0% found this document useful (0 votes)
63 views38 pages

Xii Computer Application - Full Book

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
63 views38 pages

Xii Computer Application - Full Book

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Chapter 2

1.What is desktop publishing?


Desktop publishing (abbreviated DTP) is the creation of page layouts for documents using DTP
software.
2. Give some examples of DTP software.
Adobe PageMaker, Adobe InDesign, QuarkXPress, etc
3. What is a Pasteboard in PageMaker?
The area outside of the dark border is referred to as the pasteboard. The picture or text to be
inserted in document later can be kept in this paste board.
4. Differentiate Ellipse tool from Ellipse frame tool.
Ellipse : Used to draw ellipse and circle and cannot hold text in it.
Frame Elllipse : Used to draw ellipse and circle and can place hold text in it
5. What is text editing?
Editing means making changes to the text. When you edit a document, you revise the text
6. What is text block?
A text block is container of text you type, paste, or import. You cannot see the borders of a text
block until you select it with the pointer too
7.What is threading text blocks?
A Text block can be connected to other text block so that the text in one text block can flow into another
text block. Text blocks that are connected in this way are threaded text blocks.

8. What is threading text?


The process of connecting text among text blocks is called threading text
9. Define story
Text that flows through one or more threaded blocks is called a story
10. What is master page and write its use
Any text or object that you place on the master page will appear on all the document pages i the
picture inserted in master page will appear in all the pages of document.
Master Pages commonly contain logos, page numbers, headers, and footer which has to be
inserted in all pages.
It reduces the work of repeated insertion of same logo or page number in all the pages.
11.How do you insert a page number in PageMaker?
1. Click on Master Pages icon.
2. Then click on Text Tool. Now the cursor changes to I - beam.
3. Then Click on the left Master page where you want to put the page number
4.Press Ctrl + Alt + P.
5. The page number displays as „LM‟ on the left master page.
6. Similarly click on the right Master page where you want to put the page number.
7. Press Ctrl + Alt + P.
8. The page number displays as „RM‟ on the right master page, but will appear correctly on the
actual pages.
12.What is Page maker? Explain its use
Adobe PageMaker is a page layout software.
It is used to design and produce documents that can be printed.
Using it you can create anything from a simple business card to a large book.

13. How can you place text from other software like MS-Word?
1. Choose File > Place. The Place dialog box will appear
2.Click on Open in the Place dialog box. The pointer changes to the loaded text icon
3 Click in the page to place the text. The text will be placed in the page
14. Write steps to split the text block
1. Place the cursor on the bottom handle, click and drag upwards. When you release the bottom
handle will contain a red triangle.
2. Click once on this, and the cursor changes to a loaded text icon.
3. Click where ever you want the text to be placed.
15. Steps to re join the splitted text block
Then place the cursor on the bottom handle (red colour triangle) of the first text block, and click
and drag the bottom handle down up to next text block which has to be joined. Now both splatted
block will be joined.

5 mark
16.Write steps to draw star using polygon
1. Click on the Polygon tool from the toolbox.
2. The cursor changes to a crosshair.
3. Click and drag anywhere on the screen. As you drag, a Polygon appears.
4. Release the mouse button when the Polygon is of the desired size.
5. Choose Element > Polygon Settings in the menu bar. Now Polygon Settings dialogue box
appears.
6. Type 5 in the Number of sides text box.
7. Type 50% in Star inset textbox.
8. Click OK
17 Write about tools of page maker

Tool Picture Use


Pointer tool BOOK Used to select , move the
text object
Text Tool Book Used to type, select and edit
text
Rotate Tool Book Used to rotate the object
Line Tool Book Used to draw line
Rectangle Tool Book Used to draw rectangle
Rectangle frame tool Book Used to draw rectangle and
type text in it
Ellipse Book Used to draw ellipse
Ellipse Frame Tool Used to draw ellipse and
type text in it
Polygon Tool Book Used to draw polygon
Hand tool Book Used to scroll page
Zoom Tool Book Used to magnify area of the
page

18. Write steps to Converting text in a Text block to a Frame


1. Draw the frame
2. Select the text block
3. Click the frame pressing shift key
4. Click the menu Element Frame Attach Content
5. Now text appears in frame

19. Write the steps to place the text in a frame


1. Click on any one Frame tool from the Toolbox.

2. Draw a frame with one of PageMaker’s Frame tools (Rectangle frame tool or Ellipse Frame Tool or
Polygon frame Tool). Make sure the object remains selected.

3. Click on File > Place. The Place dialog box will appears.

4. Locate the document that contains the text you want to place, select it.

5. Click on Open.

6. Click inside the frame to place the text in it. The text will be placed in the frame.

20. Mention three tools in PageMaker and write their keyboard shortcuts
Chapter 3
Introduction to Database Management System
1. Define Data Model and list the types of data model used.

The database technology came into existence in terms of models with relational and object-relational
behavior. Types of data model

a Hierarchical Database Mode b. Network Database model c.Relational model d. Object-oriented database
model

2. Write the disadvantage of file system


a)Data Duplication - Same data is stored multiple number of times
b) High Maintenance - Data consistency needs high maintenance
c) Security - less security provided to the data
3. List all DDL , DML

DDL COMMANDS
a) create - To create table and database
Eg. create table student(name varchar (30) , adno int);

b) Alter - To modify the structure of table (add new column to table or modify the data type
of a column)
Eg. Alter table student add age int;

DML Commands
a) Insert - To add a new row (record) to table
Eg. Insert into student values („tamilselvan‟, 1234, 17);

b) Update - To modify the value in column (Field)


Eg. Update table student set age = 18;
4. Differentiate Single value attribute and Multi value attribute
Single value attribute - An attribute which takes only one value is called single value attribute.
Eg. Age attribute can take only one value
Multi value Attribute - An multi value attribute takes more than one value for attribute
Eg. Degree attribute - It takes multiple value like B.Sc, M.C.A, B.Ed

5. Which command is used to make permanent changes done by a transaction?

TCL (Transaction control language command) Commit - is used to make the transaction permanent

6. What is view in SQL?

* View is set of stored queries.

* View is logical subset of data from one or more table


7 . Write the difference between SQL and MySQL

SQL MYSQL
SQL - It (Structured query Language) is a It is one of the RDBMS
programming language designed mainly for
managing data in RDBMS
SQL it is subset of MYSQL It is superset of SQK

8. What is Relationship and List its types

Relationship tells how two entities are related in ER model. It tells how two tables are related by having
foreign key of one table refers to primary key of another table.

