TN Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 1.
What is physical money?
Answer:
Physical money is cash, which is the traditional and most widely used payment instrument that consumers use, in their daily lives to buy goods and services.

Question 2.
What is an electronic payment?
Answer:
The term electronic payment refers to a payment made from one bank account to another bank account using any one electronic methods.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 3.
What are newer electronic payment system?
Answer:
UPI, Bitcoin, Mobile payment, Digicash, eway, Paypal, Paytm, Applepay etc…

Question 4.
Write the classification of electronic payment methods.
Answer:
Electronic payment systems are generally classified into two types. They are

  • Micro electronic payment systems.
  • Macro electronic payment systems.

Question 5.
What is Micro Electronic Payment systems?
Answer:
Micro electronic payment systems is an on-line payment system designed to allow efficient and frequent payments of small amounts.
Eg: Watch a movie online.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 6.
What is Macro electronic payment systems?
Answer:
Macro electronic payment systems is an on-line payment systems, supports payment of higher value.
Eg: Card based payment.

Question 7.
What is payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments.
Eg: Debit card.

Question 8.
What is credit card?
Answer:

  1. Credit card is an electronic payment system normally used for retail transactions.
  2. Credit card enables the bearer to buy goods or services from a vendor to payback the value later with an agreed interest.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 9.
Who is Bearer?
Answer:
The holder of the credit card account who is responsible for payments of invoice in full or a portion of the balance and carried forward.

Question 10.
Who is merchant?
Answer:
Storekeeper or vendor who sell or providing service, receiving payment made by its customers through the credit card.

Question 11.
Who Acquirer?
Answer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant send authorization requests to the issuing bank.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 12.
Define credit card network?
Answer:
Credit card network acts as the intermediate between the banks. The company responsible for communicating the transaction between the acquirer and the credit card issuer.

Question 13.
Who is Issuer?
Answer:
Bearer’s bank, that issue the credit card, set limit of purchases, decides the approval of transactions, issue invoices for payments, charges, offer card linked products, insurance, additional cards etc.

Question 14.
Write the size of the payment cards.
Answer:
All payment cards are usually plastic cards of size 85.60 mm width x 53.98 mm height, rounded comers with a radius of 2.88 mm to 3.48 mm and thickness of 0.76 mm.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 15.
What is EMV chip?
Answer:
EMV (Europay, Mastercard, Visa) is integrated chip in addition to magnetic stripe to store cardholder’s information.

Question 16.
What is RFID symbols?
Answer:
RFID symbols are four curved lines radiating rightwards similar to a titled Wi-Fi symbol. It indicates contactless smart card.

Question 17.
What is card brand logo?
Answer:

  1. Card brand logo is the name of the credit card network company.
  2. Visa, Mastercard, Rupay are leading credit card network companies.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 18.
What is magnetic stripe?
Answer:
Magnetic stripe is an iron based magnetic material containing encrypted data about the card holder and account number.

Question 19.
What is Hologram?
Answer:
Hologram is a security feature that prevents duplication. It is a 3-dimensional image formed by interference of light beams.

Question 20.
What is CVC / CW?
Answer:
CVC is a Card Verification Code / Card Verification Value is a 3 digit code usually printed to the left of signature pane validates the card.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 21.
What is debit card?
Answer:
Debit card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account.

Question 22.
What are the ways of processing debit card transactions?
Answer:
Now, there are three ways of processing debit card transaction. They are

  • EFTPOS (also known as online debit or PIN debit)
  • Offline debit, (also known as signature debit)
  • Electronic purse card system.

Question 23.
What is stored value cards?
Answer:
Stored value card is a type of debit card that is pre-loaded with certain amount, with which a payment is made. It is a card that has default monetary value on to it.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 24.
What are the types of stored value card?
Answer:
There are two types of stored value card, they are

  1. Closed loop: Closed loop cards are issued by a specific merchant.
  2. Open loop: Open loop cards can be used to make debit transactions at variety of retailers.

Question 25.
What is a smart card?
Answer:
A smart card is a physical card that has an embedded integrated chip that acts as a security. A smart card is the card with which we can exchange the data, store it and manipulate data.

Question 26.
What is ECS?
Answer:
ECS (Electronic Clearing Services) can be defined as repeated transfer of funds from one bank account to multiple bank accounts or vice versa.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 27.
What is EFT?
Answer:
EFT (Electronic Funds Transfer) is the electronic transfer of money over an online network. EFT is a widely used method for moving funds in B2B business models used.

Question 28.
What is E-cash?
Answer:
E-cash (Electronic Cash) is a currency that flows in the form of data. It is a digital money product that provides a way to pay for products and services without resorting to paper or coin currency.

Question 29.
What are function of cryptocurrency?
Answer:
The function of cryptocurrency is based on technologies such as mining, block chain, directed acyclic graph, distributed register etc.,

Question 30.
What is called Digicash?
Answer:
In 1989, David chaum an American cryptographer invented the first form of cryptocurrency called Digicash in the Netherlands.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 31.
Define the term Bitcoin.
Answer:
The term cryptocurrency began to be used after the appearance of the Bitcoin. Bitcoin is the most popular and the first decentralized cryptocurrency.

Question 32.
What is Altcoins?
Answer:

  1. Altcoins is the collective name for all cryptocurrencies that appeared after bitcoin.
  2.  Many altcoins are inherently very similar to bitcoin in characteristics and structure.

Question 33.
What is mobile banking?
Answer:
Mobile banking is another form of net banking. The term mobile banking also called m-banking. M-banking refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 34.
What are the transaction made by the m-banking?
Answer:

  1. Balance checking, account transfers, payments, purchases etc…
  2. Transactions can be done at anytime and anywhere using m-banking.

Question 35.
What is known as Internet Banking?
Answer:
Internet banking is a collective term for E-banking, online banking, virtual banking, direct banks, web banking and remote banking.

Question 36.
What is self service banking?
Answer:

  1. Self service banking means, a branch of bank exclusively operating of an individual customer.
  2. The online banking system will typically connect to the core banking system operated by customers themselves.

Question 37.
Write the advantages of Internet banking.
Answer:

  1. In Internet banking access it can be used anywhere in the world and at any time.
  2. Internet banking does not need installing any additional software, that is any standard browser is adequate.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 38.
Expand the following,
(a) PIN;
(b) OTP;
(c) ACH;
(d) COD.
Answer:
(a) PIN – Personal Identification Number
(b) OTP – One Time Password
(c) ACH – Automated Clearing House
(d) COD – Cash On Delivery

Question 39.
What is UPI?
Answer:
UPI (Unified Payments Interface) is a real-time payment system developed by National Payments Corporation of India (NCPI) to facilitate inter-bank transactions.

Question 40.
What are the types of UPI of address?
Answer:
There are two types of UPI address, they are,

  • Global address – It includes bank account numbers and IFSC.
  • Local address – It is a virtual payment address.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 41.
What is VPA?
Answer:
VPA (Virtual Payment Address) is enable us to send and receive money from multiple banks and prepaid payment issuers. VPA also called as UPI-ID, is a unique ID similar to email-id.

Question 42.
What is MPIN?
Answer:
MPIN (Mobile Banking Personal Identification Number) is required to confirm each payment.

Question 43.
What is COD?
Answer:
COD (Cash On Delivery) also called as collection on delivery, describes a mode of payment in which the payment is made only on receipt of goods rather in advance.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 44.
What is BHIM?
Answer:
BHIM (BHarat Interface for Money) is an exclusive mobile app for UPI developed by National Payments Corporation of India (NPCI) and launched on 30 December 2016.

Question 45.
What is IFSC?
Answer:
IFSC (Indian Financial System Code) is an 11 digit alpha-numeric code issued by Reserve Bank of India.

Question 46.
What are the ways can be explained the Micro electronic payment transactions?
Answer:

  1. Customer proves his authentication and the payment processor issues micro payments.
  2. Customer pays the micro payments to the online service provider and gets the requested goods or services form them.
  3. Seryice provider deposits micro payments received from the customer to the payment processor and gets the money.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 47.
Write the steps on micro electronic payment systems work on the basis of simple cryptographic algorithms.
Answer:

  1. Hash chain based micro electronic payment system.
  2. Hash collisions and hash sequences based micro electronic payment systems.
  3. Shared secrete keys based micro electronic payment systems.
  4. Probability based micro electronic payment systems.

Question 48.
What are the popular macro on-line payment systems?
Answer:
Some of the popular macro on-line payment system are

  1. Card based payment systems.
  2. Electronic account transfer.
  3. Electronic cash payment systems.
  4. Mobile payment systems and Internet payment systems.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 49.
What are the ways used card payment system?
Answer:
There are three widely used card based payment systems. They are,

  1. Credit card based payment systems (Pay later)
  2. Debit card based payment systems (Pay now)
  3. Stored value card based payment systems (pay before)

Question 50.
Write a short note on Diners club card.
Answer:

  1. The Diners club card, which was made of paper card board.
  2. The card was accepted in only 27 restaurants and was used only by friends.
  3. Later it was enhanced and accepted worldwide.
  4. Now, the card was made of plastic and the diners club still exists today under the name Diners Club International.

Question 51.
How can be classified by smart cards?
Answer:
Smart cards can be classified into contact smart cards and contactless smart cards.
1. Contact smart cards: Contact smart cards have a contact area of approximately 1 square centimeter, comprising several gold-plated contact pads.
These cards used as a communication medium between the smart card and a host.

2. Contactless smart cards: Contactless smart card is empowered by RF induction technology.
Smart cards, whether they are contact or contactless cards do not have an internal power source.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 52.
Write the advantages of the Electronic ClearingServices (ECS).
Answer:

  1. ECS system are bulk payments, guaranteed payments and no need to remember payment dates.
  2. It can be used by institutions for making payments such as disbursing of salary, pension or dividend interest among shareholders.
  3. Individual bank customers can make small value such as paying EMI of a loan, electricity bills, telephone bills, insurance premium, as well as SIP investments.

Question 53.
Describes the users of ECS.
Answer:
ECS can be used for both credit and debit purposes.
1. ECS credit: ECS credit is used for making bulk payment of amounts. In this mode, a single account is debited and multiple accounts are credited. This type of transactions are push transactions.

2. ECS debit: ECS debit is an inverse of ECS credit. It is used for bulk collection of amounts. This type of transactions are pull transactions.

Question 54.
Explain NEFT.
Answer:

  1. NEFT (National Electronic Fund Transfer), it is called by India. In USA, they may be referred to as ‘e-cheques’.
  2. NEFT is an electronic fund transfer system initiated by the Reserve Bank of India.
  3. It is established and maintained by Institute for Development and Research in Banking Technology (IDRBT).

Question 55.
Explain the RTGS payment system.
Answer:

  1. RTGS (Real Time Gross Settlement system) is a payment system particularly used for the settlement of transactions.
  2. RTGS transactions are processed at the real-time, RTGS payments are also called push payments.
  3. RTGS transactions are unconditional and Irrevocable method.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 56.
Explain the block chain in cryptocurrency.
Answer:

  1. Blockchains are an open distributed book that records transactions of cryptocurrencies between any two parties in an efficient and verifiable manner.
  2. It is continuously growing list of records, called blocks, which are linked to each other and protected using encryption algorithm.
  3. Each block typically contains a hash pointer as link to a previous block.
  4. The validity of the coins of each cryptocurrency is also provided by a blockchain.

Question 57.
What are the ways can be implemented by mobile banking operations?
Answer:
The mobile banking operations can be implemented in the following ways

  1. Connecting the call center.
  2. Automative IVR telephone services.
  3. Using a mobile phone via SMS.
  4. WAP technology
  5. Using smartphone applications.

Question 58.
What are the advantages of credit card?
Answer:

  1. Most credit cards are accepted worldwide.
  2. It is not necessary to pay physical money at the time of purchase. The customer gets an extra period to pay the purchase.
  3. Depending on the card, there is no need to pay annuity.
  4. Alows purchases over the internet in installments.
  5. Some issuers allows “round up” the purchase price and pay the difference in cash to make the transaction easy.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 59.
Describe the modern credit card number.
Answer:

  1. The modem credit card number has 16 digit unique identification number.
  2. The first digit of the credit number is Major Industry Identifier (Mil). Eg: 4 banks.
  3. The next 5 digits uniqueiv identifies the issuing operations.
  4. The first 6 digits together called as Issuer Identification Number (IIN).
  5. The next 9 digits are the Account number.
  6. The last digit is a check digit.

Question 60.
How can you to transfer the fund using net banking?
Answer:

  1. Login to net banking account using user name with password given by the bank.
  2. Add the beneficiary as a payee to enable transfer of fund. Account number, Name, IFSC are to be filled.
  3. The beneficiary is added, choose RTGS / NEFT / IMPS as mode of fund transfer.
  4. Select the account to transfer money from, select the payee, enter the amount to be transferred.
  5. Click on submit button
  6. Now, enter the OTP received to mobile number linked to the corresponding, account for complete the transaction.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 61.
What are the advantage of mobile banking?
Answer:

  1. Immediate money transfers through mobile device round the clock 24×7.
  2. Can use single mobile application for accessing multiple bank accounts.
  3. Single click authentication for transferring of fund.
  4. There is not required to enter the details such as card number, Account number, IFSC etc., for every transaction.
  5. Electronic payments will become much easier without requiring a digital wallet, or credit or debit card.

Question 62.
Define electronic payment system.
Answer:

  1. An electronic payment system is a financial arrangement that consists an intermediator to facilitate transfer of money-substitute between a payer and a receiver.
  2. Sometimes it is also called liquidation, clearing system or clearing service.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 63.
Distinguish micro electronic payment and macro electronic payment.
Answer:

Micro electronic payment

 Macro electronic payment

Micro electronic payment system designed to allow efficient and frequent payments of small accounts. Macro electronic payment systems support payments of higher value.
As the security of micro electronic payment systems is comparatively low it could be tampered. The security requirements are more rigorous in macro payment systems because of huge money transactions.

Question 64.
List the types of micro electronic payments based on its algorithm.
Answer:

  1. Hash chain based micro electronic payment systems.
  2. Hash collisions and hash sequences based micro electronic payment systems.
  3. Shared secrete keys based micro electronic payment systems.
  4. Probability based micro electronic payment systems.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 65.
Explain the concept of e-wallet.
Answer:

  1. e-wallet (Electronic wallet) or electronics purses allow users to make electronic transactions quickly and securely over the internet through smartphones or computer.
  2. There are several electronic wallet services that are now widely used. Eg: Paypal, SBI Buddy.

Question 66.
What is a fork in cryptocurrency?
Answer:
Fork in cryptocurrency are cryptocoins, e-cash, alternative currencies or virtual currencies.
Cryptocurrency also be distributed accounting system based on cryptography, storing information about the state of ownership in conventional units.

Question 67.
Define micro electronic payment and its role in E-Commerce.
Answer:

  1. Micro electronic payment is an on-line payment system designed to . allow efficient and frequent payments of small accounts,
  2. The major role in E-Commerce is of micro electronic payment systems were designed to pay for simple goods on the Internet.
  3. And the micro on-line payments by customer, service provider and payment processor are involved.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 68.
Compare and contrast the credit card and debit card.
Answer:

Credit card

 Debit card

Credit card is an electronic payment system normally used for retail transactions. Debit card is an electronic payments and where the transactions amount is deducted directly from the card holder’s bank account.
A credit card enables the bearer to buy goods or services from a vendor, based on the cardholders limit and payback the value later. Generally, debit cards function as ATM cards and acts as a substitute for cash. In modem era the use of debit cards has become so widespread.
Every credit card account has a purchase limit set by the issuing bank or the firm. Every debit card has to purchase that amount is deduced directly from the card holders account.

Question 69.
Explain briefly Anatomy of a credit card.
Answer:
All payment cards are usually plastic cards of size 85.60 mm width x 53.98 mm height, rounded comers with a radius of 2.88mm to 3.48mm and thickness of 0.76 mm.

  1. Publisher – Emplem of the issuing bank
  2. Credit card number – 16 digit unique identification number.
  3. EMV chip – Magnetic stripe to store information.
  4. RIFD symbol – It indicates that it is a contactless smartcard.
  5. Hologram – Security feature that prevent duplication.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 70.
Briefly explain the stored value card and its types.
Answer:
(i) Stored value card is a type of debit card that is pre-loaded with certain amount with which a payment is made.
(ii) The card may be disposed when the value is used, or recharged to use it again.
(iii) There are two types of stored value card, they are,
• Closed loop (single purpose)
• Open loop (Multi purpose)

Question 71.
Write a note on mining in cryptocurrency.
Answer:

  1. The cryptocurrency units are created by the solution of cryptographic • tasks called mining.
  2. The miners not only generate new monetary units, but also initiate new transactions to the block chain.
  3. As a reward, they will receive new Bitcoins.
  4. The process of mining is extremely electrical energy consumptive.
  5. The initial value of cryptographic currency is just the cost of consumed electricity.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 72.
What is credit card? Explain the key players of a credit card payment system and bring out the merits of it.
Answer:
Credit card is an electronic payment system normally used for retail transactions. A credit card enables the bearer to buy goods or services.
Key players of a credit card payments system:

  1. Bearer – The holder of the credit card account.
  2. Merchant – Storekeeper or vendor.
  3. Acquirer – Merchant’s bank
  4. Credit card network – It acts as the intermediate between banks.
  5. Issuer – Bearer’s bank.

Merits of credit card:

  1. Most credit cards are accepted world wide.
  2. It is not necessary to pay physical money at the time of purchase.
  3.  Depending on the card, there is no need to pay annuity.
  4. Allows purchase over the internet in installments.

Question 73.
Briefly explain Electronic Account transfer and its types.
Answer:
Electronic account transfer is an alternative electronic payment system. With the advent of computers, network technologies and electronic communications a large number of alternative electronic payment systems have emerged.
They are ECS, EFT, RTGS, etc.,
(i) ECS (Electronic Clearing Services) can be defined from one bank account to multiple bank accounts or vice versa using computer and Internet technology.
ECS system provides the convenience of paperless payments. ECS can be used for both credit and debit purposes.
(ii) EFT (Electronic Funds Transfer) is the ‘electronic transfer’ of money over an online network.
The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on the same day in batches.
(iii) RTGS (Real Time Gross Settlement) system is a payment system particularly used for the settlement of transactions between the banks. Real time gross settlement transactions are unconditional and irrevocable.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 74.
Write a note on:
(a) Internet banking
(b) Mobile banking.
Answer:
(a) Internet banking:

  1. Internet banking is a collective term for E-banking, online banking, virtual banking, direct banks, web banking and remote banking.
  2. Internet banking allows customers of a financial institution to conduct various financial transactions on a secure website.
  3. It enables customers of a bank to conduct a wide range of financial transactions through its website.
  4. The online banking system will typically connect to the core banking operated by customers themselves.

(b) Mobile banking:

  1. Mobile banking is another form of net banking .
  2. The term mobile banking (m-banking) refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones.
  3. Transactions can be done at any time and anywhere. Transactions include balance checking, account transfers, payments, purchases etc.,
  4. Mobile banking operations can be implemented in the callcenter, IVR service,SMS, WAP and smartphone applications.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 75.
What is cryptocurrency? Explain the same.
Answer:
(i) Cryptocurrency can be defined as distributed accounting system based on cryptography, storing information about the state of ownership in conventional units.
(ii) Cryptocurrency is also called as cryptocoins, e-cash, alternative . currencies or virtual currencies and are classified as a subset of digital currencies.
(iii) The function of Cryptocurrency is based on technologies such as Bitcoin, Altcoins, mining, Block chain, directed Acylic Gaph, Distributed Register etc.,
(iv) Bitcoin is the most popular Cryptocurrency, but there are many other Cryptocurrencies, which are referred to as altcoins.
(v) Altcoins is the collective name for all Cryptocurrencies that appeared after Bitcoin.
(vi) Many altcoins are inherently very similar to Bitcoin in characterises, and structure.
(vii) The cryptocurrency units are created by the solutions of erytographic tasks called mining.
(viii) The process of mining is extremely electrical energy consumptive.
(ix) Block chains are an open distributed book that records transactions of cryptocurrencies between any two parties in an efficient and verifiable manner.

Question 76.
Explain in detail: Unified payments interface.
Answer:
(i) Unified Payments Interface (UPI) is a real-time payment system developed by National Payments Corporation of India (NCPI) to facilitate inter-bank transactions. –
(ii) UPI is simple, secure and instant payment facility. This interface is regulated by the Reserve Bank of India.
(iii) UPI withdraws and deposits funds directly from the bank aecc at wherever a transaction is requested. .
(iv) UPI is also available as an Unstructured Supplementary Service D .ui (USSD) service.
(v) UPI is developed on the basis of Immediate Payment Service (IMPS).
(vi) To initiate a transaction, UPI applications use two types of address, Global address and Local address.
(vii) Virtual Payment Address (VPA) also called as UPI-ID, is a unique ID enable us to send and receive money from multiple banks.
(viii) The MPIN (Mobile banking Personal Identification Number) is required • to confirm each payment.
(ix) UPI allows operating multiple bank accounts in a single mobile application.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 77.
Choose any presentation tool (e.g, Open office impress)
Answer:
Start the program ‘open office impress’ for creating presentation on title ‘various payment system’.
Click open office impress → presentation → Empty presentation → Select background colour, slide transition, presentation type,then click create.
Slide layout is created, now we can type the title as ‘various payment methods’.

Question 78.
Create a slide describing a payment method.
Answer:
Type the sub heading as ‘Description’ and then type description as “The method of payment” depend on.

  1. The item we are buying
  2. The cost of the item
  3. The method of payment accepted by the seller. The payment methods are cash, debit or credit cards, cheque, electronic transfer payments and EMI payment.

Question 79.
List the futures of the particular payment method.
Answer:

  1. An electronic payment is a non-cash payment though electronic medium.
  2. There are various features like credit payment system, E-wallet, smart card, real time payment system.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 80.
List the advantages and disadvantages of the same.
Answer:
Advantages:

  • Increase sales.
  • Reduced transaction costs.
  • Increased speed and convenience.
  • Easily accessible and user friendly.

Disadvantage:

  • Security concerns
  • Disputed transactions
  • Increased business costs.
  • Necessity of Internet Access.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 81.
Repeat the steps for other payment methods.
Answer:
Cash:
Cash payment using banknotes and coins. It is most common method of payment.

Advantage:
Widely accepted, fast and convenient.

Disadvantage:
Cash and coins are heavy to carry around.
Cannot used for online transaction.

Debit and credit card:
A card issued by the bank. The purchase amount is deducted immediately from bank accounts.

Advantage:
(i) Easy to carry and use.
(ii) Cashless payments

Disadvantage:
(i) Lost card can be misused.
(ii) In credit card, interest will be charged.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Choose the correct answer:

Question 1.
Which is the traditional and most widely used payment instrument that consumer use, in their daily lives?
(a) Electronic payment
(b) Physical money
(c) Account transfer
(d) Mobile payment
Answer:
(b) Physical money

Question 2.
Which is also called as liquidation, clearing system or clearing service?
(a) Electronic payment
(b) Physical money
(c) Account transfer
(d) Cash payment
Answer:
(a) Electronic payment

Question 3.
Which system is an essential part of a companies financial operations?
(a) Payment
(b) Account
(c) e-wallet
(d) Internet
Answer:
(a) Payment

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 4.
Which of the following is of newer payment system?
(a) Paytm
(b) UPT
(c) Bitcoin
(d) All of these
Answer:
(d) All of these

Question 5.
How many types of electronic payment system classified?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Question 6.
Which one of the payment system is designed to allow payments of small amounts?
(a) Micro
(b) Macro
(c) cheque
(d) All of these
Answer:
(a) Micro

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 7.
Which electronic payment that use expensive public key cryptography?
(a) Micro
(b) Macro
(c) cheque
(d) All of these
Answer:
(b) Macro

Question 8.
Which electronic payment systems support payment of higher value?
(a) Micro
(b) Macro
(c) cheque
(d) All of these
Answer:
(b) Macro

Question 9.
Which are called plastic cards that enable cashless payments?
(a) Credit card
(b) Debit card
(c) Payment card
(d) All of these
Answer:
(d) All of these

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 10.
Which known as electronic payment system normally used for retail transactions and payback to the issuer?
(a) Debit card
(b) Traveler card
(c) Credit card
(d) All of these
Answer:
(c) Credit card

Question 11.
Who is holder of the credit card account and responsible for payment?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(a) Bearer

Question 12.
Who is receiving payment made by its customers through the credit card?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(b) Merchant

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 13.
_________ is responsible for receiving payment on behalf of merchant?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(c) Acquirer

Question 14.
Who is that issue the credit card, set limit of purchases, and is bearer’s bank?
(a) Bearer
(b) Merchant
(c) Acquirer
(d) Issuer
Answer:
(d) Issuer

Question 15.
How many digit has modern credit card identification number?
(a) 12
(b) 14
(c) 16
(d) 20
Answer:
(c) 16

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 16.
The first 6 digits together called in credit card number?
(a) UN
(b) ISO
(c) IEC
(d) CVC
Answer:
(a) UN

Question 17.
Which chip is magnetic stripe to store card holder’s information?
(a) IIN
(b) ISO
(c) CVC
(d) EMV
Answer:
(d) EMV

Question 18.
EMV stands for:
(a) Electronic Machine Verifier
(b) European Machine Verification
(c) Electronic Model Verifier
(d) Europay Mastercard Visa
Answer:
(d) Europay Mastercard Visa

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 19.
Which is Indian domestic open loop card launched in 2012?
(a) Master card
(b) Rupay
(c) Paytm
(d) Visa
Answer:
(b) Rupay

Question 20.
Which is an iron based magnetic material containing encrypted data?
(a) EMV chip
(b) RFID symbol
(c) Hologram
(d) Magnetic stripe
Answer:
(d) Magnetic stripe

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

 

Question 21.
Which is a security feature that prevents duplication in credit card?
(a) Hologram
(b) Card logo
(c) RFID symbol
(d) Magnetic strip
Answer:
(a) Hologram

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 22.
How many digit is Card Verification Code (CVV) in credit card usually printed?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 23.
Which card is transaction amount directly deducted the cardholder’s bank account?
(a) Credit
(b) Traveller
(c) Debit
(d) Pre paid card
Answer:
(c) Debit

Question 24.
How many ways are there processing debits card transactions?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 25.
Which type of card is pre-loaded with certain amounts for future use?
(a) Credit
(b) Stored value
(c) Traveller
(d) Paytm
Answer:
(b) Stored value

Question 26.
How many type of store value card available?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Question 27.
Which is modern version of card based on payments?
(a) debit card
(b) credit card
(c) smartcard
(d) pre-paid card
Answer:
(c) smartcard

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 28.
Which type of smart cards have a contact area of approximately square centimeter?
(a) Contact
(b) contactless
(c) EFT
(d) All of these
Answer:
(a) Contact

Question 29.
Which type of smart card is empowered by RF induction technology?
(a) Contact
(b) contactless
(c) EFT
(d) All of these
Answer:
(b) contactless

Question 30.
What is called as repeated transfer of funds from one bank account to multiple bank account or vice verse?
(a) ECS
(b) EFT
(c) RTGS
(d) NEFT
Answer:
(a) ECS

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 31.
Which type of transactions are called push transactions?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(a) ECS credit

Question 32.
Which is an inverse of ECS credit and is used for bulk collection of amounts?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(b) ECS debit

Question 33.
Which type of transactions are called as pull transactions?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(b) ECS debit

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 34.
Which is the ‘electronic transfer’ of money over an online network?
(a) ECS credit
(b) ECS debit
(c) NEFT
(d) EFT
Answer:
(d) EFT

Question 35.
Which method is widely used and B2B business models?
(a) EFT
(b) ECS credit
(c) ESC debit
(d) NEFT
Answer:
(a) EFT

Question 36.
Which systems world wide is driven primarily by the central bank of a country?
(a) NEFT
(b) RTGS
(c) ESC
(d) Either (a) or (b)
Answer:
(d) Either (a) or (b)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 37.
Which is a currency that flows in the form of data?
(a) E-cash
(b) Cash
(c) Cheque
(d) all of these
Answer:
(a) E-cash

Question 38.
Which is a unique virtual asset designed to work as a medium of exchange using cryptographic algorithm?
(a) Conditional
(b) Unconditional
(c) Irrevocable
(d) Cryptocurrency
Answer:
(d) Cryptocurrency

Question 39.
Which is as distributed accounting system based on cryptography?
(a) Conditional
(b) Unconditional
(c) Irrevocable
(d) Cryptocurrency
Answer:
(d) Cryptocurrency

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 40.
Which is the state of ownership of a cryptocurrency is related to individual system blocks?
(a) Portfolios
(b) Conditional
(c) Unconditional
(d) Irrevocable
Answer:
(a) Portfolios

Question 41.
David chaum an American cryptographer invented the first form of crytocurrency called.
(a) Mining
(b) Digicash
(c) Block chain
(d) Bitcoin
Answer:
(b) Digicash

Question 42.
Which is the most popular and the first decentralized cerptocurrency?
(a) Mining
(b) Digicash
(c) Block chain
(d) Bitcoin
Answer:
(d) Bitcoin

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 43.
Which is the collective name for all crypotocuurencies that appeared after bitcoin?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chain
Answer:
(a) Altcoins

Question 44.
Which is inherently very similar to Bitcoin in characteristics and structure?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chain
Answer:
(a) Altcoins

Question 45.
Which are called the cryptocurrency units are created by the solution of cryptographic tasks?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chain
Answer:
(b) Mining

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 46.
The process of mining is extremely consumptive.
(a) Electrical energy
(b) Thermal energy
(c) Wind energy
(d) Solar energy
Answer:
(a) Electrical energy

Question 47.
Which are an open distributed book that records transactions of cryptocurrencies?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chains
Answer:
(d) Block chains

Question 48.
Which are by default resistant to data modification without approval of a trusted authority?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chains
Answer:
(d) Block chains

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 49.
Which are safely designed with high fault tolerance it is best suited to distributed computing system?
(a) Altcoins
(b) Mining
(c) Digicash
(d) Block chains
Answer:
(d) Block chains

Question 50.
Which are allow users to make electronic transactions quickly and securely over smartphones?
(a) e-wallets
(b) Blockchain
(c) e-purses
(d) (a) and (c)
Answer:
(d) (a) and (c)

Question 51.
Which is first recognized and popular method for storing money in electronic form?
(a) e-wallets
(b) Blockchain
(c) Digicash
(d) Mining
Answer:
(a) e-wallets

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 52.
Paypal is a:
(a) e-wallets
(b) Blockchain
(c) Digicash
(d) Mining
Answer:
(a) e-wallets

Question 53.
How many digits are IFSC alpha numeric code that uniquely identify individual bank branch?
(a) 6
(b) 9
(c) 11
(d) 13
Answer:
(c) 11

Question 54.
Which is a real time payment system developed by NPCI?
(a) Unified Payment Interface (UPI)
(b) Cash On Delivery (COD)
(c) ECS
(d) RTGS
Answer:
(a) Unified Payment Interface (UPI)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 55.
Virtual Payment Address (VPA) also called as:
(a) UPI – ID
(b) MPIN
(c) IMPS
(d) IFSC
Answer:
(a) UPI – ID

Question 56.
MPIN stands for:
(a) Mobile Banking Personal Identification Number
(b) Money Banking Personal Identification Number
(c) Mobile Banking Personal Individual Number
(d) Mobile Banking Paying Identified Number
Answer:
(a) Mobile Banking Personal Identification Number

Question 57.
Which is required to confirm each payment?
(a) UPI-ID
(b) MPIN
(c) IMPS
(d) IFSC
Answer:
(b) MPIN

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 58.
USSD stands for:
(a) Unstructured Supplementary Service Data.
(b) United Supplementary Service Device.
(c) United Secondary System Device.
(d) Unstructured Secondary System Data.
Answer:
(a) Unstructured Supplementary Service Data.

