Xii Cs Question Bank For Bright Students Chapter Wise Set-II
Xii Cs Question Bank For Bright Students Chapter Wise Set-II
Xii Cs Question Bank For Bright Students Chapter Wise Set-II
Ans: - Python is a language which is Easy to use, it is Expressive, Cross Platform and an Open
Source Language.
Q.2 What is a python variable? Identify the variables that are invalid and state the reason
Ans: - None keyword is used to define a null value or no value at all. None cannot be 0 or empty
string or False.
print(var)
Ans: - Strings in Python are array of bytes representing Unicode characters. There are three ways
to represent a string data in python –
2) Multiline strings
1|Page
Eg: - Str2= “Initially I am scaring from Python Language\
Language’’’
Q.5 What are the various mutable and immutable data types in Python?
Ans: - The data types which are changeable called Mutable Data Type, and those which are not
changeable called immutable data types.
Ans: - if N=>0:
print(“odd”)
else:
print("even")
2|Page
Q.9 What problem occurs with the following code
X=40
While X< 50 :
print(X)
Ans: - The given code does not have the incrementing value of X, thus the loop becomes
endless.
Ans: -
avg=n1+n2+n3
Output: -
Ans: -
if (x%2==0):
else:
3|Page
print(x, 'is an Odd Number')
Output: -
Ans: -
x=int(input('Enter 1 or 10'))
if x==1:
for x in range(1,11):
print(x)
else:
for x in range(10,0,-1):
print(x)
Output: -
***
4|Page
CHAPTER -2 PYTHON REVSION TOUR -II
1. What is a string slice? How is it useful?
Ans: A sub part or a slice of a string , say s , can be obtained using s[n:m] where n and m are
integers. Python returns all the character at indices n, n+1, n+2 ... m-1
e.g. ‘Well done’ [1:4] will give ‘ell’ here index starts from 0.
2. How are list different from strings when both are sequences?
Eg: -
print(S)
L[0]=65
L[1]='IP'
print(L)
5|Page
values.apend(i)
print(values)
Ans: [1]
[1 ,2 ]
[1,2,3]
4. Find the error in following code. State the reason of the error.
aLst = { ‘a’:1 ,’ b’:2, ‘c’:3 }
print (aLst[‘a’,’b’])
Ans: The above code will produce KeyError, the reason being that there is no key same as the list
[‘a’,’b’]
in dictionary aLst.
Ans: List are ordered collection and Dictionary are unordered collection of elements.
***
6|Page
Chapter – 3 Working with Functions
Ans: - It is a sub program that perform some task on the data and return a value.
Q.2) Write a python function that takes two numbers and find their product.
return (X*Y)
Q.3) Write a python function that takes two numbers and print the smaller number. Also write how to
call this function.
if(A<B):
print(“Smaller No – “, A)
else:
print(“Smaller No – “, B)
a=int(input(“Enter a number:”))
SMALLER(a,b)
Q.4) How many values a python function can return? Explain how?
def square_and_cube(X):
a=3
x,y,z=square_and_cube(a)
print(x,y)
return (p*r*t)/100
7|Page
Ans: - def SI(p, r, t=2):
return(p*r*t) /100
Q.6) Write a small python function that receive two numbers and return their sum, product, difference
and multiplication and modulo division.
calling of function: -
a,b,c,d,e=ARITHMATIC_OPERTAIONS(3,4)
print('Sum=',a)
print('Product=',b)
print('Difference=',c)
print('Division=',d)
print('Modulo Division=',e)
Ans: - Part of program within which a name is legal and accessible is called scope of the variable.
Ans – Global Scope – A name declared in top level segment of a program is said to have global scope
and it is accessible inside whole programme.
Local Scope – A name declared in a function body is said to have local scope and it can be used only
within this function.
print(B)
print(A)
Q.9) Consider the following function headers. Identify the correct statement: -
n1=n1*n2
n2+=2
print(n1,n2)
CALLME()
CALLME(2,1)
CALLME(3)
Ans: - 2 4
23
64
***
9|Page
Chapter-4 Python Library
Q.1) What is Libraries in Python and How many types of main library use in Python?