There are three 3 types of relation

a) One to one relation b) one to many relation c) many to many relation

9. State few advantages of Relational databases

Advantage of Relational database

 High performance
 Robust transaction and support
 Easy management
 Less cost

8. What is database
A database is a place where we store, retrieve and manage data
9. What is DBMS
DBMS stands for Database Management system
A database management system (DBMS) is system software for creating and manage
database
11. Give example for RDBMS software
a) Oracle b) Mysql c) SQL Server d) MS Access
12. Define primary key - A field in table which is used to uniquely identify a record is called
Primary key. Eg. Account number in bank , Admission number in school etc.
12. What is SQL
It (Structured query Language) is a programming language designed mainly for managing data in
RDBMS.(Insert , delete, update and select data in databaser)
3 MARK

1. Explain on Evolution of DBMS

* The concept of storing data started before 40 years.

* In earlier days they have used punched card technology to store the data

* The file systems were known as predecessor of database system

* Data in file system were accessed using indexed, random and sequential methods.
2. Discuss cardinality in RDBMS

* It is defined as the number of different values in any given table column.

* It is defined as the number of items that must be included in a relationship

* it is classified as

a) One to one relation b) one to many relation c) many to many relation

3. Write few commands used by DBA to control the entire database.

Database Administrator uses following commands to control database

a) Use database - This command is used to select the database to be used.


Eg. Mysql> Use stud;
b) Show Databases - This command will list all the databases available in server.
Eg. Mysql> show databases;
c) Show Tables- This command will list all the tables available database that is in use
Mysql>show tables;

4. What is entity and write its types


An Entity can be anything a real-world object which is easily identifiable by any common man.
Types of Entity
a) Strong Entity - Entity which does not depend up on any other entity
b) A weak entity - Weak entity is dependent on other entities and it doesn‟t have any primary
key.
c) Entity Instance - Instances are the values for the entity

5 Mark
1. Write in detail about cardinality

It is defined as the number of items that must be included in a relationship

The three classifications in Cardinality are one-to-one, one-to-many and Many-to-Many

One to one relation

In the above example a person can drive only one vehicle, so their relation between driver and
vehicle is one to one

One to many

In above example a customer can place any number of order, so the relation between customer and
order is one to many

Many to Many
In above example a student an choose any number of course and a course can be chosen by any
number of student , so the relation between student and course is many to many.

2. What is database models and write its types


Data models define how data is connected to each other and how they are processed and
stored inside the system. Its types are
a) Hierarchical Database Model - This model was introduced by IBM. . In this model each
record has information in parent/ child relationship like a tree structure. Each child record can
have only one parent record. Handling many to many relation is tough in this model.
b) Network model - This model was introduced by Honeywell. It is similar to Hierarchical
model except that each child record ca have more that one parent record. Handling many to
many relation is easy in this model
c) Relational model - Oracle and DB2 are few commercial relational models in use. Relational
model is defined with two terminologies Instance and Schema.
Instance – A table consisting of rows and columns
Schema – Specifies the structure including name and type of each column.
Object-oriented database model - This model incorporates the combination of Object Oriented
Programming(OOP’s) concepts and database technologies. This model efficiently manages
large number of different data types.
3. List all DDL , DML and DQL Commands

DDL COMMANDS
c) create - To create table and database
Eg. create table student(name varchar (30) , adno int);

d) Alter - To modify the structure of table (add new column to table or modify the data type
of a column)
Eg. Alter table student add age int;

e) Drop - To delete table or database


Drop table student;
f) Rename - To rename table or database

g) Truncate - To delete all records in table


Eg. Truncate table student;

DML Commands
c) Insert - To add a new row (record) to table
Eg. Insert into student values („tamilselvan‟, 1234, 17);

d) Update - To modify the value in column (Field)


Eg. Update table student set age = 18;

e) Delete - To delete one or more rows (records)


Eg. Delete from student where adno = 1234;
DQL Command
Sql command to fetch data from database
Eg. select * from student where adno=1234;
3. List the basic concept of ER model
Basic concepts of ER Model are

a) Entity b) Attribute c) Relation


Entity - An Entity can be anything a real-world object which is easily identifiable by anyone even by a
common man. Entity is represented by rectangle box.

Eg. In school database student and teacher are entity.

Student Teacher Mark

Types of Entity

a) Strong entity - Strong entity does not depend on other entity. It will have primary key
b) A weak entity - Weak entity is dependent on other entities and it doesn’t have any
primary key.
c) Entity Instance - Instances are the values for the entity

Attribute - Information about entity or each column in table is called Attribute


Eg. Student is entity and Name, Admission_Number, Age, Height are attribute
Types
a. Key attribute - Unique attribute to identify the record
Eg.Admission_No.
A student can have only one unique admission number to identify him.
b. Simple Attribute - This attribute can have only one value which cannot be separated.
Eg. Date_of_birth . T
here can be only one data of birth for student which cannot be separated.
c. Composite Attribute- This attribute can be subdivided into simple attributes.
Eg. Name
Name attribute can be divided into first name and last name.
d. Single value attribute - Can have only one value
Eg. Age - There can be only one entry for age attribute
e. Multi value attribute - Can have more than one value
Eg. Qualification - Qualification can have multiple values like B.Sc, M.C.A, B.Ed.

Relation -

Relationship tells how two entities are related in ER model. It tells how two tables are related by having
foreign key of one table refers to primary key of another table.

There are three 3 types of relation

a) One to one relation b) one to many relation c) many to many relation


Chapter 4
PHP
1. What is PHP and write its uses.
PHP abbreviated as “HYPER TEXT PREPROCESSOR”. It is a server-side scripting language. It
is used to create dynamic web pages
2. Give examples for client side scripting language
a) Css b) java script c) VB script
3. Give example for server side scripting language
a) ASP b) JSP c) PHP
4. What are the types of scripting language
a) Server side scripting language b) Client side scripting language
5. Differentiate Client and Server
Client - It is the machine which request for data from the server
Server - It is a high performance machine which servers all data requested by server
6. What is web server?
A Web server is a Software that uses HTTP (Hypertext Transfer Protocol) to serve the files
that form Web pages to users.

Web Sever which is installed on server executes the PHP code and generate HTML code.
This HTML code is sends back to the user machine to view the output through browser like
Google chrome, Internet explorer etc .