Question 59.
What will become much easier without requiring a digital wallet or credit or debit card?
(a) Cash on delivery
(b) Electronic payment
(c) e-pay
(d) e-service
Answer:
(b) Electronic payment

Question 60.
Which is also called so collection on delivery and describes a mode of payment?
(a) Cash on delivery(COD)
(b) e-payment
(c) e-pay
(d) e-service
Answer:
(a) Cash on delivery(COD)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 61.
BHIM stands for:
(a) Bank Hologram Intemational.Money
(b) Bharat Interface for Money
(c) Bank Host Imediate Money
(d) Bharat Help Insurance Money
Answer:
(b) Bharat Interface for Money

Question 62.
NPCL stands for:
(a) Natural Payments Corporation of India
(b) National Pacific corporation of India
(c) National Payments Corporation of India
(d) Network Payments Corporation of India
Answer:
(c) National Payments Corporation of India

Question 63.
Match the following (Operations of credit card).

(A) Bearer (i) Shopkeeper
(B) Merchant (ii) Bearer’s Bank
(C) Acquirer (iii) Card holder
(D) Issuer (iv) Merchant’s bank

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (i); (B) – (ii); (C) – (iv); (D) – (iii)
(c) (A) – (ii); (B) – (i); (C) – (iii); (U) – (iv)
(d) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 64.
Match the following (Anatomy of a Credit card).

(A) EMV chip (i) Wi Fi symbol
(B) RFID symbol (ii) Chip and PIN
(C) Magnetic Strip (iii) Prevent duplicate
(D) Hologram (iv) encrypted data

(a) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (ii); (B) – (iii)- (C) – (i); (D) – (iv)
(d) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
Answer:
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Question 65.
Match the following (Electronic Account Transfer):

(A) ECS (i) Electronic Transfer
(B) ECS Credit (ii) Pull transactions
(C) ECS Debit (iii) Push transactions
(D) EFT (iv) Electronic Clearing System

(a) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
(b) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 66.
Match the following (Cryptocurrency):

(A) Bitcoin (i) First cryptocurrency
(B) Altcoin (ii) blocks
(C) Mining (iii) Similar to Bitcoin
(D) Block chain (iv) Cryptographic tasks

(a) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(b) (A) – (iii); (B) – (ii); (C) – (i); (D) – (iv)
(c) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(d) (A) – (i); (B) – (iii); (C) – (iv); (D) – (ii)
Answer:
(d) (A) – (i); (B) – (iii); (C) – (iv); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 67.
Match the following (Unified Payment Interface):

(A) UP (i) Inter bank transactions
(B) NCPI (ii) Mode of fund transfer
(C) IFSC (iii) real time payment
(D) RTGS (iv) Global address

(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
(b) (A) – (iii); (B) – (ii); (C) -(i); (D) – (iv)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (i); (C) – (ii); (D) – (iii)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)

Question 68.
Choose the incorrect pair:
(a) Physical money – Cash
(b) Paytm – Payment system
(c) Debit card – Pay cater
(d) Traveller card – Pay before
Answer:
(c) Debit card – Pay cater

Question 69.
Choose the incorrect pair .
(a) Debit card – Physical Properties
(b) EFT pos – PIN debit
(c) offline debit – signature debit
(d) Rupay – closed loop card
Answer:
(d) Rupay – closed loop card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 70.
Choose the incorrect pair:
(a) EFT – B2B
(b) NEFY – pull transaction
(c) RTGS – Large payments
(d) RBI – Central Bank
Answer:
(b) NEFY – pull transaction

Question 71.
Choose the correct pair:
(a) Digicash – e-cheque
(b) Namecoin- DNS server
(c) e-wallets – e-purses
(d) e-wallet – SBI Buddy
Answer:
(a) Digicash – e-cheque

Question 72.
Choose the correct pair:
(a) m-banking – net banking
(b) e-banking – web banking
(c) Google chrome – direct banks
(d) e-payments – cashless
Answer:
(c) Google chrome – direct banks

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 73.
Choose the incorrect statement:
(a) Cash is a physical money and traditionally widely used as payment.
(b) An electronic payment system is also called liquidation.
(c) Many electronic payment system have been developed by internet technologies.
(d) Payment system is not an essential part of financial operations.
Answer:
(d) Payment system is not an essential part of financial operations.

Question 74.
Choose the incorrect statement:
(a) Hash chain based macro electronic payment systems.
(b) Hash collisions based micro electronic payment systems.
(c) Hash sequences based micro electronic payment systems.
(d) Shared secrete keys based micro electronic payment systems.
Answer:
(a) Hash chain based macro electronic payment systems.

Question 75.
Choose the incorrect statement:
(a) The Diners club card which was made of paper-card board.
(b) The Diners club card still exists today the name of diners club international.
(c) Credit card only accepted within the country.
(d) Depending on the credit card, there is no need to pay annuity.
Answer:
(c) Credit card only accepted within the country.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 76.
Choose the correct statement:
(a) Card verification code (CVC / CW) value is a 4 digit code.
(b) A credit card or debit card it is a plastic and has a magnetic strip on its back.
(c) The modem based payment system is e-cheque.
(d) The credit card is that pre-loaded with certain amounts.
Answer:
(b) A credit card or debit card it is a plastic and has a magnetic strip on its back.

Question 77.
Choose the correct statement:
(a) Electronic cash is (E-Cash) is a currency that flows in the form of data.
(b) Many E-commerce websites that use e-wallets as a smart card.
(c) Mobile banking also called as e-banking.
(d) Virtual Payment Address (VPA) also called as United Payment Interface (UPI).
Answer:
(a) Electronic cash is (E-Cash) is a currency that flows in the form of data.

Question 78.
Assertion (A):
Credit card is an electronic payment system normally used for retail transactions.
Reason (R):
A credit card enables the bearer to buy goods or services from a vendor, to pay back the value later.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false. .
(d) A is false, but R is true.
Answer:
(a) Both A and R are True, and R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 79.
Assertion (A):
The modern version of card based payment is smart cards.
Reason (R):
Open loop cards can be used to make debit transaction at variety of retailers, is also called as prepaid – debit cards.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are True, but R is not the correct explanation for A.

Question 80.
Assertion (A):
Electronic Clearing Service (ECS) can be defined as repeated transfer of funds.
Reason (R):
ECS system provides only small amounts transaction.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is True, but R is false.

Question 81.
Assertion (A):
RTGS payments are generally small-value^ayment.
Reason (R):
RTGS payments are also called as push payments that are triggered by the payer.
(a) Both A and R are True, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 82.
Assertion (A):
The process of mining is extremely Bio energy consumptive.
Reason (R):
e-wallets transactions are not securely through smart phones.
(a) Both A and R are True.
(b) Both A and R false.
(c) A is True, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R false.

Question 83.
Pick the odd one out: (Micro electronic payment).
(a) Subscriptions of online games
(b) read journals
(c) a movie online
(d) Mobile payment
Answer:
(d) Mobile payment

Question 84.
Pick the odd one out: (Cards)
(a) Credit card
(b) Debit card
(c) PAN card
(d) Stored value card
Answer:
(c) PAN card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 85.
Pick the odd one out: (Credit card Operations)
(a) Bearer
(b) Publisher
(c) Merchant
(d) Acquirer
Answer:
(b) Publisher

Question 86.
Pick the odd one out:
(a) Visa
(b) Master card
(c) ATM card
(d) Rupay
Answer:
(c) ATM card

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 87.
Pick the odd one out: (Electronic Account Transfer)
(a) DNS
(b) ECS
(c) EFS
(d) RTGS
Answer:
(a) DNS

Question 88.
Based on the monetary value e payment system can be classified into:
(a) Micro and Macro
(b) Micro and Nano
(c) Maximum and Minimum
(d) Maximum and Macro
Answer:
(a) Micro and Macro

Question 89.
Which of the following is not a category of micropayment?
(a) Buying a movie ticket
(b) Subscription to e journals
(c) Buying a laptop
(d) Paying for smartphone app
Answer:
(d) Paying for smartphone app

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 90.
Assertion (A):
Micro electronic payment systems support higher value payments.
Reason (R):
Expensive cryptographic operations are included in macro payments.
(a) Both A and R are correct and R is the correct explanation of A .
(b) Both A and R are correct, but R is not the correct explanation of A
(c) A is true and R is false
(d) A is false and R is true
Answer:
(d) A is false and R is true

Question 91.
Which of the following is correctly matched?
(a) Credit Cards – pay before
(b) Debit Cards – pay now
(c) Stored Value Card – pay later
(d) Smart card – pay anytime
Answer:
(b) Debit Cards – pay now

Question 92.
ECS stands for:
(a) Electronic Clearing Services
(b) Electronic Cloning Services
(c) Electronic Clearing Station
(d) Electronic Cloning Station
Answer:
(a) Electronic Clearing Services

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 93.
Which of the following is not a Altcoin?
(a) Litecoin
(b) Namecoin
(c) Ethereum
(d) Bitcoin
Answer:
(c) Ethereum

Question 94.
Which of the following is true about Virtual payment address (VPA)?
(a) Customers can use their e-mail id as VPA
(b) VPA does not includes numbers
(c) VPA is a unique ID
(d) Multiple bank accounts cannot have single VPA
Answer:
(c) VPA is a unique ID

Question 95.
Pick the odd one in the credit card transaction:
(a) card holder
(b) merchant
(c) marketing manager
(d) acquirer
Answer:
(c) marketing manager

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems

Question 96.
Which of the following is true about debit card?
(i) debit cards cannot be used in ATMs
(ii) debit cards cannot be used in online transactions
(iii) debit cards do not need bank accounts
(a) (i), (ii), (iii)
(b) (ii), (iii), (iv)
(c) (iii) alone
(d) (iv) alone
Answer:
(d) (iv) alone

Question 97.
debit cards and credit cards are identical in physical properties

List A

 List B

(A1) First Digit (B1) Account number
(A2) 9th to 15th Digit (B2) Mil Code
(A3) First 6 Digits (B3) BIN Code
(A4) Last Digit (B4) Check digit

TN State Board 12th Computer Applications Important Questions Chapter 16 Electronic Payment Systems 1

Answer:
(d)

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 1.
What is security in E-Commerce?
Answer:

  1. Security has become the critical factor and core issue in any emerging E-business.
  2. E-Commerce security is a set of protocols that safely guide E-Commerce transactions through the Internet.

Question 2.
Define Viruses.
Answer:
Viruses cause harm to the computers. Some viruses destroy all the information stored in a computer and cause huge loss of revenue and time.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 3.
What is Tampering in E-Commerce?
Answer:

  1. E-Commerce has the problem of the authenticity and integrity -f business information.
  2. When hackers grasp the data transmitted on the network, there 7 destroying the authenticity and integrity- of the data.

Question 4.
What is DDo5 Attacks?
Answer:
DDoS (Distributed Denial of Service) attacks is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server.

Question 5.
What is Cyber squatting?
Answer:

  1. Cyber squatting is the illegal practice of registering an Internet domain name.
  2. Cyber squatters also involve in trading on the reputation and goodwill of such third parties by inducing a customer to believe that it is an official web page.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 6.
What is Typopiracy?
Answer:
Typopiracy is a variant of cyber squatting. Some fake websites try to take advantage of users common typographical errors in typing website address and direct users to a different website.

Question 7.
What is Hacking?
Answer:
Hacking refers to unauthorized intrusion into a computer or a network. That is to say breaking security to gain access to a website illegally and intercept confidential information.

Question 8.
What is Ransomware?
Answer:
Ransomware is a type of Malware that usually encrypt all the files in a targets computer.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 9.
What is Encryption technology?
Answer:

  1. Encryption technology is an effective information security protection.
  2. It is defined as converting a plain text into meaningless cipher text using encryption algorithm thus ensuring the confidentiality of the data.

Question 10.
What are the types of Encryption technology?
Answer:
There are two types of Encryption Technology, they are:

  • Symmetric key encryption system and
  • Asymmetric key encryption system

Question 11.
What is DES?
Answer:

  1. DES (Data Encryption Standard) is a symmetric key data encryption method.
  2. DES is the typical block algorithm that takes a string of bits of clear text with a fixed length.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 12.
What is Asymmetric encryption?
Answer:

  1. Asymmetric encryption also called as RSA (Rivest – Shamir – Adleman) algorithm.
  2. Its uses public-key authentication and digital signatures.

Question 13.
What is a Public-key encryption method?
Answer:
A Public-key encryption method is a method for converting a plain text with a public key into a cipher text from which the plain text can be retrieved with a private key.

Question 14.
What is the main role of security certification?
Answer:
The main role of security certification is to ensure Authentication, Integrity and Non-repudiation. This can be achieved through digital signatures and digital certificates.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 15.
Define Digital Certificates.
Answer:
A digital certificate is an electronic document used to prove the ownership of a public key. This certificates includes the information about the sender’s identity, digital signature and a public key.

Question 16.
What is the X.509 system?
Answer:

  1. The X.509 system is a centralized system in which the authenticity of the key is guaranted by the hierarchy of certification authorities.
  2. X.509 is currently World Wide accepted certification technology.

Question 17.
Who are licensed Certifying Authority (CA) in digital certificate?
Answer:

  • The digital certificate are being issued by a licensed Certifying Authority (CA).
  • NIC, Safe script, TCS, MTNL, e-Mudhra are some of the authorized Certifying Authorities under Government of India.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 18.
What is PKI?
Answer:

  • Digital signatures use a standard, World Wide accepted format, called Public Key Infrastructure (PKI).
  • PKI to provide the highest levels of security and universal acceptance.

Question 19.
What is use of Digital signatures?
Answer:
Digital signatures are widely used for avoiding forging or tampering of important documents such as financial documents or Credit Card Data.

Question 20.
What is a Security Token?
Answer:
A security token is a hardware component that are used to identify and authenticate users.

Question 21.
What are security authentication protocols?
Answer:
There are two kinds of security authentication protocols widely used in E-Commerce. They are:

  • Secure Electronic Transaction (SET), and
  • Secure Sockets Layer (SSL)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 22.
What is the major participants of SET purchase?
Answer:
The SET purchase involves three major participants,

  • The customer
  • The seller and
  • The payment gateway

Question 23.
Write the guarantees of SET Protocol.
Answer:

  1. The SET Protocol guarantees the security of online shopping using credit cards on the open network.
  2. It has the advantages of ensuring the integrity of transaction data and the non-repudiation of transactions.

Question 24.
Define Secure Sockets Layers.
Answer:

  • The most common cryptographic protocol is Secure Sockets Layers (SSL).
  • SSL is a hybrid encryption protocol for securing transaction over the Internet.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 25.
Who was developed by SSL Standard?
Answer:
The SSL standard was developed by Netscape in Collaboration with Master Card, Bank of America, MCI and Silicon Graphics.

Question 26.
What is the principle of Secure Socket Layers?
Answer:
The Secure Socket Layers (SSL) principle is to establish a secure communication channel between a client and a server after an authentication step.

Question 27.
What is 3-D Secure?
Answer:

  • 3-D Secure is a Secure Payment Protocol on the Internet.
  • It was developed by visa to increase the level of transaction security, and ft has been adapted by Master Card.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 28.
What is the basic concept of XML based protocol?
Answer:
The basic concept ofXML based protocol is to link the financial authorization process with an online authentication system.

Question 29.
Write the types of 3-D Secure authentication model.
Answer:
The authentication model comprise three domains which are:

  • The Acquirer Domain
  • The Issuer Domain
  • The interoperability Domain

Question 30.
Write the types of payment frauds.
Answer:
The different types of payment frauds are:

  1. Friendly Fraud – When customer demands false reclaim or refund.
  2. Clean Fraud – When a stolen credit card is used to make a purchase.
  3. Triangulation fraud – Fake online shops offering cheapest price and collect credit card data.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 31.
Write a note on Malicious code threats.
Answer:

  1. An E-Commerce site, there are multiple vulnerable areas that can serve as an intrusion point for a hac
  2. Using Malware, cross site scripting or SQL Injection, an attracker will extract the credit card information and sell the acquired data on black markets.
  3. Fraud is then committed to extract the greatest value possible through E-Commerce transactions or ATM withdrawals etc.,

Question 32.
Write the key features of SET system.
Answer:
SET (Secure Electronic Transaction) system incorporates the following key features:

  1. Using public key encryption and private key encryption ensure data confidentiality.
  2. Use information digest technology to ensure the integrity of information.
  3. Dual signature technology to secure the identity of both parties in the transaction.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 33.
Explain the types of E-Commerce Threats.
Answer:
E-Commerce business would face the following specific threats. Information Leakage: The leakage of trade secrets in E-Commerce in two types.

  1. The content of the transaction between the vendor and customer is stolen by the third party.
  2. The documents provided by the merchant to the customer or vice versa are illegally used by the another.

Tampering:
E-Commerce has the problem of the authenticity and integrity of business information. When hackers grasp the data transmitted on the network, thereby destroying the authenticity and integrity of the data.

Payment frauds:
Payment frauds have subsets like Friendly fraud, clean fraud, Triangulation fraud etc.,

Malicious code threats:
Within an E-Commerce site, there are multiple vulnerable areas that can serve as an intrusion point for a hacker to gain payment and user information. Using malware, Cross Site Scripting or SQL Injection, an attacker will extract the credit card information and sell the acquired data on black markets.

Distributed Denial of Service (DDoS) Attacks:
It is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server. DDoS attacks is also called as network flooding.

Cyber Squatting:
Cybersquatting is the illegal practice of registering an Internet domain name. Cyber squatters also involve in trading on the reputation and goodwill of such third parties by inducing a customer to believe that it is an official web page.

Typopiracy:
Typopiracy is a variant of Cyber Squatting. Some fake websites try to take advantage of users’ common typographical errors in typing a website address and direct users to a different website.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 34.
Write the steps difference between Symmetric key Encryption and Asymmetric key Encryption.
Answer:

Symmetric Key Encryption Asymmetric Key Encryption
Same key is used for both encryption and decryption. Different keys are used for encryption and decryption
Speed of encryption or decryption is very fast. Speed of encryption or decryption is comparatively slow.
Plain text and cipher text are of same size. The size of cipher text is always greater than plain text.
Algorithms like DES, AES, RC4 uses symmetric key encryption. Algorithms like RSA, ECC, DSA use asymmetric key encryption.
Provides confidentiality. Provides confidentiality, authenticity and non repudiation.
The number of key used grows exponentially with the number of users. The number of key used grows linearly with the number of users.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 35.
Write about information leakage in E-Commerce.
Answer:
The leakage of trade secrets in E-Commerce mainly two aspects:
(i) The content of the transaction between the vendor and customer is stolen by the third party.
(ii) The documents provided by the merchant to the customer or viceversa are illegally used by another.
This intercepting and stealing of Online documents is called information leakage.

Question 36.
Write a short note on typopiracy.
Answer:
Typopiracy is a variant of cyber squatting. Some fake websites try to take advantage of users common typographical errors in typing a website address and d: eei users to a different website.

Question 37.
Define non-repudiation.
Answer:

  1. Non-repudiation refers to a situation where a statements author cannot successfully dispute its authorship or the validity of an associated contract.
  2. Non-repudiation that prevention against violation agreement after the deal.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 38.
List the different types of security technologies in E-Commerce.
Answer:
The security technologies in E-Commerce transactions are classified into:

  • Encryption technology
  • Authentication technology
  • Authentication protocols

Question 39.
Write about digital signature.
Answer:
Digital Signature is a mechanism that is used to verify that a particular digital document, message or transaction is authentic.

Question 40.
Write a note on certification authorities (CA).
Answer:

  1. Digital certificates function is similar to the function of identification cards such as passports and driving licenses.
  2. Digital certificates are issued by recognized Certification Authorities (CA).
  3. When someone requests a digital certificate, the authority verifies the identity of the requester, and if the requester fulfills all requirements, the authority issues it.
  4. When the sender uses a certificate to sign a document digitally, receiver can trust the digital signature.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 41.
List some E-Commerce Security Threats.
Answer:
Information Leakage:
The intercepting and stealing of online document is called information leakage.

Tampering:
E-Commerce has the problem of the authenticity and integrity of business information.

Payment frauds:
Payment frauds have subsets like friendly fraud, clean fraud, triangulation fraud etc.,

Distributed Denial of Service Attacks (DDoS):
This attack will be conducted from numerous unidentified computers using botnet.

Cyber Squatting:
Cyber squatting is the illegal practice of registering an Internet domain name.

Question 42.
Differentiate asymmetric and symmetric algorithms.
Answer:

Asymmetric Symmetric
Different keys are used for encryption and decryption. Same key is used for both encryption and decryption
Speed of encryption or decryption is comparatively slow. Speed of encryption or decryption is very fast.
Algorithms like RSA, ECC, DSA use asymmetric key encryption. Algorithms like DES, AES, RC4 uses symmetric key encryption.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 43.
Write a note on PGP.
Answer:

  1. PGP (Pretty Good Privacy) is developed by Phil Zimmermann in 1991.
  2. It is a decentralized encryption program that provides cryptographic privacy and authentication for data communication.
  3. PGP encryption uses a serial combination of bashing, data compression, symmetric – key cryptography and asymmetric – key cryptography and works on the concept of ‘Web of Trust’.

Question 44.
Explain 3D secure payment protocols.
Answer:

  1. 3-D secure is a secure payment protocol on the Internet.
  2. It was developed by visa to increase the level of transaction security, and it has been adapted by Master card.
  3. It gives a better authentication of the holder of the Payment Card, during purchases made on websites.
  4. The basic concept of this protocol is to link the financial authorization process with an online authentication system.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 45.
Write about dimensions of E-Commerce Security.
Answer:
The dimensions of E – Commerce security elements are:

  • Authenticity – Conforming genuineness of data shared.
  • Availability – Prevention against data delay or removal.
  • Completeness – Unification of all business information.
  • Confidentiality – Protecting data against unauthorized disclosure.
  • Effectiveness – Effective handling of hardware, software and data.
  • Integrity – Prevention of the data being unaltered or modified.
  • Non – repudiation – Prevention against violation agreement after the deal.
  • Privacy – Prevention of customers personal data being used by others.
  • Reliability – Providing a reliable identification of the individuals or businesses.
  • Review ability – Capability of monitoring activities to audit and track the operations.

Question 46.
Explain encryption technology.
Answer:
Encryption technology is an effective information security protection.

  1. It is defined as converting a plain text into meaningless cipher text using encryption algorithm thus ensuring the= confidentiality of the data.
  2. The encryption or decryption process use a key to encrypt or decrypt the data.
  3. Now, two encryption technologies are widely used. They are symmetric key encryption system and an asymmetric key encryption system.
  4. The Data Encryption Standard (DES) is a symmetric key data encryption method.
  5. DES is the typical block algorithm that takes a string of bits of clear’ text with a fixed length and through a series of complicated operations, transforms it into another encrypted text of the same length.
  6. Asymmetric encryption also called as RSA (Rivest – Shamir – Adleman) algorithm.
  7. RSA uses public – key authentication and digital signatures.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 47.
Differentiate digital signatures and digital certificates.
Answer:

Digital Signature

 Digital Certificate

A digital signature is a mechanism that is used to verify that a particular digital document, message or transaction is authentic. A digital certificate is a computer file which officially approves the relation between the holder of the certificate and a particular public key.
These are used to verify the trustworthiness of the data being sent. These are used to verify the trustworthiness of the sender.
This is to ensure that a data remain secure from the point. It binds a digital signature to an entity.
It provides authentication, non repudiation and integrity. It provides authentication and security.
A digital signature is created using a Digital Signature Standard (DSS). A digital certificate works on the principles of public key cryptography standards (PKCS).
The document is encrypted at the sending end and decrypted at the receiving end using asymmetric keys. A digital certificate consist of certificate’s owner name and public key, expiration date, a Certificate Authority’s name , a Certificate Authority’s digital signature.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 48.
Define Secure Electronic Transaction (SET) and its features.
Answer:

  1. Secure Electronic Transaction (SET) is a security protocol for electronic payments with credit cards, in particular via the Internet.
  2. SET was developed in 1996 by VISA and Master Card, with the participation of GTE, IBM, Microsoft and Netscape.
  3. SET is based on the use of digital signatures and the encryption of transmitted data with asymmetric and symmetric encryption algorithms.
  4. SET system incorporates the following key features.
    (a) Using public key encryption and private key encryption ensure data confidentiality.
    (b) Use information digest technology to ensure the integrity of information.
    (c) Dual signature technology to ensure the identity of both parties in • the transaction.

Question 49.
Briefly explain SSL.
Answer:

  1. SSL (Secure Sockets Layers) is the most common cryptographic protocol..
  2. SSL is a hybrid encryption protocol for securing transactions over the Internet.
  3. The SSL Standard was developed by Netscape in collaboration with Master card, Bank of America, MCI and Silicon Graphics.
  4. The SSL system acts as an additional layer, to ensure the security of data, located between the application layer and the transport layer in TCP.
  5. All browsers in the market support SSL and most of the secure communications are proceeded through this protocol.
  6. SSL works completely hidden for the user, who does not have to intervene in the protocol.
  7. The user has to do is make sure the URL starts with http:// instead of http:// where S-means secured.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 50.
Identifying the security protocols used in the particular payment gateway.
• Create a chart for a payment process.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems 1
TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems 2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 51.
Describe the security technology used in that payment method.
Answer:
To secure online payments:
(i) SSL Protocol:
The SSL protocol in our website shows website is secure.

(ii) PCI Compliance:
PCI Compliance helps improve security. They decrease the risk of payment and data fraud.

(iii) Tokenization:
It is the technology that makes it easier to improve payment security and provide payment process without vulnerabilities.

(iv) 3D Secure:
It helps prevent fraud in online credit and debit card transactions. It will be extra protection with many benefits.

(v) Address Verification Service:
It requires customers to provide the billing address associated with their credit card.

