Hsslive Xii Computer Application Commerce Quick Notes Based On Scert Focus
Hsslive Xii Computer Application Commerce Quick Notes Based On Scert Focus
Chapter 1
Review of C++ Programming
Basics of C++
Character set Fundamental unit of C++ language. Classified into letters, digits, special
characters and white spaces.
Tokens Building blocks of C++ programs. Classified into keywords, identifiers, literals,
punctuators and operators.
Keywords Reserved words that convey specific meaning to the language compiler.
Identifiers User-defined words to identify memory locations, statements, etc. Identifiers
include variables, labels, function names, etc.
Literals Tokens that do not change their value during the program run. Classified into
in
(Constants) integer constants, floating point constants, character constants and string
constants.
Operators Symbols that represents some operations. They consist of arithmetic, relational
and logical operators. There are some special operators named get from (>>),
put to (<<) and assignment (=). Another category of operators include increment
.
(++), decrement (--) and arithmetic assignment (+=, -=, *=, /=, %=) operators.
Punctuators
Data types
ve
Special characters like comma (,), semi colon (;), etc. used for the perfection of
syntax of various constructs of the language.
These are means to identify the type of data and associated operations. Data
types are classified into fundamental and user-defined data types. Fundamental
data types include int, char, float, double and void.
Control Two types – Selection statements (if, switch)
sli
statements Looping statements (while, for, do – while)
while and for are entry controlled loops
do – while is exit controlled loop
Looping There will be four components – initialization expression, test expression,
statements update expression, loop-body.
In the case of entry-controlled loop, body will be executed only after evaluation
Hs
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
An array is a collection of elements of the same type placed in contiguous memory locations. Arrays
are used to store a set of values of the same type under a single variable name. Each element in an
array can be accessed using its position in the list called index number or subscript.
The syntax for declaring an array in C++ is as follows.
data_type array_name[size];
Eg: int num[10];
This statement declares an array named num that can store 10 integer numbers.
in
Elements of an array are easily accessed using a for loop. For example, the elements in the above
array can be displayed using the following loop:
for (i=0; i<5; i++)
cout<<score[i];
.
String handling using arrays
ve
A character array can be used to store a string, since it is a sequence of characters. The array char
my_name[10]; can store a string of 9 characters. One location will be used to store ‘\0’ (null
character) as string terminator.
A string can be input using the statement:
cin >> my_name;
sli
This statement can store a string without any white space (that is, only one word). If we want store
strings containing white spaces (strings having more than one word) we can use gets() function,
getline() function or get() function.
Similarly to display string data we can use puts() function and write() function.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 3
Functions
Predefined functions
Type Functions Operation
(cstdio / getchar() To input a character
stdio.h) putchar() To display a character
To input a character
get()
(iostream)
functions
/ string.h)
strcat() To append (concatenate) string2 to string1
strcmp() To compare two strings.
strcmpi() Same as strcmp(), except that the case of the two strings are
ignored.
abs() To find the absolute value of an integer.
Functions (cmath /
Mathematical
in
pow() To find the power of a number. It takes two arguments x and y.
Returns the value of xy.
isupper() To check whether a character is in upper case or not.
Character Functions (cctype / ctype.h)
.
islower() To check whether a character is in lower case or not.
toupper() This function is used to convert the given character into its
uppercase.
sli
tolower() This function is used to convert the given character into its
lowercase.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Computer Applications – XII
Chapter 4
Web Technology
Static web page V/s Dynamic web page
in
Client side scripting languages: JavaScript, VB Script
.
Server side scripting languages: PHP, JSP, ASP, Pearl
Structure of HTML code
<HTML>
<HEAD>
<TITLE>
</HEAD>
ve
</TITLE>
<BODY>
</BODY>
sli
</HTML>
HTML Tags
Tags Use Attributes Values and Purpose
<HTML> To start an HTML document
<HEAD>
Hs
in
Tags Use Attributes Values and Purpose
<MARQUEE> To scroll a text or image in the browser
To change the Color To set the text colour
.
size, style and Face It specifies the font face like Arial, Calibri, etc.
<FONT>
colour of the
Size
<IMG>
text enclosed
To insert
image in a
web page
Src
ve It specifies the font size
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 5
sli
Web Designing using HTML
Links in HTML
A hyperlink (or simply link) is a text or an image in a web page, on clicking which another document
or another section of the same document will be opened. The <A> tag, called anchor tag is used to
in
Option button (Radio button) – To select an item from a groups of options
Checkbox – To select one or more items in a group
List box – To select one or more items from list of items
Text area – To input multi line text
.
Submit button – To submit data to the Form handler
Reset button – To clear the entries in the Form
ve
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 6
Client side Scripting using JavaScript
Operators
Arithmetic operators + – * / %
Increment, decrement ++ ––
Hs
Assignment operators = += –= *= /= %=
Relational operators < <= > >= == !=
Logical operators || && !
String concatenation +
Control Statements
if (test_expression)
Statement;
if (test_expression)
statement_1;
else
if statements
statement_2;
if (test_expression1)
statement_1;
else if (test_expression2)
statement_2;
in
while (test_expression)
while loop { body;
update;
}
Built-in Functions
.
Function Use Syntax / Example
alert()
isNaN()
ve
To display a text in a message window. alert(“Welcome”);
Returns True if the given value is not a number. isNaN(“welcome”); and
That is, the argument contains a non-numeric isNaN(“A123”); return True.
character. Returns False is the argument is isNaN(“13”); and isNaN(13);
return False
numeric.
toUpperCase() Returns the upper case form of the given string. “Java”.toUpperCase(); will
sli
give JAVA.
toLowerCase() Returns the lower case form of the given string. “JavaSCIPT”.toLowerCase();
will give javascript.
charAt() Returns the character at a particular position. “JavaScript”.charAt(4); gives S,
st
charAt(0) gives the 1 character of a string. the 5th character.
