C) POST method (iii) Submit button
(D) GET method (iv) HTTP request

(a) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iv);, (B) – (i); (C) – (ii); (D) – (iii)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 32.
Match the following:

(A) fopen( ) (i) write a file
(B) fread( ) (ii) close on opened file
(C) fclose( ) (iii) reads open a file
(D) fwrite( ) (iv) open a file

(a) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)
(b) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 33.
Match the following:

(A) “x” (i) opens a file write only
(B) “w” (ii) file opened read only
(C) “r” (iii) open file read and write
(D) “w” (iv) new file created write only

(a) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)
(b) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(c) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(d) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
Answer:
(a) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)

Question 34.
Choose the incorrect pair.
(a) Reset – button
(b) Text area – text inputs
(c) Radio box – check box
(d) Post – file name
Answer:
(d) Post – file name

Question 35.
Choose the correct pair.
(a) Text input – email
(b) Website – URL
(c) CGL – OS
(d) PHP – data type
Answer:
(b) Website – URL

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 36.
Choose the incorrect statement:
(a) Radio box is similar to check box.
(b) File select is the best feature to select one file from the local machine.
(c) Check box is the important feature which select only one value from the HTML form.
(d) Form tag is used to mention a method POST or GET.
Answer:
(c) Check box is the important feature which select only one value from the HTML form.

Question 37.
Choose the incorrect statement:
(a) A Appending a file parameter required, specifies the file to write to.
(b) A data parameter required, the data read from the user.
(c) The parameter mode optional, specifies how to open / write to the file possible values
(d) Context is a set of options that can modify the behaviour of a stream.
Answer:
(b) A data parameter required, the data read from the user.

Question 38.
Choose the correct statement:
(a) HTML is a scientific programming language. .
(b) A PHP script can’t be used with HTML form.
(c) File handling is an important part of any web application.
(d) The input data validations are performed on the server side programming.
Answer:
(c) File handling is an important part of any web application.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 39.
Assertion (A):
Validation is a process of checking the input data submitted by the user from client machine.
Reason (R):
There are two types of validation in PHP. They are client-side validation, and server side validation.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is die not correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Question 40.
Pick the odd one out.
(a) PHP
(b) ASP
(c) POST
(d) JSP
Answer:
(c) POST

Question 41.
When you use the $_GET variable to collect data, the data is visible to:
(a) none
(b) only you
(c) everyone
(d) selected few
Answer:
(c) everyone

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 42.
Which one of the following should not be used while sending passwords or other sensitive information?
(a) GET
(b) POST
(c) REQUEST
(d) NEXT
Answer:
(a) GET

Question 43.
Which directive determines whether PHP scripts on the server can accept file uploads?
(a) file_uploads
(b) file_upload
(c) file_input
(d) file_intake
Answer:
(a) file_uploads

Question 44.
In HTML form <input type=”text”> is used for:
(a) One line text
(b) Block of text
(c) One paragraph
(d) None
Answer:
(a) One line text

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 45.
HTML classes that is already defined and allow us to apply styles on it are . called as:
(a) Pseudo classes
(b) Css classes
(c) Javascript classes
(d) None
Answer:
(b) Css classes

Question 46.
If you would like to read a file character by character which function do you use?
(a) fopen ( )
(b) fread ( )
(c) fgetc ( )
(d) file ( )
Answer:
(c) fgetc ( )

Question 47.
PHP is a typed language.
(a) User
(b) Loosely
(c) Server
(d) System
Answer:
(c) Server

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 48.
What does fopen( ) function do in PHP?
(a) It used to open files in PHP
(b) It used to open Remote Server
(c) It used to open folders in PHP
(d) It used to open Remote Computer
Answer:
(a) It used to open files in PHP

Question 49.
How PHP files can be accessed?
(a) Through Web Browser
(b) Through HTML files
(c) Through Web Server
(d) All of Above
Answer:
(d) All of Above

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 8 Forms and Files

Question 50.
Which of the following functions reads the entire contents of a file?
(a) fgets( )
(b) file_get_contents( )
(c) fread( )
(d) readfile( )
Answer:
(b) file_get_contents( )

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 1.
What is the feature in Relational Database Management System (RDMS)?
Answer:
Data is important to all computer and Internet related applications. Numerous growths of data need a secure and convenient environment to store and manipulate autonomously.

Question 2.
List some Relational Database Management System (RDMS) software.
Answer:
The Relational Database Management Systems are MySQL, Oracle, IBMDB2, and Microsoft SQLSERVER etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 3.
Write the major operations perform by SQL.
Answer:
The databases are connected with programming language and perform the major operations like INSERT, SELECT, UPDATE and DELETE using SQL.

Question 4.
What are way covers database connectivity?
Answer:
The database language connectivity, which covers database connection establishment, Database selection, SQL statement execution, and connection termination.

Question 5.
Write the syntax of Mysqli_connect() function.
Answer:
Syntax:
mysqli_connect .(“servername”, “username”, “password”, “DBName”);
where,
Server name – Database server IP address.
User name – Database server Username.
Password – Database server Password.
DB Name – Database Name.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 6.
Define Queries.
Answer:

  • The main goal of MySQL and PHP connectivity is to retrieve and ’ manipulate the data from MySQL database server.
  • The SQL query statements are helping with MySQL extension to achieve the objective of MySQL and PHP connection.

Question 7.
What is RAD (Rapid Application Development)?
Answer:
PHP has also attracted the development of many software frame works that provide building blocks and a design structure to promote Rapid Application Development (RAD).

Question 8.
List some Frameworks software.
Answer:
Some Frameworks software are PRADO, Cake PHP, Symfony, Code Igniter, Laravel, Yii framework, Phalcon and Zend Framework.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 9.
What is HiPHOP’s HPHP’c?
Answer:

  • The HiPHOP’s HPHP’c, which help to convert PHP code into C+ programming code.
  • Facebook also written alternative version of PHP that is HiPHOP’ HPHP’c.

Question 10.
How be the result set of Mysqli handled in PHP?
Answer:
The result set can be handled using
mysqli_fetch_array,
mysqli_fetch_assoc,
mysqli_fetch_object (or) mysqli_fetch_row.

Question 11.
How is it possible to know the number of rows returned in the result set?
Answer:
The function mysqli_num_rows() returns the number of rows in a result set.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 12.
Which function gives us the number of affected entries by a query?
Answer:
mysqli_affected_rows( ) return the number of entries affected by an SQL query.

Question 13.
What is the difference between mysqli_fetch_object() and mysqli_fetch_ array()?
Answer:

  • The mysqli fetch_object( ) function collects the first single matching record.
  • But mysqli_fetch_array() collects all matching records from the table in an array.

Question 14.
Will a comparison of an integer 12 and a string “12” work in PHP?
Answer:
12 and “12” can be compared in PHP since it casts everything to the integer type.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 15.
What is server?
Answer:
A server is a computer or a device that provides functionality for other programs or devices called clients. This architecture is called the client- server model, and a single overall computation is distributed across multiple processes or devices.

Question 16.
Write definition and usage of die( ) function in PHP.
Answer:
(i) The die( ) function prints a message and exits the current script.
(ii) This function is an alias of the exit( ) function, syntax: die (message)
Where,
Message – Required, specifies the message or status number to write before exiting the script. The status number will not be written to the output.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 17.
What does arrow operator (=>) mean in PHP?
Answer:

  1. The arrow operator (=>), is used as an access mechanism for arrays.
  2. This means that what is on the left side of it will have a corresponding value of what is on the right side of it in array context.
  3. The object operator (->) is used in object scope to access methods and properties of an object.

Question 18.
Write a program, the SQL querry retrieve two records from student tabfe in school database and populated into client browser using PHP scripting language.
Answer:
<?php
$servername = “localhost”;
$username = “username”;
$password = “password”;
$dbname = “school_DB”;
$connection = mysqli_connect(‘$servername’, ‘$username’, ‘$password’, ‘$dbname’); if (mysqli_connect_errno())
{
echo “Failed to connect to MySQL:” . mysqli_connect_
error();
}
sql_stmt = “SELECT * FROM my_contacts”; //SQL select query
$result = mysqli_query($connection,$sql_stmt);//execute SQL statement$rows = mysqli_num_rows (Sresult);
// get number of rows returned ‘ if (Srows) { . .
while ($row = mysql.i_fetch_array (Sresult) ) {
{
echo ‘ID:’ . $row[‘id’] . ‘<br>’;.
echo ‘Full Names:’ . $row[‘full_names’] . ‘<br>’;
echo ‘Gender:’ . $row[‘gender’] . ‘<br>’;
echo ‘Contact No:’ . $row[‘contact_no’] . ‘<br>’;
echo ‘Email:1 . $row[’email’] . ‘<br>’;
echo ‘City:’ . $row[‘city’] . ‘<br>’;
echo ‘Country:’ . $row[‘country’1 . ‘<br><br>’;
}
}
mysqli_close(Sconnection); //close the database connection
?>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 19.
What are the MySQLi function available PHP?
Answer:
PHP MySQLi functions are MySQli_query, MySQli_connect, MySQli_ fetch_array and MySQli_close.

Question 20.
What is MySQLi function?
Answer:
MySQLi function is a relational database driver used in the PHP scripting language to provide an interface with MySQL databases.

Question 21.
What are the types MySQLi function available PHP?
Answer:
The types of MySQLi Function in PHP are MySQli connect ( ) function, MySQlicIoseQ function, MySQliselectdb ( ) function, MySQli_affected_ rows( ) function, MySQIiconnecterror( ) function, MySQli_fetch_assoc( ) function etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 22.
Difference between Connection and Close function.
Answer:

Connection

 Close

Before accessing MySQL database, connect to database server machine via PHP scripting language using MySQli_connect () functions. MySQli_clos( ) function is used to close an existing opened database connection between PHP scripting and MySQL database server.
Syntax:  $conn = mysqli_connect($ servername, $username, $password, $DB_name); Syntax: MySQli_close (“Connection Object”);

Question 23.
Give few examples of MySQLi Quries.
Answer:
MySQLi Quries are SELECT, SHOW, DESCRIBE, FROM, EXPLAIN, etc.,

Question 24.
What is Connection string?
Answer:

  1. In computing, a connection string is a string that specifies information about a data source and the means of connecting to it.
  2. It is passed in code to an underlying driver or provider in order to initiate the connection.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 25.
What is web Database?
Answer:

  1. A web database is a wide term for managing data online.
  2. A web database is a database application designed to be managed and accessed through the internet.

Question 26.
What is mysqli_fetch_assoc( ) Function?
Answer:
The mysqli_fetch_assoc( ) function fetches a result row as an associative array. .
Syntax: The mysqli_fetch_assoc (result) ;
where,
result – Required, specifies a result set identifier returned by mysqli_query( ).

Question 27.
Define mysqli_connect_error() Function.
Answer:

  • The mysqli_connect_error( ) function returns the error description from the last connection error.
  • Syntax: mysqli_connect_error ( ) ;
  • Return value – Returns a string that describes the error. NULL if no error occurred.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 28.
Define mysqli_affected_rows( ) Function.
Answer:
The mysqli_affected_rows( ) function returns the number of affected rows in the previous SELECT, INSERT, UPDATE, REPLACE, or DELETE query.
Syntax: mysqli_affected_rows (connection) ;
where,
connection – Requried. Specifies the MySQL connection to use.

Question 29.
Write the Syntax for MySQLi Queries.
Answer:

  • Syntax: mysqli_query (“Connection Object”, “SQL Query”) Where,
  • Connection Object – Required. Specifies the MySQL connection to use.
  • SQL Query – Required. Specifies the query string.

Question 30.
Write the purpose of MySQLi function available.
Answer:

  1. MySQLi function, returns an object to use with the mysqli_real_connect( ) function.
  2. MySQLi function asks to the server to kill MySQLi thread specified by the Processed Parameter.
  3. This function checks if there are more results from a multi query.
  4. It used to separate the queries with a semicolon against the database.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 31.
Differentiate mysqli_affected_rows( ) Function and mysqli_fetch_assoc( ) Function.
Answer:

mysqli_affected_rows( )

 mysqli_fetch_assoc( )

The mysqli_affected_rows( ) function returns the number of affected rows in the previous SELECT, INSERT, UPDATE, REPLACE or DELETE query. The mysqli_fetch_assoc() function fetches a result rows as an associative array.
Return values: An integer greater than zero indicates the number of rows affected or retrieved. Returns an associative array of strings representing fetched row.
-1 indicates that the query returned an error. NULL if there are no more rows in result set.

Question 32.
Write MySQL Connection Syntax with example.
Answer:
The MySQL connection syntax:
mysqli_connect(“server Name”, “UserName”, “Password”, “DB Name”);
Where,
Server Name – Optional. Specifies a host name or an IP address.
User Name – Optional. Specifies the MySQL username.
Password Name – Optional. Specifies the MySQL password name. DB Name – Optional. Specifies the default database to be used.
Eg:
<?php –
Scon = mysqli_connect(“localhost”, “my_user”, “my-password”, “my-db”);
//check connection if (mysqli_connect_errno( ))
{
echo “Failed to connect to MySQL:”
Mysqli_connect_error ( ) ;
}
?>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 33.
Write a note PHP MySQL database connection.
Answer:
PHP MySQL database connection to connect database server machine.
To connect PHP MySQL database, steps are follows:

  1. Create database, Now return to the homepage of php myadmin.
  2. Create a folder in htdocs.
  3. Create a database connection File in PHP.
  4. Create new PHP file to check our database connection.
  5. Run it.
  6. Create Database connection.
  7. MySQLi procedural query.
  8. Connect MySQL database with PHP using PDO.

Question 34.
Discuss in detail about MySQL functions with example.
Answer:
MySQL has many built-in functions. It contains string, numeric, date, and some advanced functions in MySQL.

(i) Some MySQL string functions:

(a) ASCII – Returns the ASCII values for the specific character
Syntax: ASCII (character)
Eg:ASCII (Customer Name)

(b) Replace – Replace all occurences of a substring within a string, with a new substring.
Syntax: REPLACE (string, form_string, new_ string) ; Eg:select replace (“SQL NEW”, “SQL”, “HTML”);

(c) REVERSE – Reverse a string and returns the result.
Syntax: REVERSE (string) .
Eg: SELECT REVERSE (“RAMAN”);

(ii) MySQL numeric functions:

(a) AVG – Returns the average value of an expression.
Syntax: AVG (expression)
Eg: AVG (Price);

(b) COUNT – Returns the number of records returned by a selected query.
Syntax: COUNT (expression)
Eg: COUNT (Product ID) ;

(c) MOD – Returns the remainder of a number of divided by another number.
Syntax: MOD (x, y)
Eg: MOD (16, 4) ;

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 35.
Explain the Database error handling and management process in PHP.
Answer:
Error handling is the process of catching errors raised by our program and then taking appropriate action. If we would handle errors properly then it may lead to many unforeseen consequences. Its very simple in PHP to handle errors.
Using die ( ) function:
While writing your PHP program you should check all possible error condition before going ahead and take appropriate action when required.
Eg:
<?php
if (!file_exists (“/tmp/test. txt”) )
{
die (“file not found”);
}
else{
$file=fopen (“/tmp/test. txt”, “r”) ;
Print “opend file successfully”;
)
?>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 36.
Defining custom error handling process.
Answer:
This function must be able to handle a minimum of two parameters (error level and error message) but can accept upto five parameters.
Syntax: error_function(error_level, error_message, error_file, error_line,error_context) ;

Error Report Levels:
These error report levels are the different types of error the user – defined error handler can be used for EWARNING, ENOTICE, EUSERERROR, E_USER WARNING, EUSERNOTICE, E_RECOVERABLE_ERROR,-E_ALL etc.,
Error Logging – By default, PHP sends an error log to the server’s logging system or a file.

Send an Error Message by E-mail: We will send an E-mail with an error message and end the script, if a specific errors occurs.

Question 37.
Explain in details types of MySQL connection method in PHP.
Answer:
PHP program, which will explain how to connect from your PHP to MYSQ1 database.

  • Connect using mysqli extension.
  • Connect using PDO.
  • Connect using traditional legacy MYSQl_functions.

(i) Connect from PHP using mysqli extension:
Cent os, php MySQli is already part of the php mysql package.
Create the following mysqli. php file under the Apache Document Root:
<?php
$conn = new mysqli (“localhost”, “root”, “DB pass”, “stuff”); .
mysqli – This function will initiate a new connection using MySQli extension. This function will take four arguments.
(a) hostname where the MySQl database is running.
(b) MySQl username to connect.
(c) Password for the MySQl user.
(d) MySQl database to connect.

(ii) Connect from PHP MySQL PDO extension:
PDO_MySQL drive implements the PDO interface provided by PHP to connect from your PHP program to MySQL database.
Create the following MySQl_pdo.php file under our Apache document Root:
<?php
$conn = new PDO (“mysql: host = localhost: dbname=stuff”, “root”, “DBPass”) ;
$conn set Attribute (PDO:: ATTR_ERRMODE, PDO:: ERRMODE_EXCEPTION);

• New PDO – This will create a new PDO object. The Three arguments are.
(a) MySQl connect string.
(b) MySQl username to connect.
(c) Password for the MySQl user.

(iii) Connect from PHP using legacy mysql_function:
Use this method only if we are using an older version of PHP and cannot upgrade it to the new version.
Create the following mysql legacy. php file under the Apache (isset($_POST [‘reg_user’]))

<?php
$Conn = mysql_connect (‘localhost’, ‘root’, ‘DB Pass’ ) ; mysql_select_db (“stuff”) ;
mysql_connect function takes three arguments.
(a) Hostname where the MySQL database is running.
(b) MySQl username to connect.
(c) Password for the MySQl user.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 38.
Explain MySQLi Queries with examples.
Answer:
mysqli_query( ) is the function that executes the MySQLi queries.
Squery is the SQL query to be executed. Slinkidentifier is optional, it can be used to pass in the server connection link.
MySQLi function can be used to execute the following query type:
• INSERT, SELECT, UPDATE, DELETE.
Syntax: <?php
mysqli_query(“Connection Object”, “Query”)
where,
Mysqli_query – is the function that executes the SQL queries.
Query – is the SQL query to be executed.
Connection object – used to pass in the server link.
Eg:
$con = mysqli_connect (“localhost”, “my_user”, “my_password”, “student_DB”) ;
$sql = “select student_name, student_age FROM .
student”; MySQli_query (Scon, $sql)

Question 39.
Create simple student Login Form to validate username and password using PHP and MySQL (Server side validation).
Answer:
Server, php
<?php
Session_start();
// initializing variables
Susername = ” “;
Serrors = Array();
//connect to the database
$db = mysqli_connect (‘localhost’, ‘root’, ‘ ‘registration’);
//Register user
if (isset ($_POST [‘reg_user’])}
{
//receive all input values from the form
$username = mysqli_real_escape_string($db, $POST[‘username’]);
$password_1 = mysqli_real_escape_string($db, $POST[‘password_1’]);
$password_2 = mysqli_real_escape_string($db, $POST[‘password_2’]);
//form validation
if(empty($username))
{array_push($errors, “username is required”);}
if(empty($password_1))
{array_push($errors, “password is required”);}
if ($password_1 = $password_2) ‘
{array_push ($errors, “The two passwords do not match”) ; }
//First check the database to make sure
$user_check_query = “SELECT*FROM users WHERE
username = ‘$username’ ;
$result = mysqli_query($db, $user_check_query);
$user = mysqli_fetch_assoc($result);
if ($user)
{
if($user)[‘user name’]=== $username)
{
{array_push($errors, “Username already exists”);
}
}
//Register user if there are no errors in the form
if (count ($errors)==0)
{
$password = md5($password_1);
$query = “INSERT INTO users (username, password) VALUES( ‘$username’, ‘$password’) “;
mysqli_query($db, $query);
$_SESSION[‘username’] = $username
$_SESSI0N[‘success’] = “we are now logged in”;
header(‘location:index.PhP’ ) ;
}
}
//. . .

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 40.
Create simple student registration form to insert students details like Student Name, username and password etc. Using PHP and MySQL (Server side validation).
Answer:
//student Registration form code-server side program using php .
<?php
require(‘db.php’);
//Form submited Insert values
If(isset($_REQUEST[‘username’]))
{
$username = mysqli_real_escape_string($con, $username);
$email = stripslashes ($_REQUEST[’email’]);
$email = mysqli_real_escape_string($con, $email);
$password = stripslashes($_REQUEST[‘Password’]);
$password = mysqli_real_escape_string($con, $password);
$Dob = date(“y-m-d H:i:s”);
$query = insert into ‘student’ (username, password email, Dob)
Values (’$username’ , ‘” .md5 ($password) , ‘$email’, ($dob’)
Sresult = mysqli_query($con, $query); if($result)
{
echo “<div class form’>
<h3> you are registered successfully </h3>
<br/>click here to <a href = ‘login.php’> Login</a> </div>”;
}
}
else
{
?>
<div class = “form”>
<h1> Registration </h1>
<form name = “registration” action = ” ” method = “POST”>
<input type = “text” name = “username” placeholder = “Username” required/>
<input type> = “email” name = “email” placeholder = “Email” required/>
<input type = “password” name = “password” placeholder = “password” required/>
<input type = “DOB” name = “Date of Birth” Placeholder = “DOB” required/>
<input type = “submit” name = “submit” value = “Register”/>
</form>
</div>
<?php
}
?>
</body>
</html>

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Choose the correct answer:

Question 1.
Which one of the following databases has PHP supported almost since the beginning?
(a) Oracle
(b) SQL
(c) SQL+
(d) MYSQL
Answer:
(d) MYSQL

Question 2.
If there is no error, then what will the error () method return?
(a) true
(b) false
(c) empty string
(d) zero
Answer:
(c) empty string

Question 3.
Which method returns the error code generated from the execution of the last MySQL function?
(a) ermo( )
(d) ermumber( )
(c) erromo( )
(d) erromumber( )
Answer:
(a) ermo( )

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 4.
Which one of the following statements can be used to select the database?
(a) $mysqli = select db (‘databasename’);
(b) mysqli = select_db (‘databasename’);
(c) mysqli → select db (‘databasename’);
(d) $mysqli → select_db (‘databasename’);
Answer:
(d) $mysqli → select_db (‘databasename’);

Question 5.
Which one of the following methods can be used to diagnose and display information about a MySQL connection error?
(a) connect_error( )
(b) connect_ermo( )
(c) mysqli_connect_errono( )
(d) mysqli_connect_error( )
Answer:
(c) mysqli_connect_errono( )

Question 6.
Which method retrieves each row from the prepared statement result and . assigns the fields to the bound results?
(a) get_row( )
(b) fetch_row( )
(c) fetch( )
(d) row( )
Answer:
(c) fetch( )

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 7.
Which one of the method is used to retrieve the number of rows affected by an INSERT, UPDATE, or DELETE query?
(a) num_rows( )
(b) affected_rows( )
(c) changed_rows( )
(d) new_row( )
Answer:
(b) affected_rows( )

Question 8.
Which of the methods are used to manage result sets using both associative and indexed arrays?
(a) get_array( ) and get_row( )
(b) get_array( ) and get_column( )
(c) fetch_array( ) and fetch_row( )
(d) fetch_array( ) and fetch_column( )
Answer:
(c) fetch_array( ) and fetch_row( )

Question 9.
Which one of the following methods recuperates any memory consumed by a result set?
(a) destroy( )
(b) remover( )
(c) alloc( )
(d) free( )
Answer:
(d) free( )

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 10.
Which one of the following methods is responsible for sending the query to the database?
(a) query( )
(b) sendquery( )
(c) sendquery( )
(d) querysend( )
Answer:
(a) query( )

Question 11.
The updated MySQL extension released with PH5 is typically referred to as:
(a) MYSQL
(b) MYSQLe
(c) MYSQli
(d) MYSAly
Answer:
(c) MYSQli

Question 12.
Which one of the following lines need to be uncommented or added in the php.ini file so as to enable mysqli extension?
(a) extension = php_mysqli.dll
(b) extension = mysql.dll
(c) extension = php mysqli.dl
(d) extension = mysqli.dl
Answer:
(a) extension = php_mysqli.dll

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 13.
In which version of PHP was MySQL Native Driver (mysqlnd) introduced?
(a) PHP 5.0
(b) PHP 5.1
(c) PHP 5.2
(d) PHP 5.3
Answer:
(d) PHP 5.3

Question 14.
Which one of the following statements should be used to include a file?
(a) #include ‘filename’;
(b) include ‘filename’;
(c) @include ‘filename’;
(d) include;
Answer:
(b) include ‘filename’;

Question 15.
Which version of MySQL introduced the prepared statements?
(a) MySQL 4.0
(b) MySQL 4.1
(c) MySQL 4.2
(d) MySQL 4.3
Answer:
(b) MySQL 4.1

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 16.
Which of the following methods is used to execute the statement after the parameters have been bound?
(a) bind_param( )
(b) bind_result( )
(c) bound_param( )
(d) boundresult( )
Answer:
(a) bind_param( )

Question 17.
Which one of the following methods is used to recuperating prepared statements resources?
(a) end ( )
(b) finish( )
(c) final( )
(d) close ( )
Answer:
(d) close ( )

Question 18.
Which method rolls back the present transaction?
(a) commit( )
(b) undo( )
(c) back( )
(d) rollback( )
Answer:
(d) rollback( )

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 19.
What will be the output of the following PHP code?
<?php
$on_e = 1;
$tw_o = 2;
$thre_e = 3;
$fou_r = 4;
echo $on_e/$tw_o + $thre_e/$fou_r;
?>
(a) 0.75
(b) 0.05
(c) 1.25
(d) Error
Answer:
(c) 1.25

Question 20.
What will be the output of the following PHP code?
<?php
echo $red;
?>
(a) 0
(b) No output
(c) red
(d) error
Answer:
(b) No output

Question 21.
What will be the output of the following PHP code?
<?php
$four4 = 4;
$three = 3;
$two = 2;
echo $four4 + $three3/$two2 -1;
?>
(a) 4.5
(b) 7
(c) 3.5
(d) Error
Answer:
(a) 4.5

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 22.
Match the following:

(A) local host (i) database name
(B) Sdbname (ii) servername
(C) MySQli__query (iii) web framework
(D) symphony (iv) function

(a) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(b) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(c) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(d) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
Answer:
(a) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 23.
Choose the incorrect pair:
(a) MSSQLSERVER – ROMS
(b) DELETE – SQL
(c) MySQLi – PHP
(d) MySQL – Client side web
Answer:
(d) MySQL – Client side web

Question 24.
Choose the correct pair:
(a) HIPHOP’s – PHP Version
(b) HPHP’s – MySQL
(c) PRADO – function
(d) Cake PHP – website
Answer:
(a) HIPHOP’s – PHP Version

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 25.
Choose the incorrect statement:
(a) SQL is a domain-specific language used in programming and design.
(b) MySQL is an open-source relational database management system.
(c) A database is an organized collection of software.
(d) A query is a request for data or information from a database table.
Answer:
(c) A database is an organized collection of software.

Question 26.
Choose the correct statement:
(a) PHP is open source and scripting language.
(b) PHP is a client-side scripting language.
(c) PHP cannot embed easily with HTML.
(d) Web servers cannot support PHP scripting language.
Answer:
(a) PHP is open source and scripting language.

Question 27.
Assertion (A):
The combination of PHP and MySQL has become very popular server side web scripting language in Internet.
Reason (R):
Seventy percentage of website has been built by PHP and MySQL.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 28.
Assertion (A):
Facebook technology stack consists of application written in many language, including PHP and many others.
Reason (R):
Facebook has manythings built in PHP, Actually its not the real PHP, Facebook have written alternative version of PHP that is HiPHOP’s HPHP’c which help to convert PHP code into C++.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(a) Both A and R are true, and R is the correct explanation for A

Question 29.
Pick the odd one out.
(a) Facebook
(b) Twitter
(c) Linkedin
(d) CakePHP
Answer:
(d) CakePHP

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 30.
Pick the odd one out.
(a) SQL
(b) MySQL
(c) Queries
(d) DB2
Answer:
(c) Queries

Question 31.
Which one of the following statements instantiates the mysqli class?
(a) mysqli = new mysqli( )
(b) Smysqli = new mysqli( )
(c) $mysqli->new.mysqli( )
(d) mysqli->new.mysqli( )
Answer:
(b) Smysqli = new mysqli( )

Question 32.
Which one is correct way, we can retrieve the data in the result set of MySQL using PHP?
(a) mysql_fetch_row
(b) mysql_fetch_array
(c) mysql_fetch_object
(d) All the above
Answer:
(d) All the above

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 33.
How Can we Create a Database Using PHP and MySQL?
(a) mysqli_create_db(“Database Name”)
(b) mysqli_create_db(“Data”)
(c) create_db(“Database Name”)
(d) create_db(“Data”)
Answer:
(a) mysqli_create_db(“Database Name”)

Question 34.
Which is the correct function to execute the SQL queries in PHP ?
(a) mysqli_query(“Connection Object”, “SQL Query”)
(b) query(“Connection Object”, “SQL Query”)
(c) mysql_query(“Connection Object”, “SQL Query”)
(d) mysql_query(“SQL Query”)
Answer:
(a) mysqli_query(“Connection Object”, “SQL Query”)

Question 35.
Which is the correct function Closing Connection in PHP ?
(a) mysqli_close(“Connection Object”);
(b) close(“Connection Object”);
(c) mysql_close(“Connection Object”);
(d) mysqli_close(“Database Object”);
Answer:
(a) mysqli_close(“Connection Object”);

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 36.
Which is the correct function to establish Connection in PHP?
(a) MySQli_connect(“ServerName”, “User Name”, “Password”, “DBName”);
(b) connect(“Server Name”, “User Name”, “Password”, “DB Name”);
(c) MySQl_connect(“Server Name”, “User Name”, “Password”, “DB Name”);
(d) mysqli connect (“Database Object”);
Answer:
(a) MySQli_connect(“ServerName”, “User Name”, “Password”, “DBName”);

Question 37.
Which is the not a correct MySQL Function in PHP ?
(a) MySQli_connect() Function
(b) MySQli_close() Function
(c) MySQli_select_data() Function
(d) MySQli_affected_rows() Function
Answer:
(c) MySQli_select_data() Function

Question 38.
How many parameter are required for MySQLi connect function in PHP?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 39.
How many parameter are required for MySQLi query function in PHP?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Question 40.
How many parameter are required for MySQLi Close function in PHP?
(a) 1
(b) 2
(c) 3
(d) 5
Answer:
(a) 1

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 9 Connecting PHP and MYSQL

Question 41.
Which version of PHP supports MySQLi factions ?
(a) Version 2.0
(b) Version 3.0
(c) Version 4.0
(d) Version 5.0
Answer:
(d) Version 5.0

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 1.
Write the function of Internet Protocol (IP).
Answer:

  • The main function is to allows Internet working an boost up the internet.
  • Internet portocol will deliver packets from the source host and it will deliver to the destination host.

Question 2.
What is Network protocols?
Answer:
Network protocols is that the usual procedures, rules, formal standards and policies comprised of formats which allocates communication between more . than one device which connected to the network.

Question 3.
What is the unique aim of ARPA Net?
Answer:
ARPAC (Advanced Research Project Agency). The unique aim was to generate a network that would permit users of a research computer from one university to ‘talk to’ research computers on other universities.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 4.
What is Internet?
Answer:
A network of networks, where the users at any one computer can, if they have permission get information from any other computer. The Internet is a network of global connections.

Question 5.
What do you understand about Internet?
Answer:
The Internet denotes to the global communication system, including infrastructure and hardware, whereas the web is one of the services interconnected over the Internet.

Question 6.
What is Extranet?
Answer:
Extranet is a private network that uses Internet technology and the public telecommunication system to securely share business’s information with suppliers, vendors, partners, customers, or other businesses.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 7.
What is IoT?
Answer:
IoT (Internet of Things) is to the digital interconnection of everyday objects with the internet.
Eg: Home appliances, wearable devices, automobiles etc.,

Question 8.
What is refer ‘thing’ in IoT?
Answer:
The ‘thing’ in IoT refers to an objects that have been assigned an IP address and have the ability to collect and transfer data over a network without manual assistance or intervention.

Question 9.
What is called cells?
Answer:
A mobile network or cellular network as it is made up of a large number of signals areas called cells. These cells join to form a large coverage area.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 10.
Define Mobile base station.
Answer:

  • A mobile device will connect to the nearest or least base station.
  • The base stations are connected to digital exchange where the communication is sent to other telephone or data networks.

Question 11.
What is SIM?
Answer:
SIM (Subscriber Identity Module) technology to authenticate a user for identification and billing purposes, and to encrypt the data to prevent listen without permission.

Question 12.
Expand the following.
(i) NMT
(ii) GSM
(iii) TMDA
(iv) CDMA
Answer:
(i) NMT – Nordic Mobile Telephone
(ii) GSM – Global System for Mobile
(iii) TMDA – Time Division Multiple Access
(iv) CDMA – Code Division Multiple Access

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 13.
What is GPRS?
Answer:
GPRS (General Packet Radio Service) is a data service which enables mobile devices to send and receive messages, picture messages, and e-mails.

Question 14.
What is Li-Fi?
Answer:
Li-Fi is a wireless technology which uses light-emitting diodes (LEDs) for data transmission.

Question 15.
What is Wi-Fi?
Answer:
Wi-Fi stands for wireless fidelity. It is wireless network technology that permits computers and alternative devices to be connected to every alternative into a local area network and to the net without wires and cables.

Question 16.
What technology use Wi-Fi?
Answer:
Wi-Fi uses radio frequencies for data transmission. And is additionally stated as wireless local area network.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 17.
What is RFID?
Answer:
RFID (Radio Frequency Identification) used for radio waves to read and capture information stored on a tag attached to an object.

Question 18.
What is a RFID tag?
Answer:
RFID tag has silicon Mircochip attached to a small antenna and mounted on a substrate.

Question 19.
What is a reader in RFID?
Answer:
A reader has a scanner with antennas to transmit and receive signals, used for communication.

Question 20.
What is a controller in RFID?
Answer:
A controller is the host computer with a microprocessor which receives the reader input and process the data.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 21.
What is Transmission Control Protocol (TCP)?
Answer:
The Transmission control protocol is accountable for guaranteeing the trustworthy transmission of data.

Question 22.
What are important and Frequent TCP/IP protocols?
Answer:
The important and Frequent TCP/IP protocols are HTTP, HTTPs and FTP.

Question 23.
What is Network Layer?
Answer:
Network Layer is the layer where data is addressed, packaged, and routed among networks.

Question 24.
What is User Datagram Protocol (UDP)?
Answer:
User Datagram protocol provides connectionless, unreliable, one-to-one (or) one-to-many delivery.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 25.
What is DNS?
Answer:
DNS (Domain Name System) refer to- other host computers by using names rather than numbers.