Ans: -A Library is a collection of modules that together caters to specific types of needs
or applications. Like NumPy library of Python caters to scientific computing needs.
Ans: - We can import a library in python program with the help of import command.
import pandas as pd
Statements
Z=(x+y)/2
Print(Z)
Q.4) Create a function in Python to calculate and return Area of rectangle when user
enters length and bredth.
Return(a*b)
Ans: - A module is a file with .py extension that contains variables, class definitions,
statements and functions related to a particular task.
Q.7) Create a package Arithmetic Operations(named AO) contain sum, product and
difference of two numbers and use it in your main programme.
10 | P a g e
return (X+Y)
def PRODUCT(X,Y):
return(X*Y)
def DIFFERENCE(X,Y):
return(X-Y)
Now lets save this file as AO.py then our module is created now.
import AO
n1=int(input(‘Enter a Number’))
n2=int(input(‘Enter another Number’))
print(‘Sum = ‘, AO.ADD(n1,n2))
print(‘Difference=’,AO.DIFFERENCE(n1,n2))
print(‘Product=’,AO.PRODUCT(n1,n2))
Output: -
11 | P a g e
***
Ans: A bunch of bytes / data stores on some storage device referred by the filename.
Ans: A text file stores data as ASCII/UNICODE characters where as a binary file stores data in
binary format (as it is stored in memory). Internal conversion is required in text file and hence
slower but binary file does not need any translation and faster.
Q.5 Name the methods used for reading and writing data from text file.
Ans: read( ), readline( ), readlines( ) for reading data from file and write( ), writelines( ) to write
data to a file
r+ , rb+ : read and write, w+, wb+ , a+ , ab+ : write/append and read
Ans: When a file is closed data from buffer gets written onto the file on the disk and link from file
is removed. It ensures that data is saved in the file.
12 | P a g e
Q.9 Write a python code to find the size of the file in bytes, number of lines and number of
words.
Ans : stdin represent standard input device and stdout represent standard output device which
are represented as files.
***
13 | P a g e
CHAPTER -6 RECURSION
Ans: Recursion is the process of defining something in terms of itself. We know that in Python,
a function can call other functions. It is even possible for the function to call itself. These types of
construct are termed as recursive functions.
Disadvantages of Recursion:
Ans:
def calc_factorial(x):
if x == 1:
return 1
else:
return (x * calc_factorial(x-1))
num = 4
print("The factorial of", num, "is", calc_factorial(num))
Ans:
return hcf
num1 = 54
num2 = 24
print("The H.C.F. of", num1,"and", num2,"is", computeHCF(num1, num2))
Q.5) Write Python program to find the sum of natural numbers up to n using recursive function.
Ans:
def recur_sum(n):
if n <= 1:
return n
else:
return n + recur_sum(n-1)
num = 16
if num < 0:
print("Enter a positive number")
else:
print("The sum is",recur_sum(num))
***
15 | P a g e
Chapter-7 Idea of Algorithmic Efficiency
Ans. The factors determining complexity of an algorithm are Time for execution and Memory space
required during execution.
Ans: We determine the time complexity as the number of elementary instruction that it executes
with respect to some given input size.
Ans: Best case means best possible performance (say minimum time required) of an algorithm. It
indicates the optimal time of performance of any algorithm.
Worst case means the worst possible performance (say maximum possible time required) of an
algorithm. It provides an upper bound on running time.
Example : for a binary search the best case for an input size of N is when it is sorted
Ans: Big-O notation indicates an algorithm’s growth rate which in turn determines the algorithm’s
performance with increase in the input size.
Ans: O(1) means an algorithms requires a constant time for its execution e.g. pushing an element
at the top of a stack
O(N) means an algorithm takes at most N time (or steps) for an input size of N e.g. searching an
element in an array
O(N2) means an algorithm takes at most N2 time (steps) for an input of size N e.g. Sorting an array
using bubble sort
16 | P a g e
Q8. What is a Dominant term?