• Repeat the process for few other payment process.
Mobile E-Wallet (online) payment process:

TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems 3

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Choose the correct answer:

Question 1.
Which transaction based on network resources have been accepted by the public?
(a) E-Commerce
(b) E-Business
(c) E-sales
(d) Commerce
Answer:
(a) E-Commerce

Question 2.
Which security threats not only result in loss of revenue but also in reputation?
(a) E-Commerce
(b) E-Business
(c) E-sales
(d) All of these
Answer:
(b) E-Business

Question 3.
Which security threats can be accidental or intentional?
(a) E-Commerce
(b) E-Business
(c) Both (a) and (b)
(d) None of these
Answer:
(a) E-Commerce

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 4.
Which is cause harm to the computers there by harms the efficient and smooth functioning of E-commerce?
(a) Frauds
(b) Cyber squatting
(c) Viruses
(d) Phishing
Answer:
(c) Viruses

Question 5.
Which has turned to be the best medium for the spread of viruses?
(a) Network
(b) Internet
(c) E-Business
(d) E-Commerce
Answer:
(b) Internet

Question 6.
The intercepting and stealing of online document is called
(a) Information Leakage
(b) Tampering
(c) Payment frauds
(d) Cyber squatting
Answer:
(a) Information Leakage

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 7.
Which is a E-Commerce thread in which a target is contacted by e-mail, telephone or text message?
(a) Frauds
(b) Cyber squatting
(c) Viruses
(d) Phishing
Answer:
(d) Phishing

Question 8.
Which will extract the credit card information and sell the acquired data on black markets?
(a) Malware
(b) SQL
(c) Attacker
(d) All of these
Answer:
(d) All of these

Question 9.
Which is committed to extract the greatest value possible through ATM withdrawals?
(a) Fraud
(b) Malware
(c) SQL
(d) Attacker
Answer:
(a) Fraud

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 10.
What is a process of taking down an E-Commerce site by sending continuous overwhelming request to its server?
(a) DDoS Attack
(b) Fraud
(c) Tampering
(d) Malware
Answer:
(a) DDoS Attack

Question 11.
Which attack will be conducted from numerous unidentified computers using botnet?
(a) DDoS
(b) Fraud
(c) Tampering
(d) Malware
Answer:
(a) DDoS

Question 12.
Which attacks is also called as network flooding?
(a) DDoS
(b) Fraud
(c) Tampering
(d) Malware
Answer:
(a) DDoS

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 13.
Which is the illegal practice of registering an Internet domain name?
(a) Tampering
(b) Frauds
(c) Threats
(d) Cyber squatting
Answer:
(d) Cyber squatting

Question 14.
Which is also involve in trading on the reputation and goodwill of such third parties?
(a) Tampering
(b) Cyber squatters
(c) Frauds
(d) Threats
Answer:
(b) Cyber squatters

Question 15.
Which is a variant of cyber squatting?
(a) Tampering
(b) Cyber squatters
(c) Frauds
(d) Typopiracy
Answer:
(d) Typopiracy

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 16.
Which refers to unauthorized intrusion into a computer?
(a) Hacking
(b) Viruses
(c) Threats
(d) Malware
Answer:
(a) Hacking

Question 17.
Which is conforming genuineness of data shared in E-Commerce security?
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(a) Authenticity

Question 18.
Which is the prevention against data delay or removal?
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(b) Availability

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 19.
Which is the unification of all business information in E-Commerce security0
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(c) Completeness

Question 20.
Which is protecting data against unauthorized disciosura in E-Comrr-“-ce security?
(a) Authenticity
(b) Availability
(c) Completeness
(d) Confidentiality
Answer:
(d) Confidentiality

Question 21.
Which is the effective handling of hardware, software and data in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(a) Effectiveness

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 22.
Which is the prevention of the data being unaltered or modified in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(b) Integrity

Question 23.
Which is the prevention against violation agreement after the deal in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(c) Non-repudiation

Question 24.
Which is the prevention of customers’ personal data being used by others in E-Commerce security?
(a) Effectiveness
(b) Integrity
(c) Non-repudiation
(d) Privacy
Answer:
(d) Privacy

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 25.
Which is providing a reliable identification of the businesses in E-Commerce security?
(a) Integrity
(b) Privacy
(c) Reliability
(d) Review ability
Answer:
(c) Reliability

Question 26.
Which is the capability of monitoring activities to audit and track the operations in E-Commerce security?
(a) Integrity
(b) Privacy
(c) Reliability
(d) Review ability
Answer:
(d) Review ability

Question 27.
Which is a type of Malware that usually encrypt ail the files in a target’s “computer?
(a) Ransomware
(b) Virus
(c) Malware
(d) All of these
Answer:
(a) Ransomware

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 28.
How many types of E-Commerce transactions are classified?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 29.
Which is the technology an effective information security protection?
(a) Encryption
(b) Authentication
(c) Authentication protocols
(d) All of these
Answer:
(a) Encryption

Question 30.
At present, How many types of encryption technologies used?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 31.
Which is a symmetric key data encryption method?
(a) Data Encryption Standard (DES)
(b) Encryption
(c) Authentication
(d) Protocol
Answer:
(a) Data Encryption Standard (DES)

Question 32.
Expansion of FIPS:
(a) First Information Processing Standard
(b) Federal Information Processing Standard
(c) File Information Processing Standard
(d) Format Information Processing Standard
Answer:
(b) Federal Information Processing Standard

Question 33.
How many bits are apparently used in Data Encryption Standard (DES) key?
(a) 64
(b) 32
(c) 16
(d) 128
Answer:
(a) 64

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 34.
Which method is a method for converting a plain text with a public key?
(a) Public key Encryption
(b) Symmetric Encryption
(c) Asymmetric Encryption
(d) All of these
Answer:
(a) Public key Encryption

Question 35.
Which can be achieved through digital signatures and digital certificates?
(a) Authentication
(b) Integrity
(c) Non-repudiation
(d) All of these
Answer:
(d) All of these

Question 36.
Which key is same key is used for both encryption and decryption?
(a) Symmetric key
(b) Asymmetric key
(c) (a) or (b)
(d) (a) and (b)
Answer:
(a) Symmetric key

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 37.
Which is different keys are used for encryption and decryption?
(a) Symmetric key
(b) Asymmetric key
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) Asymmetric key

Question 38.
Which is also known as Public Key Certificate?
(a) Digital certificates
(b) Digital signature
(c) Digital banner
(d) All of these
Answer:
(a) Digital certificates

Question 39.
Which is an electronic document used to prove the ownership of a public key?
(a) Digital cash
(b) Digital Signature
(c) Digital Certificates
(d) All of these
Answer:
(c) Digital Certificates

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 40.
Which function is similar to the functions of identification cards such as driving licenses?
(a) Digital cash
(b) Digital Signature
(c) Digital Certificates
(d) All of these
Answer:
(c) Digital Certificates

Question 41.
Digital certificates are issued by recognized
(a) Certification Authorities (CA)
(b) System Analyst
(c) Special Officer (SO)
(d) Digital Department
Answer:
(a) Certification Authorities (CA)

Question 42.
Which is a mechanism that is used to verify that a particular digital document?
(a) Digital signature
(b) Digital certificates
(c) (a) or (b)
(d) (a) and (b)
Answer:
(a) Digital signature

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 43.
Which format to provide the highest levels of security and universal acceptance?
(a) Public Key Infrastructure (PKI)
(b) Private key
(c) Common key
(d) All of these
Answer:
(a) Public Key Infrastructure (PKI)

Question 44.
Which are widely used for avoiding forging or tampering of important documents?
(a) Digital certificates
(b) Digital signatures
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) Digital signatures

Question 45.
Which is used as dual signatures to ensure the privacy?
(a) PKI
(b) GTE
(c) SET
(d) SSL
Answer:
(c) SET

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 46.
The most common cryptographic protocol is
(a) Secure Sockets Layers (SSL)
(b) Transport Layer Security (TLS)
(c) Secure Electronic Transaction (SET)
(d) Pretty Good Privacy (PGP)
Answer:
(a) Secure Sockets Layers (SSL)

Question 47.
Which is a hybrid encryption protocol for securing transactions over the Internet?
(a) Secure Sockets Layers (SSL)
(b) Transport Layer Security (TLS)
(c) Secure Electronic Transaction (SET)
(d) Pretty Good Privacy (PGP)
Answer:
(a) Secure Sockets Layers (SSL)

Question 48.
Which system acts as an additional layer, to ensure the security of data?
(a) PGP
(b) SET
(c) TLS
(d) SSL
Answer:
(d) SSL

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 49.
Which was renamed as Transport Layer Security (TLS) in 2001?
(a) Secure Sockets Layers (SSL)
(b) Transport Layer Security (TLS)
(c) Secure Electronic Transactions (SET)
(d) Pretty Good Privacy (PGP)
Answer:
(a) Secure Sockets Layers (SSL)

Question 50.
Which is a secure payment protocol on the Internet?
(a) 2-D secure
(b) 3-D secure
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) 3-D secure

Question 51.
Which was developed by visa to increase the level of transaction security?
(a) 2-D secure
(b) 3-D secure
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) 3-D secure

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 52.
Which is an additional security layer for online credit or debit card transactions?
(a) 2-D secure
(b) 3-D secure
(c) (a) or (b)
(d) (a) and (b)
Answer:
(b) 3-D secure

Question 53.
Which is the encrypted data usually the output of an encryption algorithm?
(a) 3-D secure
(b) Cipher text
(c) Decipher
(d) Cracker
Answer:
(b) Cipher text

Question 54.
A person who breaks computer network’s security maliciously to gain access to critical data ________
(a) Cipher text
(b) Cryptanalysis
(c) Cracker
(d) Cyber squatting
Answer:
(c) Cracker.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 55.
Which is standard algorithm for decrypting data?
(a) Cipher text
(b) Cryptanalysis
(c) Cracker
(d) Desipher
Answer:
(d) Desipher

Question 56.
Match the following: (E-Commerce Threats)

(A) Payment Fraud (i) ATM withdrawals
(B) Fraud (ii) Network flooding
(C) DDoS (iii) Friendly Fraud
(D) Typopiracy (iv) Cyber squatting

(a) (A) – (iii); (B) – (i); (C) – (ii): (D) – (iv)
(b) (A) – (i); (B) – (ii); (C) – (iv); (D) – (iii)
(c) (A) – (ii): (B) – (iii): (C) – (i); (D) – (iv)
(d) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
Answer:
(a) (A) – (iii); (B) – (i); (C) – (ii): (D) – (iv)

Question 57.
Match the following:

(A) Encryption technology (i) Data Encryption Standard
(B) Symmetric key (ii) Security protection
(C) Asymmetric key (iii) Non repudiation
(D) Authentication technology (iv) Public key

(a) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(b) (A) – (iii); (B) – (iv); (C) – (ii); (D) – (i)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
Answer:
(d) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 58.
Match the following:

(A) Digital certificates (i) Hardware
(B) Digital signature (ii) Phil Zimmermann
(C) Pretty Good Privacy (iii) Digital document
(D) Security token (iv) Certification Authority

(a) (A) – (iv); (B) – (ii); (C) – (iii); (B) – (i)
(b) (A) – (iii); (B) – (ii); (C) – (iv); (D) – (i)
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(d) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
Answer:
(c) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 59.
Match the following:

(A) Secure Electronic Transaction (i) Secure Socket Layer
(B) Secure Sockets Layer (ii) VISA
(C) Transport Layer Security (iii) Security protocol
(D) 3 – D Secure (iv) Hybrid encryption

(a) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
(b) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (iii); (B) (i); (C) – (ii); (D) – (iv)
Answer:
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)

Question 60.
Match the following:

(A) Message digest (i) Input Chip
(B) One Time Password (OTP) (ii) Hashing formula
(C) PIN (Personal Identification Number) (iii) Dynamic password
(D) Plain text (iv) Static number

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
Answer:
(b) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (I)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 61.
Choose the Incorrect pair:
(a) Phishing – Threat
(b) OTP – Password
(c) Malware – Viruse type
(d) Botnet – Tampering
Answer:
(d) Botnet – Tampering

Question 62.
Choose the Incorrect pair:
(a) Ransomware – Hardware
(b) domain – google.com
(c) Typopiracy – Cyber squatting
(d) Hacking – Intrusion
Answer:
(a) Ransomware – Hardware

Question 63.
Choose the Incorrect pair:
(a) Clear text – Plain text
(b) Triple DES – DESede
(c) Same key – Asymmetric key
(d) RSA – Algorithm
Answer:
(c) Same key – Asymmetric key

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 64.
Choose the correct pair:
(a) e-muthra – Symmetric key
(b) Safe script – Asymmetric key
(c) Digital signature – Public key Infrastructure
(d) SET – Cracker
Answer:
(c) Digital signature – Public key Infrastructure

Question 65.
Choose the correct pair:
(a) Secured Sockets Layers – Transport Layers Security
(b) 3-D Secure – URL
(c) Decipher – Website Address
(d) Domain name – Algorithm
Answer:
(a) Secured Sockets Layers – Transport Layers Security

Question 66.
Choose the incorrect statement:
(a) Friendly fraud mean when customer demands false reclaim or refund.
(b) Clean fraud mean when a stolen credit card is used to make a purchase.
(c) Triangulation fraud mean fake online shops offering cheapest price and collect credit card data
(d) Cyber squatting is the legal practice of registering an Internet domain – name.
Answer:
(d) Cyber squatting is the legal practice of registering an Internet domain – name.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 67.
Choose the incorrect statement:
(a) The Data Encryption Standard (DES) is a asymmetric encryption algorithm.
(b) Encryption technology is an effective information security protection.
(c) Cipher text using encryption algorithm.
(d) The encryption or decryption process use a key to encrypt or decrypt the data.
Answer:
(a) The Data Encryption Standard (DES) is a asymmetric encryption algorithm.

Question 68.
Choose the incorrect statement:
(a) Same key is used for both encryption and decryption in symmetric key encryption.
(b) The speed of encryption or decryption is very slow in symmetric key encryption.
(c) Plain text and cipher text are of same size in symmetric key encryption.
(d) Symmetric key encryption that provides confidentiality.
Answer:
(b) The speed of encryption or decryption is very slow in symmetric key encryption.

Question 69.
Choose the correct statement:
(a) A digital certificate also known as Public Key Certificate.
(b) Digital certificates are issued by Government of India.
(c) Digital signature is to ensure that a data remain unsecure.
(d) A digital signature is created using digital documents.
Answer:
(a) A digital certificate also known as Public Key Certificate.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 70.
Choose the correct statement:
(a) 3-D secure is a Unsecure Payment Protocol on the Internet.
(b) The most common cryptographic protocol is Secure Sockets Layers (SSL)
(c) The SSL Standard was developed by windows.
(d) TLS and SSL are the same in the generation of symmetric keys.
Answer:
(b) The most common cryptographic protocol is Secure Sockets Layers (SSL)

Question 71.
Assertion (A):
Viruses cause harm to the computers.
Reason (R):
Viruses destroy all the information stored in a computer.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(a) Both A and R are true, and R is the correct explanation for A

Question 72.
Assertion (A):
Hacking refers to unauthorized intrusion into a computer.
Reason (R):
Typopiracy is a variant of cyber squatting.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 73.
Assertion (A):
Ransomware is a type of Malware.
Reason (R):
A person who breaks computer network security is called cipher text.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(c) A is true, But R is false.

Question 74.
Assertion (A):
Digital certificates are provides non-repudiation and integrity.
Reason (R):
Digital certificates provides authentication and security.
(a) Both A and R are true, and R is the correct explanation for A
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(d) A is false, But R is True.

Question 75.
Assertion (A):
PIN is a dynamic password that is valid for one login session.
Reason (R):
OTP is a static number that is assigned to consumers.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, But R is false.
(d) A is false, But R is True.
Answer:
(b) Both A and R are false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 76.
Pick the odd one out.
(a) TDES
(b) 3DES
(c) DESede
(d) DDoS
Answer:
(d) DDoS

Question 77.
Pick the odd one out.
(a) Hacking
(b) Ransomware
(c) Tampering
(d) Malware
Answer:
(c) Tampering

Question 78.
Pick the odd one out.
(a) DES
(b) RSA
(c) ECC
(d) DSA
Answer:
(a) DES

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 79.
Pick the odd one out.
(a) NIC
(b) AES
(c) e-mudhra
(d) MTNL
Answer:
(b) AES

Question 80.
Pick the odd one out.
(a) Domain Name
(b) Acquirer Domain
(cj Issuer Domain
(d) Interoperability Domain
Answer:
(a) Domain Name

Question 81.
In E-Commerce, when a stolen credit card is used to make a purchase it is termed as:
(a) Friendly fraud
(b) Clean fraud
(c) Triangulation fraud
(d) Cyber squatting
Answer:
(b) Clean fraud

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 82.
Which of the following is not a security element involved in E-Commerce?
(a) Authenticity
(b) Confidentiality
(c) Fishing
(d) Privacy
Answer:
(c) Fishing

Question 83.
Asymmetric encryption is also called as:
(a) Secure Electronic Transaction
(b) Certification Authority
(c) RSA algorithm
(d) Payment Information
Answer:
(c) RSA algorithm

Question 84.
The security authentication technology does not include:
(i) Digital Signatures
(ii) Digital Time Stamps
(iii) Digital Technology
(iv) Digital Certificates
(a) (i), (ii) and (iv)
(b) (ii) and (iii)
(c) (i), (ii) and (iii)
(d) all the above
Answer:
(b) (ii) and (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 85.
PGP stands for:
(a) Pretty Good Privacy
(b) Pretty Good Person
(c) Private Good Privacy
(d) Private Good Person
Answer:
(a) Pretty Good Privacy

Question 86.
__________ for securing crsen cards transactions via the Internet.
(a) Secure Electronic Transaction (SET)
(b) Credit Card Verification
(c) Symmetric Key Encryption
(d) Public Key Encryption
Answer:
(a) Secure Electronic Transaction (SET)

Question 87.
Secure Electronic Transaction (SET) was developed in:
(a) 1999
(b) 1996
(c) 1969
(d) 1997
Answer:
(b) 1996

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 88.
The websites secured by Secure Socket Layer protocols can be identified using:
(a) html:/7 .
(b) http://
(c) htmls://
(d) https://
Answer:
(d) https://

Question 89.
3-D Secure, a protocol was developed by:
(a) Visa
(b) Master
(c) Rupay
(d) PayTM
Answer:
(a) Visa

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 17 E-Commerce Security Systems

Question 90.
Which of the following is true about Ransomware?
(a) Ransomware is not a subset of malware
(b) Ransomware deletes the file instantly
(c) Typopiracy is a form of ransomware
(d) Hackers demand ransom from the victim
Answer:
(b) Ransomware deletes the file instantly

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 1.
What are used to transfer documents in EDI?
Answer:
The transfer of documents such as delivery notes, invoices, purchase orders, advance ship notice, functional acknowledgments etc…

Question 2.
What are EDI includes data exchange?
Answer:
EDI includes data exchange between buyers and sellers, trade partners, and also internal data exchange within departments of a company.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 3.
What are internationally accepted EDI standard?
Answer:
There are many internationally accepted EDI standard, for example EDIFACT, XML, ANSI ASC X12 etc…

Question 4.
Who was father of EDI?
Answer:

  • Ed Guilbert is called as the Father of EDI.
  • Ed Guilbert with his team developed the first standardized system for business documents.

Question 5.
What is the purpose of EDI?
Answer:

  1. EDI will smoothen the business transactions and increase the profit
  2. EDI made ordering and shipping faster, more organized, and less expensive.
  3. EDI documents were transmitted electronically by the use of Radio teletype, telex messages, or telephone.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 6.
Who were exchanging electronic messages in late 1960s?
Answer:
In late 1960s, shipping line, railroads, airlines, and truck companies of USA were exchanging electronic messages for their business.

Question 7.
Expand the following:
(i) TDCC,
(ii) EDIA.
Answer:
(i) TDCC: Transportation Data Coordinating Committee.
(ii) EDIA: Electronic DATA Interchange Association.

Question 8.
Short note on first EDI messages.
Answer:

  1. The first EDI messages was sent in 1965 from the Holland – American steamship line to Trans-Atlantic shipping company using telex messages.
  2. The computer had sent a full page of information in roughly two minutes.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 9.
What is Direct EDI?
Answer:

  1. A Direct EDI also called as point-to-point EDI.
  2. It establishes a direct connection between various business stakeholders and partners individually.

Question 10.
Write the short note on EDI via VAN.
Answer:
EDI (Electronic Data Interchange) via VAN'(Value Added Network) is where EDI documents are transferred with the support of third party network service providers.

Question 11.
What is VAN?
Answer:

  1. VAN (Value Added Network) is a company, that is based on its own network, offering EDI services to other businesses.
  2. A Value Added Network acts as an intermediary between trading partners.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 12.
What are protocols used for exchange of EDI based documents?
Answer:
The protocols used for exchange of EDI based documents like FTP / VPN, SFTP and FTPS.

Question 13.
What is an Mobile EDI?
Answer:

  1. When smart phones or other such hanheld devices are used to transfer EDI documents it is called as mobile EDI.
  2. Mobile EDI applications considerably increase the speed of EDI transactions.

Question 14.
What is EDI standards?
Answer:

  1. EDI standard is the most critical part of the entire EDI.
  2. EDI is the data transmission and information exchange in the form of an agreed message format, it is important to develop a unified EDI standard.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 15.
What is Integrated EDI standard?
Answer:
The European region has also developed an Integrated EDI standard known as GTDI (Guideline for Trade Data Interchange).

Question 16.
What are two regional EDI standards?
Answer:
ANSI X12 and GTDI have become the two regional EDI standards in North America and Europe respectively.

Question 17.
What is international EDI standard?
Answer:
The United Nations Economic Commission for Europe.(UNIECE / WP.4) hosted the task of the development of international EDI standards.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 18.
What are most widely used EDI message standard?
Answer:

  1. The most widely used EDI message standards are the United Nations EDIFACT and the ANSI X12. ,
  2. UN / EDIFACT is officially proposed.

Question 19.
What are EDIFACT includes?
Answer:
EDIFACT includes a set of internationally agreed standards, catalogs, and . guidelines for electronic exchange of structured data between independent computer systems.

Question 20.
What is EDI Interchange?
Answer:

  1. EDI Interchange is also called as envelope. The top level of EDIFACT structure is Interchange.
  2. An interchange may contain multiple messages. It starts with UNB and end with UNZ.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 21.
What is EDIFACT segment?
Answer:

  1. EDIFACT segment is the subset of message. A segment is a three character alpha-numeric code.
  2. Segments may contain one, or several related user data elements

Question 22.
What is EDIFACT elements?
Answer:
The EDIFACT elements are the piece of actual data. These data elements may be either simple or composite.

Question 23.
Which is represent documents other than monetary instruments?
Answer:

  1. Represent documents other than monetary instruments by According to the National Institute of Standard and Technolcv.
  2. EDI is the computer-to-computer interchange of strictly formatted messages.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 24.
What is feature of UN created the EDIFACT?
Answer:

  • UN created the EDIFACT to assist with the global reach of technology in E-Commerce.
  • Direct EDI is also called as point-to-point EDI.
  • Every EDI message consist of six uppercase English alphabets.

Question 25.
What is purchase order?
Answer:
A commercial and first official document issued by a buyer to a seller indicating types, quantities, and agreed prices for products or services.

Question 26.
What are the aspects mainly divided by the EDI standard?
Answer:
Basic standards, Code standards, Message standards, Document standards, Management standards, Application standards, Communication standards, and Security standards.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 27.
Which is affiliated to the UN Economic Commission for Europe (UNECE)?
Answer:

  1. A Cross Industry, Standard data format of electronic data for commercial transactions.
  2. Maintenance and further development of this standard goes through the United Nations Center for Trade Facilitation and Electronic Business (UN/CEFACT).
  3. These are affiliated to the UN Electronic Commission for Europe (UNECE).

Question 28.
Explain the EDIFACT segment tables.
Answer:

  1. EDIFACT segment table lists the message tags. It contains the tags, tag names, requirements designator and repetitation field.
  2. The requirement designator may be mandatory (M) or conditional (C). The (M) denotes that the segment must appear atleast once.
    The (C) denotes that the segment may be used if needed.

Question 29.
Explain the EDIFACT message.
Answer:
EDIFACT message has two types, they are service messages and Data exchange.
(i) Service messages: To confirm / reject a message, CONTRL and APERAK messages are sent.

  • CONTRL – Syntax check and confirmation of arrival of message
  • APERAK – Technical error messages and acknowledgement.

(ii) DATA Exchange:

  • CREMUL – Multiple Credit advice
  • DELFOR – Delivery Forecast.
  • IFTMBC – Booking Configuration

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 30.
Write about History of Electronic Data Interchange (EDI).
Answer:

  1. Today, many companies and organizations use computers to store and process data.
  2. Different organizations use different applications systems, and the format of the data generated is not the same.
  3. When organizations need to communicate for their business needs they . have to re-key.
  4. This was time consuming and a major obstacle in the business operations.
  5. In order to solve this problem, some enterprises have agreed a specific standard format, which can be regarded as the origin of EDI application concept.

Question 31.
Explain EDI layers with its functions.
Answer:
EDI layers describes how data flows from one computer to another.

  1. EDI semantic layer – Application level services.
  2. EDI standard layer – EDIFACT business form standards.
    – ANSI X12 business form standards.
  3. EDI Transport layer – Electronic Mail X.435, MIME.
    – Point to point FTP, TELNET.
    – World Wide Web HTTP.
  4. Physical layer – Dial-up line, internet, I-way

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 32.
Explain with suitable example an EDIFACT message.
Answer:
Eg: DTM + 11 : 200 606 200 730 : 203
In this example, the whole line is called segment.
The meaning of each code is as follows:

  1. DTM is the segment identifier and it indicates that the following data is date / time information.
  2. 11 is a data element. A qualifier describes what kind of event is meant. The code 11 means time of dispatch / delivery of goods.
  3. 200 606 200 730 is another element. Here it represents the date in the format CCYYMMDDHHMM.
    Here,
    CC – Century, YY – year, MM – Month, DD – Date, HH – hour, MM – Minute.
  4. 203 is also an element. 203 is an identifier for the date format.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 33.
Define EDI.
Answer:

  1. EDI (Electronic Data Interchange) is the exchange of business documents between one trade partner and another electronically.
  2. It is transferred through a dedicated channel or through the Internet in a predefined format without much human intervention.

Question 34.
List few types of business documents that are transmitted through EDI.
Answer:
Direct EDI, EDI via VAN, EDI via FTP / VPN, SFTP, FTPS, Web EDI, Mobile EDI etc…

Question 35.
What are the four major components of EDI?
Answer:

  1. Standard Document Format
  2. Translator and Mapper
  3. Communication Software
  4. Communication Network

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 36.
What is meant by directories in EDIFACT?
Answer:

  1. EDIFACT (Electronic Data Interchange for Administration, Commerce and Transport) is an International EDI-Standard developed under the supervision of the United Nations.
  2. EDIFACT includes a set of internationally agreed standards, catalogs and guidelines for electronic exchange of structured data between independent computer systems.

Question 37.
Write a note on EDIFACT subsets.
Answer:
(i) Due to the complexity, branch-specific subsets of EDIFACT have developed.
(ii) These sunsets of EDIFACT include only the functions relevant to specific user groups.
Eg: CEFIC – Chemical industry
EDIFORN – Furniture industry
EDIGAS – Gas business

Question 38.
Write a short note on EDI.
Answer:

  1. EDI (Electronic Data Interchange) is the exchange of business documents between one trade partner and another electronically.
  2. It is used to transfer documents such as delivery notes, invoices, purchase orders, advance ship notice, functional acknowledgements etc…
  3. EDI includes data exchange between buyers and sellers, trade partners, and also internal data exchange within departments of a company.
  4. There are many internationally accepted EDI standard. Eg: EDIFACT, XML, ANSI ASCI2, etc., EDI is paperless trade.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 39.
List the various layers of EDI.
Answer:
Electronic data interchange (EDI) architecture specifies four different layers
namely,
(i) Semantic layer
(ii) Standards translation layer
(iii) Transport layer
(iv) Physical layer.
These EDI layers describes how data flows from one computer to another.

Question 40.
Write a note on UN/EDIFACT.
Answer:

  1. UN/EDIFACT (United Nations / Electronic Data Interchange for Administration, commerce and Transport) is an International EDI- standard developed under the supervision of United Nations.
  2. EDIFACT includes a set of internationally agreed standards, catalogs and guidelines for electronic exchange of structured data between independent computer systems.
  3. UN/EDICACT is a cross-industry, standard data format of electronic data for commercial transactions.
  4. Maintenance and further development of this standard goes through, the United Nations center for Trade Facilitation and Electronic business (UN / CEFACT), which is affiliated to the UN Economic Commission for Europe (UNECE).

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 41.
Write a note on EDIFACT message.
Answer:

  1. The basic standardization concept of EDIFACT is that there are uniform message types called United Nations Standard Message (UNSM).
  2. The message types, all of which always have exactly one nickname consisting of six uppercase English alphabets.
  3. The message begins with UNH and end with UNT.
  4. The EDIFACT messages are service messages and data exchange.

Question 42.
Write about EDIFACT separators.
Answer:
EDIFACT has the following punctuation marks that are used as standard separators.

