TN Board 12th Commerce Important Questions Chapter 5 Capital Market

TN State Board Kalvi 12th Commerce Notes Chapter 5 Capital Market

Question 1.
What is Capital Market?
Answer:
Capital Market is a market where buyers and sellers engage in trade of financial securities like bonds, and stocks. The buying and selling is undertaken by participants such as individuals and institutions.

Question 2.
Write a note on OTCEI.
Answer:
The OTCEI was set up by a premier financial institutions to allow the trading of securities across the electronic counters throughout the country. The strength of OTCEI are transparency of transactions, quick deals, faster settlements and better liquidity.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 3.
What is Mutual Fund?
Answer:

  • Financial Institution that provide facilities for channeling savings of small investors into avenues of productive investments are called “Mutual Funds”.
  • A mutual fund company invests the funds pooled from shareholders to investment portfolio and a reasonable return.

Question 4.
Who are the participants in a Capital Market?
Answer:
The participants of the Capital Market include individuals, Corporate Sectors, Government, banks and other financial institutions.

Question 5.
How is price determined in a Capital Market?
Answer:
The price of the Securities is determined based on the demand and supply prevailing in the capital market for securities.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 6.
What are the various kinds of Capital Market? Explain.
Answer:
The capital market is divided into two
(i) Primary Market
(ii) Secondary Market

(i) Primary Market:
The Primary Market deals with securities which are issued to the public for the first time. In the Primary Market borrowers exchange new financial securities for long term funds. Primary Market facilitates capital formation.
There are three ways by which a company may raise capital in a Primary Market
(i) Public Issue,
(ii) Rights issue
(iii) Private placement

(ii) Secondary Market:
Secondary Market may be defined as the market for old securities which are previously issued in the Primary Market are traded here. The trading takes place between investors who follow the original issue in the Primary Market. It covers both stock exchange and over-the-counter market.

Question 7.
Explain any two functions of Capital Market.
Answer:
Savings and Capital Formation:
In capital market, various types of securities help to mobilize savings from various sectors of population (Individual, Corporate, Government etc.,) People to invest in securities at a reasonable return and liquidity in stock exchange. This accelerates the capital formation in the country.

Industrial Growth:
The stock exchange is a central market through which resources are transferred to the industrial sector of the economy institution encourage people to invest in productive channels. Thus it stimulates industrial growth and economic development of the country by mobilizing funds for investment in the Corporate Securities.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 8.
Write a note on National Clearance and Depository System (NCDS).
Answer:
Under the scripless trading system settlement of transactions relating to securities takes place through a book entry. The entire scripless trading system comprises. The following three segments:

  1. National Trade comparison and Reporting system which prescribes the terms and conditions of contract for the securities market.
  2. National Clearing system which aims at determining the net cash and stock liability of each broker on a settlement date.
  3. National Depository system which arranges to provide for the transfer of ownership of securities in exchange on payment by book entry on electronic ledgers without any physical movement of transfer deed.

Question 9.
Discuss about evolution and growth of Indian Capital Market.
Answer:

  1. The period between 1947 and 1973 marked the development of infrastructure for Capital Market. During this period, a network of development financial institutions (IFCI, ICICI, IDBI, UTI, SFC and SIDC)
  2. The period between 1980 and 1992 debenture emerged as a powerful instrument of resource mobilization in the Primary Market. A number of stock exchanges came into existence.
  3. SEBI emerged as an effective regulatory body for the Primary and Secondary Market.
  4. A number of committees were constituted inorder to suggest measures to revamp and restructure the working of the Secondary Market and cause in the Primary Market.
  5. A High Powered Study Group on Establishment of New Stock Exchange, A Committee on Trading in Public Sector Bonds and Units of Mutual Funds.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 10.
Explain about Factoring and Venture Capital Institutions.
Answer:
Factoring Institutions:
‘Factoring’ is an arrangement whereby a financial institution provides financial-accommodation on the basis of assignment and sale of account receivable. The factoring institutions collect the book debts for and onbehalf of its clients. Factoring Institutions operating in India SBI Factors and commercial services Private Limited, Canbank Factors Limited, a subsidiary of Canara Bank.

Venture Fund Institutions:
Venture capital funds bring into force the hi- technology projects which are converted into commercial production. Many specialized financial institutions have promoted their own Venture Capital Funds. They include Risk Capital Foundation of IPCI, Venture Fund of IDBI, SIDBI, Technology Development and infrastructure Corporation of India TDICI.

Question 11.
Discuss the characters of a Capital Market.
Answer:

  1. Securities Market: The dealings in a capital.market are done through the securities like shares, debentures etc., The capital market is also called Securities Market.
  2. Price: The price of the securities is determined based on the demand and supply prevailing in the capital market for securities.
  3. Participants: The participants of the Capital Market include individuals, Corporate Sectors, Government, Banks and other financial institutions.
  4. Location: Capital market is not confined to certain specific locations. Markets are concentrated in certain well known centres known as Stock Exchanges.
  5. Market for Financial Assets: Capital market provides a transactions platform for long term financial assets.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 12.
Briefly explain the functions of capital market.
Answer:
(i) Savings and Capital Formation:
In capital market various types of securities help to mobilize savings from various sectors of population (Individuals, Corporate, Govt etc.,)

(ii) Permanent Capital:
The existence of a capital market and stock exchange enables companies to raise permanent capital. The investors cannot commit their funds for a permanent period but companies require funds permanently.

(iii) Industrial Growth:
The stock exchange is a central market through which resources are transferred to the industrial sector of the economy.

(iv) Ready and Continuous Market:
The stock exchange provides a central convenient place where buyers and sellers can easily purchase and sell securities.

(v) Reliable Guide to Performance:
The capital market serves as a reliable guide to the performance and financial position of corporate and thereby promotes efficiency.

(vi) Provision of Variety of Services:
The financial institutions provide a variety of services such as grant of long term and medium term loans to entrepreneurs, Provision of Underwriting facilities, Participation in equity capital.

(vii) Foreign Capital:
Capital Market makes possible to generate foreign capital. Government has liberalized Foreign Direct Investment (FDI) in the country, Foreign technology which is important for economic development of the country.

(viii) Easy Liquidity:
With the help of secondary market investors can sell off their holdings and convert them into liquid cash.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 13.
Explain the various types of New Financial Institutions.
Answer:
A number of institutions of finance have been established to cater to the credit requirements of various segments of industry and needs.
(i) Venture Fund Institutions: Venture Capital financing is a form of equity financing designed especially for funding new and innovative project ideas. Specialized financial institution have promoted their own venture capital funds. Venture Fund of IDBI, SIDBI, Risk Capital Foundation of IFCI.

(ii) Mutual Funds:
A mutual fund company invests the funds pooled from shareholders and gives them the benefit of diversified investment portfolio and a reasonable return.

(iii) actoring Institution:
The factoring institutions collect the book debts for and on behalf of its clients some of the factoring institutions operating in India. SBI Factors and commercial services Private Limited.

(iv) Over the Counter Exchange of India (OTCEI):
The OTCEI was set up by a premier financial institution to allow the trading of securities across the electronic counters throughout the country.

(v) National Stock Exchange of India (NSEI):
NSEI was established in 1992 to function as a model Stock Exchange. The exchange aims at providing the advantage of nation-wide electronic screen based “Scripless” and “Floorless” trading system in securities.

(vi) National clearance and Depository System (NCDS):
Under scripless trading system settlement of transaction relating to securities take place through a book entry.

(vii) National Securities Depositories Limited:
The (NSDL) was set up in the year 1996 for achieving a time bound dematerialization as well as rematerialization of shares.

(viii) Stock Holding Corporation of India Limited (SHCIL):
Aims at serving as a central securities depository in respect of transactions on stock exchange. The corporation also take up the administration of clearing functions at a national level.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Choose the correct answer:

Question 1.
Capital market do not provide:
(a) Short term Funds
(b) Debentuire Funds
(c) Equity Funds
(d) Long term Funds
Answer:
(a) Short term Funds

Question 2.
When the NSEI was established:
(a) 1990
(b) 1992
(c) 1998
(d) 1997
Answer:
(b) 1992

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 3.
Primary market is a Market where securities are traded in the:
(a) First Time
(b) Second Time
(c) Three Time
(d) Several Times
Answer:
(a) First Time

Question 4.
Participants in the capital market includes:
(a) Individuals
(b) Corporate
(c) Financial Institutions
(d) All of the above
Answer:
(d) All of the above

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 5 Capital Market

Question 5.
How many times a security can be sold in a secondary market?
(a) Only One Time
(b) Two Time
(c) Three Times
(d) Multiple Times
Answer:
(d) Multiple Times

TN Board 12th Commerce Important Questions

TN Board 12th Commerce Important Questions Chapter 4 Introduction to Financial Markets

TN State Board Kalvi 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 1.
What are the components of organized sectors?
Answer:

  1. Regulations
  2. Financial Institutions
  3. Financial Markets
  4. Financial Services

Question 2.
Write a note on financial market.
Answer:
A market where in financial instruments such as financial claims, assets and securities are traded is known as a “Financial Market”. [OR]
A financial market is an institution or arrangement that facilitates the exchange of financial instruments (equity shares, preference shares, debentures corporate stocks and bonds).

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 3.
What is equity market?
Answer:

  1. It is the type of financial market on the basis of financial claim.
  2. It is a market for trading in Equity Shares of companies.

Question 4.
What is debt market?
Answer:

  1. It is type of financial market on the basis of financial claim.
  2. A market for trading in Debt Instrument. That is Government Bonds or Securities, Corporate Debentures or Bonds.

Question 5.
How is prize decided in a secondary market?
Answer:
Price will be decided in a secondary market based on the interaction of buyers and sellers. It fluctuates depends on the demand and supply force in the market.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 6.
Give the meaning and definition of financial market.
Answer:
Meaning:
A market where in financial instruments such as financial claims, assets and securities are traded is known as a “Financial Market”.

A Financial Market is an institution or arrangement that facilitates the exchange of financial instruments such as equity shares, preference shares, debentures corporate stocks and bonds. ‘

Definitions:
According to Brigham, Eugene F, “The place where people and organizations wanting to borrow money are bought together with those having surplus funds is called a financial market.

Question 7.
Differentiate Spot Market from Futures Market.
Answer:
Spot Market:
It is a market where the delivery of the financial instrument and payment of cash occurs immediately.
Forward or Futures Market: It is a market where the delivery of assets and payment of cash takes place at a pre-determined time (Future).

Question 8.
Write a note on Secondary Market.
Answer:

  1. It is the market for securities that are already issued or the place where formerly issued securities are traded is known as Secondary Market.
  2. Securities can be sold multiple times.
  3. Price will be fluctuates and it will depends on the demand and supply force in one market.
  4. Stock Exchange is an important institution in the secondary market.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 9.
Bring out the scope of financial market in India.
Answer:

  1. The Financial Market provides financial assistance to individuals, agricultural sectors, industrial sectors.
  2. It is also provide financial assistance to financial institutions like banks, insurance sectors, Provident Funds and the Government.
  3. The institutions get their short term as well as long term financial assistance through financial market.
  4. Individuals, institutions and the Government can get their required funds in time.
  5. It leads to the overall economic development.

Question 10.
Distinguish between new issue market and secondary market.
Answer:

TN State Board 12th Commerce Important Questions Chapter 4 Introduction to Financial Markets 1

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 11.
Enumerate the different kinds of financial markets.
Answer:
Financial markets can be classified in different ways.

Stock Market:
The stock market trades shares of ownership of public companies. Each shares comes with a price and investors make money with the stock when they perform well in the market.

Bond Market:
The Bond Market offers opportunities for companies and the Government to secure money to finance a project or investment. Investors buy bonds from a company. The company returns the amount of the bonds within an agreed period plus interest.

Commodity Market:
The Commodity market is where traders and investors buy and sell natural resources or commodities such as com, oil, meat and gold. A specific market is created for such resources because their price is unpredictable.

Derivatives Market:
Such a market involves derivatives or contracts whose value is based on the market value of the asset being traded.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 12.
Discuss the role of financial market.
Answer:
A financial market is of great use for a country as it helps the economy in the following manner.
(i) Savings Mobilization:
Obtaining funds from the savers or surplus units. (Business firms, Public Sector Units household individuals and the Government).

(ii) Investment:
Financial Market plays a key role in arranging the investment of funds to collected funds from those units which are in need of the same.

(iii) National Growth:
To attain national growth by ensuring the flow of surplus funds to deficit units. Flow of funds for productive purposes is also made possible.

(iv) Entrepreneurship Growth:
Financial markets contribute to the development of entrepreneurial class for arranging available necessary financial resources.

(v) Industrial Development:
The different components of financial markets help an accelerated growth industrial development. It leads to overall economic development of a country.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 13.
What are the functions of Financial Markets?
Answer:
Intermediary Functions:
(i) Transfer of Resources:
To transfer of real economic resource from lenders to ultimate borrowers.

(ii) Enhancing Income:
Financial Markets allow lenders to earn interest/ dividend on their surplus investible funds.

(iii) Productive Usage:
Financial Markets allow to use the funds borrowed and enhancing the income and the gross national production.

(iv) Capital formation:
Financial markets provide a channel to save funds. New saving funds flow to aid capital formation of a country.

(v) Price Determination:
Interaction of Buyers and Sellers to determine the price of the traded financial assets. Allocation of funds in the economy based on demand and supply (price mechanism).

(vi) In Sale Mechanism:
For selling of a financial assets by an investor to offer the benefit of marketability and liquidity of such assets.

(vii) Information:
To know the various segments of the markets so as to reduce the cost of transaction of financial assets.

Financial Functions:
(i) Providing the borrowers with funds so as to enable them to carry out the investment plan.
(ii) Providing liquidity in the market so as to facilitate trading of funds.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 14.
Discuss the various types of Financial markets.
Answer:
Financial Markets can be classified in different ways. They are as follows.

(a) On the basis of Type of Financial claim:
(i) Debt Market: Trading in Debt Instrument, Government Bonds or Securities Corporate Debentures or Bonds.
(ii) Equity Market: It is the financial market for trading in equity shares of companies.

(b) On the basis of Maturity of Financial Claim:
(i) Money Market: It is the market for short term financial claim (one year or less). Eg: Treasury Bills, Commercial Paper
(ii) Capital Market: Market for long term financial claim (More than a year). Eg: Shares, Debentures

(c) On the basis of Time of Issue of Financial Claim:
(i) Primary Market: Sale of securities for the first time by the issuers (companies). The money from investors goes directly to the issuers.
(ii) Secondary Market: The market for securities that are already issued. (Stock Exchange) Securities can be sold by multiple times in the market.

(d) On the basis of Timing of Delivery of Financial Claim:
(i) Cash / Spot Market: A market where the delivery of financial instrument and payment of cash occurs immediately.
(ii) Forward or Future Market: A market where the delivery of assets and payment of cash take place at a pre-determined time (Future).

(e) On the basis of the Organizational Structure of the Financial Market:
(i) Exchange Traded Market: It is a centralized organization with standardized procedures (Stock Exchange).
(ii) Over-the-counter Market: It is a decentralized market with customized procedures (Outside the Stock Exchange).