Question 26.
What is a MAC Addresses?
Answer:
MAC (Medium Access Control) address is a hardware identification number that uniquely identifies each device on a network.

Question 27.
Write the broad types of Networking protocols.
Answer:
The bread types of Networking protocols are network communication protocols, Network security protocols and Network management protocols.
(i) Network communication protocols is that the basic data communication protocols which specific as HTTP and TCP/IP.
(ii) Network security protocols is that which implement security over network communications and include HTTP, SFTP and SSL.
(iii) Network management protocols will provide network governance and maintenance and include ICMP and SNMP.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 28.
List out generations of mobile networks.
Answer:

  1. First generation (1G) – 1981 – NMT launch
  2. Second generation (2G) – 1991 – GSM launch
  3. Third generation (3G) – 2003 – UK 3G launch
  4. Second to third generation bridge (2.5) – 2000 – GPRS launch
  5. Fourth generation (4G) – 2007
  6. Fifth generation (5G) – 2019 +

Question 29.
Write short notes on RFID.
Answer:

  1. RFID – Radio Frequency Identification
  2. RFID uses RF wireless technology to identify.
  3. RFID used for radio waves to reaad and capture information stored on a tag attached to an object.
  4. Tag can be read from several feet away and does not need to be in direct- line-of-sight of the reader to be tracked.
  5. RFID has been made up of two parts a reader and a tag or a label.
  6. RFID tags are installed with a transmitter and receiver.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 30.
Write short notes on RFID component.
Answer:

  1. RFID component on the tags has two parts, they are microchip and the Antenna.
  2. A microchip which stores nad processes the information.
  3. The antenna to receive and transmit a signal
  4. The tag replies the information from its memory bank.
  5. The reader will transmit to read the result to RFID computer program.

Question 31.
Write the Frequent TCP/IP protocols.
Answer:
The Frequent TCP/IP protocols are HTTP, HTTPs, FTP.
Frequent TCP/IP protocols:
(i) HTTP (Hyper Text Transfer Protocol) is used between a web client and web server and it guarantees non-secure data transmissions.
(ii) HTTPS (Hyper Text Transfer Protocol Secure) is used between a web client and a web server ensures secure data transmissions.
(iii) FTP (File Transfer Protocol) is used between computers for sending and receiving file.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 32.
What do you know about domain names and TCP/IP addresses?
Answer:

  1. TCP/IP is a set of protocols which governs communications among all computers on the Internet.
  2. The address for any website is not as easy as to remember, domain name are used instead.
    For example, 216.58.216.164 is one of the IP address for google and google.com is the domain name.

Question 33.
Explain about Network Interface layer.
Answer:

  1. Network interface layer is the bottom most level layer.
  2. It is comparable to that of the open system interconnection physical and data link layers.
  3. Different TCP/IP protocols are being used at this layer, Ethernet and – Token Ring for local area networks and protocols such as X.25 , Frame Relay, and ATM for Wide Area Networks.
  4. It is assumed to be an unreliable layer.

Question 34.
Explain the important internet protocols that operate at the network layer.
Answer:
The important internet protocols that operate at the Network layer are.

  1. Internet protocol (IP): Routable protocol which uses IP addresses to deliver packets.
  2. It is an unreliable protocol, does not guarantee delivery of information.
  3. ARP (Address Resolution Protocol) resolves IP addresses to MAC (Medium Access Control) addresses.
  4. ICMP (Internet Control Message Protocol) used by network devices to send error messages and operational information.
  5. IGMP (Internet Group Management Protocol) is a communication protocol used by hosts and routers to send multicast messages to multiple IP addresses at once.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 35.
Explain the Transport Layer.
Answer:
The sessions are recognised and data packets are swapped between hosts in this layer.
The two main protocols established at this layer are

  1. TCP (Transmission Control Protocol) provides reliable connection oriented transmission between two hosts. It ensures delivery of packets between the hosts.
  2. UDP (User Datagram Protocol) provides connectionsless, unreliable, one-to-one or one-to-many delivery.

Question 36.
Explain the most popular Application layer protocols.
Answer:
The most popular application layer protocols are

  1. HTTP (Hyper Text Transfer Protocol) is core protocol of the World Wide Web.
  2. FTP (File Transfer Protocol) is that enables a client to send and receive complete files from a server.
  3. Telnet is connect to another computer on the internet. ‘
  4. SMTP (Simple Mail Transfer Protocol) is provide e-mail services.
  5. DNS (Domain Name System) is refer to other host computers by using names rather than numbers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 37.
Expand the following.
(i) EDGE
(ii) LED
(iii) Li-Fi
(iv) Wi-Fi
(v) UMTS
(vi) MPLS
Answer:
(i) EDGE – Enhanced Data rates for Global Evolution
(ii) LED – Light Emitting Diode
(iii) Li-Fi – Light Fidelity
(iv) Wi-Fi – Wireless Fidelity
(v) UMTS – Universal Mobile Telecommunication Systems
(vi) MPLS – Multiprotocol Label Switching.

Question 38.
List out the Application of Internet.
Answer:

  1. Download programs and files
  2. Social media
  3. E-mail
  4. E-Banking
  5. Audio and video conferencing
  6.  E – Commerce
  7. File sharing
  8. E – Governance
  9. Information browsing
  10. Search the web addresses for access through search engine.
  11. Chatting and etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 39.
List out the Applications of Intranet.
Answer:

  1. Sharing of company policies/rules and regulations.
  2. Access employee database.
  3. Distribution of Circulars/office orders. .
  4. Access product and customer data.
  5. Sharing of information of common interest.
  6. Launching of personal/departmental home pages.
  7. Submission of reports.
  8. Corporate telephone directories.

Question 40.
List out the Applications of Extranet.
Answer:

  1. Customer communications
  2. Online education/training
  3. Account status enquiry
  4. Inventory enquiry
  5. Online discussion
  6. Supply-chain management
  7. Order status enquiry
  8. Warranty registration
  9. Claims
  10. Distributor promotions.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 41.
Explain the generations of mobile Networks.
Answer:
(i) First Generation (1G) – 1981 – NMT Launch:
During the initial periods the mobile systems were based on analog transmission. Here NMT (Nordic Mobile Telephone) communication is used, It very poor voice quality, and they used unsure and unencrypted transmission, which leads to the spoofing of its identifies.

(ii) Second Generation (2G) – 1991 – GSM launch:
GSM (Global System Mobile communication) was most popular standard which is used second generation.
GSM mobile system grown digital transmission using SIM. SIM stands for subscriber identity module technoloty to authenticate a user for identification and billing purposes, and to encrypt the data to prevent listen without permission.

(iii) Third Generation (3G) – 2003 – 3G Launch:
In this generation of . mobile systems merges different mobile technology standards, and uses higher frequency bands for transmission and code division mutiple access to delivery data rates. MMS, Voice, Video and data are supported in this generation.

(iv) Fourth Generation (4G) – 2007:
4G was based on an adhoc networking model where there was no need for a fixed infrastructure operation. ADHOC networking requires global mobility feature and connectivity to a global IPV6 network to support an IP address for each mobile device.

(v) Fifth Generation (5G) – 2019+:
5G targets to performance the high data rate, reduced latency, energy saving, cost reduction, higher system, capacity and massive device connectivity.

5G new radio can access at lower frequencies from 600 MHz to 6 GHz.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 42.
Explain working of passive and Active RFID system.
Answer:
(i) A passive RFID system using induction coupling method.
The RFID tag gets power from the reader through the inductive coupling method.

TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols 1

(ii) A passive RFID system using EM wave propagation method:
The reader antenna transmits the electromagnetic waves that are received by the antenna.

TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols 2

(iii) Working of Active RFID system:
The reader sends signal to the tag using an antenna.

TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 43.
Expand of the following.
(i) IoT
(ii) ATM
(iii) WLANS
(iv) OSI
(v) SMTP
(vi) ICMP
(vii) IGMP
(viii) ARP
(ix) UDP
(x) ITU
Answer:
(i) IoT – Internet of Things
(ii) ATM – Asynchronous Transfer Mode/Automatic Teller Machine (in) WLANS – Wireless Local Area Network System
(iv) OSI – Open System Interconnection
(v) SMTP – Simple Mail Transfer Protocol
(vi) ICMP – Internet control Message Protocol
(vii) IGMP – Internet Group Management Protocol
(viii) ARP – Address Resolution Protocol
(ix) UDP – User Datagram Protocol
(x) ITU – International Telecommunication Union.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 44.
Explain all other network protocols other that TCP/IP and OSI model.
Answer:
Except TCP/IP and OSI are called other network protocols.
(i) HTTP (Hyper Text Transfer Protocol):
A protocol used between a web client and a Webserver protects non-secure data transmissions.

(ii) HTTPS (Hyper Text Transfer Protocol Secure):
A protocol used between a web client and a Webserver permits secure data transmissions.

(iii) FTP (File Transfer Protocol):
Used between computers for sending and receiving data.

(iv) IP(Internet Protocol):
It routable Protocol which uses IP addresses to deliver packets.

(v) ARP (Address Resolution Protocol):
Resolves IP addresses to MAC (Medium Access Control) Addresses.

(vi) ICMP (Internet Control Message Protocol):
Used by network devices to send error messages and operational information.

(vii) SMTP (Simple Mail Transfer Protocol):
Provides e-mail services.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 45.
Define Intranet.
Answer:
Intranet is a private network within an enterprise to share company data and computing resources between the employees. It may consists of many interlinked local area networks.

Question 46.
What is the uses of mobile networks?
Answer:

  1. Mobile networking assign to the technology that can support data/voice, network connectivity using via radio transmission solution, wireless.
  2. Mobile networks are being used in diverse areas such as travel, education, stock trading, military, package delivery, disaster recovery, and medical emergencycare etc.,

Question 47.
List out the benefits of WiFi.
Answer:

  1. It povides mobility.
  2. It provides connection to Internet.
  3. Flexibility of LAN
  4. Ensures connectivity
  5. It allows places that are remote to benefit from connectivity.
  6. Low cost, high benefits.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 48.
How many types of RFID system available and what are they?
Answer:
Two types of RFID tags were active RFID system and passive RFID systems.
(i) Active RFID system:
The tag has its own power source. The systems used for larger distance and to track value goods like vehicles.

(ii) Passive RFID system:
The tag gets power through power from a reader antenna to the tag antenna. They are used or shorter range transmission.

Question 49.
Expand HTTP, HTTPS, FTP.
Answer:
HTTP – Hyper Text Transfer Protocol ,
HTTPS – Hyper Text Transfer Protocol Secure
FTP – File Transfer Protocol

Question 50.
Complete Internet, Intranet and Extranet.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols 4

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 51.
List out the components of a RFID system.
Answer:
The components of a RFID system follows.

(i) A RFID tag:
It has silicon microchip attached to a small antenna and mounted on a substrate.

(ii) A Reader:
It has a scanner with antenna to transmit and receive signals, used for communication.

(iii) A Controller:
It is the host computer with a microprocessor which receives the reader input and process the data.

Question 52.
Write short notes on HTTP, HTTPS, FTP.
Answer:
HTTP (Hyper Text Transfer Protocol):
It used between a web client and web server protects non-secure data transmission. The core protocol of the World Wide Web.

HTTPS (Hyper Text Transfer Protocol Secure):
It used between a web client and a web server permits secure data transmissions.

FTP (File Transfer Protocol):
It used between computers for sending and receiving data. Enables a client to send and receive complete files from a server.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 53.
What are the layers available in TCP/IP?
Answer:
There are four layers available in TCP/IP Protocol. They are

  1. Network Access Layer – Concerned with building packets.
  2. Internet Layer – Describes how packets are to be delivered.
  3. Transport Layer – Ensure the proper tmasmission of data.
  4. Application Layer – Application network processes. These processes include FTP, HTTP, and SMTP.

Question 54.
Expand ARP, ICMP, SMTP and DNS.
Answer:
ARP – Address Resolution Protocol
ICMP – Internet Control Message Protocol
SMTP – Simple Mail Transfer Protocol
DNS – Domain Name System

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 55.
Explain about Internet, Intranet and Extranet.
Answer:
INTERNET:
(i) The Internet, “the Net” is a world wide system of computer networks.
(ii) A network of networks where the users at any one computer can, if they have permission, get information from any other computer.
(iii) The internet is a network of global connections – Comprising private, public, business academic and government networks – linked by guided, wireless and fibre-optic technologies.
(iv) It was perceived by the advanced research projects agency (ARPA) of the US government in 1969 and was first recognized as the ARPANET.

INTRANET:
(i) Intranet is a private network within an enterprise to share company data and computing resources between the employees.
(ii) It may consist of many interlinked local area networks.
(iii) It includes connections through one or more gateway computers to outside internet.

EXTRANET:
Extranet is a private network that uses Internet technology and the public Telecommunication system to securely share business’s information with suppliers, vendors, partners, customers, or other business.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 56.
Discuss about OSI model with its layers.
Answer:
OSI (Open System Interconnection) model was found in the year 1934, general framework that enables network protocols along with software and systems to be developed based on general set of guidelines. It describes the standards for the inter-computer communication.

OSI Layers:
(i) Physical Layer:
This is the Is* layer, it defines the electrical and physical specifications for devices.

(ii) Data Link Layer:
It is the 2nd layer and it guarantees that the data transmitted are free of errors. This layer has simple protocols like “802.3 for Ethernet” and “802.11 for Wi-Fi”.

(iii) Network layer:
It is the 3rd layer determining the path of the data packets.
At this layer, routing of data packets is found using IP Addressing.

(iv) Transport Layer:
It is the 4th layer that guarantees the transportation/ sending of data is successful. It includes the error checking operation.

(v) Session Layer:
It is the 5th layer, identifies the established system session between different network entities. It controls dialogues between computers.

(vi) Presentation on Layer:
It is the 6th layer that does the translation of data to the next layer. Encryption and decryption protocols occur in this layer.

(vii) Application Layer:
It is the 7th layer, which acts as the user interface platform comprising of software within the system.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 57.
Difference between TCP/IP and OSI model.
Answer:

TCP/IP Model

OSI Model

TCP/IP is standard protocol used for every network including internet.OSI is not a protocol but a reference model used for understanding and designing the system architecture.
TCP/IP is a four layered model.OSI has seven layered model.
TCP/IP is used for establishing a connection and communicating through the network.OSI is a conceptual model which is not practically used for communication.
TCP/IP protocol tells how information should be packaged, sent, and received, as well as how to get to its destination.OSI model that enables network protocols along with software and systems to be developed based on general set of guidelines.
TCP/IP is a combination of two protocols, transmission control protocol (TCP) and internet protcol (IP).It describes the standards for the inter – computer communication.
ProtocoTdependent standard. Protocol independent standard.

Question 58.
Explain about the development, merits and demerits in Mobile networks.
Answer:
Merits:

  1. Mobile Network provides voice/data services even while roaming.
  2. It is used in areas where cables cannot be laid out due to its wireless nature.
  3. It is easy to maintain and to upgrade the equipments.
  4. The mobile is connected immediately with mobile network.
  5. The quality and flexibility of services that offer the customers.
  6. Greater access to modem apps and services and improved networking capabilities.

Demerits:

  1. Mobile Network offers less data rate compare to wired networks.
    Eg: Fibre optics.
  2. The wireless communication is influenced by climatic conditions and interference from other wireless devices.
  3. The installation of antennas for mobile network require space, foundation tower, time and effort.
  4. There are different wireless standards used in mobile networks such as GSM, CDMA, LTE etc.,
  5. Work place distractions as the range of technologies and devices increases.
  6. Increased IT security needs-portable devices are vulnerable to security risks.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

• List out some web address with http and https.

Question 59.
Find some of the http web addresses.
Answer:

  1. http: // www.worldbank.org
  2. http: // www.ox.ac.uk
  3. http: // www.ucla.edu
  4. http: // www.mit.edu
  5. http: // www.fortune.com

Question 60.
Give some example for https.
Answer:

  1. https: // www.time.com
  2. https: // www.dailymail.co.uk
  3. https: // www.un.org
  4. https: // www.redcross.org
  5. https: // www.hilton.com

Question 61.
Can you know difference between http and https.
Answer:

http

 https

URL begins with “http://” URL starts with “https://”
User port number 80 for comimunication User port number 443 for communication
It is considered to be unsecured It is considered to be secure
Encryption is absent Encryption is present
ft does not require any certificates It needs SSL certifications

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Choose the correct answer:

Question 1.
Which is the principal of the cpmmunication protocol and working with boostup the internet?
(a) Internet Protocol (IP)
(b) Simple Mail Transfer Protocol (SMTP)
(c) File Transfer Protocol (FTP)
(d) User Datagram Protocol (UDP)
Answer:
(a) Internet Protocol (IP)

Question 2.
Which is a network of global connections?
(a) Extranet
(b) Intranet
(c) Internet
(d) Networks
Answer:
(c) Internet

Question 3.
Which is a private network within an enterprise to share company data?
(a) Extranet
(b) Intranet
(c) Internet
(d) Networks
Answer:
(b) Intranet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 4.
Which is refers to the.digital interconnection of everyday objects with the internet?
(a) Extranet
(b) Intranet
(c) Networks
(d) Internet of Things (IoT)
Answer:
(d) Internet of Things (IoT)

Question 5.
Which type is used you to send e-mail to your friend?
(a) Extranet
(b) Intranet
(c) Internet
(d) IoT
Answer:
(c) Internet

Question 6.
Which type is used to accessing your record in the employee personnel file?
(a) Extranet
(b) Intranet
(c) Internet
(d) IoT
Answer:
(b) Intranet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 7.
Which type is used for checking availability of inventory from an outside ‘ supplier?
(a) Extranet
(b) Intranet
(c) Internet
(d) IoT
Answer:
(a) Extranet

Question 8.
Which network is madeup of large number of signals areas called cells?
(a) Mobile Network
(b) Local Area Network
(c) Wide Area Network
(d) Metropolitan Network
Answer:
(a) Mobile Network

Question 9.
Which Transmission launched in First generation of mobiles?
(a) NMT Launch
(b) GSM Launch
(c) GPRS Launch
(d) 2G Launch
Answer:
(a) NMT Launch

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 10.
Which Transmission launched in second generation on mobiles?
(a) NMT Launch
(b) GSM Launch
(c) GPRS Launch
(d) 2G Launch
Answer:
(b) GSM Launch

Question 11.
SIM stands for:
(a) Standard Identified Mobile
(c) Subscriber Identified Mobile
(b) Standard Individual Mobile
(d) Subscriber Identity Module
Answer:
(d) Subscriber Identity Module

Question 12.
Which mobile systems grown digital transmission using SIM?
(a) NMT
(b) GPRS
(c) GSM
(d) 2G
Answer:
(c) GSM

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 13.
GPRS stands for:
(a) General Packet Radio Service
(b) Government Program Radio Service
(c) General Program Radio Service
(d) Government Program Rare Service
Answer:
(a) General Packet Radio Service

Question 14.
Which data service is to send and receive picture message and e-mails in mobiles?
(a) GSM
(b) NMT
(c) GPRS
(d) 2G
Answer:
(c) GPRS

Question 15.
Which is a wireless technology uses light-emitting diodes (LEDs) for data transmission?
(a) Li-Fi
(b) Wi-Fi
(c) GSM
(d) GPRS
Answer:
(a) Li-Fi

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 16.
Which is used radio frequencies for data transmission?
(a) Li-Fi
(b) Wi-Fi
(c) GSM
(d) GPRS
Answer:
(b) Wi-Fi

Question 17.
Li-Fi short form:
(a) Light Fidelity
(b) Light Fiction
(c) Light Finite
(d) Limit Fidelity
Answer:
(a) Light Fidelity

Question 18.
Which one of the following is not a application of Internet?
(a) Social media
(b) E-Mail
(c) E-banking
(d) claims
Answer:
(d) claims

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 19.
The term Li-Fi was first used by:
(a) Harald Haas
(b) Steven H.Walker
(c) D. Eisenhower
(d) John Murphy
Answer:
(a) Harald Haas

Question 20.
WCDMA stands for:
(a) Wide computer Division Multiple Access
(b) Wideband Code Division Multiple Access
(c) Wideband Compile Direct Multiple Access
(d) Wide Connect Direct Multiple Access
Answer:
(b) Wideband Code Division Multiple Access

Question 21.
Which generation is an adhoc networking model where there was no need for a fixed infrastructure operation?
(a) 2G
(b) 3G
(c) 4G
(d) 5G
Answer:
(c) 4G

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 22.
Which is used for radio waves to read and capture information stored on a tag attached to an object?
(a) GPRS
(b) EDGE
(c) UMTS
(d) RFID
Answer:
(d) RFID

Question 23.
How many parts types are madeup of RFID?
(a) 2
(b) 3
(b) 4
(d) 5
Answer:
(a) 2

Question 24.
How many component are there in RFID?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 25.
Which year was found open system interconnection (OSI)?
(a) 1952
(b) 1950
(c) 1932
(d) 1934
Answer:
(d) 1934

Question 26.
Which OSI layer defines the electrical and physical specifications for devices?
(a) Physical
(b) Data Link
(c) Network
(d) Transport
Answer:
(a) Physical

Question 27.
Which OSI layer is guarantees that transmitted are free of error?
(a) Physical
(b) Data Link
(c) Network
(d) Transport
Answer:
(b) Data Link

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 28.
Which OSI layer is determining path and route of the data packets?
(a) Physical
(b) Data link
(c) Network
(d) Transport
Answer:
(c) Network

Question 29.
Which OSI Layer that guarantees the sending of data is successful?
(a) Physical
(b) Data Link
(c) Network
(d) Transport
Answer:
(d) Transport

Question 30.
Which OSI layer that controls dialogues between computers?
(a) Transport
(b) Session
(c) Presentation
(d) Application
Answer:
(b) Session

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 31.
Which OSI Layer that occurs Encryption and decryption protocols?
(a) Transport
(b) Session
(c) Presentation
(d) Application
Answer:
(c) Presentation

Question 32.
Which OSI layer act as the user interface perform comprising of software within the system?
(a) Transport
(b) Session
(c) Presentation
(d) Application
Answer:
(d) Application

Question 33.
Which is a set of protocols that governs communications among all computers on the Internet? .
(a) HTTP
(b) TCP/IP
(c) HTTPS
(d) FTP
Answer:
(b) TCP/IP

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 34.
Which protocol specifies the logistics of the packets that are sent out over networks?
(a) IP
(b) HTTP
(c) HTTPS
(d) FTP
Answer:
(a) IP

Question 35.
Which protocol is accountable for guaranteeing the trustworthy transmission of data?
(a) TCP
(b) IP
(c) FTP
(d) HTTP
Answer:
(a) TCP

Question 36.
Which protocol is used between a web client and web server and it guarantees non-secure data transmission?
(a) HTTP
(b) HTTPS
(c) FTP
(d) TCP
Answer:
(a) HTTP

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 37.
Which protocol is used between a web client and a web server ensures secure data transmission?
(a) HTTP
(b) HTTPS
(c) FTP
(d) TCP
Answer:
(b) HTTPS

Question 38.
Which protocol is used between computers for sending and receiving file?
(a) HTTP
(b) HTTPS
(c) FTP
(d) TCP
Answer:
(c) FTP

Question 39.
Which is the bottom most level layer?
(a) Network Interface
(b) Physical
(c) Transport
(d) Application
Answer:
(a) Network Interface

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 40.
Which layer is used where data is addressed, packaged40. Which layer is used where data is addressed, packaged, and routed among networks?
(a) Network Interface
(b) Network
(c) Transport
(d) Physical
Answer:
(b) Network

Question 41.
Which is address that gives hardware identification number?
(a) MAC
(b) ICMP
(c) IGMP
(d) SMTP
Answer:
(a) MAC

Question 42.
Which Protocol used by network devices to send error messages and operational information?
(a) MAC
(b) ICMP
(c) IGMP
(d) SMTP
Answer:
(b) ICMP

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 43.
Which Protocol used by hosts and routers to send multicast messages to multiple IP addresses at once?
(a) MAC
(b) ICMP
(c) IGMP
(d) SMTP
Answer:
(c) IGMP

Question 44.
Which protocol provides connectionless, unreliable, one-to-one or one-to- . many delivery?
(a) IP
(b) TCP
(c) FTP
(d) UDP
Answer:
(d) UDP

Question 45.
Which is connect to another computer on the Internet?
(a) DNS
(b) SMTP
(c) Telnet
(d) FTP
Answer:
(c) Telnet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 46.
Which year was launched first generations of mobile networks?
(a) 1981
(b) 1989
(c) 1991
(d) 2000
Answer:
(c) 1991

Question 47.
Which has silicon microship attached to a small antenna in RFID system?
(a) RFID tag
(b) A reader
(c) A controller
(d) None of these
Answer:
(a) RFID tag

Question 48.
Which has a scanner with antennas to transmit and receive signals in RFID system?
(a) RFID tag
(b) A reader
(c) A controller
(d) None of these
Answer:
(b) A reader

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 49.
Which is the host computer with a microprocessor that receives the reader input and process the data?
(a) RFID tag
(b) A reader
(c) A controller
(d) None of these
Answer:
(c) A controller

Question 50.
Match the following.

(A) Internet (i) Enterprise
(B) Intranet (ii) Global
(C) Extranet (iii) Objects
(D) Internet of things (iv) Telecommunication

(a) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(b) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 51.
Match the following.

(A) 1G (i) Adhoc
(B) 2G (ii) MMS
(C) 3G iii) NMT
(D) 4G (iv) GSM

(a) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(b) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(a) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 52.
Match the following.

(A) Physical Layer (i) Sending data
(B) Data Link Layer (ii) Path of data
(C) Network Layer (iii) Free errors
(D) Transport Layer (iv) Electrical

(a) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(b) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (iv); (B) – (ii); (C) – (i); (D) -( iii)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 53.
Match the following.

(A) HTTP (i) Secure data
(B) HTTPs (ii) Non secure data
(C)FTP (iii) Logistics of packets
(D) IP (iv) File transaction

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (iii); (B) – (i); (C) – (ii); (D) – (iv)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 54.
Match the following.

(A) Application Layer (i) TCP
(B) Transport Layer (ii) Ethernet
(C) Network Layer (iii) HTTP
(D) Network Interface Layer (iv) IP

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 55.
Choose the incorrect pair.
(a) Internet – AREA
(b) Intranet – Private
(c) Extranet – Global
(d) IoT – Object
Answer:
(c) Extranet – Global

Question 56.
Choose the incorrect pair.
(a) 1G – 1981
(b) 2G – 1994
(c) 3G – 2003
(d) 4G – 2010
Answer:
(d) 4G – 2010

Question 57.
Choose the incorrect pair.
(a) Application layer – MPEG
(b) Presentation layer – TSL
(c) Session layer – SAP
(d) Transport layer – TCP
Answer:
(a) Application layer – MPEG

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 58.
Choose the correct pair.
(a) HTTP – Secure data
(b) HTTPs – Non-secure data
(c) DP – logistics
(d) TCP – Data processing
Answer:
(c) DP – logistics

Question 59.
Choose the correct pair.
(a) SMTP – e-mail service
(b) DNS – using numbers
(c) ICMP – hardware Identification
(d) MAC – error message
Answer:
(a) SMTP – e-mail service

Question 60.
Choose the incorrect statement.
(a) The main function is to allows internet working and boostup the internet.
(b) Internet protocol (IP) will deliver packets from the source host.
(c) Network protocols have to do ene-to-end process of secure on time and manage data or network communication.
(d) Network communication protocols is that the Basic data communication protocols which specific as SMTP and SNMP.
Answer:
(d) Network communication protocols is that the Basic data communication protocols which specific as SMTP and SNMP.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 61.
Choose the incorrect statement.
(a) The internet “The Net” is a world wide system of computer networks.
(b) The internet is a network of global conections
(c) Intranet is a private network that uses internet technology and the public telecommunication.
(d) Extranet is a private network that to securly share business’s information.
Answer:
(c) Intranet is a private network that uses internet technology and the public telecommunication.

Question 62.
Choose the incorrect statement.
(a) Internet of things (IoT) refers to the digital interconnection of everyday objects with the Internet.
(b) The ‘Thing’ in IoT refers to an objects that have been assigned an IP address.
(c) Wi-Fi uses microwaves for data transmission.
(d) Li-Fi is a wireless technology which uses light-emitting diodes for data transmission.
Answer:
(c) Wi-Fi uses microwaves for data transmission.

Question 63.
Choose the incorrect statement.
(a) Wi-Fi stands for wireless Fidelity.
(b) 5G target to performance the high data rate, reduced latency, energy saving, cost reduction, higher system, capacity, and massive device connectivity.
(c) RFID – Rare Frequency Identified.
(d) Wi-Fi is additionally stated as wireless local area network that stands for wireless local area network.
Answer:
(c) RFID – Rare Frequency Identified.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 64.
Choose the incorrect statement.
(a) RFID component on the tags has four parts.
(b) A microship which stores and process the information, and the antenna to receive and transmit a signal.
(c) A RFID tag has silicon microchip attached to a small antenna.
(d) A reader has a scanner with antennas to transmit and receive signals.
Answer:
(a) RFID component on the tags has four parts.

Question 65.
Choose the correct statement.
(a) Open System Interconnection (OSI) model was found in the year 1948.
(b) The physical layer defines that the data transmitted are free of errors.
(c) Data link layer defines that electrical specifications for devices.
(d) Network layer is determining the path of the data packets.
Answer:
(d) Network layer is determining the path of the data packets.

Question 66.
Choose the correct statement.
(a) Session layer that guarantees the sending of data is successful.
(b) Transport layer that controls dialogues between computers.
(c) Presentation layer does encryption and decryption protocols occurs.
(d) Application layer does the translation of data to the next layer.
Answer:
(c) Presentation layer does encryption and decryption protocols occurs.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 67.
Choose the correct statement.
(a) TCP/IP is a combination of two protocols.
(b) Internet Protocol (IP) is accountable for guaranteeing the trust worthy transmission of data.
(c) The Transmission Control Protocol (TCP) specifies logistics of the packets that are sent out over networks.
(d) FTP is used between a web client and a web server and it guarantees non- secure data transmissions.
Answer:
(a) TCP/IP is a combination of two protocols.

Question 68.
Choose the correct statement.
(a) Network protocols otherthan OSI and TCP/IP were simply known as other network protocols.
(b) HTTPS positions for Hypertext transmitted protocol service.
(c) HTTP in address bar mainly deals with scientific applications.
(d) TCP/IP has six layers.
Answer:
(a) Network protocols otherthan OSI and TCP/IP were simply known as other network protocols.

Question 69.
Choose the correct statement.
(a) IGMP is a network devices to send error messages and operational information.
(b) Network Interface layer is the bottommost level layer.
(c) Network layer is a communication used by hosts and routers to send multicast messages.
(d) DNS (Domain Name System) that refer to other host computers by using numbers rather than names.
Answer:
(b) Network Interface layer is the bottommost level layer.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 70.
Assertion (A):
The Internet “the Net”, is a world wide system of computer networks.
Reason (R):
The internet is a network of global connections linked by guided, wireless and Fiberoptic technologies.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Question 71.
Assertion (A):
A mobile network or cellular network as it is made up a large number of signals area called cells.
Reason (R):
Cells will often be smaller in size in large towns, as the number of users in the area is more.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 72.
Assertion (A):
GPRS is a data service which enables mobile devices to send and receive picture messages and e-mails.
Reason (R):
GPRS was introduced between 2G and 3G for period of mobile networking development.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(c) A is true, But R is false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 73.
Assertion (A):
Wi-Fi stands for Wired Fidelity.
Reason (R):
Wi-Fi provides connection to Internet.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(d) A is false, But R is true.

Question 74.
Assertion (A):
RFID component on the tag a microchip which receive and • transmit a signal.
Reason (R):
RFID component on Antenna which stores and process the information.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(b) Both A and R are false.

Question 75.
Pick the odd one out.
(a) Internet
(b) APRANet
(c) Intranet
(d) Extranet
Answer:
(b) APRANet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 76.
Pick the odd one out.
(a) NMT
(b) GSM
(c) GPRS
(d) HTTP
Answer:
(d) HTTP

Question 77.
Pick the odd one out.
(a) Li-Fi
(b) Wi-Fi
(c) WiMAX
(d) DNS
Answer:
(d) DNS

Question 78.
The ………….., “the Net,” is a worldwide system of computer networks.
(a) internet
(b) mobile
(c) communication
(d) protocol
Answer:
(a) internet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 79.
Which one of the following will be easy the way to uses Internet technology and the public telecommunication system to securely share business’s information with suppliers, vendors, partners and customers?
(a) Extranet
(b) Intranet
(c) Arpanet
(d) Arcnet
Answer:
(a) Extranet

Question 80.
Match the following and choose the correct answer:
(i) HTTP -The core protocol of the World Wide Web.
(ii) FTP- enables a client to send and receive complete files from a server.
(iii) SMTP – Provide e-mail services.
(iv) DNS- Refer to other host computers by using names rather than numbers.
(a) (i), (ii), (iii), (iv)
(b) (ii), (iii), (iv), (i)
(c) (iii), (iv), (i), (ii)
(d) (iv), (iii), (ii), (i)
Answer:
(a) (i), (ii), (iii), (iv)

Question 81.
Communication over ……………….. is be made up of voice, data, images and text messages.
(a) social media
(b) mobile network
(c) whatsapp
(d) software
Answer:
(b) mobile network

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 82.
Wi-Fi stands for:
(a) Wireless Fidelity
(b) Wired Fidelity
(c) Wired optic Fibre
(d) Wireless optic Fibre
Answer:
(a) Wireless Fidelity

Question 83.
A TCP/IP network with access restricted to members of an organization:
(a) LAN
(b) MAN
(c) WAN
(d) Intranet
Answer:
(d) Intranet

Question 84.
RFID stands for:
(a) Radio Free Identification
(b) Real Frequency Identity
(c) Radio Frequency Indicators
(d) Radio Frequency Identification
Answer:
(d) Radio Frequency Identification

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 85.
It guarantees the sending of data is successful and which checks error on operation at OSI layer is:
(a) Application Layer
(b) Network Layer
(c) Transport Layer
(d) Physical Layer
Answer:
(c) Transport Layer

Question 86.
Which orie of the following will secure data on transmissions?
(a) HTTPS
(b) HTTP
(c) FTP
(d) SMTP
Answer:
(a) HTTPS

Question 87.
…………. provfdes e-mail service.
(a) DNS
(b) TCP
(c) FTP
(d) SMTP
Answer:
(d) SMTP

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 11 Network Examples and Protocols

Question 88.
……………. refer to other host computers by using names rather than numbers.
(a) DNS
(b) TCP
(c) FTP
(d) SMTP
Answer:
(a) DNS

Question 89.
TCP/IP is a combination of two protocols:
(i) Transmission Control Protocol (TCP)
(ii) Internet Protocol (IP)
(iii) Selection Protocol (SP)
(iv) Captiai Protocol (CP)
(a) (i), (ii)
(b) (i), (iii)
(c) (iii), (iv)
(d) (ii), (iii)
Answer:
(a) (i), (ii)

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 1.
What are the main functions of the Domain Name system?
Answer:
Domain Name System (DNS) maintains all the directory of domain names / host names and help us to access the websites using the domain host names.