  • (’) Apostrophe – Segment terminator
  • (+) Plus sign – Segment tag and data element separator
  • (:) Colon – Component data element separator.
  • (?) Question mark – Release character.
  • (.) Period – Decimal point.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 43.
Briefly explain various types of EDI.
Answer:
The types of EDI were Constructed based on how EDI communication
connections and the conversions were organized.
The EDI types are –
(i) Direct EDI
(ii) EDI via VAN
(iii) EDI via FTP / VPN, SFTP, FTPS
(iv) WEB EDI
(v) Mobile EDI

(i) Direct EDI / Point-to-point:
Direct EDI is also called as point-to-point EDI. It establishes a direct connection between various business stake¬holders and partners individually.

(ii) EDI via VAN:
EDI via VAN (Value Added Network) is where EDI documents are transferred with the support of third party network service providers.

(in) EDI via FTP/VPN, SFTP, FTPS:
When protocols like FTP / VPN, SFTP and FTPS are used for exchange of EDI based documents through the Internet or Intranet it is called as EDI via FTP/VPN, SFTP, FTPS.

(iv) Web EDI:
Web based EDI conducts EDI using an web browser via the Internet. Web based EDI is easy and convenient for small and mediun organizations.

(v) Mobile EDI:
When smart phones or other such handheld devices ar used to transfer EDI documents it is called as Mobile EDI.
Mobile EDI applications considerably increase the speed of EDI transactions.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 44.
What are the advantages of EDI?
Answer:

  1. EDI was developed to solve the problems inherent in paper-based transaction processing and in other forms of electronic communication.
  2. EDI system offers a company greater control over its supply chain and allow it to trade more effectively.
  3. It also increases productivity and promotes operational efficiency.
  4. The other advantages of EDI are
    • Improving service to end users.
    • Increasing productivity.
    • Minimizing errors.
    • Slashing response times.
    • Automation of operations.
    • Cutting costs.
    • Integrating all business and trading partners.
    • Providing information on process status.
    • Optimizing financial ratios.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 45.
Write about structure of EDIFACT.
Answer:

TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI 1

(i) EDIFACT is a hierarchical structure where the top level is referred to as an interchange, and lower levels contain multiple message.
(ii) The messages consist of segments, which in turn consist of composites.
(iii) Segment table lists the message tags. It contains the tags, tag names, requirements designator and repetitation field.
(iv) The requirement designator may be mandatory (M) or conditional (C).
(v) The (M) denotes that the segment must appear atleast once.
(vi) The (C) denotes that the segment may be used if needed.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 46.
Prepare a chart explaining various types of EDI standards. (Eg: web EDI)
Answer:
EDI standards developers design and publish EDI standard formats for various kinds of documents, such as purchase orders or invoices, that you might exchange with your trading partners. Also called messages, transaction sets are groups of segments.

TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI 2

All EDI standards include the following components:
• Element – The smallest component in an EDI standard.
• Segments – Groups of elements.
• Transaction sets – Messages, transaction sets are groups of segments.

(i) EDIFACT:
• Electronic Data Interchange for Administration, Commerce and Transport is the International EDI standard developed under the United Nations.
• The EDIFACT standard provides a set of syntax rules to structure data.

(ii) VAD (Vereinigung and Automobile industries):
The VDA standard used within the European automative industry mainly in Germany.

(iii) ODETTE (Organization for Data Exchange by Tele Transmission in Europe):
The ODETTE standard used within the European automative industry.

(iv) EANCOM:
(EAN + COMmunication) standard messages were developed by GS1, with the support of GS1 UK and other national member organization.
Eancom messages are equivalent of traditional paper business documents that cover master data setup, business transactions, financial documents and reporting.

(v) ANSIX12:
The EDI ANSIX12 standard is most prevalent in the United States and has counterparts used in other parts of the world, like the UN / EDIFACT standard that is the equivalent of EDI ANSIX12 outside the USA.

(vi) HIPAA (Healthcare Insurance Portability and Accountability Act):
HIPAA is used exclusively in the medical community including private practices, hospitals, health insurance, and any other environment dealing with medical records or patient care.

(vii) TRADACOMS:
TRAding DAta COMmunications Standard is the intema-tional EDI standard developed by the UK ANA (Article Numbering Association).
TRADACOMS support requires the ITX pack for supply chain EDI. Other EDI standards ar RosettaNet, SWIFT, VICS etc…

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Choose the correct answer:

Question 1.
Which is the exchange of business documents between one trade partner and another electronically?
(a) Electronic Data Interchange (EDI)
(b) Electronic Data Interchange Association (EDLA)
(c) UN Economic Commission for Europe (UNECE)
(d) UN Standard Message (UNSM)
Answer:
(a) Electronic Data Interchange (EDI)

Question 2.
EDI is:
(a) Electronic transfer
(b) Paperless payment
(c) Electronic payment
(d) Paperless trade
Answer:
(d) Paperless trade

Question 3.
Which of the following one is internationally accepted EDI standard?
(a) EDIFACT
(b) XML
(c) ANSI ASCXI2
(d) All of these
Answer:
(d) All of these

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 4.
Expansion of the TDCC is:
(a) Transportation Data Coordinating Committee
(b) Transmitted Data Coordinating Committee
(c) Transfer Data Coordinating Committee
(d) Transaction Data Coordinating Committee
Answer:
(a) Transportation Data Coordinating Committee

Question 5.
Who develop EDI standard format?
(a) EDIA
(b) TDCC
(c) EDIFACT
(d) ANSI
Answer:
(b) TDCC

Question 6.
The First EDI messages was sent in 1965 from:
(a) America-Canada
(b) England-Holland
(c) France-Germany
(d) Holland-America
Answer:
(d) Holland-America

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 7.
Direct EDI is also called as:
(a) point-to-point
(b) EDI via VAN
(c) Mobile EDI
(d) All of these
Answer:
(a) point-to-point

Question 8.
Which network is a company, that is based on its own network, offering EDI services?
(a) Value Added Network (VAN)
(b) Direct EDI
(c) Web EDI
(d) Mobile EDI
Answer:
(a) Value Added Network (VAN)

Question 9.
Which network acts as an intermediary between trading partners?
(a) Web EDI
(b) Mobile EDI
(c) Direct EDI
(d) Value Added Network (VAN)
Answer:
(d) Value Added Network (VAN)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 10.
Which networks are the allocation of access rights and providing high (data security?
(a) Value Added Network (VAN)
(b) Web EDI
(c) Mobile EDI
(d) Direct EDI
Answer:
(a) Value Added Network (VAN)

Question 11.
Which EDI is easy and convenient for small and medium organisations?
(a) Mobile based
(b) EDI based
(c) Web based
(d) All of these
Answer:
(c) Web based

Question 12.
Which was developed to solve the problems inherent in paper-base d transaction processing?
(a) EDI
(b) VPN
(c) FTP
(d) SFTP
Answer:
(a) EDI

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 13.
Which system offers a company greater control over its supply chain and allow it to trade more effectively?
(a) EDI
(b) VPN
(c) FTP
(d) SFTP
Answer:
(a) EDI

Question 14.
How many layers specifies in Electronic data interchange architecture?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Question 15.
How many major components in EDI?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 16.
The most widely used EDI message standards are the United Nations:
(a) EDIFACT
(b) ANSIX12
(c) (a) and (b)
(d) TDCC
Answer:
(c) (a) and (b)

Question 17.
Which is a hierarchical structure where the top level is referred to as an interchange?
(a) EDIFACT
(b)ANSIX12
(c) TDCC
(d) None of these
Answer:
(a) EDIFACT

Question 18.
EDI Interchange is also called as:
(a) message
(b) segment
(c) element
(d) envelope
Answer:
(d) envelope

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 19.
The top level of EDIFACT structure is:
(a) message
(b) segment
(c) Interchange
(d) envelope
Answer:
(c) Interchange

Question 20.
The basic standardization concept of EDIFACT is that there are uniform message types called:
(a) United Nations Standard Message (UNSM)
(b) United Nations Economic Commission for Europe (UNECE)
(c) American National Standards Institute (ANSI)
(d) National Institute of Standards and Technology (AIST)
Answer:
(a) United Nations Standard Message (UNSM)

Question 21.
The EDIFACT message begins with and ends with:
(a) UNA, UNZ
(b) UNB/UNZ
(c) UNA, UNT
(d) UNH, UNT
Answer:
(d) UNH, UNT

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 22.
Which EDIFACT service message is to sent confirm?
(a) CONTRL
(b) APERAK
(c) CREMUL
(d) DEL FOR
Answer:
(a) CONTRL

Question 23.
Which EDIFACT service message is to reject?
(a) CONTRL
(b) APERAK
(c) CREMUL
(d) DEL FOR
Answer:
(b) APERAK

Question 24.
Which is EDIFACT data exchange in multiple credit advice?
(a) CONTRL
(b) APERAK
(c) CREMUL
(d) DEL FOR
Answer:
(c) CREMUL

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 25.
Which is EDIFACT data exchange in Delivery forecast?
(a) APERAK
(b) CREMUL
(c) DEL FOR
(d) IFTMBC
Answer:
(c) DEL FOR

Question 26.
Which is EDIFACT data exchange for booking confirmation?
(a) APERAK
(b) CREMUL
(c) DEL FOR
(d) IFTMBC
Answer:
(d) IFTMBC

Question 27.
Which is the subset of message?
(a) EDI Interchange
(b) EDIFACT message
(c) EDIFACT segment
(d) EDPFACT elements
Answer:
(c) EDIFACT segment

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 28.
How many alpha nemeric code in EDIFACT segment?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 29.
Which of the following character is used as segment terminator?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (.) Period
Answer:
(a) (’) Apostrophe

Question 30.
Which of the following character is used as segment tag and data element separator?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (?) Question Mark
Answer:
(b) (+) Plus sign

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 31.
Which of the following character is used as component data element separator?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (?) Question Mark
Answer:
(c) (:) Colon

Question 32.
Which of the following character is used as to release character?
(a) (’) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (?) Question Mark
Answer:
(d) (?) Question Mark

Question 33.
Which of the following character is used as decimal point?
(a) (,) Apostrophe
(b) (+) Plus sign
(c) (:) Colon
(d) (.) Period
Answer:
(d) (.) Period

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 34.
Which are used to separate segments or elements?
(a) Separators
(b) Punctuation marks
(c) Either (a) or (b)
(d) Both (a) and (b)
Answer:
(d) Both (a) and (b)

Question 35.
Which one of the following is a type of tele-printer?
(a) Dot matrix printer
(b) Telex
(c) Laser Printer
(d) All of these
Answer:
(b) Telex

Question 36.
Match the following:

(A) EDI (i) EDI standard
(B) EFT (ii) Standard format
(C) EDIFACT (iii) Paperless trade
(D)TDCC (iv) Paperless Payment

(a) (A) – (iii); (B) – (i); (C) – (ii); (D) – (iv)
(b) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (ii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (iv); (B) – (iii,); (C) – (i); (D) – (ii)
Answer:
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 37.
Match the following:

(A) Direct EDI(i) Speed of EDI
(B) VAN(ii) Point to point
(C) Web EDI(iii) Third Party Network
(D) Mobile EDI(iv) Small organisaton

(a) (A) – (ii); (B) – (i); (C) – (iv); (D) – (iii)
(b) (A) – (ii); (B) – (iii,); (C) – (iv); (D) – (i)
(c) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(d) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
Answer:
(b) (A) – (ii); (B) – (iii,); (C) – (iv); (D) – (i)

Question 38.
Match the following:

(A) EDIFACT directories(i) UNSM
(B) EDIFACT subsets(ii) Versions of EDIFACT
(C) EDIFACT structure(iii) Branch – specific subset
(D) EDIFACT message(iv) Hierarchical structure

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (iv); (B) – (i); (C) – (ii,); (D) – (iii)
(c) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (i)
Answer:
(d) (A) – (ii); (B) – (iii); (C) – (iv); (D) – (I)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 39.
Match the following:

(A) (‘) Apostrophe(i) Release character
(B) plus sign(ii) Component data
(C) (:) Colon(iii) Segment tag
(D) (?) Question Mark(iv) Segment terminator

(a) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)
(b) (A) – (iv); (B) – (ii); (C) – (i); (D) – (iii)
(c) (A) – (ii); (B) – (iv); (C) – (iii); (D) – (i)
(d) (A) – (iii); (B) – (i); (C) – (iv); (D) – (ii)
Answer:
(a) (A) – (iv); (B) – (iii); (C) – (ii); (D) – (i)

Question 40.
Match the following (EDIFACT Messages):

(A) CONTROL(i) Technical error
(B) APERAK(ii) Syntax check
(C) CREMUL(iii) Delivery forecast
(D) DELFOR(iv) Multiple credit

(a) (A) – (iii); (B) – (iv); (C) – (i); (D) – (ii)
(b) (A) – (iv); (B) – (iii); (C) – (i); (D) – (ii)
(c) (A) – (ii); (B) – (i); (C) – (iv)- (D) – (iii)
(d) (A) – (ii); (B) – (iii); (C) – (i); (D) – (iv)
Answer:
(c) (A) – (ii); (B) – (i); (C) – (iv)- (D) – (iii)

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 41.
Choose the incorrect pair:
(a) XML – EDI standard
(b) Guilbert – Father of EDI
(c) Telex – EDI documents
(d) EDI – Cheque payment
Answer:
(d) EDI – Cheque payment

Question 42.
Choose the incorrect pair:
(a) Direct EDI – EDI component
(b) Point-to-point – Direct EDI
(c) VAN – EDI services .
(d) FTPS – EDI exchange
Answer:
(a) Direct EDI – EDI component

Question 43.
Choose the incorrect pair:
(a) ANSIX12 – EDI standard
(b) Version of EDIFACT – EDIFACT directories
(c) (:) Colon – EDI logical operator
(d) Interchange – Envelope
Answer:
(c) (:) Colon – EDI logical operator

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 44.
Choose the correct pair (EDIFACT message):
(a) CREMUL – Delivery forecast
(b) IFT MBC – Booking confirmation
(c) DEL FOR – Multiple credit
(d) CONTRL – Syntax check
Answer:
(d) CONTRL – Syntax check

Question 45.
Choose the correct pair:
(a) FTP – Network protocol
(b) Invoice – Top level message
(c) Separators – Computer network
(d) Interchange – Standard network
Answer:
(a) FTP – Network protocol

Question 46.
Choose the incorrect statement:
(a) EDI will smoothen the business transactions and increase the profit.
(b) EDI document were transmitted electronically.
(c) USA were exchanging electronic messages for their businesses.
(d) EDI is the exchange of money between two countries.
Answer:
(d) EDI is the exchange of money between two countries.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 47.
Choose the incorrect statements:
(a) Web based EDI conducts using an web browser, via the Internet.
(b) Electronic data interchange architecture specifies six different layers.
(c) Mobile EDI applications increase the speed of EDI transactions.
(d) EDI is improving service to end users.
Answer:
(b) Electronic data interchange architecture specifies six different layers.

Question 48.
Choose the incorrect statement:
(a) The standard is the most critical part of the entire EDI.
(b) The first industry-specific EDI standard was the TDCC.
(c) ANSIX12 is a Internet protocol.
(d) GTDI provides guideline for Trade Data Interchange.
Answer:
(c) ANSIX12 is a Internet protocol.

Question 49.
Choose the correct statement:
(a) The most widely used EDI message standards are the United Nations EDIFACT and ANSIX12.
(b) EDIFACT is a sequential structure where the low level is Interchanged.
(c) Segment Tables lists the EDIFACT subsets.
(d) The messages consists of subsets of EDIFACT.
Answer:
(a) The most widely used EDI message standards are the United Nations EDIFACT and ANSIX12.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 50.
Choose the correct statement:
(a) A EDIFACT segment is a three character alphanumeric code.
(b) The EDIFACT elements are the subset of message.
(c) EDIFACT segment contain only one user data element.
(d) The EDIFACT elements are components data.
Answer:
(a) A EDIFACT segment is a three character alphanumeric code.

Question 51.
Assertion (A):
Ed Guilbert is called as the father of EDI.
Reason (R):
Ed Guilbert with his team developed the first standardized system for business documents.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both A and R are true, and R is correct explanation for A.

Question 52.
Assertion (A):
Direct EDI is also called as point-to-point EDI
Reason (R):
A Value Added Network (VAN) is act as an intermediary between trading partners.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are ture, but R is not the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 53.
Assertion (A):
Mobile EDI applications considerably increase the speed of EDI transactions.
Reason (R):
Web based EDI is easy and convenient for bigger organizations.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 54.
Assertion (A):
The versions of EDIFACT are also called as EDIFACT structure.
Reason (R):
EDIFACT segment table lists the message tags.
(a) Both A and R are true, and R is correct explanation for A.
(b) Both A and R are ture, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Question 55.
Assertion (A):
EDIFACT is the subset of Elements.
Reason (R):
EDIFACT segment is a six character alphanumeric code.
(a) Both A and R are true.
(b) Both A and R are false.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are false.

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 56.
Pick the odd one out. (EDI Standard)
(a) EDIFACT
(b) XML
(c) ANSIX12
(d) TDCC
Answer:
(d) TDCC

Question 57.
Pick the odd one out (EDITYPES):
(a) Direct EDI
(b) Web EDI
(c) Translator
(d) Mobile EDI
Answer:
(c) Translator

Question 58.
Pick the odd one out (EDI layers):
(a) Mapper
(b) Semantic
(c) Transport
(d) Physical
Answer:
(a) Mapper

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 59.
Pick the odd one out (EDIFACT Subset Example):
(a) CEFIC
(b) UNSM
(c) EDIFURN
(d) EDIGAS
Answer:
(b) UNSM

Question 60.
Pick the odd one out (EDIFACT Data Exchange Message):
(a) CREMUL
(b) DEL FOR
(c) CONTRL
(d) IFTMBC
Answer:
(c) CONTRL

Question 61.
EDI stands for:
(a) Electronic Details Information
(b) Electronic Data Information
(c) Electronic Data Interchange
(d) Electronic Details Interchange.
Answer:
(c) Electronic Data Interchange

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 62.
Which of the following is an internationally recognized standard format for trade, transportation, insurance, banking and customs?
(a) TSLFACT
(b) SETFACT
(c) FTPFACT
(d) EDIFACT
Answer:
(d) EDIFACT

Question 63.
Which is the first industry-specific EDI standard?
(a) TDCC
(b) VISA
(c) Master
(d) ANSI
Answer:
(a) TDCC

Question 64.
UNSM stands for:
(a) Universal Natural Standard Message
(b) Universal Notations for Simple Message
(c) United Nations Standard Message
(d) United Nations Service Message
Answer:
(b) Universal Notations for Simple Message

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 65.
Which of the following is a type of EDI?
(a) Direct EDI
(b) Indirect EDI
(c) Collective EDI
(d) Unique EDI
Answer:
(a) Direct EDI

Question 66.
Who is called as the father of EDI?
(a) Charles Babbage
(b) Ed Guilbert
(c) Pascal
(d) None of the above
Answer:
(b) Ed Guilbert

Question 67.
EDI interchanges starts with and ends with
(a) UNA, UNZ
(b) UNB, UNZ
(c) UNA, UNT
(d) UNB, UNT
Answer:
(b) UNB, UNZ

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 68.
EDIFACT stands for:
(a) EDI for Admissible Commercial Transport
(b) EDI for Advisory Committee and Transport
(c) EDI for Administration, Commerce and Transport
(d) EDI for Admissible Commerce and Trade
Answer:
(c) EDI for Administration, Commerce and Transport

Question 69.
The versions of EDIFACT are also called as:
(a) Message types
(b) Subsets
(c) Directories
(d) Folders
Answer:
(c) Directories

Samacheer Kalvi TN State Board 12th Computer Applications Important Questions Chapter 18 Electronic Data Interchange – EDI

Question 70.
Number of characters in an single EDIFACT messages:
(a) 5
(b) 6
(c) 4
(d) 3
Answer:
(b) 6

TN Board 12th Computer Applications Important Questions

TN Board 12th Computer Science Important Questions Chapter 6 Control Structures

TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 1.
What are types of alternative or branching statements python provides?
Answer:
There are three types of alternative or branching statements python provides.
They are : –

  1. Simple if statement
  2. if.. .else statement
  3. If.. .elif statement.

Question 2.
Write a note on pass statement.
Answer:
Pass statement in python programming is a null statement. Pass statement when executed by the interpreter it is completely ignored. Nothing happens when pass is executed, it results in no operation.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 3.
What is nested loop structure?
Answer:

  1. A loop placed within another loop is called as nested loop structure.
  2. One can place a while within another while, for within another for.
  3. For within while and while within for to construct such nested loops.

Question 4.
What is range ()?
Answer:

  1. In python, for loop uses the range ( ) function.
  2. The range ( ) function in the sequence to specify the initial, final and increment values.
  3. range () can also take values from string, list, dictionary etc.,
    Eg: range(1, 30, 2)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 5.
What is out put?
Answer:
i = 25
while (i< = 30):
print (i, end =’\t’)
i = i+1
Output: 25 26 27 28 29 30

Question 6.
Write the output of the following segment for word in ‘SCHOOL:
Answer:
print (word, end =”)
Output: SCHOOL

Question 7.
What are keywords to achieve jump statements in python?
Answer:
There are three keywords to achieve jump statements in python, break, continue, pass.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 8.
What is output? for i in “My school”:
Answer:
if i ==”h”:
break
print (i, end=”)
Output: My sc

Question 9.
What are the parameters used print statement in python?
Answer:

  1. Print statement can have end and sep as parameters.
  2. End parameter can be used when we need to give any escape sequences like ‘it’ for tab, ‘in’ for new line and so on.
  3. step parameter can be used to specify any special characters like , (comma), (;) semicolon as parameter between values.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 10.
What is jump statement? What are the types of statement?
Answer:

(i) In python, the jump statement is used to unconditionally transfer the control from one part of the program to another.
(ii) There are three keywords to achieve jump statement is python. They are break, continue and pass.
(a) The break statement terminates the loop containing it.
(b) The continue statement is used to skip the remaining part of a loop.
(c) The pass statement in python programming is a null statement.

Question 11.
Write a python to replace punctuation with whitespace.
Answer:

TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures 1

for i in s :
if i not in punc_list: new_s t?=i
return new s. lower()

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 12.
Write a python program to calculate sum of numbers 1 to 100.
Answer:
n= 100
sum = 0
for counter in range (1, n+1):
sum=sum + counter
print(“Sum of 1 until%d: %d” % (n,sum))
Output:
Sum of 1 until 100: 5050

Question 13.
What is output?
for i in “SCHOOL”
if i ==’C’:
continue
print (i)
Answer:
The output is S.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 14.
Write a python program use for within while loop.
Answer:
i = 1
while (i<=6):
for j in range (1, i):
print (j, end=’\t’)
print (end = ‘\n’) i+=1
output
1
1 2
1 2 3
1 2 3 4
1 2 3 4 5

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 15.
List the control structures in Python.
Answer:
There are three important control structures, they are

  • Sequential
  • Alternative or Branching
  • Iterative or Looping.

Question 16.
Write note on break statement.
Answer:
The break statement terminates the loop containing it. Control of the program flows to the statement immediately after the body of the loop. If the break statement is inside a nested loop, break will terminate the innermost loop.

Question 17.
Write is the syntax of if. else statement.
Answer:
The if…else statements provides control to check the true block as well as the false block.
The syntax of if..else statement is
if < condition> :
statements-block 1
else
statements-block 2

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 18.
Define control structure.
Answer:
A program statement that causes a jump of control from one part of the program to another is called Control structure.

Question 19.
Write note on range ( ) in loop.
Answer:
range ( ) can also take values from string, list dictionary etc, Usually in python, for loop uses the range() function in the sequence to specify the initial, final and increment values. range ( ) generates a list of values starting from start till stop-1.

Question 20.
Write a program to display A
A B
A B C
A B C D
A B C D E
# Program to display Alphabet pattern
Answer:
for i in range (1, 6):
for j in range (65, 65+i):
a = chr (j)
print (a, end= ” “)
print ( )

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 21.
Write note on if..else structure.
The if…else statement provides control to check the true block as well as the false block.
The syntax is
Answer:
if <condition>:
Statement-block 1 else:
Statement-block 2
The condition if is cheeked, if it is true, statement-block 1 is executed, otherwise statement-block 2 is executed.
If-else statement thus provides two possibilities and the condition determines which block is to be executed.
Eg:
# example pgm for if….else
structure
a= int (input (“Type the number”))
if a%2 ==0:
print (a, “is an even number”)
else:
print (a, “is an odd number”)

Question 22.
Using if..else..elif statement write a suitable program to display largest of 3 numbers.
Answer:
# Python program to display largest of three numbers using if..else., elif statement.
a = float (input (“Type first value”))
b = float (input (“Type second value”))
c = float (input (“Type Third value”))
if (a>b and a>c):
print (“{0} is greater than both {1} and {2}”. format (a, b, c))
elif (b>a and b>c):
print (“{0} is greater than both {1} and {2}”. format (b, a, c))
elif (c>a and c>b):
Print (“{0} is greater than both {1} and {2}”. format (c, a, b))
else:
Print (“Either any two values or all the three values are equal”).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 23.
Write the syntax of while loop.
Answer:
The syntax of while loop is
while <condition>:
statement block 1
else:

statement block 2:

Hence the while loop, the condition is any valid Boolean expression returning true or false. The else part of while is optional.
The statement block 1 is kept executed till the condition is true. If the else part is written, it is executed when the condition is tested false.

Question 24.
List the differences between break and continue statements.
Answer:

Break Continue
The break statement terminates the loop containing it. Continue statement unlike the break statement is used to skip the remaining skip the remaining part of a loop and start with next iteration.
A while or for loop will iterate till the condition is tested false, but one can even transfer the control out of the loop with the help of break statement. The working of continue statement in for and while loop start the next iteration.
If break statement is inside a nested loop, break will terminate the innermost loop. The use of continue statement inside the loop, after the continue statement will be executed.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 25.
Write a detail note on for loop.
Answer:
For loop is entry check loop and most comfortable loop.
The condition is checked in the beginning and the body of the loop is executed if it is only true otherwise the loop is not executed.
The syntax is
for counter-variable in sequence:
statement – block 1
else
statement – block 2

But usually python, for loop uses the range ( ) function in the sequence to specify the initial, final and increment values.
range ( ) function generates a list of values starting from start till stop-1
The syntax of range () is range (start, stop, [step])
Where
Start- refers to the initial value
Stop- refers to the final value
Step- refers to the increment value, this is optional part.
Eg:
range (1, 30, 1), when this statement is executed will start the range of values from 1 and end at 29.
range (2, 30, 2), when this statement is executed will start the range of values from 2 and end at 28.
Example for segment as for i in range (2,10, 2):
print (i, end=ll)
The output will be printed as 2 4 6 8.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 26.
Write a detail note on if..else..elif statement with suitable example.
Answer:
if…else statement:
The if…else statement provides control to check the true block as well as the false block.
The syntax is
if <condition>:
Statement-block 1
else
Statement-block 2

If….else statement thus provides two possibilities and the condition determines which block is to be executed.
Eg:
# example program to check odd or even
a = int (input (“Type the number”))
if a%2 = = 0:
print (a, “is an even number”)
else:
print (a, “is an odd number”)
elif statement combines if.. .else –
if…else statements to one if…elif.. .else.
elif can be considered to be abbreviation of else if.
In an if statement there is no limit of elif clause that can be used, but an else clause if used should be placed at the end.
Eg:
m1 = int (input (“Type the first mark”))
m2 = int (input (“Type the second mark”))
avg = (m1+m2)/2
if Avg> =80
print (“Grade A”)
elif avg>=70 and avg< 80
print (“Grade B”)

Question 27.
Write a program to display all 3 digit odd numbers.
Answer:
# To display all 3 digit odd numbers.
L = int (input (“Type the 3 digit starting number”))
U = int (input (“Type the 3 digit ending number”))
For i in range (L, U+l):
If (i %2 !=0):
print (i)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 28.
Write a program to display multiplication table for a given number.
Answer:
# Program to display multiplication table
t= int (input (“Type the table number”))
n= int (input (“Type the steps”))
print (“multiplication Table of’, t)
for i in range (1, b):
print (t, “X”, i, “=”, t*i)

Hands On Experience (TB. P.No. 86):

Question 1.
Write a program to check whether the given character is a vowel or not.
Answer:
# python program to check whether the given character is a vowel or not
ch = input (“ Enter a character”)
if (ch==‘A’ or ch==‘a’ or ch==‘E’ or ch==‘e’ or ch==T or ch==‘i’ or ch==‘O’ or ch==‘o’ or ch==‘U’ or ch==‘u’):
print (ch, “is a vowel”)
else:
print (ch, “is not a vowel”)

Question 2.
Using if..else..elif statement check smallest of three numbers.
Answer:
# Program for check smallest of three numbers.
n1, n2, n3 = map (int, input (“Enter the three numbers”).split (“ ”))
if (n1<n2 and n1< n3):
print (“{ } is smallest, format (nl))
elif (n2< n3):
print (“{ } is smallest, format (n2))
else:
Print (“{ } is smallest, format (n3))

Question 3.
Write a program to check if a number is Positive, Negative or zero.
Answer:
# Program to check if a number is positive, negative or zero.
n = float (input (“Type a number”))
if n > 0:
Print (“Positive number”)
elif n==0:
print (“zero”)
else
print (“ Negative number”)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 4.
Write a program to display Fibonacci series 0 1 12 3 4 5 (upto n terms).
Answer:
# Program to display Fibonacci series
nterms = int (input (“Type How many terms”)
n1 = 0
n2 = 1
count =0
if nterms < =0:
Print (“please type the positive number”)
elif nterms==1:
print (“Fibonacci sequence upto n terms”)
print (n1)
while count < nterms:
print (n1, end =‘,’)
nth = n1+n2
n1=n2
n2=nth
count+=1

Question 5.
Write a program to display sum of natural numbers, upto n.
Answer:
# program to display sum of natural numbers,
n = int (input (“Type the n number”))
s=0
while (n>0):
s +=n
n-= 1
print (“ The sum is”, s)

Question 6.
Write a program to check if the given number is a palindrome or not.
Answer:
# program for given number is a palindrome or not
n = int (input (“Type the number”))
temp = n
rev = 0
while (n>0):
dig=n% 10
rev = rev* 10 + dig
n=n//10
if (tern == rev):
print (“The number is a palindrome”)
else:
print (“The number is not a palindromes”)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 7.
Write a program to print the following pattern
* * * * *
* * * *
* * *
* *
*
Answer:
# program to print the half pyramid pattern,
r = input (“Type number of rows”)
r = int (r)
for i in range (r, o, -1):
for j in range (o., i+1):
print (“*”, end=‘ ’)
print (‘\r’)

Question 8.
Write a program to check if the year is leap year or not.
Answer:
# program to check if the year is leap years or not
y= int (input (“Type, year to be checked”))
if (y%4 ~0 and y% 100 ! = 0 or y%400 =0):
print (“The year is a leap year”)
else:
print (“The year is not a leap year”).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Choose the best answer:

Question 1.
Which statement allows to execute group of statements multiple times?
(a) loop
(b) continue
(c) print
(d) input
Answer:
(a) loop

Question 2.
Which statement is an entry check loop in python?
(a) while
(b) for
(c) do…while
(d) if…elif
Answer:
(a) while

Question 3.
Which statement is a null statement in python?
(a) break
(b) contime
(c) pass
(d) end
Answer:
(c) pass

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 4.
Match the following:

(i) for (A) branching statement
(ii) while (B) null statement
(iii) if… else (C) looping statement
(iv) pass (D) entry check loop

(a) (i) – C, (ii) – D, (iii) – A, (iv) – B
(b) (i) – C, (ii) – A, (iii) – B, (iv) – D
(c) (i) – B, (ii) – C, (iii) – A, (iv) – D
(d) (i) – B, (ii) – D, (iii) – A, (iv) – C
Answer:
(a) (i) – C, (ii) – D, (iii) – A, (iv) – B

Question 5.
Choose the incorrect pair:
(a) program – set of statements
(b) loop – multiple times
(c) continue – jump statement
(d) pass – skipped statement
Answer:
(d) pass – skipped statement

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 6.
Choose the incorrect statement:
(a) A sequential statement is composed statements.
(b) Simple if is the all decision making statements.
(c) A loop allows to execute the statement one by one.
(d) For loop is the most comfortable loop.
Answer:
(c) A loop allows to execute the statement one by one.