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Choose the correct answer:

Question 1.
Financial market facilitates business firms:
(a) To rise funds
(b) To recruit workers
(c) To make more sales
(d) To minimize fund requirement
Answer:
(a) To rise funds

Question 2.
Capital market is a market for:
(a) Short Term Finance
(b) Medium Term Finance
(c) Long Term Finance
(d) Both Short Term and Medium Term Finance
Answer:
(c) Long Term Finance

Question 3.
Primary market is also called as:
(a) Secondary market
(b) Money market
(c) New Issue Market
(d) Indirect Market
Answer:
(c) New Issue Market

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 4 Introduction to Financial Markets

Question 4.
Spot Market is a market where the delivery of the financial instrument and payment of cash occurs:
(a) Immediately
(b) In the future
(c) Uncertain
(d) After one month
Answer:
(a) Immediately

Question 5.
How many times a security can be sold in a secondary market?
(a) Only one time
(b) Two time
(c) Three times
(d) Multiple times
Answer:
(d) Multiple times

TN Board 12th Commerce Important Questions

TN Board 12th Commerce Important Questions Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

TN State Board Kalvi 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 1.
Define MBO.
Answer:
Prof. Reddin defines MBO as “The establishment of effective standards for managerial positions and the periodic conversion ofthose into measurable time bound objectives linked vertically and horizontally and with future planning”.

Question 2.
What are the objectives of MBO?
Answer:

  1. To measure and judge performance.
  2. To relate individual performance to organizational goals.
  3. To foster the increasing competence and growth of the subordinates.
  4. To enhance communications between superiors and subordinates.
  5. To stimulate the subordinate’s motivation.
  6. To serve as a device for organizational control and integration.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 3.
Bring out the meaning of MBE.
Answer:

  1. Management by exception is an important principle of managerial control suggested by the classical writers on management.
  2. Management by exception is a style of business management that focuses on identifying and handling cases that deviate from the norm.

Question 4.
Mention any two advantages of MBO.
Answer:

  1. MBO process helps the managers to understand their role in the total organization.
  2. MBO provides a foundation for participative management. Subordinates are also involved in goal setting.

Question 5.
Wrtie any two importance of MBE.
Answer:

  1. Easy determination of responsibility
  2. Saves time
  3. Optimum utilization of abilities
  4. Increases productivity
  5. Enhances research and development
  6. Develops subordinates

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 6.
What is known as KRA?
Answer:

  1. Key Result Areas are fixed on the basis of organizational objectives premises.
  2. KRA are arranged on a priority basis.
  3. KRA indicates the strength of an organization. Eg: KRA are profitably, market standing, innovation.

Question 7.
Write the features of MBO.
Answer:

  1. MBO tries to combine the long run goals of organization with short run goals.
  2. Management tries to relate the organization goal with society goals.
  3. MBO’s emphasis is not only on goals but also an effective performance.
  4. It increases the organizational capability of achieving goals at all levels.
  5. A high degree of motivation and satisfaction is available to employees through MBO.
  6. Encourages a climate of trust, goodwill and a will to perform.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 8.
What are the process involved in MBO?
Answer:
The MBO process is characterized by the balance of objectives of the organization and individual.
Defining organizational objectives:
(i) It is framed by the top level employees of an organization.
(ii) First longterm objectives are frames. Then short term objectives are framed taking into account the feasibility of achieving the long term objectives.

Goals of each section:
Objectives for each section, department or division are framed on the basis of overall objectives of the organization. Period within which these objectives should be achieved is also fixed.

Fixing key result areas:
(i) KRA are arranged on a priority basis.
(ii) KRA indicates the strength of an organization.
Eg: Profitability, Innovation.

Matching Resources with objective:
The objectives are framed on the basis of availability of resources. If certain resources are not adequately available. So there is a need for matching resources with objective. Available resources should be properly allocated and utilized.

Question 9.
What are the Process of MBE?
Answer:

  1. It is necessary to set objectives or norms with predictable or estimated results.
  2. These performances are assessed and get equated to the actual performance.
  3. With an insignificant or no deviation, no action, is required and senior managers can concentrate on other matters.
  4. If actual performances deviates significantly, the issue needs to be passed to the senior managers as an “exception has occurred”.
  5. Finally the aim is to solve this “exception” immediately.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 10.
List out any Four process of MBO.
Answer:

  1. Defining organizational objectives
  2. Fixing key result areas
  3. Setting subordinate objectives or targets
  4. Periodical review meetings tong answer questions:

Question 11.
What are the major advantages of MBO?
Answer:

  1. Managers are involved in objectives setting at various levels of management under MBO and this commitment ensures hard work to achieve them.
  2. MBO process helps the managers to understand their role in the total organization.
  3. MBO provides a foundation for participative management, subordinates are also involved in goal setting.
  4. Systematic evaluation of performance is made with the help of MBO.
  5. Delegation of authority is easily done with the help of MBO.
  6. MBO gives the criteria of performance. It helps to take corrective action.
  7. MBO motivates the workers by job enrichment and makes the job meaningful.
  8. The responsibility of a Worker is fixed through MBO.
  9. Decision is taken by the management very quickly.
  10. Manager recognizes the need for planning and appreciates the planning.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 12.
What are the advantages of MBE?
Answer:
Management by exception provides the following benefits:

  1. It saves the time of managers because they deal only with exceptional matters. Routine problems are left to subordinates.
  2. It focuses managerial attention on major problems. As a result, there is better utilization of managerial talent and energy.
  3. It facilitates delegation of authority TOP management concentrates on strategic decisions and operational decisions are left to the lower levels.
  4. It forces managers to review past history and study related to business data for identifying deviations. There is better use of knowledge of trends, history and available business data. ‘
  5. MBE keeps management alert to opportunities and threats by identifying critical problems.
  6. Management by exception provides better yardsticks forjudging results. It is helpful in objective performance appraisal.

Question 13.
Explain the various disadvantages of MBO.
Answer:

  1. MBO fails to explain the philosophy; most of the executives do not know how MBO works? And how participants can benefit by MBO?
  2. MBO is a time consuming process much time is needed by senior people for framing the MBO. It leads to heavy expenditure and also requires heavy paper work.
  3.  MBO emphasis only on short-term objectives and does not consider the long term objectives.
  4. The status of subordinates is necessary for proper objectives settings. But this is not possible in the process of MBO.
  5. MBO is rigid one objectives should be changed according to the changed circumstances, external or internal. If it is not done, the planned results cannot be obtained.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 14.
Discuss the disadvantages of MBE.
Answer:
Management by exception is a style of business management that focuses on identifying and handling cases that deviate from the norm.

  1. The main disadvantage of MBE is only managers have the power over really important decisions, which can be demotivating for employees at a lower level.
  2. Further more, it takes time to pass the issues to managers.
  3. Managing employees who deviate from the normal procedures. Because of compliance failures are considered difficult to manage and typically find themselves with limited job duties and ultimately dismissed/ terminated.

Choose the correct answer:

Question 1.
_______ System gives full Scope to the Individual Strength and Responsibility.
(a) MBO
(b) MBE
(c) MBM
(d) MBA
Answer:
(a) MBO

Question 2.
Which is the First step,in Process of MBO?
(a) Fixing Key Result Area
(b) Appraisal of Activities
(c) Matching Resources with Activities
(d) Defining Organisational Objectives
Answer:
(d) Defining Organisational Objectives

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 3 Management By Objectives (MBO) and Management By Exception (MBE)

Question 3.
_______ keeps Management Alert to Opportunities and Threats by Identifying Critical Problems.
(a) MBA
(b) MBE
(c) MBM
(d) MBO
Answer:
(b) MBE

Question 4.
Delegation of Authority is Easily Done with the Help of:
(a) MBM
(b) MBE
(c) MBO
(d) MBA
Answer:
(c) MBO

TN Board 12th Commerce Important Questions

TN Board 12th Commerce Important Questions Chapter 2 Functions of Management

TN State Board Kalvi 12th Commerce Notes Chapter 2 Functions of Management

Question 1.
Write a short note about Planning.
Answer:

  1. Planning is the primary function of management.
  2. Nothing can be performed without planning. Eg: writing a book starts with planning.
  3. Planning is a constructive reviewing of future needs so that present actions can be adjusted in view of the established goal.

Question 2.
What is meant by Motivation?
Answer:

  1. The goals are achieved with the help of motivation.
  2. Motivation includes increasing the speed of performance of a work and developing a willingness on the part of workers. This is done by a resourceful leader.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 2 Functions of Management

Question 3.
What is meant by Controlling?
Answer:

  1. Controlling is performed to evaluate the performance of employees and deciding increments and promotion decisions.
  2. The control function helps in identifying underperformers and arranging remedial training for them.

Question 4.
How do you coordinate your classroom with peace?
Answer:

  1. To create positive atmosphere.
  2.  Active listening technique.
  3. Engage in activities to develop or to get knowledge.
  4. Opportunity for students to participate in classroom activities.
  5. Promoting self confidence and respect to others and themselves.

Question 5.
What is meant by Innovation?
Answer:

  1. Innovation refers to the preparation of personnel and organization to face the changes made in the business world.
  2. Continuous changes are being made in the business.
  3. Innovation includes developing new material, new products, new techniques in production and cost reduction.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 2 Functions of Management

Question 6.
List out the main functions of management?
Answer:

  1. Planning
  2. Organising
  3. Staffing
  4. Motivating
  5. Directing
  6. Controlling and
  7. Co-ordination.

Question 7.
State the importance of staffing.
Answer:

  1. Staffing refers to placement of right persons in the right jobs.
  2. Staffing includes selection of right persons.
    (a) Promotion of best persons
    (b) Retirement of old persons
    (c) Performance appraisal
    (d) Training – needy persons
  3. The success of any enterprise depends upon the successful performance of
    staffing function.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 2 Functions of Management

Question 8.
Bring out the subsidiary functions of management.
Answer:

  1. Innovation,
  2. Representation,
  3. Decision making and
  4. Communication are the subsidiary functions of management.

Question 9.
State the importance of Motivation.
Answer:
Motivation is important because it allows management to meet the company’s goals. Motivated employees can lead to increase productivity and allow an organization to achieve higher levels of output. The process of motivation plays a very important role in any organization, profit or non-profit that ensures organizational efficiency. Motivated people accept changes enthusiastically and improve their work performance.

Question 10.
What are the main duties of a manager?
Answer:
Duties of a Manager:

  1. The Manger is responsible for planning and maintaining work systems, procedures and policies that enable and encourage the optimum performance of its people and other resources.
  2. Entrusted with a leadership role, a manager is responsible for overseeing a department or group of employees within a specific organization or company.
  3. Manager contribute to business in significant ways which are reflected in company profits, organization and over all work place morale.
  4. Manager is an accomplishment because it reveals a professionals ability to successfully lead, multiple business operations manage stress and effectively communicate with co-workers.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 2 Functions of Management

Question 11.
Explain the various functions of management.
Answer:
Planning, organizing, staffing, directing, motivating, controlling and co-ordination are the main functions of management.
(i) Planning:
Planning is the primary function of management. Nothing can be performed without planning. Planning is a constructive reviewing of future needs so that present actions can be adjusted in view of the establishing goal.

(ii) Organizing:
Organizing is the process of establishing harmonious relationship among the members of an organization. Organizing function work is assigned to employees who are given authority to carry out the work assigned and made accountable for it.

(iii) Staffing:
Staffing refers to placement of right persons in the right jobs. Staffing includes selection of right persons, training to those needy persons, performance of appraisal and adequate remuneration of personnel.

(iv) Directing:
Directing denotes motivating, leading guiding and communicating with sub-ordinates on an ongoing basis inorder to accomplish preset goals.

(v) Motivating:
The goals are achieved with the help of motivation. Motivation includes increasing the speed of performance of a work and developing willingness on the part of workers. This is done by a resourceful leader.

(vi) Controlling:
Controlling is performed to evaluate the performance of employees and deciding increments and promotion decisions.

(vii) Co-ordination:
Co-ordination is the integration of the actions of all individuals, working in the enterprise in different capacities. Co-ordination is included in every managerial functions. Eg: planning and co-ordination.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 2 Functions of Management

Choose the correct answer:

Question 1.
Which is the primary function of management?
(a) Innovating
(b) Controlling
(c) Planning
(d) Decision-making
Answer:
(c) Planning

Question 2.
Which of the following is not a main function?
(a) Decision-making
(b) Planning
(c) Organising
(d) Staffing
Answer:
(a) Decision-making

Question 3.
Distribution of work in groupwise or sectionwise is called as:
(a) Co-ordinating
(b) Controlling
(c) Staffing
(d) Organising
Answer:
(d) Organising

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 2 Functions of Management

Question 4.
Which of the following is verification function?
(a) Planning
(b) Organising
(c) Staffing
(d) Controlling
Answer:
(d) Controlling

TN Board 12th Commerce Important Questions

TN Board 12th Commerce Important Questions Chapter 1 Principles of Management

TN State Board 12th Commerce Important Questions Chapter 1 Principles of Management

Question 1.
What is Management?
Answer:
Management is a distinct ongoing process of allocating inputs of an organisation (human and economic resources) by typical managerial functions (planning, organising, directing and controlling) for the purpose of achieving stated objectives that is output of goods and services desired by the customer.

Question 2.
List out the management tools.
Answer:
Tools of management:

  1. Accounting
  2. Business law
  3. Psychology
  4. Statistics
  5. Econometrics
  6. Data processing.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 3.
Who is a manager?
Answer:
A manager is a dynamic and life-giving element in every business. Without efficient management it cannot be secure the best allocation and utilisation of human material and financial resources.

Question 4.
State the meaning of Authority.
Answer:
Authority means the right of a superior to give the order to his subordinates. This is the issue of commands followed by responsibility for their consequences.

Question 5.
What do you mean by Span of management?
Answer:
The span of management refers to the number of subordinates who can be managed efficiently by a superior. The manager having the group of subordinates who report him directly is called as the span of management.

Question 6.
Define the term management.
Answer:
In management, we have planning action control cycle. Our definition must incorporate this management cycle. A process indicates the dynamic nature of management.

  1. “To manage is toforecast, to plan, to organise, to command, to coordinate, and to control ’’ – Henry Fayol. It attempts to describe management in terms of what a manager does, and not what a management is.
  2. “Management is a multipurpose organ that manages a business and manages manager and manages worker and work ” – Peter. F. Drucker.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 7.
Is management an Art or Science?
Answer:
The nature of management whether it is an art of doing things or it is a pure science of getting things done.

Management is an in-exact science because in pure science. The principles are put into test in a laboratory and they are either proved or disproved exactly and precisely. For example, plant leaves have starch in them which can be proved or disproved in a botany lab.

Similarly, the management principles can be put to test in an organisation where men, machine, money and materials are practically integrated towards achieving some chosen organisational goals. These principles cannot be exactly proved or disproved either as they tend to be flexible to changing environment, policies and practical difficulties. So, management can be described as an exact science.

Everyone believes that management is an art. No it is not an art in Toto. The concept of art denotes the learning of skills and practicing them day to day life. But the concept of management involves a set of required skills for any one designated as a manager, the skills would vary from person to person.

To conclude, management is neither a science nor an art but a combination of both requiring people holding managerial positions to apply the scientific principles.

Question 8.
Differentiate management from Administration.
Answer:
Management:

  1. Management is more executive in nature.
  2. Management is all about plans and actions
  3. The manager looks after the management of the organisation.
  4. Management focuses on managing people and their work
  5. Management need to execute them to get things done with and through other functional staff working under them who are called employees of the same organisation.