7. What is web browser?


A Web browser is a software application for accessing information on the World Wide
Web
Eg. GOOGLE CHROME , Internet explorer , Mozila firefox , safari
8. What is URL?
Uniform Resource Locator, the address of a specific Web page or file on the Internet
9. What is variable and How will you declare variable in PHP
Variable is a memory location which can store one value.
Declaration of variable
Variable should begin with $ symbol followed by variable name , = symbol and value for
variable
Syntax for variable declaration
$variable_name = value;
Eg. $name = “tamilnadu”;
10. List the data types available in PHP
1. String 2. Integer 3. Float 4. Boolean 5. Array 6. Object 7. NULL 8. Resource
11. Write syntax for writing php program
<?php

php statements
?>
Eg
<?php
echo “ HELLO WORLD”;
?>
12. Write about client server architecture
It is a architecture which introduces application sharing mechanism between two different
systems over the network.
Client - Client is the machine which request for data stored on server
Server - Server is the machine which serves the data requested by server

5 mark
13. Write rules for naming variable
1. Variable name must always begin with a $ symbol.
2. Variable name can never start with a number.
3. Variable names are case-sensitive
14. Write about operators of PHP (5 mark)
Operators of PHP are
1. Arithmetic operators,
2. Assignment operators,
3. Comparison operators,
4. Increment/Decrement operators,
5. Logical operators,
6. String operators

Arithmetic operators

+ Addition $c = $a + $b
- Subtraction $c = $a - $b
* Multiplication $c = $a * $b
/ Division $c = $a / $b
% Modulus $c = $a % $b

Assignment operators

= $a = 10 Assigns 10 to $a
+= $a += 10 Adds 10 to a
-= $a -= 10 Subtracts 10 to a
*= $a *= 10 Multiply 10 to a n
/= $a /= 10 Divids 10 by a
%= $a %= 10 Finds remainder after dividing
by 10

Comparison Operators

== Equal to If ($a==10)
>= Greater than or equal to If ($a>=10)
<= Less then or equal to If ($a<=10)
<> Not equal to If ($a<>10)
=== Identical If ($a===10)
!== Not identical
> Greater than If($a >10)
< Less then If ($a <10)

Increment and Decrement operator


++ Increment by one $a++
-- Decrement by one $a- -

Logical Operator

&& And $a && $b True both $a and


$b are true
|| Or $a|| $b True both $a or $b
are true
! Not !$x True if $x is not true
XOR Xor $a xor $b True if either $a or
$a is true, but not
both

String Operator

. Concatination $text1 . $text2 Concatenation of


$txt1 and $txt2
.= Concatenation $a|| $b True both $a or $b
assignment are true
! Not $text1 .= $ text2 Appends $txt2 to
$txt1

15. Write about server side scripting language

The PHP code executes on Webserver which is installed in the server machine and it is
generates HTML code which is sent to the user. The user receives HTML code and sees the
Website contents using Internet browser in client machine.
15. In how many ways you can embed PHP code in an HTML page?

There are 3 method to embed PHP code in HTML file

Default syntax

a) <?php
Php code
?>

Eg.
<?php
echo “Hello world”;
?>
Short Open Tags
b) <?
Php code
?>

Eg.
<?
echo “Hello world”;
?>
c) HTML Script embed Tags
<script language=”php”>
php code;
</script>

Eg.

HTML Script embed Tags


<script language=”php”>
echo “Hello world”;
</script>

Chapter 5

Function and array

1. What is function? (3 mark)


Block of segment in a program that perform specific operations is called as function

There are 2 types of function


a) User defined function - The function written by the user is called as user defined
function

b) Pre defined function (or) Built in function - The function which are already available
in PHP scripting language is called as pre-define function.

2. Write the syntax of user defined function or Parameterized function


Value can be passed from one function to another, such function which can receive the
value and process it is called as parameterized function

Syntax
function function_name (parameters )
{
Body of function
}

Eg.
<?php
function add($a ,$b)
{
Echo “result =” . $a+ $b;
}

add(10,20);
?>

3. What is array and write its types


Array is a concept that stores more than one value of same data type (homogeneous) in
single array variable.
Types of array
1. Indexed Arrays,
2. Associative Array and
3. Multi-Dimensional Array

4. Write about index array


In indexed array each element is assigned index number using which we can
access the element
Syntax
Array_name = array(value1,value 2,……..)‟
Eg.
$mark = array(50,30,90,77);

50 30 90 77
0 1 2 3
In example index of first element is 0 , second element is 1 and so on

<?php
$mark = array(50,60,89);
echo $mark[0]. “<br>”;
echo $mark[1]. “<br>”;
echo $mark[2]. “<br>”;
?>
output
50
60
89
6. Write about associative array

Associative arrays are a key-value pair data structure ie. the key and the value are stored
together to access each element.

Syntax

Array_name = array(key1=>value1, key2=>value2,key3=>value3,….)

Eg.

<?php

$stud=array(“state” => “tamilnadu”, “country”=> “India”, “age”=> 17);

echo “State=” . $stud*“state”+;

echo “Country=” . $stud*“country”+;

echo “age=” . $stud*“age”+;

?>

Output

State =tamilnadu

Country=India
Age=17

7. Write about multi dimensional array


Array containing one more array is called multi dimensional array
Eg.

<?php
$stud=array (
array(“coimbatire”,”tamilnadu”);
array(“Banglore”,”karnataka”);
array(“cochin”,”kerala”);
);

echo $stud[0]0];

echo $stud[0][1];

?>

Output

Coimbatore

Tamilnadu

8 .Differentiate built in and user defined function

User defined function Built in function


Function defined by user is called user The function which are already available in
defined function PHP scripting language is built in function
It takes more time to write function of our Just calling the function is enough, so time is
own. wasted

Chapter 6
PHP Conditional Statements
1. Write about conditional statements
Conditional statements allow you Perform different actions based on the results of test
Condition.
2. List the conditional statements
1)if Statement
2) if...else Statement
3) if...elseif....else Statement
4) switch Statement
5 mark
1. Explain if statement
It is a control statement which helps to select between two alternatives.

Types of If statement
a. Simple if statement
b. If .. else statement
c. If .. elseif … else statement

Simple if statement
Syntax
If (condition / expression)
{
action block
}

Working
If the condition is true then action block will be executed else the statement following if
will be executed.
Eg.

<?php
$a=2 ;
$b=1;
If( $a >$b)
{
echo “ A is big”;
}

?>

Output
A is big

If ...else statement
Syntax
If (condition / expression)
{
action block1
}
else
{
action block2
}

Working
If the condition is true then action block1 will be executed else action block2 will be
executed
<?php
$a=2 ;
$b=3;
If( $a >$b)
{
echo “ A is big”;
}
else
{
echo “ B is big”;

}
?>

Output
B is big

If …elseif ….else statement


Syntax
If (condition 1 / expression 2)
{
action block1
}
else if(condition 2)
{
action block 2
}
else
{
action block 3
}

Working
If the condition is true then action block1 will be executed. If conditon2 is true then action
block 2 will be executed else action block 3 will be executed
Example
<?php
$a=2 ;
$b=2;
If( $a >$b)
{
echo “ A is big”;
}
else if($a==$b)
{
echo “ Both are equal”;
}
else
{
echo “ B is big”;

}
?>
Output
Both are equal
2. Explain Switch case
It is a multiple branching statement where based on a condition, the control is
transferred to one of the many possible points.
Syntax

switch(expression)
{
Case 1:
action block 1;
break;
Case 2:
action block 2;
break;
Case 3:
action block 3;
break;
default :
action block 4;
}

Working
First expression in switch will be compared with case 1 value if matches then action
block 1 will be executed, if not then expression will be compared with case 2 if matches
then action block 2 will be executed and so on. If none of the condition matches then
default part will be executed ie. action block 4 will be executed.