Question 7.
Pick the odd one out:
(a) for
(b) while
(c) pass
(d) if…else
Answer:
(c) pass

Question 8.
Assertion (A):
A sequential statement is composed of a sequence of statement which are executed one after another.
Reason (R):
A code to print your name, address and phone number is an example of sequential statement.
(a) Both A and R are true, And R is the correct explanation for A.
(b) Both A and R are true, But R is not the correct explanation for A
(c) A is true but R is false.
(d) Both A and R are false.
Answer:
(a) Both A and R are true, And R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 9.
Choose the correct pair:
(a) Branching – Alternative
(b) Sequencing – Jumping
(c) Iteration – Sequencing
(d) Indentation – Nested
Answer:
(a) Branching – Alternative

Question 10.
Choose the correct statement.
(a) Pass statement in python programming is a control statement.
(b) Pass statement when executed by the interpreter it is completely ignored.
(c) Pass statement is generally used as a stop the execution.
(d) Pass statement can be used at the top of the program.
Answer:
(b) Pass statement when executed by the interpreter it is completely ignored.

Question 11.
Which of the following is not a type of branching statement?
(a) while
(b) if
(c) if-else
(d) if-elif
Answer:
(a) while

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 12.
for i in range (0, 10, 2), print (I). The output is:
(a) 1, 3, 5, 7, 9
(b) 0, 2, 4, 6, 8
(c) 2, 4, 6, 8, 10
(d) 0, 1, 2, 3, 4, 5, 6, 7, 8, 9
Answer:
(b) 0, 2, 4, 6, 8

Question 13.
Which of the following is not a nested loop?
(a) Jump
(b) while
(b) for within if
(d) pass
Answer:
(d) pass

Question 14.
Which statement is used to skip the remaining part of a loop and start with next iteration?
(a) continue
(b) break
(c) pass
(d) goto
Answer:
(a) continue

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 15.
The program statements which are executed one after another is called:
(a) Sequential
(b) Looping
(c) Branching
(d) Iterative
Answer:
(a) Sequential

Question 16.
The program statements executed for multiple times are called:
(a) Sequential
(b) Looping
(c) Branching
(d) Iterative
Answer:
(b) Looping

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 17.
Which of the following optional part of while statement?
(a) if
(b) elif
(c) else
(d) if-else
Answer:
(c) else

Question 18.
How many important control structures are there in Python?
(a) 3
(b) 4
(c) 5
(d) 6
Answer:
(a) 3

Question 19.
elif can be considered to be abbreviation of
(a) nested if
(b) if.else
(c) else if
(d) if..elif
Answer:
(c) else if

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 20.
What plays a vital role in Python programming?
(a) Statements
(b) Control
(c) Structure
(d) Indentation
Answer:
(d) Indentation

Question 21.
Which statement is generally used as a placeholder?
(a) continue
(b) break
(c) pass
(d) goto
Answer:
(c) pass

Question 22.
The condition in the if statement should be in the form of
(a) Arithmetic or Relational expression
(b) Arithmetic or Logical expression
(c) Relational or Logical expression
(d) Arithmetic
Answer:
(c) Relational or Logical expression

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 23.
Which is the most comfortable loop?
(a) do..while
(b) while
(c) for
(d) if..elif
Answer:
(c) for

Question 24.
What is the output of the following snippet?
i=1
while True:
if i%3 ==0:
break
print <i,end=’ ‘)
i +=1
(a) 12
(b) 123
(c) 1234
(d) 124
Answer:
(a) 12

Question 25.
What is the output of the following snippet?
T=1
while T:
print(True)
break
(a) False
(b) True
(c) 0
(d) no output
Answer:
(b) True

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 6 Control Structures

Question 26.
Which amongst this is not a jump statement ?
(a) for
(b) goto
(c) continue
(d) break
Answer:
(a) for

Question 27.
Which punctuation should be used in the blank?
if <condition>_
statements-block 1,
else:
statements-block 2
(a) ;
(b) :
(c) ::
(d) !
Answer:
(b) :

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 1.
Write the some examples of Data structures.
Answer:
Examples for data structures are arrays, structures, list, tuples, dictionary etc.

Question 2.
Write any four an algorithm characteristics.
Answer:
Any four an algorithm characteristics are Input, Output, Finiteness, Definiteness.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 3.
Write the Analysis of algorithms.
Answer:
Analysis of algorithms can be divided into two different phrases.

  1. A prior estimates – This is a theoretical performance analysis of an algorithm.
  2. A posteriori testing- This is a performance measurement analysis of an algorithm.

Question 4.
What are the two components of space complexity?
Answer:
The two components of space complexity are

  1. A Fixed part-is defined as the total space required to store certain data and variables for an algorithm, Eg:variables.
  2. A variable part-is defined as the total space required by variable, which sizes depends on the problem and its iteration.
    Eg: Recursion.

Question 5.
What is space-time trade off?
Answer:

  1. A space – time or time-memory trade off is a way of solving in less time by using more storage space.
  2. By solving a given algorithm in very little space by spending more time.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 6.
What is the advantage for space / time Tradeoff?
Answer:

  1. Time/space trade off can reduce the use of memory at the cost of slower program execution.
  2. To reduce the running time at the cost of increased memory usage.

Question 7.
What is a insertion sort?
Answer:
Insertion sort is a simple sorting algorithm. It works by taking elements from the list one by one and inserting then in their correct position in to a new sorted list.

Question 8.
What is mean by memorization?
Answer:
Memorization is an optimization technique used primarily to speed up computer programs by sorting the results of expensive function calls and returning the cached result when the same inputs occur again.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 9.
What is algorithmic strategy? Explain with example.
Answer:

  1. The way of defining an algorithm is called algorithmic strategy.
  2. For example to calculate factorial for the given value n.
  3. To calculate factorial for the iteration then it can be called recursively until the number of required iteration is reached.

Question 10.
Write the algorithm for preparing coffee?
Answer:
Step 1: Take a bowl with coffee powder.
Step 2: Boil the water and pour it into the bowl.
Step 3: Filter it.
Step 4: Boil Milk.
Step 5: Mix sugar and filtered coffee along with boiled milk.
Step 6: Pour the coffee into the cup to serve.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 11.
Write an algorithm to find square of this given number.
Answer:
Step 1: Start
Step 2: Get the input X
Step 3: Calculate the square by x*x
Step 4: Display the result
Step 5: Stop

Question 12.
What are the factors depends the time efficiency of an algorithm?
Answer:

  1. Speed of the machine
  2. Compiler and other system software tools
  3. Operating system
  4. Programming language used
  5. Volume of data required.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 13.
Write the steps to do Dynamic programming.
Answer:

  1. The given problem will be divided into smaller overlapping sub-problems.
  2. An optimum solution for the given problem can be achieved by using result of smaller sub-problem.
  3. Dynamic algorithms uses memorization.

Question 14.
What are the differences have algorithm and program?
Answer:

Algorithm Program
Algorithm helps to solve a given problem logically. Program is an expression of algorithm in a programming language.
Algorithm based on their implementation method, design techniques etc. It is object oriental programming approach.
There is no specific rules for algorithm writing. Program should be written for the selected language with specific syntax.
Algorithm resembles a pseudo code. Program is more specific to a programming language.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 15.
Explain Best, Worst and Average case efficiency of an algorithm.
Answer:
(i) Assume that a list of n number of values stored in an array sequentially.
(ii) The Best case would be if the first element in the list matches with the key element to be searched in a list of elements.
(iii) The efficiency in that case would be expressed as 0(1) because only one comparison is enough.
(iv) The Worst case is, if the complete list is searched and element is found only at the end of the list or not found.
(v) The efficiency of an algorithm in that case would be expressed as 0(n).
(vi) The Average case of an algorithm can be obtained by finding the average number of comparisons.
(vii) The average number of comparisons = (n + 1)/2 Hence the average case efficiency will be expressed as 0(n).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 16.
Explain the selection sort with example.
Answer:

  1. The selection sort is a simple, sorting algorithm that improves on the performance of bubble sort by making only one exchange for every pass through the list.
  2. This algorithm will first find the smallest elements in array and swap it with element in the first position of an array.
  3. Then it will find the second smallest element and swap that element with the element in the second position.
  4. And it will continue until the entire array is sorted in respective order.
  5. For example an array with values {13,16, 11,18,14,15} this algorithm repeatedly select the first element and next smallest element and swaps into the right place for every pass.
  6. Finally we will get the sorted array end of the pass.

Question 17.
Explain the insertion sort with example.
Answer:

  1. Insertion sort is a simple sorting algorithm.
  2. It works by taking element from the list one by one and inserting then in their correct position in to a new sorted list.
  3. The algorithm builds the final sorted array at the end.
  4. For example, compare with all elements in the sorted sub-list.
  5. Shift all the elements in the sorted sub – list that is greater than the value to be sorted.
  6. At the end of the pass the insertion sort algorithm gives the sorted output in ascending order.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 18.
Write the steps of Fibonacci iterative algorithm with Dynamic programming approach.
Answer:
Step 1: Initialize F0 = 0, f1 = 1,
Step 2: print the initial value of Fibonacci f0 and f1.
Step 3: Calculate fib = f0 + f1
Step 4: Assign fo = F1, f1 =f1 b
Step 5: Go to step-2 and repeat until the specified number of terms generated.
Step 6: print the value of Fibonacci terms.

Question 19.
What is an Algorithm?
Answer:

  • An algorithm is a finite set of instructions to accomplish a particular task.
  • It is a step-by-step procedure for solving a given problem.

Question 20.
Define Pseudo code.
Answer:
Pseudo code is a simpler version of a programming code in plain Bhglish which uses- short phrases to write code for a program before it is implemented in a specific programming language.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 21.
Who is an Algorist?
Answer:
One who practices algorism is known as an algorist. An Algorist is a Persian author, Abu Jafar Mohammed ibn Musa al Khowarizmi, who wrote a textbook on Mathematics.

Question 22.
What is Sorting?
Answer:

  • Sorting is nothing but arranging the data in ascending or descending order.
  • Sorting arranges data in a sequence which makes searching easier.

Question 23.
What is searching? Write its types.
Answer:

  1. Searching is a process of locating a particular element present in a given set of elements.
  2. The element may be a record, a table, or a file. Searching types are Linear search, Binary search, Jump search, Interpolation search, Exponential search, Fibonacci search etc..

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 24.
List the characteristics of an algorithm.
Answer:
The characteristics of an algorithm are:

  1. Input
  2. Output
  3. Finiteness
  4. Definiteness
  5. Effectiveness
  6. Correctness
  7. Simplicity
  8. Unambiguous
  9. Feasibility
  10. Portable

Question 25.
Discuss about Algorithmic complexity and its types.
Answer:

  1. f(n) is the complexity to an algorithm, it gives the running time and / or storage space required but the algorithm in terms of n as the size of input data.
  2. Time complexity and space complexity are two types of algorithmic complexity.
  3. Space complexity has two components, are a fixed part and variable part.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 26.
What are the factors that influence time and space complexity?
Answer:
Time Factor and Space Factor are that influence time and space complexity.
Time Factor: Time is measured by counting the number of key operations like comparisons in the sorting algorithm.
Space Factor: Space is measured by the maximum memory space required by the algorithm.

Question 27.
Write a note on Asymptotic notation.
Answer:
Asymptotic notations are languages that uses meaningful statements about time and space complexity. They are 3 types.

  1. Big O – is used to describe the worst case of an algorithm.
  2. Big Ω (omega) – is used to describe the lower bound that is best case.
  3. Big TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies 1 – When an algorithm has complexity which lower bound – upper bound, say that an algorithm has complexity.

Question 28.
What do you understand by Dynamic programming?
Answer:

  1. Dynamic programming is an algorithmic design method that can be used when the solution to a problem can be viewed as the result of a sequence of decisions.
  2. Dynamic programming approach is similar to divide and conquer.
  3. Dynamic programming is used whenever problems can be divided into similar sub problems. So that their results can be reused to complete the process.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 29.
Explain the characteristics of an algorithm
Answer:
The Characteristics of an algorithm are:

  1. Input: Zero or more quantities to be supplied.
  2. Output: At least one quantity is produced.
  3. Finiteness: Algorithms must terminate after finite number of steps.
  4. Definiteness: All operations should be well defined.
  5. Effectiveness: Every instruction must be carried out effectively.
  6. Simplicity, unambiguous, feasibility, portable and independent are other important algorithm characteristics.

Question 30.
Discuss about Linear search algorithm.
Answer:

  1. Linear search algorithm is a method of technique to find a particular value in a list.
  2. Linear search also called sequential search.
  3. Sequential method checks the search element in sequential order until the desired element is found.
  4. Linear searching algorithm, list need not be ordered.
  5. Eg:
    Input: values [ ] = {5,34, 65,12,77,35} target =12 output: 3
    In this example number 12 is found at index number 3.
    To search the number 12 in the array of 4th place at index number 3 .

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 31.
What is Binary search? Discuss with example.
Answer:

  1. (i) Binary search also called half-interval search algorithm.
  2. It finds the position of a search element within a sorted array.
  3. The binary search algorithm can be done as divide-and-conquer search algorithm and executes in algorithmic time.
  4. We use binary search, First find index of middle element of the array by using this formula mid = low + (high – low) /2 and compare the search element. If it is not found that element, using this formula again.
  5. The search element still not found, hence, we calculated the mid again by using the formula.
    high. = mid – 1
    mid = low + (high – low)/2

Question 32.
Explain the Bubble sort algorithm with example.
Answer:

  1. Bubble sort algorithm is simple sorting algorithm.
  2. This type of algorithm starts at the begining of the list of values stored in an array. W
  3. It compares each pair of adjacent elements and swaps them if they are in the unsorted order.
  4. This comparison and passed to be continued until no swaps are needed, which indicates that the list of values stored in an array is sorted.
  5. This type is too slow and less efficient when compared to other sorting methods.
  6. For example an array values {15, 11, 16, 12, 14, 13} using Bubble sort will sort the values. The swap function swaps the values of the given array elements.
  7. At the end of all the iteration we will get the sorted values as
    TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies 2

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 33.
Explain the concept of Dynamic programming with suitable example.
Answer:

  1. Dynamic programming is an algorithmic design method that can be used when the solution to a problem can be viewed as the result of a sequence of decisions.
  2. Dynamic programming approach is similar to divide and conquer.
  3. Dynamic programming is used whenever problems can be divided into similar sub-problems. So that, their results can be re-used to complete the process.
  4. the subsequent number by adding two previous numbers FibO and Fib 1.
  5. Then Fib<sub>n</sub> = Fib<sub>n – 1</sub> + Fib<sub>n – 2</sub> Hence, a Fibonacci series for the n values of can look like this Fib<sub>8</sub> = 0 1 1 2 3 5 8 1 3
  6. Input, output, Finiteness, Definiteness, Effectiveness, correctness, simplicity, unambiguous, Feasibility, portable and independent.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Choose the best answer:

Question 1.
Which one is maintained and manipulated effectively through data structures?
(a) Data
(b) File
(c) Recorde
(d) List
Answer:
(a) Data

Question 2.
Which can be developed to store, manipulate and retrieve data from such data structures?
(a) File
(b) Algorithm
(c) Sorting
(d) Searching
Answer:
(b) Algorithm

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 3.
Match the following:

(i) Finiteness (A) Well defined
(ii) Definiteness (B) Must terminate
(iii) Effectiveness (C) Clear
(iv) Unambiguous (D) Error Free

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C
(c) (i) – C, (ii) – D, (iii) – B, (iv) – A
(d) (i) – C, (ii) – B, (iii) – A, (iv) – D
Answer:
(b) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 4.
Match the following:

(i) Big O (A) Best case
(ii) Big Ω (omega) (B) Key operation
(iii) Time (C) Memory space
(iv) Space (D) Worst case

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – D, (ii) – C, (iii) – B, (iv) – A
(c) (i) – C, (ii) – B, (iii) – A, (iv) – D
(d) (i) – C, (ii) – A, (iii) – D, (iv) – B
Answer:
(a) (i) – D, (ii) – A, (iii) – B, (iv) – C

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 5.
Match the following:

(i) Linear (A) Comparison
(ii) Binary (B) Exchange
(iii) Bubble (C) half – interval
(iv) Selection (D) Sequential

(a) (i) – D, (ii) – A, (iii) – B, (iv) – C
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B
(d) (i) – B, (ii) – D, (iii) – A, (iv) – C
Answer:
(c) (i) – D, (ii) – C, (iii) – A, (iv) – B

Question 6.
Choose the incorrect pair:
(a) Search – Linear
(b) Sort – Order
(c) insert – Update
(d) Delete – Remove
Answer:
(c) insert – Update

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 7.
Choose the incorrect pair:
(a) Finiteness – Terminate
(b) Definiteness – Defined
(c) Effectiveness – Carried
(d) Correctness – Unambiguous
Answer:
(d) Correctness – Unambiguous

Question 8.
Choose the incorrect pair:
(a) A priori estimates – Theoretical
(b) A posteri testing – Measurement
(c) Time factor – Key operation
(d) Space factor – Instructions
Answer:
(d) Space factor – Instructions

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 9.
Choose the correct pair:
(a) Space complexity – Size of input
(b) A fixed part – Performance
(c) A variable part – Recursion
(d) Time complexity – Variables
Answer:
(c) A variable part – Recursion

Question 10.
Choose the correct pair:
(a) 0 (1) – Worst case
(b) 0 (n) – Best case
(c) 0 (n+1) – Best and Worst case
(d) Big Question (omega) – Best case
Answer:
(d) Big Question (omega) – Best case

Question 11.
Choose the incorrect statement:
(a) Binary search also called half-interval search algorithm.
(b) The binary search algorithm can be done as divide-and-conquer.
(c) Linear search also called Random search
(d) List of elements in an array must be sorted first for Binary search.
Answer:
(c) Linear search also called Random search

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 12.
Choose the incorrect statement:
(a) Bubble sort is a simple sorting algorithm.
(b) Insertion sort is a update sorting.
(c) The selection sort is that improves on the performance of bubble sort.
(d) Insertion sort works by taking elements from the list one by one.
Answer:
(b) Insertion sort is a update sorting.

Question 13.
Choose the incorrect statement:
(i) Dynamic programming is an algorithmic design method.
(ii) Dynamic programming approach is similar to the selection sort.
(ii) Dynamic algorithms uses memorization.
(iv) Dynamic algorithms will try to check the results of solved problems.
(a) (i) and (ii)
(b) (ii) and (iii)
(c) (iii) and (iv)
(d) (iv) and (ii)
Answer:
(a) (i) and (ii)

Question 14.
Choose the correct statement:
(a) Two main measures for the efficiency of an algorithm are Time and Space.
(b) Search is the way of defining algorithm.
(c) There is a specific rules for algorithm writing.
(d) Algorithm is not to be solve any problem logically.
Answer:
(a) Two main measures for the efficiency of an algorithm are Time and Space.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 15.
Choose the correct statement:
(a) Program is a group of files.
(b) Algorithm can be implemented by operating system.
(c) Program should be written for any language.
(d) Program is more specific to a programming language.
Answer:
(d) Program is more specific to a programming language.

Question 16.
Assertion (A):
An algorithm is a finite set of instructions.
Reason (R):
An algorithm can be implemented in any suitable programming language
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(a) Both A and R are correct and R is the correct explanation for

Question 17.
Assertion (A):
Computer resources are limited that should be utilized efficiently.
Reason (R):
The efficiency of an algorithm can be measured based on computer type.
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(b) A is True, But R is False.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 18.
Assertion (A):
The Time efficiency of an algorithm is measured by same factors.
Reason (R):
The efficiency of an algorithm depends on time and memory space.
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(c) A is False, But R is True.

Question 19.
Assertion (A):
Big O is often used to describe the best case of an algorithm.
Reason (R):
Big omega is used to describe the worst case of an algorithm.
(a) Both A and R are correct and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(d) Both A and R are False.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 20.
Assertion (A):
Dynamic programming approach is similar to divide and conquer.
Reason (R):
The given problem is divided into smaller and yet smaller possible sub¬problems.
(a) Both A and R are correct, and R is the correct explanation for A.
(b) A is True, But R is False.
(c) A is False, But R is True.
(d) Both A and R are False.
Answer:
(a) Both A and R are correct, and R is the correct explanation for A.

Question 21.
Pick the odd one out:
(a) Array
(b) Structure
(c) List
(d) Algorithm
Answer:
(d) Algorithm

Question 22.
Pick the odd one out:
(a) Search
(b) Sort
(c) Syntax
(d) Update
Answer:
(c) Syntax

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 23.
Pick the odd one out:
(a) Simplicity
(b) Flowchart
(c) Feasibility
(d) Portable
Answer:
(b) Flowchart

Question 24.
Pick the odd one out:
(a) Time
(b) Space
(c) Efficiency
(d) Program
Answer:
(d) Program

Question 25.
Pick the odd one out:
(a) Binary
(b) Bubble
(c) Selection
(d) Insertion
Answer:
(a) Binary

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 26.
Which of the following is a sorting technique?
(a) Quick
(b) Bubble
(c) Insertion
(d) All the above
Answer:
(d) All the above

Question 27.
Which of the following is a finite set of instructions to accomplish a particular task?
(a) Algorithm
(b) Flow chart
(c) Pseudo code
(d) Program
Answer:
(a) Algorithm

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 28.
Which is called, the way of defining an algorithm?
(a) Algorithmic strategy
(b) Program strategy
(c) Running program strategy
(d) Compiling strategy
Answer:
(a) Algorithmic strategy

Question 29.
How many asymptotic notations are mostly used to represent time complexity of algorithms?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 30.
Which of the following is to describe the worst-case algorithm?
(a) Big O
(b) Big α
(c) Big Ω
(d) Big β
Answer:
(a) Big O

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 31.
Which of the following is reverse of Big O?
(a) Big O
(b) Big α
(c) Big Ω
(d) Big β
Answer:
(c) Big Ω

Question 32.
Linear search also called:
(a) Sequential search
(b) Binary search
(c) Quick search
(d) Selection search
Answer:
(a) Sequential search

Question 33.
Binary search also called:
(a) Sequential search
(b) Quick search
(c) Half-interval search
(d) Linear search
Answer:
(c) Half-interval search

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 34.
Bubble sort is also called:
(a) Sequential search
(b) Quick search
(c) Comparison soft
(d) Binary sort
Answer:
(c) Comparison soft

Question 35.
Which of the following algorithm used memorization?
(a) Static
(b) Dynamic
(c) Modular
(d) Object
Answer:
(b) Dynamic

Question 36.
The word comes from the name of a Persian mathematician Abu Ja’far Mohammed ibn-i Musa al Khowarizmi is called?
(a) Flowchart
(b) Flow
(c) Algorithm
(d) Syntax
Answer:
(c) Algorithm

Question 37.
From the following sorting algorithms which algorithm needs the minimum number of swaps?
(a) Bubble sort
(b) Quick sort
(c) Merge sort
(d) Selection sort
Answer:
(d) Selection sort

Question 38.
Two main measures for the efficiency of an algorithm are:
(a) Processor and memory
(b) Complexity and capacity
(c) Time and space
(d) Data and space
Answer:
(c) Time and space

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 39.
The complexity of linear search algorithm is:
(a) O(n)
(b) O(logn)
(c) O(n2)
(d) O(n log n)
Answer:
(d) O(n log n)

Question 40.
From the following sorting algorithms which has the lowest worst case complexity?
(a) Bubble sort
(b) Quick sort
(c) Merge sort
(d) Selection sort
Answer:
(a) Bubble sort

Question 41.
Which of the following is not a stable sorting algorithm?
(a) Insertion sort
(b) Selection sort
(c) Bubble sort
(d) Merge sort
Answer:
(d) Merge sort

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 42.
Time complexity of bubble sort in best case is:
(a) θ (n)
(b) θ (nlogn)
(c) θ (n2)
(d) θ (n(logn) 2)
Answer:
(b) θ (nlogn)

Question 43.
The 0 notation in asymptotic evaluation represents
(a) Base case
(b) Average case
(c) Worst case
(d) NULL case
Answer:
(c) Worst case

Question 44.
If a problem can be broken into subproblems which are reused several times, the problem possesses which property?
(a) Overlapping subproblems
(b) Optimal substructure
(c) Memoization
(d) Greedy
Answer:
(b) Optimal substructure

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 4 Algorithmic Strategies

Question 45.
In dynamic programming, the technique of
storing the previously calculated values is called ?
(a) Saving value property
(b) Storing value property
(c) Memoization
(d) Mapping
Answer:
(c) Memoization

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 1.
Write the short notes on Python IDLE.
Answer:

  1. The python IDLE (Integrated Development Learning Environment) is used to develop and run python code.
  2. IDLE is working in interactive mode, so python code can be directly typed and the displays the results immediately.

Question 2.
Write the short note on script mode programming.
Answer:

  1. Python script is a text file containing its statements.
  2. Python scripts are reusable code.
  3. Once the script is created, it can be executed again and again.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 3.
Rewrite the following identifiers are valid or invalid.
(i) TOTAL
(ii) 50 students
(iii) student#
(iv) SALARY
(v) GRANDTOTAL
(vi) Break
Answer:

Valid Identifiers:
(i) TOTAL,
(iv) SALARY,
(v) GRANDTOTAL

Invalid Identifiers:
(ii) 50 students,
(iii) student#,
(vi) Break

Question 4.
What is the keywords?
Answer:
Keywords are special words used by python interpreter to recognize the structure of program.
They cannot be used for any other purpose.
Eg:break, while, class etc..

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 5.
Write the python fundamental data types.
Answer:
Python has Built-in or fundamental data types such as Numbers, String, Boolean, Tuples, Lists and Dictionaries.