Ans: As the input size grows it affects the efficiency of an algorithm. While describing the growth
rate, the term that affect the most on algorithm’s performance is called dominant term.
Example : if in an algorithm there are terms with growth rate O(N2) and O(N) then the dominant
term is O(N2)
Efficiency of binary search is better than that of linear search algorithm when the array is sorted as
the growth rate of binary search is O(log N) which is much smaller than that of linear search O(N).
Q10. State some external factors that may affect an algorithm’s efficiency.
Ans: Size of input, Speed of the computer, Compiler that is used etc.
* **
17 | P a g e
CHAPTER -8 Visualization with Pyplot
import numpy as np
plt.plot(x, np.sin(x))
plt.plot(x, np.cos(x))
plt.show()
Ans. Matplotlib is a Python library developed by John Hunter et al. for drawing 2D graphics.
It takes the advantages of the numerical calculation modules Numeric and Numarray in
Python, and clones many functions in Matlab to help users obtain high-quality 2D graphics
easily. Matplotlib can draw a variety of forms of graphics including usual line graphs,
histograms, pie charts, scatter plots and error bars, etc
Q.3 Which function is to be use for draw a line in Pyplot Python? Give example.
18 | P a g e
Q.5 Difference between Line and Bar Chart in Pyplot..
Ans. A line chart or line graph is a type of chart which displays information as a series of
data points called 'markers' connected by straight line segments. Line graphs are usually
used to find relationship between two data sets on different axis; for instance X, Y.
A bar chart or bar graph is a chart or graph that presents categorical data with
rectangular bars with heights or lengths proportional to the values that they represent.
The bars can be plotted vertically or horizontally.
***
19 | P a g e
CHAPTER -9 Data Structures : Linear Lists
Ans: Data Structure means organization of data. A data structure has well defined operations or
behavior.
Data Structure provides information regarding organization of data where as Data Type provides
information regarding the domain of values and operations that can be perform on data
Stack – A stack is a linear list also known as LIFO list with the special property that items can be
added or removed from only one end called the top.
Queue – A queue is a linear list also known as FIFO list with the special property that items can be
added added at one end and removed from the other.
Tree – A non-linear hierarchical organization of data as nodes and links between them where the
topmost node called root and bottom most nodes called leaves.
Ans: A list is a mutable sequence of data elements indexed by their position. A list is represented
using [ ] . e.g L=[10,20,30]
Ans: Traversing means accessing or visiting or processing each element of any data structure.
#List traversal
L=[10,20,30,40,50]
for x in L :
print(x)
Q8. Name the methods used for inserting and deleting elements from a list.
20 | P a g e
Various methods for inserting elements in a list are - insert(), append(), extend() and methods used
for deleting items from a list are – pop() , remove(), clear()
***
21 | P a g e
CHAPTER -10 DATA STRUCTURE – II : STACK AND QUEUE
Ans: Data structure is a particular way of storing and organizing information in a computer so that
it can be retrieved and used most productively. Different kinds of data structures are meant for
different kinds of applications, and some are highly specialized to specific tasks.
Ans: A stack is a collection of objects that supports fast last-in, first-out (LIFO) semantics for
inserts and deletes.
Ans:
A Queue is a linear structure which follows a particular order in which the operations are
performed. The order is First In First Out (FIFO). A good example of a queue is any queue of
consumers for a resource where the consumer that came first is served first. The difference
between stacks and queues is in removing.
Ans:
1. Expression Evolution
2. Expression conversion
1. Infix to Postfix
2. Infix to Prefix
3. Postfix to Infix
4. Prefix to Infix
3. Parsing
4. Simulation of recursion
***
22 | P a g e
Chapter – 11 Computer Networks – I
Ans: - Client – It is a host computer that requests for some services from a server.