Question 2.
Write one web address and Explain it?
Answer:
www.tnschools.gov.in is a web address for TamilNadu school education department. DNS translates it into a machine friendly IP address, for example 35.173.69.207 is the IP for www.tnschools.in and directs your internet connection to the correct website.

Question 3.
Who was known as ‘God of the internet’?
Answer:
Jon Postal was an administrator of the Internet Assigned Numbers Authority (IANA) until his death and he was known as ‘God of the internet’.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 4.
What is Absolute URL?
Answer:
Absolute URL is the complete address of a document on the Internet. Absolute URL contains all the information that are required to find the files on the internet.

Question 5.
What is Relative URL?
Answer:
Relative URL is the partial address of a document on the internet. Relative URL contains only file names with folder name.

Question 6.
Write the DNS component.
Answer:
There are three important components in the Domain Name System (DNS). They are

  1. Name space,
  2. Name server,
  3. zone.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 7.
What are the types of Name space?
Answer:
The name space can be divided by two types, they are

  • flat name space,
  • Hierarchical name space.

Question 8.
What is Flat name space?

  1. Flat name space is where the name is assigned to the IP address. They do not have any specific structure.
  2. In this flat name space, some meaningful names are been given to IP address for accessing.

Question 9.
What is the disadvantage of Flat name space in DNS?
Answer:
The major disadvantage of flat name space is that they cannot be used in large system. Because they need to be accessed and controlled centrally to avoid ambiguity and redundancy. But it is difficult in flat name system.

Question 10.
What is a label?
Answer:

  • Label is a string which can have maximum of 63 characters.
  • In other words, Labels are the names given to domains.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 11.
What is a Domain name?
Answer:

  1. Domain name is the sequence of labels.
  2. In domain name the sequence of labels are separated by dot (.).

Question 12.
What is ICANN?
Answer:
ICANN (Internet Corporation for Assigned Name and Numbers) is the Non-profit organisation which assigns names and numbers for all-internet resources.

Question 13.
What is web server?
Answer:

  1. Web server is a program running on dedicated machine which handle the queries of www enduser.
  2. Server is used to host the websites and to deliver the contents of website using HTTP.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 14.
What is TLD?
Answer:

  1. TLD (Top Level Domain) which reviews the request and direct the query to name servers associated with that specific domain.
  2. Until the query is solved it is passed to next level domains.

Question 15.
What is the WHOIS?
Answer:
The WHOIS is a service of ICANN. It is a free, publicly available directory containing the details of registered domain names and their owners. https://whois.icann.org/en

Question 16.
Write a note on IPv4 Address.
Answer:

  1. IPv4 address is a 32-bit unique address given to a computer system. No two systems can have same IP address.
  2. There are two ways to represent the IP address, they are Binary notation and Dotted-decimal notation.
  3. In the binary notation the address is expressed as 32-bit binary values.
    Eg: 00111001 10001001 00111000 00000111
  4. In dotted-decimal notation the address is written in decimal format separated by dots (.). Eg: 128.143.137.144

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 17.
Write a short note on IPV6 address.
Answer:

  1. IPv6 address is a 128-bit unique address given to a computer system.
  2. The number of addresses that can be formed in IPv6 is 2128.
  3. In IPv6 address, the 128 bits are divided into eight 16-bits blocks.
  4. Each block is then changed into 4-digits Hexadecimal numbers separated by colon symbols.
    Eg: 2001 : 0000 : 32313 : DFEI: 0063 : 0000 : 0000 : FEFB

Question 18.
Explain the URL.
Answer:

(i) URL (Uniform Resource Locator) is the address of a document on the internet.
(ii) URL is made up four parts – protocols, host name, folder name and file name.
(iii) Each part has its own specific functions.

The four parts of the URL is explain the following example.

TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System) 1

Question 19.
Explain the Flat name space.
Answer:

  1. Flat name space is where the name is assigned to the IP address. They do not have any specific structure.
  2. In this flat name space, some meaningful names are been given to IP address for accessing.
  3. The major disadvantage of flat name space is that they cannot be used in large system.
  4. Because they need to be accessed and controlled centrally to avoid ambiguity and redundancy. But it is difficult in flat name system.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 20.
Explain Hierarchical name space in various parts.
Answer:

  1. Hierarchical name space is where the name is made up of several parts.
  2. The first part may represent the nature of organisation.
  3. The second part may represent the name of organisation.
  4. The third part may represent the department of the organisation and so on.

Question 21.
Write the types of name servers.
Answer:
There are three types of name servers which control the entire Domain Name
system.

  1. Root Name server – top level server which contains entire DNS tree, maintained by ICANN. There are 13 servers.
  2. Primary / Master Name server – contains a zone resource records. These records are updatable by domain name holders such as organisations.
  3. Secondary / slave name server – contains a copy of primary server files. This server has no authority to update but reduce the work load of master server by sharing the queries.

Question 22.
Explain the zone component in DNS.
Answer:

  1. The entire name space is divided into many different zones. It is the area upto which the server has access.
  2. Zone is defined as a group of contiguous domains and sub domains.
  3. If the zone has a single domain, then zone and domain are the same.
  4. Every zone has the server which contains a database called zone file.
    Using the zone file, the DNS server replies the queries about Hosts in its zone.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 23.
Discuss the term Resolver in DNS?
Answer:

  1. The resolver is a program which is responsible for initiating the translation of a domain name into an IP address.
  2. Resolver either asks server to provide information about IP address.
  3. It is doesn’t find any information, then it sends the request to other servers and so- on.
  4. Once the resolver receives the mapping it checks whether it is an error or resolution (mapping) and provides result according to that.

Question 24.
Write about IANA.
Answer:

  1. IANA (Internet Assigned Numbers Authority) is an affiliated authority of ICANN.
  2. IANA does the overall management of the DNS root, IP addressing, and other Internet protocol resource handling.
  3. IANA takes care of a number of key aspects of the DNS, including the root zone, and the domains.int and .arpa.
    Eg: https://www.iana.org/

Question 25.
Write the basic rules of Domain names.
Answer:

  1. Domain can consists of Alphabets a through z and digit 0 through 9.
  2. Hyphens are allowed, but hyphens cannot be used as first character of a domain name.
  3. Spaces are not allowed.
  4. Special symbols such as ! $, &, _, and so on.
  5. Domain names have the minimum length of 2, and the maximum length of 63 characters. The entire name may be at most 253 character long.
  6. Domain names are not case- sensitive. (It may be upper, lower or mixing of both case letters).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 26.
What is name space? Explain.
Answer:
A Domain Name Space (DNS) is a name service provided by the internet for Transmission control protocol (TCP) networks or Internet Protocol (IP).

The domain names must be very unique and appropriate. The name space can be organised in two ways,

  • Flat name space,
  • Hierarchical name space.

(i) Flat name space:
It is where the name is assigned to the IP address. They do not have any specific structure. In this flat name space, some meaningful names are been given to IP address for accessing. The major disadvantage of flat name space is that they cannot be used in large system. To avoid this major disadvantage hierarchical name space „ is used in large.

(ii) Hierarchical name space:
It is where the name is made up of several parts. The first part may represent the nature of organisation, the second
part may represent the name of organisation, and third part may represent I the department of the organisation and so on.

The centralised authority can be given to nature and then to name of the organisation and so on. To achieve hierarchical name space, Domain Name space was designed.

Question 27.
Define the following terms, (a) Domain, (b) zone, (c) server, (d) Domain Name space, (e) Name server.
Answer:
Domain:
A domain is a single node of the Domain name space.

Zone:
A zone is a subset of the domain name space generally stored in a file.

Server:
A server can contain more than one zone files. A zone can contain more than one sub domains. .

Domain name space:
Domain name space is an entire collection domains, t sub domains and zones.

Name server:
Name server, manages the database of domain names and corresponding IP addresses.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 28.
List any four domain names.
Answer:
.com, .edu, .gov, .org, .net, .in

Question 29.
What is an IP address?
Answer:
IP address (Internet Protocol address;, is simply the logical address in the network layer. IP address is also used to find the host system in the whole network.

Question 30.
What are the types of IP address?
Answer:
There are two ways to represent the IP address, they are:
(i) Binary notation Eg: 00111001 10001001
(ii) Dotted-decimal notation. Eg: 128.143.137.144

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 31.
What is an URL?
Answer:
URL (Uniform Resource Locator) is the address of a document on the . internet. URL is made up four parts – Protocols, hostname, folder name and file name. Each part has its own specific functions.

Question 32.
List out four URLs you know.
Answer:

  1. https://store.example.eom/topic/subtopic/descriptive-product-name#top.
  2. http://www.example.org/index.php
  3. http://www.example.com/blog
  4. http://cms.tn.gov.in /sites / default /files / press release / pro 70119a.jpg

Question 33.
What are the types of URL?
Answer:
Depending on the location of the document the URL is divided into two types , they are (i) Absolute URL, (ii) Relative URL.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 34.
What is a domain?
Answer:
A domain is a single node of the Domain Name space. Domain is a group of computers and devices on a network that are administered as a unit with common rules and procedures.

Question 35.
What is a zone?
Answer:

  • Zone is defined as a group of contiguous domains and sub domains.
  • If the zone has a single domain, then zone and domain are the same.

Question 36.
What is a resolver?
Answer:
The resolver is a program which is responsible for initiating the translation of a domain name into an IP address.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 37.
What are the categories available in domain name space?
Answer:
The domain name space can be categories in two ways, they are

  • Flat name space,
  • Hierarchical name space.

Question 38.
Write any four generic Top Level Domain.
Answer:

  1. .com – commercial organisation
  2. .edu – Educational Institutions
  3. .org – Non-profit organisation
  4. .net – Networking organisation

Question 39.
Write a note on DNS.
Answer:

  1. DNS (Domain Name System) is one of the application layer.
  2. To enable the use of domain names in a network, the Domain Name System (DNS) is used.
  3. DNS provides the domain name to IP address maping through name servers. While typing a web address, DNS translates it into a machine friendly IP address and directs your Internet connection to the correct website.
  4. For example 35.173.67.207 is the IP address for www.tnschools.in.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 40.
Differentiate IPv4 and IPv6.
Answer:

IP v4 Address IPv6 Address
IPv4 Address is a 32 bit unique address given to a computer system. IPv6 address is a 128 bit unique address given to a computer system
If the network has P connections then ‘P’ addresses should be there. The number of addresses that can be formed in IPv6 is 2128.
An address space is the total number of addresses that can be made by that protocol. In IPv6 address, the 128 bits are divided into eight 16 – bits blocks.
It follows two ways to represent the IP address, Binary and Dotted – decimal notation. It follows Hexadecimal number notation.

Question 41.
Differentiate Domain name and URL.
Answer:

Domain Name

 Uniform Resource Locator (URL)

Domain Name is the sequence of Labels are separated by dot (.). URL is the address of a document on the Internet.
The domain name always read from the lower level to higher level. URL is made up of four parts – Protocols, host name, folder name and file name.           .
The root node always represent NULL string, all the domain name ending with dot (.). Depending on the applications, additional information can be added to the URE.
Eg: Some domain name are .com, .edu, .gov, .org etc., Eg: http://cms.tn.gov.in / sites / default / files / press – release / pro 070119.jpg

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 42.
What are the differences between Absolute URL and Relative URL?
Answer:

Absolute URL

 Relative URL

Absolute URL is the complete address of a document on the Internet. Relative URL is the partial address of a document on the Internet.
Absolute URL contains all the information that are required to find the files on the Internet. Relative URL contains only file name or file name with folder name.
If any of the four parts of the URL is missing then the browser would not able to link to the specific file. We can use this type of URL when the file is on the same server related to original document.
Absolute URL contains all the four necessary and fundamental parts of URL. Relative URL contains only folder name and the file name or just the file name.

Question 43.
Write a note on domain name.
Answer:

  1. Domain is the sequence of labels.
  2. In domain name the sequence of labels are separated by dot (.).
  3. The domain name is always read from the lower level to higher level i.e., from the leaf node to root node.
  4. Since the root node always represent NULL string, all the domain name ending with dot.
  5. Domain names are not case -sensitive. Domain names may also be used in other than English languages in UNICODE format.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 44.
Differentiate web address and URL.
Answer:

Web Address

 Uniform Resource Locator (URL)

A web address more commonly defines a unique name that helps people remember a URL. URL is the address of a document on the Internet.
It is usually in simpler form, such as Amazon.com URL is the address of a particular website, audio stream or document available on the web.
Generally your browser will recognize the proper URL when you type in a web address. URL consist of the Internet Protocol needed to access the item you wish to locate on the host computer.
Web address also known as URL, is an internet or intranet name that points to a location where a file, directory or website page is hosted. URL is madeup four parts – protocols, host name, folder name, and file name. Each part has its own specific function.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 45.
Explain briefly the components of DNS.
Answer:
There are three important components in the Domain Name System (DNS). They are
(i) Name space,
(ii) Name server,
(iii) Zone.

Name space:
The domain names must be very unique and appropriate. The names should be selected from a namespace. Hie namespace can be organised in two ways.

Flat name space:
It is where the name is assigned to the IP address. They do not have any specific structure. In this flat name space, some meaningful names are been given to IP address for accessing.

Hierarchical name space:
Hierarchical name space is where the name is made . up of several parts. The first part may represent the nature of organisation, the second part may represent the department of the organisation and so on.

Name servers:
The information which needs to be stored in domain name space is quite large. Single system would be inefficient and insufficient to store such a huge amount as responding to requests from all over the world.

The best way to do that is to divide the entire space into many domains and subdomains.

Name server is a main part in the Domain Name system (DNS). It translate the domain names to IP addresses.

Zone:
The entire name space is divided into many different zones. It is the area up to which the server has access.
Zone is defined as a group of contiguous domains and sub domains.
If the zone has a single domain, then zone and domain are the same.
There are two conies of zone files available, master file and slave file.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 46.
Classify and Explain the IP address.
Answer:
Internet Protocol (IP) address is simply the logical address in the network layer.
Due to increase in the number of system in a network there is a need of more addresses which lead to two addressing methods i.e., IPv4 and IPv6.

IPv4 Address:
IPv4 address is a 32-bit unique address given to a computer system. No two systems can have same IP address.
There are two ways to represent the IP address. They are: Binary notation, Dotted-decimal notation.
In binary notation the address is expressed as 32-bit binary values.
Eg: 00111001 10001001 00111000 00000111 .
In dotted-decimal notation the address is written in decimal format separated by dots(.).

Eg: 128.143.137.144

TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System) 2

IPv6 Address:
IPv6 address is a 128-bit unique address given to a computer system. The number of addresses that can be formed in IPv6 is 2<sup>128</sup>. In IPv6 address, the 128 bits are divided in to eight 16-bits blocks. Each block is then changed into 4-digit Hexadecimal numbers separated by colon symbols.

Eg: 2001 : 000 : 32313 : DFEI: 0063 : 0000 : 0000 : FEFB

TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System) 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 47.
Explain about the name server?
Answer:
(i) Name server contains the DNS database which consists of domain names and their corresponding IP addresses.
(ii) The information which needs to be stored in domain name space is quite large.
(iii) Single system would be inefficient and insufficient to store such a huge amount as responding to requests from all over the world.
(iv) The solution to this problem is to distribute the information among many computers.
(v) The best way to do that is to divide the entire space into many domains and sub domains.
(vi) Name server is a main part in the Domain Name System (DNS). It translate the domain names’to IP addresses.
(vii) There are three types of name servers which control the entire Domain Name system.
(viii) Root Name server – top level server which contains entire DNS tree, maintained by ICANN.
(ix) Primary / Master Name server – contains a zone resource records.
(x) Secondary / slave name server – contains a copy of primary server files.
This server has no authority to update.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 48.
What is domain name space? Explain.
Answer:
(i) Domain name space was designed to achieve hierarchical name space.
(ii) In this, the names are represented as a tree like structural with root element on the top and this tree can have a maximum of 128 levels starting from root element taking the level 0 to level 127.

TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System) 4

(iii) In this tree structure represent the domain name space where the root element is present at the top most level.
(iv) The next level to the root element is node. Each node in the tree has a label and a domain name.
(v) Label is a string which can have maximum of 63 characters. In other words, labels are the names given to domains.
(vi) Domain is a sub tree in domain name space tree structure. The domain can be further divided into sub domains.
(vii) Domain name is the sequence of labels.
(viii) Domain name is the sequence of labels. In domain name the sequence . of labels are separated by dot (.). The domain name is always read from the lower level to higher level.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 49.
Explain how the DNS is working.
Answer:
Domain Name System (DNS) is a client / server application.

When the user enters the URL (consists of protocol, domain name, folder name, file name) in the browser, the system first checks its DNS cache for the corresponding IP address.

If the IP address is found in the cache then the information is retrieved from the cache.

If not, then the system needs to perform DNS query i.e., the system needs to query the resolver about the IP address from Internet Service Provider (ISP).

Each resolver has its own cache and if it is found in that then the query is passed to next domain server i.e., TLD (Top Level Domain) which reviews the request and direct the query to name servers associated with that specific domain. Until the query is solved it is passed to next level domains.

Finally the mapping and the record are returned to the resolver who checks whether the returned value is a record or an error. Then the resolver returns the record back to the computer browser which is then viewed by the user.

TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System) 5

Question 50.
Find out IP address of your system.
Answer:
(i) Click start menu and type command or cmd to open command prompt.

(ii) A command prompt window will be displayed. Type ipconfig and press enter.

(iii) The IP number is listed under IPv4 Address and IPv6 Address.
Answer:
192.168.1.3
08 – 60 – 6E – D9 – 6F – D7

(iv) Find out the MAC address of the network card in the list.
Answer:
00- 14-22-01 -23 -45

(v) Find out and analyze what the other information displayed on the screen.
Answer:

  1. Windows IP configuration
  2. Ethernet adapter, Local Area connection.
  3. Tunnel 1 adapter, pseudo-interface.
  4. Tunnel 1 adapter is atap- domain.name

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 51.
Find out IP address for the websites using command prompt.
Answer:
(i) Click start menu and type command or cmd to open command prompt.

(ii) A command prompt window will be displayed. Type tracert and press enter.
Answer:
Trace the root of HOST

(iii) From the displayed window. You’ll see the IPv4 and IPv6 address,
IPv4 address:

TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System) 6

IPv6 address:
2001 : 0DBB : AC 10 : FE01 : 0000 : 0000 : 0000 : 0000

(iv) Find out IP address for another website.
Answer:
Website – www.tn.gov.in
IP address – 218.248.161.134
10.208.48.1

Question 52.
List out websites to find out IP address of other websites For example:
https://ipinfo.info/html/ip_checker.php
Answer:

  1. https://www.site24x7.com / Find – IP – address – of – web-site.html
  2. https://www.ipvoid.com / find – website – IP/
  3. https://www.iplocation.net
  4. https://www.check-host.net / ip-info? lang-en
  5. https://www.ipneighbours.com

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 53.
Use nslookup in command line and analyse what purpose it is used.
Answer:
By using NSlookup

  • To find the IP address of a host.
  • Find the domain name of an IP address.
  • Find mail servers for a domain.

Question 54.
Buy your own domain name or create free sub-domain and connect free hosting servers.
Answer:
For example: www.goDaddy.com,www.webs.com
Use following any one website.

  1. www.hostinger.in / domain – name – search
  2. www.myhosting.com / domain – names /
  3. www.greengeoks.com
  4. www.namecheap.com / domains
  5. www.hostgator.com / domains.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Choose the correct answer:

Question 1.
Which one is application layer among in the several applications?
(a) DNS
(b) URL
(c) Name space
(d) Name Server
Answer:
(a) DNS

Question 2.
Which one of the following is a web address?
(a) tnschools.txt
(b) www.tnschools.txt
(c) www.tnschools.gov.in
(d) www.tnschools.gov.doc
Answer:
(c) www.tnschools.gov.in

Question 3.
Which one of the following is the internet protocol (IP) for www.tnschools. in?
(a) 45.163.69.307
(b) 45.183.69.407
(c) 35.173.79.307
(d) 35.173.69.207
Answer:
(d) 35.173.69.207

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 4.
Who was invented the Internet Domain Name System (DNS)?
(a) V. Mockapetris
(b) Jon Postel
(c) Both (a) and (b)
(d) None of these
Answer:
(c) Both (a) and (b)

Question 5.
Who was known as God of the Internet?
(a) Jon Postel
(b) Paul V. Mockapetris
(c) William Joes
(d) John Paul
Answer:
(a) Jon Postel

Question 6.
Which address is simply the logical address in the network layer?
(a) Internet Protocol(IP)
(b) Internet Transfer Protocol (TCP)
(c) Domain Name System (DNS)
(d) IPv4 Protocol
Answer:
(a) Internet Protocol(IP)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 7.
Which address is a 32-bit unique address given to a computer system?
(a) IP
(b) IPv4
(c) IPv6
(d) URL
Answer:
(b) IPv4

Question 8.
Which IP address to represent the Binary notation?
(a) IP
(b) URL
(c) IPv6
(d) IPv4
Answer:
(d) IPv4

Question 9.
Which IP address to represent Dotted-decimal notation?
(a) IP
(b) URL
(c) IPv6
(d) IPv4
Answer:
(d) IPv4

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 10.
Which address is a 128-bit unique address given to a computer system?
(a) IP
(b) IPv4
(c) IPv6
(d) URL
Answer:
(c) IPv

Question 11.
In IPv6 address, the 128 bits are divided into eight bit block.
(a) 8
(b) 12
(c) 15
(d) 16
Answer:
(d) 16

Question 12.
In IPv6 address, each block is then changed into 4-digit Hexadecimal numbers separated by symbols.
(a) ; (semi colon)
(b) : (colon)
(c) , (comma)
(d) .(full stop)
Answer:
(b) : (colon)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 13.
Which is the address of a document on the Internet?
(a) IP
(b) TCP
(c) URL
(d) DNS
Answer:
(c) URL

Question 14.
How many types URL divided into depending on the location of the document?
(a) 2
(b) 3
(c) 4
(d) 6
Answer:
(a) 2

Question 15.
How many important components in the Domain Name System (DNS)?
(a) 2
(b) 3
(c) 4
(d) 6
Answer:
(b) 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 16.
Which is the complete address of a document on the internet?
(a) Absolute URL
(b) Relative URL
(c) DNS
(d) Name space
Answer:
(a) Absolute URL

Question 17.
Which contains all the information that are required to find the files on the Internet?
(a) Absolute URL
(b) Relative URL
(c) DNS
(d) Name space
Answer:
(a) Absolute URL

Question 18.
How many parts are very important in Absolute URL?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 19.
Which is the partial address of a document on the Internet?
(a) Absolute URL
(b) Relative UR L
(c) DNS
(d) Name space
Answer:
(b) Relative UR L

Question 20.
Which contains only file name or file name with folder name?
(a) Absolute URL
(b) Relative URL
(c) DNS
(d) Name space
Answer:
(b) Relative URL

Question 21.
Which type of URL is used when the file is on the same server related to original document?
(a) Absolute URL
(b) Relative URL
(c) Both (a) and (b)
(d) None of these
Answer:
(b) Relative URL

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 22.
The must be very unique and appropriate.
(a) Domain names
(b) URL
(c) Domain Name Space
(d) Name server
Answer:
(a) Domain names

Question 23.
How many ways in the Name space can be organised?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Question 24.
Which type of name space is where the name is assigned to the IP address?
(a) Flat name space
(b) Hierarchical name space
(c) Name server
(d) Zone
Answer:
(a) Flat name space

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 25.
Which name space is where the name is made up of several parts?
(a) Flat name space
(b) Hierarchical name space
(c) Name server
(d) Zone
Answer:
(b) Hierarchical name space

Question 26.
Which was designed to achieve hierarchical name space?
(a) DNS
(b) Domain name space
(c) URL
(d) IP
Answer:
(b) Domain name space

Question 27.
Which is a sub tree in domain name space tree structure?
(a) Domain
(b) DNS
(c) URL
(d) IP
Answer:
(a) Domain

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 28.
Which is always read from the lower level to higher level of node?
(a) Domain
(b) Domain Name
(c) DNS
(d) IP
Answer:
(b) Domain Name

Question 29.
Which one of the following is cannot be used as first character of a domain name?
(a) Characters
(b) Numbers
(c) Hyphens
(d) None of these
Answer:
(c) Hyphens

Question 30.
What is the minimum and maximum length of the Domain names characters?
(a) 2 and 63
(b) 4 and 63
(c) 2 and 65
(d) 4 and 62
Answer:
(a) 2 and 63

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 31.
How many characters long in the domain names?
(a) 265
(b) 224
(c) 232
(d) 253
Answer:
(d) 253

Question 32.
What is the last part of a domain name?
(a) Domain name space
(b) Lower level domain
(c) Top level domain
(d) Middle level domain
Answer:
(c) Top level domain

Question 33.
Who is maintained by generic to level domains are used forgeneric purpose?
(a) IANA
(b) ICANN
(c) MSCL
(d) SUN
Answer:
(a) IANA

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 34.
Which of the following one is not a generic domain names?
(a) .com
(b) .edu
(e) .gov
(d) .in
Answer:
(d) .in

Question 35.
How many characters are used by generic domain names?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 36.
How many characters are used by country domain?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 37.
Which of the following one is not a country domain names?
(a) .in
(b) .us
(c) .edu
(d) .uk
Answer:
(c) .edu

Question 38.
Which is store the data and provide it to clients when queried by them?
(a) Name servers
(b) Name space
(c) Label
(d) Domain name space
Answer:
(a) Name servers

Question 39.
Which are programs that run on a physical system and store all the zone data?
(a) Name space
(b) Label
(c) Name servers
(d) Domain name space
Answer:
(c) Name servers

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 40.
Which is a main part in the domain name system?
(a) Name space
(b) label
(c) Name servers
(d) Domain name space
Answer:
(c) Name servers

Question 41.
How many types of Name servers?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 42.
Which is top level server that contains entire DNS tree, maintained ICANN?
(a) Root Name Server
(b) Primary Server
(c) Master Name Server
(d) Slave Name Server
Answer:
(a) Root Name Server

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 43.
Which server contains a zone resource records?
(a) primary
(b) master name
(c) secondary
(d) (a) or (b)
Answer:
(d) (a) or (b)

Question 44.
Which server contains a copy of Primary server files?
(a) Primary
(b) Secondary
(c) Slave Name
(d) (b) or (c)
Answer:
(d) (b) or (c)

Question 45.
Expansion of ICANN
(a) Internet corporation for Assigned Name and numbers
(b) International corporation Assigned Name and numbers
(c) International connection for Assigned Name and numbers
(d) Internet connection for Arranged Name and numbers
Answer:
(a) Internet corporation for Assigned Name and numbers

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 46.
What is a program which is responsible for initiating the translation of a domain name into an IP address?
(a) Resolver
(b) DNS
(c) Label
(d) Name space
Answer:
(a) Resolver

Question 47.
Which is a program running on dedicated machine that handle the queries ofwww.enduser?
(a) Resolver
(b) Webserver
(c) DNS
(d) Label
Answer:
(b) Webserver

Question 48.
Which is used to host the websites and to deliver the contents of website using HTTP?
(a) Resolyer
(b) DNS
(c) Label
(d) Server
Answer:
(d) Server

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 49.
Which is reviews the request and direct and the query to name servers associated with that specific domain?
(a) Low level domain
(b) Middle level domain
(c) Top level domain(TLD)
(d) Both (a) and (b)
Answer:
(c) Top level domain(TLD)

Question 50.
The ________ is a service of ICANN.
(a) NHOIS
(b) WHOES
(c) WHOSE
(d) WHOSS
Answer:
(a) NHOIS

Question 51.
Match the following:

(A) IP (i) IP addresses
(B) DNS (ii) Logical address
(C) IPv4 (iii) 128 bit address
(D) IPv6 (iv) 32 bit address

(a) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(d) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 52.
Match the following:

(A) Name space(i) sequence of labels
(B) Domain Name space(ii) Nodes
(C) Label(iii) Hierarchical name space
(D) Domain Name(iv) Domain names

(a) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(b) (A) – (iii); (B) – (i); (C) – (ii)- (D) – (iv)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 53.
Match the following:

(A) .com(i) Country domain
(B) .in(ii) Zone data
(C) Name servers(iii) Contiguous domains
(D)Zone(iv) Generic domain name

(a) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)
(b) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(c) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(d) (A) – (ii); (B) – (i); (C)-(iv); (D) – (iii)
Answer:
(a) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 54.
Match the following:

(A) URL (i) Local Name Server
(B) Relative URL (ii) Four parts
(C) Absolute URL (iii) Folder name
(D) ISP (iv) Complete Address

(a) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(b) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
Answer:
(b) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Question 55.
Match the following:

(A) ICANN (i) Authority of ICANN
(B) IANN (ii) Service of ICANN
(C) TLD (iii) Regulates an Internet
(D) WHOIS (iv) Below the root domain

(a) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(b) (A) – (iii); (B) – (i); (C) – (ii); (D) – (iv)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B)-(iii); (C) – (iv); (D) – (i)
Answer:
(d) (A) – (ii); (B)-(iii); (C) – (iv); (D) – (I)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 56.
Choose the incorrect pair.
(a) DNS – Host names
(b) IPv6 – Hexa decimal numbers
(c) IPv4 – Binary numbers
(d) http – Domain name
Answer:
(d) http – Domain name

Question 57.
Choose the incorrect pair.
(a) URL – Absolute
(b) Name space – Relative URL
(c) Domain name space – Hierarchical name space
(d) Node – lable
Answer:
(b) Name space – Relative URL

Question 58.
Choose the incorrect pair.
(a) Domain name – separate by dot
(b) Domain name – 253 character
(c) .info – country domain name
(d) Unicode – Generic domain name
Answer:
(d) Unicode – Generic domain name

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 59.
Choose the correct pair.
(a) .au – Generic domain name
(b) ICANN – Root Name Server
(c) Zonefile – Name space
(d) Protocol – Top Level Domain
Answer:
(b) ICANN – Root Name Server

Question 60.
Choose the correct pair.
(a) Resolver – domain names
(b) Domain – Protocol
(c) TLD – IP address
(d) LANA – Naming system
Answer:
(a) Resolver – domain names

Question 61.
Choose the incorrect statement.
(a) DNS maintains all the directory of domain names / host names and help us to access the website.
(b) There are several applications in the application layer and DNS is one among them.
(c) Domain names to IP address mapping is not consistent across the network.
(d) DNS provides the domain name to IP address mapping through Name servers.
Answer:
(c) Domain names to IP address mapping is not consistent across the network.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 62.
Choose the incorrect statement.
(a) IPv6 address is a 128 bit unique address given to a computer system.
(b) The number of addresses that can be formed in IPv6 is 2128
(c) In IPv6 address, the 128 bits are divided into eight 16-bits blocks.
(d) Each block is then changed into 3-digit octal numbers separated by colon.
Answer:
(d) Each block is then changed into 3-digit octal numbers separated by colon.

Question 63.
Choose the incorrect statement.
(a) URL is the address of a document on the internet
(b) Absolute URL is the additional information can be added to the URL
(c) Absolute URL is the complete address of a document on the internet
(d) Relative URL is the partial address of a document on the internet.
Answer:
(b) Absolute URL is the additional information can be added to the URL

Question 64.
Choose the correct statement.
(a) In domain names, Hyphens are allowed, but hyphens cannot be used as first character.
(b) Spaces are allowed in a domain name.
(c) Domain names have the minimum length of 6 characters.
(d) Domain names are case-sensitive.
Answer:
(a) In domain names, Hyphens are allowed, but hyphens cannot be used as first character.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 65.
Choose the correct statements.
(a) Country domain uses 3 character country abbreviation according to country.
(b) Name servers are programs that run on a physical system and store all the zone data.
(c) Name server is a sub part in the Domain Name system
(d) Name servers does not the important task of searching the domain names.
Answer:
(b) Name servers are programs that run on a physical system and store all the zone data.

Question 66.
Assertion (A):
There are three types of name servers which control the entire domain name system.
Reason (R):
The three types of name servers are root name server, primary / master. Name server, and secondary / slave name server.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false
(d) A is false, But R is true
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Question 67.
Assertion (A):
Every zone has the server which contains a database called . zone file.
Reason (R):
Using the zone file, the DNS server does not replies the queries about hosts in its zone.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(c) A is true, But R is false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 68.
Assertion (A):
Domain Name space is an entire collection Domains, sub domains and zones.
Reason (R):
A domain is a single node of the Domain Name space.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 69.
Assertion (A):
Label is a string which can have maximum of 128 characters.
Reason (R):
Domain name is the sequence of labels separated by dot (•).
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(d) A is false, But R is true.