Eg: Administration:

  1. The concept of administration denotes the art of decision making at the top and evolving policies of the business undertakings by the government.
  2. The administration is concerned with framing policies and setting objectives.
  3. Administrator is responsible for the administration of the organisation. (iv) The administration is ought to take business decisions.
    Eg: Management – Research and development.
    Eg: Administration – The board of directors with the CEO/MD.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 9.
What are the principles of Taylor?
Answer:
Principles of scientific management propounded by Taylor are:

  1. Science, not rule of thumb.
  2. Harmony, not discard.
  3. Mental revolution.
  4. Co-operation, not individualism.
  5. Development of each and every person to his or her greatest efficiency and prosperity.

Question 10.
What determines the span of management?
Answer:
The span of management has two implications
(i) Influencing the complexities of the individual manager’s job.
(ii) Determine the shape or configuration of the organisation.

The span of management is related to the horizontal levels of the organisation structure. There is a wide and a narrow span of management with the wider span, there will be less hierarchical levels and thus the organisational structure would be flatter, where as with the narrow span, the hierarchical levels increases, hence the organisational structure would be tail.

Question 11.
Write about the contribution of Drucker to management.
Answer:
“Management is a multipurpose organ that manages a business, and manages manager and manages worker and work” – Peter F. Drucker. The practise of management.
Drucker stresses three jobs of management.
(i) Managing a business,
(ii) Managing manager and
(iii) Managing workers and work.

According to P. Drucker, the manager has to balance and integrate three major jobs of a business enterprise as mentioned above A manager is a dynamic and life-giving element in every business, without efficient management, it cannot be secure the best allocation and utilisation of human material and financial resources.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 12.
Explain the management process in detail.
Answer:
The substance of management should be identified as a process. A process is something that what a person does in the context of his individual duties and responsibilities assigned by his or her immediate higher authority.

In management, there is a planning action control cycle. A process indicates the dynamic nature of management. There are twin-purpose of demanagement process.
(i) Profitability or maximum productivity.
(ii) Maximum human welfare and satisfaction.

There are five parts of management as a process. They are:
(i) Management is coordination:
The manager of an enterprise must effectively coordinate all activities and resources of the organisation.

(ii) Management is a process:
The manager achieves proper coordination of resources by means of the managerial functions of planning, organising, staffing, directing and controlling.

(iii) Management is a purposive process:
It is directed toward the achievement of predetermined goals or objectives. Without an objectives, we have no destination to reach or a path to follow to arrive at our destination.

(iv) Management is a social process:
It is the art of getting things done through other people.

(v) Management is a cyclical process:
It represents planning action control re planning cycle. That is an ongoing process to attain the planned goals.

Question 13.
Describe the principles of scientific management.
Answer:
Principles of scientific management propounded by Taylor are:
(i) Science, not rule of thumb:
Rule of thumb means decisions taken by manager as per their personal judgements. According to Taylor, even a small production activity like loading iron sheets into box cars can be scientifically planned. This will help in saving time as well as human energy. Decision should be based on scientific enquiry with cause and effective relationships.

(ii) Harmony, not discard:
Taylor emphasized that there should be complete harmony between the workers and the management. If there is conflict between two, it will not be beneficial either the worker or the management. Taylor suggested complete mental revolution on the part of both management and workers. It becomes possible by
(a) sharing a part of surplus with workers,
(b) training of employees,
(c) division of work,
(d) team spirit,
(e) positive attitude,
(f) sincerity etc.

(iii) Mental revolution:
The technique of mental revolution involves a change in the attitude of workers and management towards each other. Mental revolution requires a complete change in the outlook of both management and workers.

(iv) Co-operation, not individualism:
This principle is an extension of principle of harmony not discard. It lays stress on mutual cooperation between workers and the management. Taylor also suggested that these should be proper division of work and responsibility between the two, management should always guide, encourage and help the workers.

(v) Development of each and every person to his or her efficiency and prosperity:
Efficiency of any organisation also depends on the skills and capabilities of its employees to a great extent providing training to the workers was considered essential in order to learn the best method developed through the use of scientific approach. It helps to attain efficiency and prosperity for both organisation and the employees.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 14.
Explain the principles of modern management.
Answer:
The Father of modem management is Mr. Henry Fayol and according to him there are 14 major principles of management which every manager has to practice for the success of the organisation.
(i) Division of work:
According to this principle, the whole work is divided into small tasks. The specialisation of the work force according to the skill of a person and this will lead to increase the efficiency of labour.

(ii) Authority and responsibility:
Authority means the right of a superior to give the order to his subordinates. Responsibility means obligation for performance.

(iii) Discipline:
It is obedience, proper conduct in relation to others, respect of authority etc. It is essential for the smooth functioning of all organisations.

(iv) Unit of command:
This principle states that each subordinate should recieve orders and be accountable to one and only one superior.

(v) Unit of direction:
All related activities should be put under one group, there should be one plan of action under the control of one manager.

(vi) Subordination of individual interest to mutual interest:
The interest of goals of organisation must prevail over the personal interest of individuals.

(vii) Remuneration:
The quantity and methods of remuneration payable should be fair, reasonable and rewarding of effort.

(viii) The degree of centralisation:
Centralisation implies the concentration of decision making authority at the top management.

(ix) Line of authority or scalar chain:
This refers to the chain of superiors ranging from top management to the lowest rank. There should -be a clear line of authority from top to bottom linking all managers at all levels.

(x) Order:
Order should be acceptable and under the rules of the company (material order).

(xi) Equity:
Managers should be fair and impartial when dealing with employees giving equal attention towards all employees.

(xii) Stability of tenure of personnel:
Stability of tenure of personnel is a principle stating that in order for an organisation to run smoothly.

(xiii) Initiative:
Using the initiatives of employees can add strength and new ideas to an organisation. Initiatives on the part of employees is a source of strength for organisation.

(xiv) Team spirit: Team spirit helps to develop an atmosphere of mutual trust and understanding. Team spirit helps to finish the task on time.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 15.
Discuss the implications of span of management.
Answer:
The span of management has two implications.
(a) Influences the complexities of the individual manager’s job.
(b) Determine the shape or configuration of the organization.

(i) The span of management is related to the horizontal levels of the organisation structure. There is a wide and a narrow span of management.
(ii) With the wider span there will be less hierarchical levels and the organisational structure would be of later, where as the narrow span the hierarchical levels increases the organisational structure would be tall.
(iii) The tall organisational structure imposes more changes. The span is narrow which means less number of subordinates under one superior, requires more managers to employed in the organisation. Lack of coordination and control because the operating staff is far away from the top management.

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Multiple Choice Questions:

Question 1.
Management is what a _____ does?
(a) Manager
(b) Subordinate
(c) Supervisor
(d) Superior
Answer:
(a) Manager

Question 2.
Management is an:
(a) Art
(b) Science
(c) Art and Science
(d) Art or Science
Answer:
(c) Art and Science

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 3.
Scientific management is developed by:
(a) Fayol
(b) Taylor
(c) Mayo
(d) Jacob
Answer:
(b) Taylor

Question 4.
Dividing the work into small tasks is known as:
(a) Discipline
(b) Unity
(c) Division of work
(d) Equity
Answer:
(c) Division of work

Samacheer Kalvi TN State Board 12th Commerce Notes Chapter 1 Principles of Management

Question 5.
With a wider span, there will be _______ hierarchical levels.
(a) More
(b) Less
(c) Multiple
(d) Additional
Answer:
(b) Less

TN Board 12th Commerce Important Questions

TN Board 12th Commerce Important Questions and Answers

TN 12th Commerce Important Questions State Board English Medium 2021-2022.

TN State Board 12th Commerce Important Questions and Answers

Samacheer Kalvi 12th Commerce Notes

Tamilnadu Samacheer Kalvi 12th Commerce Notes

TN Board 11th Computer Science Important Questions Chapter 18 Tamil Computing

TN State Board 11th Computer Science Important Questions 18 Tamil Computing

Question 1.
What do you mean by e-Governance?
Answer:
e-Govemance is getting Government services through internet. Govt, of Tamilnadu is giving its services through internet. Users can communicate with Govt, of Tamilnadu – from any comer of the state and get important announcements, government orders and government welfare schemes from the web portal.

Question 2.
What is Thamizpori?
Answer:
Thamizpori (தமிழ்பொறி) is a Tamil translation application having more than 30000 Tamil words equivalent to English words. In this, user can translate small english sentences into Tamil. Google also gives an online translation facility, using this users can translate from Tamil to any other language vice versa.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 3.
What is ISCII?
Answer:
ISCII (Indian Script Code for Information Interchange) is an encoding scheme specially designed for Indian languages including Tamil. It was unified with Unicode.

Question 4.
What is called Tamil Language Council?
Answer:
The council of Tamil Language was formed by the ministry of Information Communications and Arts, Govt, of Singapore with the objectives of promoting the awareness and greater use of Tamil among the Singaporeans, in 2001. The council is called as “வளர்தமிழ் இயக்கம்”.

Question 5.
What is the use of Madurai project?
Answer:
Project Madurai is an open and voluntary initiative to collect and publish free electronic editions of ancient Tamil literary classics. Thismeans either typing-in or scanning old books and archiving the text in one of the most readily accessible formats for use on all popular computer platforms.
Website: http: //www.proj ectmadurai. org/

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 5.
List out the Familiar Tamil Keyboard Interface and layouts?
Answer:

  1. NHM Writer, E-Kalappai and Lippikar – are familiar Tamil keyboard interfaces software that is used for Tamil typing which works on Tamil Unicode, using phonetics.
  2. Sellinam and Ponmadal – are familiar Tamil keyboard layouts that works on Android operating system in Smart phone using phonetics.

Question 6.
Write a note on Tamil Office Automation Application.
Answer:
Microsoft Office, Open Office etc., are the famous Office automation softwares that provides complete Tamil interface facility. These softwares are downloadable and installed in computer. After installation, office automation software environment will completely changed to Tamil.

Menu bars, names of icons, dialog boxes will be shown in Tamil. Moreover, user can save files with Tamil names and create folders with Tamil names. Tamil Libra Office, Tamil Open Office, Azhagi Unicode Editor, Ponmozhi, Menthamiz, Kamban, Vani are office automation software working exclusively for Tamil. These applications are designed to work completely in Tamil.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 7.
Write a note on Tamil operating system.
Answer:
An operating system is needed to access electronic systems such as computer and smart phone. Microsoft Windows is very popular operating system for personal computers. Linux is another popular open source operating system. Operating systems are used to access a computer easily.

An operating system should be easy to work and its environment should be in understandable form. Thus, all operating systems used in computers and smart phones offered environment in Tamil. Windows Tamil Environment interface should be downloading and install from internet. It shows all windows elements such as Taskbar, desktop elements, names of icons, commands in Tamil.

Question 8.
What do you mean by Unicode?
Answer:
Unicode is an encoding system, designed to handle various world languages, including Tamil. The first version 1.0.0 was introduced on October 1991 was able to handle nearly 23 languages including Tamil. Unicode is the suitable encoding scheme to handle Tamil.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 9.
List out the web address of E-Governance through Tamil.
Answer:

TN State Board 11th Computer Science Important Questions Chapter 18 Tamil Computing 1

 

Question 10.
List out the web address of E-Governance through Tamil.
Answer:

TN State Board 11th Computer Science Important Questions Chapter 18 Tamil Computing 2

TN State Board 11th Computer Science Important Questions Chapter 18 Tamil Computing 3

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 11.
Explain Tamil Information Interchange coding systems.
Answer:
TSCII (Tamil Script Code for Information Interchange):
Computers handle data and information as binary system. Every data should be converted into binary while it is feed into a computer system. Computers use ASCII encoding system to handle data and information. The ASCII encoding system is applicable only for handling English language.

Therefore, TSCII (Tamil Script Code for Information Interchange) is the first coding system to handle Tamil language in an analysis of an encoding scheme that is easily handled in electronic devices, including non English computers. This encoding scheme was registered in IANA (Internet Assigned Numbers Authority) unit of ICANN.

ISCII (Indian Script Code for Information Interchange):
This is one of the encoding schemes specially designed for Indian languages including Tamil. It was unified with Unicode.

Unicode:
Unicode is an encoding system, designed to handle various world languages, including Tamil. The first version 1.0.0 was introduced on October 1991 was able to handle nearly 23 languages including Tamil. Unicode is the suitable encoding scheme to handle Tamil.

Question 12.
List of the search engines supporting Tamil.
Answer:
Google and Bing are the search engines supporting Tamil. In this, user can search everything through Tamil. A google search engine gives you an in built Tamil Virtual keyboard.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 13.
What are the keyboard layouts used in Android?
Answer:
Sellinam and Ponmadal are the familiar Tamil keyboard layouts that works on Android operating system in Smart phone using phonetics.

Question 14.
Write a short note about Tamili Programming Language.
Answer:
The first Tamil programming language “Ezhil” (எழில்) is designed based on Python programming language. With the help of this programming language, user can write simple programs in Tamil.

Question 15.
What TSCII?
Answer:
TSCII (Tamil Script Code for Information Interchange) is the first coding system to handle Tamil language in an analysis of an encoding scheme that is easily handled in electronic devices, including non-English computers. This encoding scheme was registered in IANA (Internet Assigned Numbers Authority) unit of ICANN.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 16.
Write a short note on Tamil Virtual Academy.
Answer:
Tamil Virtual University was established on 17th February 2001 by the Govt, of Tamilnadu to spread Tamil to the entire world through internet. This organisation is functioning in the name of “Tamil virtual Academy”. It offers different courses regarding Tamil language, Culture, heritage etc., from kindergarten to under graduation level.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Choose the correct answer:

Question 1.
By the end of 2016, ________ are using internet in Tamil in India.
(a) 30%
(b) 50%
(c) 80%
(d) 42%
Answer:
(d) 42%

Question 2.
_______ Internet users consider local language digital content to be more reliable than English.
(a) 70%
(b) 100%
(c) 58%
(d) 68%
Answer:
(d) 68%

Question 3.
In 2021 onwards ________ of people in India will access internet using Tamil.
(a) 64%
(b) 42%
(c) 74%
(d) 94%
Answer:
(c) 74%

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 4.
By 2021, the number of _______ internet users will be more than English users.
(a) Hindi
(b) Tamil
(c) Malayalam
(d) Bengali
Answer:
(a) Hindi

Question 5.
Marathi, Bengali, Tamil and Telugu internet users are expected to form ______ of the total Indian language internet user base.
(a) 40%
(b) 30%
(c) 20%
(d) 50%
Answer:
(b) 30%

Question 6.
________ are used to search any information from the cyber space.
(a) Word processor
(b) Spreadsheet
(c) Data base
(d) Search Engines
Answer:
(d) Search Engines

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 7.
________ provide searching facilities in Tamil.
(a) Google and Playstore
(b) Google and Bing
(c) Google and rediff
(d) rediff and Bing
Answer:
(b) Google and Bing

Question 8.
_______ search engine gives us an inbuilt Tamil virtual keyboard.
(a) Google
(b) Yahoo
(c) Gmail
(d) Yahoomail
Answer:
(a) Google

Question 9.
Government services through internet is known as:
(a) e-commerce
(b) e-Governance
(c) e-mail
(d) website
Answer:
(b) e-Governance