Break statement

We include break statement in action block to exit from switch case statement.

Example

<?php

$a = 2;
swithc($a)
{
case 1:
echo “one”;
break;
case 2:
echo “two”;
break;
case 3:
echo “three”;
break;
default :
echo “Enter less than 4”;
}
?>

Output
Two.
Chapter 7
Looping Structure
Looping Structure
1. What is loop?
Loop is a control statement which is used to execute a block of statements for specific
number of times

2. Write the types loop in PHP


1) for Loop 2) for each Loop 3) While Loop 4) Do While Loop
5 mark

3.Exlain For loop

Loop
Loop executes a set of instructions repeatedly for a certain number of times
For Loop
It is a entry controlled loop and it used when an action block is to be
repeated for a predefined number of times.

Syntes
for(initial value ; condition ; increment )
{
action block
}
Working
1. The control variable is initialized the first time when the control entries the loop
for the first time.
2. Test condition is evaluated. The body of the loop is executed only when the
condition is ture. Hence for( ; ; ) is called entry control loop
3. On repetition of the loop, the control variable is incremented and the test
conditon will be evaluated befor the body of the loop is executed.
4. The loop is terminated when the conditon evaluates to false.

Example
<php

for($i=1; $i<=3; $i++)


{
echo “<br>” . $i;
}
}

Output
1
2
3

4.Explain While and do while loop.

While loop
While loop is called as Entry check loop ie. first condition is checked if true then body of
loop is executed. The body of loop will be executed until the condition is true.
Syntax

While (condition)
{
Body of loop
}

<?php
while($i<=3)
{
echo “<br>” . $i;
$i++;
}
}

Working of example
1. First the control variable is initialized to 1
2. Then condition in while is checked, since True,
body of loop is executed. So 1 is printed and i value is incremented
3. Step 3 is repeated until condition in while loop is true.

Output
1
2
3

5. Explain do while loop


do while loop is called as exit check loop ie. condition of the loop will be executed at last.
The body of loop will be executed until the condition is true.
Syntax

do
{
Body of loop
}
While (condition);

Example

<?php
$i=0;
do
{
echo “<br>” . $i;
$i++;
}
while($i<=5);
?>

Output
1
2
3
4
5

Working of example
1. First the body of the loop will be executed, so 1 is printed and i value will be
incremented.
2. Then condition in do while is checked, since True,
Again body of loop is executed again
3. Step 1 and step 2 is repeated until condition in do while loop is true.

4. Differentiate while and do while.


while
a. Condition is checked first . It is entry check loop.
b. If condition is false at beginning then body of the loop will never execute
c. While(condition)
{
Body of loop
}
Do while
a. Condition is checked first. It is exit check loop.
b. Even If condition is false at beginning the body of the loop will execute at least
once.
c. do
{
Body of loop
}

while(condition);

5. Explain for each loop

For each loop is used in PHP and is mainly used for looping through the values of an array.

Syntax

foreach ($array as $value)

code to be executed;
}

Example

<?php
$state = array(“Tamilnadu”, “Andhra”, “Karnataka”, “Kerala”);
foreach ($state as $i)
{
echo “<br>” . $i;
}
?>
Output

Tamilnadu

Andhra

Karnataka

Kerala

Chapterr 8

Forms and Files

1. What is the use of Form controls


Form controls are HTML controls through which data are collected from user from client
machine.
2. List some of the form controls
1) Text inputs 2) Buttons 3) Checkbox 4) Radio box 5) File Select 6) Form Tag

3. What is validation? Write its types


Validation is a process of checking the user input data submitted from client machine
1) Client side validation 2) Server side validation
4. What are the form handling methods?

POST Method - The input data sent to the server with POST method is stored in the
request body of the client’s HTTP request. Input data will not be visible when clicking the
submit button.

GET Method:- The input data sent to the server with GET method via URL address is known
as query string. All input data are visible by user after they click the submit button.

5. Write the syntax text box


<input type=text name=”Name for text box” required>
6. Write the syntax radio box
<input type=radio name=”Name for text box” required>
7. Write the syntax Check box
<input type=checkbox name=”Name for text box” required>
8. Differentiate Check box and Radio button
Check box Radio Button
More than one check box can be selected Only one Radio box can be selected
Tick mark will appear when selected Dot will appear when selected

9. Write about file handling


Opening the file in server and processing it for different task like writing into the file or
reading from the file or Updating the file is called file handling.

10. List all the file handling functions


1)PHP Open a File, 2) PHP Read a File 3) PHP Close a File 4) PHP Write a File 5) PHP
Appending a File and 6) PHP uploading a File.

12. Write the syntax for opening the file

$file_Object= fopen(“FileName”, “Read/WriteMode”) or die(“Error Message!”);

Example:

<?php

$myfile = fopen(“Student.txt”, “r”) or die(“Unable to open file!”);

?>

11. Write the use or features of form handling


Form handling is done to collect all the user data from client machine and send it to
server for processing.
Here form tag with various controls like text box, radio button, check box, submit button,
combo box are used to collect the data from user and send it to server.

5 Mark
12. Explain form controls

1) Text inputs - Text box is used to collect text or numeric data from the user
Syntax
<input type = text name=”name for control” >
2) Buttons - Used to submit the form to the server
Syntax
<input type =button name=”name for control” >
3) Checkbox - Used to selecting one or more Option from multiple choice
Syntax
<input type =checkbox name=”name for control” >
4) Radio box - Used to selecting one Option from multiple choice
Syntax
<input type =radio name=”name for control” >
5) File Select - Used to upload or select file from client machine
Syntax
<input type =file name=”name for control” >
6) Form Tag - Form tag is used to hold all the above controls to collect data from the user
in client machine. It has two parameters
a) Method = Get/Post which sends the user data from client machine to server
b) Action = This parameter tells to which PHP file in server the data has to be sent.