Question 70.
Assertion (A):
URL is the address of the protocol and is made up of three parts.
Reason (R):
Name servers are system software, and control the physical system.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, But R is false.
(d) A is false, But R is true.
Answer:
(b) Both A and R are false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 71.
Pick the odd one out.
(a) IP
(b) IPv4
(c) IPv6
(d) DNS
Answer:
(d) DNS

Question 72.
Pick the odd one out.
(a) client
(b) name space
(c) name server
(d) zone
Answer:
(a) client

Question 73.
Pick the odd one out.
(a) .com
(b) .edu
(c) .info
(d) .jp
Answer:
(d) .jp

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 74.
Pick the odd one out.
(a) .au
(b) .cn
(c) .net
(d) OP
Answer:
(c) .net

Question 75.
Pick the odd one out.
(a) host name
(b) resolver
(c) folder name
(d) file name
Answer:
(b) resolver

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 76.
Which of the following is used to maintain all the directory of domain names?
(a) Domain name system
(b) Domain name space
(c) Name space
(d) IP address
Answer:
(a) Domain name system

Question 77.
Which of the following notation is used to denote IPv4 addresses?
(a) Binary
(b) Dotted-decimal
(c) Hexadecimal
(d) (a) and (b)
Answer:
(d) (a) and (b)

Question 78.
How many bits are used in the IPv6 addresses?
(a) 32
(b) 64
(c) 128
(d) 16
Answer:
(c) 128

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 79.
Expansion of URL is:
(a) Uniform Resource Location
(b) Universal Resource Location
(c) Uniform Resource Locator
(d) Universal Resource Locator
Answer:
(c) Uniform Resource Locator

Question 80.
How many types are available in Relative URL?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 81.
Maximum characters used in the label of a node?
(a) 255
(b) 128
(c) 63
(d) 32
Answer:
(c) 63

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 82.
In domain name, sequence of labels are separated by:
(a) ;
(b) .(dot)
(c) :
(d) NULL
Answer:
(b) .(dot)

Question 83.
Pick the odd one out from the following.
(a) node
(b) label
(c) domain
(d) server
Answer:
(a) node

Question 84.
Which of the following initiates the mapping of domain name to IP address?
(a) Zone
(b) Domain
(c) Resolver
(d) Name servers
Answer:
(c) Resolver

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 85.
Which is the contiguous area up to which the server has access? _
(a) Zone
(b) Domain
(c) Resolver
(d) Name servers
Answer:
(a) Zone

Question 86.
ISP stands for:
(a) International Service provider
(b) Internet Service Provider
(c) Internet service Protocol
(d) Index service provider
Answer:
(b) Internet Service Provider

Question 87.
TLD stands for:
(a) Top Level Data
(b) Top Logical Domain
(c) Term Level Data
(d) Top Level Domain
Answer:
(d) Top Level Domain

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 88.
Which of the following statements are true?
(i) Domains name is a part of URL.
(ii) URL made up of four parts
(iii)The relative URL is apart of Absolute URL
(iv) URL doesn’t contain any protocol .
(a) (i) and (ii)
(b) (ii)
(c) (i), (ii) and (iii)
(d) (i), (ii) and (iv)
Answer:
(c) (i), (ii) and (iii)

Question 89.
Assertion (A):
The number of addresses used in IPv6 addressing method is 128.
Reason (R):
IPv6 address is a 128 bit unique address.
(a) A is true and R is false.
(b) A is false and R is true.
(c)Both A and R are correct and R is the correct explanation of A.
(d)Both A and R are correct and R is not the correct explanation of A.
Answer:
(b) A is false and R is true.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 12 DNS (Domain Name System)

Question 90.
Match the following:

(A) Domain(i) Programs that initiates translation
(B) Zone(ii) Contains database of domain names
(C) Name server(iii) Single node
(D) Resolver(iv) Contiguous node

(a) (A) – (i); (B) – (iv); (C) – (iii); (D) – (ii)
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(c) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(d) (A) – (iii)-, (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 1.
What is meant by coaxial cables?
Answer:

  1. The coaxial cable got its name by the word coax it is a geometric word where the axis between the insulator and the shield.
  2. Here the shield is meant the copper inside the cable.

Question 2.
Write the some of the Coaxial cable names.
Answer:
Some of the coaxial cable names are Media Bridge 50-feet Coaxial Cable, Amazon basics CL2-Rated Coaxial Cables etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 3.
What is the main uses fibre optics cable?
Answer:

  1. Fibre optics cable is of strand’s of glass and pulse of light is used to se i d the information.
  2. They are mainly used in Wide Area Network (WAN). The WAN is a network that extends to very large distance to connect the computes.

Question 4.
What is Dongles?
Answer:
The Dongle is a small peripheral device which has a compatible of mobile broadband with a sim slot in it and connects the Internet and acts as a modem to the computer.

Question 5.
Write the uses of different version in USB.

  1. USB 2.0 has 480 Mbps.
  2. USB 3.0 has the data transfer rate 4.85 Gbps.
  3. Micro USB is a miniaturized version of the USB used for connecting smart phones.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 6.
What is null modem able?
Answer:
The parallel cables are used to connect to the printer and other disk drivers. RS232 is one type of serial cable, also known as Null modem cable.

Question 7.
What is Ethernet cables?
Answer:
Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.

Question 8.
What is the main purpose of the Ethernet cables?
Answer:
The main purpose of the Ethernet cables connects wired devices within the Local Area Network (LAN) for sharing the resources and accessing Internet.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 9.
What is Crossover Ethernet Cable?
Answer:
The Crossover Ethernet cable is an example of the Null modem cables. This cable is used to join two computers or two network devices of the same type.

Question 10.
Write the some types of Wired media in network.
Answer:
Computers can be connected on the network with the help of wired media. They are Unshielded Twisted Pair, Shielded Twisted Pair, Co-axial Cables and Optical Fibre.

Question 11.
Write the some types of Wireless media in networking?
Answer:
Wireless media are Infra Red, Bluetooth, WiFi etc.,

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 12.
What are the components are used in the Ethernet cables?
Answer:

  1. Patch Cable (Twisted Pair),
  2. RJ45 Connector,
  3. Ethernet ports,
  4. Crimping Tool.

Question 13.
What is difference between Wired and Wireless networks?
Answer:

Wired Network Wireless Network
Wired networks for larger area are more expensive. Wireless networks for larger area are less expensive and more comfortable.
Wired networks are still used widely in the offices where need increased speed and secure connections. Wireless networks enable more devices                including mobiles sharing the resources and Internet connections remotely.

Question 14.
Write a note on Patch cable.
Answer:

  1. Patch cable are generally made up of 8 wires in different colours. Four of them are solid colours, and the others are striped.
  2. The eight colours are White green, Green, White orange, Blue, White blue, Orange, White brown, and Brown.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 15.
What is RJ45 Ethernet connector?
Answer:
RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.

Question 16.
Expand RJ45.
Answer:
The RJ45, “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.

Question 17.
What is meant by coaxial cables?
Answer:

  1. The coaxial cable got its name by the word coax it is a geometric word where the axis between the insulator and the shield.
  2. Here the shield is meant the copper inside the cable.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 18.
Write the some of the Coaxial cable names.
Answer:
Some of the coaxial cable names are Media Bridge 50-feet Coaxial Cable, Amazon basics CL2-Rated Coaxial Cables etc.,

Question 19.
What is the main uses fibre optics cable?
Answer:

  1. Fibre optics cable is of strands of glass and pulse of light is used to se id the information.
  2. They are mainly used in Wide Area Network (WAN). The WAN a network that extends to very large distance to connect the computers.

Question 20.
What is Dongles?
Answer:
The Dongle is a small peripheral device which has a compatible of mobile broadband with a sim slot in it and connects the Internet and acts as a modem to the computer.

Question 21.
Write the uses of different version in USB.
Answer:

  1. USB 2 0 has 480 Mbps.
  2. USB 3.0 has the data transfer rate 4.85 Gbps.
  3. Micro USB is a miniaturized version of the USB used for connecting smart phones.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 22.
What is null modem cable?
Answer:
The parallel cables are used to connect to the printer and other disk drivers. RS232 is one type of serial cable, also known as Null modem cable.

Question 23.
What is Ethernet cables?
Answer:
Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.

Question 24.
What is the main purpose of the Ethernet cables?
Answer:
The main purpose of the Ethernet cables connects wired devices within the Local Area Network (LAN) for sharing the resources and accessing Internet.

Question 25.
What is known as 8P8C Connector?
Answer:

  1. The RJ45 Connector has eight pins and connected to each end of the Ethernet cable.
  2. It has 8-Position, 8-Contact modular plug, so it is also known as 8P8C connector.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 26.
What are wiring schemes available in RJ45?
Answer:

  1. Wiring schemes specifies how the wires to be connected with RJ45 connector.
  2. There are two wiring schemes available to terminate the twisted-pair cable on each end, which are T-568A and T-568B.

Question 27.
What are the usage of four pairs wires in RJ45 Connector?
Answer:
Four pairs of wires are available in the cable, Ethernet uses only two pairs Orange and Green. The other two colors blue and brown can be used ISDN or Phone connections.

Question 28.
What is an Ethernet Card?
Answer:
An Ethernet card is a Network Interface Card (NIC) that allows computers to connect and transmit data to the devices on the network.

Question 29.
Where can you found in Ethernet Port?
Answer:
Ethernet port is found on personal computers, laptops, routers, switches, hubs and modems.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 30.
What is the use an Ethernet dongles?
Answer:

  1. Some of them not having an Ethernet port use an Ethernet dongles to form a network with other devices.
  2. Devices or Computers which use WiFi only for networking eliminates both the cable and its port.

Question 31.
How can to find the Internet is connected?
Answer:

  1. When inject the plug into the port the two lights will glow in the computer, the one is green and another one is orange.
  2. The orange light will start blinks then it means the Internet is connected.

Question 32.
What is Crimping?
Answer:
Crimping is the process of joining two or more pieces of metal or wire by deforming one or both of them to hold each other.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 33.
What is Crimping Tool?
Answer:

  1. The crimping tool is a physical tool which is to connect the patch wire and the Ethernet connector.
  2. The crimping tool looks like a small cutting handle with two mold of Ethernet port.

Question 34.
What is Registered Jack?
Answer:
A Registered Jack commonly known as RJ is a network interface used for network cabling, wiring and Jack construction.

Question 35.
What is the primary function of the Registered Jack?
Answer:
The primary function of the Registered Jack is to connect different data equipment and telecommunications devices.

Question 36.
What are commonly known Registered Jacks?
Answer:
The commonly known Registered Jacks are RJ-11, RJ-45, RJ-21, and RJ-28.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 37.
What registered jacks refers when its wiring?
Answer:
The registered jack refers to the male physical connector (Plug), a female . physical connector (Jack) and its wiring.

Question 38.
Write short note on RJ-14 and RJ-61.
Answer:

  1. The RJ-14 is the same as RJ-11 which will be used for telephone lines where same it as 6 pins whereas the RJ-61 will have 8 pins.
  2. This RJ-61 will use the twisted pair cable with a modular 8 connection.

Question 39.
What is Amphenol?
Answer:
The Amphenol is a connector manufacturer. They manufactured RJ-21 connector. It has 50 pins with 25 pins at one end and 25 pins at the other end.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 40.
What are the types of wiring techniques to construct the Ethernet Cable?
Answer:
There are three types of wiring techniques to construct the Ethernet cable. It is also known as coding techniques. They are,

  1. Straight-Through Wiring
  2. Cross-Over Wiring
  3. Roll-Over Wiring

Question 41.
What is known as Rollover Cable?
Answer:

  1. Rollover cable is also known as yost cable or console cable.
  2. It is typically flat (and light blue color) to distinguish it from other types of network cabling.

Question 42.
What is USB?
Answer:
USB is Universal Serial Bus, it connects all the peripheral devices with the computers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 43.
What is WWW?
Answer:

  1. WWW (World Wide Web) definition comes from the World Wide Web Consortium (W3C).
  2. The World Wide Web is the universe of network – accessible information, an embodiment of human knowledge.

Question 44.
Write the usage of UTP and STP.
Answer:
UTP (Unshielded Twisted Pair) is used nowadays as modem cables for Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.
STP (Shielded Twisted Pair) is similar to UTP, but it is covered by an additional jackets to protect the wires from external interference.
These cables which are twisted to ignore electromagnetic interference.

Question 45.
What are the main uses of fiber optics cable?
Answer:

  1. The fiber optics cable is of glass and pulse of light is used to send the information.
  2. They are mainly used in Wide Area Network (WAN). The WAN is a network that extends to very large distance to connect the computers.
  3. The fiber optics cables are placed in deep underground to avoid any damage to the cables.
  4. The optic cable uses light to transmit the information from one place to another.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 46.
What are the different industrial standards Ethernet cables?
Answer:

  1. Ethernet cables are normally manufactured in several industrial standards such as Cat 3, cat 5, cat 6, cat 6e, and cat 7.
  2. ‘cat’ simply stands for category, and the following number indicates the version.
  3. Latest version denotes faster and higher frequencies, measured in Mhz.
  4. Increasing the size of the cable also lead to slower transmission speed.

Question 47.
Briefly details of the pin details in the Ethernet ports.
Answer:

  1. The Ethernet ports, the pin 1 shows the transmission positive, the pin 2 shows the transmission negative, the pin 3 shows the receiver positive.
  2. The pin 4 shows the reserved position it is nothing but tells the connection . for some other use.
  3. The pin 5,7,8 are also used as reserved position.
  4. The pin 6 shows the receiver negative.
  5. The two main signals of the pins, the one is the TX which is transmission of data and RX which is receiver of data.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 48.
Write the short note on Expansion card.
Answer:
Expansion card is a separate circuit board also called as PCI Ethernet card which is inserted into PCI slot on motherboard of a computer. Now a days Expansion card is built in type come with Ethernet cards which resides on motherboard. Wireless Ethernet cards are also available, which uses radio waves to transmit data.

Question 49.
Write the Alternative names for networking devices or Technology.
Answer:

Devices or Technology Alternative Names
Ethemet Technology RJ45, 802.3 (According to IEEE)
RJ45 Connector (Male) RJ45 plug, Ethemet connector, 8P8C connector.
RJ45 socket (Female) RJ45 Jack, Ethemet port
RJ45 cable Ethemet cable

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 50.
Write a short note on RJ-11 Registered Jack.
Answer:
RJ-11 is the most popular modem form of Registered Jack. It is found in home and office. RJ-11 is mainly used in telephone and landlines. RJ-11 has 6 pins. Where the two pins give the transmission configuration, the two pins give the receiver configuration and the other two pins will be kept for reserved. The two pin will have the positive terminal and the negative terminal.

Question 51.
Define Straight – Through wiring.
Answer:
The Ethernet cables used for ethemet connections are straight-through cables. These cable wires are in the same sequence at both ends of the cable, which means that pin 1 of the plug on one end is connected to pin 1 of the plug on the other end. The straight – through wiring cables are mostly used for connecting PC / NIC card to a hub. This is a simple physical connection used in printers, computers and other network interfaces.

Question 52.
Explain Cross – Over Wiring.
Answer:

  1. A cable to connect two computers or Ethernet devices directly together without a hub, then you will need to use a cross-over cable.
  2. The pairs (TX and RX lines) will be crossed which means pin 1 and 2 of the plug on one end are connected with pin 3 and 6 of the plug on other end, and vice versa.
  3. The easiest way to make a crossover cable is to make one end to T-568A color coding and the other end to T-568B.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 53.
Explain Roll-Over Wiring.
Answer:

  1. Roll over is a type of null-modem cable that is often used to connect a device console port to make programming changes to the device.
  2. The roll over wiring have opposite pin arrangements, all the cables are rolled over to different arrangements.
  3. The roll over cable, the coloured wires are reversed on other end. That is the pins on one end are connected with other end in reverse order.

Question 54.
How to determine the type of Ethernet cables?
Answer:

  1. Straight – through:
    The coloured wires are in the same sequence at both ends of the cable.
  2. Cross – Over:
    The first coloured wire at one end of the cable is the third coloured wire at the other end of the cable.
  3. Roll – Over:
    The coloured wires are in the opposite sequence at either end of the cable.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 55.
Discuss about wiring schemes with colour codes of the connector.
Answer:
There are two wiring schemes available to terminate the twisted-pair cable on each end, which are T-568A and T-568B.
The pinouts and colour coding of these schemes.

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling 1

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling 2

Question 56.
Explain the Tx transmission of data and Rx receiver of data in the pin position details using colour codes of the connector.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling 3
The Ethernet wiring schemes (T568 A & T5698)
From the first figure,

(i) The position of pin 1:
It describes the transmit data. It can be sent to both connection with the Tx (positive). Tx + is used in this position is white green.

(ii) The position of pin 2:
It describes the transmit data. The Tx has negative terminal and the color is used in the position is Green.

(iii) The position of pin 3:
The Rx is compatible to receive the data which has positive terminal and the color is used in this position is white orange.

(iv) The position of pin 4:
There will be no transmitting or receiving will exist. The color used in this pin is blue.

(v) The position of pin 5:
It is not connected or bidirectional and the color is white blue.

(vi) The position of pin 6:
Here, the Rx negative which has a negative terminal and the color used in this position is orange.

(vii) The position of pin 7:
It is not connected or bidirectional and the color is white brown.

(viii) The position of pin 8:
It is not connected or bidirectional and the color is brown.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 57.
Write the steps of crimping process for making Ethernet cables.
Answer:

  1. Cut the cable with desired length.
  2. Strip the insulation sheath about 1 inch from both end of the cable and expose the twisted pair.
  3. Untwist the smaller wires and arrange them into the proper wiring scheme, T568B preferred generally.
  4. Bring the wires tighter together and cut them down so that they all have the same length.
  5. Use the crimping tool to lock the RJ45 Connector on the cable. It should be strong enough to handle manual traction.
  6. Use a cable tester to verify the proper connectivity of the cable, if need.

Question 58.
Write about history of Internet.
Answer:

  1. Bob Metcalfe invented Ethernet in 1973.
  2. It was used for interconnecting advanced computer work stations, making it possible to send data to one another and to high-speed laser printers.
  3. Metcalfe and others then finalized an open Ethernet standard in 1980, and by 1985 it had become an IEEE standard.
  4. An Industry was bom, and Ethernet was ready for its meteoric rise.
  5. There have been a number of networking standards published in the 802 branch of the IEEE, including the 802.3 Ethernet and 802.5 Token Ring standards.
  6. However, most people still use the Ethernet name when referring to the network system described in the 802.3 standard.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 59.
Write a note on twisted pair cable.
Answer:

  1. Twisted pair cable is type of cable with two or more insulated wires twisted together.
  2. There are two types of twisted pair cables, Unshielded- Twisted Pair (UTP) and Shielded Twisted Pair.(STP)

Question 60.
What are the uses of USB cables?
Answer:

  1. USB (Universal Serial Bus) are used to connect keyboard, mouse and other peripheral devices.
  2. There are some special network devices used to connect the Internet through the USB called dongles.

Question 61.
Write a note on the types of RJ45 connector.
Answer:

  1. The RJ45 (Registered Jack 45) Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
  2. The RJ45 connector looks similar like a telephone jack but it looks a slightly wider. The Ethernet cables are sometimes called as RJ45 cables.

Question 62.
What is an Ethernet port?
Answer:

  1. Ethernet port is an opening which is a part of an Ethernet card. It accepts RJ45 connector with Ethernet cable.
  2. Now, most of the computers and laptops have a built- in Ethernet port for connecting the device to a wired network.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 63.
What is the use of Crimping tool?
Answer:

  1. The crimping tool is a physical tool which is used to connect the patch wire and the Ethernet connector.
  2. The crimping tool will puncture the connector and makes the wire set in the connector. Use the crimping tool to lock the RJ45 connector on the cable.

Question 64.
What are the types of twisted pair cables?
Answer:

  • Unshielded Twisted Pair (UTP) and
  • Shielded Twisted Pair (STP)

Question 65.
What is meant by champ connector?
Answer:

  1. The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end. It is also called as champ connector or Amphenol connector.
  2. The Amphenol is a connector manufacturer. The RJ21 interface is typically used for data communication trucking application.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 66.
Write a note on crossover cables.
Answer:

  1. The crossover cable is an example of the Null modem cables. This cable is used to join two PCs or two network devices of the same type.
  2. Crossover cable is the sophisticated Ethernet cable used to connect the Internet to the system. This cable works at a speed of 10 gbps and more.
  3. The Ethernet crossover cable is identical on both the ends.
  4. Nowadays Routers are being connected through the crossover cables to provide wireless network from the local network.

Question 67.
Write a short note on RJ45 connector.
Answer:

  1. The RJ45 (Registered Jack) Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
  2. The RJ45 connector looks like a telephone jack but it looks a slightly wider.
  3. The Ethernet cables are sometimes called as RJ45 cables. In RJ45 the V ‘RJ’ stands for the Registered Jack and the ‘45’ simply refers to the number of interface standard in the cable.
  4. RJ45 connector has eight pins and it has 8 – Position, 8 – Contact (8P8C) modular plug. It is also known as 8P8C connector.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 68.
What are the differences between serial and parallel ports?
Answer:

Serial Port

 Parallel Port

The serial port will send 1 bit at one time. The parallel port will send 8 bit at one time.
A serial port is a type of interface found on computers for connecting peripherals and Internet to the system. A Parallel port is also type of interface found on computers for connecting peripherals and Internet to the system.
It have been newer technologies such as Ethernet, Fireware and USB which transfers the data serially. These ports transfer data in parallel and it have been used Zipdrives, Scanners, External modems, audio cards, Web cams, hard disk, CD Roms etc.,
RS232 is one type of serial cable, also known as Null modem cable.The parallel port allows for a one – way transmission of data from the source to a secondary device, such as a printer.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 69.
What is meant by null modem cable?
Answer:

  1. The crossover cable, RS – 232 cable is also used for interconnecting two computers without modem. So it is also a Null modem cable.
  2. A cable interconnecting two devices directly is known as a null modem . cable.
  3. Null modem cable is a communication method to directly connect two DTEs (computer, terminal, printer etc.,) using on RS – 232 serial cable with a null modem connection the transmit and receive lines are crosslinked.
  4. Depending on the purpose, sometimes also one or more handshake lines are crosslinked.

Question 70.
What are the components involved in Ethernet cabling?
Answer:
Ethernet cabling is the process of connecting the computers with other devices using Ethernet cables. The four main components are involved in the Ethernet cabling components are:
(i) Patch Cable (Twisted pair):
These are generally made up of 8 wires in different colors. Four of them are solid colours, and the others are striped.

(ii) RJ45 Connector:
It has eight small pins inside to connect eight small wires in the patch cable. The eight cables has eight different colours.

(iii) Ethernet ports:
It is the jack where the Ethernet cable is to be connected.

(iv) Crimping Tool:
It is a physical tool which is used to connect the patch wire and the Ethernet Connector (RJ45).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 71.
What are the types of Fibre optic cables?
Answer:
There are two types of fibre, optic cables available, they are
(i) Single – mode (100 Base BX): A single mode cables are used for long distance transmission and at a high cost.
(ii) Multimode (100 Base SX): The Multimode cables are used for short distance transmission at a very low cost. The optic cables are easy to maintain and install.

Question 72.
What is meant by Registered Jack? Explain briefly the types of Jacks.
Answer:

  1. A Registered Jack commonly known as RJ is a network interface used for network cabling, wiring and jack construction.
  2. The primary function of the registered jack is to connect different data equipment and telecommunications devices.
  3. The commonly known registered jacks are RJ-11, RJ-45, RJ-21, and RJ-28.
  4. RJ-11: It is the most popular modem form of registered jack. This registered jack is mainly used in telephone and landlines.
  5. RJ-14 and RJ-61: The RJ – 14 is the same as RJ-11 which will be used for telephone lines where same it as 6 pins whereas the RJ-61 will have 8 pins.
  6. RJ-21: The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end. It is also called as champ connector or Amphenol connector manufacturer. The RJ-21 interface is typically used for data communication trucking applications.
  7. The Registered Jack refers to the male physical connector (plug), a female physical connector (Jack) and its wiring.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 73.
Explain wiring techniques used in Ethernet cabling.
Answer:
There are three types of wiring techniques to construct the Ethernet Cable. It is also known as color coding techniques. They are:

(i) Straight – Through Wiring:
In general, the Ethernet cables used for Ethernet connections are straight through cables. These cable wires are in the same sequence at both ends of the cable, which means that pin 1 of the plug on one end is connected to pin 1 of the plug on the other end.

The straight throw wiring cables are mostly used for connecting PC / NIC card to a hub. This is a simple physical connection used in printers, computers and other network interfaces.

(ii) Cross – Over Wiring:
A cable to connect two computers or Ethernet devices directly together without hub, then you will need to use a crossover cable.

The pairs (TX and RX lines) will be crossed which means pin 1 and 2 of the plug on one end are connected with pin 3 and 6 of the plug on other end, and vice versa (3 and 6 to pin 1 and 2)

(iii) Roll – Over Wiring:
Roll over cable is a type of null-modem cable that is often used to connect a device console part to make programming changes to the device.

The roll over wiring have opposite pin arrangements, all the cables are rolled over to different arrangements.
In the rollover cable, the pins on one end are connected with other end in reverse order, (i.e., pin 1 to 8, 2 to 7, 3 to 6, 4 to 5, 5 to 4, 6 to 3, 7 to 2,8 to 1).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 74.
Explain about RJ45 connector.
Answer:

  1. The RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
  2. The RJ45 connector looks similar a telephone jack but it looks a slightly wider.
  3. The Ethernet cables are sometimes called as RJ45 cables. In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
  4. Each RJ45 connector has eight pins and connected to each end of the Ethernet cable. Since it has 8 – Position, 8 – Contact (8P8C) modular plug. It is also known as 8P8C connector.
  5. The RJ45 connector has eight small jack inside to connect eight small wires of the patch cable. The eight cables are in eight different colours.
  6. The RJ45 has four pairs of wires are available in the cable, Ethernet uses only two pairs orange and green. The other two colors (blue and brown) can be used ISDN or Phone connections.
  7. The commonly known Registered Jacks are RJ-11, RJ-45, RJ-21, and RJ-28. The Registered Jack refers to the male physical connector (plug), a female physical connector (Jack) and its wiring.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 75.
Explain the components used in Ethernet cabling.
Answer:
The four main components are used in the Ethernet cabling components are:
(a) Patch cables:
Patch cables are generally made up of 8 wires in different colours. Four of them are solid colours, and the others are stripped. The eight colours are white green, green, white orange, blue, white blue, orange, white brown and brown.

(b) RJ45 Connector:
(i) RJ45 connector looks similar like a telephone jack but it looks a slightly wider. The Ethernet cables are sometime called as RJ45 cables.
(ii) In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
(iii) The RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.

(c) Ethernet card and Port:
(i) Ethernet card and port is a .Network Interface Card (NIC) that allows computers to connect and transmit data to the devices on the network.
(ii) Wireless Ethernet cards are also available, which uses radio waves to transmit data.
(iii) Ethernet port is an opening which is a part of an Ethernet card. It is found on personal computers, laptops, routers, switches, hub and modems.

(d) Crimping Tool:
(i) Crimping tool is the process of joining two or more piece of metal or wire by deforming one or both of them to hold each other.
(ii) The crimping tool is a physical tool which is used to connect the patch
wire and the Ethernet connector.
(iii) The crimping tool looks like a small cutting handle with two mold of Ethernet port.
(iv) The tool will puncture the connector and makes the wire set in the connector.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 76.
Explain the types of network cables.
Answer:
There are many types of cabling available in the networking. Here we discuss about six different cables.

(a) Coaxial Cables:
(i) The coaxial cable is used to transfer the information in a lOmbps. The cable is divided into thinnet and thicknet cables.
(ii) These cables have a copcer wire inside and insulation is covered on the top of the copper wire to provide protection to the cable.
(iii) Nowadays, coaxial cables are used for dish TV where the setup box and the Television is connected using the coaxial cable only.

(b) Twisted Pair cables:
(i) Twisted pair cables are type of table with two or more insulated wires twisted together.
(ii) The twisted cable has 8 wires which are twisted to ignore electromagnetic interference.
(iii) Therearetwotypesoftwistedpaircables,UnshieldedTwistedPair(UTP)and Shielded Twisted Pair (STP).
(iv) The UTP is used now a days as modem cables for Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.

(c) Fibre Optics:
(i) Fibre optics cable is a strands of glass and pulse of light is used to send the information.
(ii) It is used in Wide Area Network (WAN), these cables are placed in deep underground to avoid any damage to the cables. The optic cable are easy to maintain and install.

(d) USB Cables:
(i) The USB (Universal Serial Bus) cables are used to connect keyboard, mouse and other peripheral devices.
(ii) There are some special network devices used to connect the Internet through the USB called dongles.

(e) Serial and Parallel cables:
(i) The serial and parallel interface cables are used to connect the Internet to the system before 1980s and 1990s.
(ii) The serial port will send 1 bit at one time whereas the parallel port will send 8 bits at one time. The parallel cables are used to connect to the printer and other disk drivers.

(f) Ethernet Cables:
(i) Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.
(ii) This cable connects wired devices within the Local Area Network (LAN) for sharing the resources and accessing Internet.
(iii) The crossover Ethernet cable is an example of the Null Modem Cables. This cable is used to join two PCS or two network services of the same type.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 77.
Make your own crossover cable.

A. Purchase the following:
Answer:
(i) a patch cable (UTP cat 5e / 6) with desired length.
UTP CAT 5e or CAT 6 is available in electrical shops or Online providers. CAT 6 has higher performance than CAT 5e.

(ii) RJ45 Connector (8P8C modular plug) of both wiring schemes (T568A and T568B):
RJ45 connector for CAT 5e or CAT 6.

(iii) Crimping Tool:
RJ45

B. Construct the cable using the method described in the text book, with the help of crimping tool.
Answer:
The purpose of a crossover Ethernet cable is to directly connect one computer to another computer without going through a router, switch or hub.
(i) Cut into plastic sheath about 1 inch from end of the cut cable.
(ii) Unwind and pair the similar colors.
(iii) Pinch the wires and straighten them.
(iv) Carefully push all 8 unstripped colored wires into the connector. Note how the wires go all the way to the end.
(v) Carefully, place the connector into the Ethernet crimper and down on the handles directly.
(vi) When we remove the cable from crimmer tool, the cable is ready to use.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 78.
Connect two computers using crossover cable for sharing resources.
Answer:
(i) Configure IP Addresses:
First, we need to configure static IP address for each computer. Both computers should have IP addresses on same subnet.
Eg: IP address for computer 1 – 192.168.0.1
IP address for computer 2 – 192.168.0.2
Technically leave the “Default Gateway” and “Preferred DNS Server” field blank.

(ii) Crossover Cable:
A standard crossover cable where green and orange pairs are swapped and brown and blue pairs stay in same position.

(iii) Local user accounts:
Create user account on each computer that has same name and same password.

(iv) Disable Firewalls:
Disable the firewall on both computers to ensure that none of the file sharing ports can be blocked.
Control panel → Windows Firewall → Click off.
Finally, Two computers can access each other Start → Type “cmd” → type “Ping followed by IP address of other computers”.
Now we access “My network places” in window explorer and access other computer for sharing files, we need setup shared folder.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Choose the correct answer:

Question 1.
Who was invented by computer?
(a) Tim Berners Lee
(b) Charles Babbage
(c) Blaise Pascal
(d) John Napier
Answer:
(b) Charles Babbage

Question 2.
Which is used to transfer the information in a 10 mbps?
(a) Coaxial cables
(b) Twisted pair cables
(c) Fibre optics
(d) USB cables
Answer:
(a) Coaxial cables

Question 3.
Which cable is divided into thinnet and thicknet cables?
(a) Coaxial cables
(b) Twisted pair cables
(c) Fibre optics
(d) USB cables
Answer:
(a) Coaxial cables

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 4.
Which cables have a copper wire inside and insulation is covered on the top of the copper wire to provide protection to the cable?
(a) Coaxial
(b) Twisted pair
(c) Fibre
(d) USB
Answer:
(a) Coaxial

Question 5.
Which is type of cable with two or more insulated wires twisted together?
(a) Coaxial
(b) Twisted
(c) Fibre
(d) USB
Answer:
(b) Twisted

Question 6.
How many wires are twisted to ignore electromagnetic interference in Twisted pair cables?
(a) 4
(b) 6
(c) 8
(d) 10
Answer:
(c) 8

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 7.
How many types of twisted pair cables are available?
(a) 2
(b) 4
(c) 6
(d) 8
Answer:
(a) 2

Question 8.
Expansion of STP is:
(a) Strands Twisted Pair
(b) Similar Twisted Pair
(c) Shielded Twisted Pair
(d) Speed Twisted Pair
Answer:
(c) Shielded Twisted Pair

Question 9.
Which cable is of strands of glass and pulse of light is used to send the information?
(a) Coaxial cables
(b) Twisted pair cables
(c) Fibre optics
(d) USB cables
Answer:
(c) Fibre optics

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 10.
Which cable uses light to transmit the information from one place to another?
(a) Coaxial
(b) Twisted pair
(c) Fibre
(d) USB
Answer:
(c) Fibre

Question 11.
Which mode cables are used for long distance transmission and at a high cost?
(a) Open
(b) Close
(c) Single
(d) Multi
Answer:
(c) Single

Question 12.
Which mode cables are used for short distance transmission and at a very low cost?
(a) Open
(b) Close
(c) Single
(d) Multi
Answer:
(d) Multi

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 13.
Which cables are used to connect keyboard, mouse and other peripheral devices?
(a) Coaxial
(b) Twisted pair
(c) Fibre
(d) USB
Answer:
(d) USB

Question 14.
How many bit will send in serial port at one time?
(a) 1
(b) 2
(c) 6
(d) 8
Answer:
(a) 1

Question 15.
How many bit will send in parallel port at one time?
(a) 1
(b) 2
(c) 6
(d) 8
Answer:
(d) 8

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 16.
Which is one type of serial cable and known as Null modem cable?
(a) RS 213
(b) RS 215
(c) RS 231
(d) RS 232
Answer:
(d) RS 232

Question 17.
Which cable is the most common type of network cable mainly used for connecting the computers or devices?
(a) Coaxial
(b) Fibre
(c) Ethernet
(d) USB
Answer:
(c) Ethernet

Question 18.
Which cable is used to connect LAN for sharing the resources and accessing Internet?
(a) Coaxial
(b) Fibre
(c) Ethernet
(d) USB
Answer:
(c) Ethernet

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 19.
Which Ethernet cable is an example of the Null modem cables?
(a) Crossover
(b) Fibre
(c) USB
(d) Serial
Answer:
(a) Crossover

Question 20.
Which are being connected through the crossover cables to provide wireless network from the local network?
(a) Crossover
(b) Fiber
(c) USB
(d) Routers
Answer:
(d) Routers

Question 21.
A cable interconnecting two devices directly is known as:
(a) Crossover
(b) Routers
(c) Null modem
(d) USB
Answer:
(c) Null modem

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 22.
Which cable is the basic component of the Local Area Network?
(a) Crossover
(b) Coaxial
(c) Fiber
(d) Ethernet
Answer:
(d) Ethernet

Question 23.
How many main components are used in the Ethernet cable?
(a) 2
(b) 4
(c) 6
(d) 8
Answer:
(b) 4

Question 24.
Which cables are generally made up of 8 wires in different colours?
(a) Coaxial
(b) RJ45 Connector
(c) Patch cable
(d) Ethernet ports
Answer:
(c) Patch cable

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 25.
Which Ethernet cable is specially designed for making connection between two computers?
(a) Crossover
(b) Fibre
(c) USB
(d) Pointers
Answer:
(a) Crossover

Question 26.
Which Ethernet connector is a small plastic cup that will be used wire inside the connector?
(a) RS-11
(b) RJ-21
(c) RJ-28
(d) RJ-45
Answer:
(d) RJ-45

Question 27.
Which connector is looks similar like a telephone jack but it looks a slightly wider?
(a) RJ-11
(b) RJ-21
(c) RJ-28
(d) RJ-45
Answer:
(d) RJ-45