Ans: - LAN: -
1) Spread over a small area. 2) Less setup cost 3) It is usually a single network
WAN: -
2) Spread over a very large area. 2) High setup cost 3) It is usually a network of many
networks.
Ans: - They are home networks used in a small companies since they are inexpensive and easy
to install, but they are limited in scope and are difficult to secure.
Q.7) Explain the use of the following terms: NIC, MAC address, WiFi Card, Hub, switch, bridge,
router, gateway, access point
Ans: - NIC – Network interface card attached to each of the workstation and the server, and
helps the workstation to establish the all-important connection with the network.
MAC Address – The NIC manufacturer assigns a unique physical address to each NIC card, which
is known as MAC address. It’s a 6 bytre address separated by colon
23 | P a g e
Eg: 10:B5:03:63:2E:FC
WiFi card – It is either an internal or external Local are network adapter with a built-in wireless
radio and antenna.
Hub – It is a networking device having multiple ports that are used for connecting multiple
computers.
Switch – It is a device that segment a big network into small subnets so that it prevent traffic
overload in a network.
Bridge – It is a device that helps to link two networks together. Bridge can handle with same
protocols.
Router – A router is a network device that forward data from one network to another. It can
handle different protocols.
Access Point – It is also called wireless access point(WAP) which is a hardware device that
establishes connection of computing devices on Wireless LAN with a fixed wire network.
Q.8) What do you know about cloud? How many types of clouds are there?
Ans: - Cloud is a generic term used for internet. Cloud refers to the collection of servers.
Types of clouds: -
Ans: - IoT( Internet of Things) is a phenomenon that connects the things to the internet over
wired or wireless connections. Ie it connects a variety of devices to the Internet.
Ans: - 1) RFID – Radio Frequency Identification – This technology uses radio waves to read and
capture information stored on a tag, called RFID tag. RFID tag is a microchip attached to an
antenna. It identifies the tracks the data of the “things”.
2) Sensors – A device that can detect changes in an environment. It helps to collect data
about the status of the “Things”.
3) Smart Technologies – Smart technologies include additional functionalities to take
action and have other processing capabilities as per the requirements.
4) Software – It is also important in the success of a technology as it provide the reusable
solutions for connecting taking actions and solving issue that occurs.
24 | P a g e
5) Efficient Network connectivity – IoT is formed through interconnection of device to
Internet.
***
25 | P a g e
Chapter -12 Networking –II
Q.1 What is Network?
a. Amplitude
b. Collision
Ans. In a half duplex Ethernet network, a collision is the result of two devices on the same
Ethernet network attempting to transmit data at exactly the same time.
Thenetwork detects the “collision” of the two transmitted packets and discards them both.
c. CSMA-
d. Error Detection
Ans. In networking, error detection refers to the techniques used to detect noise or other
impairments introduced into data while it is transmitted from source to destination. Error
detection ensures reliable delivery of data across vulnerable networks.
e. Checksum
Ans. A checksum is a value that represents the number of bits in a transmission message
and is used by IT professionals to detect high-level errors within data transmissions. Prior
to transmission, every piece of data or file can be assigned a checksum value after running
a cryptographic hash function.
a. Router –
Ans. A router is a networking device that forwards data packets between computer
networks. Routers perform the traffic directing functions on the Internet. Data sent through
the internet, such as a web page or email, is in the form of data packets
b. TCT/IP-
26 | P a g e
dictates how information should be packaged (turned into bundles of information
called packets), sent, and received, as well as how to get to its destination.
c. URL
d. DNS
Ans. He Domain Name System (DNS) is the phonebook of the Internet. Humans access
information online through domain names, like nytimes.com or espn.com. Web browsers
interact through Internet Protocol (IP) addresses. DNS translates domain names to IP
addresses so browsers can load Internet resources.
Q.4 Why we use Ipv4 and Ipv6? Also specify the difference between them.