Question 6.
What is a number Data type?
Answer:
The built-in number objects in python supports integers, floating point numbers and complex numbers.,
Eg: 100, 2056, 78656
256.75, 2008.06

Question 7.
What is a Boolean Data type?
Answer:
Boolean means Tme or False. A Boolean data can have any of the two values, True or False.
Eg: Bool _ var 1 = True
Bool _ var 2 = False.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 8.
What is a string data type?
Answer:
String data can be enclosed with single quote or double quote or triple quote.
Eg: String data = “computer Science”

Question 9.
What is a conditional operator?
Answer:
Ternary operator is also known as conditional operator that evaluates something based on a condition being true or false.

It simply allows, testing a condition in a single line replacing the multiline of if-else making the code.

Question 10.
Write the key features of python.
Answer:

  1. Python is a general purpose programming language which can be used for both scientific and non-scientific programming.
  2. Python platform is a independent programming language.
  3. Python programs are easily readable and understandable.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 11.
Write the comments in python.
Answer:

  1. In Python, comments begin with hash symbol (#). ,
  2. The lines that begins with # are considered as comments.
  3. Python comments may be single line or multilines.
  4. The multiline comments should be enclosed within a set of #.

Question 12.
What is Indentation?
Answer:

  1. Python uses whitespace such as spaces and tabs to define program blocks.
  2. The number of whitespaces (spaces and tabs) in the indentation is not fixed.
  3. But all statements within the block must be indented with same amount of spaces.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 13.
Define:
(a) Operators
(b) Operands.
Answer:
(a) Operators:
Operators are special symbols which represent computations, conditional matching etc.

(b) Operands :
Value and variables when used with operator are known as operands.

Question 14.
What are the logical operators are used in python?
Answer:
There are three logical operators they are AND, OR and NOT.
Logical operators are used to perform logical operations on the given relational expressions.
Eg: (i) >>> x > y or x = = y
(ii) >>> x > y and x = = y
(iii) >>> not x > y

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 15.
Write a program using Relational operators.
Answer:
# Program using Relational operators
x = int (input (“Type the value for X :”))
y = int (input (“type the value for Y:”))
print (“X=”,x, “and Y=”,y)
print (“The x = = y=”, x = = y)
print (“The x > y=”, x > y)
print (“The x < y=”, x < y)
print (“The x >= y=”, x >= y)
print (“The x <= y=”, x <= 0)
print (“The x !- y – ”, x !- y)

Question 16.
Write a python program using different assignment operators.
Answer:
# Program for using Assignment operators
X = int (input (“Type a value for X :”))
print (“X=”,x)
print (“The x += 20 is =”, x += 20
print (“The x- = 5 is =”, x- = 5)
print (“the x *= 5 is x *- 5)
print (“the x /= 2 is x/=2)
print (“The x %- 3 is x %= 3)
print (“The x **= 2 is =”, x **= 2)
print (“The x //—3 is=”,x//=3)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 17.
What are the rules should follow while writing Identifier with example?
Answer:
(i) An identifier must start with an alphabet (A..Z or a..z) or underscore (_).
(ii) Identifiers may contain digits (0.. 9)
(iii) Python identifiers are case sensitive i.e., uppercase and lowercase letters are distinct.
(iv) Identifiers must not be a python keyword.
(v) Python does not allow punctuation character such as %, $, @ etc., within identifiers.
Example of valid identifiers:
Sum, totaljnarks, regno, numl

Example of invalid identifiers:
12Name, name$, total-mark, continue

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 18.
Write any ten keywords used in python?
Answer:

  1. True
  2. false
  3. return
  4. class
  5. for
  6. if
  7. elif
  8. continue
  9. break
  10. pass

Question 19.
Write a python program to add, subtract, multiply, divide for any two number using Input statement?
Answer:
# python program to add, sub, mul, divide any two numbers.
X = int (input (“Type number 1 ”))
Y = int (input (“Type number 2”))
print (“Sum = “, x+y)
print (“Difference x-y)
print (“Quotient – “, x/y)
print (“Product = “, x*y).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 20.
What are the different modes that can be used to test Python Program?
Answer:
There are two modes that can be used to test python program.

  • Interactive mode – using python IDLE window.
  • Script mode – using python Shell window.

Question 21.
Write short notes on Tokens.
Answer:

  1. Python breaks each logical line into a sequence of elementary lexical components known as Tokens.
  2. The normal Token types are Identifiers, keywords, operators, Delimiters and literals.

Question 22.
What are the different operators that can be used in Python?
Answer:
The different operators that can be used in python are Arithmetic, Relational, logical, Assignment and conditional.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 23.
What is a literal? Explain the types of literals.
Answer:
Literal is a raw data given in a variable or constant. In python, there are various types of Literals. –

  1. Numeric
  2. String and
  3. Boolean.

Question 24.
Write short notes on Exponent data.
Answer:
An Exponent data contains decimal digit part, decimal point, exponent part followed by one or more digits.
Eg: 12.E04,41.e04

Question 25.
Write short notes on Arithmetic operators with examples.
Answer:

  1. An arithmetic operator is a mathematical operator that takes two operands and performs a calculation on them.
  2. They are used for simple arithmetic calculations.
  3. Python supports the arithmetic operators are +, -, *, /, %, (modules), ** (Exponent) and // (Floor Division).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 26.
What are the assignment operators that can be used in Python?
Answer:

  1. = (equal to) is the python simple assignment operator to assign values to variable.
  2. Let a, b=5, 10 assign the value 5 and 10 on the right to the variables a and b respectively.
  3. There are various compound operators in python like +=, – =, *=, /=, %=, **= and = are also available.

Question 27.
Explain Ternary operator with examples.
Answer:
(i) Ternary operator is also known as conditional operator that evaluates something based on a condition being true or false.
(ii) It simply allows testing a condition in a single line replacing the multiline if-else making the code.
(iii) The syntax is
Variable Name = [on-true] if [Text expression] else [on-false].
Eg:
min = 100 if 99 <100 else # min =100
min = 100 if 99 >100 else # min =150

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 28.
Write short notes on Escape sequences with examples.
Answer:
(i) “/” (back slash) is a special character called the escape character in python strings.
(ii) It is used in representing certain whitespace characters are “\t” is a tab, “\n” is a newline, and “\r” is a carriage return.
Eg:
>>> print (“DonVt”)
>>> print (“python”, “\n”, “Language”)
The output will be printed as
Don’t
Python
Language

Question 29.
What are string literals? Explain.
Answer:
(i) Python supports single, double and triple quotes for a string.
(ii) A character literal is a single character surrounded by single or double quotes.
(iii) The value with triple-quote “‘ “‘ is used to give multiline string literal.
Eg:
char = “A”
print (char)
C will be printed
strings = “SCHOOL”
The output is SCHOOL
multiline_str=“TWELTH STANDARD”
The output is TWELTH STANDARD.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 30.
Describe in detail the procedure Script mode programming.
Answer:

  1. Python script mode is a text file containing statements.
  2. Python scripts are reusable code. Once the script is created, it can be executed again and again without retyping.
  3. Choose File → New file or press ctrl+N in python shell window to create scripts.
  4. An untitled blank script text editor will be displayed on the screen, now type python coding.
  5. Choose File → save or press ctrl+S for saving the python typed script.
  6. Choose Run → Run module or press F5 to execute the python script.
  7. If your script has any error, for correct all error, that is free code.
  8. The output will appear in the IDLE window of python.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 31.
Explain input() and print() functions with examples.
Answer:
(i) Input ( ) function is used to accept data as input at run time in python.
(ii) The syntax is variable = input (“prompt string”)
prompt string → statement or message.
(iii) The input ( ) accept all data as string or characters but not as numbers. If a numerical value is entered, the input values converted into numeric data type.
Eg:
(1) >>> Name = input (“Enter your
name”)
(2) >>> Name = input ()
(iv) The print () function is used to display result on the screen.
(v) The syntax is print (variable)
Eg:
(1) print (“The sum=”, a)
(2) print (a)
(vi) The print () displays an entire statement which is specified within print ().
(vii) Comma (,) is used as a separator in print ( ) to print more than one item.

Question 32.
Discuss in detail about Tokens in Python.
Answer:

  1. Python breaks each logical line into a sequence of elementary lexical components known as Tokens.
  2. The normal token types are identifier, keywords, operators, Delimiters and Literals.
  3. An identifier is a name used to identify a variable, function, class, module or object.
  4. An identifier must start with an alphabet (A…Z/ a..z) or underscore (_).
  5. Identifier may contain digit (0…9), and are case sensitive.
  6. Identifiers must not be a python keyword and does not allow punctuation character such as %, $, @ etc., within identifiers.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Choose the best answer:

Question 1.
Which name is the extension file name in python language?
(a) -pi
(b) .py
(c) .bi
(d) .phi
Answer:
(b) .py

Question 2.
How many types are Numeric Literals in python?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 3.
Which is the character to support carriage return in python?
(a) “\r”
(b) “\t”
(c) “\n”
(d) “\c”
Answer:
(a) “\r”

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 4.
How many values are made up of complex number in python?
(a) 3
(b) 4
(c) 2
(d) 5
Answer:
(c) 2

Question 5.
Match the following:

(i) #(hash) (A) multiline string
(ii) {} (curly braces) (B) more item single line
(iii) , (comma) (C) blocks of code
(iv) “‘ “‘(triple – quote) (D) comments

(a) (i) – B, (ii) – C, (iii) – D, (iv) – A
(b) (i)- D, (ii) – C, (iii) – B, (iv) – A
(c) (i) – B, (ii) – D, (iii) – A, (iv) – C
(d) (i) – D, (ii) – B, (iii) – A, (iv) – C
Answer:
(b) (i)- D, (ii) – C, (iii) – B, (iv) – A

Question 6.
Match the following:

(i) “\” (back slash) (A) tab
(ii) “\t” (B) escape character
(iii) “\n” (C) carriage return
(iv) “\r” (D)  newline

(a) (i) – B, (ii) – A, (iiij – D, (iv) – C
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A
(c) (i) – C, (ii) – D, (iii) – A, (iv) – B
(d) (i) – C, (ii) – B, (iii) – A, (iv) – D
Answer:
(a) (i) – B, (ii) – A, (iiij – D, (iv) – C

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 7.
Match the following:

(i) >>> (A) Create new python program
(d) ctrl+N (B) python prompt
(iii) continue (C) conditional operator
(iv) Ternary (D) keyword

(a) (i) – C, (ii) – D, (iii) – B, (iv) – A
(b) (i) – C, (ii) – B, (iii) – A, (iv) – D
(c) (i) – B, (ii) – A, (iii) – D, (iv) – C
(d) (1)- B, (ii) – D, (iii) – C, (iv) – A
Answer:
(c) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 8.
Assertion (A):
Python is a programming language which can be used for both scientific and non-scientific programming.
Reason (R):
It has independent programming language and are easily readable and understandable.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 9.
Assertion (A):
In python, the prompt (»>) indicates that interpreter is ready to accept instructions.
Reason (R):
In python, programs can be written in two namely interactive mode and script mode.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(b) Both A and R are true, but R is not the correct explanation for A.

Question 10.
Assertion (A):
In python, comments begin with * (asterisk).
Reason (R):
The lines begins with * are * considered as comments.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) Both A and R are false.
Answer:
(d) Both A and R are false.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 11.
Assertion (A):
An identifier is a name used to identify a variable or object.
Reason (R):
Python identifier are not case sensitive.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is the not correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 12.
Assertion (A):
Complex numbers is made up of only integer values.
Reason (R):
A Boolean data can live any of the two values.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(d) A is false, but R is true.

Question 13.
Choose the incorrect pair:
(a) IDLE – Python window
(b) %- Python prompt
(c) .py * Python file extension
(d) # * Single line comment
Answer:
(b) %- Python prompt

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 14.
Choose the correct pair:
(a) Identifiers – Spaces
(b) Delimiters – Operators
(c) Literal – Variable
(d) Data types – Tab
Answer:
(c) Literal – Variable

Question 15.
Choose the incorrect statement:
(a) A text file containing the python statements.
(b) Python scripts are reusable code.
(c) Python scripts are editable.
(d) Python scripts is created, it cannot be executed.
Answer:
(d) Python scripts is created, it cannot be executed.

Question 16.
Choose the correct statement:
(a) Octal integer use O to denote octal digits.
(b) Hexadecimal integer use HX to denote Hexadecimal digits.
(c) An exponent data contains integer data.
(d) Complex number is made up of three floating point values.
Answer:
(a) Octal integer use O to denote octal digits.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 17.
Pick the odd one out:
(a) Integer
(b) String
(c) Floating
(d) Complex
Answer:
(b) String

Question 18.
Pick the odd one out:
(a) Python
(b) MS-Excel
(c) Starcalc
(d) Lotus 1-2-3
Answer:
(a) Python

Question 19.
Pick the odd one out:
(a) Identifiers
(b) Keywords
(c) Operators
(d) Prompt
Answer:
(d) Prompt

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 20.
Pick odd one out:
(a) “\t”
(b) “\n”
(c) »>
(d) ‘ V’
Answer:
(c) »>

Question 21.
Expand IDLE:
(a) Information Development Learning Environment
(b) Integrated Development Learning Environment
(c) Information Development Language Environment
(d) Integrated Development Logical Environment
Answer:
(b) Integrated Development Learning Environment

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 22.
Which python mode allows to write code in command prompt?
(a) Script mode
(b) Edit mode
(c) Program mode
(d) Interactive mode
Answer:
(d) Interactive mode

Question 23.
Which mode can be used as a simple calculator in python?
(a) Script mode
(b) Edit mode
(c) Program mode
(d) Interactive mode
Answer:
(d) Interactive mode

Question 24.
Which is indicates in python that interpreter is ready to accept instructions?
(a) »>
(b) «<
(c) »
(d) «
Answer:
(a) »>

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 25.
Who was created python Language?
(a) Guido Van Rossum
(b) John Maxwell
(c) Guido Wan Rouske
(d) Guido Maxwells
Answer:
(c) Guido Wan Rouske

Question 26.
Which of the following is not a identifier?
(a) Input
(b) City
(c) School
(d) Student
Answer:
(a) Input

Question 27.
Which of the following is not a immutable?
(a) Integer
(b) Float
(c) Complex
(d) Keyword
Answer:
(d) Keyword

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 28.
Which of the following is used as multiple line string?
(a) ‘ ‘
(b) ” ”
(c) ‘” ‘”
(d) All of these
Answer:
(c) ‘” ‘”

Question 29.
Which of the following character is used as escape character?
(a) /
(b) \
(c) $
(d) #
Answer:
(b) \

Question 30.
Which of the following statement are ignored by the python interpreter?
(a) input ( )
(b) print ( )
(c) comments
(d) write ( )
Answer:
(c) comments

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 31.
Who developed Python?
(a) Ritche
(b) Guido Van Rossum
(c) Bill Gates
(d) Sunder Pitchai
Answer:
(b) Guido Van Rossum

Question 32.
The Python prompt indicates that Interpreter is ready to accept instruction.
(a) >>>
(b) <<<
(c) #
(d) <<
Answer:
(a) >>>

Question 33.
Which of the following shortcut is used to create new Python Program ?
(a) Ctrl + C
(b) Ctrl + F
(c) Ctrl + B
(d) Ctrl + N
Answer:
(d) Ctrl + N

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 34.
Which of the following character is used to give comments in Python Program ?
(a) #
(b) &
(c) @
(d) $
Answer:
(a) #

Question 35.
This symbol is used to print more than one item on a single line:
(a) Semicolon(;)
(b) Dollor($)
(c) comma(,)
(d) Colon(:)
Answer:
(c) comma(,)

Question 36.
Which of the following is not a token ?
(a) Interpreter
(b) Identifiers
(c) Keyword
(d) Operators
Answer:
(a) Interpreter

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 37.
Which of the following is not a Keyword in Python ?
(a) break
(b) while
(c) continue
(d) operators
Answer:
(d) operators

Question 38.
Which operator is also called as Comparative operator? .
(a) Arithmetic
(b) Relational
(c) Logical
(d) Assignment
Answer:
(b) Relational

Question 39.
Which of the following is not Logical operator?
(a) and .
(b) or
(c) not
(d) Assignment
Answer:
(d) Assignment

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 5 Python -Variables and Operators

Question 40.
Which operator is also called as Conditional operator?
(a) Ternary
(b) Relational
(c) Logical
(d) Assignment
Answer:
(a) Ternary

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 3 Scoping

TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 1.
What is meant by built-in scope?
Answer:
Any variable or module which is defined in the library functions of a programming language has Built-in scope or module scope.

Normally only functions or modules come along with the software, as packages. Therefore they will come under Built-in scope.

Question 2.
What is a modular programming and write the examples?
Answer:
A program can be defined into small functional modules that work together to get the outputThe process of sub dividing a computer program into separate sub programs is called modular programming.
Eg: Procedures, Subroutines and Functions.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 3.
What is a life time variable?
Answer:
The duration for which a variable is alive is called its life time of the variable.

Question 4.
What is a Module?
Answer:
A module is a part of a program. Programs are composed of one or more independently developed modules.
Modules work perfectly on individual level and can be integrated with other modules.

Question 5.
Write the types of variable scope.
Answer:
There are four types of variable scope, they are

  1. Local scope
  2. Enclosed scope
  3. Global scope
  4. Built-in-scope

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 6.
What is the use of LEGB rule?
Answer:
The LEGB rule is used to decide the order in which the the scopes are to be searched for scope resolution.
The scopes are listed bfclow in terms of hierarchy (highest to lowest).

Question 7.
What is LEGB rule?
Answer:
LEGB rule means, scope also defines the order in which variables have to be mapped to the object in order to obtain the value.

Question 8.
What is Access control?
Answer:
Access control is a security technique that regulates who or what can view Or use resources in a computing environment. It is a fundamental concept in security that minimizes risk to the object.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 9.
Define
(a) Private Members
(b) Public Members
(c) Protected Members
Answer:
(a) Private Members:
Private members of a class are denied access from the outside the class. They can be handled only from within the class.

(b) Public Members:
Public members are accessible from , outside the class. The object of the same class is required to invoke a public method.

(c) Protected Members:
Protected Members of a class are accessible from within the class and are also available to its sub-classes.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 10.
What are the hierarchy of scopes using LEGB rule?
Answer:
Local (L) – Defined inside class
Enclosed (E) – Nested function concept
Global (G) – Defined at the uppermost level
Built-in (B) – Modules or Reserved names

Question 11.
Explain the variable scope with examples.
Answer:
(i) Scope refers to the visibility of variables, parameters and functions.
(ii) When you assign a variable with := to an instance (object), you are binding the variable to that instance. Multiple variables can be mapped to the same instance.
(iii) Eg: a:=5, b:=a
Here, a is first mapped to the integer 5. Here a is the variable name and 5 is the object.
(iv) Then, b is set equal to a, this actually means that b is now bound to the same integer value as a, which is 5.
(v) The scope of a variable is that part of the code where it is visible.
Eg:
Disp( ):
a:=7
(vi) When you try to display the value of a outside the procedure the program flags gives the error. So the life time of the variable is only till the end of the procedure.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 12.
Write a simple example using LEGB rule?
Answer:
The LEGB rule is used to decide the order in which the scopes are to be searched for scope resolution. The scopes are listed below in terms of hierarchy (highest to lowest).
1. X : =‘outer × variable’
2. display ( ):
3. X : = ‘inner × variable’
4. display ( )
When the above statements are executed the output will be printed as
outer × variable
inner × variable

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 13.
What is a scope?
Answer:
Scope refers to the visibility of variables, parameters and functions in one part of a program to another part of the same program.

Question 14.
Why scope should be used for variable? State the reason.
Answer:

  1. The scope of a variable is that part of the code where it is visible. Scope also defines the order in which variables have to be mapped to the object in order to obtain the value.
  2. Variables are addresses (references or pointers), to an object in memory.

Question 15.
What is Mapping?
Answer:
The process of binding a variable name with an object is called Mapping; = (Equal to sign) is used in programming languages to map the variable and object.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 16.
What do you mean by Namespaces?
Answer:

  • Programming languages keeps track of all these mappings with namespaces.
  • Namespaces are containers for mapping names of variables to objects.

Question 17.
How Python represents the private and protected Access specifiers?
Answer:

  1. Private members of a class are denied access from the outside class. They can be handled only from within the class.
  2. Protected members of a class are accessible from within the class and are also available to its sub-classes.

Question 18.
Define Local scope with an example.
Answer:
(i) The local scope refers to variables defined in current function.
(ii) Always a function will first look up for a variable name in its local scope.
Eg: Disp( ):
a:=10
print a
Disp( )
(iii) Here a is declared as local scope variable. And displays its value is 10.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 19.
Define Global scope with an example.
Answer:
A variable which is declared outside of all the functions in a program is called as global scope.
A global variable can be accessed inside or outside of all the functions in a program.
Eg: a:=70
Disp( )
a:=10
Print a
Disp 1( ):
Print a

Here variable a:=10 is declared inside the function, so it is known as local scope. And variable a:=70 is declared outside the function, so it is known as global scope.

Question 20.
Define Enclosed scope with an example.
Answer:
A variable which is declared inside a function which contains another function definition within it, the inner function can also access the variable of the outer function. This scope is called enclosed scope.

When a compiler or interpreter search for a variable in a programs, it first search local scope, and then search enclosing scopes.
Eg: Disp( )
a:=10
Disp 1( ):
Print a
Disp 1( ):
print a
Disp( )
Here, Disp1( ) is a member of Disp( ). So the inner function can also access the variable of the outer function.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 21.
Why access control is required?
Answer:

  1. Access control is required in object oriented programming languages.
  2. Access control is a security technique that regulates who or what can view or use resources in computing environment.
  3. In other words access control is a selective restriction of access to data.
  4. Object oriented languages control the access to class members by public, private and protected keywords.

Question 22.
Identify the scope of the variables in the following pseudo code and write its output.
Answer:
color:= Red
mycolor( ):
b:=Blue
myfavcolor( ):
g:=Green
printcolor, b, g
myfavcolor( )
printcolor, b
mycolor( )
printcolor
g – Local variable
b – Enclosed variable
color – Global variable
Output:
Red blue Green
Red blue
Red

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 23.
Explain the types of scopes for variable or LEGB rule with example.
Answer:
There are four types of variable scope.
(i) Local scope:
The local scope refers to variables defined in current function. Always a function will first look up for a variable name in its local scope.
Eg: Disp( ):
a:=10
print a
Disp( )
Here a is declared as local scope variable.
And displays its value is 10.

(ii) Global scope:
A variable which is declared outside of all the functions in a program is called as global scope.
A global variable can be accessed inside or outside of all the functions in a program.
Eg: a:=70
Disp( )
a:=10
Print a
Disp 1( ):
Print a
Here variable a:=10 is declared inside the function, so it is known as local scope. And variable a:=70 is declared outside the function, so it is known as global scope.

(iii) Enclosed scope:
A variable which is declared inside a function which contains another function definition within it, the inner function can also access the variable of the outer function. This scope is called enclosed scope.
When a compiler or interpreter search for a variable in a programs, it first Search local scope, and then search enclbsing scopes.
Eg: Disp( )
a:=10
Disp1( ):
Print a
Disp1( ):
print a
Disp( )
Here, Disp1( ) is a member of Disp( ). So the inner function can also access the variable of the outer function.

(iv)Built-in scope:
The built-in scope has all names that are pre-loaded into the program scope when we start the compiler.
Any variable or module which is defined in the library functions of a programming languages has built-in scope.
Eg: Library files, Functions, or modules come along with the software, they will ’ come under built in scope.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 24.
Write any Five Characteristics of Modules.
Answer:
The following are the desirable characteristics of a module.

  1. Modules contain instructions, processing logic, and data.
  2. Modules can be separately compiled and stored in a library.
  3. Modules can be included in a program.
  4. Module segments can be used by invoking a name and some parameters
  5. Module segments can be used by other modules.

Question 25.
Write any five benefits in using modular programming.
Answer:
The benefits of using modular programming include:

  1. Less code to be written.
  2. A single procedure can be developed for reuse, eliminating the need to retype the code many times.
  3. Programs can be designed more easily because a small team deals with only a small part of the entire code.
  4. Modular programming allows many programmers to collaborate on the same application.
  5. The code is stored across multiple files.
  6. Code is short, simple and easy to understand.
  7. Errors can easily be identified, as they are localized to a subroutine or function.
  8. The same code can be used in many applications.
  9. The scoping of variables can easily be controlled.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Hands On Practice (Tb. P. No. 28):

Question 1.
Observe the following diagram and Write the pseudo code for the following:
Answer:

TN State Board 12th Computer Science Important Questions Chapter 3 Scoping 1

sum( ) :
num 1 := 20
sum1 ( ) :
num 1 := num 1 + 10
sum2 ( ) :
num 1 := num 1 + 10
sum2( ):
sum1 ( ):
num1 :=10
Sum( ) :
print num 1

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Choose the best answer:

Question 1.
Normally every variable defined in a program has:
(a) Global scope
(b) Local scope
(c) Enclosed scope
(d) Built-in scope
Answer:
(a) Global scope

Question 2.
Which sign is used in programming languages to map the variable and object?
(a) +
(b) –
(c) :=
(d) /
Answer:
(c) :=

Question 3.
How many type of scope variables available in python language?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 4.
Match the following:

(i) Local (A) Nested
(ii) Enclosed (B) Modules
(iii) Global (C) Inside
(iv) Built in (D) Uppermost

(a) (i) – B, (ii) – C, (iii) – A, (iv) – D
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B
(c) (i) – B, (ii) – A, (iii) – D, (iv) – C
(d) (i) – C, (ii) – D, (iii) – B, (iv) – A
Answer:
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B

Question 5.
Match the following:

(i) Access control(A) Outside the class
(ii) public Members(B) Within the class
(iii) Private Members(C) Security technique
(iv) Protected Members(D) Denied outside the class

(a) (i) – C, (ii) – A, (iii) – D, (iv) – B
(b) (i)- C, (ii) – B, (iii) – D, (iv) – A
(c) (i) – B, (ii) – D, (iii) – C, (iv) – A
(d) (i) – B, (ii) – C, (iii) – A, (iv) – D
Answer:
(a) (i) – C, (ii) – A, (iii) – D, (iv) – B

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 6.
Choose the incorrect pair.
(a) Module – Small Program
(b) Program – Built in scope
(c) Software – Packages
(d) Debugging – Errors
Answer:
(b) Program – Built in scope

Question 7.
Choose the correct pair.
(a) Namespaces – Mapping names
(b) LEGB – Variable rule
(c) Function – Output
(d) Scope – Language
Answer:
(a) Namespaces – Mapping names

Question 8.
Choose the incorrect statement:
(a) Modules can be separately compiled.
(b) Modules can be used by other modules.
(c) Modules are not easy to understand.
(d) Errors can easily be identified in modules.
Answer:
(c) Modules are not easy to understand.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 9.
Choose the correct statement:
(a) C++ is a function
(b) A default members in a python class are public.
(c) Python prescribes a suffixing file name of the variable.
(d) A default members in a C++ members are public.
Answer:
(b) A default members in a python class are public.

Question 10.
Assertion (A):
Local scope refers to variables defined in current function.
Reason (R):
Always, a function will first look up for a variable name in its local scope.
(a) A and R are True and R is the correct explanation for A.
(b) A is True but R is False.
(c) A is False but R is True.
(d) Both A and R are False
Answer:
(a) A and R are True and R is the correct explanation for A.

Question 11.
Assertion (A):
A module is a part of a program.
Reason (R):
Modules work not perfectly on individual level.
(a) A and R are True and R is the correct explanation for A.
(b) A is True but R is False.
(c) A is False but R is True.
(d) Both A and R are False.
Answer:
(b) A is True but R is False.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 12.
Assertion (A):
Private members of a class are accessible from the outside the class.
Reason (R):
It can be handled only from outside the class.
(a) A and R are True and R is the correct explanation for A.
(b) A is True but R is False.
(c) A is False but R is True.
(d) Both A and R are False.
Answer:
(d) Both A and R are False.

Question 13.
Assertion (A):
Protected members of a class are accessible from within the class.
Reason (R):
They can be handled only from outside the class.
(a) A and R are True and R is the correct explanation for A.
(b) A is True but R is False.
(c) A is False but R is True.
(d) Both A and R are False.
Answer:
(b) A is True but R is False.