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 28.
In RJ45 the ‘RJ’ Stands for:
(a) Registered Jack
(b) Reserved Jack
(c) Reverse Jack
(d) Reuse Jack
Answer:
(a) Registered Jack

Question 29.
Which is a Network Interface card that allows computers to connect and transmit data to the devices on the network?
(a) Ethernet card
(b) Crimping Tool
(c) Registered Jack
(d) RJ45 connector
Answer:
(a) Ethernet card

Question 30.
Which is a separate circuit board also called as PCI Ethernet card?
(a) Ethernet card
(b) Expansion card
(c) Registered Jack
(d) RJ45 connector
Answer:
(b) Expansion card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 31.
Which is the process of joining two or more pieces of metal or wire by deforming one?
(a) Ethernet card
(b) Registered Jack
(c) Crimping Tool
(d) RJ45 connector
Answer:
(c) Crimping Tool

Question 32.
Which is a physical tool and is used to connect the patch wire?
(a) Ethernet card
(b) Registered Jack
(c) Crimping Tool
(d) RJ45 connector
Answer:
(c) Crimping Tool

Question 33.
Expand CSMA/CD:
(a) Carrier Sense Multiple Access with Collision Detection.
(b) Common Sense Many Access with Correct Deductions.
(c) Common Sense Multiple Access with Control Detection.
(a) Carrier Sound Muiupie Access with Collision Default.
Answer:
(a) Carrier Sense Multiple Access with Collision Detection.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 34.
Who was invented Ethernet?
(a) Tim Berners Lee
(b) Charles Babbage
(c) Blaise Pascal
(d) Bob Metcalfe
Answer:
(d) Bob Metcalfe

Question 35.
PARC Expansion of:
(a) Palo Alto Research Center
(b) Post Alto Research Center
(e) Past Alto Research Center
(d) Public Alto Research Center
Answer:
(a) Palo Alto Research Center

Question 36.
What is known as the male physical connector in Registered Jack?
(a) Plug
(b) Jack
(c) Wire
(d) Cable
Answer:
(a) Plug

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 37.
What is known as the Female physical connector in Registered Jack?
(a) Plug
(b) Jack
(c) Wire
(d) Cable
Answer:
(b) Jack

Question 38.
Which one of the following is the most popular modern form of Registered Jack?
(a) RJ-11
(b) RJ-45
(c) RJ-21
(d) RJ-28
Answer:
(a) RJ-11

Question 39.
Which will be used for telephone lines where same it as 6 pins?
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-11
Answer:
(b) RJ-14

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 40.
Which will be used the twisted pair cable with a modular 8 connection?
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-11
Answer:
(c) RJ-61

Question 41.
Which is called Amphenol Connector? .
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-21
Answer:
(d) RJ-21

Question 42.
Which is act as for data communication trucking application?
(a) RJ-45
(b) RJ-14
(c) RJ-61
(d) RJ-21
Answer:
(d) RJ-21

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 43.
How many types of wiring techniques to construct Ethernet cable?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 44.
Which is known as color coding techniques?
(a) Ethernet
(b) RJ-21
(c) RJ-45
(d) RJ-61
Answer:
(a) Ethernet

Question 45.
Which is used for Ethernet connection are straight through cables?
(a) Ethernet cables
(b) RJ-21
(c) RJ-45
(d) RJ-61
Answer:
(a) Ethernet cables

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 46.
Which is a type of null modem cable?
(a) Straight-through wiring
(b) Cross-over wiring
(c) Roll-over wiring
(d) Ethernet cables
Answer:
(c) Roll-over wiring

Question 47.
Rollover cable is also known as:
(a) Yost cable
(b) Console cable
(c) (a) and (b)
(d) None of these
Answer:
(c) (a) and (b)

Question 48.
Which is coloured wires are in the same sequence at both ends of the cable?
(a) Straight-through
(b) Cross-over
(c) Roll-over
(d) Ethernet
Answer:
(a) Straight-through

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 49.
Which is the first coloured wire at one end of the cable is the third coloured wire at the other end of the cable?
(a) Straight-through
(b) Cross-over
(c) Roll-over
(d) Ethernet
Answer:
(b) Cross-over

Question 50.
Which is the coloured wires are in the opposite sequence at either end of the cable?
(a) Straight-over
(b) Cross-over
(c) Roll-over
(d) Ethernet
Answer:
(c) Roll-over

Question 51.
Match the following:

(A) Coaxial cables (i) 10 BASE – T Cable
(B) Twisted pair cables (ii) dongles
(C) Fibre optics (iii) Copper wire
(D) USB cables (iv) Strands class

(a) (A) – (iii); (B) – (ii); (C) – (iv); (B) – (i)
(b) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
Answer:
(b) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 52.
Match the following:

(A) Patch cable (i) Physical Tool
(B) RJ45 Connector (ii) Network Interface Card (NIC)
(C) Ethernet Port (iii) Plastic cup
(D) Crimping Tool (iv) Twisted Pair

(a) (A) – (i); (B) – (iii); (C) – (ii); (B) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
(c) (A) – (iii); (B) – (i); (C) – (ii); (D) – (iv)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 53.
Match the following:

(A) Ethernet Technology (i) 8P8C connector
(B) RJ45 Connector (ii) IEEE
(C) RJ45 Socket (iii) Ethernet Cable
(D) RJ45 Cable (iv) RJ45 Jack

(a) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 54.
Match the following:

(A) RJ(i) Land lines
(B) RJ – 11(ii) Amphenol connector
(C) RJ – 61(iii) Network Interface
(D) RJ – 21(iv) Twisted Pair cable

(a) (A) – (iiî); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(c) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(a) (A) – (iiî); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 55.

(A) USB(i) directly connects two computers
(B) Null Modem(ii) Sim slot
(C) TX/RX(iii) Connect to peripheral devices
(D) Dongles(iv) Transmit / Receive signals

(a) (A) – (iii); (B)-(ii); (C) – (iv); (D) – (i)
(b) (A) – (iii) (B) – (i); (C) – (iv); (D) – (ii)
(c) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(b) (A) – (iii) (B) – (i); (C) – (iv); (D) – (ii)

Question 56.
Choose the incorrect pair:
(a) ARPANET – Modem Internet
(b) Computer – Charles Babbage
(c) WWW – Tim Berners Lee
(d) Coaxial cables -1990
Answer:
(d) Coaxial cables -1990

Question 57.
Choose the incorrect pair:
(a) Coaxial cables – Aluminium cable
(b) Twisted pair cables – Insulated wires
(c) Fibre optics – Pulse of light
(d) Serial cable – RS232
Answer:
(a) Coaxial cables – Aluminium cable

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 58.
Choose the incorrect pair:
(a) Twisted pair – 8 wires
(b) RJ45 – Colour code
(c) 8P81 – Connector
(d) T – 568A – Wiring schme
Answer:
(b) RJ45 – Colour code

Question 59.
Choose the correct pair:
(a) Ethernet – Bob Metcalfe
(b) IEEE – USA company
(c) PC / NIC – Wiring method
(d) Cross over – Cable manufacturer
Answer:
(a) Ethernet – Bob Metcalfe

Question 60.
Choose the correct pair:
(a) 100 Base BX – Multi mode
(b) 100 Base SX – Single mode
(c) Serial Port – 1 bit
(d) Parallel port – 28 bits
Answer:
(c) Serial Port – 1 bit

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 61.
Choose the incorrect statement:
(a) Coaxial cable is used to connect the Television sets to home antennas.
(b) Coaxial cable is used to transfer the information in a 100 mbps.
(c) Coaxial cable is divided into thinnet and thicknet cables.
(d) Media Bridge 50 – feet coaxial cable is a type of coaxial cable.
Answer:
(b) Coaxial cable is used to transfer the information in a 100 mbps.

Question 62.
Choose the incorrect statement:
(a) The crossover Ethernet cable is an example of the Null modem cables.
(b) Computers can be connected on the network with the help of wired media or wireless media.
(c) Wired networks enable more devices including mobile sharing the resources and Internet connections remotely.
(d) The computers with wired connections must be configured with Ethernet card.
Answer:
(c) Wired networks enable more devices including mobile sharing the resources and Internet connections remotely.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 63.
Choose the incorrect statement:
(a) The Ethernet cable is the basic component of the LAN.
(b) RJ45 connector is made up of plastic cubes connected at the both the ends.
(c) The plastic covering is used to provide protection to the wires.
(d) The patch cables has eighteen small wires inside different colours.
Answer:
(d) The patch cables has eighteen small wires inside different colours.

Question 64.
Choose the correct statement:
(a) A crossover Ethernet cable is specially designed for making connection between two computers.
(b) The Ethernet cables are sometimes called as RJ65 cables.
(c) The RJ65 connector has eighteen small jack inside to connect eighteen small wires of the patch cable.
(d) There are eight wiring schemes available to terminate the twisted-pair cable on each end.
Answer:
(a) A crossover Ethernet cable is specially designed for making connection between two computers.

Question 65.
Choose the correct statement:
(a) The crimping tool is a physical tool which is used to connect the modem and computer.
(b) The crimping tool looks like a small cutting handle -with six mold of Ethernet port.
(c) The primary function of the registered jack is to connect different data equipment and telecommunication devices.
(d) The rollover wiring have some side pin arrangements.
Answer:
(c) The primary function of the registered jack is to connect different data equipment and telecommunication devices.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 66.
Assertion (A):
Twisted pair cables is type of cable with two or more insulated wires twisted together.
Reason (R):
The coaxial cables are used for Dish TV where the setup box and the Television is connected.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 67.
Assertion (A):
There are some special network devices used to connect the Internet through the USB called dongles.
Reason (R):
The dongle is a small peripheral device which has a compatible of mobile broadband with a sim slot in it.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(a) Both A and R are true, and R is the correct explanation for A

Question 68.
Assertion (A):
Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices.
Reason (R):
The crossover Ethernet cable is an example of serial cable.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true. But R is false.
(d) A is false. But R is True.
Answer:
(c) A is true. But R is false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 69.
Assertion (A):
Wireless Ethernet cards are also available, which uses magnetic and Micro waves.
Reason (R):
Ethernet port is an opening which is a part of an Ethernet card.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(d) A is false, But R is True.

Question 70.
Assertion (A):
Expansion card is a addition a card which’ is inserted into motherboard.
Reason (R):
The crimping tool is a mechanical tool which is used to connect the USB.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are false.

Question 71.
Pick the odd one out:
(a) Coaxial
(b) Twisted Pair
(c) Fibre optics
(d) Null modem
Answer:
(d) Null modem

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 72.
Pick the odd one put:
(a) Patch cable
(b) Fibre optics
(c) RJ45 Connector
(d) Ethernet ports
Answer:
(b) Fibre optics

Question 73.
Pick the odd one out:
(a) Crimping tool
(b) Straight-Through
(c) Cross-over
(d) Roll-over
Answer:
(a) Crimping tool

Question 74.
Pick the odd one out:
(a) LAN
(b) MAN
(c) USB
(d) WAN
Answer:
(c) USB

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 75.
Pick the odd one out:
(a) RJ45
(b) RJ11
(c) RJ21
(d) RJ61
Answer:
(a) RJ45

Question 76.
ARPANET stands for:
(a) American Research Project Agency Network.
(b) Advanced Research Project Area Network
(c) Advanced Research Project Agency Network
(d) American Research Programs And Network
Answer:
(c) Advanced Research Project Agency Network

Question 77.
WWW was invented by:
(a) Tim Berners Lee
(b) Charles Babbage
(c) Blaise Pascal
(d) John Napier
Answer:
(a) Tim Berners Lee

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 78.
Which cable is used in cable TV to connect with setup box?
(a) UTP cable
(b) Fibre optics
(c) Coaxial cable
(d) USB cable
Answer:
(c) Coaxial cable

Question 79.
Expansion of UTP is:
(a) Uninterrupted Twisted Pair
(b) Uninterrupted Twisted Protocol
(c) Unshielded Twisted Pair
(d) Universal Twisted Protocol
Answer:
(c) Unshielded Twisted Pair

Question 80.
Which medium is used in the optical fibre cables to transmit data?
(a) Microwave
(b) Infra red
(c) Light
(d) Sound
Answer:
(c) Light

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 81.
Which of the following is a small peripheral device with a sim slot to connect the computers to Internet?
(a) USB
(b) Dongles
(c) Memory card
(d) Mobiles
Answer:
(b) Dongles

Question 82.
Which connector is used in the Ethernet cables?
(a) RJ11
(b) RJ21
(c) RJ61
(d) RJ45
Answer:
(d) RJ45

Question 83.
Which of the following connector is called as champ connector?
(a) RJ11
(b) RJ21
(c) RJ61
(d) RJ45
Answer:
(b) RJ21

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 84.
How many pins are used in FU45 cables?
(a) 8
(b) 6
(c) 50
(d) 25
Answer:
(a) 8

Question 85.
Which wiring standard is used for connecting two computers directly?
(a) Straight Through wiring
(b) Cross Over wiring
(c) Rollover wiring
(d) None
Answer:
(b) Cross Over wiring

Question 86.
Pick the odd one out from the following cables:
(a) roll over
(b) cross over
(c) null modem
(d) straight through
Answer:
(c) null modem

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 13 Network Cabling

Question 87.
Match the following:

(A) Ethernet (i) Port
(B) RJ45 connector (ii) Ethernet
(C) RJ45 jack (iii) Plug
(D) RJ45 cable (iv) 802.3

(a) (A) – (i); (B) – (ii); (C) – (iv); (D) – (iii)
(b) (A) – (iv); (B) – (i); (C) – (iii); (D) – (ii)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 1.
What is open source software?
Answer:
Open source software is usually created and updated by many programmers around the world and made freely accessible.

Question 2.
What is proprietary software?
Answer:
Proprietary software is owned by an organisation or individual. The makers of proprietary software have not allowed the users or other developers to view or edit the source code.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 3.
What are we need, when there are more systems connected in networking?
Answer:
We need Network software, Analysis the server, system, protocol, network, traffic flow UPS and Network parts.

Question 4.
What is Freeware?
Answer:
Freeware usually refers to proprietary software that users can download at no cost, but whose source code cannot be changed.

Question 5.
What are communication tools?
Answer:
E-mail, real-time messaging, forums, and Wikis are communication tools.

Question 6.
Define network parameters.
Answer:
The network parameters define the state of the network like node placement, existing links and the events like data transmissions, link failures etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 7.
What is API?
Answer:

  1. API (Application Program Interface) is a pure event base software, tool with super simulation design.
  2. It has more models which help the user to get desired output easily.

Question 8.
List out some open source Handware.
Answer:
Some open source hardware are Remix, Remake, Remanufacture, Redistribute, Resell, Study and Learn etc… ill. Answer the following questions in brief.

Question 9.
Explain Ideals of Open Source Code.
Answer:
(i) Share the goal:
A broad group of contributors recognize the same need and agree on how to meet.

(ii) Share the work:
Projects are broken into smaller tasks, and a review process screens the best contributions.

(iii) Share the result:
Code should be available to all and improvements should be shared to all.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 10.
Write short note on goal for open NMS.
Answer:

  1. The goal is for open NMS to be an actually distributed, scalable management application platform for all features of the FCAPS,
  2. FCAPS means Fault, Configuration, Accounting, Performance, Security.
  3. The other goals is for open NMS for network management model, presently the emphasis is on Fault and Performance Management.

Question 11.
What are types of open NMS?
Answer:
There are two types, are Meridian and Horizon.

  1. When we need stability and long term support choose meridian which is best for Enterprises as well as business.
  2. Horizon used where innovation occurs frequently. It is best for IT- ecosystem new technologic monitoring.

Question 12.
Expand the following:
(a) NS2,
(b) NMS,
(c) OTCI,
(d) GNU,
(e) SSFN,
(f) API.
Answer:
(a) NS2 – Network Simulation Version 2.
(b) NMS – Network Management Software.
(c) OTCI – Object Oriented Tool Command Language.
(d) GNU – General Public License.
(e) SSFN – Scalable Simulation Framework Net Models.
(f) API – Application Program Interface.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 13.
Write the Open Source Code Principle.
Answer:

  1. Open source code enable to read code.
  2. We can see how its made.
  3. The freedom to run the program for any purpose.
  4. The freedom to redistribute copies.
  5. The freedom to improve the program.

Question 14.
Write the steps for open-source software criteria.
Answer:

  1. Redistribution software.
  2. Availability and integrity source.
  3. License must not restrict other software.
  4.  Derived works.
  5. No discrimination against person.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 15.
What are the most popular licenses that allow programmers to modify the software?
According to the Black Duck knowledge base, a database of some two • million open source projects, five of the most popular licenses are:

  1. MIT license.
  2. GNU General Public License (GPL) 2.0
  3. Apache License 2.0
  4. GNU General Public License (GPL) 3.0
  5. BSD License 2.0 (3 – clause, New or Revised)

When you change the source code, OSS requires the inclusion of what you altered as well as your methods.
The software created after code modifications may or may not be made available for tree.

Question 16.
Describes Open source software and developers.
Answer:
Open source software projects are collaboration opportunities that improve skills and build connections in the field.
Areas that developers can work on include:

(i) Communication tools:
E-mail, real-time messaging, forums, and Wikis help developers to find solutions or bounce ideas off each other.

(ii) Distributed revision control systems:
When multiple developers in different geographical locations modify data and files, these systems manage the different versions and updates.

(iii) Bug trackers and task lists:
These features allow large-sale projects to monitor issues and keep track of their fixes.

(iv) Testing and debugging tools:
These features automate testing during system integration and debug other programs.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 17.
Explain the History of open source software.
Answer:

  1. The term “Open Source” was coined by Christine Peterson to describe free software.
  2. In early 1960’s any computer academy who develop a software shared its source code under the principle of open and co-operation.

Question 18.
What is meant by network simulator?
Answer:

  1. A network simulator is a software program that replicates the functioning of a computer network.
  2. In simulators, the computer network is typically demonstrated with devices, traffic etc., and the performance are evaluated.

Question 19.
What is trace file?
Answer:
(i) A significant output of simulation is the trace files.
(ii) Trace files can document every incident that happened in the simulation and are used for examination.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 20.
Write short notes on NS2.
Answer:

  1. NS2 (Network Simulator version 2) was considered explicitly for exploration in network communication and event-driven open-source simulator in computer.
  2. OTcl and C++ used to create and run NS2. NS2 works on windows and Linux platforms, that supports wired or wireless network.

Question 21.
Explain NRCFOSS.
Answer:
NRCFOSS (National Resource Centre for Free and Open Source Software) an Institution of Government of India. To help in development of FOSS in India.

Question 22.
Write short note on Open NMS.
Answer:

  1. Open NMS (Network Management System) is a free and open-source initiative grade network monitoring and management platform.
  2. Open NMS is the worlds first software for Network monitor and management with open source options.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 23.
What are the uses of Open Source Network Software?
Answer:

  1. Open Source Network Software give us more options to choose any type of software.
  2. Using open source Network software that shape our programming knowledge and skills.
  3. Using open source Network Software, where work with more people, so can know other views.
  4. Tell the errors and rectify it in quick time for using open source software.

Question 24.
Explain free software.
Answer:

  1. Free software is software that can be freely used, modified and redistributed with only one restriction any redistributed versions of the software must be distributed with the original terms of free use.
  2. The Free Software Directory maintains a large database of free software packages.
  3. Some of the best-known examples include the Linux Kemal, the BSD and Linux operating systems.

Question 25.
List out the Popular open source software.
Answer:
The popular open source software are NS2, Open NMS, Ubuntu, MySQL, PDF creator, Open Office, 7Zip, GNUCASH, GIMP, Blender, Audacity, VLC, Mozila Firefox, Magento etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 26.
Write note on open source hardware.
Answer:

  1. Open source hardware consists of physical artifacts of technology designed and offered by the open design movement.
  2. Open source hardware are created by this Open-source culture movement.
  3. FOSH (Free Open Source Hardware) is used mechanical drawings, schematics, bills of material, PCB layout data, HDL source code and integrated circuits.
  4. Programmable logic devices, sharing of logic designs has been a form of open-source hardware.

Question 27.
What are the main functional areas of Open NMS?
Answer:
Open NMS has three main functional areas:

  1. Service monitoring, where a number of monitor modules can govern if network – based services (ICMP, HTTP, DNS etc.,) are accessible.
  2. Data gathering by using SNMP and JMX.
  3. Event management and notifications, which comprises of alarm reduction and a robust announcement system with accelerations and duty schedules.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 28.
Explain types of organisation related to Open Source.
Answer:
Types of organisations related to open source are:

  1. Apache software foundation.
  2. The documents foundation.
  3. The Eclipse foundation.
  4. Free software foundation.
  5. Linux foundation.
  6. Open course ware consortium.
  7. Open source initiative.

Question 29.
Differentiate Proprietary and Open Source Software.
Answer:

Proprietary

 Open Source Software

Proprietary software refers to the software which is solely owned by the individual or publisher who developed it. Open Source refers to the software whose source code is available for anybody to access and modify.
Proprietary software is owned by an organization. Open Source Software or code is shared freely.
Traditionally, the makers of proprietary software have not allowed the users. Open Source Software is usually created and updated by many programmers around the world and made freely accessible.
Browser – Internet Explorer Browser – Mozilla Firefox

An example of proprietary operating system is windows. An example of open source operating system is Linux.
Office suit – Microsoft office Office suit – Open Office
Web CMS – Dot Net Nuke Web CMS – Drupal

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 30.
List out the Benefits of Open Source Software.
Answer:

  1. Give us more options to choose software.
  2. Full access there is no restrictions.
  3. Share our ideas and codes with all.
  4. Shape our programming knowledge.
  5. Work with more people, so can know others views.
  6. Tell the errors and rectify it in quick time.
  7. Make necessary change as per our software needs.
  8. User friendly.
  9. Remote management.
  10. Mobile view.

Question 31.
Explain various Open Source License.
Answer:

  1. Apache License 2.0
  2. BSD 2-clause “Simplified” or “Free BSD” license.
  3. GNU General Public License (GPL)
  4. GNU Library or “Lesser” General Public License (LGPL).
  5. MIT License
  6. Mozilla public License 2.0
  7. Common Development and Distribution License.
  8. Eclipse Public License.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 32.
Mention open source software and free software names that not explain in this chapter.
Answer:
Important open source software:
Free BSD, Drupal, Postgre SQL, Torch, Putty, NETcore, Vagarant, Open KM, Flight path, ak, Miranda IM, Taiga, Rudder, Dragon fly, Koders, Apertium, Ekiga, FreePBX, FreeSWITCH, Sim, Ring, Tox, Appachecocoon, HTTP File Server, Atutor, eFront, Moodle, OLAT, Omeka, SWAD, Pencil 2D, OpenFX, F-SPOT, Blender, Dscaler, Natron, F-spot, MEncoder and many more open source software available in the internet.

Freeware:
Skype, Micro Video Converter, Mozilla thunderbird, Quicksilver, Colibri, SpyBot, Fressbooks, RSSOWL, Vienna Cabos, Miro, Mplayer, CDBumer, Yami, Handbrake, LibreOffice, Abiword, Picasa Test, GIMP, Seashore, iTunes, GoogleEarth, Audacity, SmartFTP, Filezilla, NoteTablight, Bitcoin, mIRC, KVIrc, Colloquy and many more Freesoftware available in the internet.

Question 33.
Mention Software that are accounts related.
Answer:
Tally ERP9, Profit books, Busy Accounting software, Marg Accounting Software, Saral Accounting software, Zoho Books, MProfit, Quickbooks, Freshbooks, Gnucash, wave, Wings Accounting, Xero, Billing 360, LOGIC Account, Giddh, Alignbooks, Zipbooks, Integra Trade Plus, Reach, ANU Retail, Graveinvoice, Accounting Guru, Beyond square Financial Management System, Wave Accounting, Fraxinus Book ERP, Focus, Kount. Accounting, Express Accounts and many more Accounts softwares available in the internet.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 34.
Mention open source developing and maintaining companies.
Answer:
Open sources developing and maintaining companies play a major role in the open source software that powers today’s business.
(i) Adobe: It has a strong commitment to open source.
Headquarters: San Jose, Calif.

(ii) Automatic: WordPress open source project is how handled by this foundation.
Headquarters: San Francisco, Calif.

(iii) Canonical: This is the company behind ubuntu, one of the most popular Linux distributions on the planet.
Headquarters: London, UK

(iv) Chef: Chef is the name of both an open source system integration frame work.
Headquarters: Seattle, Wash.

(v) Cloud Bees: Cloud Bees is the company behind Jenkins.
Head quarters: San Jose, Calif.

(vi) Confluent: A major role in the big dataspace.
Head quarters: Palo Alto, Calif.

(vii) Databrick: Databricks is the company that popular big data streaming project.
Head quarters: San Francisco, Calif.

(viii) Data Stax: Data stax offers a commercially supported NoSQL database.
Head quarters: Santa clara, Calif.

(ix) Docker: Docker contain erization technology has emerged as one of the most open source projects.
Head quarters: San Francisco, Calif.

(x) Elastic: Best open source Elastic search projects.
Head quarters: Mountain view, Calif.
Facebook, Github, Google, Gradle, Hashi-corp, Horton works, Huawei, IBM, Intel Linkedin, Microsoft, MongoDB, Netflix, Nginx, NPM, Puppet, Red Hat, Redis Labs, Sauce Labs, Suse, Twitter etc., are the most common open source developing and maintaining companies.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Choose the correct answer:

Question 1.
Which software is owned by an organisation or individual?
(a) Free Software
(b) Open Source
(c) Proprietary
(d) All of these
Answer:
(c) Proprietary

Question 2.
Which software is used to control when there are more systems are connected?
(a) Free software
(b) Open source
(c) Proprietary
(d) Network Software
Answer:
(d) Network Software

Question 3.
Expansion of OSI:
(a) Open Source Initiative
(b) Open Source Integration
(c) Open Source Internet
(d) Open Source Interconnecting
Answer:
(a) Open Source Initiative

Question 4.
When was founded by open source initiative?
(a) 1996
(b) 1997
(c) 1998
(d) 1999
Answer:
(c) 1998

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 5.
Who is defined by four conditions, as outlined by the non profit free software foundation?
(a) Richard Stallman
(b) Balog
(c) Matt Brozowski
(d) David Hustace
Answer:
(a) Richard Stallman

Question 6.
Which is refers to proprietary software that can download no cost but source code cannot be changed?
(a) Open source
(b) Freeware
(c) Firmware
(d) All of these
Answer:
(b) Freeware

Question 7.
Which was considered explicitly for exploration in network communication?
(a) NS2
(b) C++
(c) OPNET
(d) SSFNet
Answer:
(a) NS2

Question 8.
Expand FCAPS:
(a) Fault Configuration Accounting Performance Security
(b) Feature Configuration Accounting Performance Security
(c) Fault Configuration Access Performance Security
(d) Feature Configuration Access Performance Service
Answer:
(a) Fault Configuration Accounting Performance Security

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 9.
Which is the worlds first software for network monitor and management with open source options?
(a) C++
(b) Open NMS
(c) OPNET
(d) NS2
Answer:
(b) Open NMS

Question 10.
Which is best for IT-ecosystem for new technologic monitoring?
(a) Meridian
(b) Horizon
(c) GIMP
(d) VLC
Answer:
(b) Horizon

Question 11.
How many main functional areas in Open NMS?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 12.
Which of the following software is used without any payment?
(a) Firmware
(b) Open source
(c) Freeware
(d) Network software
Answer:
(c) Freeware

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 13.
Which one of the following is open source hardware?
(a) NS2
(b) Open NMS
(c) MySQL
(d) Remake
Answer:
(d) Remake

Question 14.
Which one of the following is object-oriented tool command language?
(a) C++
(b) OTCL
(c) NMS
(d) NS2
Answer:
(b) OTCL

Question 15.
Which of the following is the most famous example of open source software?
(a) UNIX
(b) Mac OS X
(c) Linux
(d) Windows
Answer:
(c) Linux

Question 16.
Match the following:

(A) NS2 (i) Network object
(B) Routers (ii) Open Source Software
(C) MS Office (iii) Interface
(D) API (iv) Network monitoring

(a) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(b) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 17.
Choose the incorrect pair.
(a) proprietary – Freeware
(b) debug – errors
(c) MsOffice – Open source
(d) Simulator – Software
Answer:
(c) MsOffice – Open source

Question 18.
Choose the correct pair.
(a) OTC1 – Spreadsheet
(b) GNU – Network
(c) OpenNMS – Balog
(d) DNS – Application
Answer:
(c) OpenNMS – Balog

Question 19.
Choose the incorrect statement.
(a) open source code enable to read code.
(b) open source code is the freedom to run the program for any purpose.
(c) open source code is freedom but does not improve the program.
(d) open source code is freedom to redistribute copies.
Answer:
(c) open source code is freedom but does not improve the program.

Question 20:
Choose the correct statement.
(a) open source software is no option to choose.
(b) open source software, there is restrictions.
(c) open source software, make necessary change as per our software needs.
(d) open source software do not share our ideas and codes with all.
Answer:
(c) open source software, make necessary change as per our software needs.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 21.
Assertion (A):
A network simulator is a software program that replicates the functioning of a network.
Reason (R):
Open source hardware helps us to understand and remove the unwanted harmful parts.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 22.
Assertion (A):
Open NMS is a free and open-source initiative grade network monitoring and management platform.
Reason (R):
It is established and maintained by a community of users, developers and by the open NMS Group, it offering services, training and support.
(a) Both, A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both, A and R are true, and R is the correct explanation for A

Question 23.
Pick the odd one out:
(a) NS2
(b) Ubuntu
(c) Open Office
(d) MS Office
Answer:
(d) MS Office

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 24.
Pick the odd one out:
(a) 7zip
(b) ICMP
(c) HTTP
(d) DNS
Answer:
(a) 7zip

Question 25.
Pick the odd one out:
(a) Remix
(b) Remake
(c) Freeware
(d) Resell
Answer:
(c) Freeware

Question 26.
If the source code of a software is freely accessible by the public, then it is known as:
(a) Freeware
(b) Firmware
(c) Open source
(d) Public source
Answer:
(a) Freeware

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 27.
Which of the following is a software program that replicates the functioning of a computer network?
(a) Network software
(b) Network simulation
(c) Network testing
(d) Network calculator
Answer:
(b) Network simulation

Question 28.
Which of the following can document every incident that happened in the ‘ simulation and are used for examination?
(a) Net Exam
(b) Network hardware
(c) Trace file
(d) Net document
Answer:
(c) Trace file

Question 29.
Which is an example of network simulator?
(a) simulator
(b) TCL
(c) NS2
(d) C++
Answer:
(c) NS2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 30.
Fill in the blanks : NS2 comprises of key languages?
(a) 13
(b) 3
(c) 2
(d) 4
Answer:
(c) 2

Question 31.
Choose the Correct Pair from the following to build NS2:
(a) UNIX & TCL
(b) UNIX & a. C++
(c) C++ & OTcl
(d) C++ & NS2
Answer:
(c) C++ & OTcl

Question 32.
Which of the following is not a network simulation software?
(a) NS2
(b) OPNET
(c) SSFNet
(d) C++
Answer:
(d) C++

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 33.
Which of the following is a open source network monitoring software?
(a) C++
(b) OPNET
(c) Open NMS
(d) OMNet++
Answer:
(c) Open NMS

Question 34.
Open NMS was released in:
(a) 1999
(b) 2000
(c) 2003
(d) 2004
Answer:
(a) 1999

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 14 Open Source Concepts

Question 35.
Open NMS Group was created by:
(a) Balog
(b) Matt Brozowski
(c) David Hustace
(d) All of them
Answer:
(a) Balog

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 1.
What do you mean by barter system?
Answer:
Barter system means, In near future commercial activities such as buying or selling of goods between merchant and consumer will be bygone and forgotten.

Question 2.
Define E-Business.
Answer:
E-Business entirely depends on the Internet for its every intra-company and inter-company activities such as procurement of raw materials, marketing, finance, manufacturing, selling and negotiation.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 3.
What are the progress of the Internet technology?
Answer:
The progress of the Internet technology and vastly developed global Internet community, large number of dot-coms, FinTech and Internet Startups.

Question 4.
What is the recently sustained significant growth of E-Commerce?
Answer:

  1. Internet has transformed from an auxiliary communication medium of academics and large organizations to an entrenched communication medium that extends nearly all parts of mainstream society.
  2. Integrated with commercialization of the Internet, personal computers and electronic payment systems together made E-Commerce flourish.

Question 5.
What is a technique proposed by Michael Aldrich?
Answer:
Michael Aldrich proposed a technique that enables online transaction processing between consumers and businesses or between businesses.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 6.
What is Teleputer?
Answer:
Michael Aldrich invented a multi-purpose home infotainment device called Teleputer, which was a fusion of Television, computer and telecom networking technologies.

Question 7.
Describe four distinct waves by Economists.
Answer:

  1. Economists describe four distinct waves that occurred in the Industrial Revolution. In each wave, different business strategies were successful.
  2. Electronic commerce and the information revolution brought about by the Internet.

Question 8.
What is web 3.0?
Answer:
The term 3.0 summarise the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web, Generic Database etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 9.
What is mean by off-shoring?
Answer:
Off-shoring means, if the work is outsourced to a company, which is outside of its own country.

Question 10.
What is called as Reverse auction model?
Answer:

  1. C2B can be described as a form of E-Commerce where, the transaction is originated by the consumers.
  2. The consumers will fix a set of requirements or specific price for a service or a commodity. C2B model is also called as reverse auction model.

Question 11.
What is B2C model?
Answer:

  1. B2C (Business to Consumer) is commercial transactions take place between business firms and their consumers.
  2. It is the direct trade between companies and end-consumers via the Internet. An example of B2C transaction is a book company selling books to customers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 12.
What is B2G Model?

  1. B2G (Business to Government) is a business model that refers to business organisations sells products, services or information to Governments or to its administrations.
  2. B2G networks models provide a way for business to bid on Government projects. An example, A Government buys laptops for students from a business.

Question 13.
What is C2G model?
Answer:

  1. C2G (Consumer to Government) is an individual consumer interacts with the Government.
  2. C2G models usually include income tax or house tax payments, fees for issuance of certificates or other documents. Eg: People paying for renewal of license online.

Question 14.
What is G2B model?
Answer:
G2B (Government to Business) refers to a Business model where Government providing services or information to business organization.
Eg: Take over bid for a road project.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 15.
What is G2C model?
Answer:
G2C (Government to Consumer) is very similar to C2G. The Government provides platform for its citizens to avail its services and information through the Internet.
Eg: The services may be issuance of certificates through online.

Question 16.
What does Affiliate site of E-Commerce activity?
Answer:
Affiliate site is a form of third party marketing in which the site owner get paid based on the performance. The affiliate site usually attracts visitors by offering more information and tutorials on some specific product.