Hs
length property Returns the length (number of characters) of “JavaScript”.length will give 10.
the string.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 7
Web Hosting
FTP Client software: FTP client software establishes a connection with a remote server and is used
to transfer files from our computer to the server computer. SFTP uses Secure Shell (SSH) protocol
Free Hosting: Provides web hosting services free of charge. The size of the files that can be uploaded
may be limited. Audio/video files may not be permitted. Sites.google.com, yola.com, etc. are free
web hosting services.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 8
Database Management System
Database is an organized collection of inter-related data stored together with minimum redundancy,
which can be retrieved as desirable.
Database Management System (DBMS) is essentially a set of programs which facilitates storage,
in
retrieval and management of database.
Advantages of DBMS:
• Data redundancy (duplication of data) is controlled.
• Data inconsistency is avoided.
.
• Data are efficiently accessed.
• Data integrity is maintained.
•
•
Data security is ensured.
Data sharing is allowed.
ve
Components of DBMS: Hardware, Software, Database, Users, Procedures:
Data organisation:
• Field: The smallest unit of stored data.
sli
• Record: A collection of related fields.
• File: A collection of all occurrences of same type of records.
• Database: A collection of files associated with an organisation.
• Database Administrator (DBA): The person responsible for the control of the centralized and
shared database.
• Application Programmers: Computer professionals who interact with the DBMS through
application programs.
• Sophisticated Users: They interact with the database through their own queries.
• Naive Users: People accessing data by invoking one of the application programs.
Relation: A relation is also called Table. Data are organized in the form of rows and columns
Tuple: The rows (records) of a relation are known as tuples.
Attribute: The columns of a relation are called attributes.
Degree: The number of attributes in a relation determines the degree of a relation.
Cardinality: The number of rows (records) or tuples in a relation is called cardinality of the relation.
Domain: It is a pool of values in a given column of a table.
Schema: The description or structure of a database is called the database schema.
Instance: An instance of a relation is a set of tuples in it.
Relational algebra
The fundamental operations in relational algebra are SELECT(σ), PROJECT (π), UNION,
INTERSECTION, SET DIFFERENCE, CARTESIAN PRODUCT, etc.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 9
Structured Query Language
Components of SQL: Data Definition Language (DDL), Data Manipulation language (DML) and Data
in
Control Language (DCL).
DDL commands: CREATE TABLE, ALTER TABLE, DROP TABLE, CREATE VIEW, DROP VIEW.
DML commands: INSERT INTO, SELECT, UPDATE, DELETE FROM.
DCL commands: GRANT, REVOKE.
.
SQL Data Types: INT or INTEGER, DEC or DECIMAL, CHAR or CHARACTER, VARCHAR, DATE, TIME.
COUNT()
SUM()
AVG()
ve
To count the non-null values of a column.
Also used to get number of rows
To find the sum of values in a column.
To find the average of values in a column.
MAX() To find the highest value in a column.
MIN() To find the lowest value in a column.
sli
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 10
Enterprise Resource Planning
Functional units of ERP
1. Financial module
Hs
2. Manufacturing module
3. Production planning module
4. HR module
5. Inventory control module
6. Purchasing module
7. Marketing module
8. Sales and distribution module
9. Quality management module
Popular ERP packages
• Oracle: The ERP package from Oracle provides strong finance and accounting module. It also
provides good customer and supplier interaction, effective production analysis, efficient human
resource management and better pricing module.
• SAP: SAP stands for Systems, Applications and Products for data processing. SAP also developed
Customer Relationship Management (CRM), Supply Chain Management (SCM), and Product Life
cycle Management (PLM) software.
in
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Chapter 11
Trends and Issues in ICT
.
Short Message Service (SMS) is a text messaging service in mobile communication systems that
ve
allows exchanging short text messages containing up to 160 characters.
Multimedia Messaging Service (MMS) is a standard way to send and receive messages that consists
of multimedia content using mobile phones. MMS does not specify a maximum size for a multimedia
message and it supports contents such as text, graphics, music, video clips and more.
Global Positioning System (GPS) is a satellite based navigation system that is used to locate a
geographical position anywhere on earth, using its longitude and latitude. GPS is used for vehicle
sli
fleet tracking by transporting companies to track the movement of their trucks.
A smart card is a plastic card embedded with a computer chip / memory that stores and transacts
data. The advantages of using smart cards is that it is secure (data is protected), intelligent (it can
store and process data) and that it is convenient (it is easy to carry).
Mobile Operating System
Hs
The software that manages the hardware, multimedia functions, Internet connectivity, etc. in a
mobile device. Eg: Android from Google, iOS from Apple, BlackBerry OS from BlackBerry and
Windows Phone from Microsoft.
Cyber crimes against individuals:
• Identity theft occurs when someone uses another person's identifying information, like their
name, credit card number, etc. without their permission to commit fraud or other crimes.
• Harassment means posting humiliating comments focusing on gender, race, religion, nationality
at specific individuals in chat rooms, social media, e-mail, etc. is harassment.
• Impersonation and cheating: Impersonation is an act of pretending to be another person for
the purpose of harming the victim.
• Violation of privacy: Violation of privacy is the intrusion into the personal life of another,
without a valid reason.
• Dissemination of obscene material: The Internet has provided a medium for the facilitation of
crimes like pornography. The distribution and posting of obscene material is one of the
important cyber crimes today.
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^