Question 14.
Pick the odd one out:
(a) C++
(b) Java
(c) Python
(d) Module
Answer:
(d) Module

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 15.
Pick the odd one out:
(a) Procedures
(b) Scope
(c) Subroutines
(d) Functions
Answer:
(b) Scope

Question 16.
Which type of variable declared outside the functions in a program?
(a) Local
(b) Global
(c) private
(d) Enclosed
Answer:
(b) Global

Question 17.
Which of the following contain Instructions processing logic and data?
(a) Modules
(b) Scofje
(c) Variable
(d) Identifier
Answer:
(a) Modules

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 18.
Which part of a program that can see or use as variable?
(a) function
(b) scope
(c) Indentation
(d) Identifier
Answer:
(b) scope

Question 19.
Which of the following refers in the addresses to an object in memory?
(a) Functions
(b) Scope
(c) Indentation
(d) Identifier
Answer:
(c) Indentation

Question 20.
Which of the following is not a module?
(a) Indentation
(b) Procedure
(c) Subroutines
(d) Function
Answer:
(a) Indentation

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 21.
Which is called contain instructions, processing logic and data?
(a) Function
(b) Modules
(c) Scope
(d) Indentation
Answer:
(b) Modules

Question 22.
How many access control keywords are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 23.
Which is a python class members?
(a) Public
(b) Private
(c) Global
(d) Protected
Answer:
(a) Public

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 24.
Which of the following is does not visibility of scope?
(a) Modules
(b) Variables
(c) Functions
(d) Identifiers
Answer:
(a) Modules

Question 25.
The duration for which a variable is alive is called:
(a) Duration Time
(b) Life Time
(c) Running Time
(d) Execution Time
Answer:
(b) Life Time

Question 26.
Which of the following refers to the visibility of variables in one part of a program to another part of the same program?
(a) Scope
(b) Memory
(c) Address
(d) Accessibility
Answer:
(a) Scope

Question 27.
The process of binding a variable name with an object is called:
(a) Scope
(b) Mapping
(c) late binding
(d) early binding
Answer:
(b) Mapping

Question 28.
Which of the following is used in programming languages to map the variable and object?
(a) ::
(b) :=
(c) =
(d) = =
Answer:
(b) :=

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 29.
Containers for mapping names of variables to objects is called
(a) Scope
(b) Mapping
(c) Binding
(d) Namespaces
Answer:
(d) Namespaces

Question 30.
Which scope refers to variables defined in current function?
(a) Local Scope
(b) Global scope
(c) Module scope
(d) Function Scope
Answer:
(a) Local Scope

Question 31.
The process of subdividing a computer program into separate sub-programs is called:
(a) Procedural Programming
(b) Modular programming
(c) Event Driven Programming
(d) Object oriented Programming
Answer:
(b) Modular programming

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 32.
Which of the following security technique that regulates who can use resources in a computing environment?
(a) Password
(b) Authentication
(c) Access control
(d) Certification
Answer:
(c) Access control

Question 33.
Which of the following members of a class can be handled only from within the class?
(a) Public members
(b) Protected members
(c) Secured members
(d) Private members
Answer:
(d) Private members

Question 34.
Which members are accessible from outside the class?
(a) Public members
(b) Protected members
(c) Secured members
(d) Private members
Answer:
(a) Public members

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 3 Scoping

Question 35.
The members that are accessible from within the class and are also available to its subclasses is called
(a) Public members
(b) Protected members
(c) Secured members
(d) Private members
Answer:
(b) Protected members

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 1 Function

TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 1.
Define Parameters.
Answer:
Parameters are the variables if a function definition mid arguments are the values which are passed to a function definition.

Question 2.
What is a recursive function?
Answer:
A function definition which call itself is called recursive function.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 3.
How will you define function?
Answer:
The syntax for function definitions:
let rec fn a<sub>1</sub> a<sub>2</sub> ……….. a<sub>n</sub>: = k
Here the fn is a variable indicating an identifier being used as a function name.
The names a<sub>1</sub> to a<sub>n</sub> are variables indicating the identifiers used as parameters.
The keyword rec is required if fn is to be a recursive function, otherwise it may be omitted.

Question 4.
Write the syntax for function types.
Answer:
The syntax for function types:
x → y
x<sub>1</sub> → x<sub>2</sub> → y
x<sub>1</sub> → …… x<sub>n</sub> → y
Here, x and y are variable indicating types. The type x→y is the type of a function that gets an input of type ‘x’ and returns an output of the type y.

Whereas x<sub>1</sub>→x<sub>2</sub>→y is a type of a function that takes two inputs, the first input is of type X! and the second input of type x<sub>2</sub>, and returns an output of type y.

Such as x<sub>1</sub>→ …….x<sub>n</sub>→y has type x as input of n arguments and y type as output.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 5.
How will you solve, chameleons of chromeland problem using function?
Answer:
(i) Let us represent the number of chameleons of each type by variable a,b and c, and their initial values by A,B and C, respectively.
(ii) Let a – b be the input property.
(iii) The input – output relation is a = b = 0 and c = A + B + C.
(iv) The algorithm can be specified as monochromatize (a,b,c).

TN State Board 12th Computer Science Important Questions Chapter 1 Function 1

(vi) In each iterative step, two chameleons of the two types(equal in number) meet and change their colors to the third one. For example, if A, B, C = 4, 4, 6, then the series of meeting will result in:

TN State Board 12th Computer Science Important Questions Chapter 1 Function 2

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 6.
Write a monochromatize (a, b, c) algorithm and draw a flow chart.
Answer:
Let A and B each decreases by a, and c increases by 2.
The solution can be expressed as an iterative algorithm.
monochromatize (a, b, c)
– – inputs: a = A, b = B, c = C, a = b
– – outputs: a = b = 0, c = A + B + C while a > 0
a, b, c: = a – 1, b – 1,c + 2.
The algorithm is depicted in the flowchart as:

TN State Board 12th Computer Science Important Questions Chapter 1 Function 3

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 7.
What is a subroutine?
Answer:
Subroutines are the basic building blocks of computer programs.
Subroutines are small sections of code that are used to perform a particular task that can be used repeatedly.

Question 8.
Define Function with respect to Programming language.
Answer:
A function is a unit of code that is often defined within a greater code structure.
A function contains a set of code that works on many kinds of inputs, like variants, expressions and produces a concrete output.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 9.
Write the inference you get from X:=(78).
Answer:
X:= (78) has an expression in it but (78) is not itself an expression.
In this case the value 78 being bound to the name X. That is definitions bind values to names.

Question 10.
Differentiate interface and implementation.
Answer:

Interface Implementation
Interface just defines what an object can do, but won’t actually do it. Implementation carries out the instructions defined in the interface.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 11.
Which of the following is a normal function definition and which is recursive function definition.
Answer:
(i) let rec sum x y:
return x + y
Recursive function

(ii) let disp:
print ‘welcome’
Normal function

(iii) let rec sum num:
if (num!=0) then return num + sum (num-1)
else
return num
Recursive function

Question 12.
Mention the characteristics of Interface.
Answer:

  1. The class template specifies the interfaces to enable an object to be created and operated properly.
  2. An object’s attributes and behaviour is controlled by sending functions to the object.
    Eg: Let’s take the example of increasing a car’s speed.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 13.
Why strlen is called Pure function?
Answer:

  1. Strlen is called pure function because the function takes one variable as a parameter, and accessed it to find its length.
  2. This function reads external memory but does not change it, and the value returned derives from the external memory accessed.
    Eg: strlen(s) is compiled, strlen needs to iterate over the whole of s.
    If the compiler is smart enough to work out that strlen is a Pure function.

Question 14.
What is the side effect of impure function? Give example.
Answer:
(i) Impure function has side effects when it has observable interaction with the outside world.
(ii) There are situations our functions can become impure though our goal is to make our functions pure.
(iii) Eg:
let Y: = 0
(int) inc (int)x
Y: = y + x ;
return(y)
The side effect of the inc() function is, it is changing the data 0 if the external visible variable Y.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 15.
Differentiate pure and impure function.
Answer:

Pure Function Impure Function
The return value of the pure functions solely depends on its arguments passed. Hence, if you call the pure functions with the same set of arguments, you will always get the same return values. They do not have any side effects. The return value of the impure functions does not solely depend on its arguments passed. Hence, if you call the impure functions with the same set of arguments, you might get the different return values. For example, random(), Date().
They do not modify the arguments which are passed to them. They may modify the arguments which are passed to them.

Question 16.
What happens if you modify a variable outside the function? Give an example.
Answer:
Modify variable outside a function due to which the result will change, each time of the function definition.
Eg:
let x: = 0
(int) inc (int) y
x: = x + y;
return (x)
In the above example the side effect of theinc () function is, it is changing the data of the external visible variable x.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 17.
What are called Parameters and write a note on
(i) Parameter without Type
(ii) Parameter with Type.
Answer:
Parameters are the variables in a function definition and arguments are the values which are passed to a function definition.
(i) Parameter without type:
(a) In this function definition let rec pow a b: = variable b is the parameter and the value which is passed to the variable b is the argument.
(b) Here, we have not mentioned any data types.
(c) Some language compiler solves this type inference problem algorithmically.

(ii) Parameter with type:
(a) Let rec pow (a: int) (b: int): int: = in this definition for a and b the parentheses are mandatory.
(b) In this types can help with debugging such an error message.
(c) There are number of times we may want to explicitly write down types.

Question 18.
Identify in the following program
let rec gcd a b :=
if b <> 0 then gcd b (a mod b) else return a

(i) Name of the function.
Answer:
gcd

(ii) Identify the statement which tells it is a recursive function.
Answer:
rec

(iii) Name of the argument variable.
Answer:
a, b

(iv) Statement which invoke the function recursively.
Answer:
gcd b(a mod b)

(v) Statement which terminates the recursion.
Answer:
return a

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 19.
Explain with example Pure and impure functions.
Answer:
Pure functions:
Pure functions are functions which will give exact result when the same arguments are passed.
Eg: Let square x
return x*x

In the above example square is a pure function because it will not give different results for same inputs.

Impure functions:
The variables used inside the function may cause side effects though the functions which are not passed with any arguments.
Eg:
Let a: = random ( )
if a >10 then
return: a
else
return : 10
Here the function random is impure as it is hot sure what will be the result when we call the function.

Question 20.
Explain with an example interface and implementation.
Answer:

  1. An interface is a set of action that an object can do.
  2. For example, when you press a light switch, the light goes on, you may not have cared how it splashed the light.
  3. The purpose of interfaces is to allow the computer to enforce the properties of the class of TYPE T must have functions called X, Y, 2, etc.,
  4. Implementation carries out the instructions defined in the interface.
  5. Inobjectorientedprogramsclassesarethe interface and how the object is processed and executed is the implementation.
  6. The interface defines an objects visibility to the outside world.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Hands On Practice (Tb. P.No: 8):

Question 1.
Write an algorithmic function definition to find the minimum among 3 numbers.
Answer:
The specification of a an algorithm minimum is minimum (a, b, c)
– – inputs: (a, b, c)
– outputs: a↓b↓C
Algorithm minimum can be defined as

  1. Minimum (a, b, c)
  2. – -a, b, c
  3. x = a
  4. if b < x then
  5. x = b
  6. else
  7. if c < x then
  8. x = c
  9. x = a↓b↓c

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 2.
Write algorithmic recursive function definition to find the sum of n natural numbers.
Answer:

  1. To find the sum of n natural numbers
  2. – -input: n
  3. If n = 0 then
  4. Finds = 1 + 2 + 3 + ….. + n
  5. Prints
  6. else
  7. print 0 is not natural number.

Choose the best answer:

Question 1.
Which are expressed using statements of programming language?
(a) Algorithms
(b) Functions
(c) Programs
(d) Files
Answer:
(a) Algorithms

Question 2.
Match the following:

(i) Subroutines (A) Greater code structure
(ii) Functions (B) Distinct syntactic blocks
(iii) Definitions (C) Sections of code
(iv) Parameter (D) Variables

(a) (i) – C, (ii) – A, (iii) – B, (iv) – D
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B
(c) (i) – D, (ii) – B, (iii) – A, (iv) – C
(d) (i) – D, (ii) – C, (iii) – A, (iv) – B
Answer:
(a) (i) – C, (ii) – A, (iii) – B, (iv) –

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 3.
Choose the incorrect pair:
(a) Parameters – Variable
(b) Arguments – Values
(c) Compiling – Debugging
(d) Interface – Action
Answer:
(c) Compiling – Debugging

Question 4.
Choose the correct pair:
(a) Pure function – calling functions
(b) Impure function – side-effects
(c) Subroutine – parameters
(d) Implementation – Algorithm
Answer:
(b) Impure function – side-effects

Question 5.
Choose the incorrect statement:
(a) Subroutines are the basic memory type of the computer
(b) Parameters are the variables in a function.
(c) Arguments are the values which are passed to a function definition.
(d) Definition are distinct syntactic blocks.
Answer:
(a) Subroutines are the basic memory type of the computer

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 6.
Choose the correct statement:
(a) An interface is a set of variables.
(b) In object oriented programs classes are the interface.
(c) The interface defines an object’s not visibility to the outside world.
(d) A class declaration is internal interface.
Answer:
(b) In object oriented programs classes are the interface.

Question 7.
Assertion (A):
The variable used inside the function may cause side effects though the functions which are not passed with any arguments.
Reason (R):
When a function depends on variables or functions outside of its definition block.
(a) Both A and R are True, and R is the correct explanation for A
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, but R is False.
(d) A is False, but R is True.
Answer:
(b) Both A and R are True, but R is not the correct explanation for A.

Question 8.
Assertion (A):
A function is a unit of code that is often defined within a greater code structure.
Reason (R):
A function contains a set of code that works on many kinds of inputs and produces a concrete output.
(a) Both A and R are true, and R is the correct explanation for A.
(b) Both A and R are True, but R is not the correct explanation for A.
(c) A is True, But R is False.
(d) A is False, But R is True..
Answer:
(a) Both A and R are true, and R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 9.
Pick the odd one out:
(a) Curly braces
(b) Parentheses
(c) Functions
(d) Square brackets
Answer:
(c) Functions

Question 10.
Pick the odd one out:
(a) Pseudo code
(b) Operating system
(c) Programs
(d) Modules
Answer:
(b) Operating system

Question 11.
Which of the following bulk of statements to be repeated for many number of times?
(a) Algorithm
(b) Flow chart
(c) Coding
(d) Subroutines
Answer:
(d) Subroutines

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 12.
Which Of the following keyword is introduced function definition?
(a) let
(b) def
(c) rec
(d) fn
Answer:
(b) def

Question 13.
A function definition which call itself is called:
(a) Recursive function
(b) User defined function
(c) Built-in-function
(d) Derived function
Answer:
(a) Recursive function

Question 14.
Which of the following in an instance created from the class?
(a) object
(b) function
(c) variable
(d) Recursive
Answer:
(a) object

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 15.
Which type of function the return type is solely depends on its argument passed?
(a) Pure
(b) impure
(c) Recursive
(d) user defined
Answer:
(a) Pure

Question 16.
Which type of function the return type does not solely depends on its argument passed?
(a) Pure
(b) Impure
(c) Recursive
(d) User defined
Answer:
(b) Impure

Question 17.
Which are the variables in a function definition?
(a) Variables
(b) Arguments
(c) Functions
(d) Parameters
Answer:
(d) Parameters

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 18.
Which of the following type is can help with explicitly debugging?
(a) Annotating
(b) Compiling
(c) Debugging
(d) Interpreting
Answer:
(a) Annotating

Question 19.
The small sections of code that are used to perform a particular task is Called:
(a) Subroutines
(b) Files
(c) Pseudo code
(d) Modules
Answer:
(a) Subroutines

Question 20.
Which of the following is a unit of code that is often defined within a greater code structure?
(a) Subroutines
(b) Function
(c) Files
(d) Modules
Answer:
(b) Function

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 21.
Which of the following is a distinct syntactic block?
(a) Subroutines
(b) Function
(c) Definition
(d) Modules
Answer:
(c) Definition

Question 22.
The variables in a function definition are called as:
(a) Subroutines
(b) Function
(c) Definition
(d) Parameters
Answer:
(d) Parameters

Question 23.
The values which are passed to a function definition are called:
(a) Arguments
(b) Subroutines
(c) Function
(d) Definition
Answer:
(a) Arguments

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 24.
Which of the following are mandatory to write the type annotations in the function definition?
(a) Curly braces
(b) Parentheses
(c) Square brackets
(d) indentations
Answer:
(b) Parentheses

Question 25.
Which of the following defines what an object can do?
(a) Operating System
(b) Compiler
(c) Interface
(d) Interpreter
Answer:
(c) Interface

Question 26.
Which of the following carries out the instructions defined in the interface?
(a) Operating System
(b) Compiler
(c) Implementation
(d) Interpreter
Answer:
(c) Implementation

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 1 Function

Question 27.
The functions which will give exact result when same arguments are passed are called:
(a) Impure functions
(b) Partial Functions
(c) Dynamic Functions
(d) Pure functions
Answer:
(d) Pure functions

Question 28.
The functions which cause side effects to the arguments passed are called:
(a) impure function
(b) Partial Functions
(c) Dynamic Functions
(d) Pure functions
Answer:
(a) impure function

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 1.
What is known as Accessing characters in a string?
Answer:
Python allocate an index value for its each character. These index values are otherwise called as subscript which are used to access and manipulate the strings.

Question 2.
What is replace () and write its syntax?
Answer:
replace () function to change all occurrence of a particular character in a string.
The syntax is replace(“ char1”, “char2”)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 3.
What is meant by string concatenation?
Answer:

  • Joining of two string is called as string concatenation.
  • The plus (+) operator is used to concatenate string in python.

Question 4.
What is known as string formatting operators?
Answer:

  • The string formatting operator is one of the most exciting feature of python.
  • The formatting operator % is used to construct strings, replacing parts of the strings with the data.

Question 5.
Short note on Escape sequences in python.
Answer:

  1. Escape sequences start with a backslash (\) and it can be interpreted differently.
  2. When you have use single quote to represent a string, all the single quotes inside the string must be escaped. Similar in the case with double quotes.
    Eg: >>> print (“They said, “what\s there?”)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 6.
What are called membership operators?
Answer:
The ‘in’ and ‘not in’ operators can be used with string to determine whether a string is present in another string. Therefore, these operators called as membership operators.

Question 7.
What is the output?
Answer:
>>>strl = “slice.substrings”
>>>print(strl[::4])
The output is curs

Question 8.
Short note on chr(ASII).
Answer:
Chr(ASII) returns the character represented by a ASCII.
Eg: >>>print (ch(98))
Output b

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 9.
How can you allocate an index value of subscript?
Answer:

  1. The positive subscript 0 is assigned to the first character and n-1 to the last character, when n is the number of characters in the string.
  2. The negative index assigned from the last character to the first character in reverse order begins with -1.

Question 10. What is output?
Answer:
>>> “print (“School”.replace(“o”,”e”))
The output will be printed as school.

Question 11.
What is output?
Answer:
>>> strl = “school”
>>> print (strl[0:3))
The output is sch.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 12.
What is output?
Answer:
>>> strl = “Ramakrishna mission”
>>> print (stri[:: -2]
Output:
nisM nhikmR

Question 13.
What is output?
Answer:
strl = “G”
i = 1
while i <=5 :
print (str!*i)
i+=1
output
G
G G
G G G
G G G G
G G G G G

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 14.
Write a python program using Format( ) function.
Answer:
num1=int (input(“number 1:”))
num2=int (input(“Number 2:”))
print (“The sum of { } and { } is {}”. format(numl, num2,(numl+num2)))
Output:
Number 1 : 34
Number 2 : 54
The sum of 34 and 54 is 88.

Question 15.
Write a short note on modifying and deleting strings.
Answer:

  1. Strings in python are immutable.
  2. That means, once you define a string modifications or deletion is not allowed.
  3. If you want to modify the string, a new string value can be assign to the existing string variable.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 16.
Write a python program to slice substring.
Answer:
strl = “WELCOME”
index = 0
for i in srtl:
print (strl [: index+1])
index+=1

Question 17.
Explain swap case () function with example.
Answer:
Swap case( ) function will change case of every character to its opposite case vice- versa.
Eg:
>>> strl+ “COmpUteR SCiENcE”
>>> print (strl. swapcase())
The output will be printed as coMPuTEr scIenCe.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 18.
Write a program to create an abecedarian series.
Answer:
str1 = “A B C D E F G H”
str2 = “ate”
for i in str1:
print ((i+str2), end = ‘\t’)
Output: Aate Bate Cate Bate Fate Gate Hate

Question 19.
What is known as stride when slicing string?
Answer:
When the slicing operation, you can specify a third argument as the stride. Which refers to the number of characters to move forward after the first character is retrieved from the string.
The default value of stride is 1.
Eg:
>>.strl=“l am studying TWELTH standard”
>>>print(str1 [13:20:3])
Output E.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 20.
Write any five formatting characters and its usage.
Answer:

Format characters Usage
%c Character
%d or %i Signed decimal integer
%s String
%u Unsigned decimal integer
%o Octal integer
%x or %X Hexadecimal integer (lower case x refers a – f;  upper case X refers A – F)

Question 21.
Write any five escape sequences supported by python.
Answer:

Escape Sequence Description
 \newline backslash and newline ignored
 \\ Backslash
 \’ Single quote
 \” Double quote
 \a ASCII Bell
 \b ASCII Backspace
 \f ASCII Form feed
 \n ASCII Linefeed

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 22.
Explain the following Built-in string functions is python.
Answer:
(a) len () (b) count ()

(a) len ( ) – This function returns the length of the given string.
The syntax is len (str)
Eg:
>>> A= “SCHOOL”
>>> print (len (A))
The output is 6.

(b) count ( ) – It returns the number of substrings occurs within the given range. Range (beg, end) arguments are optional, if it is not given, python searched in whole string.Search is case sensitive.
Eg:
>>> strl+ “RAM RAM RAM 1+1”
>>> print (srt 1. count(‘RAM’))
The output is 3
>>> print (str 1. count (‘A’))
output is 3
>>> print (str 1. count(‘S’))
output is 0.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 23.
What is string?
Answer:
In python, Anything (Numbers, characters, special symbols) can be created with single or double or triple quotes is called string.
Eg“RAMA”, “12 std”

Question 24.
Do you modify a string in python?
Answer:
No, because string in python are immutable. So we cannot modify a string in python.

Question 25.
How will you delete a string in python?
Answer:

  1. Python will not allow deleting a particular character in a string.
  2. Whereas we can remove entire string variable using del command.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 26.
What will be the output of the following python code?
Answer:
strl = “School”
print (strl * 3)
The output as,
school school school

Question 27.
What is slicing?
Answer:
Slice is a substring of a main string. A substring can be taken from the original string by using [ ] operator and index values.
Thus [ ] is also known as slicing operator.

Question 28.
Write a Python program to display the given pattern
COMPUTER
COMPUTE
COMPUT
CO M P U
COMP
COM
CO
C
Answer:
Strl = “COMPUTER”
index = 0
for i in str1:
print (str1[index+1:])
index+=1

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 29.
Write a short about the followings with suitable example:
(a) capitalize( )
(b) swapcase( )
Answer:
(a) capitalize () – It is used to capitalize the first character of the string.
Eg:
>>> city = “Chennai”
>>>print (city, capitalize ())
The output as Chennai.

(b) swapcase( ) – It will change case into opposite case of character, vice-versa.
Eg:
»>strl = “rKM SCHOOL”
>>print(strl.swapcase())
The output as Rkm school.

Question 30.
What will be the output of the given python program?
Answer:
str1 = “welcome”
str2 = “to school”
str3=strl[:2]+str2[len(str2)-2:]
print(str3)
The output will be printed as
we 7

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 31.
What is the use of format()? Give an example.
Answer:
The format ( ) function used with strings is very versatile and powerful function used for formatting strings.
The curly braces { } are used as placeholders or replacement fields, which get replaced along with format () function.
Eg:
(Let n1=50, n2=100)
n1= int (input (“Number”))
n2= int (input(“Number”))
print (“The sum of {} and {} is {}”.
Format (nl, n2 (nl+n2)))
The output will be printed as
The sum of 50 and 100 is 150.

Question 32.
Write a note about count() function in python.
Answer:
Count function returns the number of substrings occurs within the given range.
The syntax is count (str, beg, end)
Eg:
>>> strl = “COMPUTER SCIENCE”
>>> print (strl. count (‘COMPUTER’))
The output is 1
>>> print (strl. count (‘C’)) .
The output is 3
Python searching in whole string. Search in case sensitive.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 33.
Explain about string operators in python with suitable example.
Answer:
String operators in python:
(i) (Concatenation (+) – joining of two of more strings is called as concatenation. The plus (+) operator is used to concatenate string in python.
Eg:
>>> “COMPUTER” + “SCIENCE”
The output is COMPUTERSCIENCE
(ii) Append (+=) – Adding more strings at the end of an existing string is known as append. The operator += is used to append a new string with an existing string.
Eg:
>>> strl “My name is”
>>> strl+= “Rajesh”
>>> print (strl)
The output is My name is Rajesh

(iii) Repeating (*) – The multiplication operator (*) is used to display a string in multiple number of times.
Eg:
>>> strl = “CHENNAI”
print (strl*3)
The output will printed as
CHENNAI CHENN AI CHENNAI

(iv) Stride slicing – Slice a substring of a main string. A substring can be taken from the original string by using [ ] operator and index or subscript values. .
Eg:
>>> strl = “EDUCATION”
>>> print (strl [:3]
>>> print (strl [7:]
The output will be printed as
EDU
ON

(v) Strinde when slicing string – when the slicing operation, you can specify a third argument as the stride.
Eg:
>>> srtl = “welcome to learn python”
>>> print (strl [10:16:4])
The output is
r

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 34.
Write a python program to find the length of a string.
Answer:
# program to find the length of a string
strl = input (“Type a string”)
print (len (strl))

Question 35.
Write a program to count the occurrences of each word in a given string.
Answer:
# program to count occurrence of each word in a given siring.
strings raw_ input (“Type string”)
word= raw input (“Type word”)
a= [ ]
count= 0
a= string, split (“ ”)
for i in range (0, len(a)):
if(word = =a(i)):
count= count- 1
print (“Counted word is”)
print (count)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 36.
Write a program to add a prefix text to all the lines in a string.
Answer:
# program to add a prefix text to all the lines in a string.
import text wrap
sample text – (‘ ‘)
Python is a widely used high-level general purpose, interpreted, dynamic programing language.
text_without_indentation= textwrap. indent (sample text)
wrapped = textwrap. fill (text without indentation, with =50)
Finalresult- textwrap. indent (wrapped,‘>’)
print ()
print (final_result)
print ()

Question 37.
Write a program to print integers with on the right of specified width.
Answer:
# pgm print integers with ‘*’ on the right of specified width.
x=3
y=123
print (“In original number”,x)
print (“Formatted Number (right padding, width 2) “+”{:*<3d}. format (x));
print (“Original number”,y)
print (“Formatted number (right padding, width 6): “+”{:*<7d}”. Format (y));
print ()

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 38.
Write a program to create a mirror of the given string. For example, “wel” = “lew”.
Answer:
# program to create a mirror of a given string.
strl = input ( )
Valid = True
for char in strl:
If not mirrored [char] in strl:
break
else:
(or)
>>> mirror (‘wood’)
The output is ‘boow’

Question 39.
Write a program to removes all the occurrences of a give character in a string.
Answer:
# program to removes of given character
string strl- (“Type text to remove”)
str. replace (‘x’,|‘ ’); //replace with space

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 40.
Write a program to append a string to another string without using += operator.
Answer:
# program to append a string
str1=“SENTHIL”
srt2= “KUMAR”
newstr= “ ’’.join ((strl, str2))
(or)
var1= “SENTHIL”
var2= “KUMAR”
var3=f“ {varl} {var2}”
print (var3)
(or)
str1= “SENTHIL”
str2= “KUMAR”
s= srtl.___add___(str2)
print (s)

Question 41.
Write a program to swap two strings.
Answer:
# program to swap two springs.
strl= input (“Type First String to swap”)
str2= input (“Type Second String to Swap”)
print (“\n Both String Before Swap”)
print (“First string= ”, srtl)
print (“Second string= ”, srt2) t= srtl strl= srt2 str2= t
print (“\n Both string affer swap”)
print (“First string=”, srtl)
print (“Second string=’, str2)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 42.
Write a program to replace a string with another string without using replace( ).
Answer:
# program to replace a string with another string without using replace ( )
str1 = “string is a data type in python, strings are immutable”
result = ( )
for i in str1:
if i – =‘0’:
result +=1
print result
(OR)
result = [ ]
for i in strl:
if i = = ‘0’:
i = ‘0’:
result.append (i)
print1’. join (result)

Question 43.
Write a program to count the number of characters, words and lines in a given string.
Answer:
# program to count the number of characters, words and lines
string = raw_input(“Type string” )
char= 0
word= 1
line= 0
for i in string:
char = char +1
if(i = ‘ ’):
word= word +1
if (i =’ ‘):
line= line +1
print (“Number of words in the string”)
print (word)
print (“Number of character in the string”)
print (char)
print (“Number of lines in the string”)
print (line)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Choose the best answer:

Question 1.
Which is the first positive character assigned to the subscript?
(a) 0
(b) 1
(c) 2
(d) 3
Answer:
(a) 0

Question 2.
Which is the last positive character assigned to the subscript?
(a) n
(b) n<sup>2</sup>
(c) n – 1
(d) 1 – n
Answer:
(c) n – 1

Question 3.
Which operator is used to append new string with an existing string?
(a) ++
(b) +=
(c) /=
(d) *=
Answer:
(b) +=

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 4.
Which multiplication operator is used to display a string is multiple number of times?
(a) x
(b) **
(c) ^
(d) *
Answer:
(c) ^

Question 5.
What is the output?
>>> strl= “GOOD”
>>> print (strl[0])
(a) G
(b) GO
(c) GOO
(d) Null
Answer:
(a) G

Question 6.
Which is the string formatting operator?
(a) //
(b) \\
(c) %
(d) &
Answer:
(c) %

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 7.
Which is the Hexadecimal formatting character?
(a) %H
(b) %X
(c) %d
(d) %e
Answer:
(b) %X

Question 8.
Escape sequences starts with a:
(a) /
(b) \
(c) %
(d) //
Answer:
(b) \

Question 9.
Which escape sequences is used for carriage return?
(a) \c
(b) \f
(c) \r
(d) \t
Answer:
(b) \f

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 10.
Which is the output of >>> print(ord(‘B’))?
(a) 65
(b) 66
(c) 67
(d) 68
Answer:
(b) 66

Question 11.
What is the output of >>> print (chr (97)) ?
(a) a
(b) A
(c) b
(d) B
Answer:
(a) a

Question 12.
Which command is used to remove entire string variable?
(a) era
(b) del
(c) ctrl+D
(d) Alt+D
Answer:
(b) del

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 13.
Match the following:

(i) + (A) Slicing operator
(ii) += (B) Repeating operator
(iii) * (C) Append
(iv) [ ] (D) Concatenation

(a) (i) – D, (ii) – B, (iii) – A, (iv) – C
(b) (i) – D, (ii) – C, (iii) – B, (iv) – A
(c) (i) – C, (ii) – B, (iii) – A, (iv) – D
(d) (i) – C, (ii) – D, (iii) – A, (iv) – B
Answer:
(b) (i) – D, (ii) – C, (iii) – B, (iv) – A

Question 14.
Match the following:

(i) %c (A) decimal integer
(ii) % d (B) character
(iii) %X (C) Floating point integer
(iv) %f (D) Hexadecimal integer

(a) (i) – B, (ii) – A, (iii) – D, (iv) – C
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A
(c) (i) – C, (ii) – D, (iii) – A, (iv) – B
(d) (i) – C, (ii) – D, (iii) – B, (iv) – A
Answer:
(a) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 15.
Match the following:

(i) \a (A) Ascii carriage return
(ii) \b (B ) Ascii Bell
(iii) \n (C ) Ascii Backspace
(iv) \r (D ) Ascii Linefeed

(a) (i) – B, (ii) – D, (iii) – A, (iv) – C
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A
(c) (i) – C, (ii) – D, (iii) – A, (iv) – B
(d) (i) – C, (ii) – A, (iii) – B, (iv) – D
Answer:
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 16.
Choose the incorrect pair:

Column I Column II
(a) % Formatting operator
(b) % u unsigned decimal integer
(c) % i unsigned integer
(d) % e exponential notation

Answer:
(c)

Question 17.
Choose the incorrect statement:
(a) len (str) is returns the length of the string.
(b) Capitalize () function is used to capitalize the all the character of the string.
(c) isalpha () is returns only letters.
(d) isdigit () is returns only numbers.
Answer:
(b) Capitalize () function is used to capitalize the all the character of the string.