Question 17.
What is Auction site and banner advertisement site?
Answer:

  1. Auction site is a kind of website, that auctions items on the Internet and levies some commission from the sales.
  2. Banner advertisement site displays advertisements of other companies in its websites and thereby earns revenue.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 18.
What does Bulk-buying sites and Digital Publishing sites?
Answer:

  • Bulk-buying sites collect a number of users together all of who want to buy similar items.
  • Digital publishing sites effectively host the e-books or magazines on the web.

Question 19.
What is Licensing site and Name-your-price sites?
Answer:
Licensing sites allow other websites to make use of their software.
Eg: Search engines.

Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with retailer for a particular product.

Question 20.
What is online shopping mall site?
Answer:
Online shopping mall sites allows multi E-Commerce traders to assemble together, on a single website.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 21.
Write any two advantage of E-Commerce.
Answer:

  1. E-Commerce system is operated on all days and all the day.
  2. Advanced Electronic communication systems allow messages to reach across the world instantaneously.

Question 22.
Write any two disadvantage of E-Commerce.
Answer:

  1. E-Commerce is often used to buy goods that are not available locally but from businesses all over the world.
  2. Unlike returning goods to a traditional shop returning goods through online is believed to be an area of difficulty.

Question 23.
List the benefits of E-Commerce to a business organisation.
Answer:
Access to Global Market, Lower Transaction Cost, 24 x 7 working, Low cost of entry, Computer platform-independent, Snapping middleman.

Question 24.
What is Disruptive innovations?
Answer:
The innovations which replace the existing technologies are called as disruptive innovations. Disruptive innovations creates a new market.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 25.
List out the limitations of E-Commerce.
Answer:
People won’t buy all products online, competition and corporate vulnerability, security, customer loyalty, shortage of skilled employees and size and value of transactions.

Question 26.
What are types of G2G systems?
Answer:
G2G systems can be classified into two types.

  1. Internal facing or local level joining up a single Governments bureaucracies.
  2. External facing or International level joining up multiple Governments bureaucracy.

Question 27.
What are E-Business building block?
Answer:

  1. Network Infrastructure.
  2. Multimedia content and publishings.
  3. Messaging and information distribution.
  4. Common business service Infrastructure.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 28.
What does a company can be called E-Business?
Answer:
A company can be called E-Business, they should follow the following services.

  1. It has the ability to conduct business electronically over Internet.
  2. It manages payment transactions through Internet.
  3. It has a platform for selling products and services via Internet.

Question 29.
Write the short notes on Dotcom bubble.
Answer:

  1. The Dotcom bubble was a historic excessive growth of economy that occurred roughly between 1995 and 2000.
  2.  It was also a period of extreme growth in the usage and adaptation of the Internet as well.
  3.  There was a tremendous development in US equity investments in Internet based companies.
  4. The NASDAQuestion composite index of US stock market value rising from under 1000 points to more than 5000 points.

Question 30.
Write a short note on Dotcom Burst.
Answer:

  1. The NASDAQuestion – Composite stock market index, fell from 5046.86 to 1114.11. This is infamously known as the Dotcom crash or Dotcom Burst.
  2. This began on March 11, 2000 and lasted until October 9, 2002.
  3. During the crash, thousands of online shopping companies, like pets.com failed and shut down.
  4. Some companies, like Amazon declined in value but recovered quickly.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 31.
Explain C2B Model.
Answer:

  1. C2B (Consumer to Business) can be described as a form of E-Commerce where, the transaction is originated by the consumers.
  2. The consumers will fix a set of requirements or specific price for a service or a commodity.
  3. E-Commerce business entity will match the requirements of the consumers to the best possible extent.

Question 32.
Explain C2C model.
Answer:

  1. C2C (Consumer to Consumer) in E-Commerce provides opportunity for trading of products or services among consumers who are connected through the Internet.
  2. The electronic tools and Internet infrastructure are employed to support transactions between individuals.
  3. This type of E-Commerce works as consumer to Business to Consumer (C2B2C).

Question 33.
Explain G2G model.
Answer:

  1. G2G (Government to Government) is the online interaction between Government organizations.
  2. G2G’s principle objective is to implement E-Govemance rather commerce.
  3. G2G model in E-Govemance involves distributing data or information between its departments.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 34.
What does make Augmented Reality (AR)?
Answer:

  1. Augmented Reality (AR) is a 3-dimensional experience of witnessing the virtual items by augmenting the real objects with the virtual ones.
  2. The AR technology allows customer see themselves and visualize how they would look like in a particular outfit.
  3. Customers don’t have to wear it literally instead Augmented reality.

Question 35.
What does make Virtual Reality (VR)?
Answer:

  1. Virtual Reality (VR) keep changing customer experiences and motivate shoppers to buy as they get more enhanced buying experience.
  2. Interior design and home decor sites were some of the early adopters of this technology.
  3. They allow consumers to virtually place furniture in their home and envision what the end result will look like via their mobile phones.

Question 36.
Define the following: (i) Web 1.0, (ii) Web 2.0, (iii) Web 3.0.
Answer:

  1. Web 1.0 (Web of Content) is the early Web that contained text, images and hyperlink’s and allowed users only to search for information and read it.
  2. Web 2.0 (Web of Communication) is a read-write web that allowed users to interact with each other.
  3. Web 3.0 (Web of context) is termed as the semantic web or executable web with dynamic applications, interactive services and machine-to- machine interaction.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 37.
Explain using Timeline describing various events in E-Commerce.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce 1

Question 38.
Describe the different example of tangible form.
Answer:
The goods, information or services are delivered in tangible or electronic form.
(i) Goods:
Mobile phones, digital cameras, clothes, accessories, anti-virus.

(ii) Information:
Subscription to some newspapers, scientific journals, television channels. –

(iii) Services:
Matrimonial services, Placement services.

(iv) Tangible form:
A digital camera purchased by a consumer from an online shopping website which might be delivered at the requested address.

(v) Electronic form:
A music album or a software downloaded from a site which might be delivered in electronic form.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 39.
Describes the Evolution of Electronic Commerce.
Answer:

  1. E-Commerce started few decades ago and continues to grow exponentially. It first emerged on private networks in 1970.
  2. Electronic Data Interchanges and teleshopping together paved the way for the E-Commerce.
  3. The History of modern E-Commerce is closely twisted together with the history of the Internet.
  4. E-Commerce became really possible when the Internet was opened to commercial use.
  5. Online shopping started to grow when National Science Foundation opened the Internet to the Public in 1991.
  6. Even though E-Commerce has been existing since few decades, it has recently sustained significant growth.
  7. Integrated with’ commercialization of the Internet, personal computers, and electronic payment systems together made E-Commerce flourish.

Question 40.
Explain the benefits of E-Commerce to a business organization.
Answer:
(i) Access to Global Market:
Internet helps to access the global market place. Simple local businesses are able to market and sell their products internationally using E-Commerce.

(ii) Lower Transaction Cost:
E-Commerce reduces the cost of business transactions substantially.

(iii) 24 x 7 working:
A website is open all 24 hours, 7 days in a week. E-Commerce firm can provide information about its products and services to customers around the clock.

(iv) Low Cost of Entry:
Though E-Commerce was first emerged in private networks it did not remain the same. Internet has changed the face of E-Commerce.

(v) Computer platform – Independent:
Most computers have the ability to communicate via the Internet, irrespective of operating systems and hardware. So E-Commerce applications can be more efficiently developed and distributed because they are platform independent.

(vi) Snapping middleman:
E-Commerce enjoys the benefit of bypassing middleman and reaching the end customer directly through Internet. It helps to increase the sales of the organization without any interventions.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 41.
Explain the major drawbacks of E-Commerce for a business organization.
Answer:
The following are the major drawbacks of E-Commerce for a business organization.
(i) People won’t buy all products online:
There are certain products like high price jewels, cloths or furnishings which people might not like to buy online. They might want to, inspect it, feel the texture of fabric etc., which are not possible in E-Commerce.

(ii) Competition and corporate vulnerability:
Access to Global Market is an beneficial on one hand but it also come with a competition. Open Internet has paved way to all business firms to operate in the global market.

(iii) Security:
Customers might be reluctant to give their credit card number to the website. As lot of cyber frauds takes place in E-Commerce transactions, people generally afraid to provide their personal information. .

(iv) Customer loyalty:
Business cannot survive long without loyal customers. The customers would like to buy from a website where they
are able to get the best deal. They cannot be loyal to a particular seller.

(v) Shortage of skilled employees:
Though most of die process in E-Commerce is automated, some sectors only needs manual interventions. There is a great shortage of skilled employees.

(vi) Size and value of transactions:
E-Commerce is most often conducted using credit card for payments, and as a result very small and very large transactions tend not to be conducted online.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 42.
Define the following terms:
(i) Affiliate,
(ii) Blog,
(iii) Brick and Morter,
(iv) Dotcom,
(v) WordPress.
Answer:
(i) Affiliate:
Business who promotes the products of another business for a commission.

(ii) Blog:
An online platform for writing articles about a topic.

(iii) Brick and Morter:
The term that refers to a business that has a physical store, opposite of online store.

(iv) Dotcom:
Common name for Internet based companies.

(v) WordPress:
A free, open source online blogging platform.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 43.
Define E-Commerce.
Answer:

  1. E-Commerce means Electronic Commerce. Commerce and Internet makes E-Commerce.
  2. E-Commerce allows the consumers to exchange goods and services with no barriers of time or distance.
  3. E-Commerce can be described as the process of buying or selling . products, services or information via computer networks.

Question 44.
Distinguish between E-Business and E-Commerce.
Answer:

E – Business E – Commerce
E – Business entirely depends on the Internet for its every intra company and inter company activities E – Commerce is commercial transaction through Internet.
E – Business is grounded on technologies such as Network Infrastructures like VAN, Internet, Intranet, Extranet. E – Commerce is limited with monetary transactions using Internet.

Question 45.
Differentiate tangible goods and electronic goods with example of your own.
Answer:

Tangible Goods Electronic Goods
Digital camera purchased by a consumer from an online shopping website which might be delivered at the requested address. Music album or a software downloaded from a site which might be delivered in electronic form.
A physical item that can be perceived by the sense of touch. Eg: Cars, Food items, Computers, Telephones etc… AC, Microwave oven, Refrigerators, Vacuum Cleaner, DVD, Mobiles, Ipod, Ipads, Camera, Fan, Printers, etc., are Electronic goods.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 46.
What is dotcom bubble and dotcom burst?
Answer:
Dotcom bubble:
The dotcom bubble referred to as the Internet bubble, refers the period between 1995 and 2000 when investors pumped money into internet based startups. The Dotcom bubble had attracted huge investments of first wave companies.

Dotcom burst:
The dotcom bubble was a historic speculative bubble in the USA from 1994 to 2000, a period of extreme growth in the use and adopted of the Internet. The second wave is the rebirth of E-Commerce after the dotcom burst.

Question 47.
Write a short note on out-sourcing.
Answer:

  1. Outsourcing is a business practice in which a company hires another company or an individual to perform tasks, handle operations.
  2. Some common out sourcing are Resource management, facilities management, supply chain management, accounting, customer support and service, marketing, computer aided design, research, design, content writing, engineering, diagnostic services and legal documentation.

Question 48.
Describe how E-Commerce is related to socio-technological changes.
Answer:

  1. Growth of E-Commerce is also related to the socio-technological changes.
  2. The more, the medium becomes deep rooted, the more, are the users drawn towards it.
  3. Increase of users, increase the markets. As the markets expand, more business organizations are attracted. The more business accumulate it create competition.
  4. The competition leads to innovation, innovation in turn drives the development of technology, technology facilitates E-Commerce’s growth.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 49.
Write a short note on the third wave of E-Commerce.
Answer:

  1. The third wave of Electronic Commerce is 2010 to at present. The third wave is brought on by the mobile technologies.
  2. The mobile technologies connects users via mobile devices for real-time and-on-demand transactions.
  3. The term 3.0, summarize the various characteristics of the future Internet which include Artificial Intelligence, Semantic web, Generic database etc…

Question 50.
Explain B2B module in E-Commerce.Answer:ial transactions take place between different business organizations through the Internet.
Answer:
For example, a cycle company may buy tyres from another company for their cycles. When compared to other models, the value per transaction in B2B transaction is high, because of bulk purchase.
The company also might get the advantage of discounts on bulk purchases. Out-sourcing and off-shoring are generally associated with B2B E-Commerce.

Question 51.
Write a note on name-your-price websites.
Answer:

  1. The name-your-price website, which buyers make a suggestion for a product’s price and the transactions occurs only if a seller accepts this quoted price.
  2. As the Internet is continuously being developed and the online market places are becoming increasingly more popular, consumers have more choices in terms of product pricing.
  3. Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the retailer for a particular product or service. https://in.hotels.com.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 52.
Write a note on physical product dispute of E-Commerce.
Answer:

  1. Physical product disputes are a major disadvantage in E-Commerce.
  2. E-Commerce purchases are often made on trust. This is because, we do not have physical access to the product.
  3. Though Internet is an effective channel for visual and auditory information it does not allow full scope for our senses.
  4. We can see pictures of the perfumes, but could not smell their fragrance, we can see pictures of cloth, but not its quality.

Question 53.
Write about the development and growth of Electronic Commerce.
Answer:
Economists describe four distinct waves that occurred in the development and growth of Electronic Commerce.

(i) The First Wave of Electronic Commerce (1995-2003):
The Dotcom companies of first wave are mostly American companies. There by their websites were only in English. The Dotcom bubble had attracted huge investments to first wave companies.

The Internet was mere read only web and network technology was in its beginning stage, the bandwidth and network security was very low.

(ii) The Second Wave of Electronic Commerce (2004 – 2009):
The second wave is the birth of E-Commerce after the dotcom burst. The second wave is considered as the global wave, with sellers doing business in many countries and in many languages.

The rapid development of network technologies and interactive web offered the consumers more choices of buying.

(iii) The third wave of Electronic Commerce (2010 – Present):
The third wave is brought on by the mobile technologies. It connects users via mobile devices for real-time and on-demand transactions.

The term web 3.0 summarise the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web, Generic Databases etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 54.
List all the E-Commerce business models and explain any four briefly.
Answer:
(i) Business to Business (B2B)
(ii) Business to Consumer (B2C)
(iii) Business to Government (B2G)
(iv) Consumer to Business (C2B)
(v) Consumer to Consumer (C2C)
(vi) Consumer to Government (C2G)
(vii) Government to Business (G2B)
(viii) Government to Consumer (G2C)
(ix) Government to Government (G2G)

(i) Business to Consumer (B2C):
B2C is the direct trade between companies and end-consumers via the Internet.
B2C companies sell goods, information of services to customers through online.

(ii) Business to Government (B2G):
B2G is a business model that refers to business organizations sells products, services or information to Governments or to its administrations.
B2G network models provide a way for businesses to bid on Government projects or products those Governments might need for their organizations.

(iii) Consumer to Business (C2B):
(a) C2B can be described as form of E-Commerce where, the transaction is originated by the consumers.
(b) The consumers will fix a set of requirements or specific price for a service or a commodity. C2B model, is also called as reverse action model.

(iv) Consumer to Government (C2G):
(a) Citizens as consumers and Government engage in C2G E-Commerce.
(b) An individual consumer interacts with the Government.
(c) C2G models usually include income tax or house tax payments, fees for issuance of certificates or other documents.
(d) People paying for renewal of license online may also fall under this category.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 55.
Explain any five E-Commerce revenue models.
Answer:
Today there are many ways by which companies can make money from the
Internet. The E-Commerce revenue models are –

(i) Affiliate site:
(a) Affiliate site is a form of third party marketing in which the site owner get paid based on the performance.
(b) The affiliate site may be a price comparison service or shopping directories or review sites or blogs that contain a link to a normal retailing site and are paid when a customer makes a purchase through it.
(c) The affiliate site usually attracts visitors by offering more information and tutorials on some specific product or a topic.

(ii) Auction site:
Auction site is a kind of website, that auctions items on the Internet and levies some commission from the sales.
Eg: http://WWW.ebay.com

(iii) Banner advertisement site:
Banner advertisement site displays advertisements of other companies in its websites and thereby earns revenue.

(iv) Bulk-buying site:
Bulk-buying sites collect a number of users together all of who want to buy similar items, the site negotiates a discount with the supplier and takes a commission.
Eg: http://WWW.alibaba.com

(v) Digital publishing sites:
Digital publishing sites effectively host the e-books or magazines on the web. They make profits in a number of ways such as advertising, selling etc…
Eg: http://WWW.wordpress.org

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 56.
How would you differentiate a traditional commerce and E-Commerce?
Answer:

Traditional Commerce

 E-Commerce

Traditional commerce is buying or selling of products and services physically.E – Commerce carries out commercial transactions electronically on the Internet.
Customer can easily identify, authenticate and talk to the merchant.Neither customer nor merchant see the other.
Physical stores are not feasible to be open all the time.It is always available on all time and all days of the year.
Products can be inspected physically before purchase.Products can’t be inspected physically before purchase.
Scope of business is limited to particular area.Scope of business is global. Vendors can expand their business Worldwide.
Resource focus Supply side.Resource focus Demand side.
Business Relationship is Linear.Business Relationship is End to end.
Marketing is one way marketing.One – to – one marketing.
Payment is made by cash, cheque, cards etc.Payment system is mostly credit card and through fund transfer.
Most goods are delivered instantly. It takes time to transport goods.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 57.
What are the advantages and disadvantages of E-Commerce to a consumer?
Answer:
The following are the advantages and disadvantages of E-Commerce for a consumer.
Advantages:

  1. E-Commerce system is operated on all days arid all the day. People can interact with businesses at the time of their convenience.
  2. Speed is a major advantage in E-Commerce. Communication delay is not a part of the Internet or E-Commerce world.
  3. The Internet is too easy to ‘shop around’ for products and services that may be more cheaper and effective than left to buy only in a brick and mortar shop.
  4. The whole world becomes a shop for today’s customers.
  5. Customers can shop from home or anywhere at their convenience. Payments can also be made through online.

Disadvantages:

  1. E-Commerce is often used to buy goods that are not available locally at from businesses all over the world.
  2. In E-Commerce we should wait between placing the order and having the product in hand.
  3. Unlike returning goods to a traditional shop returning goods through online is believed to be an area of difficulty.
  4. Privacy issues are serious in E-Commerce. In E-Commerce generating consumer information is inevitable.
  5. Physical product disputes are a major disadvantage in E-Commerce. E-Commerce purchase are often made on trust.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 58.
Draw a timeline describing various developments in E-Commerce.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce 2

TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 59.
List the business around your society and sort it according to business modules.
Answer:
(i) B2B (Business to Business) Model:
Trade India is an online Business to Business for small businesses based in India and around the globe. For Agriculture, Automobile, Chemicals, Computer Hardware, Construction, Electronics, Energy and power, Food and Bevarage, Furniture, Machinery etc…

(ii) B2C (Business to Consumer) Model:
Adret All Ayurveda Pvt. Ltd, World’s first and largest website to buy natural and Ayurvedic products. They sell directly to consumers, that can be referred to as B2C.

(iii) B2G (Business to Government):
Dell computer, A government buys laptops for student from a company, this refers business organization sells products to Government.

(iv) C2B (Consumer to Business):
RedBus Booking Bus Ticket in RedBus Website. The Website generate revenue from consumer or travels. This is C2B business by the consumers.

(v) C2C (Consumer to Consumer):
Property.com. The two consumer intrested with each other for sale / purchase of property from this website.
So that two consumers using Internet is called C2C E-Commerce.

(vi) Consumer to Government (C2G):
chennaicorporation.in, here a consumer usually to pay house tax, water tax through this website, so people paying taxes, fees are under this type.

(vii) G2B (Government to Business):
ebiz.gov.in, Government provides information, rules, requirement and permission needed a new started business.

(viii) G2C (Government to Consumer):
https://csc.gov.in/ – This Government website provides issuance of certificates through online to consumer.

(ix) G2G (Government to Government):
https:/www.nic.in/- This is Government website, it provides e-govemance to its departments or agencies.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 60.
Interview a consumer who recently bought a product online and write his experience.
Answer:

  1. I tell you about my friend (Consumer) online shopping experience, he bought through online TNPSC Group IV Book in one of the regular publisher.
  2. My friend wanted to prepare for Group IV TNPSC Exam. He would buy it from any online shop. He would get the discount also on my book. So next day, he would use website through internet and booked a book using his debit card.
  3. The Book actual cost is ₹ 250 but in snapdeal he got it at just ₹ 160 during ordering. He just got that in 3 days in courier.
  4. He was very happy, safe and a very quick experience.
  5. Some advices that I would like to give are whenever you are going to buy anything online then first seen all sites an then compare them.
  6. After comparing see which or is the best. Once seen which one is cheaper then see that which one will be delivered soon.
  7. One more thing also check whether it has easy return or replace policy if not then don’t go for it.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Choose the correct answer:

Question 1.
Which subject of concept always profit from innovations?
(a) Accounts
(b) Commerce
(c) Business
(d) Administration
Answer:
(b) Commerce

Question 2.
What is known as near future commercial activities like buying or selling of goods between merchant and consumer?
(a) Barter system
(b) Online system
(c) Direct system
(d) Order by system
Answer:
(a) Barter system

Question 3.
________ is a subject of E-Business.
(a) Buying
(b) Selling
(c) E-Commerce
(d) Commerce
Answer:
(c) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 4.
Which is commercial transaction through Internet?
(a) E-pay
(b) E-Commerce
(c) Online system
(d) Barter system
Answer:
(b) E-Commerce

Question 5.
Which is called grounded on technologies network infrastructures?
(a) E-Business
(b) E-Commerce
(c) E-pay
(d) Online system
Answer:
(a) E-Business

Question 6.
Which is currently one of the most important aspects of the Internet era?
(a) E-Business
(b) E-Commerce
(c) E-pay
(d) Online system
Answer:
(b) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 7.
Which type of form on delivered the goods, information or services?
(a) Goods
(b) Services
(c) Electronic
(d) Tangible
Answer:
(d) Tangible

Question 8.
Which of the following one is an Electronic form?
(a) Mobiles
(b) TV
(c) Digital camera
(d) Music album
Answer:
(d) Music album

Question 9.
Which year was first emerged on private networks?
(a) 1965
(b) 1968
(c) 1970
(d) 1972
Answer:
(c) 1970

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 10.
Which is no longer an exclusive domain of large organisations or private networks?
(a) E-Business
(b) E-Commerce
(c) E-Pay
(d) Online system
Answer:
(b) E-Commerce

Question 11.
Who was proposed a technique that enables online transaction processing between consumers and businesses?
(a) Michael Aldrich
(b) Phil Brandenberger
(c) John Philips
(d) Mark Waugh
Answer:
(a) Michael Aldrich

Question 12.
What is called as a multi-purpose home infotainment device?
(a) TV
(b) Computer
(C) Telecom
(d) Teleputer
Answer:
(d) Teleputer

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 13.
Which one is Amazon sold its first item?
(a) Watch
(b) pen
(c) CD
(d) A Science Textbook
Answer:
(d) A Science Textbook

Question 14.
Which had attracted huge investments to first wave companies?
(a) E-books
(b) Dotcom bubble
(c) Dotcom burst
(d) Dot-net
Answer:
(b) Dotcom bubble

Question 15.
What will does remained as a mode of information exchange between businesses?
(a) EDI
(b) E-mail
(c) Both (a) and (b)
(d) Either (a) or (b)
Answer:
(c) Both (a) and (b)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 16.
Which is the rebirth of E-Commerce after the dotcom burst?
(a) The first wave
(b) The second wave
(c) The third wave
(d) All of these
Answer:
(b) The second wave

Question 17.
Which is considered as the global wave, with sellers doing business in many countries and in many languages?
(a) The first wave
(b) The second wave
(c) The third wave
(d) All of these
Answer:
(b) The second wave

Question 18.
The increased web users nourished E-Commerce companies during:
(a) The first wave
(b) The second wave
(c) The third wave
(d) All of these
Answer:
(b) The second wave

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 19.
Which wave is brought on by the mobile technologies?
(a) First
(b) Second
(c) Third
(d) None
Answer:
(c) Third

Question 20.
Which was a historic excessive growth of economy that occurred roughly between 1995 and 2000?
(a) Dotcom bubble
(b) Dotcom Burst
(c) E-Commerce
(d) E-Business
Answer:
(a) Dotcom bubble

Question 21.
Which is known as when Nasdaq-composite stock market index fell from 5046.86 to 1114.11?
(a) Dotcom bubble
(b) (c) and (d)
(c) Dotcom crash
(d) Dotcom burst
Answer:
(b) (c) and (d)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 22.
Which model is associated with out-sourcing and off-shoring?
(a) B2B
(B) B2C
(c) B2G
(d) C2B
Answer:
(a) B2B

Question 23.
What is called as it a company’s work is hired to another company?
(a) Out-dated
(b) Off-shoring
(c) Out-sourcing
(d) All of these
Answer:
(c) Out-sourcing

Question 24.
What is called as if the work is outsourced to a company, which is outside of its own country?
(a) Out-dated
(b) Off-shoring
(c) Out-sourcing
(d) All of these
Answer:
(b) Off-shoring

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 25.
Which model is commercial transactions take place between business firms and their consumers?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(b) B2C

Question 26.
Which model is a business model that refers to business organizations sells • products, services or informations to Government?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(c) B2G

Question 27.
Which networks models provide a way for businesses to bid on Government projects?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(c) B2G

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 28.
Which model can be described as a form of E-Commerce where the transactions is originated by the consumers?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(d) C2B

Question 29.
Which model is also called as reverse auction model?
(a) B2B
(b) B2C
(c) B2G
(d) C2B
Answer:
(d) C2B

Question 30.
Which model provides opportunity for trading of products or services among consumers in Internet?
(a) C2C
(b) C2G
(c) C2B
(d) G2C
Answer:
(a) C2C

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 31.
What is called when something is bought and sold between two consumers using Internet?
(a) C2C E-Commerce
(b) C2G E-Commerce
(c) C2B E-Commerce
(d) G2C E-Commerce
Answer:
(a) C2C E-Commerce

Question 32.
Which model engage in citizens as consumers and Government?
(a) C2C
(b) C2G
(c) C2B
(d) G2C
Answer:
(b) C2G

Question 33.
Which model refers to a Government business model in E-Commerce?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(a) G2B

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 34.
G2B is closely related to:
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(c) B2G

Question 35.
Which model is a part of E-Governance?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(a) G2B

Question 36.
Which model is to reduce burdens on business, provide one-stop access to information thereby boost the economy?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(a) G2B

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 37.
Which model provides platform for its citizens to avail its services and information through Internet?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(d) G2C

Question 38.
Which model is very similar to C2G in E-Commerce?
(a) G2B
(b) C2G
(c) B2G
(d) G2C
Answer:
(d) G2C

Question 39.
Which model is the online interaction between Government organizations?
(a) G2B
(b) C2G
(c) G2C
(d) G2G
Answer:
(d) G2G

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 40.
What is a form of third party marketing in which the site owner get paid based on the performance?
(a) Affiliate site
(b) Auction site
(c) Bulk-buying site
(d) Digital publishing site
Answer:
(a) Affiliate site

Question 41.
Which form usually attracts visitors by offering more information and tutorials on some specific product?
(a) Affiliate site
(b) Auction site
(c) Bulk-buying site
(d) Digital publishing site
Answer:
(a) Affiliate site

Question 42.
Which form is that auctions items on the Internet and levies some commission from the sales?
(a) Affiliate site
(b) Auction site
(c) Bulk-buying site
(d) Digital publishing site
Answer:
(b) Auction site

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 43.
Which form is collect a number of users together all of who want to buy similar items?
(a) Digital publishing site
(b) Licensing site
(c) Name-your-price site
(d) Bulk-buying site
Answer:
(d) Bulk-buying site

Question 44.
Which form is allow other websites to make use of their software?
(a) Digital publishing site
(b) Licensing site
(c) Name-your-price site
(d) Bulk-buying site
Answer:
(b) Licensing site

Question 45.
Which form is just like normal retail sites?
(a) Digital publishing site
(b) Licensing site .
(c) Name-your-price site
(d) Bulk-buying site
Answer:
(c) Name-your-price site

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 46.
Which form allows multi E-Commerce traders to assemble together on a single website?
(a) Online shopping mall site
(b) Bulk-buying site
(c) Name-your-price site
(d) Licensing site
Answer:
(a) Online shopping mall site

Question 47.
Which commerce is buying or selling of products and services physically?
(a) Traditional
(b) E-Commerce
(c) Commerce
(d) Business
Answer:
(a) Traditional

Question 48.
Which of the following is carries out commercial transactions electronically on the Internet?
(a) Traditional Commerce
(b) E-Commerce
(c) Commerce
(d) Business
Answer:
(b) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 49.
Which system is operated, customers can shop from home or anywhere at . their convenience?
(a) Traditional Commerce
(b) E-Commerce
(c) Commerce
(d) Business
Answer:
(b) E-Commerce

Question 50.
product disputes are a major disadvantage in E-Commerce?
(a) Physical
(b) Electrical
(c) Electronic
(d) Household
Answer:
(a) Physical

Question 51.
The innovations which replace the existing technologies are called as:
(a) Market
(b) E-Commerce
(c) Disruptive innovation
(d) E-Business
Answer:
(c) Disruptive innovation

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 52.
The term disruptive innovation was first coined by:
(a) Clayton
(b) Michael Aldrich
(c) Phil Brandenberger
(d) Mark Waugh
Answer:
(a) Clayton

Question 53.
Clayton M wrote in his book is:
(a) E-Commerce
(b) E-Business
(c) Innovation
(d) The innovator’s Dilemma
Answer:
(d) The innovator’s Dilemma

Question 54.
Which technology is allows customer see themselves and visualize how they would look like in a particular outfit?
(a) Augmented Reality (AR)
(b) Virtual Reality (VR)
(c) Product Reality
(d) Customer Reality
Answer:
(a) Augmented Reality (AR)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 55.
Which can be enjoys the benefit of by passing middle man and reaching the end customer directly through Internet?
(a) E-Business
(b) E-leaming
(c) E-shopping
(d) E-Commerce
Answer:
(d) E-Commerce

Question 56.
Which business firms establish a direct contact with their customers by eliminating middle man?
(a) E-BuSiness
(b) E-Commerce
(c) E-Shopping
(d) Online sales
Answer:
(b) E-Commerce

Question 57.
Which is an effective means for buying known and established services?
(a) E-Business
(b) E-Commerce
(c) E-Shopping
(d) Online sales
Answer:
(b) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 58.
Which is always takes advantage when it is perishables and touch and feel products?
(a) Traditional Commerce
(b) E-Commerce
(c) Commerce
(d) Business Commerce
Answer:
(a) Traditional Commerce

Question 59.
Which has paved way to all business firms to operate in the global market?
(a) E-Market
(b) Open Internet
(c) A website
(d) E-Commerce
Answer:
(b) Open Internet

Question 60.
Which is the illegal activity of extracting business intelligence from competitor’s web pages?
(a) Web server
(b) Web sites
(c) Web harvesting
(d) Web market
Answer:
(c) Web harvesting

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 61.
……………………………… might be reluctant to give their credit card number to the website.
(a) Sellers
(b) Buyers
(c) Customers
(d) All of these
Answer:
(c) Customers

Question 62.
………………………. arise when the customer’s data falls in the hands of strangers.
(a) Legal issues
(b) Fraudulent
(c) Security problems
(d) Cyber Fraud
Answer:
(a) Legal issues

Question 63.
Which activities in traditional commerce is comparatively less as there is personal interaction between the buyer and the seller?
(a) Legal issues
(b) Fraudulent
(c) Security problems
(d) Cyber Fraud
Answer:
(b) Fraudulent

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 64.
Which has difficulty in recruiting, training retaining talented people?
(a) E-Business
(b) E-Leaming
(c) E-Commerce
(d) E-Pay
Answer:
(c) E-Commerce

Question 65.
Which takes place in E-Commerce transactions, people generally afraid to provide their personal information?
(a) Legal issues
(b) Fraudulent
(c) Security problems
(d) Cyber Frauds
Answer:
(d) Cyber Frauds

Question 66.
Match the following:

(A) Goods (i) Placement
(B) Services (ii) Music album
(C) Tangible form (iii) Mobile form
(D) Electronic form (iv) Digital camera

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(c) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
(d) (A) – (ii); (B) – (i); (C) – (iii); (D) – (iv)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 67.
Match the following:

(A) First wave(i) Electronic mail
(B) Second wave(ii) Mobile technologies
(C) Third wave(iii) Dotcom burst
(D) CompuServe(iv) Dotcom bubble

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 68.
Match the following:

(A) B2B(i) Out-sourcing
(B) B2C(ii) Bid on governments
(C) B2G(iii) Reverse auction
(D) C2B(iv) Retail store

(a) (A) – (iv); (B) – (ii); (C) – (iii); (D) – (i)
(b) (A) – (i); (B) – (iv); (C) – (ii); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(b) (A) – (i); (B) – (iv); (C) – (ii); (D) – (iii)

Question 69.
Match the following:

(A) Affiliate site (i) More users same item
(B) Bulk buying site (ii) Third party marketing
(C) Licensing site (iii) Single website
(D) Onine shopping mall site (iv) Allow websites

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 70.
Match the following:

(A) Blog(i) Common Name Internet based
(B) Dotcom(ii) Online platform
(C) Teleputer(iii) Blogging platform
(D) WordPress(iv) Fusion of television

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (iv); (B) – (i); (C) – (iii); (D) – (ii)
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(c) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 71.
Choose the incorrect pair:
(a) E-Commerce – E-Business
(b) E-Business – Internet
(c) Tangible – Services
(d) Teleputer – E-data
Answer:
(d) Teleputer – E-data

Question 72.
Choose the incorrect pair:
(a) 1984 – Electronic mail
(b) 1994 – First B2B
(c) 1995 – Amazon sold its first item
(d) 1999 – Zappo’s open
Answer:
(b) 1994 – First B2B

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 73.
Choose the incorrect pair:
(a) First wave – American companies
(b) Web 1.0- Read only
(c) Dotcom bubble – Second wave
(d) Second wave – Global wave
Answer:
(c) Dotcom bubble – Second wave

Question 74.
Choose the incorrect pair:
(a) Web 2.0 – Social media
(b) B2C – Second wave
(c) Mobile Tech – Thirdwave
(d) Web 3.0 – Dotcom burst
Answer:
(d) Web 3.0 – Dotcom burst

Question 75.
Choose the incorrect pair:
(a) B2B – Web generic database
(b) Off-shoring – B2B
(c) B2C – Direct trade
(d) Bulk Purchase
Answer:
(a) B2B – Web generic database

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 76.
Choose the correct pair:
(a) C2B2C – Matrimonial web
(b) C2B – C2C
(c) G2G – Certificate online
(d) G2C – Internal facing
Answer:
(a) C2B2C – Matrimonial web

Question 77.
Choose the correct pair:
(a) Affiliate site – Joining up
(b) Auction site – Internal facing
(c) Bulk-buying site – Advertisement
(d) Digital publishing sites – e-books
Answer:
(d) Digital publishing sites – e-books

Question 78.
Choose the correct pair:
(a) Traditional – Physically
(b) E-Commerce – By cheque
(c) Physical store – All time
(d) Shop around – Mortar shop
Answer:
(a) Traditional – Physically

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 79.
Choose the correct pair:
(a) Innovation – existing
(b) AR – 2-dimensional
(c) Perishable – supply chain
(d) VR – hardware
Answer:
(c) Perishable – supply chain

Question 80.
Choose the correct pair:
(a) Web harvesting – legal activity
(b) Credit card – Cyber Frauds
(c) Illegal – Stranger
(d) Traditional – Fraudulent
Answer:
(b) Credit card – Cyber Frauds

Question 81.
Choose the incorrect statement:
(a) E-Commerce is a subset of E-Business.
(b) E-Commerce is commercial transaction through Internet.
(c) E-Commerce is limited with monetary transactions.
(d) E-Commerce is completely new type of commerce.
Answer:
(d) E-Commerce is completely new type of commerce.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 82.
Choose the incorrect statement:
(a) Economists describe four distinct waves that occurred in the Industrial Revolution.
(b) The Dotcom companies of first-wave are mostly British companies.
(c) The Dotcom bubble had attracted huge investments to first wave companies.
(d) The second wave is the rebirth of E-Commerce.
Answer:
(b) The Dotcom companies of first-wave are mostly British companies.