Ans. The Internet Protocol version 4 (Ipv4) is a protocol for use on packet-switched Link
Layer networks (e.g. Ethernet). Ipv4provides an addressing capability of approximately 4.3
billion addresses. The Internet Protocol version 6 (Ipv6) is more advanced and has better
features compared to Ipv4.
Q.5 Write the name Networks commands and why they use for any two?
Ans. Ipconfig- Ipconfig is a Console Command which can be issued to the Command Line
Interpreter (or command prompt) to display the network settings currently assigned to any
or all network adapters in the machine. This command can be utilised to verify a network
connection as well as to verify your network settings.
ping - Helps in determining TCP/IP Networks IP address as well as determine issues with
the network and assists in resolving them.
***
27 | P a g e
CHAPTER -13 SQL
Ans: Databases help in reducing Data Duplication i.e. Data Redundancy and controls Data
Inconsistency.
Ans: Data Dictionary contains data about data or metadata. It represents structure or schema of a
database?
Ans: Char means fixed length character data and Varchar means variable length character data.
E.g. For the data “Computer” Char(30) reserves constant space for 30 characters whereas
Varchar(30) reserves space for only 8 characters.
Ans: A Primary Key is a set of one or more attributes (columns) of a relation used to uniquely
identify the records in it.
Ans: A Foreign key is a non-key attribute of one relation whose values are derived from the primary
key of some other relation. It is used to join two / more relations and extract data from them.
28 | P a g e
Q.9 Write SQL statements to do the following
(a)Create a table Result with two columns Roll and Name with Roll as primary key
VALUES(1,”Raj”,75.5)
DESCRIBE Result
ORDER BY Name
UPDATE Result
SET Marks = 80
WHERE Name=”Raj”
29 | P a g e
Q10. What are the various Integrity Constraints?
NOT NULL – Ensures value for the column is not left unassigned
UNIQUE – ensures that all values in a column are distinct or no two rows can have the same values for a
column having UNIQUE constraint
CHECK – Ensures that values for a particular column satisfy the specified condition
DEFAULT – Ensures that the default value is assumed if value for the column is not specified
PRIMARY KEY – Automatically applies UNIQUE and NOT NULL for uniquely identifying rows / records in a
table
***
30 | P a g e
CHAPTER -14 MORE ON SQL
Ans: The ORDER BY statement in sql is used to sort the fetched data in either ascending or
descending according to one or more columns.
By default ORDER BY sorts the data in ascending order. We can use the keyword DESC to sort
the data in descending order and the keyword ASC to sort in ascending order.
Syntax of all ways of using ORDER BY is shown below:
Ans: Aggregate Functions are all about Performing calculations on multiple rows Of a single
column of a table And returning a single value.
1) COUNT
2) SUM
3) AVG
4) MIN
5) MAX
Ans: The GROUP BY clause groups a set of rows into a set of summary rows by values of
columns or expressions. The GROUP BY clause returns one row for each group. In other words,
it reduces the number of rows in the result set.
The GROUP BY clause is an optional clause of the SELECT statement. The following illustrates
the GROUP BY clause syntax:
SELECT
c1, c2,..., cn, aggregate_function(ci)
FROM
table
WHERE
where_conditions
GROUP BY c1 , c2,...,cn;
31 | P a g e
4. Consider the following tables DRESS and MATERIAL. Write SQL commands for the statements (i)
to (iv) and give outputs for SQL queries (v) to (viii).
Table : DRESS
DCODE DESCRIPTION PRICE MCODE LAUNCHDATE
10001 FORMAL SHIRT 1250 M001 12–JAN–08
10020 FROCK 750 M004 09–SEP–07
10012 INFORMAL SHIRT 1450 M002 06–JUN–08
10019 EVENING GOWN 850 M003 06–JUN–08
10090 TULIP SKIRT 850 M002 31–MAR–07
10023 PENCIL SKIRT 1250 M003 19–DEC–08
10089 SLACKS 850 M003 20–OCT–08
10007 FORMAL PANT 1450 M001 09–MAR–08
10009 INFORMAL PANT 1400 M002 20–OCT–08
10024 BABY TOP 650 M003 07–APR–08
Table : MATERIAL
MCODE TYPE
M001 TERELENE
M002 COTTON
M004 POLYESTER
M003 SILK
(i) To display DCODE and DESCRIPTION of an each dress in ascending order of DCODE.