Question 18.
Pick the odd one out:
(a) lower ( )
(b) upper ( )
(c) title ( )
(d) format ( )
Answer:
(d) format ( )

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 19.
Assertion (A):
Usually python does not support any modification in its strings.
Reason (R):
But, it provides a function replace ( ) to change all occurrences of a particular character in a string.
(a) Both A and R are True, And R is the Correct explanation for A.
(b) Both A and R are True, But R is not the correct explanation for A.
(c) A is True, But R is false.
(d) A is False, But R is True.
Answer:
(a) Both A and R are True, And R is the Correct explanation for A.

Question 20.
Assertion (A):
The string formatting operator is one of the most exciting feature in python.
Reason (R):
The formatting operator + is used to construct strings with the data stored in variables.
(a) Both A and R are True, And R is the Connect explanation for A.
(b) Both A and R are True, But R is not the correct explanation for A.
(c) A is True, But R is false.
(d) A is False, But R is True.
Answer:
(c) A is True, But R is false.

Question 21.
Choose the incorrect pair:
(a) %o – octal integer
(b) %e – decimal integer
(c) %f – exponential
(d) %g – character
Answer:
(a) %o – octal integer

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 22.
Choose the correct pair:
(a) \t – horizontal tab
(b) \v – form feed
(c) \ooo – octal value
(d) \a – new line
Answer:
(a) \t – horizontal tab

Question 23.
Choose the incorrect statement:
(a) Slice is a substring of a main string.
(b) The slicing operator is &.
(c) The default value of stride is 0.
(d) We cannot use negative value as a stride.
Answer:
(a) Slice is a substring of a main string.

Question 24.
Choose the correct statement:
(a) String is a sequence of numbers.
(b) String is a data type in Python.
(c) String is enclosed with only single quote.
(d) Python string are mutable.
Answer:
(b) String is a data type in Python.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 25.
The default value of stride is:
(a) 0
(b) 1
(c) 3
(d) 5
Answer:
(b) 1

Question 26.
Which is first negative value assigned to the subscript?
(a) 0
(b) 1
(c) -1
(d) n – 2
Answer:
(c) -1

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 27.
The default value of string is:
(a) 0
(b) -1
(c) 1
(d) Nothing
Answer:
(c) 1

Question 28.
Which of the following is the output of the following python code?
strl=“TamilNadu”
print(str 1 [::-!])
(a) Tamilnadu
(b) Tmlau
(c) udanlimaT
(d) udaNlimaT
Answer:
(d) udaNlimaT

Question 29.
What will be the output of the following code?
strl = “Chennai Schools” strl [7] =
(a) Chennai-Schools
(b) Chenna-School
(c) Type error
(d) Chennai
Answer:
(c) Type error

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 30.
Which of the following operator is used for concatenation?
(a) +
(b) &
(c) *
(d) =
Answer:
(a) +

Question 31.
Defining strings within triple quotes allows creating:
(a) Single line Strings
(b) Multiline Strings
(c) Double line Strings
(d) Multiple Strings
Answer:
(b) Multiline Strings

Question 32.
Strings in python:
(a) Changeable
(b) Mutable
(c) Immutable
(d) flexible
Answer:
(c) Immutable

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 33.
Which of the following is the slicing operator?
(a) { }
(b) [ ]
(c) < >
(d) ( )
Answer:
(b) [ ]

Question 34.
What is stride?
(a) index value of slide operation
(b) first argument of slice operation
(c) second argument of slice operation
(d) third argument of slice operation
Answer:
(d) third argument of slice operation

Question 35.
Which of the following formatting character is used to print exponential notation in
upper case?
(a) %e
(b) %E
(c) %g
(d) %n
Answer:
(b) %E

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 8 Strings and String Manipulations

Question 36.
Which of the following is used as placeholders or replacement fields which get replaced along with format( ) function?
(a) { }
(b) <>
(c) ++
(d) ^^
Answer:
(a) { }

Question 37.
The subscript of a string may be:
(a) Positive
(b) Negative
(c) Both (a) and (b)
(d) Either (a) or (b)
Answer:
(c) Both (a) and (b)

TN Board 12th Computer Science Important Questions

TN Board 12th Computer Science Important Questions Chapter 7 Python Functions

TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 1.
What is function arguments? and its types.
Answer:
Function arguments are used to call a function.
There are four types of function arguments, they are Required arguments, keyword arguments, Default arguments and variable- length arguments.

Question 2.
What is Required arguments?
Answer:
Required arguments are the arguments passed to a function in correct positional order.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 3.
What is default Arguments?
Answer:
In python the default argument is an argument that takes a default value if no value is provided in the function call.

Question 4.
What is anonymous function?
Answer:

  • In python, anonymous function is a function that is without a name.
  • In python anonymous function are defined using the lambda keyword.

Question 5.
What is the use of lambda or anonymous function?
Answer:

  • Lambda function is mostly used fòr creating small and one-time anonymous function.
  • Lambda function are mainly used in combination like filter ( ), map ( ) and reduce ( ).

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 6.
Write the syntax of return statement.
Answer:

  • The syntax of return statment is return [expression list].
  • This statement can contain expression which gets evaluated and the value is retuned.

Question 7.
Define Block in python.
Answer:
A block in one or more lines of code, grouped together, so that they are treated as one big sequence of statements while execution.

Question 8.
What is Nested Block?
Answer:

  • A block within a block is called nested block.
  • When the first block statement is indented by a single tab space, the second block of statement is indented by double tab spaces.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 9.
What is purpose of Lambda function in python?
Answer:

  • Lambda function can take any number of arguments and must return one value in the form of an expression.
  • Lambda function can only access global variables and variables in its parameter list.

Question 10.
What is output?
Answer:
Sum = lambda arg1, arg2: arg1+arg2
print (” sum=” sum (-60,100))
The output is 40.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 11.
What is output?
Answer:
C = 1
def add ( ):
print (c)
add ( )
Output is 1

Question 12.
Explain the using block in python?
Answer:
A block is one or more lines of code, grouped together so that they are treated as one big sequence of statements while execution.
In Python, statements in a block are written with indentation.
A block begins when a line is indented and all the statements of the block should be at same indent level.

Question 13.
What are the advantage of user-defined functions?
Answer:

  1. Functions help us to divide a program into modules. This makes the code easier to manage.
  2. It implements code reuse. Every time you need to execute a sequence of statements, all you need to do is to call the function.
  3. Functions, allows us to change functionality easily, and different programmers can work on different functions.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 14.
Explain passing parameters in function.
Answer:

  1. Parameters or arguments can be passed to functions. The syntax is def function_ name (parameter (s) separated by comma):
  2. The parameters that you place in the parenthesis will be used by the function itself.
    Eg: def area (w, h):
    return w*h
    print (area (3,5))
  3. The above code assigns the width and height values to the parameters w and h.
  4. The value of 3 and 5 are passed to w and h respectively, the function will return 15 as output.

Question 15.
Explain variable-Length arguments.
Answer:

  1. We might need to pass more arguments than have already been specified.
  2. Variable-length arguments can be used instead of that.
  3. These are not specified in the function definition and an asterisk (*) is used to define such arguments.
    Eg: def sum (x, y, z):
    print (x+y+z)
    sum (10, 20, 30)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 16.
What are the methods in variable length arguments can pass the arguments?
Answer:
There are two methods using variable length arguments. They are:
(a) Non keyword variable arguments.
(b) Keyword variable arguments.
(i) Non-keyword variable arguments are called tuples.
(ii) The python’s print ( ) function is itself an example of such a function which supports variable length arguments.

Question 17.
What is the functions of the return statement?
Answer:

  1. The return statement causes your function to exit and returns a value to its caller. The point of functions in general is to take inputs and return something.
  2. The return statement is used when a function is ready to return a value to its caller. So, only one return statement is executed at run time even though the function contains multiple return statements.
  3. Any number of ‘return’ statements are allowed in a function definition but only one of them is executed at run time.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 18.
Write a python program using global and local variables in same code.
Answer:
x=8 # x is a global variable
def loc ():
global x
y = “local”
x = x *2
print(x)
print(y)
loc()
output:
16
local

Question 19.
Write a python program to calculate factorial using recursive function.
Answer:
def fact(n):
if n==0:
return 1
return 1
else:
return n*fact (n-1)
print (fact (0))
print (fact (5))
output:
1
120

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 20.
Write a python program using global and local variable with same name.
Answer:
x = 5
defloc():
x= 10
print (“local x:”,x)
loc()
print (“global x:”,x)
output:
local x: 10
global x: 5

Question 21.
Explain any three python mathematical functions.
Answer:
(i) Floor ( ) – It returns the largest integer less than or equal to x.
The syntax is math.floor(x)
Eg: x – 10.6
y = -10.6
. z = -10.2
print (math, floor(x))
print (math, floor (y))
print (math, floor(z))
The output will be printed as
10
– 11
– 11

(ii) Ceil ( ) – It returns the smallest integer greater than or equal to x.
The syntax is math. Ceil (x)
Eg:
x = 10.7
y = -10.7
Z = -10.2
print (math, ceil (x))
print (math, ceil (y))
print (math, ceil(z))
The output will be printed as
11
-10
-10

(iii) sqrt ( ) – It returns the square root of x.
Here x must be greater than zero.
The syntax is sqrt (x)
Eg:
a = 16
b = 49
c = 25.5
print (math, sqrt (a))
print (math, sqrt (b))
print (math, sqrt (c))
The output will be printed as
4.0
7.0
5.049752469181039

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 22.
What is function?
Answer:
(i) Functions are named blocks of code that are designed to do specific job.
(ii) When you want to perform a particular task, that you call the name of the function responsible for it.

Question 23.
Write the different types of function?
Answer:
There are four types of python functions. They are:
(i) User-defined functions
(ii) Built- in functions,
(iii) Lambda functions
(iv) Recursion functions.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 24.
What are the main advantages of function?
Answer:
(i) It avoids repetition and makes high degree of code reusing.
(ii) It provides better modularity for your application.

Question 25.
What is meant by scope of variable? Mention its types.
Answer:
Scope of variable refers to the part of the program, where it is accessible. There are two types of scopes local scope and global scope.

Question 26.
Define global scope.
Answer:
A variable, with global scope can be used anywhere is the program. It can be created by defining a variable outside the scope of any function or block.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 27.
What is base condition in recursive function?
Answer:
(i) The condition that is applied in any recursive function is known as base condition.
(ii) A base condition is must in every recursive function otherwise it will continue to execute like an infinite loop.

Question 28.
How to set the limit for recursive function? Give an example.
Answer:
Recursive function is like a loop but sometimes it makes more sense to use recursion than loop.
We can convert any loop to recursion.
Eg: det fact (n):
if n = = 0:
return 1 else:
return n* fact (n -1)

Question 29.
Write the rules of local variable?
Answer:
(i) A variable with local scope can be accessed only within the function/block that it is created in.
(ii) When a variable is created inside the function/block, the variable becomes local to it.
(iii) A local variable only exists while the function is executing.
(iv) The formate arguments are also local to function.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 30.
Write the basic rules for global keyword in python?
Answer:
The basic rules for global keyword in Python are:
(i) When we define a variable outside a function, it’s global by default. You don’t have to use global keyword.
(ii) We use global keyword to read and write a global variable inside a function.
(iii) Use of global keyword outside a function has no effect.

Question 31.
What happens when we modify global variable inside the function?
Answer:
(i) We need to modify the global variable from inside function, unbound local error will be displayed.
(ii) We can only access the global variable but cannot modify it from inside the function.
(iii) The solution for this is to use the global keyword.
Eg: c =1
def add():
c =c+5
print (c)
add ()
Local variable c referenced before assignment, so it is display for unbound local error.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 32.
Differentiate ceil ( ) and floor ( ) function.
Answer:

Ceil ( ) floor( )
Ceil is a mathematical function. floor () is also mathematical function.
Ceil function returns the least value of the integer that is greater than or equal to the specific number. Return the largest integer less than or equal to the specific number.
Ceil (x), Returns the ceiling of x as a float, the smallest integer value greater than or equal to x. floor (x), Return the floor of x as a float, the largest integer value less than or equal to x.

Question 33.
Write a python code to check whether a given year is leap year or not.
Answer:
# Python code to check whether a given year is leap or not
year = int (input (“Type a year:”))
if (Year% 4==0 and year % 100!=0 or year % 400==0):
print (“The year is a leap year”)
else
print (“The year is not a leap year”)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 34.
What is composition in functions?
Answer:
The value returned by a function may be used as an argument for another function in a nested manner. This is called composition.
The input string from the user using the function input () and apply eval() function to evaluate its value.
Eg: >>>x = eval(input(“Type the value”)
Type the value 15 + 5.0*3
>>>x
30.0

Question 35.
How recursive function works?
Answer:
(i) Recursive function is called by some external code.
(ii) If the base condition is met then the program gives meaningful output and exits.
(iii) Otherwise, function does some required processing and then calls itself to continue recursion.

Question 36.
What are the points to be noted while defining a function?
Answer:
(i) Function blocks begin with the keyword def followed by function name and parenthesis ().
(ii) Any input parameters or arguments should be placed within these parentheses when you define a function.
(iii) The code block always comes after a colon (:) and is indented.
(iv) The statement return [expression] exits a function, optionally passing back an expression to the caller.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 37.
Explain the different types of function with an example.
Answer:
There are four types of functions used in python language. There are
(i) User-defined function,
(ii) Built-in function
(iii) Lambda function,
(iv) Recursion function.

(i) User-defined functions defined by the users themselves. Function blocks begin with the keyword def followed by function name and parenthesis. The statement return [expression] exits a function.
Eg: defhello():
print (“116110”)
return

(ii) Built-in functions that are inbuilt with in python language. Python has a set of built-in functions, some examples are
(i) bin( ) – returns the binary version of a number.
(ii) chr ( ) – returns a character from the specified Unicode code.
(iii) Lambda function that are anonymous un-named function. Lambda function
can take any number of arguments.
Eg: x = lambda a: a+10
print (x(5))
The output will be printed as 15.

(iv) Recursion functions that calls itself that is Recursion is a way of programming or coding a problem, in which a function calls itself one or more times in its body.
Eg: def factorial (n):
if n = =1:
return 1
else
return n* factorial (n -1)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 38.
Explain the scope of variables with on example.
Answer:
(i) Scope of variable refers to the part of the program, where it i§ accessible. There are two types of scopes, local scope and global scope.
(ii) Local scope: A variable declared inside the function’s body or in the local scope is known as local variable.

A variable with local scope can be accessed only within the function or block that it is created in. The format arguments are also local to function.
Eg: Creating a local variable
def lva ():
y=0 # local scope
print (y)
lva ()
The output as 0.

(iii)Global scope: A variable, with global scope can be used anywhere in the program, ft can be created by defining a variable outside the scope of any function or block.

When we define a variable outside a function. It’s global by default. We use global variable inside a function, but use of outside a function has no effect.
Eg: a=1 # global variable.
def x ():
print (a)
x()
The output as 1

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 39.
Explain the following built-in functions
(a) id( )
(b) chr ( )
(c) round ( )
(d) type ( )
(e) pow ( )
Answer:
(a)id () :
It return the identity of an object, that is the address of the object in memory.
The syntax is id (object)
Eg: x = 10
print id (x)
The output is 13480785 (This is memory address)

(b)chr () :
It returns the Unicode character
for the given ASCII value. The syntax is
chr (i)
Eg:
x = 65
print (chr(x))
The output will printed as A

(c) round ( ):
It returns the nearest integer to its input. The syntax is round (number, [n digits])
number – specify the value to be rounded
n digits – specify the number of decimal digits desired after rounding.
Eg:
x= 18.9
y =11.29
print (round (x))
print (round (nl, 1))
The output are 19 11.3

(d)ype ( ) :
It returns the type of object for the given single object. The syntax is type (object)
Eg:
x= 15.2 y = ‘a’
print (type (x)) print (type (y))
The output are <class ‘float’>
<class ‘str’>

(e) pow ():
It returns the computation of ab. i.e., (a**b) a raised to the power of b. The syntax is pow (a,b)
Eg:
a = 3
b = 2
print (pow (a,b))
print (pow (a+b, b))
The output are
9
25

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 40.
Write a python code to find the L.C.M of two numbers.
Answer:
# python code to find LCM
num1 = int (input (“Type the first number”))
num2 = int (input (“Type the second number”))
print (“The LCM of’, numl, “and”, num2, “is”, 1cm (numl, num2))
def lcm (x,y):
if x>y: # choose the greater number.
greater = x
else
greater = y
while (True):
if (greater % x=0) and (greater % y==0):
1cm = greater
break
greater +=1
return 1cm

Question 41.
Explain recursive function with an example.
Answer:
(i) Functions that calls itself is known as recursive function.
(ii) Recursion works like loop but something it makes more sense to use recursion than loop, you can convert any loop to recursion.
(iii) A recursive function, condition that is applied in any recursive function is known as base condition.
(iv) A base condition is must in every recursive function otherwise it will continue to execute like an infinite loop.
(v) If the base condition is met then the program gives meaningful output and exits.
(vi) Otherwise, function does some required processing and then calls itself to continue recursion.
Eg: def factorial (x):
if x=0:
return 1
else:
return x * factorial (n-1)

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 42.
def printnos (*nos):
for n in nos:
print(n)
return
# now invoking the printnos() function
print (‘Printing two values’)
printnos (1,2)
print (‘Printing three values’)
printnos (10,20,30)
In the above program change the function name printnos as printnames in all places wherever it is used and give the appropriate data Ex. printnos (10, 20, 30) as printnames . (‘mala’, ‘kala’, ‘bala’) and see output.
Answer:
Output:
Printing two names
Mala
Kala
Printing three names
Mala
Kala
Bala

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 43.
Try the following code in the program:
Answer:

TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions 1

Question 44.
Evaluate the following furfctions and write the output:
Answer:

TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions 2

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 45.
Evaluate the following functions and write the output:
Answer:

TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions 3

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Choose the best answer:

Question 1.
In python, statements in a block are written with:
(a) indentation
(b) keyword
(c) return
(d) colon
Answer:
(a) indentation

Question 2.
Which will be displayed as the last statement of the output, if the return has no argument?
(a) True
(b) False
(c) None
(d) No
Answer:
(c) None

Question 3.
How many types of functions that arguments are used to call a function?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 4.
There are not specified in the function’s definition which character is used to define such arguments?
(a) #
(b) *
(c) !
(d) /
Answer:
(b) *

Question 5.
Which is called Non-keyword variable arguments?
(a) tuples
(b) lambda
(c) return
(d) Recursion
Answer:
(a) tuples

Question 6.
Which function is return the ASCII value for the given character?
(a) chr ( )
(b) ord ( )
(c) type ( )
(d) format ( )
Answer:
(b) ord ( )

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 7.
Match the following:

(i) User – defined unctions (A) in – built
(ii) built – in functions (B) itself
(iii) umbda functions (C) themselves
(iv) Recursion functions (D) anonymous

(a) (i) – C, (ii) – D, (iii) – B, (iv) – A
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B
(c) (i) – B, (ii) – D, (iii) – C, (iv) – A
(A) (i) – B, (ii) – C, (iii) – A, (iv) – D
Answer:
(b) (i) – C, (ii) – A, (iii) – D, (iv) – B

Question 8.
Match the following:

(i) Required arguments (A) invoke the unction
(ii) keyword arguments (B) correct aositional
(iii) default arguments (C) pass more arguments
(iv) variable length argument (D) default value

(a) (i) – B, (ii) – A, (iii) – D, (iv) – C
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A
(c) (i) – C, (ii) – A, (iii) – B, (iv) – D
(d) (i) – C, (ii) – B, (iii) – D, (iv) – A
Answer:
(a) (i) – B, (ii) – A, (iii) – D, (iv) – C

Question 9.
Match the following:

(i) abs( ) (A) retums the unary code
(ii) ard( ) (B) retums absolute /alue
(iii) chr ( ) (C) retums ascii /alue
(iv) in( ) (D) retums Unicode

(a) (i) – B, (ii) – D, (iii) – A, (iv) – C
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A
(c) (i) – D, (ii) – C, (iii) – B, (iv) – A
(d) (i) – D, (ii) – B, (iii) – A, (iv) – C
Answer:
(b) (i) – B, (ii) – C, (iii) – D, (iv) – A

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 10.

(i) ceil ( )(A) returns the truncated integer
(ii) floor ( )(B) returns the accurate floating values
(iii) trunk ( )(C) Returns smallest integer
(iv) fsum ( )(D) returns the largest integer

(a) (i) – C, (ii) – D, (iii) – A, (iv) – B
(b) (i) – C, (ii) – A, (iii) – B, (iv) – D
(c) (i)- B, (ii) – D, (iii) – A, (iv) – C
(d) (i) – B, (ii) – C, (iii) – A, (iv) – D
Answer:
(a) (i) – C, (ii) – D, (iii) – A, (iv) – B

Question 11.
Choose the incorrect pair:
(a) Scope – part of program
(b) local – Inside function
(c) global – anywhere in the program
(d) lambda – python structure
Answer:
(d) lambda – python structure

Question 12.
Choose the correct pair:
(a) type ( ) – return the minimum value
(b) id ( ) – return the maximum value
(c) round ( ) – return the nearest integer
(d) format ( ) – return the hexa decimal value
Answer:
(c) round ( ) – return the nearest integer

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 13.
Choose the incorrect statement:
(a) When a function calls itself is known as recursion.
(b) Recursion works like loop.
(c) Recursive function is called by some external code.
(d) A base condition is not must in every recursive function.
Answer:
(d) A base condition is not must in every recursive function.

Question 14.
Choose the correct statement:
(a) Function blocks begin with the keyword fun.
(b) return statement is must in python.
(c) Python statements in a block should begin with indentation.
(d) A block within a block is called a loop.
Answer:
(c) Python statements in a block should begin with indentation.

Question 15.
Assertion (A):
Python keywords should not be used as function name.
Reason (R):
Function blocks begin with def followed by function name and parenthesis ().
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A
(c) A is true but R is false.
(d) A is false but R is true.
Answer:
(a) Both A and R are true and R is the correct explanation for A.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 16.
Assertion (A):
Functions help us to divide a program into modules.
Reason (R):
This makes the code very difficult to manage.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A
(c) A is true but R is false.
(d) A is false but R is true.
Answer:
(c) A is true but R is false

Question 17.
Pick the odd one out:
(a) min ()
(b) max ()
(c) floor ()
(d) sum ()
Answer:
(c) floor ()

Question 18.
Which of the following provides better modularity for python program?
(a) Function
(b) Statement
(c) Recursive
(d) Scope
Answer:
(a) Function

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 19.
Which of the following statement exit function?
(a) exit
(b) return
(c) pass
(d) continue
Answer:
(b) return

Question 20.
In python, statement in a block are written with:
(a) Function
(b) Statement
(c) Identification
(d) Parameters
Answer:
(c) Identification

Question 21.
What will be the output if the return has no argument?
(a) Exit
(b) Return
(c) Stop
(d) None
Answer:
(d) None

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 22.
Which of the following are the values pass to the function parameters?
(a) Identifier
(b) Variables
(c) Function
(d) Arguments
Answer:
(d) Arguments

Question 23.
Which keyword is used to define anonymous function?
(a) Def
(b) Alpha
(c) Gamma
(d) Lambda
Answer:
(d) Lambda

Question 24.
Print (ord (A)), the output is:
(a) 60
(b) 62
(c) 65
(d) 66
Answer:
(c) 65.

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 25.
Print (chr (43)), the output is:
(a) +
(b) –
(c) /
(d) *
Answer:
(a) +

Question 26.
print (round(14.9)), the output is:
(a) 14
(b) 15
(c) 14.9
(d) 9
Answer:
(b) 15

Question 27.
print (round (14.9657, 2)), the output will be as:
(a) 14.9657
(b) 14.2
(c) 14.96
(d) 14.57
Answer:
(c) 14.96

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 28.
What is output print(math.sqrt(100))?
(a) 10.0
(b) 100.0
(c) 10.10
(d) 10.22
Answer:
(a) 10.0

Question 29.
What is output print(math.ceil(~25.7))?
(a) -26
(b) -25
(c) -25.7
(d) 25
Answer:
(b) -25

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 30.
Non-keyword variables arguments are called:
(a) tuples
(b) list
(c) pairs
(d) list
Answer:
(a) tuples

Question 31.
A named blocks of code that are. designed to do one specific job is called as:
(a) Loop
(b) Branching
(c) Function
(d) Block
Answer:
(c) Function

Question 32.
A Function which calls itself is called as:
(a) Built-in
(b) Recursion
(c) Lambda
(d) return
Answer:
(b) Recursion

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 33.
Which function is called anonymous un-named function?
(a) Lambda
(b) Recursion
(c) Function
(d) define
Answer:
(a) Lambda

Question 34.
Which of the following keyword is used to begin the function block?
(a) define
(b) for
(c) finally
(d) def
Answer:
(d) def

Question 35.
Which of the following keyword is used to exit a function block?
(a) define
(b) return
(c) finally
(d) def
Answer:
(b) return

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 36.
While defining a function which of the following symbol is used:
(a) ; (semicolon)
(b). (dot)
(c) : (colon)
(d) $ (dollar)
Answer:
(c) : (colon)

Question 37.
In which arguments the correct positional order is passed to a function?
(a) Required
(b) Keyword
(c) Default
(d) Variable-length
Answer:
(a) Required

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 38.
Read the following statement and choose the correct statement(s).
(I) In Python, you don’t have to mention the specific data types while defining function.
(II) Python keywords can be used as function name.
(a) I is correct and II is wrong
(b) Both are correct
(c) I is wrong and II is correct
(d) Both are wrong
Answer:
(a) I is correct and II is wrong

Question 39.
Pick the correct one to execute the given statement successfully.
if : print(x, “ is a leap year”)
(a) x%2=0
(b) x%4==0
(c) x/4=0
(d) x%4=0
Answer:
(b) x%4==0

Samacheer Kalvi TN State Board 12th Computer Science Important Questions Chapter 7 Python Functions

Question 40.
Which of the following keyword is used to define the function test python(): ?
(a) define
(b) pass
(c) def
(d) while
Answer:
(c) def

 

TN Board 12th Computer Science Important Questions