Syntax

<form method=get/post action =”PHP file in server”>

7. Explain in detail about file handling

Opening the file in server and processing it for different task like writing into the file or
reading from the file or Updating the file is called file handling.
File Handling operations
1)PHP Open a File, 2) PHP Read a File 3) PHP Close a File 4) PHP Write a File 5) PHP
Appending a File and 6) PHP uploading a File.

PHP Open File


1. fopen() function is used to open a file
It has two parameter one is the name of the file and second it the mode
(read/write/append) in which the file to be opened
Syntax

$file_Object= fopen(“FileName”, “Read/WriteMode”) or die(“Error Message!”);

PHP Read a file

fread ( ) function is used to read a file.


Syntax
fread($file_Object,filesize(“FileName”));

PHP Write a File

fwrite ( ) function is used to write into the file.


Syntax
fwrite($file_Object , “Text to be written”)

PHP Close a File

fclose() function is used to close the file

fclose($fileobject)

Chapter 9
CONNECTING PHP AND MYSQL
1. Write a note on MYSQLi.
MYSQLi is extension in PHP scripting language which gives access to the MYSQL database.
2. What is MYSQL function
PHP offers many functions to connect to MYSQL database and execute queries. Such
functions are called MYSQL functions
3. What is connection string?
Mysqli_connect function uses 4 variables like $sefvarname, $username, $password and
$DBname to connect to MYSQL database server. They are called as connection string

5 mark

1. Explain in detail about MYSQLi functions


MYSQLi extension contains the following function to connect and access data in MYSQL
database.
a) mysqli_connect() function
b) mysqli_query() function
c) mysqli_close() function

Mysqli_connect() function - PHP scripting language uses Mysqli_connect() function to


connect to MYSQL database. It takes four arguments

(a) server name (b) user name (c) password (d) database name
Syntax

$connection object = mysqli_connect(server name , user name , password, database


name)

<?

$cn- = mysqli_connect(“local host” , “TN_user” , “god”, “school_DB”)

if ($conn)

echo “successfully connected”;

?>

b) Mysqli_query() function

This function helps to execute SQL query statements in PHP scripting language

Sytax

Mysqli_query(connection object , query)

Eg.

<?

$cn = mysqli_connect(“local host” , “TN_user” , “god”, “school_DB”)

Mysqli_query($cn , “insert into stud (name, tamil,eng) values(‘ abc ‘, 70,88)”)

?>

c) mysqli_close()

mysqli_close() function is used to close the connection between PHP script and MYSQL
database server.

Syntax

mysqli_close(“connection object”);

Eg.

<?

$cn = mysqli_connect(“local host” , “TN_user” , “god”, “school_DB”)

mysqli_close($cn);

?>

2. Explain MYSQLi queries with examples

Insert query - It is used to add record to database

Eg. insert into student (name,rono, tam) values (‘shiva’ , 2, 77);

Update query - Update query is used to make changes in existing record

Eg. Update student set tam = 55 where rono=2;

Select query - it is used to retrieve data from table in database


Eg. select * from student where rono = 2;

Delete query - It is used to delete a record from table in database

Eg. Delete from student where rono=2;

Chapter 10

Introduction to computer networks

1.What is network?

Set of computer connect together for the purpose of sharing resource is called a computer
network.

2. What is node?

Each computer connected to network is called as node

3. Write a short note on Internet.


Internet stands for Inter connected network. Internet is defined as the connection
between individual networks.
4. What is e-Governance
Getting government service through internet is called e-Governance. Eg. getting aadhar
card, ration card , birth certificate etc.
5. Write a note on Mobile networking
Mobile network is the network connecting devices like Mobile, computer etc. with out
cable.
6. Differentiate wired network and wire less network
Wired network Wireless network
In Wires network computers are physically In wireless network computers and other
connected. device are not physically connected.
Here wire are used to connect device Here radio waves are used to connect
devices
It is costly It is cheap
It does not support mobility ie. device It support mobility ie. device can be moved
cannot be moved if is physically connected because there is no physical connection.
to wire
Cables like twisted pair, coaxial cable , fiber WIFI and Bluetooth are used
optics were used
7. Write about ARPANET.
Advanced Research Projects Agency Network. Four computers of American universities
were connected to for sharing among them and this network is called as ARPANET
8. What is flame wars?

When group of people of different opinion come together online, many discussions arise
which lead to personal attacks called “flame wars.

9. Write about e-banking


Doing Online money transaction through internet is called e-banking

5 mark

1. Write a note on computer network


When set of computers are connected using wire or wireless is called computer
network
Uses of computer network
a)communication b) resource sharing c) Information sharing

Communication - Using computer network we can communicate with different peoples


through out the world. We use mobile , social media, telephone , e-mail, video
conferencing etc. to communicate.

Resource sharing - Resource sharing means sharing the hardware like printer, fax
machine, scanner amount group of group of users using network.

Information sharing : Using computer network any software applications, data stored
in server can be shared by many people in live. Eg. 11th results.
2. Write about benefits of social networks
Group information sharing - We can share text, audio , video , animation other
members in the group. We can convey our daily wishes to other group members. We
can also have healthy group discussion and group chatting which makes to keep in
touch with other group members.

Broadcast Announcements - We can easily spread information of any emergency or


natural calamities through social media. Local shops can do advertisements , business
peoples can market their products through social media.

Fostering diversity of thought - Each individual can post his opinion about any issues in
social media. They are free to post their critics. Many debate or discussion goes in
online regarding political issues. All these helps to build a knowledge society.

Relationship building - Social media builds the relationship among the individuals
even though they are physically far away. They connects the peoples of different
communities.
Content contribution - Individuals can easily show case their talents in social media
which will create an opportunity for the growth of individuals.

Chapter 11
Network Examples and Protocols
1. What is protocol?
Networks protocols is a set of rules that determine how data is transmitted
between device in the same network
2. Expand
a) TCP/IP - Transmission control protocol / Internet protocol
b) HTTP - Hypertext transfer protocol
c) HTTPS - Hypertext transfer protocol secure
d) FTP - File transfer protocol
e) SMTP - Simple mail transfer protocol
f) UDP - User datagram protocol
g) DNS - Domain name system
h) OSI - Open system interconnection
i) WIFI - Wireless fidelity
j) RFID - Radio frequency Identification
k) www - World wide web
3. What are the benefits of mobile network
a. Mobile network provides wireless voice and data communication.
b. Mobile network use both packet switching and circuit switching network for
both voice and data communication.
c. Application of mobile network is mobile, laptop, table etc.
4. What are benefits of WIFI

a) Helps to connect without wire

b) Cheap because no cost for cable

c) Mobility ie device can be carried any where

d) Internet connectivity - Internet can be given to any part of world

e) Flexible LAN - Computers can be easily connected within room or building


since no

wire

4. Write a note on RFID


RFID –(Radio Frequency Identification) uses RF wireless technology used to
identify an object.
RFID used radio waves to read and capture information stored on a tag attached to
an object.
Types of RFID
a) Active RFID - Here the tag has its own power source. It is used to track the
object for long distance
b) Passive RFID - Here tag gets power from reader antenna. It is used to track
object in shorter distance.