(ii) To display the details of all the dresses which have LAUNCHDATE in between 05–DEC–07 and
20–JUN–08 (inclusive of both the dates).
(iii) To display the average PRICE of all the dresses which are made up of material with MCODE as
M003.
(vi) To display material wise highest and lowest price of dresses from DRESS table.
(Display MCODE of each dress along with highest and lowest price)
(v) SELECT SUM (PRICE) FROM DRESS WHERE MCODE=‘M001’;
(vi) SELECT DESCRIPTION, TYPE FROM DRESS, MATERIAL WHERE DRESS. DCODE=MATERIAL. MCODE
AND DRESS. PRICE>=1250;
(vii) SELECT MAX(MCODE) FROM MATERIAL;
(viii) SELECT COUNT(DISTINCT PRICE) FROM DRESS
32 | P a g e
Ans: -
This quesry will return 121,317 as the count, whereas, the query
Returns 48,159 as the count. This is because the WHERE clause filters out the 73,158 SalesOrderDetails
whose UnitPrice is less than or equal to 200 from the results.
HAVING Clause
The HAVING clause is used to filter values in a GROUP BY. You can use them to filter out groups such as
FROM Sales.SalesOrderDetail
GROUP BY SalesOrderID
***
33 | P a g e
Chapter – 15 Creating a Django based Basic Web Application
Ans: - Django is a web framework used with Python to develop Dynamic Websites. Here web framework
is actually a software tool that helps to build and run Dynamic websites and web – enabled applications.
Ans: - A Web works in the form of Client -Server architecture. Web browser acts as a client programme
and the web server interacts as the server.
Q.3) Which protocol widely used by the clients of web ie web browsers?
Ans: - Mostly web browsers work with Hyper Text Transfer Protocols (HTTP)
Q.4) Explain the working of HTTP GET and HTTP POST request?
Ans: - HTTP GET : - Whenever a web client has to display a webpage it calls the HTTP GET request and
send the URL of the webpage. The server receives the GET request and respond by sending HTML of the
URL, if available; but if the URL is not existing it sends error 404.
HTTP POST : - An HTTP POST request is a way to send data to the server using HTML forms over web.
Ans: - 1) Django is Python based free and Open Source web application framework.
2) Django is powerful server-side web framework used by many developers as it is versatile, Portable and
Secure.
Ans: - Virtualenv is a useful tool which creates isolated Python Environment that take care of
interdependencies and let us develop different applications in isolation.
Each isolated environment has different set of libraries unlike a common global set of libraries.
Ans: - A project refers to an entire application. There can be multiple apps in a project.
Whereas, an app is a submodule which take cares of one part of the project.
Ans: - 1) admin.py – It is a configuration file for the build in Django Admin app
34 | P a g e
2) apps.py - It is a configuration file for the app itself
5) views.py – This file is for resolving http request/response for our web app
6) migrations/ - This folder keeps track of changes in models.py file and updates database accordingly.
Here Model is the lowest level of pattern responsible for maintain data.
Controller is the software code that controls the interaction between the Model and View.
Ans: - MVT is Model, View Template architecture which is slightly different from MVC. In fact the main
difference between the two patterns is that Django itself takes care of the controller part (Software
code) and leaving us with the template. The template is a HTML file mixed with Django Template
Language (DTL).
The develop provides the model, the view and the template then just maps it to a URL and Django does
the magic to serve it to the user.
***
35 | P a g e
Chapter -16 Data Base Connectivity
Ans. The database is a collection of organized information that can easily be used,
managed, update, and they are classified according to their organizational approach.
Ans.