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 10.
Official Website of Govt, of Tamilnadu:
(a) http://www.tnhealth.org/
(b) http://www.tn.gov.in/ta
(c) http://www.tnrd.gov.in/
(d) http://www.tnhrce.org/
Answer:
(b) http://www.tn.gov.in/ta

Question 11.
Tamilnadu Forest Department website is:
(a) https://www.gov.lk/index.php
(b) http://www.tnrd.gov.in/
(c) http://www.dge.tn.nic.in/
(d) https://www.forests.tn.gov.in/
Answer:
(d) https://www.forests.tn.gov.in/

Question 12. The website for Directorate of Govt. Examinations:
(a) http://www.tn.gov.in/ta
(b) http://www.tnrd.gov.in/
(c) http://www.tnhrce.org/
(d) http://www.dge.tn.nic.in/
Answer:
(d) http://www.dge.tn.nic.in/

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 13.
http://www.tnpsc.gov.in/ is an official website for:
(a) Department of Agricultural Engineering
(b) Backward, Most Backward and Minorities Welfare Department
(c) Tamil Nadu Public Service Commission
(d) Official Website of Govt, of Srilanka
Answer:
(c) Tamil Nadu Public Service Commission

Question 14.
The web address of Rural Development and Panchayat Raj Department is:
(a) http://www.tnrdprd.gov.in/
(b) http://www.tnhrce.org/
(c) http://www.tnrd.gov.in/
(d) http://www.bcmbcmw.tn.gov.in/
Answer:
(c) http://www.tnrd.gov.in/

Question 15.
http://www.bcmbcmw.tn.gdv.in/ is web address for:
(a) Backward, Most Backward and Minorities Welfare Department
(b) Tamil Nadu Public Service Commission
(c) Official Website of Govt, of Srilanka
(d) TamilNadu Health Department
Answer:
(a) Backward, Most Backward and Minorities Welfare Department

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 16.
E-Libraries are portal or website of collection of:
(a) e-commerce
(b) e-books
(c) e-libraries
(d) e-chat
Answer:
(b) e-books

Question 17.
_______ is a Tamil translation application.
(a) Thamizpori
(b) E-Kalappai
(c) Lippikar
(d) Ponmadal
Answer:
(a) Thamizpori

Question 18.
The first Tamil Programming language designed based on Python programming language is:
(a) Kamban
(b) Ezhil
(c) Vani
(d) Amudham
Answer:
(b) Ezhil

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 19.
The abbreviation of TSCII is:
(a) Tamil Script Code for Information Interchange
(b) Tamil Script Code for Internet Interchange
(c) Tamil Script Code for Internet Information
(d) Tamil Script Code for Ip Information
Answer:
(a) Tamil Script Code for Information Interchange

Question 20.
________ is the first coding system to handle Tamil language.
(a) ICANN
(b) ISO
(c) ASCII
(d) TSCII
Answer:
(d) TSCII

Question 21.
The expansion of IANA:
(a) Institute Assigned Numbers Authority
(b) Internet Assigned Numbers Authority
(c) Information Assigned Numbers Authority
(d) Indian Assigned Numbers Authority
Answer:
(b) Internet Assigned Numbers Authority

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 22.
The expansion for ISCII:
(a) Indian Script Code for Information Interchange
(b) Internet Script Code for Information Interchange
(c) Indus Script Code for Internet Information
(d) Individual Script Code for Internet Information
Answer:
(a) Indian Script Code for Information Interchange

Question 23.
_________ encoding system is designed to handle various world languages.
(a) Unicode
(b) Bhamini
(c) Arial
(d) Symbol
Answer:
(a) Unicode

Question 24.
The first version of Unicode was introduced on:
(a) November 1991
(b) October 1991
(c) October 1995
(d) December 1991
Answer:
(b) October 1991

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 25.
The first version of Unicode can handle nearly ______ languages.
(a) 50
(b) 23
(c) 40
(d) 30
Answer:
(b) 23

Question 26.
___________ is very popular operating system for personal computers.
(a) Linux
(b) Unix
(c) Microsoft Windows
(d) Android
Answer:
(c) Microsoft Windows

Question 27.
Tamil Virtual University was established on:
(a) 17th February 2003
(b) 17th February 2001
(c) 17th February 2005
(d) 17th February 2007
Answer:
(b) 17th February 2001

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 28.
________ is a open source encyclopedia.
(a) Wikipedia
(b) e-book
(c) e-mail
(d) Chat
Answer:
(a) Wikipedia

Question 29.
Identify the incorrect pair:

Column – I

 Column – II

(a) Google  Search Engine
(b) E – Libraries  Collection of e – books
(c) NHM writer  Tamil keyboard interfaces
(d) Ezhil  The first English programming language

Answer:
(d)

Question 30.
Identify the correct statement.
(a) Getting Government services through internet is known as e-leaming.
(b) The portal or website of collection of e-books are called e-commerce.
(c) Sellinam and ponmadal – are familiar Tamil keyboard layouts.
(d) ISCII is one of the encoding system to handle various world languages.
Answer:
(c) Sellinam and ponmadal – are familiar Tamil keyboard layouts.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 18 Tamil Computing

Question 31.
Choose the odd man out:
(a) NHM writer
(b) E-Kalappai
(c) Lippikar
(d) Ezhil
Answer:
(d) Ezhil

Question 32.
Choose the odd man out:
(a) Thamizpori
(b) Ponmozhi
(c) Menthamiz
(d) Kamban
Answer:
(a) Thamizpori

TN Board 11th Computer Science Important Questions

TN Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 1.
Define Ethics.
Answer:
Ethics means “What is wrong and What is Right”. It is a set of moral principles that rule the behaviour of individuals who use computers.

Question 2.
Write the standards that are followed in the cyber world.
Answer:
The standards followed in cyberworld are:

  1. Do not use pirated software
  2. Do not use unauthorized user accounts
  3. Do not steal others passwords
  4. Do not hack

Question 3.
Define computer ethics.
Answer:
Computer ethics deals with the procedures, values and practices that govern the process of consuming computer technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization or entity.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 4.
What is cyber crime?
Answer:
Cyber crime is an intellectual, white-collar crime. Those who commit such crimes generally manipulate the computer system in an intelligent manner.
Eg: illegal money transfer via internet.

Question 5.
What is cyber attack?
Answer:
Cyber attacks are launched primarily for causing significant damage to a computer system or for stealing important information from an individual or from an organization.

Question 6.
What do you mean by cyber security?
Answer:
Cyber security is a collection of various technologies, processes and measures that reduces the risk of cyber attacks and protects organizations and individuals from computer based threats.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 7.
Define Malware.
Answer:
Malware is a type of software designed through which the criminals gain illegal access to software and cause damage.

Question 8.
What are the two types of encryption?
Answer:
The two types of encryption schemes are:

  1. Symmetric Key encryption
  2. Public Key encryption

Question 9.
What do you mean by Digital signature?
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed by the signer.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 10.
What is cyber law?
Answer:
“Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet.

Question 11.
Write the types of cyber-crimes.
Answer:

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 1

Question 12.
Write a short note on unauthorized Access.
Answer:
Unauthorized access is when someone gains access to a website, program, server, service, or other system by breaking into a legitimate user account. For example, if someone tries guessing a password or username for an account that was not theirs until they gained access, it is considered an unauthorized access.

To prevent unauthorized access, Firewalls, Intrusion Detection Systems (IDS), Virus and Content Scanners, Patches and Hot fixes are used.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 13.
What is Hacking? Give the diagrammatic representation of hacking.
Answer:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system and altering its contents. It may be done in pursuit of a criminal activity or it may be a hobby.

Hacking may be harmless if the hacker is only enjoying the challenge of breaking systems defenses, but such ethical hacking should be practiced only as controlled experiments. Figure below shows a diagrammatic representation of Hacking.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 2

Question 14.
State some reasons why websites use cookies.
Answer:
Websites typically use cookies for the following reasons:

  1. To collect demographic information about who has visited the Website.
  2. Sites often use this information to track how often visitors comfe to the site and how long they remain on the site.
  3. It helps to personalize the user’s experience on the Web site.
  4. Cookies can help store personal information about users so that when a user subsequently returns to the site, a more personalized experience is provided.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 15.
Write a lote on public key encryption.
Answer:
Public key encryption is also called Asymmetric encryption. It uses the concept of a key value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

The private key is kept secret by the owner and the public key is either shared amongst authorized recipients or made available to the public at large.

The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key. Figure below shows the public key encryption.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 3

Question 16.
Write a short note on Asymmetric encryption in Digital certificate.
Answer:
A digital certificate in a client-server model of communication is an example of Asymmetric Encryption. A certificate is a package of information that identifies a user and a server. It contains information such as an organization’s name, the organization that issued the certificate, the user’s email address and country and user’s public key.

When a server and a client require a secure encrypted communication, they send a query over the network to the other party, which sends back a copy of the certificate. The other party’s public key can be extracted from the certificate. A certificate can also be used to uniquely identify the holder.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 17.
What do you mean by Information Technology Act?
Answer:
In the 21st century, Computer, Internet and ICT or e-revolution has changed the life style of the people. Today
paper based communication has been substituted by e-communication. Accordingly we have new terminologies like cyber world, e-transaction, e-banking, e-retum and e-contracts.

Apart from positive side of e-revolution there is also negative side of computer, that is, the internet and ICT in the hands of criminals which has become a weapon of offence. Accordingly a new panel of members emerged to tackle the problems of cyber crimes in cyber space i.e., Cyber Law or Cyber Space Law or Information Technology Law or Internet Law.

In India Cyber law and IT Act 2000, modified in 2008 are being articulated to prevent computer crimes. IT Act 2000 is an act to provide legal recognition for transactions carried out by means of Electronic Data Interchange (EDI) and other means of electronic communication. It is the primary law in India dealing with cybercrime and electronic commerce (e-commerce). e-Commerce is electronic data exchange or electronic filing of information.

Question 18.
Explain in detail about the cyber security threats in detail.
Answer:
Most of the individuals and enterprises are facing problems due to the weaknesses inherent in security systems and compromised organizational infrastructures. Different types of Cyber Security Threats are categorized as below:

Social engineering:
A misuse of an individual’s weakness, achieved by making them to click malicious links or by physically accessing the computer through tricks.
Eg: Phishing and pharming.

Phishing:
Phishing is a type of computer crime used to attack, steal user data, including login name, password and credit card numbers. It occurs when an attacker targets a victim into opening an e-mail or an instant text message. The attacker uses phishing to distribute malicious links or attachments that can perform a variety of functions, including the extraction of sensitive login credentials from victims.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 4

Pharming:
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent websites without their knowledge or permission. Pharming has been called “phishing without a trap”. It is another way hackers attempt to manipulate users on the Internet. It is a cyber-attack intended to redirect a website’s traffic to a fake site.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 5

Man In The Middle (MITM):
Man-in-the- middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Eg: Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the conversation to overhear and optionally to deliver a false message to Bob.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 6

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 19.
What are cookies? Why cookies are used in websites? Explain with example.
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet. It is also called HTTP cookie, web cookie, Internet cookie, browser cookie, or simply cookie. Websites use cookies for the following reasons:

  1. To collect demographic information about who has visited the Website.
  2. Sites often use this information to track how often visitors come to the site and how long they remain on the site.
  3. It helps to personalize the user’s experience on the Website.
  4. Cookies can help store personal information about users so that when a user subsequently returns to the site, a more personalized experience is provided.

Some online shopping sites will make recommendations to users based on their previous purchases. It helps to monitor advertisements. Cookies do not act maliciously on computer system. They are merely text files that can be deleted at any time.

Cookies cannot be used to spread viruses and they cannot access your hard drive. Any personal information that you provide to a Website, including credit card information, will most likely be stored in a cookie unless the cookie feature is explicitly turned off in your browser. This is the way in which cookies threaten privacy.

Question 20.
Explain the working of
(i) Firewall
(ii) Proxy servers
Answer:
(i) Firewall:
It is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules. A firewall establishes a block between a trusted internal computer network and entrusted computer outside the network.

They are categorized as network-based or host-based. Network based firewalls are positioned on the gateway computers of LANs [Local Area Network], WANs [Wide Area Network] and intranets. Host-based firewalls are positioned on the network node itself. The host-based firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.

Each has advantages and disadvantages. However, each has a role in layered security. Firewalls also vary in type depending on where communication originates, where it is intercepted, and the state of communication being traced.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 7

Proxy servers:
A proxy server acts as an intermediary between the end users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page or other resources available from a different server. The proxy server examines the request, checks authenticity and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in its cache which leads to improved response time.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 8

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 21.
Explain the function of Digital signature.
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging informed by the signer.

To create a digital signature, signing software (email) creates a one-way hash of the electronic data to be signed. The user’s private key to encrypt the hash, returning a value that is unique to the hashed data. The encrypted hash, along with other information such as the hashing algorithm, forms the digital signature.

Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer’s public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn’t changed since it was signed.

If the two hashes don’t match, the data has either been tampered with in some way (indicating a failure of integrity) or the signature was created with a private key that doesn’t correspond to the public key presented by the signer (indicating a failure of authentication). Figure below shows the function of a digital signature.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 9

Question 22.
Explain in detail about cracking.
Answer:
Cracking is where someone edits a program source so that the code can be exploited or modified. A cracker (also called a black hat or dark side hacker) is a malicious or criminal hacker. “Cracking” means trying to get into computer systems in order to steal, corrupt or illegitimately view data.

A cracker is someone who breaks into someone else’s computer system, often on a network, bypassing passwords or licenses in computer programs. Software cracking is the most often used type of cracking which is nothing but removing the encoded copyprotection. There is another type of cracking called password cracking. This is mainly used to crack the passwords. Password cracking can be performed either by using an automated program or can be manually realized.

Interesting fact about cracking is social engineering. It is a method of getting passwords and information using human weakness. These crackers trick people, not software. They can use just the phone forgetting information, they can pretend being your friend and talk to you on Internet Relay Chat (IRC) or by Instant messenger, e-mail can also be a source for them. They may send official e-mail requesting some sensitive information. It may look like a legitimate e-mail from bank or other official institution.

The other method that uses social engineering crackers is password guessing. They find your personal information from some personal data/facts and try to guess a password. Usually a cracker maintains knowledge of the vulnerabilities he or she finds and exploits them for personal advantage, not revealing them to either to the general public or to the manufacturer.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 23.
What is harvesting?
Answer:
A person or program collects login and password information from a legitimate user to illegally gain access to others account(s).

Question 24.
What are Warez?
Answer:
Commercial programs that are made available to the public illegally are called warez.

Question 25.
Write a short note on cracking.
Answer:
“Cracking” means trying to get into computer systems in order to steal, corrupt or illegitimately view data.

Question 26.
Write two types of cyber attacks.
Answer:
Worms:
They are self-repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Spyware:
It can be installed automatically on the computer when the attachments are open, by clicking on links or by downloading infected software.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 27.
What is a Cookie?
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet.

Question 28.
What is the role of firewalls?
Answer:
A firewall is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.

They are generally categorized as network- based or host-based. Network based firewalls are positioned on the gateway computers of LANs [Local Area Network], WANs [Wide Area Network] and intranets. Host-based firewalls are positioned on the network node itself. The host-based firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.

Each has advantages and disadvantages. However, each has a role in layered security. Firewalls also vary in type depending on where communication originates, where it is intercepted and the state of communication being traced.