5 mark

1. Explain about Internet, Intranet and Extranet. (important)


INTERNET - It is world wide system of computer network where user at any one computer
can get information from any other computer.
It comprises of public, private , business, academic and government network connected
by wired or wireless network
Example - Email , searching of information, video conferencing etc.

INTRANET - It is private network which is used to share the company data between
employees.
It consist of inter linked local area network
Eg. Sharing of company rules and regulations, All banks are INTRANET.
EXTRANET - It is a private network uses internet technology and public telephone system
to
share business information with customers, suppliers, vendors etc.
Eg. Customers communication, Bank sectors where customers can do online
banking
2. Discuss OSI Model and its layer (important)
OSI (Open system interconnection) sets the standards for inter computer
communication.
It has 7 layers.

OSI Layers
a) Physical Layer - It is the first layer which defines the electrical and physical
specification for device.
b) Data Link Layer - It is the second layer which guarantees the data transmitted are
error free.
It has special protocol like 802.3 for wired network and 802.11 for wifi

c) Network Layer - It is the 3rd layer which determines the path to send the data packets.
At this layer rout of data packets are identified using IP ADDRESS.

d) Transport layer - It is the 4th layer which guarantees the sending of data is successful.

It include error checking option.

d) Session layer - While accessing another computer , this layer establish session (timing)
for communication. It controls dialogues between theses computers.
e) Presentation layer - It is the 6th layer which prepare data for Application layer.
Encryption and decryption take place in this layer.
f) Application layer - It is the 7th layer which act as user interface platform through
software program.
3. Discuss TCP/IP model
* TCP/IP is a set of protocol which governs communication of computers in Internet.
* It has 4 layers namely

a) Network interface layer


b) Network layer
c) Transport layer
d) Application layer

c) a) Network Interface layer - It is the first layer which comprises of physical and data
link layer. It defines the electrical and physical specification for device. It guarantees
the data transmitted are error free

b) Network Layer - It is the 1st layer which determines the path to send the data packets.
At this layer rout of data packets are identified using IP ADDRESS.

c) Transport layer - It is the 3rd layer which guarantees the sending of data is successful.

d)Application layer - It is the 4th layer which act as user interface platform through
software

program.

Chapter 12

Domain Name system

1. Write a note on DNS


 Domain Name System an Internet service that translates domain name into IP
address.
 DNS maintain all the directory of all domain names and correspondent IP address
which helps us to access the website using the domain name.
 There are 3 important components in the Domain Name System.
They are Namespace, Name server and Zone
2. What is IP Address
used to uniquely identify a computer over the network.
There are two types of IP address namely IPV 4 and IPV 6.
IPV 4 - is a 32 bit addressing and IPV6 is a 128 bit addressing
3. What is Domain name?
Symbolic name associated with an IP address is called Domain name
Eg. www.tnschools.in is domain name associated to IP address 35.173.69.207
4. What is URL and write its types
Uniform Resource Locator, the address of a specific web page or file on the Internet.
URL is made up of four parts- protocols, hostname, folder name and file name.
Its types.

a)Absolute URL b) Relative URL

Absolute URL - It gives complete address of webpage. Absolute contains all the four
necessary and fundamental parts of URL.
Relative URl - It gives partial address of webpage. Relative URL contains only folder
name and the file name or just the file name

5. Write the classification of IP address


a. IPv4 Address - It 32 bits unique address. 232 number of system that can be given IP
address using this addressing methods.
b. IPv6 Address - It 128 bits unique address. 2128 number of system that can be given
IP address using this addressing methods.
6. List any 4 URL
https://www.google.com
https://www.yahoo.com
https://www.facebook.com
https://www.flipkart.com
7. Define zone
Zone is a group of contiguous domains and sub domains in the Domain Name Space
8. What is Resolver?
The program which is responsible for initiating the translation of a domain name into
an IP address is called Resolver
9. List any 4 domain name
Domain Name Meaning
com Commercial Organisation
edu Educational Institutions
gov Government (US)
mil Military groups

10. Domain Name Meaning com Commercial Organisation edu Educational Institutions gov
Government (US) mil Military groups org Non profit Organization net Networking
organization
11. Write any 4 top level domain
Domain Name Meaning
Com - Commercial Organisation
edu - Educational Institutions
gov- Government (US) mil Military groups
org - Non profit Organization
net - Networking organization
12. Differentiate ipv 4 and ipv6
Ipv 4 Ipv 6
IPv4 address is a 32-bit unique IPv4 address is a 128-bit unique address
address
Number of address that can be Number of address that can be formed is 2128
32
formed is 2
Eg. 128.143.137.144 Eg.
2001:0000:32313:DFE1:0063:0000:0000:FEFB
13. Differentiate domain name and url
Domain Name URL
A symbolic name associated with an IP It is web address of particular page in internet
address
Eg. Cms.tn.gov.in Eg. http://cms.gov.in/sites/press/maps.jpg
Domain name has not types There are two types of URL
Relative URL
Absolute URl
14. Write about the components of DNS
Domain Name System an Internet service that translates domain name into IP address.
The Components of DNS are
a) Namespace b) Name server c) Zone

Name Space

The domain names must be very unique and appropriate. The names should be
selected from a names pace. The name space can be organized in two ways

a) Flat Name space - Flat name space is where the name is assigned to the IP address.
They do not have any specific structure. But flat name space cannot be used for
larger systems.
b) Hierarchical Name space - Hierarchical name space is where the name is made up
of several parts. The first part may represent the nature of organization, the second
part may represent the name of organization, and third part may represent the
department of the organization and so on

Name server - Name Servers are programs that run on a physical system and store all
the zone data. It provides to clients when queried by them

Zone - Zone is the contiguous part up to which the server has access. The domain
assigned for the server does not divide into further sub domains then zone is same as
domain

15) Explain how DNS works

Step 1: When the user enters the URL in the browser, the system first checks its DNS
cache for the corresponding IP address. If the IP address is found in the cache then the
information is retrieved from cache.

Step 2 : If not, then the system needs to perform DNS query i.e., the system needs to
query the resolver about the IP address from Internet Service Provider (ISP). Each
resolver has its own cache and if it is found in that then that information is retrieved.