Question 83.
Choose the incorrect statement:
(a) The third wave is brought on by the mobile technologies.
(b) The term web 3.0 summarise the various characteristics of the future Internet
(c) Out-sourcing is generally associated with B2G E-Commerce.
(d) B2C is the direct trade between companies and end-consumers.
Answer:
(c) Out-sourcing is generally associated with B2G E-Commerce.

Question 84.
Choose the incorrect statement:
(a) G2C in E-Commerce is very similar to C2G.
(b) G2G is the online interaction between Government organizations.
(c) G2G systems can be classified into many types.
(d) G2G model in E-Govemance involves distributing data or information between its departments
Answer:
(c) G2G systems can be classified into many types.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 85.
Choose the incorrect statement:
(a) Auction site is a kind of website, that auctions items on the Internet.
(b) Banner advertisement site displays advertisements of other companies in its websites.
(c) Bulk-buying sites collect a number of users together all of who want to buy similar items.
(d) Licensing sites effectively host the e-books on the web
Answer:
(d) Licensing sites effectively host the e-books on the web

Question 86.
Choose the correct statement:
(a) Physical stores are feasible to be open all the time.
(b) E-Commerce are not feasible to be open all the time.
(c) E-Commerce products can be inspected physically before purchase.
(d) E-Commerce carries out commercial transactions electronically on the Internet
Answer:
(d) E-Commerce carries out commercial transactions electronically on the Internet

Question 87.
Choose the correct statement:
(a) The whole world becomes a shop for today’s customers.
(b) Speed is a major disadvantage in E-Commerce.
(c) Advanced Electronic Communication systems are not possible to reach across the world.
(d) Communication delay is a part of the Internet
Answer:
(a) The whole world becomes a shop for today’s customers.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 88.
Choose the correct statement:
(a) Traditional customers can shop from home. .
(b) Traditional customers can pay his payment through online.
(c) E-Commerce is often used to buy goods that are not available locally.
(d) In E-Commerce generating consumer information is not invitable.
Answer:
(c) E-Commerce is often used to buy goods that are not available locally.

Question 89.
Choose the correct statement:
(a) People are often much more comfortable in buying the generic goods.
(b) E-Commerce is increases the cost of business transactions substantially.
(c) As E-Commerce firm cannot provide information about its products and services to customers.
(d) Internet has not changed the face of E-Commerce.
Answer:
(a) People are often much more comfortable in buying the generic goods.

Question 90.
Choose the correct statement:
(a) E-Commerce transaction, people generally very interest to provide their personal information.
(b) Open Internet has paved way to all business firms to operate in the global market.
(c) Traditional commerce always takes disadvantage when it is perishables and touch and feel products.
(d) Traditional commerce is most often using credit cards for payments.
Answer:
(b) Open Internet has paved way to all business firms to operate in the global market.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 91.
Assertion (A):
E-Commerce can be described as the process of buying or selling products.
Reason (R):
Commerce and Internet makes E-Commerce.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Question 92.
Assertion (A):
E-Commerce is currently one of the most important aspects of the Internet era.
Reason (R):
E-Commerce manages payment transaction through cheque.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 93.
Assertion (A):
The Dotcopi companies of first wave are mostly British companies.
Reason (R): The Dot-com bubble had attracted huge investments to first wave companies.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 94.
Assertion (A):
The second wave is the rebirth of E-Commerce after the Dotcom burst.
Reason (R):
The third wave is brought on by the mobile technologies.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 95.
Assertion (A):
G2B is closely related to G2G.
Reason (R):
G2G is the online interaction between Government and people.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are false.

Question 96.
Pick the odd one out.
(a) VAN
(b) EDI
(c) SCM
(d) Commerce
Answer:
(d) Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 97.
Pick the odd one out.
(a) Mobile phones
(b) Digital camera
(c) Accessories
(d) Music album
Answer:
(d) Music album

Question 98.
Pick the odd one out.
(a) B2B
(b) C2C
(c) B2C
(d) B2G
Answer:
(b) C2C

Question 99.
Pick the odd one out.
(a) Affiliate site
(b) Auction site
(c) Internal facing
(d) Bulk-buying site
Answer:
(c) Internal facing

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 100.
Pick the odd one out.
(a) Web 1.0
(b)-Web 2.0
(c) Web 3.0
(d) Web server
Answer:
(d) Web server

Question 101.
A company can be called E-Business if:
(a) it has many branches across the world.
(b) it conduct business electronically over the Internet.
(c) it sells commodities to a foreign country.
(d) it has many employees.
Answer:
(b) it conduct business electronically over the Internet.

Question 102.
Which of the following is not a tangible good?
(a) Mobile
(b) Mobile apps
(c) Medicine
(d) Flower bouquet
Answer:
(b) Mobile apps

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 103.
SME stands for:
(a) Small and medium sized enterprises
(b) Simple and medium enterprises
(c) Sound messaging enterprises
(d) Short messaging enterprises
Answer:
(a) Small and medium sized enterprises

Question 104.
The dotcom phenomenon deals with:
(a) Textile industries
(b) Mobile phone companies
(c) Internet based companies
(d) All the above
Answer:
(c) Internet based companies

Question 105.
Which of the following is not correctly matched?
(a) The First Wave of Electronic Commerce: 1985 -1990
(b) The Second Wave of Electronic Commerce: 2004 – 2009
(c) The Third Wave of Electronic Commerce: 2010 – Present
(d) Dotcom burst: 2000 – 2002
Answer:
(a) The First Wave of Electronic Commerce: 1985 -1990

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 106.
Assertion (A):
The websites of first wave dotcom companies were only in English.
Reason (R):
The dotcom companies of first wave are mostly American companies.
(a) Both A and R are correct and R is the correct explanation of A.
(b) Both A and R are correct, but R is not the correct explanation of A.
(c) A is true and R is false.
(d) A is false and R is true.
Answer:
(a) Both A and R are correct and R is the correct explanation of A.

Question 107.
Off-shoring means:
(a) Work outsourced to a branch of its own company
(b) Work outsourced to new employees
(c) Work outsourced to a third party locally
(d) Work outsourced to a third party outside its own country
Answer:
(a) Work outsourced to a branch of its own company

Question 108.
G2G systems are classified into:
(a) Internal facing and external facing
(b) Internet facing and Extranet facing
(c) Internal flag and external flag
(d) Internet flag and Extranet flag
Answer:
(a) Internal facing and external facing

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 15 E-Commerce

Question 109.
host the e-books on their websites.
(a) Bulk-buying sites
(b) Community sites
(c) Digital publishing sites
(d) Licensing sites
Answer:
(c) Digital publishing sites

Question 110.
Which of the following is not a characteristics of E-Commerce:
(a) Products cannot be inspected physically before purchase.
(b) Goods are delivered instantly.
(c) Resource focus supply side.
(d) Scope of business is global.
Answer:
(c) Resource focus supply side.

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Science Important Questions Chapter 11 Database Concepts

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 1.
Write the components of the Database management system?
Answer:
There are five major components of the Data base management system. They are

  1. Hardware
  2. Software
  3. Data
  4. Methods
  5. Database Access Language

Question 2.
What is an object model?
Answer:

  1. Object model is to store the data in the form of objects, attributes and methods, classes and Inheritance.
  2. This model handles more complex applications, such as GIS, Engineering design.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 3.
What is the roll of End user?
Answer:

  1. All modem computer Applications, web or mobile, store user data.
  2. The End users are one who store, retrieve, update and delete data.

Question 4.
What is known as EF codd Rules?
Answer:
Database normalization was first proposed by Dr. Edgar F Codd as an integral part of . RDBMS in order to reduce data redundancy and improve data integrity. These rules are known as EF codd mles.

Question 5.
What are unary Relational operations in Relational Algebra?
Answer:
Unary Relational operations are

  • SELECT (σ)
  • PROJECT (Π)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 6.
What are Relational Algebra operations from set theory?
Answer:

  • UNION (∪)
  • INTERSECTION (∩)
  • DIFFERENCE (-)
  • CARTESIAN PRODUCT (×)

Question 7.
What is use of SELECT operation?
Answer:
The SELECT operation used for selecting a subset with tuples according to a given condition.
The general form is σ<sub>c</sub> (R)
R – relation
C – attributes of R<sub>c</sub>

Question 8.
What is a PROJECT?
Answer:

  1. The projection eliminates all attributes of the input relation but those mentioned in the projection list.
  2. The projection method defines a relation that contains a vertical subset of Relation.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 9.
What are types of data model?
Answer:
Types of data model are Hierarchical, Relational, Network, ER and object.

Question 10.
What is Data?
Answer:
Data are raw facts stored in a computer. A data may contain any character, text, word or a number.

Question 11.
What are different types of Relationship?
Answer:
Different types of Relationship are One-to- one, One-to-many, Many-to-one and many- to-many relationship.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 12.
What is main difference for Data and Information?
Answer:

  • Data is unprocessed data, which has no meaning.
  • Information is processed data, organized and formatted.

Question 13.
What is Data Base?
Answer:
A Database is an organized collection of data, generally stored and accessed electronically from a computer system.

Question 14.
What is a advantage for using DBMS?
Answer:

  1. DBMS provides protection and security to the data bases.
  2. It also maintain data consistency in case of multiple users.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 15.
List the components of DBMS.
Answer:

  1. Hardware
  2. Software
  3. Data
  4. Procedures / methods
  5. Database Access Language

Question 16.
What are Advantages of DBMS?
Answer:

  1. Segregation of application program.
  2. Minimal data duplication or Data Redundancy.
  3. Easy retrieval of data using the Query Language.
  4. Reduced development time and maintenance.

Question 17.
Explain the Data model.
Answer:

  1. A data model describes how the data can be represented and accessed from a software after complete implementation.
  2. It is a simple abstraction of complex real world data gathering environment.
  3. The main purpose of data model is to give an idea as how the final system or software will look like after development is completed.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 18.
Write the different types of a Data model?
Answer:
The different types of a Data Model are

  1. Hierarchical Model
  2. Relational Model
  3. Network Database Model
  4. Entity Relationship Model
  5. Object Model

Question 19.
What is the uses of object model?
Answer:

  1. Object model is used in File management system.
  2. It represents real world objects, attributes and behaviours.
  3. It provides a clear modular structure.
  4. It is easy to maintain and modify the existing code.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 20.
Explain components of DBMS.
Answer:
The Database management system can be divided into five major components. They are Hardware, software. Data, Procedure/methods and Data base Access language.

(i) Hardware:
The computer, hard disk, I/O channels for data and any other physical component involved in storage of data.

(ii) Software:
The main component is a program that controls everything.

(iii) Data:
It is that resource for which DBMS is designed. DBMS creation is to store and utilize data.

(iv) Procedure/methods:
They are general instructions to use a database management system such as backups, report generation etc.,

(v) Database Access language:
They are the languages used to write commands to access, insert, update and delete data stored in any database.

Question 21.
Explain Entity Relationship Model. (ER model).
Answer:

  1. ER model is a database model, relationship are created by dividing the object into entity and its characteristics into attributes.
  2. It is very simple and easy to design logical view of data.
  3. The developer can easily understand the system by looking at ER model constructed.
  4. Ellipse represents the attributes, Example D-id, D-name, p-id, P-name.
  5. Attributes describes the characteristics and each entity becomes a major part of the data stored in the database.
  6. Diamond represents the relationship in ER diagrams.
    Eg: Doctor Diagnosis the patient.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 22.
Mention few examples of a database.
Answer:
Dbase, Foxpro, Clipper, Ms Access, MySQL, quick base etc.,

Question 23.
List some examples of RDBMS.
Answer:
SQL server, Oracle, MySQL, Maria DB, SQLite etc.

Question 24.
What is data consistency?
Answer:
On live data, it is being continuously updated and added, maintaining the consistency of data can become a challenge. But DBMS handles it by itself.

Question 25.
What is the difference between Hierarchical and Network data model?
Answer:

Hierarchical model Network data model
In hierarchical mode, a child record has only one parent mode. In a network model, a child may have many parent nodes.
This model represents a one – to – many relationship i.e., parent – child relationship. It represents the data in many – to – many relationship.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 26.
What is normalization?
Answer:

  1. Normalization is the process of minimizing redundancy from the relation or set of relations.
  2. Redundancy in relation may cause insertion, deletion and updation anomalies.
  3. Normal forms are used to eliminate or reduce redundancy in database tables.

Question 27.
What is the difference between Select and Project command?
Answer:

Select

 Project

Select operation is used to select rows from a table that specifies a given logic, which is called as a predicate. Project operation, if the user is interested in selecting the values of a few attributes, rather than selection all attributes of the table.
The select operation is used for selecting a subset with tuples according to a given condition. The projection eliminates all attributes of the input relation but those mentioned in the projection list.
Select just changes cardinality of the result table. Project does change both degree of relation and cardinality.

Question 28.
What is the role of DBA?
Answer:

  1. Database Administrator (DBA) is the one who manages the complete Database Management system.
  2. DBA takes care of the Software Installation and Maintenance, Data Extraction, Transformation and Loading.
  3. DBA another important role for Database backup and Recovery, specialized data handing and security.
  4. DBA setting up employee access i.e., Authentication, capacity planning, performance monitoring, database tuning and Trouble shooting.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 29.
Explain Cartesian Product with a suitable example.
Answer:

(i) The Cartesian product, also referred to as cross-join, returns all the rows in all the tables listed in the query.
(ii) Cross product is a way combining two relations. The resulting relation contains, both relation being combined.
(iii) Eg: A × B means A times B, where the relation A and B have different attributes. This types of operation is helpful to merge columns from two relations.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 2

Question 30.
Explain Object Model with example.
Answer:
(i) Object model stores the data in the form of objects, attributes and methods, classes and inheritance.
(ii) It provides a clear modular structure it is easy to maintain and modify the existing code.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 3

(iii) Circle has the attribute radius.
(iv) Rectangle has the attribute length and breadth.
(v) Triangle has the attributes base and height.
(vi) The objects circle, Rectangle and Triangle inherit from the object shape.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 31.
Write a note on different types of DBMS users.
Answer:

  1. Different Types of database users in DBMS, this differentiation is made according to the interaction of users to the database.
  2. As its name shows, application programmers are the one who writes application programs that uses the database.
  3. They interact with DBMS through DML (Data manipulation language) calls.
  4. Different types of database users are Application programmers. End users, casual users, DBA, system analyst etc.,

Question 32.
Explain the different types of data model.
Answer:
The different types of data model are
(i) Hierarchical model
(ii) Relational model
(iii) Network Database model
(iv) Entity Relationship model
(v) Object model

(i) Hierarchical model:
This model represents a one-to-many relationship i.e., parent-child relationship.
This model is mainly used in IBM main frame computers.

(ii) Relational model:
The basic structure of data in relational model is tables. All the information’s related to a particular type is stored in rows of that table.Hence tables are also known as relations in a relational model.

(iii) Network Database model:
In a Network model, a child may have many parent nodes. It represents the data in many-to-many relationships.
This model is easier and faster to access the data.

(iv) Entity Relationship model (ER mode):
In this model, relationship are created by dividing the object into entity and its characteristics into attributes.
Eg: Rectangle represents the entities, Doctor and patient.

(v) Object model: This model stores the data in the form of objects, attributes and methods, classes and inheritance.
This model handles more complex applications, such as Geographic information system (GIS), scientific experiments, engineering design and manufacturing.
Eg: Rectangle has the attributes length and breadth.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 33.
Explain the different types of relationship mapping.
Answer:
The different types of relationship map used in a database are:
(i) One – to – One Relationship
(ii) One – to – Many Relationship
(iii) Many – to – One Relationship
(iv) Many – to – Many Relationship

(i) One – to – One Relationship:
One entity is related with only one other entity.
One row in a table is linked with only one row in another table and vice versa.
Eg: A student can have only one exam number.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 4

(ii) One – to – Many Relationship:
One entity is related to many other entities.
Eg: Department has many staff members.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 5

(iii) Many – to – One Relationship:
Many entities can be related with only one in the other entity.
Eg: Many staff members working in one department.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 6

(iv) Many – to – Many Relationship:
A many – to – many relationship occurs when multiple records in a table are associated with multiple records in another table.
Eg: Many books in a Library are issued to many students.

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 7

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 34.
Differentiate DBMS and RDBMS.
Answer:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 8

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 9

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 35.
Explain the different operators in Relational algebra with suitable examples.
Answer:
Relational Algebra is a procedural query language used to query the database tables using SQL.
Relational Algebra is divided into various groups.
Unary Relational operations
SELECT (symbol :σ)
PROJECT (symbol :Π)

SELECT (σ):
The SELECT operation is used for selecting a subset with tuples according to a given condition.
The general form ac (R) with a relation R and a condition C on the attributes of R.
Eg:

Student No.NameClass
1001Raju12
1002Vasanth11
1003Murugan 12

σ = 12

Student No.Name

 Class

1001Raju

12

1003

Murugan

12

PROJECT(Π):
The projection eliminates all attributes of the input relation but those mentioned in the projection list.
Eg:
ΠClass (student)
Class
12
11
12
Relational Algebra operations from set theory
• UNION (∪)
• INTERSECTION (∩)
• DIFFERENCE (-)
• CARTESIAN PRODUCT (×)

UNOIN:
Set A union Set B would be expressed as A∪B
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 10

Result:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 11

SET DIFFERENCE:
A-B is a relation which includes all tuples that are in A but not in B.
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 12

INTERSECTION:
A relation consisting of a set of all tuple that are in both in A and B.
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 13

CARTESIAN PRODUCT:
A×B means A times B, where the relation A and B have different attributes.
Eg:

TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts 14

Table A = 3
Table B = 2
Table A × B = 6

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 36.
Explain the characteristics of DBMS.
Answer:
(i) Data stored into Tables:
Data is never directly stored into the database. Data is stored into tables, created inside the database. DBMS also allows to have relationship between tables which makes the data more meaningful and connected.

(ii) Reduced Redundancy:
In the modem world hard drives are very cheap, but earlier when hard drives were too expensive, unnecessary repetition of data in database was a big problem But DBMS follows Normalisation which divides the data in such a way that repetition is minimum.

(iii) Data Consistency:
On live data, it is being continuously updated and added, maintaining the consistency of data can become a challenge.But DBMS handles it by itself.

(iv) Support Multiple user and Concurrent Access:
DBMS allows multiple users to work on it (update, insert, delete data) at the same time and still manages to maintain the data consistency.

(v) Query Language:
DBMS provides users with a simple query language, using which data can be easily fetched, inserted, deleted and updated in a database.

(vi) Security:
The DBMS’also takes care of the security of data, protecting the data from unauthorized access. In a typical DBMS, we can create user accounts with different access permissions, using which we can easily secure our data by restricting user access.

(vii) DBMS Supports Transactions:
It allows us to better handle and manage data integrity in real world applications where multi-threading is extensively used.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Choose the best answer:

Question 1.
_________ is an organized collection of data.
(a) Database
(b) Record
(c) File
(d) Data
Answer:
(a) Database

Question 2.
Which software that allows us to create, define and manipulate database.
(a) DBMS
(b) OS
(c) Spreadsheet
(d) word
Answer:
(a) DBMS

Question 3.
Which is maintaining the consistency of data can become a challenge when it live data is being continuously updated and added?
(a) Reduced Redundancy
(b) Data consistency
(c) Concurrent Access
(d) DBMS Supports
Answer:
(b) Data consistency

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 4.
Which is called the entire collection of related data in one Table?
(a) Record
(b) File
(c) Field
(d) database
Answer:
(b) File

Question 5.
Each row in a Table represents a:
(a) Table
(b) File
(c) record
(d) field
Answer:
(c) record

Question 6.
Each Table column represents a:
(a) Table
(b) File
(c) record
(d) field
Answer:
(d) field

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 7.
A Table is known as:
(a) Relation
(b) Tuple
(c) Attribute
(d) Model
Answer:
(a) Relation

Question 8.
A Row is known as:
(a) Relation
(b) Tuple
(c) Attribute
(d) Model
Answer:
(b) Tuple

Question 9.
A column is known as:
(a) Relation
(b) Tuple
(c) Attribute
(d) Model
Answer:
(c) Attribute

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 10.
Who was developed Hierarchical model system?
(a) IBM
(b) WIPRO
(c) HCL
(d) MICRO SOFT
Answer:
(a) IBM

Question 11.
Which model is easier and faster to access the data?
(a) ER Model
(b) Network model
(c) Relational model
(d) Hierarchical model
Answer:
(b) Network model

Question 12.
Who manages the complete database management system?
(a) Database Administrator (DBA)
(b) Programmer
(c) System model
(d) Operation Engineer
Answer:
(a) Database Administrator (DBA)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 13.
Match the following:

(i) Hard ware (A) Program
(ii) Soft ware (B) Backups
(iii) Data (C) Component
(iv) Method (D) Fact

(a) (i) – C, (ii) – A, (iii) – D, (iv) – B
(b) (i) – C, (ii) – D, (iii) – B, (iv) – A
(c) (i) – D, (ii) – B, (iii) – A, (iv) – C
(d) (i) – D, (ii) – C, (iii) – A, (iv) – B’
Answer:
(a) (i) – C, (ii) – A, (iii) – D, (iv) – B

Question 14.
Match the following:

(i) Table (A) Tuple
(ii) Row (B) Relation
(iii) Column (C) Table
(iv) File (D) Attribute

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C
(c) (i) – C, (ii) – B, (iii) – D, (iv) – A
(d) (i) – C, (ii) – A, (iii) – D, (iv) – B
Answer:
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 15.
Match the following:

(i) Hierarchical (A) Relation Key
(ii) Relational (B) Many – to – many
(iii) Network (C) Modular structure
(iv) Object (D) One – to – many

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – D, (ii) – B, (iii) – C, (iv) – A
(c) (i) – B, (ii) – C, (iii) – A, (iv) – D
(d) (i) – B, (ii) – D, (iii) – A, (iv) – C
Answer:
(a) (i) – D, (ii) – A, (iii) – B, (iv) – C

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 16.
Match the following:

(i) Hierarchical (A) Relation Key
(ii) Relational (B) Many – to – many
(iii) Network (C) Modular structure
(iv) Object (D) One – to – many

(a) (i) – B, (ii) – D, (iii) – A, (iv) – C
(b) (i) – B, (ii) – C, (iii) – A, (iv) – D
(c) (i) – C, (ii) – B, (iii) – D, (iv) – A
(d) (i) – C, (ii) – A, ( iii) – D, (iv) – B
Answer:
(d) (i) – C, (ii) – A, ( iii) – D, (iv) – B

Question 17.
Match the following:

(i) SELECT (A) π
(ii) PROJECT (B) ×
(iii) UNION (C) σ
(iv) CARTESIAN PRODUCT (D) ∪

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – D, (iii) – A, (iv) – C
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B
(d) (i) – D, (ii) – A, (iii) – B, (iv) – C
Answer:
(a) (i) – B, (ii) – C, (iii) – D, (iv) – A

Question 18.
Choose the incorrect pair:

(a) data fact
(b) database C++
(c) RDBMS MySQL
(d) DBMS FoxPro

Answer:
(b)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 19.
Choose the incorrect pair:

Column I

 Column II

(a) Table Tuple
(b) File Table
(c) Column Attribute
(d) Row Record

Answer:
(a)

Question 20.
Choose the incorrect pair:
(a) IBM – Hierarchical
(b) Network – Many
(c) ER-Model – EF codd
(d) GIS – Object model
Answer:
(c) ER-Model – EF codd

Question 21.
Choose the correct pair:
(a) DBA – Database Agent
(b) End user – Programmer
(c) Chen – ER model
(d) SQuestion lite – Compiler
Answer:
(c) Chen – ER model

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 22.
Choose the correct pair:
(a) DBMS – Multiple user
(b) Duplication – Segregation
(c) Redundancy – Program
(d) Query – Application
Answer:
(a) DBMS – Multiple user

Question 23.
Choose the incorrect statement.
(a) A database is an organized collection of data.
(b) The term database is also used to refer to any of the DBMS.
(c) DBMS allows only single user to work on and access it.
(d) Dot is never directly stored into the database.
Answer:
(c) DBMS allows only single user to work on and access it.

Question 24.
Choose the incorrect statement.
(a) The data are fact stored in a computer.
(b) A day may contain any number and special character.
(c) Information is formatted data.
(d) Database also maintain data consistency in case multiple users.
Answer:
(b) A day may contain any number and special character.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 25.
Choose the incorrect statement.
(a) The computer, hard disk and any other physical component involved in storage of data.
(b) The main component is software that control I/O devices storage and everything.
(c) An example of DBMS is C++
(d) Data is that resource for which DBMS is designed.
Answer:
(c) An example of DBMS is C++

Question 26.
Choose the correct statement.
(a) Each row in a table represents a record.
(b) A row is known as a Relation.
(c) A Table is known as a Tuple.
(d) A column is known as a file.
Answer:
(a) Each row in a table represents a record.

Question 27.
Choose the correct statement.
(a) Hierarchical model was developed by Google.
(b) In Hierarchical model, data is represented as a simple tree like structure form.
(c) Hierarchical model represents a many – to – many relationship.
(d) Hierarchical model is mainly used single user operational system.
Answer:
(b) In Hierarchical model, data is represented as a simple tree like structure form.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 28.
Assertion (A):
A basic structure of data in relational model is tables.
Reason (R):
All the information related to a particular type is stored in rows of that table.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(a) Both A and R are True and A is the correct explanation for R.

Question 29.
Assertion (A):
In a Network model, a child may have many parent nodes.
Reason (R):
It represents the data in many -to – one relationship.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(c) A is True but R is False.

Question 30.
Assertion (A):
Object model stores the data in the form of objects, attributes and methods, classes and inheritance.
Reason (R):
DBA is the one who manages the complete database management system.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True
Answer:
(b) Both A and R are True but A is not the correct explanation for R.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 31.
Assertion (A):
In One – to – one Relationship, on entity is related with many other entity.
Reason (R):
One row in a table is linked with many rows.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(d) A is False but R is True.

Question 32.
Assertion (A):
Relational Algebra was used for modeling the data stored in relational databases and defining queries on it.
Reason (R):
Relational Algebra is a procedural query language used to query the database tables using SQL.
(a) Both A and R are True and A is the correct explanation for R.
(b) Both A and R are True but A is not the correct explanation for R.
(c) A is True but R is False.
(d) A is False but R is True.
Answer:
(a) Both A and R are True and A is the correct explanation for R.

Question 33.
Pick the odd one out.
(a) dBase
(b) FoxPro
(c) Clipper
(d) UNIX
Answer:
(d) UNIX

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 34.
Pick the odd one out.
(a) RELATION
(b) MySQL
(c) TUPLE
(d) ATTRIBUTE
Answer:
(b) MySQL

Question 35.
Pick the odd one out.
(a) Object
(b) Methods
(c) DBA
(d) Classes
Answer:
(c) DBA

Question 36.
Which of the following is an organized collection of data?
(a) Database
(b) Spreadsheet
(c) Word processor
(d) Worksheet
Answer:
(a) Database

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 37.
Which of the following characteristics of DBMS is challenged one?
(a) Data redundancy
(b) Data security
(c) Data consistency
(d) Data integrity
Answer:
(c) Data consistency

Question 38.
How many components are there in DBMS?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(d) 5

Question 39.
How many types of data model are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(d) 5

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 40.
What is the basic structure of data in relational model?
(a) Rows
(b) Tables
(c) Columns
(d) Fields
Answer:
(b) Tables

Question 41.
Which year ER – model was developed?
(a) 1972
(b) 1974
(c) 1976
(d) 1978
Answer:
(c) 1976

Question 42.
Expand GIS:
(a) Geographic Information System
(b) Global Information System
(c) Global Information Service
(d) Geographic Information Service
Answer:
(a) Geographic Information System

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 43.
Expand DBA:
(a) Data Base Analyst
(b) Data Bound Analyst
(c) Data Base Administrators
(d) Data Base Advisor
Answer:
(c) Data Base Administrators

Question 44.
How many types of relationships used in a database?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 45.
Expand SQL:
(a) Structured Query Language
(b) Standard Query Language
(c) Structured Quick Learner
(d) Standard Quick Learner
Answer:
(a) Structured Query Language

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 46.
Which of the following data model work with Geographic Information System?
(a) Class
(b) Object
(c) Database
(d) Data
Answer:
(b) Object

Question 47.
How many types of users are there in DBMS?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 48.
Who is care of the security in DBMS?
(a) DBA
(b) System Analyst
(c) Program
(d) Data Analyst
Answer:
(a) DBA

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 49.
Expand RDBMS:
(a) Relational Data Base Management System
(b) Redundancy Data Base Management System
(c) Relational Data Base Multiple System
(d) Relative Data Base Management Service.
Answer:
(a) Relational Data Base Management System

Question 50.
Which symbol represent unary relational operation for SELECT?
(a) σ
(b) π
(c) +
(d) –
Answer:
(a) σ

Question 51.
Which symbol represent unary relational opration for PROJECT?
(a) σ
(b) π
(c) +
(d) –
Answer:
(c) +

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 52.
What is the main purpose of data model?
(a) Idea
(b) Data storage
(c) Data Access
(d) Information
Answer:
(a) Idea

Question 53.
Which data model is represented as a simple tree like structure form?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) Object
Answer:
(b) Hierarchical

Question 54.
Which key is an attribute that uniquely identifies a particular tuples?
(a) Relation
(b) Entity
(c) Primary
(d) object
Answer:
(a) Relation

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 55.
Which model represent a child has only one parent?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) object
Answer:
(b) Hierarchical

Question 56.
Which model represent a child may have many parent?
(a) Relational
(b) Hierarchical
(c) Network
(d) Object
Answer:
(c) Network

Question 57.
Which model represent Doctor and patient?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) Object
Answer:
(c) Entity Relationship

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 58.
Which model is easy to maintain and modify the existing code?
(a) Relational
(b) Hierarchical
(c) Entity Relationship
(d) Object
Answer:
(d) Object

Question 59.
Who is involved in developing and designing the parts of DBMS?
(a) Application Programmer
(b) Software Developer
(c) Computer Operator
(d) (a) or (b)
Answer:
(d) (a) or (b)

Question 60.
Which type of relationship for a student can have only one exam number?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(a) one-to-one

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 61.
Which type of relationship for a school has many students?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(b) one-to-many

Question 62.
Which type of relationship for the teachers are working in one school
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(c) many-to-one

Question 63.
Which type of relationship for students can register many courses?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(d) many-to-many

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 64.
Which operation is used for selAnswer:ecting a subset with tuples according to a given condition?
(a) SELECT
(b) PROJECT
(c) UNION
(d) CARTESIAN PRODUCT
Answer:
(d) CARTESIAN PRODUCT

Question 65.
Which method eliminates all attributes of the input relation but those mentioned in the projection list?
(a) PROJECT ON
(b) SELECT
(c) UNION 4
(d) CARTESIAN PRODUCT
Answer:
(a) PROJECT ON

Question 66.
Which method defines a relation that contains a vertical subset of Relation?
(a) PROJECTION
(b) SELECT
(c) UNION
(d) CARTESIAN PRODUCT
Answer:
(a) PROJECTION

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 67.
Which Relational algebra operation is eliminates duplicates?
(a) DIFFERENCE (-)
(b) UNION (∪)
(c) INTERSECTION (∩)
(d) PRODUCT (×)
Answer:
(b) UNION (∪)

Question 68.
Which Relational algebra operation that includes all tuples that are in A but not in B?
(a) UNION (∪)
(b) DIFFERENCE (-)
(c) INTERSECTION (∩)
(d) PRODUCT (×)
Answer:
(b) DIFFERENCE (-)

Question 69.
Which type of operation is helpful to merge column from two relations?
(a) UNION (∪)
(b) DIFFERENCE (-)
(c) INTERSECTION (∩)
(d) PRODUCT (×)
Answer:
(d) PRODUCT (×)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 70.
What is the acronym of DBMS?
(a) DataBase Management Symbol
(b) Database Managing System
(c) DataBase Management System
(d) DataBasic Management System
Answer:
(c) DataBase Management System

Question 71.
A table is known as:
(a) tuple
(b) attribute
(c) relation
(d) identity
Answer:
(c) relation

Question 72.
Which database model represents parent- child relationship?
(a) Relational
(b) Network
(c) Hierarchical
(d) Object
Answer:
(c) Hierarchical

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 73.
Relational database model was first proposed by:
(a) E F Codd
(b) EE Codd
(c) E F Cadd
(d) E F Codder
Answer:
(a) E F Codd

Question 74.
What type of relationship does hierarchical model represents?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(b) one-to-many

Question 75.
Who is called Father of Relational Database from the following?
(a) Chris Date
(b) Hugh Darween
(c) Edgar Frank Codd
(d) Edgar Frank Cadd
Answer:
(c) Edgar Frank Codd

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 76.
Which of the following is an RDBMS?
(a) Dbase
(b) Foxpro
(c) Microsoft Access
(d) SQLite
Answer:
(d) SQLite

Question 77.
What symbol is used for SELECT statement?
(a) σ
(b) Π
(c) X
(d) Ω
Answer:
(a) σ

Question 78.
A tuple is also known as:
(a) table
(b) row
(c) attribute
(d) field
Answer:
(b) row

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 11 Database Concepts

Question 79.
Who developed ER model?
(a) Chen
(b) EF Codd
(c) Chend
(d) Chand
Answer:
(a) Chen

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 1.
What is known as Nested list?
Answer:
A list contains within another list as an element. This type of list is known as Nested list.