Question 29.
Write about encryption and decryption.
Answer:
Encryption and decryption are processes that ensure confidentiality that only authorized persons can access the information.
Encryption is the process of translating the plain text data (plaintext) into random and mangled data (called cipher-text).
Decryption is the reverse process of converting the cipher-text back to plaintext. Encryption and decryption are done by cryptography.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 30.
Explain symmetric key encryption.
Answer:
Symmetric encryption is a technique to use the same key for both encryption and decryption. The main disadvantage of the symmetric key encryption is that all authorized users involved, have to exchange the key used to encrypt the data before they can decrypt it.

If any user intercepts the key information, they may read all messages. The working of symmetric key encryption:

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 10

Question 31.
What are the guidelines to be followed by any computer user?
Answer:
The following guidelines should be observed by computer users:

  1. Honesty: Users should be truthful while using the internet.
  2. Confidentiality: Users should not share any important information with unauthorized people.
  3. Respect: Each user should respect the privacy of other users.
  4. Professionalism: Each user should maintain professional conduct.
  5. Obey The Law: Users should strictly obey the cyber law in computer usage.
  6. Responsibility: Each user should take ownership andresponsibility for their actions.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 32.
What are ethical issues? Name some.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.

Some of the common ethical issues are:

  1. Cybercrime
  2. Software Piracy
  3. Unauthorized Access
  4. Hacking
  5. Use of computers to commit fraud
  6. Sabotage in the form of viruses
  7. Making false claims using computers.

Question 33.
What are the various crimes happening using computer?
Answer:

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 11

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 34.
What is piracy? Mention the types of piracy. How can it be prevented?
Answer:
Piracy is “unauthorized copying of software”. Figure below shows a diagrammatical representation of software piracy.

TN State Board 11th Computer Science Important Questions Chapter 17 Computer Ethics and Cyber Security 12

Most of the commercial software is licensed for use at a single computer site or for use by only one user at any time.When a user buys any software, he becomes a licensed user for that software. He is allowed to make copies of the program for backup purposes, but it is against the law to distribute duplicate copies to others. Such illegal copying and distribution of commercial software should not be practiced.

An entirely different approach to software piracy is called shareware, acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty. Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 35.
Write the different types of cyber attacks.
Answer:
Cyber Attacks and Functions:

Virus:

  1. A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.
  2.  Trojan virus is a program that appears to perform one function (for example, virus removal) but actually performs malicious activity when executed.

Worms:

  1. Worms are self- repeating and do not require a computer program to attach themselves.
  2. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Spyware:
Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.

Ransomware:

  1. Ransomware is a type of malicious program that demands payment after launching a cyber-attack @n a computer system.
  2. This type of malware has become increasingly popular among criminals and costs the organizations millions each year.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Choose the correct answer:

Question 1.
________ is a communication media which is easily accessible and open to all.
(a) Mobile
(b) TV
(c) Computer
(d) Internet
Answer:
(d) Internet

Question 2.
______ is wide spread through computers, mobile phones and internet.
(a) Information Technology
(b) Intranet
(c) LAN
(d) WAN
Answer:
(a) Information Technology

Question 3.
_____ play an important role in the daily lives of individuals and business.
(a) Computer
(b) Smart Phones
(c) Internet
(d) Tablets
Answer:
(a) Computer

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 4.
A ________ is a crime which involves computer and network.
(a) network crime
(b) system crime
(c) firewall
(d) cyber-crime
Answer:
(d) cyber-crime

Question 5.
__________ poses threats to the integrity, safety and survival of most business systems.
(a) Cyber-crime
(b) Cookies
(c) Firewall
(d) System crime
Answer:
(a) Cyber-crime

Question 6.
Ethics means:
(a) What is Right alone
(b) What is wrong and What is Right
(c) What is wrong alone
(d) None
Answer:
(b) What is wrong and What is Right

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 7.
__________ is becoming very popular among business as it helps them to reach a wide range of customers faster.
(a) e-commerce
(b) Hacking
(c) e-shopping
(d) Electronic mail
Answer:
(a) e-commerce

Question 8.
_________ users should not share any important information with unauthorized people.
(a) Confidentiality
(b) Professionalism
(c) Responsibility
(d) Honesty
Answer:
(a) Confidentiality

Question 9.
________ is an ethical issue.
(a) Data protection
(b) Data hiding
(c) Hacking
(d) Web application
Answer:
(c) Hacking

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 10.
Cyber crime is an ______ crime.
(a) Green-collar
(b) Red-collar
(c) Blue-collar
(d) White-collar
Answer:
(d) White-collar

Question 11.
_________ is an example for cyber crime.
(a) Legal money transfer in internet
(b) Chatting
(c) e-shopping
(d) Illegal money transfer in internet
Answer:
(d) Illegal money transfer in internet

Question 12.
______ is a set of moral principles that govern the behaviour of an individual in a society.
(a) Ethics
(b) Crime
(c) DPA
(d) Computer ethics
Answer:
(a) Ethics

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 13.
______ is a set of moral principles that regulate the use of computers by users.
(a) Trolling
(b) Computer ethics
(c) Computer crime
(d) Hacking
Answer:
(b) Computer ethics

Question 14.
Hacking, threats and blackmailing towards a business or a person is a:
(a) IT literacy
(b) Internet access
(c) Crime function
(d) Privacy
Answer:
(c) Crime function

Question 15.
Tricking people into that is not true is believing something that is not true is:
(a) scan
(b) scam
(c) share
(d) internet trolls
Answer:
(b) scam

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 16.
Distributing unwanted e-mail to a large number of internet users is:
(a) scam
(b) spam
(c) scan
(d) service
Answer:
(b) spam

Question 17.
_______ is a malicious practice in which communication is send from unknown source disguised as a source known to the receiver.
(a) Spoofing
(b) Spooling
(c) Copy righted
(d) Public-domain
Answer:
(a) Spoofing

Question 18.
Overloading a system with fake requests so that it cannot serve normal legitimate requests is:
(a) Denial of service attack
(b) Intellectual property theft
(c) Harvesting
(d) Cyber stalking
Answer:
(a) Denial of service attack

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 19.
Harassing through online is:
(a) Cyber taking
(b) Cyber stalking
(c) Computer crime
(d) Identity theft
Answer:
(b) Cyber stalking

Question 20.
Stealing tiny amounts of money from each transaction is:
(a) Salami slicing
(b) Spoofing
(c) Harvesting
(d) Malware
Answer:
(a) Salami slicing

Question 21.
Stealing practical or conceptual information developed by another person or company is:
(a) Denial of service attack
(b) Intellectual property theft
(c) Identity theft
(d) Fraud
Answer:
(b) Intellectual property theft

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 22.
Manipulating data, like changing the banking records to transfer money to an unauthorized account is:
(a) Stealing
(b) Fraud
(c) Harmful
(d) Theft
Answer:
(b) Fraud

Question 23.
________ is unauthorized copying of software.
(a) Crime function
(b) Cyber stalking
(c) Salami slicing
(d) Piracy
Answer:
(d) Piracy

Question 24.
________ acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty.
(a) Spyware
(b) Shareware
(c) Copyware
(d) Freeware
Answer:
(b) Shareware

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 25.
The expansion of IDS is:
(a) Intrusion Detection Systems
(b) Intrusion Data Systems
(c) Interaction Data Systems
(d) Intermediate Detection Systems
Answer:
(a) Intrusion Detection Systems

Question 26.
The expansion of IRC is:
(a) Interact Relay Chat
(b) Internet Relay Chat
(c) Internet Replay Chat
(d) Interact Replay Chat
Answer:
(b) Internet Relay Chat

Question 27.
A ________ is someone who breaks into someone else computer system, often on a network.
(a) cracker
(b) cyber attack
(c) virus
(d) hacking
Answer:
(a) cracker

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 28.
_______ can be installed on the computer automatically when the attachments are opened. .
(a) Spyware
(b) Ransomware
(c) Virus
(d) Worms
Answer:
(a) Spyware

Question 29.
______ is a type of malware that has become increasingly popular among criminals.
(a) Virus
(b) Worms
(c) Ransomware
(d) Spyware
Answer:
(c) Ransomware

Question 30.
__________ is a type of software designed through which the criminals gain illegal access to software and cause damage.
(a) Freeware
(b) Spyware
(c) Malware
(d) Ransomware
Answer:
(c) Malware

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 31.
Phishing and pharming are examples of:
(a) computer engineering
(b) network engineering
(c) software engineering
(d) social engineering
Answer:
(d) social engineering

Question 32.
_______ computer crime used to attack, steal user data, including login name, password and credit card numbers.
(a) Farming
(b) Phishing
(c) Crimes
(d) Trojan
Answer:
(b) Phishing

Question 33.
__________ is a scamming practice in which malicious code is installed on a personal computer or server.
(a) Phishing
(b) Pharming
(c) Scam
(d) Scanning
Answer:
(b) Pharming

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 34.
______ has been called “Phishing without a trap”.
(a) Cookie
(b) Pharming
(c) MITM
(d) Firewall
Answer:
(b) Pharming

Question 35.
The expansion of MITM:
(a) Money-in-the-middle
(b) Man-in-the-middle
(c) Middle-in-the-man
(d) Middle-in-the-money
Answer:
(b) Man-in-the-middle

Question 36.
The expansion of LAN is:
(a) Local Area Network
(b) Local Air Network
(c) Local Area Node
(d) List Area Network
Answer:
(a) Local Area Network

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 37.
The expansion of WAN is:
(a) Wide Area Network
(b) World Area Network
(c) Wide Area Node
(d) World Area Node
Answer:
(a) Wide Area Network

Question 38.
A _________ establishes a block between a trusted internal computer network and entrusted computer outside the network.
(a) cookies
(b) browsers
(c) firewall
(d) scam
Answer:
(c) firewall

Question 39.
A _________ server acts as an intermediary between the end users and a web server.
(a) client
(b) proxy
(c) firewalls
(d) cookies
Answer:
(b) proxy

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 40.
_______ typically keep the frequently visited site addresses in its cache which leads to improved response time.
(a) Client servers
(b) MITM
(c) Pharming
(d) Proxy servers
Answer:
(d) Proxy servers

Question 41.
________ is the process of translating the plain text data into random and mangled data.
(a) Encryption
(b) Decryption
(c) Translator
(d) Compiler
Answer:
(a) Encryption

Question 42.
Akey is a piece of information that determines the functional output of a cryptographic algorithm in:
(a) Cryptography
(b) Parameter
(c) Encryption
(d) Filters
Answer:
(a) Cryptography

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 43.
There are _________ types of encryption.
(a) two
(b) three
(c) four
(d) five
Answer:
(a) two

Question 44.
_______ encryption uses the same key for both encryption and decryption.
(a) Asymmetric key
(b) Symmetric key
(c) Public key
(d) Private key
Answer:
(b) Symmetric key

Question 45.
_________ key encryption is also called Asymmetric encryption.
(a) Auto
(b) Private
(c) Protected
(d) Public
Answer:
(d) Public

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 46.
The _______ key is kept secret by the owner.
(a) symmetric
(b) private
(c) protected
(d) cryptography
Answer:
(b) private

Question 47.
_________ key is either shared amongst authorized recipients.
(a) Public
(b) Protected
(c) Decrypted
(d) Encrypted
Answer:
(a) Public

Question 48.
A __________ in a client-server model of communication is one of the example of Asymmetric Encryption.
(a) digital certificate
(b) client certificate
(c) server certificate
(d) client-server certificate
Answer:
(a) digital certificate

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 49.
________ provides assurances of evidence to origin, identity and status of an electronic document.
(a) Hand signature
(b) Cyber signature
(c) Digital signature
(d) Key signature
Answer:
(c) Digital signature

Question 50.
The expansion for EDI is:
(a) Electrical Data Interchange
(b) Electronic Data Interchange
(c) Electrical Data Internet
(d) Electronic Data Internet
Answer:
(b) Electronic Data Interchange

Question 51.
Match the following:

(i) Ethics  (a) Electronic data exchange.
(ii) Cyber crime  (b) Asymmetric encryption.
(iii) Public key  (c) White collar crime
(iv) e commerce  (d) What is wrong and what is right.

(a) (i) – (a); (ii) – (b); (iii) – (d); (iv) – (c)
(b) (i) – (b); (ii) – (c); (iii) – (a); (iv) – (d)
(c) (i) – (d); (ii) – (c); (iii) – (b); (iv) – (a)
(d) (i) – (a); (ii) – (c); (iii) – (b)- (iv) – (d)
Answer:
(c) (i) – (d); (ii) – (c); (iii) – (b); (iv) – (a)

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 52.
Choose the odd man out:
(a) Honesty
(b) Confidentiality
(c) Responsibility
(d) Hacking
Answer:
(d) Hacking

Question 53.
Choose the correct statement about guidelines of ethics:
(a) Users should not be truthful while using the internet.
(b) Users should share any important information with unauthorised people.
(c) User should not maintain professional conduct.
(d) User should strictly obey the cyber law in computer usage.
Answer:
(d) User should strictly obey the cyber law in computer usage.

Question 54.
Choose the incorrect statement about ethics:
(a) Do not use unauthorised user accounts.
(b) Use pirated software only.
(c) Do not steel other’s passwords.
(d) Do not hack.
Answer:
(b) Use pirated software only.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 55.
Assertion (A):
Encryption and decryption are processes that ensure confidentiality that only authorized persons can access the information.
Reason (R):
Encryption is the process of converting the cipher- text back to plain text.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 56.
Which of the following deals with procedures, practices and values?
(a) Piracy
(b) Programs
(c) Virus
(d) Computer ethics
Answer:
(d) Computer ethics

Question 57.
Commercial programs made available to the public illegally are known as:
(a) freeware
(b) warez
(c) free software
(d) software
Answer:
(b) warez

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 58.
Which one of the following are self-repeating and do not require a computer program to attach themselves?
(a) Viruses
(b) Worms
(c) Spyware
(d) Trojans
Answer:
(b) Worms

Question 59.
Which one of the following tracks a user visits a website?
(a) Spyware
(b) Cookies
(b) Cookies
(d) Trojans
Answer:
(b) Cookies

Question 60.
Which of the following is not a malicious program on computer systems?
(a) Worms
(b) Trojans
(c) Spyware
(d) Cookies
Answer:
(d) Cookies

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 61.
A computer network security that monitors and controls incoming and outgoing traffic is:
(a) Cookies
(b) Virus
(c) Firewall
(d) Worms
Answer:
(c) Firewall

Question 62.
The process of converting cipher text to plain text is called:
(a) Encryption
(b) Decryption
(c) Key
(d) Proxy server
Answer:
(b) Decryption

Question 63.
e-commerce means:
(a) electronic commerce
(b) electronic data exchange
(c) electric data exchange
(d) electronic commercialization.
Answer:
(a) electronic commerce

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 17 Computer Ethics and Cyber Security

Question 64.
Distributing unwanted e-mail to others is called:
(a) scam
(b) spam
(c) fraud
(d) spoofing
Answer:
(b) spam

Question 65.
Legal recognition for transactions are carried out by:
(a) Electronic Data Interchange
(b) Electronic Data Exchange
(c) Electronic Data Transfer
(d) Electrical Data Interchange
Answer:
(a) Electronic Data Interchange

TN Board 11th Computer Science Important Questions

TN Board 11th Computer Science Important Questions Chapter 16 Inheritance

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance

Question 1.
What is derived class?
Answer:
A class that inherits from a superclass is called a subclass or derived class

Question 2.
Write the advantages of inheritance.
Answer:
The main advantages of inheritance are:

  1. It represents real world relationships well
  2. It provides reusability of code (Hi) It supports transitivity

Question 3.
What are the different types of inheritance?
Answer:
The different types of inheritance are Single Inheritance, Multiple inheritance, Multilevel inheritance, hybrid inheritance and Hierarchical inheritance.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 4.
What is Hybrid inheritance?
Answer:
When there is a combination of more than one type of inheritance, it is known as hybrid inheritance. Hence, it may be a combination of Multilevel and Multiple inheritance or Hierarchical and Multilevel inheritance or Hierarchical, Multilevel and Multiple inheritance.