Step 3: If not, then the query is passed to next domain server i.e., TLD (Top Level
Domain) which reviews the request and direct the query to name servers associated
with that specific domain. Until the query is solved it is passed to next level domains. At
last the mapping and the record are returned to the resolver who checks whether the
returned value is a record or an error. Then the resolver returns the record back to the
computer browser which is then viewed by the user.
Chapter 15

E-Commerce

1. Define E-commerce

E-Commerce can be described as the process of buying or selling products, services or information
via Internet.

2. Differenciate E-Business and E-commerce

E-Business E-Commerce
Here all the business activities are carried out Here only commercial transaction takes place
using computers and Network through internet
E-Business is super set of E-Commerce E-Commerce is a subset of E-Business
E-Business stands for Electronic Business E-Commerce stands for Electronic Commerce

3. Differentiate tangible goods and electronic goods with example of your own

Tangible goods In Tangible product


Product which can be physically touched is Product which can be cannot physically touched
called Tangible goods is called Tangible goods
Eg. Computer , CD , Printer Eg. Downloaded song , Games etc

4. What is dotcom bubble and dotcom burst?

DOTCOM BUBBLE

The Dotcom Bubble was a historic excessive growth of economy that occurred roughly between
1995 and 2000. During this period Internet was used extreme. In this period US stock market
raised from 1000 points to 5000 points

DOTCOM BURST

The Nasdaq-Composite US stock market index, fell from 5046.86 points to 1114.11 points. This is
known as the Dotcom Crash or Dotcom Burst. This began on March 11, 2000 and lasted until
October 9, 2002. During this crash many online shoping companies failed and closed.

3. Write a short note on out-sourcing.

If a company’s work is hired to another company, it would be termed as out-sourcing.

4. Explain B2B module in E-Commerce

In B2B E-Commerce, commercial transactions take place between different business


organizations, through the Internet.

Eg. For example, a cycle company may buy tyres from another company for their cycles.

5. Write a note on name-your-price websites.

Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the
retailer for a particular product or service. https://in.hotels.com/

5 mark question

1. Write about the development and growth of Electronic Commerce


Economists describe Ecommerce growth as three distinct waves that occurred in the Industrial
Revolution.

Wave 1: The Dotcom companies of first wave are mostly American companies. Thereby their
websites were only in English. The Internet was slow and security was very poor during first wave.
First wave companies enjoyed more profit because customers have no other option.

Wave 2: The second wave is considered as the global wave, with sellers doing business in many
countries and in many languages. Language translation and currency conversion were focused in
the second wave websites. The second wave companies used their own internal funds and
gradually expanded their E-Commerce opportunities. As a result E-Commerce growth was slow
and steady. The rapid development of network technologies and interactive web (web 2.0, a
period of social media) offered the consumers more choices of buying.

Wave 3: The third wave is brought on by the mobile technologies. During this wave customers can
buy and sell the product any where and at any time. More companies has come to the market and
more consumers started to buy online which has increase the global economy.

2. List all the E-Commerce business models and explain any four briefly.

1. Business to Business (B2B) 2. Business to Consumer (B2C) 3. Business to Government (B2G) 4.


Consumer to Business (C2B) 5. Consumer to Consumer (C2C) 6. Consumer to Government (C2G) 7.
Government to Business (G2B) 8. Government to Consumer (G2C) 9. Government to Government
(G2G)

Business to Business (B2B)

In B2B E-Commerce, commercial transactions take place between different business


organizations, through the Internet.

Eg. For example, a cycle company may buy tyres from another company for their cycles.

Business to Consumer (B2C)

commercial transactions take place between business firms and their consumers. It is the direct
trade between companies selling books online

Business to Government

Here the business organizations sells products, services or information to Governments.

Eg. Companies supply Laptop to government

Consumer to Business

Here transaction is originated by the consumers. The consumers will fix a requirement or specific
price for a service or Product.

Eg. Travel website where consumer choose the place to visit and data of travel

Consumer to Consumer (C2C)

Here commercial transactions take place between different consumers directly using Internet

Eg. OLX where consumers can sell or buy the product from other consumer

Consumer to Government (C2G)

Here an individual consumer interacts with the Government through online to get the service.
Eg. Applying for birth , community certificate online.

Government to Business (G2B)

Here Government providing services or information to business organization through online.

Eg. Notification about auction of road project

Government to Consumer (G2C)

Here Government provides platform for its citizens to avail its services and information through
the Internet.

Eg. Issue of Community certificate through online.

Government to Government (G2G)

G2G is the online interaction between Government organizations or departments.

Eg. Payment of EB bill by government school to EB office in online

3. Explain any five E-Commerce revenue models

Affiliate site

Affiliate site is a form of third party marketing in which the site owner gets paid based on the
performance. The affiliate site may be a shopping directories that contain a link to a normal
retailing site and are paid commission when a customer makes a purchase through it.
Auction Site
Auction site is a kind of website, that auctions items on the Internet and levies some commission from the
sales. e.g. https://www.ebay.com/
Banner Advertisement
Banner advertisement site displays advertisements of other companies in its websites and thereby earns
revenue.

Bulk Buying

Bulk-buying sites collect a number of users together where every one wants to buy similar items - the site
negotiates a discount with the supplier and takes commission. e.g. https://www.alibaba.com/

Name your product


Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the retailer for
a particular product .Eg. https://in.hotels.com/

4. How would you differentiate a traditional commerce and E-Commerce?

Refer book
Electronic Payment Systems

Chapter 16

1. What is electronic payment systems


The term electronic payment refers to a payment made from one bank account to another bank
account using electronic methods without involvement of bank employees.
Types
a) Micro Electronic Payment system - It is an on-line payment system designed to allow
requent payments of small amounts
b) Security is low in Micro Electronic payment system .
c) Eg Subscription of online games , watching movies
d) Macro Electronic Payment system -It is an on-line payment system designed to allow payments
of huge amounts of money Eg. Internet banking , mobile banking
2. Explain e-Wallet
Electronic purses allow users to make electronic transactions quickly and securely over Internet
using Smart Phone.
Eg. PayPal, SBI Buddy
3. What is credit card network
It acts as the intermediate between the Issuer bank and Acquirer bank in credit card payment
system ie. That is they send money from issuer bank to Acquirer bank when card bearer makes a
purchase.
4. Compare and contrast Credit card and Debit card
Credit card Debit card
Using credit card customer can purchase Using debit card the money is debited from
now and pay later customer account instantly
It is accepted world wide It is not accepted world wide
Customer must pay interest when No interest to be paid
repayment is delayed
5. Differentiate micro and macro electronic payment system
Micro Electronic payment system Macro electronic payment system
Small amount can be transferred Huge Amount can be transferred
Security is low for money transfer Security is high for money transfer
Eg. Subscription of online games , watching Card based payment systems
movies Internet Payment system
Mobile payment system
6. Explain stored value card
Stored value card is a type of debit card that is pre-loaded with certain amount with which a
payment is made.
When money is over it can be recharged.
Two types of stored value cards are there
a) Closed loop card - Closed loop cards are issued by a specific merchant and can only be used to
make purchases from specific place. e.g. chennai metro rail travel card
b) Open loop card - Open loop card can be used any where to make purchase. It is also
called prepaid-debit cards.
7. Write about UPI
 Unified Payments Interface (UPI) is a real-time payment system developed by National
Payments Corporation of India (NCPI) to facilitate inter-bank transactions (Two different
bank).
 It is a secure and instant payment system.
 UPI withdraws the money from customer account and deposits to merchant or receiver
account directly and instantly.
 UPI is developed on the basis of Immediate Payment Service

UPI applications use two types of address - global and local

● Global address includes bank account numbers and IFSC.