Ans. Fetching rows or columns from result sets in Python. The fetch functions in the ibm_db
API can iterate through the result set. If your result set includes columns that contain large
data (such as BLOB or CLOB data), you can retrieve the data on a column-by-column basis
to avoid large memory usage.
Environment Description
Variables
36 | P a g e
ROLLBACK It works like "undo", which reverts all the changes that you have made.
import MySQLdb
# opening a database connection
db = MySQLdb.connect ("localhost","testprog","stud","PYDB")
# define a cursor object
cursor = conn.cursor
# drop table if exists
Cursor.execute("IF STUDENT TABLE EXISTS DROP IT")
# query
sql = "CREATE TABLE STUDENT (NAME CHAR(30) NOT NULL, CLASS CHAR(5), AGE
INT, GENDER CHAR(8), MARKS INT"
# execute query
cursor.execute(sql)
# close object
cursor.close()
# close connection
conn.close()
***
37 | P a g e
Chapter – 17 Society, Law and Ethics
Q.1) which of the following can be termed as intellectual property – Washing Machine, Music
Composition, Mixer Grinder, Email account
Q.2) In a multi national company Mr. A steals Mr. B’s intellectual work and representing it as A’s own
work without citing the source of information, which kind of act this activity be termed as?
Ans: Plagiarism
Ans: - 1) Online personal account such as email, communication account, social media account, shopping
accounts, online storage accounts
2) Intellectual Property including copyright material, trademarks, patents and any software or code that
a programmer may have written and own etc.
Q.4) Expand the following terms: - OSS, FSF, OSI, W3C, FLOSS, GNU, GPL, LGPL
FLOSS – Free Libre Open Source Software GNU – GNU’s Not Unix
Q.5) Differentiate between Public Domain Software and Proprietary Software with . example.
Proprietary Software: -
2) It has a proper license and user has to buy that license in order to use it.
Ans: - A Safe website has a pad lock sigh that shows safe connection to the website. A safe website url
stars with https:// and not with http://
Ans: - Cyber Law refers to all legal and regulatory aspects of Internet and the world wide web. It is
important as it touches almost all aspects of transactions and activities related to Internet, www and
cyber space.
In India the cyber law is enforced through IT act whose purpose is to provide legal recognition to
electronic commerce, focus on information security etc.
Ans: - 1) Secure Transaction – Fund transfer at anywhere in the world with a greater security is one of
the major benefits of ICT in the Business World.
2) Global Market – Nowadays with ICT a small business can be done from any part of the world.
3) Net Banking – With Online or Internet Banking a lots of payments can be done online through a bank
account at the convenient place like home/office.
4) Ease and Availability – ICT made Everything easy and available through mobile banking, ATM cards,
Internet Banking facilities like the movement of money from customer to merchant.
e-waste recycling allows for recovery of valuable precious metals, Protects public health and
water quality, Saves landfill space etc.
Ans: - Theft of personal information so that to gain access of personal information of victim(Some body)
and later use victim’s personal information to commit fraud.
Q.12) How a user of cyber world can safe personal information online?
Ans: - A user can protect his/her personal information by the following ways: -
39 | P a g e
Q.13) How we can resolve gender issues as far as school level computer science education is concern?
Ans: - 1) Girls should be motivated by different programmes to take up CS as one of the subjects to make
career in it.
2) Ads play a vital role in the whole life style of a girl thus ads will be designed so well and female role
models should be projected under those Ads who encourage girls to take up subjects like CS.
3) Girls should be encouraged in computer practical classes to handle the devices and find out the
problems and their solutions related to hardware part.
Q.14) List some disability issues faced in the teaching/using computers with respect to specially abled
students.
Q.15) What are the possible solutions to deal with disability issues in a school?
Ans: - 1) Teaching Materials / aids should be available to cater the needs of special needs of students.
2) Sufficient No. of specially Trained Teachers should be available who can take care of these students.
3) School must follow the inclusive curriculum so that especially abled student doesn’t feel
himself/herself in a disadvantageous group.
***
40 | P a g e