Question 5.
What is the use of ‘this’ pointer?
Answer:
‘this’ pointer is a constant pointer that holds the memory address of the current object. It identifies the currently calling object. It is useful when the argument variable name in the member function and the data member name are same. To identify the data member it will be given as this→data member name.

Question 6.
Give the use of scope resolution operator in derived class with example.
Answer:
In inheritance the member function of the base class and derived classes have the same name. If the derived class object calls
t1.1oo( );
t2.1oo( );
}
Output:
5 5
5 5

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 7.
Give the example for executing the order of constructors and destructors.
Answer:
When an object of the derived class is created, the compiler first calls the base class constructor and then the constructor of the derived class. This is because the derived class is built up on the members of the base class. When the object of a derived class expires first the derived class destructor is invoked followed by the base class destructor.
The order of constructors and destructors.
#include<iostream>
using namespace std;
class base
{
public:
base ( )
{
cout<<“:\nConstructor of base class . . .”;
}
~ base ( )
{
cout<<“\nDestructor of base class . . .”;
}
};
class derived:public base
{
public :
derived( )
{
cout<<“\nConstructor of derived . . .”;
}
~ derived( )
{
cout<<“\nDestructor of derived . . .”;
}
};
class derived1 :public derived
{
public :
derived1( )
{
cout<<“\nConstructor of derived1 . . .”;
}
~ derived1( )
{
cout<<“\nDestructor of derived1 . . .”;
}
};
int main( )
{
derived1 x;
return 0;
}
Output:
Constructor of base class…
Constructor of derived …
Constructor of derived1 …
Destructor of derived1 …
Destructor of derived …
Destructor of base class….

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 8.
What is single inheritance? Give example.
Answer:
When derived class inherits only from one base class, it is known as single inheritance. Though the derived class inherits all the members of base class, it has access privillege only to non-private members of the base class.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 1

Program to illustrate single inheritance:
#include<iostream>
using namespace std;
class student //base class
{
private :
char name[20];
int rno;
public:
void acceptname( )
{
cout<<“\n Enter roll no and name . . .”;
cin>>rno>>name;
}
void displayname( )
{
cout«”\n Roll no :-“<<rno;
cout<<“\n Name : -“<<name<<endl;
}
};
class exam : public student
//derived class with single base class
{
public:
int mark1, mark2, mark3, mark4, mark5, mark6, total;
void acceptmark( )
{
cout<<“\n Enter lang, eng, phy, che, esc, mat marks . .”;
cin>>markl>>mark2>>mark3>>mark4> >mark5>>mark6 ;
}
void displaymark( )
{
cout<<“\n\t\t Marks Obtained”;
cout<<“\n Language..”<<mark1;
cout<<“\n English..”<<mark2;
cout<<“\n Physics..”<<mark3;
cout<<“\n Chemistry. ,”<<mark4;
cout<<“\n Comp . sci . . “<<mark5;
cout<<“{\n Maths..”<<mark6;
}
};
int main( )
{
exam e1;
e1.acceptname( ); //calling base class function using derived class object el.acceptmark( ) ;
e1.displayname( ); //calling base class function using derived class object el.displaymark( ) ;
return 0;
}
Output:
Enter roll no and name.. 1201 KANNAN
Enter lang, eng, phy, che, esc, mat marks.. 100 100 100 100 100 100
Roll no:- 1201
Name:- KANNAN
Marks Obtained Language.. 100
English .. 100
Physics .. 100
Chemistry.. 100
Comp.sci.. 100
Maths .. 100

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 9.
What is Multiple Inheritance? Give example.
Answer:
When a derived class inherits from multiple base classes it is known as multiple inheritance.
Program to illustrate Multiple inheritance:
The order of inheritance by derived class to inherit the base class is left to right

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 2

#include<iostream>
using namespace std;
class student //base class
{
private:
char name[20];
int rno;
public:
void acceptname( )
{
cout<<“\n Enter roll no and name . .”;
cin>>rno>>name;
}
void displayname( )
{
cout<<“\n Roll no :-“<<rno;
cout<<“\n Name :-“<<name<<endl;
;
}
};
class detail //Base class
{
int dd, mm, yy;
char cl [4];
public:
void acceptdob( )
{
cout<<“\n Enter date,month,year in digits and class . .”;
cin>>dd>>mm>>yy>>cl;
}
void displaydob( )
{
cout<<“\n class :-“<<cl;
cout<<“\t\t DOB: “<<dd<<“-” <<mm<<“-“<<yy<<endl;
}
};
class exam : public student, public detail
//derived class with multiple base class
{
public:
int mark1, mark2, mark3, mark4, mark5, mark6, total;
void acceptmark( )
{
cout<<“\n Enter lang, eng, phy, che, esc, mat marks..”;
cin>>mark1>>mark2>>mark3>>mark4>>mark5>>mark6;
}
void displaymark( )
{
cout<<“\n\t\t Marks Obtained”;
cout<<“\n Language..”<<mark1;
cout<<“\n English .. “<<mark2 ;
cout<<“\n Physics . . “<<mark3;
cout<<“\n Chemistry..”<<mark4;
cout<<“\n Comp.sci..”<<mark5;
cout<<“\n Maths..”<<mark6;
}
};
int main( )
{
exam e1;
e1.acceptname( ); //calling base class function using derived class object
e1.acceptdob( ); //calling base
class function using derived class object el.acceptmark( );
e1.displayname( ); //calling base class function using derived class object
e1.displaydob( ); //calling base class function using derived class object
e1.displaymark( );
return 0;
}
Output:
Enter roll no and name .. 1201 MEENA
Enter date,month,year in digits and class..7 12 2001 XII
Enter lang,eng,phy,che,esc,mat marks.. 96 98 100 100 100 100
Roll no :-1201
Name :- MEENA
class :-XII
DOB : 7-12-2001
Marks Obtained
Language.. 96
English .. 98
Physics .. 100
Chemistry.. 100
Comp.sci.. 100
Maths .. 100

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 10.
Differentiate Inheritance and polymorphism.
Answer:

Inheritance

 Polymorphism

Inheritance is creating a class that derives its feature from an already existing class.  Polymorphism is an interface that can be defined in multiple forms.
It is implemented on the classes.  It is implemented on methods/functions.
As inheritance allows a derived class to use the elements and methods defined in the base class, the derived class does not need to define those elements or method it again, So it increases the code reusability and hence, reduce the length of the code.  Polymorphism makes it possible for an object to decide what form of the method it wants to invoke at both compile time and run time.
It can be classified as single inheritance, multiple inheritance, multi level inheritance, hierarchical inheritance and hybrid inheritance.  It is classified as overloading and overriding.

Question 11.
Consider the following C++ code and answer the question from (i) to (iv).
Answer:
class shop
{
int Id;
char Name[20]
protected:
float Qty;
public:
shop( );
void Enter_details( );
void View_details();
};
class salesman
{
int Dcode;
protected:
char Manager[20]
public:
sale( );
salesman( );
void Enter_details( );
void View_details( );
};
class sale : public shop, private salesman
{ .
char Name[20], Location[20];
public:
sale( );
void Enter_All( );
void View_All( );
};
(i) Which type of inheritance out of the following is illustrated in the above example?
(ii) Write the names of all the data members, which are directly accessible from the member functions class sale().
(iii) Write the names of all the member functions, which are directly accessible by an object of class sale.
(iv) Which will be the order of execution of the constructors, when an object ©f class sale is declared?
Answer:
(i) Multiple Inheritance
(ii) Name, Location, Manager, Qty
(iii) Enter_MI( ),View_MI( ),Enter_Dttails( ), View_Details( )
(iv) shop( ), salesman( ), sale( ).

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 12.
Explain the significance of different visibility mode for the program given below.
//Implementation of Single Inheritance using public visibility mode
#include <iostream>
using namespace std;
class Shape
{
private:
int count;
protected:
int width;
int height;
public:
void setWidth(int w)
{
width = w;
}
void setHeight(int h)
{
height = h;
} };
class Rectangle: publicShape
{
public:
int getArea( )
{
return (width * height);
}
};
int main( )
{
Rectangle Rect;
Rect.setWidth(5);
Rect.setHeight(7);
// Print the area of theobject.
cout<< “Total area:”<<Rect.getArea( )<<endl;
return 0;
}
Output:
Total area: 35
The following table contains the members defined inside each class before inheritance.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 3

The following table contains the details of members defined after inheritance.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 4

Suppose the class rectangle is derived with protected visibility then the properties of class rectangle will change as follows:

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 5

In case the class rectangle is derived with private visibility mode from its base class shape then the property of class rectangle will change as follows:

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 6

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 13.
Explain the concept of hybrid inheritance with example.
Answer:
Program to illustrate hybrid inheritance:

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 7

#include<iostream>
using namespace std;
class student //base class
{
private:
char Name [20];
int rno;
public:
void acceptname( )
{
cout<<“\n Enter roll no and name . . . “;
cin>>rno>>name;
}
void displacement( )
{
cout«”\n Roll no :-“«rno;
Cout<C’\n Name :-“«name«endl;
class exam : public student I/derived class with single base class
public:
mt markl,mark2,mark3,mark4,
mark5, mark6;
void acceptmark( )
cout<<”\n Enter lang,eng,phy,che,csc,mat marks. .“;
cin>>mark1>>mark2>>mark3>>mark4>>mark5>>mark6;
void displaymark( ) {
cout<<’\n\t\t Marks Obtained”;
cout<<”\n Language. .“<<markl;
cout<<’\n English. .“<<mark2;
cout<<”\n Physics. . “<<mark3;
cout<<”\n Chemistry. . “<<mark4;
cout<C’\n Comp.sci. .“<<markS;
cout<<”\n Maths. . “<<mark6;
}
};
class detail //base class 2
irit dd, mm, yy;
char cl[4];
public:
void acceptdob( )
{
cout<<”\n Enter date,month,year in digits and class. .“;
cin>>dd>>mm>>yy>>cl;
}
void diplaydob( )
{
cout<<”\n class:—”<<cl;
coutc<<”\t\t DOB: “<<dd<<”—”<<mm<<”-”<<yy<<endl;
}
};
class result : public exam,public detail I/inherits from exam ,which itself is a //derived class and also from class detail
{
int total;
public:
void showresult( )
{
total=mark1+mark2+mark3+mark4+mark5+mark6;
cout<<” \nTOTAL MARK SCORED: “<<total ;
}
};
int main( )
{
result r1;
r1.acceptname( ); //calling base class function using derived class object
r1.acceptmark( ); //calling base class which itself is a derived class function using its derived class object •
r1.acceptdob( );
cout<<“\n\n\t\t MARKS STATEMENT”;
r1.displayname( ); //calling base class function using derived class object
r1.displaydob( );
r1.displaymark( ); //calling base class which itself is a derived class function using its derived class object r1.showresult( ); //calling the child class function return 0;
}
Output:
Enter roll no and name.. 1201 RAGU
Enter lang,eng,phy,che,esc,mat marks..96 98 100 100 100 100
Enter date,month,year in digits and class.. 7 12 2001 XII MARKS STATEMENT
Roll no :-1201
Name :-RAGU
class :-XII
DOB : 7-12-2001
Marks Obtained
Language.. 96
English .. 98
Physics .. 100
Chemistry.. 100
Comp.sci.. 100
Maths .. 100
TOTAL MARK SCORED : 594
In the above program the derived class “result” has acquired the properties of class “detail” and class “exam” which is derived from “student”. So this inheritance is a combination of multi level and multiple inheritance and so it is called hybrid inheritance.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 14.
Explain the concept of hierarchical inheritance.
Answer:
Program to illustrate Hierarchical inheritance:

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 8

#include<iostream>
using namespace std;
class student //base class
{
private:
char name[20];
int rno;
public:
void acceptname( )
{
cout<<“\n Enter roll no and name . . .”;
cin>>rno>>name;
}
void displayname( )
{
cout<<“\n Roll no:-“<<rno;
cout<<“\n Name: -“<<name<<endl;
} .
};
class qexam : public student //derived class with single base class
{
public:
int mark1, mark2, mark3, mark4, mark5, mark6;
void acceptmark( )
{
cout<<“\n Enter lang, eng, phy, che, esc, mat marks for quarterly exam..”; cin>>mark1>>mark2>>mark3>>mark4>>mark5>>mark6;
}
void displaymark( )
{
cout<<“\n\t\t Marks Obtained in quarterly”;
cout<<“\n Language. . “<<mark1;
cout<<“\n English ..”<<mark2;
cout<<“\n Physics ..”<<mark3;
cout<<“\n Chemistry.. “<<mark4;
cout<<“\n Comp. sci . . “<<mark5;
cout<<“\n Maths..”<<mark6;
}
};
class exam : public student //derived class with single base class
{
public:
int mark1, mark2, mark3, mark4, mark5, mark6;
void acceptmark( )
{
cout<<“\n Enter lang, eng, phy, che, esc, mat marks for halfyearly exam..”; cin>>mark1>>mark2>>mark3>>mark4>>mark5>>mark6;
}
void displaymark( )
{
cout<<“\n\t\t Marks Obtained in Halfyearly”;
cout<<“\n Language.. “<<mark1;
cout<<“\n English.. “<<mark2;
cout<<“\n Physics..”<<mark3;
cout<<“\n Chemistry.. “<<mark4;
cout<<“\n Comp. sci .. “4<mark5;
};
int main( )
{
qexam q1;
hexam h1;
ql.acceptname ( ); //calling base class function using derived class object
ql.acceptmark( ); //calling base class function
hi.acceptname( ); //calling base class function using derived class object
hi.displayname( );//calling base class function using derived class object .
hi.acceptmark( ) ;
hi.displaymark( ); //calling base class function using its //derived class object
return 0;
}
Output:
Enter roll no and name .. 1201 KANNAN
Enter lang,eng,phy,che,esc,mat marks for quarterly exam.. 95 96 100 98 100 99
Roll no :-1201
Name :-KANNAN
Marks Obtained in quarterly
Language.. 95
English .. 96
Physics .. 100
Chemistry.. 98
Comp.sci.. 100
Maths .. 99
Enter roll no and name .. 1201 KANNAN
Enter lang,eng,phy,che,esc,mat marks for halfyearly exam..
96 98 100 100 100 100 Roll no :-1201
Name:- KANNAN .
Marks Obtained in Halfyearly
Language.. 96
English .. 98
Physics .. 100
Chemistry.. 100
Comp.sci.. 100
Maths .. 100
In the above program, the class “qexam” and “hexam” are derived from class “student”. Here for single base class more than one derived class. So this comes under hierarchical inheritance.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 15.
Explain the concept of multilevel inheritance. Illustrate with an example.
Answer:
In multilevel inheritance, the level of inheritance can be extended to any number of level depending upon the relation. Multilevel inheritance is similar to relation between Grand Father, Father and child.
Program to illustrate multilevel inheritance:

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 9

#include<iostream>
using namespace std;
class student //base class
{
private: char name[20]; int rno; public:
void acceptname( )
cout<<“\n Enter roll no and name..”;
cin>>rno>>name;
}
void displayname( )
{
Multilevel Inheritance
cout<<“\n Roll no:-“<<rno;
cout<<“\n Name :-“<<name<<endl;
}
};
class exam : public student //derived class with single base class
{
public:
int mark1, mark2, mark3, mark4, mark5, mark6;
void acceptmark( )
{
cout<<“\nEnter lang,eng,phy,che,esc,mat marks..”;
cin>>markl>>mark2>>mark3>>mark4>>mark5>>mark6;
}
void displaymark( )
{
cout<<“\n\t\t Marks Obtained”;
cout<<“\n Language. . .”<<mark1;
cout<<“\n English…”<<mark2;
cout<<“\n Physics… “<<mark3;
cout<<“\n Chemistry. .. “<<mark4;
cout<<“\n Comp.sci. . . “<<mark5;
cout«”\n Maths… “<<mark6;
}
} ;
class result : public exam
{
int total; public
void showresult( )
{
total=mark1+mark2+mark3+mark4 +mark5+mark6;
cout<<“\nTOTAL MARK SCORED :” «total;
}
};
int main( )
{
result r1;
rl.acceptname( ); //calling base class function using derived class object
rl.acceptmark( ); //calling base class function which itself is a derived
// class function using its derived class object
rl.displayname( ); //calling base class function using derived class object
rl.displaymark( ); //calling base class function which itself is a ‘ derived
//class function using its derived class object rl.showresult(); //calling the child class function return 0;
}
Output:
Enter roll no and name .. 1201 SARATHI
Enter lang,eng,phy,che,esc,mat marks.. 96 98 100 100 100 100
Roll no :-1201
Name .–SARATHI
Marks Obtained
Language… 96
English… 98
Physics … 100
Chemistry… 100
Comp.sci… 100
Maths… 100
TOTAL MARK SCORED: 594
In the above program, class “result” is derived from class “exam” which itself is derived from class student.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 16.
All the banks operating in India are controlled by RBI. RBI has set certain guidelines (e.g. minimum interest rate, minimum balance allowed, maximum withdrawal limit etc.,) for all banks to follow. For example, suppose RBI has set minimum interest rate applicable to a saving bank account to be 5% annually; however, banks are free to use 5% interest rate or to set any rates above it.

Write a program to implement bank functionality in the above scenario. Note: Create few classes namely Customer, Account, RBI (Base Class) and few derived classes (SBI, ICICI, PNB, IOB etc.,). Assume and implement required member variables and functions in each class.
Hint:
class Customer
{
//Personal Details…
// Few functions…
}
class Account
{
// Account Detail…
//Few functions…
}
}
class RBI
{
Customer c;//hasA relationship
Account a; //hasA relationship
Public double GetlnterestRate( ) { }
Public double GetWithdrawalLimit( ) { }
}
class SBI: public RBI
{
//Use RBI functionality or define own functionality.
}
class ICICI: public RBI
{
//Use RBI functionality or define own functionality.
}
class IOB: public RBI
{
//Use RBI functionality or define own functionality.
}
Answer:
class customer
{
char c_name[20];
char c_address[30];
int c_phoneno;
public:
void get_customerinfo( )
{
cout<<“\nEnter customer name”<<endl; cin>>c name;
cout<<“\n Enter Customer Address”<<endl; cin>>c_address;
cout<<“\n Enter Customer phone No”<<endl;
cin>>c_phoneno ;
}
void display_customerinfo( )
{
cout<<“Displaying Customer information”<<endl;
cout<<“Custo.mer Name:” <<c_name;
cout<<“Customer Address:” <<c_address;
cout<<“Customer Phone No:” <<cphoneno;
}
class Account
{
char b_name[20];
int account_no;
float balance;
public:
void get_accountinfo ( )
{
_cout<<“Enter Bank Name”<<endl;
cin>>b_name;
cout<<“Enter Account Number”<<endl;
cin>>account_no;
}
};
};
class RBI:Public customer
{
float balance;
public:
double get_withdrawal limit( )
{
float w_amount;
cout<<“\n Enter with draw amount”<<endl;
if(balance-w_amount<1000)
{
cout<<“With draw amount is not possible”<<endl ;
}
balance=balance-w_amount;
}
double interestrate ( )
{
float interest;
interest=(balance*5)/100;
balance=balance+interest;
}
};
class SBI : public RBI
{
int amount;
public: .
SBI(int a)
{
amount = a;
}
int getBalance( )
{
return amount;
}
};
class ICICI : public RBI
{
int amount;
public:
ICICI (int a)
{
amount = a;
}
int getBalance( )
{
return amount;
}
};
class IOB : public RBI
{
int amount;
public:
IOB(int a)
{
amount = a;
}
int getBalance( )
{
return amount;
}
} ;

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 17.
Write a class for a class Stock.
(i) – Each Stock has a data member which holds the net price, and a constructor which sets this price.
– Each Stock has a method get_Price(), which calculates and returns the gross price (the gross price includes VAT at 21%).
Answer:
class Stock
{
private:
float netprice;
public:
Stock (float P)
{
netprice=P;
}
void get_price( )
{
float grossprice, tax;
tax=netprice*21/100;
grossprice=netprice+tax;
cout<<“\n Net Price”<<netprice<<endl;
cout<<“\nTax Amount: “<<tax<<endl;
cout<<“Gross Price: “<<grossprice;
}
};

(ii) Write 2 classes which inherit from the general Stock class, of type Notebook and Book.
– The gross price for Notebook includes tax at 21%.
– Books are free of tax, so the gross price is unchanged from the net price, and you will need to re-define the getGrossPrice method in this class.
Answer:
class Stock
{
public:
float netprice;
Stock (float P)
{
netprice=P;
}
};
class Book : public Stock
{
void get_price()
{
float grossprice,tax; tax=netprice*21/100;
grossprice=netprice+tax;
cout<<“\n Net Price”<<netpr ice<<endl;
cout<<“\nTax Amount: “<<tax<<endl;
cout<<-“Gross Price: “<<grossprice;
}
};
class notebook : public Stock
{
void get_price( )
{
float grossprice;
grossprice=netprice;
cout<<“Gross Price:”<<grossprice;
}

(iii) Write a program which does the following;
(a) Declare an array of 10 objects to Stock.
(b) Declare a object to a Book and an object to Notebook.
(c) Ask the user to enter details of the book, and of the Notebook item.
(d) Check your method getGrossPrice works correctly with each type and then display the result.
Answer:
#include<iostream>
using namespace std;
class stock
{
int Bookcode;
float qty;
float price;
void totalcost( )
{
float tcost;
tcost=price*qty;
cout<<tcost;
}
public:
void bookdetails( )
{
cout<<“Enter the Quantity”<<endl;
cin>>qty;
cout<<“Enter Price”<<endl; .
cin>>price; display( );
}
void display( )
{
cout<<“\nTotal Cost is”<<endl;
totalcost ( );
}
}s[10] ;
int main( )
{
Stock bo,no;
cout<<“\nBook Details”<<endl;
bo.bookdetails( );
cout<<“\nNote book Details”<<endl;
no.bookdetails( );
return 0;
}

Question 18.
What is inheritance?
Answer:
Inheritance is an important feature of object oriented programming used for code reusability. It is a process of creating new classes called derived cljisses, from the existing or base classes. Inheritance allows to inherit all the code (except declared as private) of one class to another class.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 19.
What is a base class?
Answer:
A class that is used as the basis for inheritance is called a super class or base class.

Question 20.
Why derived class is called power packed class?
Answer:
The derived class is a power packed class, as it can add additional attributes and methods and thus enhance its functionality.

Question 21.
In what, multilevel and multiple inheritance differ though both contains many base class?
Answer:

Multilevel inheritance

 Multiple inheritance

The level of inheritance can be extended to any number of level depending upon the relation. Multilevel inheritance is similar to relation between Grand Father, Father and child.  The base classes do not have any relationship between them. However the derived class acquires all the properties of both the class.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 22.
What is the difference between public and private visibility mode?
Answer:
When a base class is inherited with public visibility mode, the protected members of the base class will be inherited as protected members of the derived class and the public members of the base class will be inherited as public members of the derived class.
When a base class is inherited with private visibility mode the public and protected members of the base class become ‘private’ members of the derived class.

Question 23.
What are the points to be noted while deriving a new class?
Answer:
(i) The keyword class has to be used.
(ii) The name of the derived class is to be given after the keyword class.
(iii) A single colon
(iv) The type of derivation (the visibility mode), namely private* public or protected. If no visibility mode is specified, then by default the visibility mode is considered as private.
(v) The names of all base classes (parent classes) separated by comma.
class derived_class_
name:visibility_mode base_ class_name
{
// members of derivedclass
};

Question 24.
What is difference between the members present in the private visibility mode and the members present in the public visibility mode?
Answer:
When a base class is inherited with public visibility mode, the protected members of the base class will be inherited as protected members of the derived class and the public members of the base class will be inherited as public members of the derived class.
When a base class is inherited with private visibility mode the public and protected members of the base class become ‘private’ members of the derived class.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 25.
What is the difference between polymorphism and inheritance though are used for reusability of code?
Answer:
Polymorphism:
Allows object to decide which Inheritance: Allows a derived class to use the elements and methods defined in the base class. The derived class does not need to define those elements or methods in it again. So it increases the code reusability and hence reduces the length of the code.

Inheritance:
Allows a derived class to use the elements and methods defined in the base class. The derived class does not need to define those elements or methods in it again. So it increases the code reusability and hence reduces the length of the code.

Question 26.
What do you mean by overriding?
Answer:
When a derived class member function has the same name as that of its base class member function, the derived class member function shadows/hides the base class’s inherited function. This situation is called function overriding and this can be resolved by giving the base class name followed by :: and the member function name.

Question 27.
Write some facts about the execution of constructors and destructors in inheritance.
Answer:
(i) Base class constructors are executed first, before the derived class constructors execution.
(ii) Derived class cannot inherit the base class constructor but it can call the base class constructor by using,
Base_case name: :base_class_constructor() in derived class definition.
(iii) If there are multiple base classes, then it starts executing from the left most base class.
(iv) In multilevel inheritance, the constructors will be executed in the order of inheritance.
(v) Destructors are executed in the reverse order of inheritance.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 28.
Explain the different types of inheritance.
Answer:
There are different types of inheritance viz., Single inheritance, Multiple inheritance, Multilevel
inheritance, Hybrid inheritance and Hierarchical inheritance.
(i) Single Inheritance:
When a derived class inherits only from one base class, it is known as single inheritance.

(ii) Multiple Inheritance:
When a derived class inherits from multiple base classes it is known as multiple inheritance.

(iii) Hierarchical inheritance:
When more than one derived classes are created from a single base class, it is known as Hierarchical inheritance.

(iv) Multilevel Inheritance:
The transitive nature of inheritance is itself reflected by this form of inheritance. When a class is derived from a class which is a derived class – then it is referred to as multilevel inheritance.

(iv) Hybrid inheritance:
When there is a combination of more than one type of inheritance, it is known as hybrid inheritance. Hence, it may be a combination of Multilevel and Multiple inheritance or Hierarchical and Multilevel inheritance or Hierarchical, Multilevel and Multiple inheritance.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 10

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 29.
Explain the different visibility mode through pictorial representation.
Answer:
An important feature of Inheritance is to know which member of the base class will be acquired by the derived class. This is done by using visibility modes. The accessibility of base class by the derived class is controlled by visibility modes. The three visibility modes are private, protected and public. The default visibility mode is private. Though visibility modes and access specifiers look similar, the main difference between them is Access specifiers control the accessibility of the members with in the class where as visibility modes control the access of inherited members with in the class.

Private visibility mode:
When a base class is inherited with private visibility mode, the public and protected members of the base class become ‘private’ members of the derived class.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 11

Protected visibility mode:
When a base class is inherited with protected visibility mode the protected and public members of the base class become ‘protected members’ of the derived class.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 12

Public visibility mode:
When a base class is inherited with public visibility mode, the protected members of the base class will be inherited as protected members of the derived class and the public members of the base class will be inherited as public members of the derived class.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 13

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 30.
#include<iostream>
#include<string.h>
#include<stdio.h>
using name spacestd;
class publisher
{
char pname[15];
char hoffice[15];
char address[25];
double turnover;
protected:
char phone[3][10];
void register( );
public:
publisher( );
~publisher( );
void enter data( );
void disp data( );
};
class branch
class author: public branch, publisher
{
intaut_code;
charaname[20];
float income;
public:
author( );
~author( );
voidgetdata( );
voidputdata( );
};
Answer the following questions based on the above given program:
3.1 Which type of Inheritance is shown in the program?
3.2 Specify the visibility mode of base classes.
3.3 Give the sequence of Constructor/ Destructor Invocation when object of class author is created.
3.4 Name the base class(/es) and derived class (/es).
3.5 Give number of bytes to be occupied by the object of the following class:
(i) publisher
(ii) branch
(iii) author
3.6 Write the names of data members accessible from the object of class author.
3.7 Write the names of all member functions accessible from the object of class author.
3.8 Write the names of all members accessible from member functions of class author.
Answer:
3.1. Multiple Inheritance
3.2. Visibility mode publishes and Branch is public.