Question 2.
What is known as index value in python?
Answer:
(i) In python, index value is an integer number which can be positive or negative.
(ii) Positive value of index counts from the beginning of the list and negative value means counting backward from end of the list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 3.
What is the output?
Answer:
>>>marks = [10, 20, 30, 40]
>>> marks 1 = [100, 200, 300,400]
>>> print (marks [0])
>>> print (marks 1 [-1])
Output:
10
400

Question 4.
What is the output?
Answer:
>>> Name = [‘Anand’, ‘Arul’, ‘Nithya’,
‘Vani’]
>>> print (Name [1])
>>> print (Name [-2])
Output:
Arul
Nithya

Question 5.
What is the use of index from and index to?
Answer:

  • Index from is the beginning index of the range.
  • Index to is the upper limit of the range which is excluded in the range.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 6.
What is difference between append ( ) and extend ( )?
Answer:

  • append ( ) function is used to add single element in a list.
  • extend ( ) function is used to add more than one element to an existing list.

Question 7.
What is difference between append ( ) and insert ()?
Answer:

  • Append () function is used to add more elements, but it includes elements at the end of list.
  • Insert ( ) function is used to insert an element at any position of a list.

Question 8.
What is the use of pop ( ) and clear ( ) function?
Answer:
pop ( ) function deletes and returns the last element of a list if the index is not given.
Clear ( ) function is used to delete all the elements in list, it delete only the elements and retains the list.

Question 9.
What is the output?
Answer:
for x in range (3, 12, 3)
print, (x)
Output:
3
6
9

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 10.
What is Tuples in python?
Answer:

  • Tuples is similar to list, tuples consists of a number of values separated by comma and enclosed within parenthesis.
  • In a tuple values cannot be changed in the lists.

Question 11.
What is tuple () function?
Answer:
The tuple () function is used to create Tuples from a list. When you create a tuple, from a list, the elements should be enclosed within square brackets.

Question 12. What is called singleton tuple?
Answer:
(i) While creating a tuple with a single element, add a comma (,) at the end of the element.
(ii) In the absence of a comma, python will consider the element as an ordinary data type. Creating a Tuple with one element is called singleton Tuple.

Question 13.
What is Tuple assignment?
Answer:

  • Tuple assignment is a powerful feature in python.
  • It allows a tuple variable on the left of the assignment operator to be assigned to the values on the right side of the assignment operator.
  • Each value is assigned to its respective variable.

Question 14.
How can you creating a set?
Answer:

  • A set is created by placing all the element separated by comma within pair of curly brackets.
  • The set ( ) function can also used to create sets in python.

Question 15.
What are the set operator supports in python?
Answer:
There are four types of set operations supports in python.

They are union (|), Intersection (&), Difference(-) and symmetric difference (A).

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 16.
What is known as Dictionaries?
Answer:
A dictionary is a mixed collection of elements. The keys in a python dictionary is separated by a colon (:) while the commas work as a separator for the elements. The key value pairs are enclosed with curly braces {}.

Question 17.
What is output?
Answer:
Diet = {x:3*x for x in range (2,3)}
print (Diet)
Output:
{2:9,3:9}

Question 18.
What is mean by modification of a value in dictionary?
Answer:
(i) Modification of a value in dictionary is very similar as adding elements.
(ii) When you assign a value to a key, it will simply overwrite the old value.

Question 19.
What is output?
Answer:
Marks = {10, 23, 41, 75}
i=-1
while i> = -4:
print (marks[i])
i = i + -1
Output:
75
41
23
10

Question 20.
What is output?
Answer:
>>>Name = [“Arun”, “Senthil”, “Kumar”]
>>> len(Name)
Output:
3

Question 21.
What is output?
Answer:
for x in range (2,11,2)
print (x)
Output:
2
4
6
8
10

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 22.
What is output?
Answer:
>>> sQuestion = [x**2 for x in range (1,6)]
>>> print (sq)
Output:
[1, 4, 9, 16, 25]

Question 23.
What is output?
Answer:
>> (x, y, z, p) = (2**2, 5/3+4,15%2, 34>65)
>>> print (x,y,z,p)
Output:
45.666666666666667 1 False

Question 24.
How can you create a list in python?
Answer:
Python, a list is simply created by using square bracket.
The element of list should be specified within square brackets.
The syntax is variable = [element-1, element-2, element-3 element -n]
Eg: class = [“RAJA”, “RANI”, 50,100]

Question 25.
Write a python program to print reverse indexing.
Answer:
Marks = [5, 25, 10, 50, 35]
i = -1
while i >= -5
print (marks [i])
i=i+-1
Output:
35
50
10
25
5

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 26.
Write a short note on List Length in python?
Answer:
The len ( ) function in python is used to find the length of a list. The len ( ) function is used to set the upper limit in a loop to read all the elements of a list. If a list contains another list as an element, len ( ) function returns that inner list as a single element.
Eg; . s .
>>>Item = [“soap”, “pen”, “INK”]
>>>len (Item)
Output is 3.

Question 27.
Write short note on list comprehensions.
Answer:
List comprehensions is a simplest way of creating sequence of elements that satisfy a certain condition.
The syntax is List = [expression for variable in range]
Eg:
>>>cubes = [x**3 for x in range (1,6)]
>>>print(cubes)
Output:
1 8 16 32 64
In this example x**3 in the expression is evaluated each time it is iterated. This is the shortcut method of generating series of values.

Question 28.
Write a program to define a list of cities that are metro in India or not.
Answer:
# program for metro city or not
city = [“CHENNAI”, “DELHI”, “MUMBAI”, “KOLKATTA”]
Metro_city = input “Type name of the city”) if metro_city in city:
print (metro_city, “is the metro city in India”) else: ‘
print (metro_city,“is no the *metro city in India”)

Question 29.
Write a program to find the area and circumference of the circle using function with tuple assignment.
Answer:
pi = 22/7
def circle (r):
return (pi * r*r, 2*pi*r)
radius = float (input (“Type radius”))
(area, circum) = circle (radius)
print (“Area of the circle =”, area)
print (“Circumference of the circle-’, circum)

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 30.
Write a program to swap two values using tuples assignment.
Answer:
a = int(input(“Enter value of A:”))
b = int (input(“Enter value of B:”))
print(“Value of A =”, a, “\n Value of B=”,b) (a,b) = (b,a)
print(“Value of A =”,a,”\n value of B =”,b)
Output:
Enter value of A: 54
Enter value of B: 38
Value of A= 54
Value of B = 38
Value of A= 38
Value of B = 54

Question 31.
Write a program to print positive numbers from the list.
Answer:
Numbers = (5,-8,6,8,-4, 3, 1)
Positive = ( )
for i in Numbers:
if i > 0:
positive +=(i,)
print(“Positive Numbers: “, Positive)
Output:
Positive Numbers: (5, 6, 8, 3, 1)

Question 32.
What is output?
Answer:
set_A = {‘A’, 2,4/D’}
set_ B = {‘A’/B’/C’/D’}
print (set A A set B)
output:
{2, 4,’B’, C’}

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 33.
Explain copy (), count (), sum () functions.
Answer:
(i) Copy ( ) – is used returns the copy of the list.
The syntax is list.copy ()
Eg: orilist = [10,20, 30]
x = orilist. copy ()
print (x)
Output [10,20, 30]

(ii) Count () – is used to returns the number of similar elements present in last.
The syntax is list count (value)
Eg: orilist = [10, 20, 30]
x = orilist.count (30)
Output 2

(iii) Sum ( ) – is used returns the sum of values in a list
The syntax is sum (list)
Eg:
orilist = [10, 20, 30]
print (sum(orilist))
Output 60

Question 34.
Write a program that create a list of numbers upto 50 that are divisible by 5.
Answer:
# program for divisible by 5
divby5 = [ ]
for i in range (51):
if (i % 5 =0):
divby5.append (i)
print (divby5)
output [0, 5, 10, 15, 20, 25, 30, 35, 40, 45, 50]

Question 35.
Write a program to read six subject marks and print the total marks.
Answer:
# program for six subjects with Total marks
marks = [ ]
subjects = [“Tamil”, “English”, “physics”, “chemistry”, “maths”, “comp.Science”]
for i in range (6):
m = int (input(“Type mark”))
marks.append (m)
for j in range (len(marks)):
print (“{}.{} mark ={}”. format (j1+, subjects!]], marks[j]))
print (“Total marks”, sum (marks))

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 36.
Write a program to delete all the even numbers from the list.
Answer:
# program for delete all the even numbers
Num=[ ]
for x in range (1, 11):
Num.append (x)
print (“the numbers from 1 to 10 =”, Num)
for index, i in enumerate (Num):
if (i %2 = = 0):
delNum [index]
print (“The list after deletingeven numbers”,
Num)

Question 37.
Write a program that generate a set of prime numbers another set of even numbers.
Answer:
Demonstrate the result of union, intersection, difference and symmetric difference operations.
even=set([x*2 for x in range(l, 11)])
primes=set( )
for i in range(2, 20):
j=2
f=0
while j<i/2:
if i%j==0
f=1
j+=1
if f==0
primes.add(i)
print(“Even Numbers: even)
print(“Prime Numbers: “, primes)
print(“Union: even.union(primes))
print(“Intersection:”, even. intersection(primes))
print(“Difference: even.difference(primes))
print(“Symmetric Difference: even.
symmetric_difference(primes))
Output:
Even Numbers: {2, 4, 6, 8, 10, 12, 14, 16, 18, 20}
Prime Numbers: {2, 3, 4, 5, 7, 11, 13, 17, 19}
Union: {2, 3, 4, 5, 6, 7, 8, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20}
Intersection: {2, 4}
Difference: {6, 8,10, 12, 14, 16, 18, 20}
Symmetric Difference: {3, 5, 6, 7, 8, 10, 11, 12, 13, 14, 16, 17, 18, 19, 20}

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 38.
What is List in Python?
Answer:
List is an ordered collection of values enclosed within square brackets [ ]. A list in python is known as a sequence data types like string. Each value of a list is called as element. It can be of any type such as numbers, characters, strings and even the nested lists.

Question 39.
How will you access the list elements in reverse order?
Answer:
Python enables reverse or negative indexing for the list elements.The python sets -1 as the index value for the last element in list and -2 for the preceding element and so on. This is called as Reverse order.

Question 40.
What will be the value of x in following python code?
List1=[2,4,6[l,3,5]] x=len( List1)
Answer:
The output will be printed as
4
Note: Inner list considered as single element in python.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 41.
Differentiate del with remove( ) function of List.
Answer:

Del

remove ()

del statement is used to delete known element.remove () function is used to remove elements of a list if its index is unknown.
The del statement can also be used to delete entire list.The remove () function can also be used to delete one or

more elements.

Question 42.
Write the syntax of creating a Tuple with n number of elements.
Answer:
Tuple_Name = tuple ([list of element])
Eg: Prime_Num = tuple ([2, 3, 5, 7, 11])

Question 6.
What is set in Python?
Answer:
A set is created by placing all the elements separated by comma within a pair of curly brackets.
The set ( ) function can also used to create sets in python.
Eg: >>>s = {1, 2, 3, ‘M’, 56, 100}

Question 43.
What are the advantages of Tuples over a list?
Answer:
(i) The elements of a list are changeable (mutable) whereas the elements of a tuple are unchangeable (immutable), this is the key difference between tuples and list.
(ii) The elements of a list are enclosed within square brackets. But, the elements of a tuple are enclosed by paranthesis.
(iii) Iterating tuples is faster than list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 44.
Write a shot note about sort( ).
Answer:
Sort( ) function sorts the elements in list.
The syntax is
List.sort(reverse= True|False, key = my func)
• Both arguments are optional.
• Ascending is default.
• If reverse is set as True, list sorting is in descending order.

Question 45.
What will be the output of the following code?
Answer:
list = [2**x for x in range(5)]
print(list)
1 2 4 8 16

Question 46.
Explain the difference between del( ) and clear( ) in dictionary with an example.
Answer:

Del

clear ( )

Del statement is used to delete known element.The Clear () function is used to delete all the elements in a dictionary.
The del statement can also be used to delete entire list.It deletes only the elements and retains the list.
Eg:>>> del name [1] deletes an element whose index value is 1.Eg;»>Name_list. clear () This example removes only the elements and retain the list in Name_list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 47.
List out the set operations supported by python.
Answer:
In python is supports the set operations such as union, intersection, difference and symmetric difference.
(i) Union – It includes all element from two or more sets. The operator is used to union of two sets.
(ii) Intersection – It includes the common elements in two sets. The operator & is used to intersect two sets in python.
(iii) Difference – It includes all elements that are in first set (set A) but not in the second set (set B). The – (minus) operator is used to difference set operation in python.
(iv) Symmetric difference – It includes all the elements that are in two sets (set A and B) but not the one that are common to two sets. The caret (A) operator is used to symmetric difference set operation in python.

Question 48.
What are the difference between List and Dictionary?
Answer:

List

 Dictionary

List is an ordered set of elements. Dictionary is a data structure that is used for matching one element with another.
The index value can be used to access a particular element. In dictionary key represents index.
Lists are used to look up a value. Dictionary is used to take one value and look up another value.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 49.
What the different ways to insert an element in a list. Explain with suitable example.
Answer:
In python, to insert an element in a list for different ways, that are append ( ), extend ( ) and insert ( ) functions.

(i) append ( ) – is used to add a single element. The syntax is
List.append (element to be added)
Eg:
>>> Mark list = [90, 95, 98]
>>> Marklist.append (99)
>>> Print (marklist)
The output is [90, 95, 98, 99]
In this example, marklist is created with three elements.
Through >>>marklist.append (99) is that additional value (99) is included with the existing list as last element.

(ii) extend ( ) is used to add more than one element to an existing list.
The syntax is List.extend ([elements to be added])
Eg:
>>>Namelist.extend ([50,60,70])
>>> print (Namelist)
The output is [90, 95, 98, 99, 50, 60, 70]
In this example, extend ( ) function is used to include multiple elements, it shows all the elements of list after the inclusion of additional elements.

(iii) Insert () – is used to insert an element at any position of a list.
The syntax is:
List.insert (position index, element)
Eg:
>>>Namelist = [50, 60, ‘RAJA’, 4OUNA’, ‘YUVA’] *
>>>Namelist.insert (4, ‘SEKAR’)
>>> Print(Namelist)
The output is
[50, 60, ‘RAJA’, ‘GUNA’, ‘SEKAR’, ‘YUVA’]
In this example insert ( ) function a new element ‘sekar’ at the index value.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 50.
What is the purpose of range( )? Explain with an example.
Answer:
The range () is a function used to generate a series of values in python.
Using range () function, you can create list with series of values. The range () function has three arguments.
The syntax is
range (start value, end value, step value) Where
start value – beginning value of series. Zero is the default beginning value.
end value – upper limit of series. Python takes the ending value as upper limit -1.
step value – It is optional argument, which is used to generate different interval of values. Eg:
for m in range (5, 50, 5)
print (m)
The output will be printed as 5
10
15 „
20
25
30
35
40
45
In this example, start value 5 and end value is 50 with step size is 5, so it will be printed 5, 10, 15….

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 51.
What is nested tuple? Explain with an example.
Answer:
(i) A tuple can be defined inside another tuple is called Nested tuple.
(ii) In a nested tuple, each tuple is considered as an element.
(iii) The for loop will be useful to access all the elements in a nested tuple.
(iv All the functions used in list can be applicable even for tuples.
(v) Tuple is similar to list, values in a list can be changed but not in a tuple.
Eg:
Rankers = ((“ RAJA”, “I”), (“RANI”, “II”), (“LATHA”, “HI”), (“MANI”, “IV”))
for m in Rankers:
print (m)
The output will be printed as
(“RAJA”, “I”)
(“RANI”, “II”)
(“LATHA”, “III”)
(“MANI”, “IV”)

Question 52.
Explain the different set operations supported by python with suitable example.
Answer:
The python is supports the set operations such as union, intersection, difference and symmetric difference.

(i) Union:
It includes all elements from two or more sets.
The operator | is used to union of two sets. The function union ( ) is also used to join two sets in python.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 1

Eg:
set_A={ 10,20}
set_B={‘M’,‘N’}
U set = set _A | set_B
print (U_set)
Output
{10,20,‘M’,‘N’}

(ii) Intersection:
It includes the common elements in two sets.
The operator & is used to intersect two sets in python.
The function intersection ( ) is also used to intersect two sets on python.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 2

Eg:
set_A={5,10, ‘Y’}
set_B={‘X’,‘Y’}
print (set_A&set_B)
Output:
{‘Y’}

(iii) Difference:
It includes all elements that are in first set (set A) but not in the second set (set B)
The minus (-) operator is used to difference set operation. The function difference () is used to difference operation.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 3

Eg:
set_A={‘A’,2,4,’D’}
set_B={‘A\ ‘B\ ‘C’, ‘D’}
print (set_A-set_B}
Output:
{2,4}

(iv) Symmetric difference:
It includes all the elements that are in two sets (set A and B) but not the one that are common to two sets.
The caret (^) operator is used to symmetric difference set operation. The function symmetric difference () is also used to do the same operation.

TN State Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary 4

Eg:
set_A= {‘ A’ ,2,4, ‘ D ’}
print (set_A A set_B)
output:
{2,4,‘B’, ‘C’}

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 53.
Write a program to remove duplicates from a list.
Answer:
# program to remove duplicates from a list,
n = [10,20,30,20,10,50,60,40,80,50,40]
dupnumber = set ()
uniq_number=[ ]
for x in n:
if x not in dupnumber:
uniq_number.append (x)
dup number.add (x)
print (dup number)

Question 54.
Write a program that prints the maximum value in a Tuple.
Answer:
# program that prints maximum value in tuple.
tuple l,tuple2 = (‘TAMIL’, ‘ENGLISH’,’ ‘MATHEMATICS’, ‘COMPUTER SCIENCE’), (256, 500, 2720)
print (“The maximum value element”, max (tuple 1))
print (“The maximum value element”, max (tuple2))
The output is
The maximum value element COMPUTER SCIENCE
The maximum value element 2720.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 55.
Write a program that finds the sum of all the numbers in a Tuples using while loop.
Answer:
# program for sum of all the numbers in tuples using while loop.
n= int (input (“Type maximum number”))
sum = 0
while (n>0):
sum+=n
n-=1
print (“The sum is”, sum)

Question 56.
Write a program that finds sum of all even numbers in a list.
Answer:
# program for sum of all even numbers in a list
m = int (input (“Type the maximum value”))
T= 0
for n in range (1, m+1):
if (n % 2 =0):
print (“{0}’’.format (n)/format (n))
T =T+N
print (“The sum Even numbers from 1 to {0}
= {1}”.format (n,t))

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 57.
Write a program that reverse a list using a loop.
Answer:
# program that reverse a list using loop.
word_list= [‘RAM’, ‘MAN’, ‘RAJ’,’SUN’]
i = len (word_list)-1
while i>=0:
print (word list [i])
i-=l
Word_list[‘RAM’,(or)‘MAN’, ‘RAJ’, ‘SUN’]
for i in range (len(word_list)-1,-1,-1)
print (wordlist[i])

Question 58.
Write a program to insert a value in a list at the specified location.
Answer:
# program to insert a value in a list at the specified location
defmain( )
Listl= [‘RAM’, ‘BALU’, ‘CHAN’, ‘WHAT’,‘THAT’]
print (List 1)
list1.insert (3, ‘WHY’)
print(list1)
Listl.insert (0, ‘city’)
print (list1)
List2 = [3, 5, 7,1]
for elem in reversed (list2): //insert all the elements
list1.insert (3, elem)
print (list1)
List1 = list1 [:3]+list2 +listl[3:]
print (list+1)
if name —‘main’ main()
Output:
l.[‘RAM’, ‘BALU’,’CHAN’, ‘WHAT’, ‘THAT’]
2.[‘RAM’, ‘BALU’, ‘CHAN’, ‘WHY’, ‘WHAT’, ‘THAT’]
3.[‘CITY’, ‘RAM’, ‘BALU’, ‘CHAN’, ‘WHY’, ‘WHAT, ‘THAT’]
4.[‘CITY’, ‘RAM’, ‘BALU’, 3,5,7,1, ‘CHAN’, ‘WHAT’, ‘THAT’].
5.[‘RAM’ ‘BALU’, ‘CHAN’, 3,5,7,1, ‘WHAT’, ‘THAT’]

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 59.
Write a program that creates a list of numbers from 1 to 50 that are either divisible by 3 or divisible by 6.
Answer:
# program for list of numbers from 1 to 50
that are either divisible by 3 or divisible by 6.
for i in range (1, 50+1):
if (i % 3 =0 or i % 6==0):
print (i)

Question 60.
Write a program to create a list of numbers in the range 1 to 20. Then delete all the numbers from the list that are divisible by 3.
Answer:
# program list numbers from 1 to 20 and delete all from divisible by 3
number_list – (1:20)
print (numberlist)
for i in range (1,20+1):
if (i %3 =0):
del (i)

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 61.
Write a program that counts the number of times a value appears in the list. Use a loop to do the same.
Answer:
# program counts the number of times a
value appears in the list
1st = [2, 1, 5, 10, 5, 3, 4, 9, 12, 5, 5, 4]
def count (1st, x):
count = 0
for i in 1st:
if (i =x)
count = count+1
return count
x=5
print (countx (1 st, x))
Output: 4

Question 62.
Write a program that prints the maximum and minimum value in a dictionary.
Answer:
# program maximum and minimum value in a dietionary.
my_dict = {‘x’:500, ‘y’:5000, ‘z’: 8000}.
key_max = max (my_dict.keys( ), key = (lambda k: my_dict[k]))
keyjnin =? min (my_dict.keys( ), key = (lambda k: my dict[k]))
print (‘maximum value’,my_dict [key_max])
print (‘minimum value’ ,my_dict[key_min])
output
maximum value 8000
minimum value 500.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Choose the best answer:

Question 1.
What is a position of an element is indexed with starting number?
(a) 0
(b) 1
(c) -1
(d) None
Answer:
(a) 0

Question 2.
What is used, a list is simply created in python?
(a) ( )
(b) [ ]
(c) {}
(d) All of them
Answer:
(b) [ ]

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 3.
Which value of index counts from the beginning of the list elements?
(a) Positive
(b) Negative
(c) Both (a) and (b)
(d) None of these
Answer:
(a) Positive

Question 4.
Which value of index counts backward from end of the list?
(a) Positive
(b) Negative
(c) Both (a) and (b)
(d) None of these
Answer:
(b) Negative

Question 5.
Which are used to access all elements from a list?
(a) loop
(b) statements
(c) function
(d) none of these
Answer:
(a) loop

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 6.
What is the range [0 : 5] in python?
(a) 0 to 5
(b) 0 to 4
(c) 1 to 5
(d) 1 to 4
Answer:
(b) 0 to 4

Question 7.
Which function is used to add a single element to an existing list?
(a) append ( )
(b) extend( )
(c) Add ( )
(d) more( )
Answer:
(a) append ( )

Question 8.
What happen in the following statement? marks.append (99)
(a) 99 is included with the existing list in mark list.
(b) 99 is added to existing values in mark list.
(c) 99 is removed from existing list in mark list.
(d) 99 is added to the first value of existing list.
Answer:
(a) 99 is included with the existing list in mark list.

Question 9.
Which function is used to deletes only element and retains the list?
(a) del ( )
(b) clear ( )
(c) remove ( )
(d) erase ( )
Answer:
(b) clear ( )

Question 10.
Which function can be used to delete an element using the given index value?
(a) del ( )
(b) clear ( )
(c) pop ( )
(d) remove ( )
Answer:
(c) pop ( )

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 11.
Which function can be used to delete the elements if the index value is not known?
(a) del ( )
(b) clear ()
(c) pop ( )
(d) remove ( )
Answer:
(d) remove ( )

Question 12.
Which function is used to generate a series of values in Python?
(a) pop ( )
(b) range ( )
(c) len ( )
(d) count ( )
Answer:
(b) range ( )

Question 13.
What is the output?
>>> n= [for x in range (1,10):
>>> print (n)
(a) [1, 2, 3, 4, 5, 6, 7, 8, 9]
(b) [1, 2, 3, 4, 5, 6, 7, 8, 9, 10]
(c) both (a) and (b)
(d) [2, 3, 4, 5, 6, 7, 8]
Answer:
(a) [1, 2, 3, 4, 5, 6, 7, 8, 9]

Question 14.
What is the output.
>>> m = [4,3,4,2,4]
>>> n = m.count (4)
>>> print (n)
(a) 4
(b) 3
(c) 2
(d) 5
Answer:
(b) 3

Question 15.
Choose the incorrect pair:
(a) Positive index – Beginning onwards
(b) Negative index – Reverse order
(c) List – Initial value 1
(d) Tuples – Similar to list
Answer:
(c) List – Initial value 1

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 16.
Choose the incorrect pair:
(a) Set – Data type
(b) Index from – Beginning index
(c) Index to – Upper limit
(d) Dictionary – Numeric constant
Answer:
(d) Dictionary – Numeric constant

Question 17.
Choose the incorrect pair:
(a) List – data type
(b) Tuples – numeric constant
(c) Set – floating constant
(d) Dictionary – exponent
Answer:
(a) List – data type

Question 18.
Choose the incorrect pair:
(a) remove ( ) – delete element
(b) pop ( ) – delete index value
(c) clear ( ) – delete all element
(d) del ( ) – delete single element
Answer:
(d) del ( ) – delete single element

Question 19.
Choose the correct pair:
(a) list – immutable
(b) Tuple – mutable
(c) dictionary – mixed
(d) group – single
Answer:
(c) dictionary – mixed

Question 20.
Choose the correct pair:
(a) union – more sets
(b) intersection – two but not one
(c) difference – common sets
(d) symmetric – first set
Answer:
(a) union – more sets

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 21.
Choose the incorrect statement:
(a) Python has four collection of data types.
(b) A list is a numeric constant.
(c) Each value list is called as element
(d) The elements can be modified or replaced.
Answer:
(b) A list is a numeric constant.

Question 22.
Choose the incorrect statement:
(a) A list is simply created by using curly brackets.
(b) Nested list containing another list as an element.
(c) Python assigns automatic in^ex value.
(d) Index value of a list begins with zero.
Answer:
(a) A list is simply created by using curly brackets.

Question 23.
Choose the incorrect statement:
(a) Python enables reverse or negative indexing list.
(b) Python negative lists index in sequence order.
(c) Python sets -1 as the index value for the last element.
(d) Loops are used to access all elements.
Answer:
(b) Python negative lists index in sequence order.

Question 24.
Choose the correct statement:
(a) In python, the lists are mutable.
(b) Append ( ) function is used to add more element.
(c) Extend ( ) function is used to add single element
(d) Insert ( ) function is used to insert at last element only.
Answer:
(a) In python, the lists are mutable.

Question 25.
Choose the correct statement:
(a) del statement is used to delete unknown elements.
(b) remove ( ) is used to delete known elements.
(c) clear () is used to delete all the elements in list.
(d) pop () is used to delete single element and not returns the any element.
Answer:
(c) clear () is used to delete all the elements in list.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 26.
Match the following:

(i) Union (A) —
(ii) intersection (B) |
(iii) difference (C) ^
(iv) symmetric (D) &

(a) (i) – B, (ii) – D, (iii) – A, (iv) – C
(b) (i) – B, (ii) – A, (iii) – C, (iv) – D
(c) (i) – C, (ii) – D, (iii) – A, (iv) – B
(d) (i) – C, (ii) – A, (iii) – B, (iv) – D
Answer:
(a) (i) – B, (ii) – D, (iii) – A, (iv) – C

Question 27.
Match the following:

(i) del ( ) (A) delete unknown element
(ii) remove ( ) (B) delete known element
(iii) Pop( ) (C) delete only elements
(iv) clear ( ) (D) delete and returns

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C
(c) (i) – D, (ii) – A, (iii) – B, (iv) – C
(d) (i) – D, (ii) – C, (iii) – B, (iv) – A
Answer:
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 28.
Match the following:

(i) index from (A) Upper limit
(ii) index to (B) Add single
(iii) append ( ) (C) Add more
(iv) extend ( ) (D) Lower limit

(a) (i) – B, (ii) – D, (iii) – C, (iv) – A
(b) (i) – B, (ii) – C, (iii) – A, (iv) – D
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B
(d) (i) – D, (ii) – A, (iii) – B, (iv) – C
Answer:
(d) (i) – D, (ii) – A, (iii) – B, (iv) – C

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 29.
Match the following:

(i) list(A) from list
(ii) Tuple(B) mixed
(iii) set(C) element
(iv) dictionary(D) unordered

(a) (i) – C, (ii) – A, (iii) – B, (iv) – D
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B
(c) (i) – B, (ii) – D, (iii) – A, (iv) – C
(d) (i) – B, (ii) – C, (iii) – A, (iv) – D
Answer:
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B

Question 30.
Match the following:

(i) range (1) (A) 5
(ii) range (5, 6) (B) 3
(iii) range (1, 4, 2) (C) 1
(iv) range (1, 1 + 1) (D) 0

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – D, (ii) – B, (iii) – C, (iv) – A
(c) (i) – B, (ii) – D, (iii) – C, (iv) – A
(d) (i) – B, (ii) – C, (iii) – A, (iv) – D
Answer:
(a) (i) – D, (ii) – A, (iii) – B, (iv) – C

Question 31. Assertion (A):
In python, each value of a list is called as element.
Reason (R):
It can be of any type such as numbers, characters, strings and even the nested lists.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is falset
(d) A is false, but R is true.
Answer:
(a) Both A and R are true and R is the correct explanation for A.

Question 32.
Assertion (A):
Python assign an automatic index value for each element of list begin with zero.
Reason (R):
Positive value of index counts from the end of the list.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 33.
Assertion (A):
Index to is the lower limit of the range.
Reason (R):
Index from is the upper limit of the range.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Question 34.
Assertion (A):
The Insert ( ) is used to insert an element at any position of a list.
Reason (R):
Python is used to add more elements in a list. .
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both A and R are true and R is the correct explanation for A.

Question 35.
Assertion (A):
The Tuple ( ) function is used to create Tuples from a list.
Reason (R):
When you create a tuple, from a list, the elements should be enclosed curlly brackets.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 36.
Pick the odd one out:
(a) Tuples
(b) Set
(c) Dictionary
(d) For
Answer:
(d) For

Question 37.
Pick the odd one out:
(a) append ( )
(b) count ( )
(c) extend ( )
(d) insert ( )
Answer:
(b) count ( )

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 38.
Pick the odd one out:
(a) remove ( )
(b) clear ( )
(c) index ( )
(d) pop ( )
Answer:
(c) index ( )

Question 39.
Pick the odd one out:
(a) Dictionary
(b) Union
(c) Intersection
(d) Symmetric
Answer:
(a) Dictionary

Question 40.
Pick the odd one out:
(a) copy ( )
(b) count ( )
(c) index ( )
(d) tuple ( )
Answer:
(d) tuple ( )

Question 41.
Which function is used to add a single element to an existing list?
(a) append ( )
(b) add ( )
(c) extend ( )
(d) insert ( )
Answer:
(a) append ( )

Question 42.
Which function is used to add more than one element in an existing list?
(a) append ( )
(b) add ()
(c) extend ( )
(d) insert ( )
Answer:
(c) extend ( )

Question 43.
How many ways to delete element from a list?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 44.
What is output?
m = list(range(0, 5, 2))
(a) [2, 4]
(b) [0, 2, 4]
(c) [1, 3, 5]
(d) [0, 3, 5]
Answer:
(b) [0, 2, 4]

Question 45.
When using sort ( ) function, the default sorting is:
(a) Ascending
(b) Descending
(c) No sorting
(d) Multiple sorting
Answer:
(a) Ascending

Question 46.
Which of the following can be used to access a particular element in a dictionary?
(a) [ ]
(b) {}
(c) ( )
(d) < >
Answer:
(a) [ ]

Question 47.
What is a powerful feature in python assignment?
(a) Tuple Assignment
(b) List Assignment
(c) Pair Assignment
(d) Assignment statement
Answer:
(a) Tuple Assignment

Question 48.
Which key is separated by python dictionary?
(a) ,
(b) :
(c) ::
(d) .
Answer:
(b) :

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 49.
What is output?
>>> marks = [10, 23, 41, 75]
>>> print (marks[-l])
(a) 10
(b) 23
(c) 75
(d) 41
Answer:
(c) 75

Question 50.
The key value pair are enclosed with:
(a) [ ]
(b) { }
(c) ( )
(d) All of these
Answer:
(b) { }

Question 51.
What is the acronym of DBMS?
(a) DataBase Management Symbol
(b) Database Managing System
(c) DataBase Management System
(d) DataBasic Management System
Answer:
(c) DataBase Management System

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 52.
A table is known as:
(a) tuple
(b) attribute
(c) relation
(d) identity
Answer:
(c) relation

Question 53.
Which database model represents parent- child relationship?
(a) Relational
(b) Network
(c) Hierarchical
(d) Object
Answer:
(c) Hierarchical

Question 54.
Relational database model was first proposed by:
(a) E F Codd
(b) E E Codd
(c) E F Cadd
(d) E F Codder
Answer:
(a) E F Codd

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 55.
What type of relationship does hierarchical model represents?
(a) one-to-one
(b) one-to-many
(c) many-to-one
(d) many-to-many
Answer:
(b) one-to-many

Question 56.
Who is called Father of Relational Database from the following?
(a) Chris Date
(b) Hugh Darween
(c) Edgar Frank Codd
(d) Edgar Frank Cadd
Answer:
(c) Edgar Frank Codd

Question 57.
Which of the following is an RDBMS?
(a) Dbase
(b) Foxpro
(c) Microsoft Access
(d) SQLite
Answer:
(d) SQLite

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 58.
What symbol is used for SELECT statement?
(a) σ
(b) Π
(c) X
(d) Ω
Answer:
(a) σ

Question 59.
A tuple is also known as:
(a) table
(b) row
(c) attribute
(d) field
Answer:
(b) row

TN Board 12th Computer Science Important Questions Chapter 9 Lists, Tuples, Sets and Dictionary

Question 60.
Who developed ER model?
(a) Chen
(b) EF Codd
(c) Chend
(d) Chand
Answer:
(a) Chen

TN Board 12th Computer Science Important Questions