● Local address is a virtual payment address called as UPI ID. UPI ID is unique id generated by
bank for each customer using which customer can send and receive money

5 marks

1. Write about electronic fund transfer


Electronic fund transfer helps to transfer of money from one bank account to another bank
account using internet easily.
It includes the following
a) ECS -Electronic Clearing Service
b) RTGS - Real Time Gross Settlement system
c) EFT - Electronic fund transfer

ECS
Electronic Clearing Service can be defined as repeated transfer of funds from one bank account to
another bank accounts using computer and Internet technology.
The payer instructs the bank to debit from his bank account and credit it in another bank account
on the specific date.
Advantage is that payer need not remember the dates of payment and do the transaction
manually.
It helps to provide paper less service
RTGS
Real Time Gross Settlement system (RTGS) is a payment system particularly used for transferring
huge amount money from one bank account to another bank account instantly.
Here payer initiates the transaction of money from his account to another.
Ones paid the amount cannot be reversed

EFT -Electronic fund transfer


The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on the
same day in batches
EFT saves the effort of sending a demand draft through post and the inherent delay in reaching the
money to the receiver.
Here bank takes commission for money transfer

2. Write a note on Internet banking and mobile banking


Internet banking
Internet banking allows bank customers to do his financial transaction through secured website
provided by bank.
Here all transaction are operated by customer without bank employee.
Advantages
a) Customer can do his financial transaction on his convenient time (24/7)
b) Standard browsers and internet connection is enough to do transaction. No special software
need to be installed
c) Apart from transaction customers can view the account balance, account statement etc
d) Customer need not go to bank

Mobile banking

Mobile banking is another form of net banking. The term as m-banking.

Mobile banking allows customers to do his financial transaction through his mobile. These
transactions include balance checking, account transfers, payments, purchases, etc.
Advantage
1. Transactions can be done at anytime and anywhere.
2. Apart from transaction customers can view the account balance, account statement etc
3. Customer need not go to bank

Mobile Banking operations can be implemented in the following ways:

● contacting the call center.

● automatic IVR telephone service.

● using a mobile phone via SMS.

● WAP technology.

● Using smartphone applications

3.What is credit card? Explain the key players of a credit card payment

Credit card is an electronic payment system normally used for retail transactions. A credit card enables the
bearer (card holder) to buy goods from merchant now and pay later.

Card holder bank will pay the amount to merchant behalf of card holder, so after a period of time card
holder can repay to his bank. If he fails to pay within time then he has to pay along with the interest.

Key players in operations of credit card

A) Bearer: He is the card holder who can buy the goods now and pay later using the card.
B) Merchant : Shop keeper who sells the goods and receive the payment through credit card
C) Issuer : Bearer’s bank, that issue the credit card and pay to merchant behalf of bearer
D) Acquirer: Merchant’s bank that is responsible for receiving payment on behalf of merchant
E) Credit Card Network: It acts as the intermediate between the issuer and acquirer banks. They
help for safe transfer of money between banks. Eg. Visa, MasterCard, Rupay
E-Commerce Security Systems

Chapter 17

1. Write about information leakage in E-Commerce

The leakage of trade secrets in E-Commerce is called as Information leakage. It takes place in two aspect

a) the content of the transaction between the vendor and customer is stolen by the third party;

(b) the documents provided by the merchant to the customer or vice versa are illegally used by the other.

2.Write about Typopiracy

Some fake websites try to take advantage of users’ common typographical errors in typing a website
address and direct users to a different website.

Such people try to take advantage of some popular websites to generate accidental traffic for their
websites. e.g. www.goggle.com, www.faceblook.com

3. List the different types of security technologies in E-Commerce

a) Encryption technology b) Authentication technology c) Authentication protocol

4. Write about digital signature.

A digital signature is a mechanism that is used to verify that a particular digital document, message or
transaction is authentic.

It provides the receiver the guarantee that the message was actually generated by the sender.

5. Write a note on certification authorities

A digital certificate (also known as public key certificate) is an electronic document used to prove the
ownership of a public key.

This certificate includes the information about the sender’s identity, digital signature and a public key

The digital certificate are being issued by a licensed Certifying Authority (CA). NIC, Safescript, TCS, MTNL, e-
Mudhra are some of the authorized Certifying Authorities under Government of India.

6. List some E-Commerce Security Threats?

Information leakage, Tampering, Payment frauds, Malicious code threats , Distributed Denial of Service
(DDoS) Attacks, Cyber Squatting, Typopiracy.

7. Differentiate asymmetric and symmetric algorithms

Book

5 mark

1. Differenticate digital signatures and digital certificates

Book

2. Explain encryption technology.

Encryption technology is an effective information security protection. It is defined as converting a


Plaintext into meaningless Ciphertext using encryption algorithm thus ensuring the confidentiality of the
data. The encryption or decryption process uses a key to encrypt or decrypt the data. At present, two
encryption technologies are widely used. They are symmetric key encryption system and an asymmetric
key encryption system

Symmetric key encryption


The Data Encryption Standard (DES) is a Symmetric key data encryption method. DES is the typical block
algorithm that takes a string of bits of cleartext (plaintext) with a fixed length and, through a series of
complicated operations, transforms it into another encrypted text of the same length. DES also uses a key
to customize the transformation. So the people who know the key can only decrypt the data.

Asymmetric or Public key encryption - Asymmetric encryption also called as RSA (Rivest-Shamir-Adleman)
algorithm. Unlike a symmetric encryption, the communicating parties need not know other’s privatekey in
asymmetric encryption. Each user generates their own key pair, which consists of a private key and a public
key. A public-key encryption method is a method of converting a plaintext with a public key into a
ciphertext from which the plaintext can be retrieved with a private key.

You might also like