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 14

3.3.
publisher ( )
branch ( )
author ( )
~ author ( )
~ branch ( )
~ publisher ( )

3.4
Base classes: publisher, branch
Derived class: author

3.5
(i) publisher

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 15

(ii) branch

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 16

(iii) author

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 17

3.6. DataMember

publisher::phone[3] [10]
branch::bphone[2][10]
branch::no_of_emp
author::aut_code
author::name[20]
author::income

3.7. Member functions
publisher::register( )
publisher::enterdata( )
publisher::dispdata( )
branch::havedata( )
branch::givedata( )
author::getdata( )
author::putdata( )

3.8

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 18

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 31.
Consider the following C++ code and answer the questions.
class Personal
{
int Class,Rno;
char Section;
protected:
char Name[20];
public: personal( );
void pentry( );
void Pdisplay( );
};
class Marks:private Personal
{
float M{5};
protected:
char Grade[5];
public:
Marks( );
void M_entry( );
void M_display( );
};
class Result:
public Marks
{
float Total, Agg;
public:
char FinalGrade, Commence[20];
Result( );
void R_calculate( ) ;
void R_display( );
}:
4.1 Which type of Inheritance is shown in the program?
4.2 Specify the visibility mode of base classes.
4.3 Give the sequence of Constructor/ Destructor Invocation when object of class Result is created.
4.4 Name the base class(/es) and derived class (/es).
4.5 Give number of bytes to be occupied by the object of the following class:
(i) Personal (ii) Marks (iii) Result
4.6 Write the names of data members accessible from the object of class Result.
4.7 Write the names of all member functions accessible from the object of class Result.
4.8 Write the names of all members accessible from member functions of class Result.
Answer:
4.1. Multilevel Inheritance
4.2. Private for Personal Public for marks
4.3.
constructors
Personal( )
Marks( )
Result( )
Default destructors are executed
4.4.
Base class: Personal
Derived class: Marks, Result
4.5.
(i) Personal

TN State Board 11th Computer Science Important Questions Chapter 14 Classes and Objects 1

(ii) Marks

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 20

(iii) Result

TN State Board 11th Computer Science Important Questions Chapter 16 Inheritance 21

4.6
Result::Total
Result::Agg
Marks::Grade[5]

4.7.
Rcalculate( )
RDisplay( )
Mentry( )
Mdisplay( )

4.8

DataMembers

Member functions

Result: :Total Result: :Rcalculate( )
Result:: Agg Result: :RDisplay( )
Marks::Grade[5] Marks::Mentry( )
Result::FinalGrade Marks:: Mdisplay( )
Result::Commence[20]

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 32.
Write the output of the following program.
#include<iostream>
using namespace std;
class A
{
protected:
int x;
public:
void show( )
{
cout<<“x =”<<x<<endl;
}
A( )
{
cout<<endl<<“l am class A”<<endl;
}
~A( )
{
cout<<endl<<“Bye”;
}
};
class B:
public A
{
{
protected:
int y;
public:
B(int x, int y)
{
this→x = x; //this → is used to denote the objects datamember
this->y = y; //this → is used to denote the objects datamember
}
B( )
{
cout<<endl<<“l am class B”<<endl;
}
~B( )
{
cout<<endl<<“Bye”;
}
void show ( )
{
cout<<“x=” <<x<<endl;
cout«”y=”<<y<<endl;
}
};
int main( )
{
A objA;
B objB(30, 20);
objB.show( );
}
return 0;
}
Answer:
Output:
I am class A
I am class A
x = 30
y = 20
Bye
Bye
Bye

Question 33.
Debug the following program.
Output
————
15
14
13
Program :
————
%include(iostream.h)
#include<conio.h>
Class A
{
public;
int a1,a2:a3;
Void getdata[ ]
{
a1=15;
a2=13;
a3=13;
}
}
Class B:: public A( )
{
PUBLIC
voidfunc( )
{
int b1:b2:b3;
A::getdata[ ];
b1=a1;
b2=a2;
a3=a3;
cout<<bl<<‘\t'<<b2<<‘t\'<<b3;
}
void main( )
{
clrscr( )
B der;
derl:func( );
getch( );
}
Answer:
#include<iostream>
#include<conio.h>
using namespace std;
class A
{
public:
int a1,a2,a3;
void getdata( )
{
a1=15;
a2=14;
a3=13;
}
classBrpublic A
{
public:
void function ( )
{
int b1,b2,b3;
A: :getdata( );
b1=a1;
b2=a2;
b3=a3;
cout<<b1<<“\n”<<b2<<“\n”<<b3;
}
};
int main ( )
{
B der;
der.func( )
return 0;
}

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Choose the correct answer:

Question 1.
The most important features of OOP is:
(a) Encapsulation
(b) Abstraction
(c) Polymorphism
(d) Inheritance
Answer:
(d) Inheritance

Question 2.
A class that inherits from a superclass is called a:
(a) super class
(b) derived class
(c) abstract class
(d) finite class
Answer:
(b) derived class

Question 3.
_________ allows us to inherit all the code of one class to another class.
(a) Inheritance
(b) Polymorphism
(c) Data hiding
(d) Overloading
Answer:
(a) Inheritance

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 4.
The class to be inherited is called ______ class.
(a) base
(b) sub
(c) abstract
(d) normal
Answer:
(a) base

Question 5.
When a derived class inherits only from one base class, it is known as ______ inheritance.
(a) Single
(b) Multiple
(c) Multilevel
(d) Hybrid
Answer:
(a) Single

Question 6.
The _________ class is a power packed class, as it can add additional attributes and methods.
(a) derived
(b) base
(c) first
(d) last
Answer:
(a) derived

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 7.
When a derived class inherits from multiple base classes it is known as _________ inheritance.
(a) Multiple
(b) Multilevel
(c) Hybrid
(d) Single
Answer:
(a) Multiple

Question 8.
When more than one derived classes are created from a single base class, it is known as _________ inheritance.
(a) One
(b) Common
(c) Hybrid
(d) Hierarchical
Answer:
(d) Hierarchical

Question 9.
When there is a combination of more than one type of inheritance, it is known as _________ inheritance.
(a) Hybrid
(b) Multiple
(c) Multilevel
(d) Single
Answer:
(a) Hybrid

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 10.
While defining a derived class, the ______ class should identify the class from which it is derived.
(a) abstract
(b) common
(c) proper
(d) derived
Answer:
(d) derived

Question 11.
The name of the derived class is to be given after the keyword:
(a) function
(b) variables
(c) class
(d) object
Answer:
(c) class

Question 12.
A __________ is used between base class and derived class.
(a) ,
(b) :
(c) ;
(d) ::
Answer:
(b) :

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 13.
The names of all base classes are separated by:
(a) comma
(b) colon
(c) semi-colon
(d) braces
Answer:
(a) comma

Question 14.
Though the derived class inherits all the members of base class, it has access privilege only to _________ members of the base class.
(a) private
(b) non-private
(c) finite
(d) visible
Answer:
(b) non-private

Question 15.
In _______ inheritance the level of inheritance can be extended to any number of level depending upon the relation.
(a) multiple
(b) single
(c) hybrid
(d) multilevel
Answer:
(d) multilevel

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 16.
The relation between grandfather, father and child is established in:
(a) polymorphism
(b) abstraction
(c) multilevel inheritance
(d) single inheritance
Answer:
(c) multilevel inheritance

Question 17.
A class without any declaration will have ______ byte size.
(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(a) 1

Question 18.
In a class x{ }; X occupies byte.
(a) 2
(b) 4
(c) 3
(d) 1
Answer:
(d) 1

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 19.
The accessibility of base class by the derived class is controlled by ______ modes.
(a) visibility
(b) common
(c) derived
(d) base
Answer:
(a) visibility

Question 20.
There are ________ visibility modes.
(a) 4
(b) 3
(c) 2
(d) 5
Answer:
(b) 3

Question 21.
The default visibility mode is:
(a) auto
(b) static
(c) private
(d) protected
Answer:
(c) private

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 22.
When a base class is inherited with protected visibility mode the protected and public members of the base class become ________ members of the derived class.
(a) public
(b) protected
(c) private
(d) static
Answer:
(b) protected

Question 23.
When classes are inherited with public, protected or private, the private members of the base class are:
(a) inherited
(b) not inherited
(c) not visible
(d) none
Answer:
(b) not inherited

Question 24.
When you derive the class from an existing base class, it may inherit the properties of the base class based on its ________ mode.
(a) visibility
(b) static
(c) auto
(d) extern
Answer:
(a) visibility

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 25.
________ inheritance should be used when you want the features of the base class to be available to the derived class but not to the classes that are derived from the derived class.
(a) Private
(b) Public
(c) Protected
(d) Single
Answer:
(a) Private

Question 26.
________ inheritance should be used when features of base class to be available only to the derived class members but not to the outside world.
(a) Unprotected
(b) Protected
(c) Private
(d) Multiple
Answer:
(b) Protected

Question 27.
________ inheritance can be used when features of base class to be available the derived class members and also to the outside world.
(a) Public
(b) Multilevel
(c) Single
(d) Protected
Answer:
(a) Public

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 28.
The _______ are executed in the reverse order.
(a) constructors
(b) derived class
(c) base class
(d) destructors
Answer:
(d) destructors

Question 29.
Base class constructors are executed _______ before the derived class constructors execution.
(a) first
(b) middle
(c) last
(d) none
Answer:
(a) first

Question 30.
Derived class _______ the base class constructor but it can call the base class constructor.
(a) can inherit
(b) cannot inherit
(c) cannot call
(d) none
Answer:
(b) cannot inherit

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 31.
If there are multiple base classes, then its start executing from the _______ most base class.
(a) left
(b) top
(c) right
(d) bottom
Answer:
(a) left

Question 32.
In _______ inheritance, the constructors will be executed in the order of inheritance.
(a) single
(b) multilevel
(c) hybrid
(d) hierarchical
Answer:
(b) multilevel

Question 33.
Derived class can call the base class constructor by using:
(a) :
(b) .
(c) ;
(d) ::
Answer:
(d) ::

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 34.
size of derived class object = _______ + size of all data members in derived class.
(a) size of all base class data members
(b) size of only public base class data members
(c) size of only private base class data members
(d) size of only protected base class data members
Answer:
(a) size of all base class data members

Question 35.
The public members can be accessed by the object of the derived class similar to its own members in:
(a) public
(b) auto
(c) static
(d) protected
Answer:
(a) public

Question 36.
In inheritance the _________ have higher priority.
(a) base class member function
(b) derived class member function
(c) constructor member function
(d) destructor member function
Answer:
(b) derived class member function

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 37.
Shadowing base class function in derived class can be resolved using:
(a) ::
(b) :
(c) ,
(d) <
Answer:
(a) ::

Question 38.
_________ pointer is a constant pointer that holds the memory address of the current object.
(a) this
(b) for
(c) if
(d) else
Answer:
(a) this

Question 39.
In case of inheritance where both base and derived class are having constructors, when an object of derived class is created then:
(a) constructor of derived class will be invoked first.
(b) constructor of base class will be invoked first.
(c) constructor of derived class will be executed first followed by base class.
(d) constructor of base class will be executed first followed by derived class.
Answer:
(d) constructor of base class will be executed first followed by derived class.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 40.
In case of inheritance where both base and derived class are having constructor and destructor, then which of the following are true?
(i) Constructors are executed in their order of derivation.
(ii) Constructors are executed in reverse order of derivation.
(iii) Destructors are executed in their order of derivation.
(iv) Destructors are executed in reverse order of derivation.
(a) Only (ii), (iv)
(b) Only (i), (iii)
(c) Only (i), (iv)
(d) Only (ii), (iii)
Answer:
(c) Only (i), (iv)

Question 41.
class x, class y and class z are derived from class BASE. This is _______ inheritance.
(a) Multiple
(b) Multilevel
(c) Hierarchical
(d) Single
Answer:
(c) Hierarchical

Question 42.
The _____ inherits some or all of the properties of the class.
(a) base, derived
(b) derived, base
(c) derived, initial
(d) base, final
Answer:
(b) derived, base

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 43.
State whether the following statements about inheritance are true or false.
(i) A public member of a class can be accessed by its own objects using the dot operator.
(ii) While inheriting, the private members of the base class will never become the members of its derived class.
(a) true, false
(b) false, true
(c) true, true
(d) false, false
Answer:
(c) true, true

Question 44.
In C++ program, Inheritance allows:
(a) Class Re-usability
(b) Creating a hierarchy of classes
(c) Extendibility
(d) All
Answer:
(d) All

Question 45.
Match the following:

(i) Single Inheritance  (a) combination of more than one type of Inheritance
(ii) Hierarchical Inheritance  (b) Inherits only from one base class
(iii) Multilevel Inheritance  (c) More than one derived classes are created.
(iv) Hybrid Inheritance  (d) Transitive nature of inheritance.

(a) (i) – (b); (ii) – (c); (iii) – (d); (iv) – (a)
(b) (i) – (c); (ii) – (d); (iii) – (a); (iv) – (b)
(c) (i) – (d); (ii) – (a); (iii) – (b); (iv) – (c)
(d) (i) – (c); (ii) – (d); (iii) – (b); (iv) – (a)
Answer:
(a) (i) – (b); (ii) – (c); (iii) – (d); (iv) – (a)

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 46.
Assertion (A):
The accessibility of base class by the derived class is controlled by visibility modes.
Reason (R):
The default visibility mode is public.
(a) Both A and R are true and R is the correct explanation for A.
(b) Both A and R are true, but R is not the correct explanation for A.
(c) A is true, but R is false.
(d) A is false, but R is true.
Answer:
(c) A is true, but R is false.

Question 47.
Which of the following is the process of creating new classes from an existing class?
(a) Polymorphism
(b) Inheritance
(c) Encapsulation
(d) Super class
Answer:
(b) Inheritance

Question 48.
Which of the following derives a class student from the base class school?
(a) school: student
(b) class student: public school
(c) student: public school
(d) class school: public student
Answer:
(b) class student: public school

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 49.
The type of inheritance that reflects the transitive nature is:
(a) Single Inheritance
(b) Multiple Inheritance
(c) Multilevel Inheritance
(d) Hybrid Inheritance
Answer:
(c) Multilevel Inheritance

Question 50.
Which visibility mode should be used when you want the features of the base class to be available to the derived class but not to the classes that are derived from the derived class?
(a) Private
(b) Public
(c) Protected
(d) All of these
Answer:
(a) Private

Question 51.
Inheritance is process of creating new class from:
(a) base class
(b) abstract
(c) derived class
(d) function
Answer:
(a) base class

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 52.
A class is derived from a class which is a derived class itself, then this is referred to as:
(a) multiple inheritance
(b) multilevel inheritance
(c) single inheritance
(d) double inheritance
Answer:
(b) multilevel inheritance

Question 53.
Which amongst the following is executed the order of inheritance?
(a) Destructor
(b) Member function
(c) Constructor
(d) Object
Answer:
(c) Constructor

Question 54.
Which of the following is true with respect to inheritance?
(a) Private members of base class are inherited to the derived class with private.
(b) Private members of base class are not inherited to the derived class with private accessibility.
(c) Public members of base class are inherited but not visible to the derived class.
(d) Protected members of base class are inherited but not visible to the outside class.
Answer:
(c) Public members of base class are inherited but not visible to the derived class.

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 55.
Based on the following class declaration answer the questions (from 55.1 to 55.4).
class vehicle
{
int wheels;
public:
void input_data (float,float) ;
void output_data( );
protected:
int passenger;
} ;
class heavy_vehicle :
protected vehicle
{
int diesel_petrol;
protected:
int load;
protected:
int load;
public:
voidread_data (float, float)
voidwrite_data( );
};
class bus:
private heavy_vehicle
{
charTicket[20];
public:
voidfetch_data(char);
voiddisplay_data( );
};
};

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 55.1.
Which is the base class of the class heavyvehicle?
(a) bus
(b) heavyvehicle
(c) vehicle
(d) both (a) and (c)
Answer:
(c) vehicle

Question 55.2.
The data member that can be accessed from the function displaydataQ.
(a) passenger
(b) load
(c) ticket
(d) all of these
Answer:
(d) all of these

Question 55.3.
The member function that can be accessed by an objects of bus Class is:
(a) input_data( ),
(b) read_data( ),output_data( )write_data( )
(c) fetch_data( )
(d) all of these display_data( )
Answer:
(d) all of these display_data( )

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance

Question 55.4
The member function that is inherited as public by Class Bus:
(a) input_data( ),
(b) read_data( ), output_data( )write_data( )
(c) fetch_data( )
(d) all of these display_data( )
Answer:
(d) all of these display_data( )

Question 56.
class x
{
int a;
public :
x( )
{ }
};
class y
{ x x1;
public :
y( )
{ }
};
class z : public y,x
{
int b;
public:
z( )
{ }
} z1;

Samacheer Kalvi TN State Board 11th Computer Applications Important Questions Chapter 16 Inheritance
What is the order of constructor for object z1 to be invoked?
(a) z,y,x,x
(b) x,y,z,x
(c) y,x,x,z
(d) x,y,z
Answer:
(d) x,y,z

TN Board 11th Computer Science Important Questions